JFQ 85

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 104

Issue 85, 2nd Quarter 2017

New Technologies,
New Strategies
An Interview with
David L. Goldfein
Operational Graphics
for Cyberspace
Joint Force Quarterly
Founded in 1993  •  Vol. 85, 2nd Quarter 2017
http://ndupress.ndu.edu

Gen Joseph F. Dunford, Jr., USMC, Publisher


MajGen Frederick M. Padilla, USMC, President, NDU
Editor in Chief
Col William T. Eliason, USAF (Ret.), Ph.D.

Executive Editor
Jeffrey D. Smotherman, Ph.D.

Production Editor
John J. Church, D.M.A.

Internet Publications Editor


Joanna E. Seich

Book Review Editor


Frank G. Hoffman, Ph.D.

Associate Editor
Patricia Strait, Ph.D.

Art Director
Marco Marchegiani, U.S. Government Printing Office

Advisory Committee
COL Michael S. Bell, USA (Ret.), Ph.D./College of International
Security Affairs; LTG Robert B. Brown, USA/U.S. Army Command
and General Staff College; Brig Gen Christopher A. Coffelt,
USAF/Air War College; Col Keil Gentry, USMC/Marine Corps War
College; BGen Thomas A. Gorry, USMC/Dwight D. Eisenhower
School for National Security and Resource Strategy;
Col Steven J. Grass, USMC/Marine Corps Command and Staff
College; Brig Gen Darren E. Hartford, USAF/National War
College; Col Brian E. Hastings, USAF/Air Command and Staff
College; RADM P. Gardner Howe III/U.S. Naval War College;
LTG William C. Mayville, Jr., USA/The Joint Staff;
MG William E. Rapp, USA/U.S. Army War College;
LtGen Thomas D. Waldhauser, USMC/The Joint Staff;
RDML Brad Williamson/Joint Forces Staff College

Editorial Board
Richard K. Betts/Columbia University; Stephen D. Chiabotti/
School of Advanced Air and Space Studies; Eliot A. Cohen/The
Johns Hopkins University; COL Joseph J. Collins, USA (Ret.)/
National War College; Mark J. Conversino/Air War College;
Thomas P. Ehrhard/Office of the Secretary of Defense; Aaron L.
Friedberg/Princeton University; Bryon Greenwald/Joint Forces
Staff College; Col Thomas C. Greenwood, USMC (Ret.)/Office of
the Secretary of Defense; Douglas N. Hime/Naval War College;
Mark H. Jacobsen/Marine Corps Command and Staff College;
Col Jerome M. Lynes, USMC (Ret.)/The Joint Staff; Kathleen
Mahoney-Norris/Air Command and Staff College; Thomas L.
McNaugher/Georgetown University; Col Mark Pizzo, USMC (Ret.)/
National War College; James A. Schear/Office of the Secretary of
Defense; LtGen Bernard E. Trainor, USMC (Ret.)

Printed in St. Louis, Missouri, by

Cover 2 images (top to bottom): Member of Team USA during


archery competition of 2016 Air Force Wounded Warrior Trials at
Nellis Air Force Base, Nevada (U.S. Air Force/Kevin Tanenbaum);
Bill Murray with Soldier from Presidio’s 229th Military Intelligence
Battalion during 3-M Celebrity Challenge charity event at Pebble
Beach Golf Links, February 8, 2017 (U.S. Army/Steven Shepard);
Squadron Sergeant Major of Marine Wing Communications
Squadron 28 speaks with Marine during semi-annual Spartan Cup,
at Marine Corps Air Station Cherry Point, North Carolina, January
20, 2017 (U.S. Marine Corps)
In this Issue About the Cover
Navy explosive ordnance disposal
technicians assigned to Task Group
56.1 perform tactical personnel
Dialogue insertion during helicopter rope
suspension training, June 30, 2011,
2 In Memoriam: General
Manama, Bahrain (U.S. Navy/Peter
John W. Vessey, Jr., USA D. Lawlor)
By John Wagner

Forum
4 Executive Summary
6 An Interview with
David L. Goldfein
16 Toward a Unified Metric Joint Force Quarterly is published by the National
of Kinetic and Nonkinetic Recall Defense University Press for the Chairman of the
Joint Chiefs of Staff. JFQ is the Chairman’s flagship
Actions: Meaning Fields 76 The Advent of Jointness joint military and security studies journal designed to
and the Arc of Effects During the Gulf War: A inform members of the U.S. Armed Forces, allies, and
other partners on joint and integrated operations;
By Bradley DeWees, Terry C. Pierce, 25-Year Retrospective national security policy and strategy; efforts to combat
Ervin J. Rokke, and Anthony Tingle By Christopher G. Marquis, Denton terrorism; homeland security; and developments in
Dye, and Ross S. Kinkead training and joint professional military education to
22 Information Warfare in transform America’s military and security apparatus
to meet tomorrow’s challenges better while protecting
an Information Age freedom today. All published articles have been vetted
By William R. Gery, SeYoung Book Reviews through a peer-review process and cleared by the
Defense Office of Prepublication and Security Review.
Lee, and Jacob Ninas 84 Mission Failure
NDU Press is the National Defense University’s
Reviewed by Bruno Carvalho cross-component, professional military and academic
30 The Rise of the Commercial publishing house.
Threat: Countering the Small 85 Margin of Victory The opinions, conclusions, and recommendations
Unmanned Aircraft System Reviewed by John Dethlefs expressed or implied within are those of the
contributors and do not necessarily reflect the views
By Anthony Tingle and David Tyree of the Department of Defense or any other agency of
87 The New Grand Strategy the Federal Government.
Reviewed by Micheal D. Russ Copyright Notice
Commentary This is the official U.S. Department of Defense edition
of Joint Force Quarterly. Any copyrighted portions
36 Forensic Vulnerability of this journal may not be reproduced or extracted
Analysis: Putting the “Art” Joint Doctrine without permission of the copyright proprietors. JFQ
88 Improving Joint Doctrine should be acknowledged whenever material is quoted
into the Art of War from or based on its content.
By Darryl Williams for Security in Theater: Submissions and Communications
Lessons from the Bastion- JFQ welcomes submission of scholarly, independent
42 Operational Graphics Leatherneck-Shorabak Attack research from members of the Armed Forces,
security policymakers and shapers, defense analysts,
for Cyberspace By Nicholas J. Petren academic specialists, and civilians from the United
By Erick D. McCroskey States and abroad. Submit articles for consideration
and Charles A. Mock 94 Joint Publication 3-20, to ScholarOne, available at https://mc04.
manuscriptcentral.com/ndupress, or write to:
Security Cooperation:
Editor, Joint Force Quarterly
Adapting Enduring Lessons NDU Press
Features By Keith D. Smith, Mark H. Lauber, 260 Fifth Avenue (Building 64, Room 2504)
50 The Need for a Joint Support Fort Lesley J. McNair
and Matthew B. Robbins Washington, DC 20319
Element in Noncombatant Telephone: (202) 685-4220/DSN 325
Evacuation Operations 100 Joint Doctrine Update Email: JFQ1@ndu.edu
By George K. Dixon JFQ online: www.dtic.mil/doctrine/jfq/jfq.htm

2nd Quarter, April 2017


58 Policing in America: How ISSN 1070-0692
DOD Helped Undermine
Posse Comitatus
By Steven C. Dowell, Jr.

66 The U.S. Government’s Approach


to Health Security: Focus on
Medical Campaign Activities
By George E. Katsos
Chief of the National Guard General Frank Grass meets with
Retired General Jack Vessey, former Chairman of the Joint Chiefs
of Staff, during visit to Camp Ripley, August 10, 2015 (DOD)

In Memoriam
General John W. Vessey, Jr., USA
By John Wagner

Our strategy is one of preventing war by making it self-evident to our enemies


that they’re going to get their clocks cleaned if they start one.
—General Vessey

e mourn the passing and National Guard when he was just 16. A combat veteran of World War II and

W celebrate the life and service


of General John W. Vessey,
Jr., the longest serving U.S. Soldier,
General Vessey rose to the rank of first
sergeant in World War II and received
a battlefield commission as a second
Vietnam, General Vessey eventually became
the 10th Chairman of the Joint Chiefs of
Staff, the Nation’s most senior military offi-
who died on August 18, 2016, at the lieutenant in 1944 during the Battle cer, from 1982 until his retirement in 1985.
age of 94. He began his 46-year service of Anzio while serving as an artillery He was a recipient of the Distinguished
by enlisting in the Minnesota Army forward observer. Service Cross, Defense Distinguished
Service Medal, along with Army, Navy, and
Air Force Distinguished Service medals,
Colonel John Wagner, USAF, is the U.S. Air Force Chair and Assistant Professor in the Dwight D.
Legion of Merit, Bronze Star, and Purple
Eisenhower School for National Security and Resource Strategy at the National Defense University. Heart, among numerous other decorations.

2  Dialogue / In Memoriam JFQ 85, 2nd Quarter 2017


At General Vessey’s retirement be essential to the success of Operation these teams have identified and repatriated
ceremony, President Ronald Reagan Desert Storm less than a decade later. At over a thousand Americans who were pre-
exclaimed: the U.S. Central Command activation viously listed as prisoners of war or missing
ceremony, he noted, “The Command is a in action, returning them home for final
General Vessey will be remembered for signal to everyone concerned, friends and closure with families and loved ones. For
many things: as a battlefield hero—you’ve possible foes, that the United States has these efforts, President Bush awarded
heard today about North Africa, Monte great interests in the region, that we stand him the Presidential Medal of Freedom in
Cassino, Anzio, and that grim night with ready to defend those interests and to help 1992 as a “Soldier-Statesman who would
the 2nd Battalion in Vietnam; he’ll be promote peace and stability in cooperation not leave anyone behind.”
remembered as a man of patriotism and with our friends in the region.”4 Just over As we reflect on the life and service
deep religious belief, an officer who brought 2 years later, at the U.S. Space Command of this national hero, I believe General
character and credit to every billet he ever activation ceremony, he remarked, “The Vessey would side with President Reagan
held; as a military leader who always spoke United States Armed Forces use space if there was just one thing that he would
his mind to civilian authority, respectfully systems to preserve national security by want us to remember about him: His
but candidly; as the Chairman of the performing such functions as communi- concern for the American soldier, the
Joint Chiefs of Staff who presided over the cations, weather forecasting, navigation, "GI," was legendary in combat during
restoration of America’s military strength and warning. This new command will two wars and throughout the entire Cold
and power at a moment critical to the fate improve the use of current systems and War. In his final words as Chairman,
of freedom and his country’s security. In all will enhance planning for future use General Vessey remarked, “It occurred to
these things, he bore the marks of greatness.1 of these systems in these areas.”5 The me that probably the best thing to do
groundbreaking work begun in these two here this morning was to give my fellow
The President then highlighted why commands continues to improve our abil- citizens the same charge that Saint Paul
General Vessey was such an inspirational ity to fight and win the Nation’s wars. gave to the Hebrew Christians when he
leader throughout his career, and why he While he did not receive a college said, ‘Let us run with perseverance the
will remain a role model for any future (bachelor’s) degree until 1963 as a lieu- race that has been set before us.’ And
leader in or out of the military: “There’s tenant colonel, General Vessey remained then just simply say, ‘Thanks. Thanks,
one accomplishment that is not there in a continuous proponent of professional troops.’”
Jack Vessey’s personnel file, yet it’s an ac- military education. He graduated from Thank you, General Vessey. JFQ
complishment that made the difference in the Industrial College of the Armed
the lives of so many GIs over so many years Forces, predecessor to the Eisenhower Notes
in so many places around the globe. Jack School for National Security and
Vessey always remembered the soldiers in Resource Strategy, in 1965. Eighteen
1
Ronald Reagan, “Remarks at a Farewell
Ceremony for General John W. Vessey, Jr.,
the ranks; he understood those soldiers years later, General Vessey urged, “I say Chairman of the Joint Chiefs of Staff,” Sep-
are the backbone of any army. He noticed to you that this new National Defense tember 30, 1985, available at <www.presidency.
them, spoke to them, looked out for them. University must play a major role in keep- ucsb.edu/ws/?pid=37816>.
Jack Vessey never forgot what it was like to ing this a just nation justly armed. It must 2
Ibid.
be an enlisted man, to be just a GI.”2 play its part in the preservation of peace.
3
Ronald H. Cole, Operation Urgent Fury:
The Planning and Execution of Joint Opera-
General Vessey was the last Chairman The quality of the education that the tions in Grenada, 12 October–2 November 1983
who served before the Goldwater-Nichols officers and civilian leaders get here will (Washington, DC: Joint History Office, 1997),
Department of Defense Reorganization have a great deal to do with the defense available at <www.dtic.mil/doctrine/doctrine/
Act of 1986 transformed America’s military decision-making in the years ahead.”6 history/urgfury.pdf>.
organization and designated the Chairman
4
John W. Vessey, Jr., “Remarks at the U.S.
After retiring from the Army,
Central Command Activation Ceremony,”
as the principal military adviser to the President Reagan asked General Vessey in Selected Works of General John W. Vessey,
President and Secretary of Defense. Thus, to lead the efforts to account for military Jr., USA, Tenth Chairman of the Joint Chiefs
he was the last Chairman to have opera- personnel listed as missing in action from of Staff, 22 June 1982–30 September 1985
tional control of forces in the 1983 Urgent the Vietnam War. As special emissary to (Washington, DC: Joint History Office, 2008),
Fury operation that “rescued nearly 600 Presidents Reagan, George H.W. Bush, available at <www.dtic.mil/doctrine/doctrine/
history/vessey_speeches.pdf>.
Americans and 120 foreigners, restored and Bill Clinton, he made six trips to 5
John W. Vessey, Jr., “Remarks at the Ac-
popular government to Grenada, and elim- Vietnam to negotiate a number of issues tivation of U.S. Space Command, Peterson Air
inated the potential strategic threat to U.S. with the Vietnamese government. General Force Base, Colorado Springs, CO,” in Selected
lines of communication in the area.”3 Vessey’s efforts directly led to American Works of General John W. Vessey, Jr.
search teams continuously on the ground
6
John W. Vessey, Jr., “Address to the
General Vessey also looked to the
National Defense University Foundation, Fort
future—innovating, advocating, and acti- in Vietnam and Cambodia since 1988 and McNair, Washington, DC,” in Selected Works of
vating two unified commands that would Laos since 1991, along with occasional General John W. Vessey, Jr.
transform the American way of war and targeted investigations in China. To date,

JFQ 85, 2nd Quarter 2017 Wagner 3


General Norman H. Schwarzkopf,
Commander, U.S. Central Command,
consults with Chairman of the Joint
Chiefs of Staff General Colin Powell
regarding allied military coalition during
Operation Desert Shield, July 18, 1990
(DOD/H.H. Deffner)

Executive Summary
he old saying that history is the beginning of JFQ’s history. Colonel Academy cadets learning how to write

T written by the victors does not


hold in all cases, but it still has a
certain truth to it. Being able to know,
Frederick “Fred” J. Kiley, USAF, Ph.D.,
was in my seat at the formation of the
journal and worked with General Powell
well. (Fred holds a Ph.D. in English and
served for over four decades “up on the
Terrazzo.”) In a follow-up phone call
with any certainty, what happened in directly to launch it, primarily as a means between us, he helped fill in many of the
the past is always a challenge, especially of fostering jointness among the Services. gaps in my understanding of how and
for the warrior scholars among us. As While I knew this fact, I had never had why JFQ came to be. Most important
Editor in Chief, I have relied on the contact with Fred until he wrote me to was how he identified his leadership style
oral histories of those who have been discuss the most recent JFQ he had read. in just a few minutes of conversation by
involved over the years in producing After reading his letter, I can say that immediately giving credit to the team he
JFQ. As you might expect, we have having one of the founding folks speak built. Fred began with Robert A. Silano,
been fortunate to have many talented so well of the current effort was a great longtime managing editor, who took
people at NDU Press with a common moment in my professional career. Powell’s vision and drove it to execution
purpose of making General Colin Pow- Fred Kiley took General Powell’s with great success; he also credited Hans
ell’s vision for the journal a reality. vision, found talented people who could Binnendijk, then in his first tour as direc-
In a world filled with tweets, make it happen, and then led them to tor of the Institute for National Strategic
Facebook posts, and e-mail, receiving a successful start some 85 issues (plus Studies here at the National Defense
a handwritten letter has become a rare special editions) ago in 1993. Not bad University, for “top cover” in keeping the
event. Even rarer for me would be to for someone who was also responsible for resources in place in order to make the
receive a letter from someone who was at hundreds if not thousands of Air Force journal happen. Fred also credited the

4  Forum / Executive Summary JFQ 85, 2nd Quarter 2017


skills of his staff, including two editors
who were here when I arrived in 2010,
Calvin Kelley and Martin “Jimmy”
Peters, Jr. Just like the joint team they
supported, JFQ has remained a unique
and successful team effort. In talking
about validation of effort from someone
who should know what “right” looks
like, you could not ask for better.
We continue in the path set down
nearly 25 years ago by General Powell,
Colonel Kiley, and his NDU-based JFQ
team, and we look forward to giving joint
issues “a thorough airing” for many years
to come.
Our Forum section includes my inter-
view with U.S. Air Force Chief of Staff,
General David L. Goldfein. With a bit of
pride, the general and I were squadron
commanders together at the 31st Fighter
Chairman of the Joint Chiefs of Staff General Colin Powell speaks via satellite to Pentagon while
Wing, Aviano Air Base, Italy, during the
visiting troops during Operation Desert Shield (DOD/Jeff Wright)
air war over Kosovo. I think you will be
hard-pressed to find many senior officers assess the vulnerabilities of our opponents section, we have two important articles
who really understand the complexities might seem like an obvious requirement, with insights from our recent conflicts.
of today’s joint operations in the way he and Darryl Williams argues this capabil- Nicholas J. Petren takes us to the attacks
does. Also, I think you can get a pretty ity is fast becoming a lost art. Erick D. in 2012 on Camp Bastion-Leatherneck-
good sense of how he is wrestling with a McCroskey and Charles A. Mock have Shorabak in Afghanistan, where he
range of factors that must be addressed developed an important, and so far, un- suggests improvements in how the joint
as he seeks to implement his vision for achieved capability—how to graphically force provides security for our forward
the Air Force as a part of the joint force. depict cyberspace operations. deployed bases. Kevin D. Smith, Mark H.
In a groundbreaking article, Bradley In Features, we cover a range of issues Lauber, and Matthew B. Robbins next
DeWees, Terry C. Pierce, Ervin J. Rokke, associated with the dynamic security give us a rundown on the updated Joint
and Anthony Tingle describe how best environment of the 21st century. George Publication 3-20, Security Cooperation.
to understand the results of kinetic and K. Dixon describes the requirement for You will also find the Joint Doctrine
nonkinetic actions (think bullets and a Joint Support Element as a part of our Update and three valuable book reviews.
bombs versus cyber attacks) across all noncombatant evacuation operations, What do you see happening in
the domains that the joint force operates which seem to be happening with greater the joint force today? Are we a better
in and then use that understanding to frequency. As local policing methods have fighting force 30 years after Goldwater-
improve the use of the force. The key become more militarized in recent years, Nichols? What do you see as the
lies in how we understand how war is Steven C. Dowell, Jr., takes a fresh look important issues today and going for-
fought in the 21st century. In another at the merging of military capabilities ward? Our JFQ audience wants to hear
view of part of that key terrain, William in law enforcement and the potential what you have to say. You have made
R. Gery, SeYoung Lee, and Jacob Ninas implications for the Posse Comitatus Act. JFQ “one of the most thoroughly read
add to our understanding of modern in- As many readers will be familiar with our and influential journals” in the mili-
formation warfare. In addition, the rapid continuing discussion on health security, tary profession, as General Powell had
expansion globally of drones or small a frequent contributor to JFQ from the wanted. Only you can continue to let
unmanned aircraft systems available from Joint Staff, George E. Katsos, discusses leadership know what you are thinking.
commercial sources has driven Anthony the U.S. Government’s focus on medical JFQ is here to help you do just that. JFQ
Tingle and David Tyree to think about operations in joint campaigns.
what kind of threat they might pose. Recall returns us to the first Gulf War, William T. Eliason
Commentary has two think pieces as Christopher G. Marquis, Denton Dye, Editor in Chief
that invite us to consider saving a valuable and Ross S. Kinkead provide a historical
but rapidly diminishing capability in one review of the evolution of jointness since
case and the need to add capability in the victory won in Operation Desert
the other. The ability to use forensics to Storm in 1991. In the Joint Doctrine

JFQ 85, 2nd Quarter 2017 Eliason 5


that tends to be what is most on the radar
for not only leaders in Washington, DC,
but also the American people.
Let’s first talk about what we do
from a deployed-in-place standpoint. It
starts with the nuclear enterprise. The
Air Force is responsible, with the Navy,
for two-thirds of the nuclear triad, and
75 percent of the nuclear command and
control, which is the foundation of the
nuclear enterprise. You can have great
individual pieces and parts, but if it’s not
connected to the President, then it’s not
a nuclear enterprise. It’s not safe, secure,
or reliable.
You have to consider the 35,000
Airmen who are deployed-in-place in
the nuclear enterprise, which underrides
all military operations that we conduct
around the world. You can’t talk 4+1
without actually starting a dialogue in the
nuclear missile fields and with the bomber
force and the NC3 [nuclear command,
control, and communications]; there is
direct connection throughout. If a con-
tingency begins anywhere on the globe,
those forces are unavailable to go forward
because they are doing their mission de-
ployed-in-place. That’s the first thing.
The second thing you need consider is
what we do in space. With the exception
of small pockets, the vast majority of the
General David L. Goldfein is Chief of Staff forces that conduct the business of space
of the U.S. Air Force (DOD) is deployed-in-place. Just like the nuclear
enterprise, these forces are unavailable,
with small exceptions, to go forward.
They are going to be doing 4+1 at the
same time we are doing all the things to

An Interview with defend the homeland and everything else


that we do around the globe.
Space has become a contested place.

David L. Goldfein Looking at how we fight in space should


a war extend there is job one for the Air
Force because we normalize the way we
do warfighting, and we do warfighting by
organizing, training, equipping, acquir-
ing, and sending forward-ready forces to
JFQ: What does today’s Air Force bring General David Goldfein: To see what a combatant commander who then fights
to the joint fight that deals with what the the Air Force does for the Nation as part the fight.
Chairman of the Joint Chiefs of Staff has of the joint force, there are several lenses We need to lead the debate on how we
described as the “4+1” challenges: Russia, you should look through. I’d begin by normalize space as a warfighting domain
China, Iran, North Korea, and Islamic looking at what we do from a deployed- so that I provide those forces to combat-
extremism? in-place outlook and what we do to ant commanders; and whether they are
deploy forward. It’s actually easier to de- geographic or functional commanders
scribe what we do to deploy forward, and they then fight those forces and rely on

6  Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
what we bring from space, whether you JFQ: On a more domestic front, you stated mission areas across the Air Force, and
want to talk about communications or that one of your main focuses is to look at they go from 40-person organizations to
precision navigation and timing, or all the Air Force squadrons. I know you have writ- 1,400-person organizations, and every-
other things we do to sense the globe as ten a book about this; I remember the day thing in between. Now start doing the
part of the ISR [intelligence, surveillance, you talked about it as a fellow. Why is this math. Two thousand squadrons, 2,000
and reconnaissance] enterprise. still important to you? first sergeants, 2,000 superintendents,
You have to think about what the Air 2,000 DOs [directors of operations],
Force does for the Nation in the business General Goldfein: My experience has 2,000 times 2,000 times 2,000—that’s a
of space operations. Then you have been that the squadron is the level of lot of manpower.
to transition to cyber. Like space and command and the level of leadership in But do we have these sized correctly?
like nukes, the cyber force, with small the structure of the Air Force where we When we built the unit manning docu-
exceptions, is not required to deploy succeed or fail as an organization. It is ments for these organizations, we didn’t
forward and simultaneously defend the where the command team, which I define build them based on an expectation that
homeland, deter the nuclear threat, and as the squadron commander, a senior 20 to 30 percent of the squadron would
be involved in 4+1. [noncommissioned officer], is going to always be gone on continuous deployed
You have to walk yourself through have the most influence on the culture operations. We built them based on the
these mission sets, and I would add ISR of an organization. It is where we build force we needed to do the job. If you
to that, because the vast majority of the readiness. If you buy that and if you be- go to a personnel recovery squadron, I
ISR enterprise actually does not deploy lieve that’s the heartbeat of the Air Force, suspect the commander will never have
forward. The sensing piece does, but then it’s worth putting a laser focus on his squadron together, 4 months on, 4
the reachback that it takes to do the it across the Service to ask how are we months off, 4 months on, 4 months off.
analytical work every day and turn it into doing? How are we doing at first identify-
decision-quality information, that’s an ing the folks we believe have the potential
enterprise. for squadron command, and, once we JFQ: What is your assessment of how the
That’s this whole part of the Air Force have identified those individuals, what Air Force is doing?
that can be viewed as under the water- do we do about it? What do we do to
line. It contributes directly to 4+1 and prepare them? What tools are we arming General Goldfein: I think we are like
homeland defense—and it contributes to them with? If in fact it’s the most import- we have always been. We have squad-
strategic deterrence. Then we start think- ant level of command they will ever have, ron commanders out there who are
ing about what we deploy forward. We’ll and that we will ever have as a Service in absolutely crushing it. Here’s what is in-
start with global reach. We are truly a terms of what we contribute, what are we teresting. As I travel around, I find there
global power because of our global reach. doing to prepare them for success? are four things that go into a successful
You have to examine what that looks like Moreover, once these squadron command team. It’s family, organiza-
and the requirement for us to deliver a commanders are in command, are we tional culture, understanding the mission,
certain number of million-ton miles per tossing them in the pool to see if they and accomplishing the mission.
day across the globe as a validated joint can swim as a test for the next level, or I can walk you into a missile squadron,
requirement. Then we have to take a look are we supporting them with everything and then I’ll take you to a contracting
at what we are doing in the business of we can to ensure that we are investing in squadron at Mountain Home [Air Force
conventional airpower forward. We could their success? And are we holding them Base (AFB)], and then I’ll take you to a
consider what we are doing in the Middle accountable for success, and the mission space squadron at Schriever [AFB], and
East, on the Korean Peninsula, or in we have given them? I can show you every different kind and
Europe. We could also take a look at what There is this code that you and I grew flavor of squadron. Morale is high. They
we’re doing in U.S. Southern Command. up with. The code is “leadership chal- have taken on the culture of the organiza-
Getting the decision speed faster lenge.” What that really means is I’m not tion. The common thread between those
than your adversaries and then having going to give you all the money you need who are doing well and those not doing
the operational agility to move forces and I’m not going to give you all the as well is the command team.
where required to be able to produce people you need, but I expect you to get If a commander has taken on the
dilemmas for the enemy that they could the job done. Some of that has been part responsibility for family and culture, then
never match are paramount. If you take a of our history, and others have done this that squadron is going to be cooking.
look at that end to end, the reality is you before us, so how do we ensure we are Now we have some institutional issues
are going to be hard-pressed to find a fully supporting these squadrons while that we have to work, such as whether we
mission that the joint force performs that they are in? are sized right, giving the needed tools,
doesn’t have an Airman present. Whether There is also a sizing piece to this. and supporting the commander.
in space or in cyber or ISR or delivering Right now, we have over 2,000 squad- At the same time, I’m hoping that
airpower, we are always there. rons of different sizes, shapes, and one of the positive spinoffs will be a fresh

JFQ 85, 2nd Quarter 2017 Goldfein 7


Airman with 1st Special Operations Aircraft Maintenance Squadron participates in Emerald Warrior 16 on May 3, 2016, at Hurlburt Field, Florida (U.S. Air
Force/Jordan Castelan)

look at where decision authority resides. [continuing resolutions] followed by a operating concept, and as part of that,
My gut tells me that as an unintentional 1-year budget, possibly 2. he put in place a developmental planning
consequence of downsizing and con- What it does to a Service chief is you process that helps us look further out to
solidating and moving people out of start building in unintentionally bad determine where it is that we need to
squadrons, decision authority started behaviors. We are never going to get look, where we need to be in 2030—
moving up. Now I’ve got people who money in the first quarter of any given what we need to think about regarding
are entrusted with the mission of the Air year because, historically, we are going to the global security environment. It’s not
Force—whether we succeed or fail—but get a CR every year, and then the force a crystal ball, but planning. The value of
may not have the decision authority they starts thinking about how it spends, and planning is the planning.
need to accomplish their mission. We’re working a budget plan that we cram The first ECCT [Enterprise Capability
taking a fresh look at that, too. in at the last half of the year. We live Collaboration Team] that we did on air
on life support, and it becomes grossly superiority is already bearing fruit. In
inefficient. It’s budget instability and the terms of now laying out a path—where
JFQ: How have ongoing budget pressures lack of being able to plan that is keeping we need to head in the business of air
affected how the Air Force operates today us from getting into some programs superiority as a core mission of the U.S.
and its plans for the future, and what steps that, quite frankly, would be really good Air Force—the next step is going to be
have you taken to mitigate these fiscal issues? for the Nation—the multiyear kind of multidomain command and control.
programs that allow us to get the price
General Goldfein: The biggest challenge points we need to deliver the best capa-
that we face as Service chiefs is not having bility for the dollar. JFQ: Regarding the integration across
a stable budget environment to plan and What are we doing about it? I give multiple domains and components—and
build the best Service we can. We need General [Mark] Welsh [20th Chief of Staff the Air Force’s role as the connective tissue
a budget that allows us to have money of the Air Force] a lot of credit for this. to make that happen—how do you view
in more than 1-year increments. We He and his team spent 2 years building this role for the Air Force? Why is it so
have experienced so many years of CRs a strategic plan with the Air Force future important?

8  Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
General Goldfein: It starts with the fact that individual who can deny the enemy’s thinking about procuring all the apps in
that it is one of our five core missions, ability to do that same thing. He is going a way that is different from what we have
going back to 1947. Command and con- to win. done in the past, which is focusing all en-
trol is something that we do for the joint Looking through an obligation lens ergy on big programs, and lots of dollars.
force, as a member of the joint team. So, is why I believe that we, from a joint
first and foremost, I don’t look at this perspective, have to think through what
from a competitive lens; I look at this the future of multidomain is going to JFQ: You’re stating that in the past there
from an obligation lens. I think that we look like; it’s not a place. Anybody who were more pieces to the puzzle. You are now
have an obligation. I marry that idea with thinks about a “multidomain” as a bigger starting with a view of what the puzzle was
my experience as the CFACC [Combined CAOC with more screens is completely to begin with.
Forces Air Component Commander] missing the picture. It’s CONOP [con-
forward, and one of the lessons learned in cept of operations], and that CONOP is General Goldfein: That’s right.
that experience was this: I went into the about connecting a grid that senses the
job thinking that I’d spend most of my globe from six domains (I say six because
time just making sure I had the right kind I include the undersea as a domain). JFQ: To decide whether that fits or not.
of air with the right attributes over the When we think of the cyber domain,
ground force commander, understand we should start thinking about social General Goldfein: Yes. When I talk
the ground force commander’s scheme of media because we sense in these domains, about multidomain command and con-
maneuver and objectives, and just marry and then the question becomes how do trol, keep in mind that I’m looking at it
up and make sure we always had him we pull together all the sensing and turn from a network perspective. It’s actually
covered. it into decision-quality information? How cultural. It’s easy for an Airman to think
We did that, but to be honest with do we take pre-effects from those same about. An example I use when I talk
you, that’s not where I spent most of domains? It is sensing, effects, decision about family of systems is your typical
my time as a CFACC. I spent most of speed, and operational agility that are personnel recovery. What happens when
my time being the connective tissue for going to define the victors in future someone is injured in enemy territory,
the combatant commander and doing campaigns. a place where there is a contested envi-
regional command and control because ronment? Think about all the steps that
there was no parallel to the CAOC occur. This massive choreography that
[Combined Air Operations Center]. JFQ: I sense from what you just said that goes into place that is far beyond the
There was no parallel in any of the other your future vision is to disperse this as far HH-60. It goes from a radio call on a
components that brought the size of the down the command and control line as small handheld radio in the Hindu Kush.
various elements that I had on the floor you possible. Is that your vision? Similar to That call is bounced off an airborne layer
and on the staff. mission command? amplified into satellites over protected
My BCD [Battlefield Coordination or unprotected [communications] into
Detachment] was 60 soldiers. My SOF General Goldfein: Yes. Here’s how a command control headquarters, often
[special operations forces] element was I look at it. We walk around and look more than one. Then it is jumping into
rather robust. I had interagency coor- at pictures of airplanes on a wall. The chatrooms, determining information,
dination. Space and the Navy were our 20th-century approach would be to pulling up data on the individual, and de-
connective tissue to the maritime [opera- procure a weapon system to replace that termining what kind of help is needed.
tions] center. It was the place where it all weapon system so that I can expand the While all that is happening, we are
came together, and where we actually ac- mission set and get to the next level of ca- moving ISR overhead. We are catalog-
complished multidomain, multimission, pability. By the way, eventually you have ing where the enemy is. We’re building
and regional command and control. to figure out how to connect it to a net- the ingress routes, the HH-60, and the
I looked at it through a lens to say work. That’s the 20th-century approach. pararescuemen are getting their work.
that this is an obligation for the Air Here’s the 21st-century approach: build We have moved airborne battle manager
Force, and as I look toward the future the network, and then build your apps. over the top. We are doing the airborne
of combat and conflict, I’m one who Some of your apps fly, some of them C2. We have a C-CAT [Critical Care Air
believes victories in combat—planned drive, some of them walk. Some of them Transport Team] that’s jumping onto a
combat—are going to go to those who are in low Earth orbit. Some of them C-17. They are already launching. Think
successfully can command their forces, are in GEO [geostationary Earth orbit]. about that. Air, land, sea, space, cyber, all
make decisions, and move forces, and If you think about it in that mindset, it domains, multidomain, multimission, all
create dilemmas from all domains simul- totally reverses where you focus. coming together to save one life. This is
taneously if required, with resilience, so Actually, it’s the network that gives actually natural for us.
if I’m taken out in one domain, I can us the ability to have that asymmetric
attack you in five others. It’s going to be advantage, and then it allows us to start

JFQ 85, 2nd Quarter 2017 Goldfein 9


B-52 Stratofortress during annual Cope North Exercise, February 22, 2011 (U.S. Air Force/Angelita M. Lawrence)

JFQ: Let’s discuss the retirement plans for Afghanistan into regional commands other areas. A-10s worked well when we
the A-10 and how that relates to your per- [RCs]: RC-East, RC-South, RC-West, had them at Kandahar. When I needed
spective of how close air support will look in RC-North. These commands had dif- to get something in RC-North, I needed
the future. Related to this is the F-35 and ferent terrains, different schemes and something that could get there and could
how you are trying to leave the A-10, at maneuver, and somewhat different ob- stay there for a while. That’s where B-1s
least to some extent, to be able to have per- jectives based on where the battle was at tended to park. And then in RC-West,
sonnel to support the F-35 mission. How do the time. Each ground force commander it was a different battle line. In the same
you see this playing out during your term? required coverage that brought different mission, there were four different plat-
attributes. So, again, my job was to look forms, each that brought the attributes
General Goldfein: First, I look forward at the family of systems and make sure the ground force commander wanted.
to a time where I’m not having as many that those attributes were overhead and
discussions about platforms, and I’m that the ground force commander was
actually having far more meaningful covered. JFQ: Given the expansion of domains to
discussions about mission, and how In RC-East, there was mountainous include land, sea, air, space, and cyber,
we accomplish that mission. We have terrain and generally the worst weather. what is the Air Force doing to make sure it
evolved to the point where there is no That was a place where I needed to have provides a total force capability across all
silver bullet in any of the domains, so it’s something that could get into the valleys these domains?
not the F-35, it’s not the A-10, it’s not and provide the precision fires that were
this or that. It is how these things come required, and when things went bad, General Goldfein: We already are en-
together. they went bad in a hurry. I needed to gaged in all of them. It goes back to the
Here’s the example I would use. As a have something that could get there “always there”— take a look at all the
CFACC, understanding the ground force quickly. So quite frankly, MQ-9s were a missions, whether deployed-in-place or
commander’s scheme and maneuver, great asset to place there. RC-South was deployed forward. You would be hard-
terrain challenges, battle lines, and what generally flat, with a lot of agriculture and pressed to find a mission that we’re not
he was trying to accomplish, we divided a lot of challenges around Kandahar and engaged in. It’s always a balancing act

10  Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
against a finite number of resources. We
must balance not only capability and
capacity but also force readiness to ensure
we are able to contribute to all those
mission areas.
You mentioned total force. One of
the great gifts of Mark Welsh is the fact
that we are truly one Air Force with three
components and five core missions. But
how do we reinforce that we truly are
one Air Force with three components?
You can’t tell us apart. Each component
brings unique attributes. Whether we
are looking at squadrons, or how we
develop joint leaders in the future, or
how we look at multidomain command
and control and the network approach
to warfare, we have to look through the
lens of one total force. When we place
talent in all mission areas, how do we get
the most return on our investment? The
story of the Air Force is this: As we have
gotten smaller over the years and made a
conscious decision to trade capacity and
readiness for capability and moderniza-
tion, there were mission areas that grew,
some of them exponentially, such as ISR.
Space has become a more contested
place. Cyber. Nukes. All these areas. The
budget numbers are coming down and
the missions are getting bigger, so how
do we pay that bill? We pay through some
of our key enabling support, infrastruc-
ture, people, and conventional airpower.
The problem is that we have gotten to
the point where we are far too big of an
Air Force for the resources that we have
been given, and far too small for what the
Nation and the joint force requires. In be-
tween those two bookends lives risk on the
backs of our Airmen. That’s why you’re
hearing me coming out to talk about the
fact that this Air Force needs to grow.
Senior Airman of 932nd Aeromedical Evacuation Squadron participates in Exercise Global Medic
2011, a joint field training exercise for theater aeromedical evacuation system and ground medical
components (DOD/Carolyn Erfe)
JFQ: I would like to hear you talk about
joint leadership and how that is built. have to go fix things. The words that we four. The Air Force is not building joint
How do we step beyond the three-star level chose in each of my focus series is im- leaders; they are evidence that we are
for jointness and leadership? How do we portant, strengthening joint leaders and building great joint leaders.
get an Airman to become a joint force teams. I’ll give you four names, and you The question for me is how do we
commander? can use this list to describe how the Air strengthen that? I believe the Airmen of
Force is doing just fine: Lori Robinson, the future are working to provide the
General Goldfein: I started off by tell- Paul Selva, John Hyten, and Darren voices in building a joint plan, so there
ing you I think we do a pretty good job McDew. I don’t think we could find ought to be an assumption that they
right now. Again, I’m not thinking we better leaders on the planet than those understand the operational integration

JFQ 85, 2nd Quarter 2017 Goldfein 11


Airmen assigned to 23rd Special Tactics Squadron at Hurlburt Field, Florida, use MH-47 Chinook to conduct overt and covert infiltration, exfiltration, air
assault, resupply and sling-load operations in wide range of environmental conditions (U.S. Air Force/Christopher Callaway)

of air, space, and cyber. We’re going and credibility because we understand I only know one thing with abso-
to do a complete scrub that goes from it. That goes to career path progression. lute clarity, and I believe I only have
entry level, for example, in the [Air How long are we staying within stove- one moral obligation as a chief. My
Force] Academy, ROTC, or BMT [Basic pipes versus migrating across the air, moral obligation is that I ought never
Military Training], through the life cycles space, and cyber domains and making to allow an Airman to be sent forward
of Airmen to look at where they are sure we understand it? How much time to do a mission in harm’s way without
and how are we exposing them to the do you have in a career to be able to get being properly organized, trained, and
operational art of air, space, and cyber. that kind of experience? We are going to equipped. That’s a moral obligation. The
I’ll be honest with you, the first time I look at all the curricula at the university, one area that I want to make sure that we
truly had to understand space—not be the Academy, and other places. stay focused on is our contribution as an
a user of space, but understand space air component as a member of the joint
as an Airman—was being the Space team for the joint force.
Coordinating Authority as the CFACC. JFQ: What have we not talked about that Then there are four elements to this.
That was a little bit late. The first time I you would like to talk about? There is an organizational element, a
truly had to understand the operational leader development element, a CONOPS
art, operations in the cyber domain, was General Goldfein: Perhaps it would be element, and a technological element.
a little bit late. Where I want to focus helpful if I give you a little perspective on The three focus areas actually cover those
on strengthening joint leaders in the Air why I picked the three areas I focused on four, so we have the organizational piece
Force is first and foremost that Airmen and how they tie together. There is actu- and the squadrons, leader development
are exposed to the operational art earlier ally a method behind the madness: When piece, as well as strengthening joint lead-
in their careers, earlier and more often. we connect the dots, and they actually ers and teams. CONOPS are associated
The expectation ought to be that equal joint warfighting excellence, that’s with the ECCT. How do we take the
when we sit down at the table, we can where I intend to stay focused for my sensing grid and combine it with the
speak air, space, and cyber with authority tenure as chief. effects grid and pull it together in the way

12  Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
we discussed? The technological aspect ops [operations] tempo, and if the answer
is really that whole piece of the network.
How do we change the mindset on
is, that is the steady state and it’s all I
have to be ready for, then yes, I can. I will
New from
where we focus with future acquisitions? continue to pull from stateside units, and NDU Press
I will continue to have readiness in those for the Center for the Study of
units that are not next to deploy, but I Chinese Military Affairs
JFQ: How do you feel the Air Force is can sustain that level of readiness. Strategic Forum 299
doing readiness-wise? But if you ask, are you prepared to China’s Future SSBN Command and
simultaneously provide two-thirds of Control Structure
General Goldfein: If you want to find the strategic deterrence and most of the by David C. Logan
high morale, go where we have high NC-3 [nuclear command, control, and China is de-
readiness. You want to go find low mo- communications], that is, do those things veloping its
rale? Look where we have low readiness. from a deployed-in-place that defend the first credible
The two are inextricably linked. We homeland, contribute to the 4+1, con- sea-based
generate high readiness forward—pretty tinue the fight against extremism as the nuclear forces.
high morale on the Korean Peninsula lead striking force in that operation, and This emer-
and pretty high morale in the Middle take on any other contingency, I will tell gent nuclear
East, relatively speaking. That’s where we you that we will be challenged. ballistic mis-
generate and send supervisory capability, sile submarine
parts, readiness. (SSBN) force will pose unique chal-
I will tell you that if pilots don’t fly, air JFQ: You have to start making serious lenges to a country that has favored
traffic controllers don’t control, air battle choices. tightly centralized control over
managers don’t manage, maintainers its nuclear deterrent. The choices
don’t maintain—if we can’t affect their General Goldfein: That’s right. That is China makes about SSBN command
quality of service where they feel like they why “ready for what and when” is such and control will have important
can be the most competitive they can be an important part of the dialogue, or you implications for strategic stability.
regarding career path and combat capa- end up with a partial answer to a partial China’s decisions about SSBN com-
bility—then there is not enough money question. mand and control will be mediated
in the Treasury to keep them in the Air by operational, bureaucratic, and
Force. When I look at all the things that political considerations. A hybrid
build readiness and I look at where we JFQ: Chief, thank you so very much for approach to command and control,
are as an Air Force right now, my num- your time. This has really been a pleasure. with authority divided between the
ber one focus is people. If I’m going to navy and the Rocket Force, would
generate the airpower the Nation requires General Goldfein: Thanks, yes, great be most conducive to supporting
and deserves, I have to have more people. seeing you. JFQ strategic stability.

JFQ: As we wrap up, one thing that may be


useful to discuss is your take on “ready for
what?”—not to overgeneralize readiness or
lack of readiness across the force.

General Goldfein: There are a lot of rea-


sons readiness is complex. For instance,
think about what I just talked about
in terms of readiness of the force that
deploys in place. How do we accurately
describe the readiness of the space force,
which is absolutely critical? How do we
describe the readiness of the cyber force
or the ISR force?
When I’m asked, what do you say to
readiness, I think you have to rephrase Visit the NDU Press Web site for
the question: “ready for what and when?” more information on publications
at ndupress.ndu.edu
If you were to ask, can you sustain that

JFQ 85, 2nd Quarter 2017 Goldfein 13


Survival, evasion, resistance, and escape
specialists wait before performing static line
jumps as door of C-130 Hercules, assigned to
Dobbins Air Reserve Base, Georgia, opens over
Nevada Test and Training Range, Nevada, March
11, 2016 (U.S. Air Force/Kevin Tanenbaum)
USS Toledo, assigned to
Commander, Task Force 54,
transits through Arabian
Gulf, January 21, 2016
(U.S. Navy/Torrey W. Lee)

Toward a Unified Metric of


Kinetic and Nonkinetic Actions
Meaning Fields and the Arc of Effects
By Bradley DeWees, Terry C. Pierce, Ervin J. Rokke, and Anthony Tingle

here is a critical need for new and space also demand a concept for

T thinking on how the United


States can better meet the full
spectrum of kinetic and nonkinetic
holistically assessing the reality of our
national security environment and the
effects of actions we take toward those
21st-century security challenges. Rev- ends. In short, we need a unified cogni-
olutionary changes in information tive approach for assessing and measur-
Captain Bradley DeWees, USAF, is a Doctoral
technologies, communications, and the ing kinetic and nonkinetic actions.
Student at Harvard University. Captain Terry C. composition of both nation-state and Recent work has suggested an incre-
Pierce, USN (Ret.), is the Director of the Center nonstate actors necessitate a change in mental movement from our traditional
of Innovation at the U.S. Air Force Academy.
Lieutenant General Ervin J. Rokke, USAF (Ret.),
our approach toward national security. focus on combined arms warfare toward
is Senior Scholar in the Center for Character Though emerging cyber capabilities combined effects power and has explicitly
and Leadership at the U.S. Air Force Academy. tend to dominate current defense dia- called for the crafting of desired effects
Lieutenant Colonel Anthony Tingle, USA, is the
Concepts Evaluation Branch Chief at U.S. Army
logues, technological advances in the by appropriate civil-military authorities
Space and Missile Defense Command. traditional domains of land, sea, air, at the tactical, operational, and strategic

16  Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
levels.1 This incremental shift in focus challenge of considering the enemy’s “meaning,” that emerges on the part
from traditional instruments of warfare perspective becomes exponentially more of the adversary is what we define as an
toward desired effects opens the door difficult when the existing environment is “effect.” When assessing or measuring
for a more holistic consideration of the altered, for example, through the intro- such effects, a major challenge exists
broad spectrum of security instruments, duction of a new domain such as cyber, with the more subjective, moral side of
both kinetic and nonkinetic and across with substantial nonkinetic as well as the arc of effects. Unlike the physical
all domains. The challenge we face now kinetic potential. effects of kinetic actions, which we
is how best to assess and measure effects, Dissonance, such as that forced by can usually measure with some preci-
particularly those of a subjective character a new domain, is common throughout sion, moral effects are defined by the
such as the adversaries’ morale, courage, military history. Just prior to the out- adversary and are thus more difficult
willingness to fight, and views of their break of World War I, Sir Arthur Conan to assess.
security environment. Doyle wrote a fictional account of the To meet this challenge, we offer a
In this article, we introduce two defeat of Great Britain by unrestricted metaphor from the discipline of quantum
constructs: the arc of effects, which submarine warfare. At the time, it was physics, which we call meaning fields.
describes the continuum of national se- farfetched to believe that Germany The idea of “fields” is an elementary
curity actions, and meaning fields, which would use submarines to sink merchant component of quantum physics. While
describe how our actions create different vessels and to logistically isolate Britain. early Newtonian physics focused on
adversarial effects. Concurrently, we fur- Because Doyle’s ideas did not conform to a body and the forces acting upon it,
ther develop the definition of effects. We the naval zeitgeist, they were summarily quantum physics explains the physical
believe that these concepts are the initial dismissed by the military establishment. world as the result of particles moving
stages to developing a cognitive path for Submarines were a radical and complex through and being connected by fields
achieving holistic, unified measurements technology designed to function in a new (for example, electromagnetic fields or
of kinetic and nonkinetic effects in all domain of warfare, and surface navies gravity), much like a blanket connecting
domains, including the increasingly im- were slow to understand the domain individual patches of cloth. One ubiqui-
portant cyber domain. below the sea, ignoring its potential tous field, the Higgs Field, is of particular
impact. Almost immediately at the onset significance because it imparts mass onto
The Arc of Effects of submarine warfare, countries became particles as they pass through it. The
Traditionally, our military has tended aware of the physical results (the loss of more substantial the particle, the more
to measure effects in the natural shipping) but were less timely in appre- mass the Higgs Field imparts upon it.
domains (land, sea, air, and space) ciating its potential effects on the moral Because it imparts mass, the Higgs Field
in terms of physical outcomes, with forces end of the spectrum (uncertainty allows particles to join together, forming
the focus on linear measurement of and terror).4 the foundation on which the rest of the
destruction caused by kinetic instru- The submarine example is analogous universe is built.
ments of power. An emphasis on the to the rising contemporary challenge of We liken the Higgs Field to mean-
physical domains has led us to neglect nonkinetic effects. We are both reluctant ing fields, which we assert surround
an important characteristic of warfare. and unable to define or fully understand all actors in the international security
Actions during conflict exist on a the extent of these effects because we arena, be they individuals, organizations,
continuum, ranging from the purely have traditionally emphasized the physical subnational groups, or nation-states.6 A
physical to what Carl von Clausewitz end of the arc of effects. This deficiency major difference, however, between our
termed “moral forces.” These moral also limits our government’s capacity for metaphorical fields and the Higgs Field
forces encompass more ephemeral devising an effective deterrent to the full is that there are many meaning fields,
factors such as motivation, will, spirit range of security threats and allows our with every actor—from individuals to
of sacrifice, patriotism, and courage.2 opponents greater freedom of maneuver. nation-states—possessing its own. Such
We present a construct—the arc of In short, we need a tool for navigating meaning fields are a representation of
effects—for better understanding and the arc of effects that enables us to how actors bestow meaning on actions of
referencing physical and moral effects. identify and assess the full spectrum of the external world and are constructed,
While the physical results of kinetic physical and moral forces. inter alia, of human nature, culture,
operations are relatively well understood education, historical experiences, and
and can be measured with some precision Meaning Fields circumstance. In the same way that the
(even when considering second- and Clausewitz insisted that to be victo- Higgs Field imparts mass to an object
third-order effects),3 effects toward the rious, we must convince our enemies moving through it, meaning fields impart
moral end of the arc are more difficult to that they are defeated.5 Victory requires meaning on security-related actions or
measure because they require a degree that our adversaries perceive the totality lack thereof.7 Actions that do not inter-
of “military empathy,” or the ability to of our actions that create an unaccept- sect our adversaries’ meaning fields (that
consider the enemy’s perspective. The able environment. This perception, or is, that go unnoticed by the target actor)

JFQ 85, 2nd Quarter 2017 DeWees et al.  17


Sailor assigned to USS Mahan talks to sonar technicians about attack options during anti-submarine warfare training in Arabian Sea, January 17, 2017
(U.S. Navy/Tim Comerford)

are imparted no meaning and are irrel- for assessing the effect of inaction. It the less complicated metrics associated
evant. In short, the result of interaction draws attention to how actors other than with the physical side of the arc of ef-
with a meaning field is what we define as ourselves see the world, including the fects. While these kinetic effects can be
an effect. proposition that inaction can have just measured with relative precision and
We believe that the meaning field as much of an effect as action. Third, circumvent the challenge of additional
concept can provide a cognitive pathway the construct provides a pathway for analysis, it is perilous for countries to ne-
to better understand the full spectrum measuring follow-on (second-, third-, glect their adversaries’ meaning fields.
of the arc of effects and is useful for mil- fourth-order) effects.8
itary planners to assess how opponents Despite these advantages, the mean- Tactical- and Operational-
impart meaning to external actions. The ing field concept is also a humbling tool. Level Model Application:
meaning field construct attracts the right It complicates the security picture by The Fall of Singapore
kind of questions, including thoughts on exponentially increasing the number One of the most devastating defeats in
which meaning fields are most relevant. of variables military policymakers must the history of the British military had
Unlike measures of effects that focus consider. It also makes apparent the its roots in the moral region of the arc
primarily on attrition and destruction, uncomfortable reality that when we take of effects. On December 7, 1941, as
the meaning field concept is more likely actions to achieve desired effects, our the Japanese surprised the Americans
to accommodate effects on the moral own meaning fields are often irrelevant at Pearl Harbor, they simultaneously
side of the arc because it more explicitly to our opponents.9 Thus, to be effective attacked the British Empire on the
addresses the Clausewitzian emphasis on managers of effects, our focus must be on islands of Singapore, leading to what
how the enemy understands our actions. our opponent’s meaning fields. Without would become a painful embarrass-
A second advantage of the meaning understanding an adversary’s meaning ment and costly strategic setback for
field construct is that it offers a means field, the default instinct is to focus on the British.10 Although outnumbered

18  Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
Sailor assigned to Blue crew of ballistic missile submarine USS Maine receives her submarine warfare officer device at Naval Base Kitsap-Bangor,
Washington, December 5, 2012 (U.S. Navy/Ahron Arendes)

almost three-to-one, the Japanese were especially heavy forces, and that those The final Japanese victory over the
victorious against what was widely con- forces were most effective in open terrain. main island of Singapore was as remark-
sidered a vastly superior force in large The Japanese upended the British able as their initial 600-mile march to
measure because of their superior ability meaning field. Led by General Tomouki capture Malaya in just 54 days. With a
to assess and understand the meaning Yamashita, the Japanese amphibious recklessly low ratio of attackers to de-
field of their British opponent. assault occurred near the northern border fenders, and with supplies and morale
The defenses on the main island of of Malaya, well outside the influence of running low on both sides, Yamashita
Singapore were considered a crowning British forces.11 Aware of the advantages pressed the assault. In a last-ditch effort
achievement of the British Empire in the of blitzkrieg tactics, Yamashita focused to force British capitulation, Yamashita
Far East. At the time, the fortress con- on speed of maneuver. His relatively light ordered a massive artillery shelling of the
tained the largest fixed-position cannon forces blazed through the jungle, using city (expending the last of his stores) to
in the world. These guns, like most of bicycles, fixing partially destroyed bridges feign unlimited resources. Additionally,
the defenses on the island, were initially at night, and viciously giving no quarter, with a view toward the moral forces end
positioned to defend from a southerly sea as prisoners slowed their advance. With of the arc of effects, Yamashita attacked
attack. The British discounted a Japanese the preponderance of the British air the city’s water supplies instead of the
attack from the Malaysian Peninsula, as component being destroyed early in the British-defended city proper. With dead
any amphibious landing within proximity assault, the Japanese were able to press bodies accumulating in the streets and
of the main island would be slowed by across the peninsula relatively unim- facing the prospect of dying of thirst, the
the dense jungle and could be interdicted peded, overrunning the British, taking British surrendered.
by overwhelming land forces. The British valuable airfields, and reinforcing a cycle Superior Japanese understanding
meaning field assumed that strength was of rapid Japanese success. of the British meaning field, as well as
measured in the metric of total forces, audacity and determination, led to the

JFQ 85, 2nd Quarter 2017 DeWees et al.  19


Sea Hunter is part of DARPA’s Anti-Submarine Warfare Continuous Trail Unmanned Vessel program, in conjunction with ONR (U.S. Navy/John F. Williams)

fall of Singapore. The Japanese asked while maintaining hostilities below of hybrid warfare and gray-zone conflict?
not how to defeat the British forces, but the threshold of conventional war. In Clearly the Russia-Ukraine conflict brings
how to sap the British will to fight. We this section, we examine the problem a change in the technological character of
argue that modeling meaning fields in of Russia’s gray-zone warfare in the war. A lack of understanding nonkinetics
the planning process could prompt our context of both the arc of effects and and cyber operations prevents our senior
forces to ask the same questions. For the meaning fields. policymakers from articulating actionable
British, their failure could have been pre- Russia’s actions against Ukraine, often desired effects and deterring gray-zone
vented by constructing a meaning field of referred to as hybrid or new-generation type incursions.
the Japanese view of Malaya, a view that warfare, encompass both the physical Successful gray-zone operations rely
focused on more than the physical side of and moral components of the arc of heavily on ambiguity and the adversary’s
the arc of effects. effects. The physical forces component resulting inaction. In the absence of strict
of Russia’s strategy includes conventional international policies and laws regard-
Strategic-Level Model strikes, train and equip operations, and ing hybrid warfare actions, aggressors
Application: Russia’s Spetsnaz incursions, while nonkinetic el- operate with relative impunity.14 While
Gray-Zone Warfare ements include information warfare with Ukraine is not a member of the North
While the example of Singapore rep- distributed and focused cyberattacks.12 Atlantic Treaty Organization (NATO)
resents a tactical and operational appli- When considering hybrid warfare strate- and is not privy to protections under
cation of the meaning field construct, gies, we are forced to consider the entire Article 5, Russia’s invasion clearly violates
the model is also valuable in analyzing arc of effects and the resulting synergies international norms against annexation.
both kinetic and nonkinetic strate- of simultaneously employing kinetic and Decisionmakers in gray-zone situations
gic-level effects. Russia’s actions in nonkinetic means. are often unable to articulate and uphold
Ukraine represent what is often referred The underpinning concepts behind diplomatic “red lines.” To counteract
to as “gray-zone” warfare, or the hybrid warfare are not new. At its core, gray-zone warfare, the need to under-
aggressive application of asymmetric hybrid warfare is simply a combination stand the adversaries’ meaning fields
and conventional techniques (including of asymmetric and regular warfare—the becomes paramount.
diplomatic, informational, military, existence of which has been present So it is that the meaning field con-
economic, and other political forces) throughout history.13 So what is the basis struct provides a cognitive path for
designed to achieve political goals for our current fervor over the dangers dealing with security problems such as

20  Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
hybrid warfare. Throughout this article mistake because it is convenient to think ish Empire through direct attacks that entirely
evaded the might of the British surface fleet.”
we have portrayed our adversary’s mean- in terms of physical forces rather than in 5
Clausewitz.
ing field as at least as important as our terms of how the enemy sees the world. 6
The authors credit Lieutenant Colo-
own. Regarding Russia, it appears that The meaning field concept provides nel Mario Serna, USAF, for his assistance in
Vladimir Putin’s meaning field was not a cognitive path for moving our focus translating the Higgs Field metaphor into the
considered adequately when deciding toward the mind of possible adversaries meaning field. Also see Sean Carroll, California
Institute of Technology, “The Higgs Boson and
to expand NATO. And now the West’s in the interconnected world of national
Beyond,” The Great Courses, 2015.
inaction toward Russia’s aggression security. The notion that military leaders 7
Meaning fields can also impart meaning
into Ukraine is presenting itself as a should focus on the mind of the enemy upon inaction. For inaction to be considered
particle through Putin’s meaning field. is not new; it was the basis of Sun Tzu’s significant vis-à-vis meaning fields, we must
By understanding our behavior in terms Art of War. But more than two millennia consider two factors: expectation of action and
time. An adversary must expect some action
of meaning fields, we are better able to after Sun Tzu, we still lack a means to ef-
(which is never taken), and the appropriate
articulate our desired effects and produce fectively incorporate his advice directly to amount of time must pass. An example of
viable counters to hybrid warfare actions. measuring effects. We continue to define significant inaction in this context is the relative
In sum, the meaning field con- effects based largely on our own intuition U.S. inaction in the face of Syria’s use of
struct can focus our efforts to counter rather than in terms of how the enemy chemical weapons in 2013, and the meaning
that the Bashar al-Asad regime imparted to this
gray-zone conflicts. While the U.S. sees the world. We see the meaning fields
inaction.
Government has the means to oppose concept as a helpful point of reference in 8
For every action, there are consequent
these types of hybrid threats, economy the doctrinal process for reorienting mili- actions and effects. Each initial action passes
of force and the threat of escalation are tary leaders to the mind of the enemy. through all meaning fields, producing effects.
underlying concerns. Possible solutions If we seek to defeat our adversaries, Each one of these effects then passes through
all meaning fields, producing another effect
to hybrid warfare include train and equip we must first perceive their meaning
(a second-order effect). This cycle is repeated,
(proxy) operations, special operations fields. Doing so would increase the with each order effect being influenced by the
forces, massive nonkinetic retaliation, and probability that we will think like the relevant meaning fields. If the military planner
conventional strikes. Any combination of enemy (minimizing the “mirror imaging” is cognizant that all actors have unique mean-
these options, including our own hybrid problem) and a greater probability of ing fields, then once the initial meaning field
is considered, it becomes easier to accurately
warfare, is a possibility.15 By predicting achieving desired effects. Moreover, this
comprehend and possibly predict second-,
our adversary’s response to our actions concept allows us to consider multiple, third-, fourth-, and fifth-order effects. This
using the meaning field theory, it is possi- increasingly complex and interconnected visualization is the first step in understanding
ble to achieve our desired effects through adversaries who strive to operate beyond ordered effects of our actions.
the most economical and politically palat- the second and third orders of effects. By
9
When considering the desired effects of
our actions, the opponent’s perception of our
able means available. understanding meaning fields, we access
meaning field is often irrelevant. Simply put,
the entire span of the arc of effects, creat- our adversaries are often equally negligent
Conclusion ing a definition of “effects” that unites all when considering meaning fields.
The British strategy for the defense of possible domains of warfare. JFQ 10
Due to the International Date Line
Singapore reflected their own meaning disparity, this was the date of the event in the
United States. The actual date in Singapore
field, which the Japanese correctly per- was December 8, 1941. The Japanese initially
ceived was predicated on a traditional Notes attacked the islands by air.
force-on-force strategy. However, this 11
These forces constituted a coalition from
is not how the Japanese perceived the
1
See Ervin J. Rokke, Thomas A. Dro- across the British Empire, including British,
han, and Terry C. Pierce, “Combined Effects Australian, and Indian troops.
operational environment. They viewed Power,” Joint Force Quarterly 73 (2nd Quarter 12
Patrick Duggan, “Strategic Development
the terrain, defenses, and the entire 2014); and James G. Stavridis, Ervin J. Rokke, of Special Warfare in Cyberspace,” Joint Force
island system in terms of how it would and Terry C. Pierce, “Crafting and Managing Quarterly 79 (4th Quarter 2015).
affect the British will to fight. Similarly, Effects: The Evolution of the Profession of 13
For a historical perspective on the exis-
the United States and our allies are slow Arms,” Joint Force Quarterly 81 (2nd Quarter tence of hybrid wars, see Frank G. Hoffman,
2016). “Hybrid Warfare and Challenges,” Joint Force
to consider our actions in regard to 2
Carl von Clausewitz, On War, ed. and Quarterly 52 (1st Quarter 2009).
Russia’s meaning field. trans. Michael Howard and Peter Paret (Prince- 14
See U.S. Special Operations Command,
We need to apply the meaning field ton: Princeton University Press, 1989), 97. “The Gray Zone,” September 9, 2015.
concept across all domains. The growth 3
When focusing only on physical results, 15
Joseph Votel et al. suggest that the most
of cyber is just one example of a techno- the follow-on effects are relatively simpler to effective counter to hybrid warfare is hybrid
discern than nonkinetic (moral forces) results. warfare. See Joseph Votel et al., “Unconven-
logical advance that spans the physical 4
According to Michael L. Hadley in Count tional Warfare in the Gray Zone,” Joint Force
and moral side of the arc of effects. Not the Dead: The Popular Image of the German Quarterly 80 (1st Quarter 2016).
The risk we run with this technological Submarine (Montreal: McGill-Queen’s Uni-
advance is forcing it into the physical versity Press, 1995), 14: “The submarines had
side of the arc of effects. We make this done so by isolating the vital centre of the Brit-

JFQ 85, 2nd Quarter 2017 DeWees et al.  21


As part of Internet of Things display, booth of
Deutsche Telekom at CeBit 2015 shows moving
arms of robots holding magenta umbrellas,
March 16, 2015 (Courtesy Mummelgrummel)

Information Warfare work computer, home monitoring


system, car, Internet television, printer,
scanner, maps, and, if you are really
tech savvy, maybe your coffee pot or

in an Information Age refrigerator.


The Internet of Things (IoT) is
bound by a mesh network that is increas-
By William R. Gery, SeYoung Lee, and Jacob Ninas ingly connected to every part of our lives,
and those devices are becoming increas-
ingly reliant on each other to perform
their functions.1 Computing devices,
n the past week, how many devices number is upward of 10 to 15, and

I have you used that were connected


to the Internet or relied on an algo-
rithm to accomplish a task? Likely, the
most of those devices are used daily,
if not hourly. Examples may include a
Fit-Bit, cell phone, personal computer,
using advanced algorithms, are entering
the machine-learning phase, a subset of
computer science in which the computer
is “learning” about the environment and
presenting predictions based on available
data and conditions.2 Trends include
Major William R. Gery, USAF, is Program Manager for the U.S. Air Force Weapon System Evaluation machine-autonomy and self-learning. The
Program at Air Combat Command. Major SeYoung Lee, Republic of Korea (ROK) Army, is a Student in
the Military History Institution of ROK Army Headquarters. Lieutenant Colonel Jacob Ninas, USA, is a
idea of interconnectivity is not only about
Branch Chief in the 704th Military Intelligence Brigade. the IoT but also the information that

22  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
transits the Internet, and how it influences of this model. The Department of •• The United Kingdom reports 120,000
our daily decisions. The trend toward State coordinates the diplomatic role, cyber incidents a day. That is almost
a worldwide mesh-network is nearing, Department of Defense the military as many as the state of Michigan deals
and with the creation of an information role, and Department of Treasury the with.
technology (IT)-based domain comes in- economic role. Twenty-first-century •• Utah says it faces 20 million attempts
creased understanding of the environment challenges presented by the IoT require a day—up from 1 million a day 2
in which we live. There appears to be no a more innovative organization that years ago.8
deviation from Moore’s law, developed in promotes adaptability and agility in the
To meet the challenge that exists
1965, and popularized and demonstrated information space, akin to models used at
in the information age, organizational
since its inception. If Moore’s law contin- Google, Facebook, or Apple.
changes are required. Modern ideas and
ues to be upheld in the future, more apps, Winn Schwartau, author of
incorporating industry concepts may
algorithms, and daily functions will link Information Warfare and recognized
be one way to traverse the information
together each part of our lives, providing IW theorist, describes the information
space and create an advantage in future
increased processing capability and a age as “computers everywhere.”3 The
conflicts.
limitless stream of information creating ultimate fact of the information age is
Within the IoT, actions take place
maximum efficiency for humans. the proliferation of IT, which “incorpo-
in nanoseconds and occur billions of
The Westphalian design of society rates information systems and resources
times daily. Big data concepts attempt
and order contributes to the human need (hardware, software, and wetware) used
to harness massive amounts of infor-
to work within a set of logical models, by military and civilian decisionmakers
mation and distill that information into
whereas the principle of international law to send, receive, control, and manipulate
something that a human can use to make
and orderly division of nations enables information necessary to enable 21st-cen-
a decision. In the near future, the infor-
sovereignty over territory and domestic tury decisionmaking.”4 Additionally,
mation required to win the advantage
affairs. It is possible that globalization, the development of IT allows sharing of
over an enemy may be determined by
which would be nearly impossible information in near real time, at an expo-
who can extract data, identify key centers
without a relatively high transfer rate of nential rate, anonymously and securely.
of gravity in the information space, and
information, will play a critical role and These advances can be used as an asset,
automatically take action though rule sets
may challenge global order. Assuming but also pose a potential vulnerability
and computational criteria based on de-
an information advantage is required to to the United States, our allies, and our
fined “rules of engagement.” The ability
achieve nation-state and military objec- adversaries.5 It takes seconds to upload
to harness big data exists now and is only
tives, and information superiority is not pictures or comments on social media
increasing. Consumer product companies
guaranteed because of the complex IoT, networks. At the same time, adversaries
are mining Facebook, Google, and other
how does the U.S. Government present can use these systems to gain access
data to understand customer prefer-
effective and integrated information war- to critical information. According to a
ences, global trends, and public opinion
fare capability (IW) in the information New York Times article, “In July 2015,
on matters of interest. From a military
age? Moreover, if wars are fought in the 21.5 million people were swept up in a
standpoint, understanding the informa-
information space, can they be won with colossal breach of government computer
tion terrain in relation to the potential
information alone? In other words, can systems that was far more damaging than
adversaries is foundational to discerning
information warfare provide the ways and initially thought, resulting in the theft
points for information operations (IO)
means to fight wars, as well as the ends? of a vast trove of personal information,
across the range of military operations.
Also, does the U.S. Government need to including social security numbers and
Big data concepts used in business could
invest in an organization responsible for some fingerprints.”6 The following list
be advantageous and used in information
the coordination and integration of IW provides a general summary of the num-
warfare. It is possible that data-mining
capabilities and effects? ber of times systems have been attacked
and subsequently an information ad-
To increase the U.S. Government’s via cyber.7 The number of attacks on
vantage could achieve objectives purely
capability and capacity, a new organiza- information systems has increased each
through IW alone.
tion should be created within the U.S. year, reinforcing the fact that warfare is
The United States has used various
Government to focus on information currently being conducted in the infor-
IW strategies, agencies, and professionals,
warfare, with a fundamentally different mation space via IT.
with varying degrees of success. The U.S.
organizational structure than our current
•• The Pentagon reports getting 10 Information Agency (USIA) was created
governmental hierarchical structures.
million attempts a day. in 1953 and was in service until 1999.
Specifically, the U.S. Government sub-
•• The National Nuclear Security USIA was designed to consolidate all
scribes to the diplomatic, information,
Administration, an arm of the Energy information activities:
military, and economic (DIME) model
Department, also records 10 million
but does not have an organization de-
hacks a day.
signed to lead the information functions

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  23


[USIA] comprised all of the foreign infor- subdue the enemy without fighting is the The ability to operate in relative se-
mation activities formerly carried out by acme of skill.”13 In another example, the crecy also allowed Russia to successfully
the Department of State’s International Russian operations in Crimea provide a mask its true desired endstate. By doing
Information Administration (IIA) and modern case study where the outcome of so, it allowed for almost any action to
Technical Cooperation Administration, operations was directly attributed to IW potentially be considered a successful
and by the Mutual Security Agency. principles and capability. mission to enemies and outside observ-
Overseas, existing United States ers, due to a lack of understanding of
Information Service posts became the field Information Warfare: The Russian intentions. This also allowed for
operations offices of the new agency. The Russian Invasion of Crimea unchallenged Russian saber rattling and
exchange of persons program conducted The Russian incursion into eastern threats against the North Atlantic Treaty
by IIA remained in the Department of Ukraine, and eventual annexation of Organization and the West as Russia at-
State, but USIA administered the program Crimea in 2014, serves as the current tempted to paint Western Europe and the
overseas. The Department of State provided model of a sustained IW campaign and United States as weak, especially in the
foreign policy guidance.9 provides examples of successes and eyes of developing nations. In addition to
failures in these efforts. Russian IW, actions on the ground in Ukraine, Russia
Historically, information warfare was known as Reflexive Control, has its integrated and utilized television, print
identified as critical to national security, origins in Soviet doctrine and serves media, and social media to deflect and
and USIA was required to erode support as a key component in their hybrid hide its efforts at occupation and annex-
for the Soviet Union during the Cold warfare operations.14 Reflexive Control ation while reducing potential Western
War.10 Today, we usually consider IW “relies . . . on Russia’s ability to take involvement.16 The successful use of IW
as the means, or sometimes a way, to advantage of preexisting dispositions allowed Russian forces to occupy eastern
achieve an objective. But currently we among its enemies to choose its pre- Ukraine and annex Crimea without a
rarely think of IW as an end, even though ferred courses of action.”15 During large-scale response from the West.
we live in an information age where we operations in Ukraine, Russia’s primary As the world continues to move into
are all affected by the information envi- impediments included Western Euro- the information age, the ability of na-
ronment every day. Brian Nichiporuk, the pean powers and the United States. tion-state and nonstate actors to employ
author of “U.S. Military Opportunities,” Russia took multiple actions to seize successful IO tactics into their overall
discusses IW concepts and postulates: the advantage of preexisting dispo- strategy will undoubtedly increase. To
sitions among its enemies in order successfully deter and respond to these
The goals of an offensive information-war- to conduct successful operations in threats, the United States must innovate
fare campaign are to deny, corrupt, Ukraine and, at the same time, avoid a and develop organizations with expertise
degrade, or destroy the enemy’s sources of large-scale confrontation with the West. in both preventing and conducting such
information on the battlefield. Doing so As part of Reflexive Control, Russia actions.
successfully, while maintaining the oper- utilized a well-coordinated deni- Russia’s IW campaign in Ukraine
ational security of your own information al-and-deception plan, called maskirovka, enabled it to achieve the objective of
sources, is the key to achieving “information through the use of “little green men” annexing Crimea, but it was not a flaw-
superiority”—that is, the ability to see the to establish checkpoints and secure key less strategy. One flaw was the effort
battlefield while your opponent cannot.11 terrain in Ukraine. These little green that Russian leaders took to deny the
men operated with speed and efficiency, existence of troops in Ukraine. Even
In current and future warfare, infor- and wore no identifying patches or unit after undeniable proof, including geo-
mation superiority could be the single insignia. This lack of identification al- tagged photographs on social media and
most decisive factor. For instance, we lowed Russia to deny any association with captured Russian troops inside Ukrainian
could think about the China-Taiwan these forces, which were later acknowl- territory, Russian President Vladimir
scenario. China is employing a robust edged as Russian troops. By controlling Putin continued to deny involvement.
IW strategy targeting the Taiwanese gov- information and being able to deny its These excessive and continual denials
ernment in order to bring Taiwan under involvement in the occupation of Ukraine served only to discredit Russian lead-
Chinese control, without engaging in ki- during the early stages of the conflict, ers and provide additional reason to
netic war. They are simultaneously using Russia was viewed as an interested party believe that Russian forces were in fact
information operations to delay U.S. in- by the international community—as operating inside Ukraine.17 In addition,
volvement to the point where any outside opposed to a belligerent. This fed directly the lack of an overwhelming campaign
interdiction occurs too late to affect the into Russia’s view that Western Europe of offensive cyber actions brings into
outcome.12 This concept is fully realized and the United States did not desire a question the overarching hybrid warfare
by a dedicated focus on IW strategy, or- direct conflict and would not press the campaign. Russia is arguably one of the
ganization, and capabilities. This could be issue of Russian involvement, even if most capable nation-state cyber actors.18
analyzed best by Sun Tzu’s strategy: “To discovered. The lack of a comprehensive offensive

24  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
Deputy Secretary of Defense Robert Work and Vice Chairman of the Joint Chiefs of Staff General Paul Selva meet with Commander of U.S. Pacific Command,
Admiral Harry Harris, to discuss Third Offset Strategy and its implications for Indo-Asia-Pacific region, October 18, 2016, Camp H.M. Smith, Hawaii
(U.S. Navy/Jay M. Chu)

cyber campaign, such as that observed of potential adversaries, understand their current planning process and traditional
in Estonia in 2007 and Georgia in 2008, lessons learned, and use them to our planning structure provide the formal
raises questions about Russian IW and advantage, the U.S. Government must links between national strategy and
Reflexive Control strategy. While this ensure that the current organization of the tactical level, they do not prescribe
may indicate a desire not to aggravate IW capabilities and strategic planning en- a way in which to gain the informa-
potential adversaries, it may also indicate ables an integrated and cohesive National tion advantage in future conflicts.
Russia’s inability to control all aspects of Security Strategy. Arguably, from a national perspective,
its offensive cyber actions such that it was an information strategy should drive
concerned that actions could produce Strategic Planning Guidance subsequent actions and be integrated
large-scale unintended consequences.19 to Tactical Execution? from the President to the individual
These consequences may have resulted In the joint planning process, IO plan- Servicemember. The information strat-
in the Russians’ inability to deny their in- ning is typically a supporting effort. If egy should be integrated with strategic
volvement, or brought powerful enemies we prescribe to the idea that all wars communications efforts of the U.S.
into the conflict. As discussed, the flaws are fought on the cognitive plane, at Government. However, as noted in the
noted in Reflexive Control doctrine serve least at some point, then it is logical to 2008 report from the Defense Science
as examples of how difficult it is currently, assume that, at one point or another, Board, “Strategic Communications is
and will be in the future, to control IW courses of action (COAs) should a dynamic process with responsibility
the consequences of offensive actions be the supported effort. Moreover, held by those at the highest levels of
and conduct information warfare in an “information operations support government—the President and senior
information age. In an effort to better themes” are sometimes developed after government leaders. . . . But to do so
understand the capabilities and intentions military kinetic COAs are.20 While the requires a commitment not yet seen,

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  25


Routers and switches inside Google’s campus network room at Council Bluffs, Iowa, allow data centers to talk to one another, with fiber-optic networks
that run at speeds more than 200,000 times faster than typical home Internet connections (Photo courtesy Google Inc.)

though some steps have been taken.”21 to present ends that may be achieved Government shut down Internet Service
In fact, the report recommends the cre- through information warfare. Planners Providers (ISPs) (that is, the target) that
ation of a nonprofit, nonpartisan Center must articulate why a specific action is ISIL is using? Does the government con-
for Global Engagement as a focal point being taken and when it should occur duct a distributed denial-of-service attack
for strategic communication activities. based on commander’s intent, the oper- against certain Web sites? Does it put
In 2010, Joseph Biden provided the ational environment, and the operational influential messages onto ISIL message
President a report on strategic commu- approach designed to solve the problem. boards on the Internet? All options are
nications that urged synchronization Decades of trial and error in warfare have plausible, but many times are not exe-
and defined the overall concept.22 An led to institutional doctrine and rule sets. cuted due to lengthy and unsynchronized
interagency policy committee, led by While there is an argument that these plans. The lack of leadership and a focal
the National Security staff, was a recom- rules should be applied to both kinetic point in the U.S. Government who can
mended solution; however, a committee and nonkinetic effects, it is important to articulate the second- and third-order
is made up of individuals with allegiances realize that there are certain unique fac- effects of information operations often
to their own organization and likely with tors associated with both. For example, contributes to a lack of action. The ability
other responsibilities, not fully being targeting fundamentals are largely agreed to understand how the information space
dedicated to integrated strategic com- upon and accepted for offensive force-on- will be influenced by the outcome of a
munications. The little IW capability that force operations, but do the theories of U.S. action is not effective because there
exists is based on the current and legacy targeting need to adjust for information is no lead organization.
organizational structure, which hinders warfare? In addition to the tactical-level
effective IO planning and execution. Some argue that the center of gravity information effects, how are strategic
If information space can be consid- (COG) for the Islamic State of Iraq communications vetted and targeted?
ered a way and means to fight and win and the Levant (ISIL) is the Internet. Do the processes differ or are they the
wars, then a framework is required to If we accept this idea, how does the same? If the view of this process were to
assist in prioritization and planning and United States target ISIL? Does the U.S. change, and targeting were to become a

26  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
process within which information targets security apparatus? Furthermore, what members to develop solutions unabated
are held at risk (for example, the ISP organization is responsible for providing by personnel unfamiliar with the tech-
example or building a strategic weapon to information operation COAs for the nical situation. The concept capitalizes
deter an enemy), then it is possible that President, specifically designed as an end? on meritocracy-based principles and
realistic options could be presented to a The contrarian viewpoint to the focuses on a federated approach as well
combatant commander in a crisis action idea of driving development down to as crowd-sourcing solutions internally to
scenario. To execute a concept where the the operator level (that is, the Soldier) the military, or even in the public sector,
United States holds information targets is that authorities do not come with to arrive at solutions. Within the U.S.
at risk, it must have access to the target. capability. This is true. A tactical-level Government, it is unlikely that a lattice
Access for information-related effects unit should not have authority to execute organization would be wholly integrated;
delivered through the information space operations in the information space, just however, a hybrid concept that captures
is no different than for physical effects as the Soldier with the rifle would not the value of a legal and hierarchical
delivered by airplanes or ships. The fire without orders. There should be a framework along with realizing the po-
delivery method could be news, a cyber strategy with clear and precise guidance tential benefit of a lattice organization
capability, a military action, or even a for operational and tactical targeting. would be valuable, as globalization and
comment by the President. The path to This does not require “execution author- IT increasingly integrate our world.
employ information-related capabilities ities,” but it does require guidance from Additionally, a lattice framework would
(IRCs) requires access from the sender to national-level leadership on the issue. In more closely align conceptually with the
the receiver, and that targeting path must other words, because technical acumen is mass-network IT environment in which
be sustainable. Without sustained access, required, the U.S. Government cannot we live. Ideas presented in the corporate
a target cannot be held at risk because afford to have a disjointed IW strategy world are potential solutions that can
gaining access to the receiver could take in which progress is slowed due to an be used or modified for complicated IW
an extended amount of time, with rela- overly complicated and bureaucratic concepts within the U.S. Government. In
tion to the operation. hierarchical structure. A lack of unity of a thought piece from business, Cathleen
Additionally, the capability must be effort results, and risk to mission and risk Benko and Molly Anderson from Forbes
attainable. Software development can be to force increase. Developers, operators, magazine highlight a few key benefits of a
a potential strategic advantage. Driving and analysts need flexibility and agility to lattice organizational structure:
education and training for software solve problems quickly with innovative
development down to the tactical level technology and an understanding of the With employees working in geographically
empowers young Servicemembers to information age, just as a Soldier does dispersed teams, the old ways of commu-
create capabilities linked to the target, when in battle. nicating [are] no longer served. Lattice
reduce cost, and create efficiencies. For ways to participate moved the organization
example, a Soldier is taught how to use Is the World Organizationally toward more interactive, transparent com-
a rifle, the foundations are built in train- Changing? munication. In one instance, the finance
ing, and he is able to utilize the weapon Military organizations have generally division gave a role traditionally reserved
through the employment of various followed hierarchical models as early as for management—identifying improve-
tactics, techniques, and procedures on the the Greeks in 400 BCE for organizing ment priorities—to employees, by launching
battlefield as the situation dictates. If the and equipping. It is possible that global a “pain points” portal where they can voice
situation changes, he adjusts to the enemy IT trends will require a foundationally their views of current challenges for every-
in an instant. From an IW perspective, different way of thinking and organizing one to see. The company appoints teams to
software is but one tool, as is the rifle. IRCs in the U.S. Government to main- address the highest priorities.
Foundations are built, skills are honed, tain pace with the speed of information.
but it is left to the tactical level to ensure Largely, from the time of the Greeks to At Deloitte, our annual employee survey
the capability is “tuned” to the target that of the current U.S. Government, shows that 90% of workers who experience
because the tactical-level operator should militaries have been designed around all three lattice ways are engaged. Contrast
have the most accurate knowledge of that a hierarchical system. As IW becomes that with the results of a major global
target. Additionally, as accesses change, increasingly more important during workforce study by Towers Perrin in 2007–
the tactical and operational level should the conduct of government or military 2008 that found just over 60% of employees
ensure consistent and reliable access operations, a lattice framework and in surveyed companies were engaged.23
to the target. Indeed, the Soldier does system may be a logical way to organize
not develop the strategy; the national information warfare–based capabilities Not only does a lattice framework
security staff, President, and combatant and personnel. promote internal integration and
commanders do. But what organization This concept prescribes basic guid- idea-sharing, the concept also promotes
is responsible for coordinating the stra- ance and a certain rule set (that is, the use of solutions from external sources.
tegic message throughout the national authorities) but empowers individual In many cases, members of a lattice-type

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  27


USS Freedom and USS John C. Stennis are under way conducting Independent Deployer Certification exercise in surface warfare, air defense, maritime-
interception operations, command and control/information warfare, C4 systems intelligence, and mine warfare, April 28, 2015 (U.S. Navy/Ignacio D. Perez)

organization are encouraged to look the desired data from the terrorist’s organizationally, to harness IW concepts
for nonstandard solutions to difficult phone. This example shows the power of and be positioned to maintain the in-
problems, even if that means branching information in multiple ways; the first is formation advantage in a dynamic and
outside of organizational norms. the fact that the government was unable unsure information age.
Analyzing a recent case, the iPhone to use traditional methods of gaining Future IW solutions will also need
encryption issue surrounding the San support from a private company. Second, to involve multidomain skills from in-
Bernardino terrorist attack is an example media, as the primary driver, brought dividuals with varying backgrounds. In
of a federated approach to problem-solv- attention to the problem and forced a today’s military, once a Servicemember is
ing. The Federal Bureau of Investigation public debate, which worked in favor of branded with a specific skill set, it is chal-
(FBI) was able to crack the iPhone’s the government. There were arguments lenging to break from that community
encryption, despite Apple’s unwillingness on both sides of the issue, but it should and maneuver effectively between com-
to support. Apple’s fear stemmed from be assumed that the challenge in and of munities, while still maintaining upward
the idea that if it provided the requested itself was enough to stimulate a solution, mobility. To achieve greater effectiveness
support, the government would then whether right or wrong. The key point to in IO planning and execution, cross-do-
own the key to all encryption security this example is that the proliferation of in- main and diverse IRC careers should
measures for iPhones around the world.24 formation drove a solution, regardless of become a desired career path option for
When the international media reported Apple’s standpoint, the FBI’s authority, future leaders.
and publically debated the issue, the and even despite popular public opinion
FBI received calls from individuals and for or against the FBI. If the power of Amazon Meets the
companies claiming to possess the tools information can easily dictate the out- U.S. Government
necessary to break the encryption. In fact, come of such an example, what are the To harness the information age and
one company was able to break the en- long-term implications for warfare? The enable IW capability toward the success
cryption and allowed the FBI to retrieve U.S. Government can take measures now, of future U.S. conflicts, a new organiza-

28  Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
tion should be created within the U.S.
14
Maria Snegovaya, Putin’s Information
Notes Warfare in Ukraine: Soviet Origins of Russia’s
Government. The Cold War has passed, Hybrid Warfare, Russia Report 1 (Washington,
and so has USIA; however, it is possible 1
“A mesh network is a Local Area Network DC: Institute for the Study of War, September
that a new version of USIA is required (LAN), Wireless Local Area Network (WLAN), 2015), 7, available at <http://understand-
as Russia continues to test its limits or Virtual Local Area Network (VLAN) that ingwar.org/report/putins-information-war-
of power. As in the case of Ukraine, employs one of two decentralized connection fare-ukraine-soviet-origins-russias-hybrid-war-
arrangements: full mesh topology or partial fare>.
Georgia, and Estonia, as well as the mesh topology. In a full mesh topology, each 15
Ibid.
need to combat terrorist groups such as network node is connected directly to others. 16
Ibid.
ISIL, a renewed effort on U.S. informa- In a partial mesh topology, some nodes are 17
Dimitry Gorenburg, “Crimea Taught
tion warfare is required. The dynamic connected to all the others, but are only Us a Lesson, But Not How the Russian
and ever-changing environment requires connected to those nodes with which they Military Fights,” War on the Rocks, May 19,
exchange the most data.” See “Mesh Network 2014, available at <http://warontherocks.
a fundamentally different organizational Topology (Mesh Network),” IoTAgenda.com, com/2014/05/crimea-taught-us-a-lesson-but-
structure than that of current govern- available at <http://internetofthingsagenda. not-about-how-the-russian-military-fights/>.
ment hierarchical structures in order to techtarget.com/definition/mesh-network-to- 18
LookingGlass Cyber Threat Intelli-
be flexible and adaptable for 21st-cen- pology-mesh-network>. gence Group, Operation Armageddon: Cyber
tury problems. Additionally, as we move
2
Machine-learning is a subfield of comput- Espionage as a Strategic Component of Russian
er science that evolved from the study of pat- Modern Warfare, CTIG-20150428-01 (Reston,
forward in the information age, our tern recognition and computational learning VA: LookingGlass Cyber Solutions, Inc., April
lives will be increasingly intertwined and theory in artificial intelligence. Machine-learn- 28, 2015), available at <https://lookingglass-
connected with information systems. ing explores the construction and study of cyber.com/wp-content/uploads/2015/08/
This information environment will con- algorithms that can learn from and make Operation_Armageddon_FINAL.pdf>.
tinue to play a critical role in how the predictions on data. 19
David Talbot, “Watching for a Crime-
3
Richard M. Crowell, War in the Informa- an Cyberwar Crisis,” MIT Technology Re-
U.S. Government and military interact tion Age: A Primer for Cyberspace Operations in view, March 4, 2014, available at <www.
with allies, partners, and adversaries in 21st Century Warfare (Newport, RI: U.S. Naval technologyreview.com/s/525336/watch-
all of the operational domains. War College, 2010). ing-for-a-crimean-cyberwar-crisis/>.
To shape the environment to meet 4
Ibid. 20
JP 5-0, Joint Operation Planning (Wash-
our desired endstates, we must recognize
5
Joint Publication (JP) 3-13, Information ington, DC: The Joint Staff, August 11, 2012),
Operations (Washington, DC: The Joint Staff, II-9.
the importance of information warfare November 27, 2012), I-1. 21
Report of the Defense Science Board Task
and work to ensure that IO concepts are 6
Julie Hirschfeld Davis, “Hacking of Force on Strategic Communication (Washing-
properly integrated into all actions and Government Computers Exposed 21.5 Million ton, DC: Department of Defense, January
operations, if not become an end them- People,” New York Times, July 9, 2015. 2008), available at <www.acq.osd.mil/dsb/
selves. We must also search for innovative
7
Brian Fung, “How Many Cyberattacks Hit reports/ADA476331.pdf>.
the United States Last Year?” National Journal, 22
National Framework for Strategic
ways to build and employ IO concepts. March 8, 2013, available at <www.nextgov. Communication (Washington, DC: The White
Our IO experts must have the required com/cybersecurity/2013/03/how-many-cy- House, 2010).
training and expertise necessary to meet berattacks-hit-united-states-last-year/61775/>. 23
Cathleen Benko and Molly Anderson,
these requirements by way of strategic 8
Ibid. “The Lattice that Has Replaced the Corporate
guidance. Operators must have flexibility
9
U.S. Information Agency, available at Ladder,” Forbes.com, March 16, 2011, available
<www.archives.gov/research/foreign-policy/ at <www.forbes.com/2011/03/16/corpo-
and agility engrained into their ethos related-records/rg-306.html>. rate-lattice-ladder-leadership-managing-hierar-
through a lattice-type organizational 10
Alvin A. Snyder, Warriors of Disinforma- chy.html>.
structure, which honors a multidomain tion: American Propaganda, Soviet Lies, and the 24
Pierre Thomas and Mike Levine, “How
career path. The ability to carry out all Winning of the Cold War (New York: Arcade the FBI Cracked the iPhone Encyption and
IW requirements must be done in a Publishing, 1995). Averted a Legal Showdown with Apple,” ABC
11
Brian Nichiporuk, “U.S. Military Op- News, May 29, 2016, available at <http://
timely and succinct manner that allows portunities: Information-Warfare Concepts of abcnews.go.com/US/fbi-cracked-iphone-en-
for the fastest possible action with the Operation,” in The Changing Role of Infor- cryption-averted-legal-showdown-apple/sto-
most flexibility. If we are not able to mation in Warfare, ed. Zalmay Khalilzad and ry?id=38014184>.
achieve these objectives, we will most John White (Santa Monica, CA: The RAND
definitely fall behind in the fast-paced Corporation, Project Air Force, 1999), 181.
12
Eric A. McVadon, “Systems Integration
and constantly changing world of IT in China’s People’s Liberation Army,” in The
and IW, and we will likely be ineffective People’s Liberation Army in the Information
in identifying and combating enemy Age, ed. James C. Mulvenon and Richard H.
COGs, such as ISIL’s reliance on IT. It Yang (Santa Monica, CA: The RAND Cor-
is time to implement ideas that exist in poration, 1999), available at <www.rand.org/
content/dam/rand/pubs/conf_proceedings/
industry, and force change, before change CF145/- CF145.chap9.pdf>.
is unattainable—through a sustainable 13
Sun Tzu, The Art of War (Oxford: Ox-
and repeatable process and organization ford University Press, 1963), 77.
within the U.S. Government. JFQ

JFQ 85, 2nd Quarter 2017 Gery, Lee, and Ninas  29


Microwave/Electro-Optic electronics engineer
at Naval Surface Warfare Center, Corona
Division, prepares alignment of various optical
components using eye-safe visible lasers, Norco,
California, April 19, 2011 (U.S. Navy/Greg Vojtko)

The Rise of the Angela Merkel while she delivered a


campaign speech.1 In January of 2015,
an sUAS defied restricted airspace
and landed, initially undetected, on

Commercial Threat the White House lawn.2 And more


recently, in August of 2016, at least
five sUASs disrupted wildfire fighting
Countering the Small efforts near Los Angeles, grounding
helicopters for fear of mid-air colli-

Unmanned Aircraft System sions.3 Likewise, sUAS altercations


with law enforcement are increasing,
as the Federal Aviation Administration
By Anthony Tingle and David Tyree now receives over 100 adverse UAS
reports per month.4 These examples
emphasize the intrusive, undetectable,
and potentially lethal nature of this
he Small Unmanned Aircraft the parameters of the capabilities

T System (sUAS) is a disruptive


commercial technology that
poses a unique and currently unde-
regarding military use have yet to be
fully discovered, recent events high-
light the potential danger. In Septem-
emerging technology.
The sUAS epitomizes the difficulties
with rapidly advancing commercial tech-
nology.5 The sUAS is as prolific as it is
fined threat to U.S. national security. ber 2013, an unarmed sUAS hovered
disruptive, and it will challenge our joint
Although, as with any new technology, near the face of German Chancellor
air-defense procedures and doctrine and
redefine our perspective on the military
uses of commercial technology. In this
Lieutenant Colonel Anthony Tingle, USA, is a Strategic Initiatives Analyst at the U.S. Army Space and
Missile Defense Command. Second Lieutenant David Tyree, USAF, is a Flight Student Pilot at Vance Air
article, we examine the characteristics
Force Base, Oklahoma. and capabilities of the sUAS, report on

30  Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
current counter-UAS initiatives within technologies may be necessary to defend lightweight power sources and materials
the Department of Defense (DOD), against the growing sUAS threat. such as carbon nanotubes (and corre-
and present policy ideas to mitigate the It is hard to understate the current sponding manufacturing processes such
future threat from militarized commercial complexity and importance of positively as adaptive printing) will enable smaller
technology. identifying sUASs. As sUASs continue to and faster sUASs with longer loiter and
be used for a variety of commercial and pri- greater operating distances.
Characteristics and Capabilities vate purposes (including package delivery While the size and maneuverability
The rapid rate of commercial technol- and photography), the sUAS operator’s are defining characteristics of the sUAS,
ogy’s advance has directly contributed intent becomes difficult to discern. Unlike advances in automation algorithms are
to the rise of sUASs. Improvements in traditional aircraft, which require runways a necessary component of the swarming
communication equipment, cryptog- and thus provide longer lead times for tactic. Simultaneous command and con-
raphy, and lightweight materials have tracking, the average sUAS is able to trol of a large number of small objects
led to the current state of the multiple become airborne quickly and close on its necessitates autonomy technology that
rotary-wing UASs, often referred to target. Additionally, positive identification will undoubtedly be available in the
as “quadcopters,” and extremely small is a necessary component of engagement near future.12 In fact, a number of UASs
fixed-wing UASs. For this article, we authority, especially when considering currently deployed or in development op-
define aircraft that fall into the DOD deployment of sUAS countermeasures erate with varying degrees of autonomy.13
UAS Category 1 (weighing less than on U.S. soil, including interdiction by law It is quite feasible that attacking sUAS
20 pounds) as an sUAS6 because the enforcement and the possibility of civilian swarms will be able to automatically
interdiction of larger than Category 1 casualties. To effectively counter sUASs, sense and communicate weaknesses in
aircraft quickly approaches traditional it will be necessary to refine and practice the opposing defense, thus adapting their
defensive counterair operations.7 procedures and doctrine, while developing swarming tactics accordingly.
As technology advances, the sUAS the capability to effectively detect, track, The development of sUAS swarm
will increase in lethality. If Moore’s law and positively identify the threat. tactics and techniques in many ways
continues to hold, we will see an increase Future advances in material and com- mirrors the introduction of Multiple
in sUAS command and control distances, putational science will enable the sUAS Independently Targetable Reentry
electro-optical sensor resolution, GPS to perform autonomously, increasing Vehicle (MIRV) technology in the early
guidance accuracy, and battlefield auton- their efficacy as an offensive weapon. One 1970s. The MIRV concept included the
omy. With advances in material science, of the characteristics of the sUAS is that use of multiple nuclear warheads included
especially considering adaptive (“3D”) it uniquely lends itself to advanced aerial in a single ballistic missile, greatly increas-
printing techniques and carbon nano- tactics. As battlefield automation pro- ing the probability of successfully striking
tubes, sUASs will become smaller, faster, gresses, militaries are advancing toward the enemy with nuclear missiles.14 Similar
and lighter, and will loiter longer and the use of multitudes of sUASs in coordi- to the inability of the Soviets to counter
carry heavier payloads. nated formations known as “swarming.” a larger number of potential inbound
The basic physical structure of the This swarming tactic could make defense nuclear warheads, the sUAS overwhelms
sUAS (including the use of advanced difficult, especially for large objects or those on the defense with possible multi-
materials) hinders radar technologies, fixed facilities. The use of swarm tactics ple aggressors. Although similar in terms
the primary component of modern air increases the destructive power of the of using mass, sUAS differs from MIRV
defense. Radar works by bouncing energy sUAS and presents adversaries with a in terms of maneuverability and the abil-
off airborne objects and interpreting defensive dilemma.10 In this regard, mili- ity to land and wait for more opportune
the return reflections. Although the taries may have to reconsider the concept times to attack. Not all the sUASs in the
carbon fiber and plastic components (of of mass on the battlefield. offensive swarm need to be deadly, as the
which the majority of most sUASs are Currently, the practical use of sUAS parallels with MIRVs extend beyond a
comprised) naturally reduce radar return, swarms suffers from a confluence of simple numerical advantage. Offensive
size appears to contribute most to the technological shortcomings seemingly sUAS tactics could co-opt the idea of
shortcomings in sUAS radar identifica- resolved by relatively minor advances in decoys from MIRV technology. With the
tion and tracking.8 While modern radar technology. The lift capacity, speed, and advent of MIRV decoys, or warheads that
technology has the capability to engage agility of the sUAS is directly dependent had the same physical characteristics as
smaller objects. Additionally, concerning on the amount of weight carried by the their nuclear counterparts, the economic
radar, sUASs are often indistinguishable vehicle. Reductions in the weight of efficiency of MIRV technology enabled
from other airborne objects (specifically communications equipment, sensors, asymmetric advantages.15 Similarly, the
birds).9 While additional methods such as onboard processors, and kinetic payload use of decoys may reduce the overall cost
acoustic-phased arrays and electro-optical (for example, “energetics”)11 will increase of simultaneously attacking with large
cameras show promise, a combination the range and maneuverability of these numbers of sUASs, presenting adversaries
of these tracking and identification systems. Likewise, advances in small, with multiple deadly dilemmas.

JFQ 85, 2nd Quarter 2017 Tingle and Tyree  31


Current Counter-UAS Initiatives these relatively cheap miniature guided recalls memories of the now defunct
The U.S. military currently has a mul- munitions may hold the answer to coun- Airborne Laser System, the mission
titude of ways to effectively destroy tering swarms of sUASs. Another method and domain of the Air Force forces the
UASs. Starting in 2002, the military to counter sUASs may be with the use of Service to pursue small, lightweight laser
exercise Black Dart focused on coun- other sUASs. systems that can be mounted on aircraft.
tering the UAS threat. The exercise One method to counteract swarms Perhaps the most promising di-
has tested a number of kinetic and of attacking sUASs may be to use sUASs rected-energy technology in terms of
nonkinetic methods ranging from 0.50- as “hunter-drones.” Currently, there is defeating multiple sUASs is the use of
caliber guns to Hellfire missiles.16 The a “drone war” occurring over the skies high-powered microwaves. These micro-
ability to defend against this threat is, of Tokyo as the Japanese Yakuza (an wave devices have the capability to render
at its core, a problem of asymmetry and organized crime syndicate) frequently use the electronic components of an sUAS
efficiency. How do we defeat swarms of sUASs to courier drugs across the city. useless, much like an electromagnetic
$1,500 drones in a practical, cost-effi- When the Tokyo police use sUASs with pulse (EMP).28 Although there may be
cient manner? The following sections nets to capture these drones, the Yakuza practical considerations in the use of EMP
detail existing counter-UAS methods, retaliate by attacking the police drones.20 devices in urban environments or on the
including traditional kinetic and Increases in battlefield automation might battlefield (that is, necessitating controlled
directed energy means, and examine allow “hunting parties” of sUASs to de- use of these weapons), microwave weap-
their applicability to defending against grade or destroy enemy sUASs with nets ons are under development and, in the
sUASs.17 or other kinetic methods. Additionally, future, could be used simultaneously to
Traditional Kinetic Methods. man-portable air-defense systems like destroy large numbers of sUASs.29
Traditional kinetic means of air defense, anti-UAS weapons may prove effective
while ostensibly effective in a single against sUASs.21 In the near term, Addressing the Threat:
intruder scenario, are cost inefficient though, solutions may lie in more natural Commercial Adaptive R&D
versus relatively cheap sUASs. Factoring means of sUAS interdiction. Since the early 2000s, DOD has
in the possibility of multiple small, low, There has been research into the use acknowledged the necessity to increase
and fast targets, existing kinetic means of of birds of prey for countering the sUAS the integration of commercial technol-
defense are tactically inadequate. Current threat.22 The U.S. Air Force Academy has ogy into military systems and procure-
kinetic defense systems lack the coverage, recently conducted a year-long study in- ment. But it is a recent phenomenon
range, and accuracy to counter future volving gyr-saker falcons. Tests reveal the that commercial technology represents
sUAS swarms.18 It is unlikely that these falcons were able to “detect, positively complete capabilities that circumvent
weapons systems could create a necessary identify, track, and engage a specific sUAS the long lead times of traditional gov-
“dome of steel” around stationary posi- already in flight.”23 Compared to soaring ernment research and development
tions. Although reducing the caliber of birds like hawks and eagles, falcons must (R&D) and procurement. In other
these defensive weapons may ostensibly actively flap their wings while in flight, words, in many sectors commercial
increase the rate of fire, one would ex- limiting loiter time to around 20 min- products are no longer simply contrib-
pect a corresponding decrease in range. utes. Additionally, the training time per uting to military capabilities; they are
Disregarding possible Gaussian-type falcon is approximately 4 to 5 months.24 the capabilities.30
weapons (for example, railguns) currently While this study did not address the use While DOD has adapted to the com-
under development, the most viable di- of falcons to interdict different types mercial influence in defense procurement,
rect-fire kinetic defense from sUASs may of sUASs, the study lead, Lieutenant it has failed to recognize the increasing
be small-caliber precision-guided rounds. Colonel Donald Rhymer, believes that it rate of impact of technology on national
The miniaturization of preci- is possible to “train falcons to generalize security. The rising capabilities of com-
sion-guided munitions may provide the to different types of UASs.”25 mercial technologies, such as the sUAS,
capability to interdict a large number of Directed Energy. If Army direct- presage even greater future commercial
sUASs at standoff distances. According ed-energy systems are disadvantaged threats. Similar to the impact of civilian
to Deputy Secretary of Defense Robert in terms of size and weight (compared malware across the spectrum of cyber
Work, “We’re not too far away from with the Navy’s), then Air Force sys- operations (on both civilian and military
guided 0.50-caliber rounds. We’re not tems are even more so. The Air Force is concerns), future unforeseen commercial
too far away from a sensor-fused weapon constrained by attempting to develop di- technologies will readily lend themselves
that instead of going after tanks will go rected-energy systems carried by aircraft. to military applications, unnerving those
after the biometric signatures of human The Air Force scientific advisory board is most concerned with maintaining na-
beings.”19 In the absence of a viable currently assessing the requirements for tional security.
“brute force” or “shotgun” method these missions on the modified AC-130H The challenge is to address this new
of area defense (for example, massive model,26 with a projected demonstration and fast-moving commercial threat
amounts of “dumb” kinetic projectiles), date of 2020.27 While this lofty endeavor under the shadow of an antiquated and

32  Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
Cadet-in-charge for Academy falconry team pulls lure as Ace, a black gyr-saker falcon, makes pass at it, September 10, 2010 (U.S. Air Force/Bennie J. Davis III)

inadequate defense procurement process. using the results of commercial R&D discovery of additional uses for their
The existing DOD procurement para- in the form of COTS, under the CARD technology. The dual-use nature of
digm relies on establishing requirements concept, DOD would seek to conduct technology is rarely immediately appar-
that are fulfilled, in part, by commer- research on technology at different stages ent, especially if the government is not
cial-off-the-shelf (COTS) systems and of development. This pre-market R&D exposed to or knowledgeable of that
components. Regarding DOD R&D, this has a number of advantages for both technology.32 By working closely with
requirements-based procurement happens DOD and the firm. large firms, DOD is able to discover new
either directly (from the national labs, First, DOD gains knowledge on national defense applications for com-
for example) or indirectly through using market-shaping technology that will mercial technology, helping both the firm
COTS. As emerging COTS capabilities inevitably find its way into the hands of and the government.
surpass the capacity of the government our adversaries. With commercial tech- Third, DOD can revive the chances
R&D establishment, the United States nologies’ rising level of capabilities, state for possibly useful technologies that
must develop policies to maintain its tech- and nonstate actors increasingly threaten have fallen “below the cut line”—or, in
nical advantage over its adversaries. U.S. ability to maintain technological other words, are deemed by the firm as
In terms of contribution to national overmatch. By conducting CARD, DOD not commercially viable. By signaling
defense, the United States currently fails gains vital knowledge on the possible its interest in these technologies, DOD
to take full advantage of its indigenous uses of new technologies, and possible provides an opportunity for a “second
private industry. We recommend that counters to these technologies, before life” to the firm’s technology, resulting in
DOD should work closer with private our adversaries. Much like the develop- possible commercialization.
industry prior to the release of com- ment of the Defense Advanced Research Lastly, the CARD construct reduces
mercial technology, a policy that we call Projects Agency after the launch of government R&D risk. The government
Commercial Adaptive R&D, or CARD.31 Sputnik in 1957, the use of the CARD no longer directly vets new technology
The CARD concept promotes the use strategy will help prevent the United as the industry bears the brunt of matu-
of DOD partnerships and relationships States from being surprised by significant ration of the innovation. Utilizing these
with commercial firms to enhance DOD commercial technology. market-shaping firms in partnership roles
visibility of impending commercial tech- Second, for both the firms and DOD, with government R&D is dispropor-
nological release. In contrast with simply there exists a possible benefit from the tionately low given the amount of R&D

JFQ 85, 2nd Quarter 2017 Tingle and Tyree  33


Sailors assigned to USS Jason Dunham, U.S. Air Force Academy Cadets, and engineers from Johns Hopkins University Applied Physics Lab test unmanned
aerial systems aboard rigid hull inflatable boat during exercise Black Dart, September 20, 2016, Gulf of Mexico (U.S. Navy/Maddelin Angebrand)

that is conducted (for example, the Intel nentially more deadly. The asymmetric both offensive and defensive sUAS tech-
Corporation R&D budget for 2013 was nature of the sUAS, especially when nologies. Additionally, this is inherently
roughly $10.6 billion).33 A majority of considering swarm tactics, makes the a joint fight, with the technology and
the risk is placed on the commercial firm, technology difficult to defend against. techniques developed by each Service
whereas DOD begins to conduct R&D An sUAS is relatively inexpensive and synergistically contributing to the de-
on the product in mid-to-late stream. ubiquitous (it is estimated that there velopment of anti-sUAS doctrine. Now
By adopting new policies toward gov- are over one million sUASs in the may be the time to establish a joint orga-
ernment defense procurement and the United States alone).34 Conversely, nization specifically to address the sUAS
degree to which they conduct research most defense systems are—at least at threat, similar to the Joint Improvised-
with private industry before the commer- this stage of development—restrictively Threat Defense Organization (formerly
cial release of COTS products, DOD will expensive. It may be fiscally restrictive known as the Joint Improvised Explosive
develop early defenses against threatening and grossly inefficient to attempt to Device Defeat Organization), originally
technologies, help shape the develop- counter this commercial threat with established to counter improvised explo-
ment of defense-related technologies, large military programs. Additionally, sive devices.
and prevent technological surprise. The as technologically state-of-the-art as Additionally, since the early 2000s,
greater integration of DOD into private current commercial sUASs appear, small it has been widely accepted that DOD
R&D, or CARD, will help better ensure advances in supporting technologies needs to integrate COTS requirements
national defense in a period of increasing will yield huge leaps in sUAS capa- solutions. In this “linear model” of
commercial threats. bilities, further compounding defen- innovation, private industry conducts
sive problems such as detection and R&D to develop the COTS product,
Conclusion identification. and the government applies COTS to
Although current state-of-the-art sUAS To protect against this threat, the existing requirements. Most important,
capabilities are sufficiently threatening, United States must develop doctrines DOD needs to conduct R&D on the
we are on the cusp of technological both for sUAS attack and defense. It is pre-COTS product to discover new
advances that will make the sUAS expo- necessary to improve our capabilities in requirements based on new capabilities.

34  Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
This form of R&D should supersede the System Airspace Integration Plan (Washington, 20
James Vincent, “Tokyo Police Unveil
DC: Department of Defense, March 2011), Net-wielding Interceptor Drone,” TheVerge.
old model of simply fulfilling government available at <www.acq.osd.mil/sts/docs/DoD_ com, December 11, 2015, available at <www.
requirements. DOD can accomplish this UAS_Airspace_Integ_Plan_v2_(signed).pdf>. theverge.com/2015/12/11/9891128/to-
through close interaction with private 8
William Camp, Joseph Mayhan, and Rob- kyo-interceptor-net-drone>.
industry to discover uses for emerging ert O’Donnell, “Wideband Radar for Ballistic 21
Andrew Tarantola, “The SkyWall 100 Is
COTS products before they are simul- Missile Defense and Range-Doppler Imaging of a Net-launching Anti-Drone Bazooka,” En-
Satellites,” Lincoln Laboratory Journal 12, no. gadget.com, March 3, 2016, available at <www.
taneously released to the public and our
2 (2000), 267–280. engadget.com/2016/03/03/the-skywall-100-
potential adversaries. 9
In the same vein as radar, infrared systems is-a-net-launching-anti-drone-bazooka/>.
In the history of modern warfare, have a similarly difficult time in detecting small 22
See Peter Holley, “Watch This Trained
there have been few purely commercial heat signatures of an sUAS. Eagle Destroy a Drone in a Dutch Police
technologies that so readily lend them-
10
John Arquilla and David Ronfeldt, Video,” Washington Post, February 2, 2016,
Swarming and the Future of Conflict (San- available at <www.washingtonpost.com/news/
selves to immediate weaponization as
ta Monica, CA: RAND, 2000), available at worldviews/wp/2016/02/01/trained-eagle-
the sUAS. The threat lies not only in the <www.rand.org/pubs/documented_briefings/ destroys-drone-in-dutch-police-video/>.
technology itself, but also in the degree DB311.html>. 23
Don Rhymer et al., “Falconry: Alternate
to which that technology is sufficiently 11
Energetics refers to the reduction of Lure Training (FALT),” Report nos. 56250
capable and available to all potential ne- explosive size while increasing explosive power. and 63300.
See John Gartner, “Military Reloads with 24
Don Rhymer, telephone interview by
farious actors. In this sense, the potential
Nanotech,” MIT Technology Review, January authors, November 11, 2015.
threat from sUASs should catalyze new 21, 2005, available at <www.technologyreview. 25
Ibid.
thinking in DOD about the uses of com- com/s/403624/military-reloads-with-nano- 26
William P. Head, Night Hunters: The AC-
mercial technology. Moving forward, it is tech>. 130s and Their Role in U.S. Airpower (College
this commercial availability of advanced
12
Daniel Gonzales and Sarah Harting, Station: Texas A&M University Press, 2014).
Designing Unmanned Systems with Greater 27
Thomas Masiello and Sydney Freedberg,
technology that is the true threat, and it
Autonomy (Santa Monica, CA: RAND, 2014), Jr., “Air Force Moves Aggressively on Lasers,”
is this new technological frontier that may available at <www.rand.org/pubs/research_re- BreakingDefense.com, August 7, 2015, available
pose the greatest future challenge to our ports/RR626.html>. at <http://breakingdefense.com/2015/08/
national security. JFQ 13
One example of autonomous UAS air-force-moves-aggressively-on-lasers/>.
operations is the use of the Israeli Harpy 2 for 28
For both microwaves and lasers, there ex-
suppression of enemy air defense operations. ist the possibility of countermeasures. In terms
See T.X. Hammes, “Cheap Technology Will of microwaves, electronic hardening of the
Notes Challenge U.S. Tactical Dominance,” Joint sUAS could provide protection. Against laser
Force Quarterly 81 (2nd Quarter 2016). attack, countermeasures such as smoke might
1
Wallace Ryan and Loffi Jon, “Examining 14
Lynn Etheridge Davis and Warner R. provide a level of survivability.
Unmanned Aerial System Threats and Defens- Schilling, “All You Ever Wanted to Know 29
Jason D. Ellis, Directed-Energy Weapons:
es: A Conceptual Analysis,” International Jour- About MIRV and ICBM Calculations but Were Promise and Prospects (Washington, DC: Center
nal of Aviation, Aeronautics, and Aerospace, no. Not Cleared to Ask,” The Journal of Conflict for a New American Security, April 2015),
4 (January 10, 2015). Resolution 17, no. 2 (1973), 207–242. available at <www.cnas.org/sites/default/
2
Faine Greenwood, “Man Who Crashed 15
John Wilson Lewis and Hua Di, “China’s files/publications-pdf/CNAS_Directed_Ener-
Drone on White House Lawn Won’t Be Ballistic Missile Programs: Technologies, Strat- gy_Weapons_April-2015.pdf>.
Charged,” Slate.com, March 18, 2015, egies, Goals,” International Security 17, no. 2 30
Additionally, we especially see this com-
available at <www.slate.com/blogs/fu- (1992), 5–40. merciality phenomenon in the cyber domain.
ture_tense/2015/03/18/white_house_lawn_ 16
Richard Whittle, “Military Exercise Black 31
The authors want to thank Dr. Terry
drone_the_man_who_crashed_it_there_won_t_ Dart to Tackle Nightmare Drone Scenario,” Pierce for providing the opportunity to observe
be_charged.html>. NewYorkPost.com, July 25, 2015, available the Department of Homeland Security’s Center
3
Michael Martinez, Paul Vercammen, and at <http://nypost.com/2015/07/25/ of Innovation, the operations on which the
Ben Brumfield, “Above Spectacular Wildfire military-operation-black-dart-to-tackle-night- Commercial Adaptive R&D (CARD) concept
on Freeway Rises New Scourge: Drones,” mare-drone-scenario/>. is based. Dr. Pierce also provided valuable input
CNN.com, July 19, 2015, available at <www. 17
While possible sUAS countermeasures into developing the CARD theory itself.
cnn.com/2015/07/18/us/california-free- exist, this article does not discuss technologies 32
John A. Alic, Beyond Spinoff: Military
way-fire>. and techniques associated with cyber effects, and Commercial Technologies in a Changing
4
The latest Federal Aviation Administration such as GPS spoofing and command link World (Cambridge: Harvard Business Press,
(FAA) reports are available at <www.faa.gov/ capture. 1992).
uas/law_enforcement/uas_sighting_reports/>. 18
The 20-mm Phalanx (Close-In Weapon 33
Michael Casey and Robert Hackett,
5
While the militarization of the Small Un- System) has a left-to-right limit of 300 degrees. “The Top 10 Biggest R&D Spenders World-
manned Aerial System (sUAS) would ostensibly For more information, see “USA 20 Mm wide,” Fortune, November 17, 2014, available
increase its lethality, this article focuses on the Phalanx Close-in Weapon System (CIWS),” at <http://fortune.com/2014/11/17/
possible capabilities of commercial sUASs (in- NavWeaps.com, June 16, 2010, available at top-10-research-development/>.
cluding the addition of an explosive payload). <www.navweaps.com/Weapons/WNUS_Pha- 34
Andrew Amato, “Drone Sales Numbers:
6
Practically, the discussion of sUASs should lanx.htm>. Nobody Knows, So We Venture a Guess,” Dro-
not be limited to this weight. The FAA catego- 19
Cheryl Pellerin, “Work Details the Future nelife.com, April 16, 2015, available at <http://
rizes aircraft under 55 pounds as an sUAS. of War at Army Defense College,” Defense dronelife.com/2015/04/16/drone-sales-num-
7
UAS Task Force Airspace Integration News, April 8, 2015, available at <www.defense. bers-nobody-knows-so-we-venture-a-guess/>.
Integrated Product Team, Unmanned Aircraft gov/News-Article-View/Article/604420>.

JFQ 85, 2nd Quarter 2017 Tingle and Tyree  35


Marines with Bravo Company, 1st Battalion, 7th
Marine Regiment, provide outboard security
after offloading from CH-53E Super Stallion
helicopter during mission in Helmand Province,
May 1, 2014 (U.S. Marine Corps/Joseph Scanlan)

Forensic Vulnerability Analysis


Putting the “Art” into the Art of War
By Darryl Williams

The supreme art of war is to subdue the enemy without fighting.


—Sun Tzu, The Art of War

s warfare art or science? The debate, Many military scholars side with the able around instantaneous data flows

I touched upon by Sun Tzu in the 6th


century BCE, is still raging today.
Most scholarly literature states that war
argument that the planning and execu-
tion of warfare are art, but the tools
used to wage war are science. However,
than long-term incremental research,
science is taking a more prominent
role in warfare. For example, watch the
is a combination of both art and science. in this technology-centric era of large current Department of Defense (DOD)
data collection, asymmetric adversaries recruiting videos. Except for the Marine
that employ emerging technologies, Corps, which is still looking for The
nation-states that leverage technology Few, The Proud, most if not all Service
Lieutenant Colonel Darryl Williams, USAF (Ret.), superior proxies, weapons that evoke a recruiting videos focus on technology
is the President and Chief Executive Officer of
Partnership Solutions International.
Star Wars familiarity, and a generation (for example, jet fighters, cyber war-
of warfighters that is more comfort- riors, and space warriors).

36  Commentary / Forensic Vulnerability Analysis JFQ 85, 2nd Quarter 2017


In the kinetic arena, as weapons and adversary without endangering the warf- non-obvious vulnerabilities often pro-
weapons systems become more complex, ighter or innocent civilians. As this article duce the most favorable effects with the
planning and execution are moving away demonstrates, surgical nonkinetic target- most limited negative consequences.
from art toward more reliance on science. ing requires an art form called forensic Sometimes these vulnerabilities appear
In conflicts up to and including Vietnam, vulnerability analysis. With more than 20 separate from the primary target by com-
targeting was a matter of saturation to en- years’ experience as a forensic vulnerabil- mercial mergers and acquisitions, joint
sure destruction. However, in Operation ity analyst, targeteer, and warfighter, I can ventures, layered boards of directors,
Desert Storm, the public first witnessed attest to the value of forensic vulnerability government advisory service, venture
precision-strike capabilities. Few who analysis in uncovering and targeting capital, shell corporations, third-party
were in the military in 1991 can forget advanced terrorist planning, finding and integration, and so forth. From experi-
General Norman Schwarzkopf, USA, fixing high-value assets, protecting the ence, the most critical vulnerabilities
walking the press through the use of supply chain of national security systems, exist at 3 to 4 degrees of separation from
laser-guided bombs in Iraq, Tomahawk creating courses of action that maximize the target. I have found that 4 degrees
cruise missiles launched from ships in the effectiveness and minimize negative col- of separation from the target of interest
Red Sea, and air-launched cruise missiles lateral effects, and enhancing all areas of usually encompass the majority of critical
from bombers hundreds of miles from traditional campaign planning. However, vulnerabilities.
the conflict zone. In current conflicts, the its use and value have been kept in the For those unfamiliar with the concept
integration of global positioning systems shadows, and this lack of visibility is hav- of degrees of separation, consider this
into bombs allows one B-2 to effectively ing dangerous consequences. scenario. A targeteer is attempting to dis-
prosecute 80 targets. In future conflicts, In discussions with Intelligence cover a critical vulnerability in Company
emerging directed energy weapons will Community leadership, DOD planners V, which produces a weapons system that
enable the possibility of surgical attacks at the combatant commands and Joint could jeopardize U.S. national security.
with little to no collateral damage. The Staff, and leaders at many of the national In the production of the weapons system,
bottom line is that kinetic warfare is laboratories, forensic vulnerability analysis Company V receives electrical power
becoming more about the science of the is an art form that seems to be on the last from a hydroelectric system owned by
tools than the art of the application. stages of life support. In these organiza- Company W (1 degree of separation).
Even in the nonkinetic arena, war- tions, the majority of remaining forensic The hydroelectric system uses turbines
fare is becoming more science than art. vulnerability analysts are approaching supplied by Company X (2 degrees of
It is all about the science behind the retirement age. Compounding this separation). The turbines are controlled
tools used. Executing a broad-brush, problem is a lack of a training program by an electrical management system
nonkinetic attack is easy and science- to challenge, incentivize, and mentor the supplied by Company Y (3 degrees of
centric. If a country wants to take down tech-centric next-generation warfighters separation). Company Y subcontracts the
another country’s power grid or critical to become forensic vulnerability analysts. development of the configuration files to
infrastructure, there are brute force The purpose of this article is to sound Company Z (4 degrees of separation).
nonkinetic tools to accomplish the task. the alarm that the expertise necessary for This analysis of linkages is accomplished
However, the consequences are akin to successful surgical nonkinetic targeting is not only for the production process,
General William T. Sherman’s march to about to become organizationally extinct, but also for the leadership, supply
the sea. If the nondiscriminate attack is and unless the problem is addressed, the chain, financial, geopolitical, and cyber
cyber based, the attacking country may art of war will become the science of war. processes. Once these relationships are
inadvertently violate numerous sover- Forensic vulnerability analysis uses known, subject matter experts empower
eignties as it applies the tool. Ultimately, established auditing principles, due- the targeteer so that a surgical nonkinetic
the negative collateral effects of a broad- diligence protocols, operational security attack against Company Z ripples up to
brush, nonkinetic attack may be worse survey methodologies, and exhaustive Company V, accomplishing the national
than the original problem that precipi- research of peer-reviewed documents security objective.
tated the attack. to build awareness of obvious and non- In DOD capstone documents Joint
However, in the realm of surgical, obvious relationships and linkages. Then Publication (JP) 3-0, Joint Operations, JP
nonkinetic targeting, Sun Tzu’s words forensic vulnerability analysis leverages 2-0, Joint Intelligence, and many other
are as applicable today as they were when trusted relationships with recognized joint publications and Service planning
written in 500 BCE. The key word is subject matter experts in industry, aca- documents, the concept of a target
surgical. In such an attack, a specific demia, and governments to transition system of systems is described verbally
target is affected, in a manner that may and characterize the linkages into obvious and portrayed graphically. Figures 1 and
be nonattributable, for a predetermined and non-obvious vulnerabilities, identify 2 from JP 2-0 portray the system-of-
duration that limits collateral damage. As and mitigate negative consequences, systems concept.
stated by Sun Tzu, a successful surgical and establish a process to collect and The figures portray a linear relation-
attack has the potential of subduing the measure effectiveness. As an aside, the ship matrix. Once the relational linkages

JFQ 85, 2nd Quarter 2017 Williams 37


Figure 1. Identifying Centers of Gravity In today’s interconnected, multina-
Source: Joint Publication 2-0, IV-14. tional world, the current DOD figures do
not adequately portray reality. If the tra-
Informational COG: Center of Gravity ditional, linear relationship methodology
Decisive Point is used to target in a complex, intercon-
Infrastructure COG Node nected, multinational world, the targeteer
Social
Military Node has the likely possibility of providing the
Link joint force commander with courses of
action (COAs) built on incorrect assess-
ments of risk versus effectiveness. One
reason for an incorrect assessment is that
traditional nodal analysis defines criticality
of a node via the number of linkages and
analysis out to 1 to 2 degrees of separa-
Operational COG tion. For example, if Company V has two
critical nodes, one node with 100 linkages
Economic and one node with 2 linkages, common
Strategic COG knowledge dictates that the node with
Political 100 linkages must be the most critical.
However, imagine that the 100 links were
employees linked via social media, and
the other nodes 2 links were actually the
Figure 2. Systems-Oriented Event Template leadership and command and control net-
Source: Joint Publication 2-0, IV-15. works. Now which node is more critical?
The underlying problem is that to be
effective in a surgical nonkinetic strike,
Minister of Program Military
National Defense 1256
Systems
the targeteer needs to realize that the
system of systems is a culmination of
multinational, multilinked, multitiered,
and non-obvious sub-targets. All that the
Research Research Research Information
in Uranium
Enrichment
in Processing
Plutonium
in Ballistic
Materials Systems world sees is the primary target, but in
reality, the target is a culmination of nu-
merous symbiotic units. For example, an
aircraft is no longer produced at one plant.
Nuclear National
Missile Economic
Power
Corporation
Bank of Z
Export
Company Systems In the case of a next-generation fighter jet,
there may be thousands of contractors and
subcontractors all providing numerous
Research Centrifuge Infrastructure components, any of which could jeopar-
Reactor Facility
Processing Commerical Systems dize the aircraft if compromised. In the
Facility Reactor
case of a power grid, there are thousands
Consolidated Event of substations, each with thousands of
Research in
Reprocessing Template (showing components that can be used to collapse
Program potential links indicating
Research in
Enrichment Nuclear Power
National 1256
intent to develop the grid at any given time. Many of these
Bank of Z
Corporation
nuclear weapons) subtargets are multinational. Many have
nodes that are U.S. entities, which adds
existing links potential links complexity in regard to authorities. Some
of the nodes may cross established U.S.
Government organizational areas of
are known, targeting is accomplished German aircraft production. During responsibility with conflicting authorities.
to elicit a desired and measurable effect Operation Desert Storm, Iraqi power Most nodes have critical information that
toward achieving the stated campaign plants were attacked to negatively af- is not accessible via established govern-
objective. The system-of-systems fect Iraqi defensive capabilities. The ment collection capabilities.
concept is not new. In World War II, system-of-systems concept remains valid; The bottom line is that in a complex,
the Allies targeted ball-bearing plants however, the world is more complex interconnected world, a targeteer can-
in Schweinkurt, Germany, to affect now than at any time in history. not accurately determine a critical target

38  Commentary / Forensic Vulnerability Analysis JFQ 85, 2nd Quarter 2017


outside of a forensic vulnerability analysis
that identifies both obvious and non-
Figure 3. Interconnected and Global System of Systems
obvious relationships.
Figure 3 updates figure 2 to make it Minister of
National Defense
Program
1256

relevant for today’s targeting solution.


For the purpose of an example, the
graphic identifies a missile export com-
pany in the economic tier. Traditional Research
in Uranium
Research
in Processing
Research
in Ballistic
Enrichment Plutonium Materials
nodal analysis will look at the company
and how it fits with the national security
objective (for example, remove country
Nuclear National
X’s capability to export nuclear ballistic Power
Corporation
Bank of Z Missile
Export

missile airframes, warhead components,


Company

and related technology to country Y).


Traditional analysis will look at the flow
of money, company leadership, con- Research
Reactor
Centrifuge
Facility
Processing Commerical
nectivity to other identified nodes, and Facility Reactor

so forth. The nonkinetic COA may be to


infiltrate the shipping dispatch network Research in
Reprocessing

and route the shipment of missiles to Research in National


Program
1256

another location, thereby accomplishing


Enrichment Nuclear Power Bank of Z
Corporation

the national security objective. However,


this solution looks at a complex scenario
through a simplistic lens and creates However, forensic vulnerability Although complex in appearance,
a logistics quagmire with potentially analysis is optimized to identify links and the links and nodes are characterized by
global negative effects. For example, if relationships that are usually hidden. critical and intimate information supplied
the attack is successful and the vessel In the previous missile export company via the forensic vulnerability analyst’s
transporting the missiles is rerouted, example, the forensic vulnerability ana- trusted relationships in the private sector,
what about the other legitimate com- lysts would start where the traditional academia, and government. Interactive
merce on the transport vessel? That planners using the methodologies in wargaming provides the commander with
vessel is also scheduled to pick up ad- figures 1 and 2 stop. From that point, an important “what if?” capability. Using
ditional legitimate cargo at the original the missile export company’s leadership, the previous example of the missile export
destination (second cluster in figure corporate papers, and financial health company, the forensic vulnerability analy-
3). If the rerouting is successful, the would be analyzed. The leaders prob- sis, subject matter expertise, and associated
uncertainty infused into the shipping in- ably occupy leadership positions in the interactive wargame could produce a
dustry drives up shipping insurance rates government, other corporate boards, or course of action as shown in figure 4.
exponentially. This cost is handed off to civic institutions. Each of those entities The following are linked forensically:
the customer. Ultimately, these increased is analyzed. The banks that move the Country X’s nuclear ballistic missile pro-
costs of business affect the ability of company’s money are analyzed down to gram (5) uses the named missile export
the multinational shipping company to 4 degrees of separation. Analysis includes company (4) to move airframes, warhead
conduct competitive commerce, which leadership and corporate linkages (such components, and critical technology
creates additional global issues (third as joint ventures, subsidiaries, and shell to country Y. The leader of the missile
cluster in figure 3). companies). The shipping and dock export company has a trusted relation-
From experience, senior government worker companies are analyzed, as are ship with Freight Forwarder A (3), which
and DOD leaders understand these the systems used for dispatch and all the uses an international bank (2) that has a
inherent complexities, which make them components and companies that sell the branch in country Y. This bank (2) has a
historically unwilling to accomplish surgi- components comprising the dispatch board of directors with one director who
cal nonkinetic courses of action presented system. The company that transports owns a freight insurance company (1), the
as part of a campaign plan. Even if these the missiles to the dock is analyzed. The same company that provides insurance
COAs religiously follow established company that picks up the missiles at the for the export of the missile shipment.
planning doctrine to include intelligence desired end point is analyzed. Ultimately, As a result of this forensic vulnerability
preparation of the battlespace and are the system-of-systems graphic that the analysis, targeteers could surgically attack
exhaustively wargamed, the commanders traditional targeteer uses (figure 2) the system in such a way that the export
will know that a wargame of faulty as- becomes the system-of-systems that the company does not receive the necessary
sumptions creates faulty COAs. forensic vulnerability analyst creates. letter of credit and insurance. Granted,

JFQ 85, 2nd Quarter 2017 Williams 39


Figure 4. Forensic Vulnerability Analysis Used harm’s way. It is time for DOD and the
Intelligence Community to make changes
in Surgical Nonkinetic Targeting to strengthen this discipline and bring the
5 art back into the art of war.
Minister of Program
National Defense 1256

Addendum: Forensic
Vulnerability Analysis
Case Study
Research Research Research 3 The following is a real-world case study
in Uranium in Processing in Ballistic
Enrichment Plutonium Materials

4 in which forensic vulnerability analysis


was used to uncover the end stages of
terrorist planning and was instrumental
Nuclear National
Power
Corporation
Bank of Z Missile
Export in validating and subsequently terminat-
ing the threat. In a touch of irony and
Company

future concern, the U.S. Government’s


2 forensic vulnerability analysis effort
Research
Reactor
Centrifuge
Facility
Processing Commerical
uncovered al Qaeda using a crude form
Facility Reactor
of forensic vulnerability analysis as part
of its targeting process.
Research in
Reprocessing 1 Overview. On April 15, 2004, Osama
Research in National
Program
1256 bin Laden released an audiotape giving
Europe 3 months to leave Islamic coun-
Enrichment Nuclear Power Bank of Z
Corporation

tries or face renewed attacks. By August,


the 90-day deadline ended. However,
following the COA is not as flashy as There also needs to be a dedicated career based on information gleaned from a
launching a Tomahawk; however, the path that accounts for the longevity of seized laptop, the U.S. Government and
result still keeps country Y from receiving specialization required to produce an Intelligence Community were not look-
the nuclear ballistic missile system. expert forensic vulnerability analyst. ing at Europe but were preparing for an
The cadre of forensic vulnerability The good news is that there are enough al Qaeda attack against one of five finan-
analysts is dwindling due to retirement experienced analysts to act as instructors cial centers in the United States.
and routine attrition, and there are few and mentors, and there are cooperative Early Warning from Academia.
to no replacements. A national lab leader research and development agreements in A leader from an academic organiza-
recently concluded that forensic vulner- place to leverage academia and industry. tion read an article in a newspaper from
ability analysis is an art form in danger of The bottom line is that this cadre death Milan, Italy. The author of the article
extinction. Unfortunately, as an art form, spiral can be rectified with little funding, was known to the academic (2 degrees
there is no present means to automate the but commitment to action needs to be of separation) and had a track record
forensic vulnerability analysis process. The made in the short term. of unique insight into the workings
problem is that much of the analysis is in- This article seeks to bring awareness of al Qaeda. In the article, the author
terpretation based on years of experience. to a unique specialty in the Department stated that al Qaeda would not attack
In the future, an artificial neural network of Defense and Intelligence Community: the United States. The attack would be
may be created that can successfully ac- forensic vulnerability analysis. It has against Europe to punish the countries
complish forensics. However, if such a stayed in the shadows since the birth of for ignoring bin Laden’s 90-day truce.
network is created, it would still require the Nation and has been instrumental He went on to state that his sources (3
experienced forensic vulnerability analysts in the success of many of the greatest degrees of separation) indicated that
to assist in the network’s “learning.” U.S. campaigns. It is truly the “art” in the attack would occur in one of five
The Department of Defense and the art of warfare. However, out of sight cities to include London, Rome, and
Intelligence Community need to address has also meant lack of attention. As the Paris. Because the academic was part of
the issue of a dwindling forensic vulner- world becomes more tech-centric, there a forensic vulnerability analysis trusted
ability analyst cadre before it reaches a is an inadvertent momentum to make relationship network, this information
point of no return. There needs to be a warfare more scientific. Unfortunately, was pushed by the academic to a DOD
dedicated training and recruiting effort the more technologically complex the forensic vulnerability analyst.
to identify motivated warfighters. There world becomes, the more critical the Early Warning from Industry.
needs to be a symbiotic relationship with art of forensic vulnerability analysis will At the same time, a global investment
academia and industry to provide unique be to protecting U.S. national security banking leader, also in the trusted re-
mentoring opportunities for the trainees. and safeguarding the warfighter in lationship network, notified the same

40  Commentary / Forensic Vulnerability Analysis JFQ 85, 2nd Quarter 2017


Joint Cyber Analysis Course instructor at Information Warfare Training Command Corry Station helps high school student complete cybersecurity
challenges during third annual CyberThon event at Naval Air Station Pensacola, January 21, 2016 (U.S. Navy/Taylor L. Jackson)

DOD analyst of interesting dialogue in expert out to 4 degrees of separation. academic information, business informa-
financial blog sites. The banking leader In this case, the analyst was directed to tion, expert red team, and intelligence
stated that a particular financial blog a finance expert familiar with the five traffic. The result was actionable intelli-
produced a disturbing thread. A blogger European locations. He took part in a gence with increased fidelity and probable
posted a question asking how an entity red team exercise hosted by the analyst. intent. The complete forensic vulnerability
could collapse a nation-state’s economy. He was asked to put himself in the place analysis process took 48 hours from initial
Other bloggers answered to forgo at- of the terrorists and stage an effective message to research completion.
tacking structures and focus on attacking attack against economic leaders. When Actions Taken. The data, foren-
economic leaders. The bloggers went on asked, “In what European city would sic nodal analysis, and corroborating
to say that al Qaeda planned incorrectly you stage the attack and how?” the leader intelligence were given to the United
when they attacked the World Trade responded that because of close-hold in- Kingdom liaison at DOD. In post-event
Center; what they should have done formation that he was privy to, he would talks in London between the United
was attack the stock exchange leader- attack a “specified location” in London Kingdom’s cabinet secretariat, the minis-
ship and traders. (Note: This is a perfect with either a chemical/biological weapon try of defense, security services, the Joint
example of the value of forensic vulner- or a hijacked airliner. A successful attack Terrorism Analysis Center, the DOD
ability analysis [target finance leaders] in that area would cripple the United analyst, and the banking leader, it was
versus traditional nodal analysis [target Kingdom for years. learned that the al Qaeda unit members
the building]). This blog thread dem- Corroboration from the Intelligence were arrested before they could execute
onstrated al Qaeda’s crude attempt to Community. Intelligence databases were their plan. Of note, the al Qaeda unit was
accomplish forensic vulnerability analysis. queried for the subject of al Qaeda in known to the British authorities and they
Forensic Vulnerability Analysis. The London—the “specified location”—and were actively monitoring the unit’s activi-
DOD analyst started an effort to deter- airliners. Message traffic identified an al ties. The forensic vulnerability analysis
mine if the academic thread was linked Qaeda cell, but not much else was known. added fidelity to the United Kingdom’s
to the financial thread. An additional However, the DOD analyst was able, via case for action. Information learned via
benefit of a trusted relationship network non-obvious relationships and trusted interrogation confirmed the findings of
is that the network can find a singular subject matter expertise, to link the the forensic vulnerability analysis. JFQ

JFQ 85, 2nd Quarter 2017 Williams 41


Plane captain cleans canopy of EA-6B Prowler
assigned to Electronic Attack Warfare Squadron 139
on flight deck of USS Ronald Reagan, Philippine Sea,
June 19, 2006 (U.S. Navy/Kevin S. O’Brien)

Operational Graphics for


Cyberspace
By Erick D. McCroskey and Charles A. Mock

The growth of any discipline depends on the ability to communicate and develop ideas,
and this in turn relies on a language that is sufficiently detailed and flexible.
—Simon Singh, Fermat’s Enigma

To promote interoperability at the information level within the area of joint military
symbology, it is necessary to define a standard set of rules for symbol construction and
generation to be implemented in C2 [command and control] systems.
—Joint Military Symbology

42  Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
sergeant looks at an arrow Cybersecurity Assessment Program, Victory in a cyber-contested envi-

A marked in grease pencil on a


laminated map and knows that
a machine gun position lies ahead. The
which evaluates cyberspace defensive
operations during major exercises. To
convey the operational context and im-
ronment will come at an increased cost
in time, material, and manpower. The
U.S. Navy commands the seas and the
large projection screen showing a map portance of offensive and defensive cyber Air Force has controlled the skies since
with a blue rectangle encompassing actions, we have developed a symbol set World War II. Technological and tactical
an oval gives the joint task force com- that is compliant with MIL-STD-2525, prowess give the Army and Marines a
mander assurance that a tank battalion logically consistent, and capable of dis- clear edge against all comers. Only in the
defends key terrain. A picture is worth a playing the nuances of cyberwarfare to cyberspace domain is the U.S. military
thousand words. warfighters from all domains. hard pressed to defend itself, let alone
Complex subjects—mathematics, the Nation. This is a vulnerability that
chemistry, physics, even highway driv- Why Graphics? adversaries will certainly seek to exploit.
ing—have specialized sets of symbols The primitive state of cyber operational Yet many non-cyber military leaders
that convey information and understand- graphics, and the resulting lack of effec- have only a surface understanding of
ing more quickly than text alone can tive communication between cyber and the implications. Militarization of cyber
do. Symbols have been part of military physical domain warriors, deemphasizes symbols will allow joint commanders to
tactics, operations, and strategy since operational campaign design and the understand just what is happening in the
armies became too large for personal application of the principles of war in cyber fight. The general might be unclear
observation on the battlefield. In joint cyber operations. This increases the like- on what “Mimikatz” is or how it got
military operations, it is crucial to have lihood that physical domain warfighters through the firewall, but he will intui-
a set of common symbols familiar to will accept dangerous risks because they tively understand red arrows bypassing
all users. They are especially useful to have little conception of what is really his fortifications and driving deep into
establish a common understanding across happening on their networks. In many his cyber key terrain. Commanders will
a user population with widely varying ways, cyber units that are composed soon learn to discern which cyber-related
knowledge, experience, and Service back- predominantly of governmental civil- decisions are risky and which are not.
grounds. The Department of Defense ians and contractors resemble medieval The cyber battle, currently fought apart
(DOD) established the newest warfight- mercenary artillery companies—formed from the land-sea-air battle, must and will
ing domain via doctrinal guidance 8 to provide a necessary technical func- gradually be integrated into joint opera-
years ago, yet cyber warriors still lack a tion, but not really considered soldiers. tions as doctrine evolves.
coherent set of symbols that allow them As artillery became more powerful, Doctrine is the ultimate beneficiary
to convey the intricacies of cyber warfare new tactics followed, and artillerymen of cyber symbols that conform to a joint
to the joint warfighting community. The became co-equal members of the total standard. Cyber warriors already know the
inability of cyber warriors to easily express force. We are seeing the same evolution basic tactics to secure the battlefield, but
operational concepts inhibits the identifi- in cyber, as our technicians evolve into an inability to visualize the battle hampers
cation of cyber key terrain, development warfighters. creation of a nuanced flow of cyber com-
of tactics and strategies, and execution of Cyber organizations do not lack for bat. At the opposite end of the spectrum,
command and control. symbols and graphics—network diagrams Joint Publication (JP) 3-12, Cyberspace
DOD has a standard for joint military are ubiquitous—but these symbols do Operations, brought some order to cyber
symbology, MIL-STD-2525D, Joint not conform to joint warfighting doc- command and control, but the paucity
Military Symbology, which provides trine. A firewall needs to be recognized as of operational doctrine has left a gulf
a set of cyberspace symbols in an ap- a fortification. A honeypot is an ambush between the tactical and strategic. With
pendix. However, these symbols display site or a delaying obstacle in cyberspace. proper symbols, concepts can be devel-
cyber effects and network nodes only Scanning is reconnaissance, and networks oped, presented, understood, and evolved
in the physical domain and are unable are areas of responsibility. Cybersecurity by the joint community. Standards can be
to portray cyber warfare in the logical service providers (CSPs) and enterprise created—for example, how many defend-
and persona layers of cyberspace. The operations centers are cyber defense bat- ers are necessary for 50,000 accounts?
Institute for Defense Analyses provides talions, brigades, or higher. Offensive Basic military precepts such as tempo
analytical support for the director of cyber mission teams conduct raids, strike and attrition can be addressed in a cyber
the Operational Test and Evaluation targets, and execute active defense mis- context. Operational requirements can
sions using preemptive attacks. It is no be identified, and the systems and equip-
longer just the Internet; it is the battle- ment needed to meet that need can be
Colonel Erick D. McCroskey, USAF (Ret.), field. Militarizing cyber symbols will give acquired. For cyberspace to truly become
and Major Charles A. Mock, USMC (Ret.), are the cyber warrior insight into the parallel a warfighting domain, with all that entails,
Research Staff Members in the Operational
Evaluation Division at the Institute for Defense
and analogous activities performed in development of symbols that conform to
Analyses. other domains. joint standard is a necessary first step.

JFQ 85, 2nd Quarter 2017 McCroskey and Mock  43


Figure 1. Cyberspace Terrain Description: measured in “hops” between computers
Networks and Common Features rather than in kilometers—time and space
have different relationships and affect op-
Server depicted Workstation/client erational decisions differently than they do
Independent
Firewall limiting
as circles with Enemy-controlled networks
depicted as a square in the physical domain. Cyberspace terrain
specific function
entry through identified as
device shaded red separated by
“white space”
Multiple instances
representative of a much
is also changeable on short timescales. If
network boundary needed
depicted as a larger number across the you do not like how the enemy is using
entire network
fortification Service Network your terrain, you can simply change it by
Sub-domain
located “inside” its disconnecting from the network or shut-
CCMD HQ Network
Intrusion detection Subordinate Unit Network
parent network
ting down vulnerable devices. Because
system monitoring of the nature of cyberspace, the distance
network boundary
depicted as a
email DMZ
Different-colored email
server DMZ between, and the relative positioning of,
sensor string boundaries identify
unique independent networks has little
server
application web application
web server each unique network server server
server
meaning in operational graphics depic-
tions. However, the relationships between
Figure 2. Notional Cyber DOD information network operations networks, such as where one is a subdo-
(DODIN ops). When protected by a main of another, are important, so we
Credential Icons
firewall and monitored by intrusion- depict subdomains as existing completely
detection services at ingress points, a within their parent networks.
network becomes fortified and has a sen- Devices in cyberspace generally func-
User-level System-level Domain-level sor line; when guarded by cybersecurity tion simultaneously as terrain features on
credential with
privileges in
credential with
privileges in
credential with
administrator
service providers and local cyber defend- which forces maneuver and as installations
network identified network identified privileges across ers (as prescribed in DOD Instruction (which provide necessary supply, transpor-
by yellow boundary by purple boundary network identified
by green boundary 8530.01), it is analogous to the most tation, command and control, defensive,
common command and control area des- surveillance, or other warfighting func-
ignation: the operational area (OA). tions); thus, they have no clear analogies in
Terrain Graphics We choose to depict individual net- the physical domain. We adopt common
Terrain is the fundamental medium for works by the devices they comprise with network diagram symbols in simplified
military action, in cyberspace as well as a unique boundary line that represents form depicting an individual workstation
in the land, sea, and air domains. How the extent of the IP address space within or client as a square and a server as a circle.
terrain affects operations is different in it (see figure 1). For clarity, we typi- However, we depict two specialized de-
all domains. JP 3-12 divides cyberspace cally depict only sufficient numbers of vices (and the functions they perform) that
into three layers: the physical, logical, devices necessary to describe the planned are nearly always present in cyber battles
and persona. or observed cyberspace operations, or with unique symbols: the firewall is repre-
The physical layer is the hardware, lo- to convey understanding of the nature sented as a fortification, and the intrusion
cated in the physical domain, on which the of the terrain. For instance, if only one detection equipment and services are rep-
other two layers exist. The physical layer is device out of hundreds on the network is resented as a string of sensors.
not cyberspace terrain itself. Symbols for attacked, we may choose to show that de- Similar to its physical counterpart,
physical equipment already exist in MIL- vice alongside a half-dozen others, often a cyberspace OA can be secured, con-
STD-2525D and are not addressed here. with a note that the small number of tested, or captured. However, unlike in
The logical layer is where cyber ter- devices depicted is representative of many the physical domains, where control is
rain exists, and the primary cyberspace more. We also choose to use unique often contested but never truly “shared”
terrain feature is the network, a collection color-coded boundaries for each network during typical combat operations, cyber
of devices that implement applications, to enable quick understanding of the OAs can experience “dual control” when
services, and data stores. It is often gov- terrain because relatively few unique an adversary has gained credentials that
erned by Internet protocol (IP) ports networks are typically required to depict provide access to the terrain—servers, ap-
and addresses accessed through a router. a cyberspace battle and because alphanu- plications, and data stores—within the OA
Networks are the cyberspace equivalent meric designations defining the boundary without the defenders being aware of the
to areas of operations in the physical with “adjacent” areas, as is typically done compromise. This situation is analogous to
domain, and their very existence is provi- in the physical domain, make no sense. insurgency operations, in which a guerrilla
sioned by assigned Domain Accreditation However, a unique alphanumeric desig- unit operates clandestinely in the shadow
Authority, which issues policy guidance nation for a network could certainly be of the occupying unit. Actual capture of a
and exercises some degree of com- used as a label to identify its boundary. complete cyber OA is rare but can happen
mand and control over subordinate Cyberspace terrain is unique in that it when the elements of the physical layer fall
units within the mission category of is completely manmade, and distance is into enemy hands surreptitiously and the

44  Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
network identified
by green boundary

defenders do not realize that they ought to Figure 3. Notional Cyber Unit Icons
sever the connections between the OA and xxxx xxxx xxxx II
the rest of the network—a prime mission
c. e. h.
for special forces. Red shading represents a. 1st Cyber
Army
CYBERCOM CSP

devices that have fallen under enemy con- Ø II 2 CPTS 351 WG

trol in some way. In some instances, red b. d. f.


JFHQ-
shading may be used to represent enemy 17 Atk 4 BDE 23 CPT DODIN 10 BN 2 BDE
control over an entire network.
Key: a. Adversary headquarters (HQ); b. Adversary squad–level offensive cyberspace operations unit
with captured system admin credentials; c. U.S. Cyber Command HQ; d. Friendly Defensive
Persona and Credential Graphics Cyberspace Operations (DCO) unit with reconnaissance capabilities that has been granted domain
The persona layer is the means by which admininstration credentials/authorities; e. Friendly cybersecurity service provider HQ; f. Friendly DCO
unit; h. Friendly DODIN ops cyber unit
personnel and units operate in cyber-
space. JP 3-12 rightly asserts that the
cyber persona layer requires a higher
level of abstraction, but the publication
Figure 4. Notional Cyberspace Terrain Showing Boundaries,
introduces confusion when it states that Units, and Defensive Tasks
the persona layer consists of people actu-
ally on the network. People do not exist DODIN CCMD HQ Network
xxxx xxxx
Adversary Network  CCMD JFHQ-
in cyberspace, of course. Accounts and xxxx CSP DODIN
xxxx
their associated credentials (usernames, 1st Cyber
Army
75 CPT CCMD CSP
CYBERCOM

passwords, Common Access Cards, email


server
DMZ

personal identification numbers, and so web


server
application
server

forth) are the primary cyber entities that xxxx


Service Network
operators use to execute administrative II Service
CSP
actions, domain control, user activity, 17 Atk 4 BDE

printer access, or any number of func-


87 NWS 137 WG

tion-related activities. While we tend


Subordinate Unit Network
II
to think of accounts as being people, it Internet

is more logical to think of accounts in email DMZ


2 CPTS 351 WG

terms of cyber equipment used by oper-


server application
web server
server
ators existing in the physical domains. Cyberspace

For example, in the air domain, a pilot


(the operator) uses an F-22 (a piece
of equipment) to conduct a variety privileges. Adversary control of a user- not prescribe a unique frame to identify
of air superiority missions; similarly, a level account is damaging because it units when depicting operations solely
network user account is a piece of cyber allows the enemy to traverse the OA in in cyberspace (that is, the logical and
equipment that allows the operator to the guise of a friendly operator. An ad- persona layers). We adopt a regular
conduct email, use a Microsoft Office versary who gains credentialed access to hexagonal frame to depict units in
application, or communicate with other a domain administration account is able cyberspace. We use standard shading
accounts. The difference is that the to use the privileges associated with this conventions for friendly, neutral, hostile,
F-22 operator is physically paired with account to control all the key terrain—ac- civilian, and unknown standard identi-
his equipment in the air domain itself, counts, servers, data, and applications—in ties and rotate the hexagons by 30° to
whereas the cyber operator resides in that OA. Different key symbols reinforce depict hostile units (figure 3).
the physical domain (where the physical this point: yellow for user-level, purple Icons, defined in MIL-STD-2525D
layer of cyberspace exits) and conducts for system-level, and green for domain- as “the innermost part(s) of a symbol
his mission in the cyberspace domain via level privileges. A colored border around which provides an abstract pictorial or
the logical and persona layers, “looking the key indicates the domain or network alphanumeric representation of units,
in from the outside.” Cyber units thus to which the privileges pertain (see figure equipment, installations, activities, or
have a foot in two domains: the living 2). operations,” must necessarily represent
operators and physical layer hardware the unique nature of cyberspace units.
in one domain, and the mixed types of Unit Graphics Cyberspace personnel receive training
accounts, credentials cyber actions, and MIL-STD-2525D prescribes the use of for particular missions using specialized
missions in another. specific frames for icon-based symbols software, hardware, and network “equip-
Credentials are the keys to the cyber to depict the identities of units operat- ment.” However, the generally applicable
equipment and associated accesses and ing in the land, sea, air, space, and nature of the equipment, techniques, and
subsurface physical domains. It does

JFQ 85, 2nd Quarter 2017 McCroskey and Mock  45


Table. Adaptation of Tactical Task Graphics to Cyberspace
Tactical Task Operational Graphic Doctrinal Description* Potential Use in Describing Cyberspace Operations
Actions by Friendly Force
Attack by fire The use of direct fires, supported by indirect fires, Overt actions where an origination (or interim
to engage an enemy force without closing with the relay) point can be determined, such as distributed
enemy to destroy, suppress, fix, or deceive that denial-of-service attacks, broad intrusive scans,
enemy. where these actions create the intended effect on
the target.
Breach Break through or establish a passage through an Noncredential-based access (penetration through a
enemy defense, obstacle, minefield, or fortification. firewall, using an exploit or hacking tradecraft).

Bypass Maneuver around an obstacle, position, or enemy Credential-based access (use captured credentials
force to maintain the momentum of the operation for login).
while deliberately avoiding combat with an enemy
force.
Clear Remove all enemy forces and eliminate organized Comprehensive scans and forensics, removing all
resistance within an assigned area. malware and adversary points of presence and
external connections.

Control Maintain physical influence over a specified area to Standard cybersecurity mission to protect a
n/a prevent its use by an enemy or to create conditions domain, typically assigned to a cyber security
necessary for successful friendly operations. practitioner (CSP).
Counter- Provide early warning to the protected force. Detection activities on a boundary or domain.
reconnaissance
(Screen)
Counter- Protect the main body by fighting to gain time Domain-wide detection and hunt-type activities
reconnaissance while also observing and reporting information and by a cyber protection Team or local defensive unit,
(Guard) preventing enemy ground observation of and direct augmenting the capabilities of a CSP.
fire against the main body. Units conducting a guard
mission cannot operate independently because they
rely upon fires and combat support assets of the
main body.
Counter- Protect the main body by fighting to gain time Domain-wide detection, hunt, and reposturing of
reconnaissance while also observing and reporting information and defensive boundary controls by a CSP.
(Cover) preventing enemy ground observation of and direct
fire against the main body.
Exfiltrate Remove Soldiers or units from areas under enemy Movement of data from its original location to a
(No symbol exists. control by stealth, deception, surprise, or clandestine location under enemy control, typically by means of
Symbol shows the flow means. stealth, deception, or clandestine means.
of exfiltrated data, a
substantial deviation
from the existing
definition of this task.)
Occupy Move a friendly force into an area so that it can Deployment of a cyber protection team to a domain
control that area. Both the force’s movement to in advance of suspected adversary activity.
and occupation of the area occur without enemy
opposition.
Retain Ensure that a terrain feature controlled by a friendly Defense of a network device or domain to prevent
force remains free of enemy occupation or use. any adversary access.

Secure Prevent a unit, facility, or geographical location from Defense of a network device or domain to prevent
being damaged or destroyed as a result of enemy an adversary from making any changes to data or
action. functionality.
Seize Take possession of a designated area by using Gain control of a device, network, data, or
overwhelming force. credentials. In cyberspace, two opposing forces
may have simultaneous control of any or all of these
assets.
Support by fire A maneuver force moves to a position where it can Overt actions where an origination (or interim relay)
engage the enemy by direct fire in support of another point can be determined, such as distributed denial-
maneuvering force. of-service attacks, broad intrusive scans, and where
these actions are designed to set the conditions for
success for the primary attack actions.

46  Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
Table. Adaptation of Tactical Task Graphics to Cyberspace
Tactical Task Operational Graphic Doctrinal Description* Potential Use in Describing Cyberspace Operations
Effects on Enemy Force
Block Deny the enemy access to an area or prevent the Use or modification of blacklists, whitelists, access
enemy’s advance in a direction or along an avenue of control lists, routing policies, credentials (username-
approach. password pairs, or machine-issued), or filters on
Also an obstacle effect that integrates fire planning firewalls, domain name servers, domain controllers,
and obstacle efforts to stop an attacker along a Web servers, email servers, or others to prohibit or
specific avenue of approach or prevent the attacking terminate access based on specific criteria.
force from passing through an engagement area.
Canalize Restrict enemy movement to a narrow zone by Use of routing policies, honeypots/honeyports/
exploiting terrain coupled with the use of obstacles, honeynets, or other defensive techniques to direct
fires, or friendly maneuver. potential adversary traffic to desired network
locations.
Contain Stop, hold, or surround enemy forces or to cause Not strictly possible in cyberspace, since forces
them to center their activity on a given front and exist as a function of effort being expended.
prevent them from withdrawing any part of their However, could be used to indicate quarantine of
forces for use elsewhere. malware or emails.

Destroy Physically render an enemy force combat-ineffective Deleting all files from a server, flashing basic input-
until it is reconstituted. Alternatively, to destroy output system or firmware, or causing physical
a combat system is to damage it so badly that it damage to industrial control systems.
cannot perform any function or be restored to a
usable condition without being entirely rebuilt.
Disrupt Integrates direct and indirect fires, terrain, and Interrupting connections periodically, enforcing
obstacles to upset an enemy’s formation or time limits on sessions, or actions that require an
tempo, interrupt the enemy’s timetable, or cause enemy to repeat previous steps, upset an enemy’s
enemy forces to commit prematurely or attack in a tempo, interrupt the enemy’s timetable, or cause the
piecemeal fashion. enemy’s efforts to proceed in a piecemeal fashion.
Fix Prevent the enemy force from moving any part Not strictly possible in cyberspace, since forces
of that force from a specific location for a specific exist as a function of effort being expended, but
period. used to indicate actions that require an enemy
to focus effort to restore function (for example,
reboot a domain controller or data server following
an induced system crash); to expend much greater
effort than planned to obtain an objective (for
example, consuming attacker resources using
a realistic honeynet); or to refrain from using
capabilities for fear of detection (for example, refrain
from activating implants because of increased
random scans for active malware).
Interdict Prevent, disrupt, or delay the enemy’s use of an area Denial-of-network (data transport) services, or
or route. limiting access to services.
Isolate Requires a unit to seal off—both physically and Removal of a device infected with malware from the
psychologically—an enemy from sources of support, network, moving a phishing email from the server to
deny the enemy freedom of movement, and prevent a forensics sandbox.
the isolated enemy force from having contact with
other enemy forces.
Neutralize Render enemy personnel or materiel incapable of Any action taken against another cyberspace
interfering with a particular operation. unit that prevents it from using its offensive or
defensive capabilities (for example, interrupt
the sensor feeds from a target domain to the
responsible cyber defense unit).

* As described and depicted in various DOD sources, including MIL-STD-2525D, Joint Military Symbology, June 10, 2014; Field Manual (FM) 1-02/Marine
Corps Reference Publication 5-12A, Operational Terms and Graphics, February 2, 2010 (incorporating Change 1); FM 3-90-1, Offense and Defense, vol. 1,
March 2013; FM 3-90-2, Reconnaissance, Security and Tactical Enabling Tasks, vol. 2, March 2013.

core technical skills allows cyber person- engaging targets, occupying terrain) and equipment. Although cyber units
nel and units to perform diverse functions that are often required to execute typical may be equipped with specific “plat-
(for example, reconnaissance, identifica- missions, whereas units in the physical forms” and trained for unique missions
tion friend or foe, command and control, domain tend to have a more specialized at the lowest tactical levels, in general the
creating or modifying terrain features, set of functions based on their training diversity of the functions that cyber forces

JFQ 85, 2nd Quarter 2017 McCroskey and Mock  47


Figure 5. Sequential Actions in the Initial Adversary Assault: matures to the point that these can be
A Feint, Blocked Phishing Attack, Successful Bypass of Defenses useful in the planning and execution of
That Gains Control of Friendly Terrain battles and campaigns.

DODIN CCMD HQ Network xxxx xxxx Mission Graphics


Adversary Network
xxxx
3. email server sandbox quarantines
malware, 75 CPT places IP block

CCMD
CSP
JFHQ-
DODIN
Although some graphic control mea-
st
1 Cyber
75 CPT CCMD CSP
xxxx
sures used in the land domain (such as
phase lines, assembly areas, fire support
Army CYBERCOM

2. Mass phishing email DMZ


campaign with malware server
web application coordination measures, and check-
server
points) may not be useful in describing
server

Service Network xxxx


operations in cyberspace, others can
II
be readily adapted for the purposes of
Service
CSP
17 Atk 4 BDE

87 NWS 137 WG planning and maintaining situational


1. Distributed Denial of Subordinate Unit Network awareness. In addition to the potential
utility of adapting general offensive
Service (DDoS) attack – feint to II
support phishing campaign
Internet
2 CPTS 351 WG
graphics (axis of advance, direction of
attack), general defensive graphics (forti-
email DMZ
server 4. email bypasses server scan, user
application
web opens malware, server
fied line for firewall, sensor outpost for
LOC server
encrypted connection
Cyberspace established to adversary garrison

monitored intrusion detection device/


system), and supply graphics (main
are capable of prohibits unique catego- variation in their numbers of assigned supply routes or lines of communication
rization by unit type based on specific personnel and equipment, as well as for data flows), the traditional defini-
equipment or mission as is typical in the in their capabilities and “reach” (for tions of tactical mission graphics can be
physical domains (for example, infantry example, an infantry battalion may have modified to depict actions in cyberspace.
versus mechanized infantry versus armor 500 persons assigned and fight on a front Potential adaptations of these graphics
battalions, F-22 versus E-3 versus KC- of perhaps a half-mile in extent, while a to cyberspace are provided in the table.
135 squadrons). Instead, we use symbols fighter squadron may have 150 persons Other tactical tasks potentially use-
that identify cyber units based on which and 24 aircraft assigned and fight within a ful for describing cyberspace actions
of the three general mission categories 500-mile radius of its base). The variation were omitted from the table for the
from JP 3-12 they typically perform: of- between cyber and physical units within sake of brevity or because no associated
fensive cyberspace operations (OCO), the same echelon, however, tends to be operational graphic exists: control, coun-
defensive cyberspace operations (DCO), even greater. For example, a cyber bat- ter-reconnaissance (area security, local
or DODIN ops. A lightning bolt identi- talion or squadron primarily responsible security), disengage, follow and assume,
fies OCO units, a shield icon identifies for global detection and response efforts follow and support, defeat, and suppress.
DCO units, and existing support unit for an entire service network might have
iconography identifies DODIN ops units. 300 persons assigned. Additionally, there Putting It All Together
Cyber warriors often regard detection tend to be substantially fewer units at These basic building blocks allow por-
as the most critical of their tasks, and any given echelon within the total cyber trayal of cyber battles in a straightfor-
individual cyber units are often assigned force structure. We choose to adopt the ward manner and present the action to
“detect” as a priority mission and are existing echelon representation (used the joint warfighter in a familiar format.
specially equipped and trained to execute primarily in representing land force units) The symbol set is still small—units,
it. Cyber units performing the detect and apply it using the official designations terrain, command and control, attack
mission are depicted with a diagonal slash of cyberspace units, with cyber protec- vectors—but capable of providing
across the frame, similar to the use of a tion teams representative of the lower insights the commander needs for a
slash to denote “reconnaissance” capabili- echelons of friendly cyber forces typically rudimentary situational awareness of the
ties in the physical domains. portrayed, and U.S. Cyber Command as operational area. Combatant command
Cyber units are identified by the the top echelon. J6s already understand why firewalls and
echelon command level to which they be- Cyberspace commanders would sensors are ineffective once an adversary
long, just as units in the physical domain benefit from decision graphics show- has gained credentials through phishing
are, but the reader should take care when ing unit combat effectiveness, specific and poor password protection; battle
inferring echelon-level missions, capabili- platform equipment and capabilities, and maps with an attack arrow showing
ties, and resources, since these are not task organization composition, similar to an enemy task force masquerading as
directly comparable to units in the physi- those used tactically and operationally in friendlies and penetrating a fortification
cal domain. Physical domain units at the the physical domains, but we defer this to pass undetected through sensors
same echelon level can exhibit substantial level of detail until cyberspace doctrine provide the joint force commander with

48  Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
Figure 6. Subsequent Adversary Actions on Friendly Terrain: Seizing of Credentials,
Reconnaissance, and Lateral Movement Within and Between Networks
DODIN CCMD HQ Network xxxx xxxx
CCMD HQ Network xxxx

Adversary Network CCMD JFHQ-
xxxx CSP DODIN  9. Adversary
CCMD
xxxx establishes
CSP presence,
75 CPT CCMD CSP begins recon
1st Cyber
Army CYBERCOM

8 email DMZ
75 CPT
server CCMD CSP
web application
server server
17 Atk 4 BDE
DMZ
xxxx email
Service Network server
II Service
CSP application
17 Atk 4 BDE web
server server
87 NWS 137 WG

Ex Subordinate Unit Network


fil
II
Internet
2 CPTS 351 WG
6. Credential hash email DMZ
cracked off-line server application
web server
LOC server
Cyberspace

xxxx
Service Network
II Service
CSP 8. Adversary uses captured credentials
to access CCMD network and log in to
application server (detailed actions
omitted for clarity)
87 NWS 137 WG

Subordinate Unit Network II


5. User credential
hash captured by 7. Adversary establishes presence,
malware and exfiltrated recons network, captures and exfils
2 CPTS
system admin credential
351 WGfor application
C
LO servers

DMZ fil
email Ex
server application
web 17 Atk 4 BDE server
server

an understanding—an enormous red warfighters who are unfamiliar with the could potentially be implemented in
flag signaling risk to his mission—that technical details of cyberspace. Military cyberspace operational doctrine. For
has been missing from the cyber portion tasks, missions, and operations share instance, the doctrinal concepts of
of joint warfighting. commonalities regardless of the domain culmination and attrition that are criti-
Figures 4, 5, and 6 depict the in which they take place, and leveraging cal to operational campaign design and
progression of a notional battle in cy- warfighter familiarity with the common execution in the physical domains may
berspace, from the initial assignment language that has evolved to describe finally be examined fully for application
of defensive forces to their areas of them will enhance rapid understanding in the cyber domain. Ultimately, the
responsibility, followed by the attacker’s and decisionmaking. joint commander will have at his disposal
preparatory reconnaissance operations, The concepts presented here only a coherent body of operational doctrine
and culminating in the penetration of scratch the surface of an extremely large and the accompanying graphics that will
defenses and the attacker occupying de- problem. To date, there is little official enable him to understand, plan, and
fended territory and postured to conduct recognition that the cyber community fight the cyber battle. JFQ
follow-on operations. The astute reader should even conform to joint symbology
will notice the similarities to historical standards. Cyber symbols merit only 3
depictions of Civil War battlefields, which of the 885 pages of MIL-STD-2525D. The authors would like to extend their
appreciation to Robert Soule and Dr. Shawn
motivated the development of these If DOD intends to treat cyberspace as a Whetstone from the Institute for Defense
graphics to clearly depict complex, se- warfighting domain, then standards must Analyses for their continued support and
quential actions over extended durations. reflect that guidance. However, that is encouragement in developing these ideas, and to
Dr. J. Michael Gilmore, Dr. Kenneth M. Crosswait,
just the beginning. and Dan Burgess from Director, Operational
Conclusion Using operational graphics to de- Test and Evaluation, for recognizing the utility
Cyberspace operational graphics will scribe cyberspace actions should lead of cyberspace operational graphics, for their
insightful feedback, and for their continuing
allow cyber planners and operators to to the identification of parallels and challenge to us to improve the concepts.
convey mission-relevant information to analogies in the physical domains that

JFQ 85, 2nd Quarter 2017 McCroskey and Mock  49


Air traffic controller with 31st Marine
Expeditionary Unit communicates with pilot
of CH-46E Sea Knight helicopter with Marine
Medium Helicopter Squadron 262 (Reinforced),
31st MEU, during multilateral NEO exercise,
February 12, 2011 (DOD)

The Need for a Joint Support


Element in Noncombatant
Evacuation Operations
By George K. Dixon

he U.S. Government’s first duty even compel policymakers to alter A quintessential image from the

T is to protect and defend the


citizens of the Nation. Loss of
confidence in the government’s ability
strategic direction. Noncombatant
evacuation operations (NEOs) from
threatened areas overseas are therefore
Vietnam era is of U.S. helicopters plucking
people off rooftops amid the fall of Saigon
while panicked throngs of Vietnamese plea
and willingness to safeguard citizens an important strategic matter, particu- to get onboard. Another is the spectacle
can shift the public narrative and may larly in today’s world of viral videos of evacuation helicopters being pushed
and globalized travel. The military off the decks of U.S. warships and into
elements tasked on short notice to plan the sea. For many around the world, these
Colonel George K. Dixon, USAR, is a Battalion
and execute NEOs may not always fully images symbolize the failure and abandon-
Commander in the U.S. Army Reserve. appreciate these strategic implications. ment of U.S. strategy in Southeast Asia.

50  Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
Another low point for the United would still provide the bulk of forces, lift, during an evacuation.6 It establishes three
States were the images of blindfolded and planning within their areas of respon- policy objectives:
Embassy staff being held hostage by sibility (AORs).
•• protect U.S. citizens and designated
Iranian revolutionaries and of burned
other persons, to include their evacu-
U.S. rescue aircraft in the desert. The Policy, Doctrine, and Practice ation to relatively safe areas when
Iran hostage drama punctuated a crisis Diplomatic evacuation events occur
necessary and feasible
of confidence in political and military quite often. From 1988 through
•• minimize the number of U.S. nation-
leadership during the 1970s. The failed October 2007, the Department of
als subject to risk of death and/or
rescue attempt in April 1980 reinforced State conducted 271 authorized and
seizure as hostages
doubts about U.S. military capability and ordered departures from overseas
•• reduce to a minimum the number of
led to a complete reorganization of U.S. posts,3 an average of nearly one every
designated noncombatants in prob-
Special Operations. This contributed to 3 weeks. Embassy or State Department
able or actual combat areas so that
perceptions of strategic drift and mal- personnel carried out the vast majority
combat effectiveness of U.S. and
aise leading into the 1980 Presidential of these without military assistance.
allied forces is not impaired.
campaign. However, a mass evacuation or a hostile
President Ronald Reagan’s funda- security environment can overwhelm DOD Directive 3025.14,
mental theme was renewing confidence Embassy and State Department capa- “Evacuation of U.S. Citizens and
in America. He ordered the invasion bilities, leading them to call for military Designated Aliens from Threatened Areas
of Grenada, vowing not to “wait for assistance. Abroad,” provides further guidance on
the Iran crisis to repeat itself, only this Withdrawing American citizens and supporting State overseas evacuations. It
time, in our own neighborhood—the diplomats from a foreign location has reiterates that the primary responsibility
Caribbean.”1 Operation Urgent Fury weighty strategic and political repercus- for NEOs is with State and the diplomatic
evacuated 800 American medical stu- sions. An ordered evacuation signals an Chief of Mission. But DOD and all com-
dents and toppled a communist-aligned official U.S. Government determina- batant commands must plan and prepare
regime. Grenada advanced Reagan’s stra- tion that the host government can no contingency plans to support NEOs.
tegic objective to reverse the “Vietnam longer guarantee the safety of foreign Military-assisted NEOs are excep-
Syndrome”2 and rebuild the credibility nationals and that staying in place is no tional in that the U.S. Ambassador, not
of U.S. power. But Grenada also uncov- longer worth the risk. It could further the military commander, has responsibil-
ered serious gaps in the military’s ability undermine the host region’s economy, ity for the overall operation. Embassy or
to operate jointly, leading directly to stability, and legitimacy and may forfeit State Department personnel coordinate
the Goldwater-Nichols Department of the diplomatic, informational, military, overflight and landing clearances and des-
Defense Reorganization Act of 1986. and economic assets an American pres- ignate marshalling areas and safe havens.
Military-assisted NEOs occur in- ence maintained. But the military commander has respon-
frequently, but they carry enormous The Department of State is always the sibility for execution once military forces
diplomatic, military, and national strategic lead Federal agency for “protection or and equipment commence operations.7 A
consequences. Images of noncombatants evacuation of United States citizens and NEO is always a unity of effort situation
in danger are powerful, and the audience nationals abroad,”4 including the “evacu- with overlapping responsibilities requir-
is unforgiving. Doing NEOs successfully ation and repatriation of United States ing intense coordination.
is even more imperative in a fully global- citizens in threatened areas overseas.”5 Military-assisted NEOs generally also
ized, cellphone-enabled, viral-video world The senior U.S. diplomat in a country is a involve multiple Services and sometimes
where cameras are everywhere and im- Chief of Mission or Ambassador and is the coalition forces. The NEO joint force
ages spread instantaneously. personal representative of the President of typically will insert a ground security
To maximize the success of such the United States with extraordinary deci- element to control evacuation sites and
important missions, the Department of sion authority over all U.S. Government marshalling areas; move evacuees by land,
Defense (DOD) should create a new operations in their assigned country. water, or air to a temporary safe haven;
Joint Planning Support Element specifi- The Chief of Mission controls all U.S. provide sustainment, administrative pro-
cally for NEOs. Geographic combatant Government personnel in that country cessing, communications, and safety to
commanders (GCCs) could use this en- except those assigned to a GCC. Military the evacuees at the temporary safe haven
tity to augment their staffs during a NEO personnel at the Defense Attaché Office or follow-on destinations; and then either
event. This Joint NEO Support Element (DAO), Security Assistance Office, and repatriate American citizens to U.S. ter-
would coordinate the strategic and op- Marine Corps Security Guard detachment ritory or return them to the affected area
erational aspects of NEOs and provide are under the authority of the Chief of once the crisis is over. Embassy or State
subject matter experts. GCCs should still Mission, not the GCC. officials maintain overall responsibility
designate a NEO joint force commander A 1988 memorandum of agreement throughout all phases of NEOs, but the
to retain overall military control, and they describes how DOD will support State military must be prepared to step in at

JFQ 85, 2nd Quarter 2017 Dixon 51


Airmen from 86th Aeromedical Evacuation Squadron and Critical Care Air Transport team from Landstuhl Regional Medical Center load wounded Libyan
fighter onto civilian aircraft for transport to local German hospital, October 29, 2011, Ramstein Air Base, Germany (U.S. Air Force/Chenzira Mallory)

any point to maintain operations start to General purpose forces from any of the United Kingdom,11 Australia,12 France,13
finish. military Services may be tasked to execute and Canada14 each has its own established
Joint Publication 3-68, NEOs, typically on short notice with no NEO doctrine. The United States has
Noncombatant Evacuation Operations, prior preparation. mutual agreements with a number of
is the current joint doctrine for NEO An MEU also lacks the staff depth countries to evacuate each other’s desig-
operations. The main thrust of the publi- to handle operational- and strategic- nated persons in times of crisis. The Joint
cation is the tactical aspects of NEOs, but level coordination during a NEO event. NEO Support Element should build and
it also includes discussion of interagency These planning and coordination duties promote interoperability with the NEO
coordination, strategic communication, therefore default to the joint force com- doctrines, terminologies, and rules of
military deception, defense support to mander, GCC, or Service component engagement of potential mutual support
public diplomacy, information-sharing, staff. This is a problem because NEOs partners. Combatant commands are
geospatial intelligence, and use of psycho- require rapid response and focus, often unlikely to maintain the same familiarity
logical operations. while other operations are under way with all potential NEO doctrines, espe-
The Marine Expeditionary Unit elsewhere in the AOR. Assembling a cially from countries outside their AOR,
(MEU) is routinely trained and certi- new joint force headquarters (JFHQ) or leading to potential friction if multiple
fied for conducting NEOs in uncertain diverting GCC or Service component nations attempt evacuations concurrently.
or hostile environments.8 An MEU, if staff during a crisis may hinder operations
available, is the optimum tactical force. elsewhere or sidetrack the NEO. Case Studies
However, military-assisted NEOs often By its very nature, a NEO requires bi- Vietnam: Operation Frequent Wind,
occur at times and places where an MEU lateral coordination with the host nation. April 1975. The United States main-
is not nearby or available. Half of all mili- It frequently also becomes a multilateral, tained a large diplomatic presence fol-
tary-assisted NEOs over a recent 20-year allied, or coalition operation. The North lowing troop withdrawals from Vietnam
period were executed without an MEU.9 Atlantic Treaty Organization (NATO),10 in 1973. The American Embassy and

52  Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
DAO in Saigon were the largest of anarchy caused by civil war. Ambassador problematic. The Embassy had no secure
any foreign post. Tens of thousands James Bishop and a minimal Embassy link to the task force other than by dip-
of American citizens, U.S. Govern- staff remained into January hoping for an lomatic cable to Washington and then
ment employees, contractors, business Italian-brokered ceasefire.18 As the situa- relayed down through USCENTCOM.
people, and family members remained tion worsened, however, the Ambassador All radio traffic between the task force
in Vietnam. requested immediate evacuation. and Embassy went “in the clear.”
The situation across Southeast Asia Confusion and ongoing miscom- The flight crews had maps of
deteriorated rapidly throughout early munications between DOD, Ambassador Mogadishu from 1969 that did not show
1975. The U.S. Air Force and Marines Bishop, U.S. Central Command the location of the Embassy compound,
evacuated the U.S. Embassy in Phnom (USCENTCOM), and the NEO task which relocated during the 1980s. They
Penh, Cambodia, on April 12, 1975, in force caused problems throughout the had to circle the city for 20 minutes
Operation Eagle Pull 5 days before that operation. U.S. Naval Forces Central searching for the objective marked only
city fell to the Khmer Rouge. Meanwhile, Command (NAVCENT) was tasked to by a retired Marine waving a bedsheet.21
North Vietnamese army units invaded execute the NEO but was not monitor- The lead helicopters reached the
the South and by mid-April were closing ing events in Somalia. They got their Embassy just as gangs of looters were
on Saigon. first warning order on January 1 and about to breach the walls. It took perhaps
During April 1975, the United States received the execute order the next day. as long as 10 minutes to clear the landing
evacuated over 130,000 people by air and NAVCENT was unenthusiastic about zone and deploy into the compound.
sea in the largest NEO in history.15 U.S. committing significant forces, having Evacuation took place under sporadic
Ambassador Graham Martin, hoping to watched an earlier operation in Liberia gunfire as follow-on helicopters arrived.
negotiate a truce and reluctant to admit morph from a NEO into a protracted The evacuation control cell team was
failure or to cause panic, delayed final military reinforcement of the Embassy. cut from the mission, and the ground
Embassy evacuation as long as possible. NAVCENT assigned just two am- security team failed to fully search or
By the time he did request evacuation, phibious warfare ships to the operation. distribute the evacuees properly, resulting
16 North Vietnamese army divisions sur- They departed Oman, some 1,500 nauti- in one foreign diplomat almost getting
rounded Saigon, the airport was closed cal miles from Mogadishu, on January onboard with a loaded weapon. The mis-
by ground fire, and mobs of panicked 2. At one point the amphibious group sion safely evacuated some 281 people
civilians and communist “home guards” commander even ordered these ships to from 30 nations, including 8 ambassadors
filled the streets, making movement al- slow down to conserve fuel. Marines and and 39 Soviet embassy staff.
most impossible.16 Sailors onboard were instructed not to Lebanon: Israeli Invasion, July
Helicopter extraction was the only unwrap ammunition so it could be re- 2006. On July 12, 2006, Israel invaded
remaining option. During April 29–30, turned to contingency stocks later.19 Lebanon in response to Hizballah kid-
1975, Marine helicopters lifted 1,373 The Embassy’s emergency action plan napping two of its soldiers. The Israeli
American citizens and 5,595 Vietnamese was to evacuate from Mogadishu airport. military bombed roads, bridges, and
and third-country nationals from the But by January 2, roving bands of gun- airports, blockaded seaports, cut power,
U.S. Embassy compound in central men and runway damage closed the and jammed cellular service, all of which
Saigon and the DAO compound at Tan airport. Fixed-wing evacuation attempts created a mood of panic. This unantici-
Son Nhut airport. U.S. casualties in- by the Italians, French, and Soviets all pated event triggered one of the largest
cluded two Marines killed by indirect fire failed. By then, ground movement to the multinational NEO events in recent
and two aircrew lost at sea. As the official harbor was dangerous, and security near history. The scale, scope, and abruptness
after action report noted: “Trying more the Embassy was rapidly deteriorating. of the crisis overwhelmed the Embassy’s
attractive options may result in execution Diplomats from several nearby foreign ability to manage the evacuation.
decision being delayed until a worse case embassies began sheltering at the U.S. The State Department requested
situation has developed.”17 compound. DOD assistance on July 14. Evacuations
Mogadishu, Somalia: Operation Early on December 5, while still began with a limited helicopter extrac-
Eastern Exit, January 5–6, 1991. 500 nautical miles away, the task force tion on July 16 and continued through
Operation Eastern Exit took place during launched an initial flight of two CH-53 August 2.22 The United States evacuated
Operation Desert Shield and just 2 weeks helicopters carrying a ground security 15,000 Americans from Lebanon. Other
before the launch of Desert Storm. This team. The ground team was hastily nations also evacuated thousands of
created some complications. Military reorganized and cut to 60 men to save their citizens: Canada (15,000), France
forces in theater were concentrated in the space and weight.20 The inbound flight (14,000), Sweden (8,400), Germany
Persian Gulf and focused on preparing for required two air-to-air-flight refuelings to (6,300), Australia (5,000), Denmark
major combat operations. reach Mogadishu. (5,800), United Kingdom (4,600), and
Most Westerners fled Somalia by Communications between the Brazil (2,950).23 The massive numbers
late December 1990 due to the violent task force and Embassy were highly of evacuees and the breadth of countries

JFQ 85, 2nd Quarter 2017 Dixon 53


Mock NEO participants aboard USS Germantown, with embarked elements of 31st Marine Expeditionary Unit, Sattahip, Kingdom of Thailand, February 12,
2012 (U.S. Navy/Johnie Hickmon)

involved reflect globalization, with ever- Cypress or Turkey. Lebanon is within hotels, catering, and ground transporta-
increasing population mobility and dual the USCENTCOM AOR, but Israel, tion were soon overbooked. DOD had
nationalities. Cypress, and Turkey all fall under U.S. to construct an emergency tent city and
Initially there were no U.S. Navy European Command (USEUCOM). bring in additional forces and logistics for
ships in the eastern Mediterranean This required continuous coordination life support. U.S. evacuees flowed into
and the closest MEU was in the Red between combatant commands. Cypress faster than State could charter
Sea, 6 days away by ship. Airlift was in The U.S. Embassy and the State flights for them back to the United
heavy demand for ongoing operations Department in Washington had even States, which forced DOD to also man-
in Iraq and Afghanistan. However, bigger coordination challenges. State age repatriations.25
U.S. Transportation Command planners kept attempting to reserve Japan Earthquake: Operation
(USTRANSCOM) used its contracting commercial aircraft and ships, at times in Pacific Passage, March 2011. Following
channels to procure a commercial pas- direct competition with USTRANSCOM the massive earthquake in Japan on
senger ship to transport evacuees from and allied countries.24 State headquarters March 11, 2011, DOD authorized
Beirut to Cypress. The vast majority of in Washington restricted the Beirut a voluntary return of military family
Americans evacuated by sea between July embassy from talking directly with the members and DOD civilians to the
19–25 using contracted commercial ships media. Meanwhile, the department did United States. U.S. Northern Command
and then U.S. Navy and Marine Corps not communicate effectively with evacu- (USNORTHCOM) led the repatriation
vessels. ees, family members, or the media. This effort, which flew more than 7,800 DOD
Israel had blockaded the coastline, created delays and miscommunications noncombatants and their pets out of
and all ground movement and port that worsened the panic and confusion. Japan. Since this was a DOD-only evacu-
operations had to be cleared with the Cypress was used as a temporary safe ation, it was a rare instance of civilian
Israeli military. Evacuation also had to haven by several other Western countries. evacuation and repatriation conducted
be coordinated with Lebanon and either This was the height of tourist season. All

54  Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
entirely by the military without State Pegasus), and France. Operation •• Ambassadors and the State Depart-
Department participation. Deference also included multinational ment will defer requesting military
Although Pacific Passage was contributions by Romania, Kuwait, assistance as long as possible. By the
completed successfully, it uncovered is- Ireland, Spain, and Austria. time they do, the range of options
sues that could have been problematic The newly created U.S. Africa will be narrow.
under different circumstances. DOD’s Command (USAFRICOM) led JTF- •• GCCs may struggle to devote
computer database used to track non- OOD and then transitioned it to NATO resources to NEO, particularly if
combatant evacuations (NEO Tracking control. USAFRICOM’s intended they are already committed on other
System, or NTS) did not interface with mission was regional stability and en- operations.
the passenger manifesting system used gagement, not warfighting or JFHQ •• Communications, shared situational
by Air Mobility Command.26 Nor did operations. Their headquarters staff was awareness, and trust between the
NTS include all fields required for U.S. 50 percent civilian and lacked the depth Embassy and the NEO force will be
customs clearance. Pacific Passage was the to sustain a 24-hour tempo.28 Although untested or absent.
first real-world test of NTS. Operators Libya is within USAFRICOM’s AOR, •• Mission scope often expands
were able to work around the problem the forces involved and staging bases were into longer duration repatriation
by using manual processes and rekeying from USEUCOM or USCENTCOM. operations or resettlement duties and
data into multiple systems. However, USAFRICOM relied heavily on spills across combatant command
these flaws increased workload and delay. USEUCOM, NATO, and Arab League boundaries.
In a larger emergency, these glitches coalition partners for support. •• Globalization and modern technol-
could have resulted in passengers not The decision not to attempt a military ogy put more Americans in more
being tracked or appropriately screened rescue of U.S. Ambassador Christopher places with more connectivity than
or being misrouted. DOD has programs Stevens from Benghazi, Libya, on ever before.
under way to correct these issues. September 11, 2012, remains a topic •• Public attention is notoriously short,
USNORTHCOM’s estimates and of ongoing partisan arguments and ac- but if an incident resonates emotion-
plans only encompassed repatriation and cusations. Four Americans, including ally, it can sway policy, politics, and
onward movement to the continental Ambassador Stevens, died in an attack on perceptions dramatically.
United States. However, many evacuees the Benghazi compound. Controversy
went to destinations in the U.S. Pacific continues over whether military assistance
Command AOR. The units running the would have been possible and over who
The Need for a Standing
Joint Reception Coordination Center had made that determination.
Joint Capability for NEO
A Joint Support Element specifically
never trained in NEO or NTS and had to Another controversial decision was
organized for NEOs could provide
learn on the job. Because Pacific Passage not to evacuate private U.S. citizens from
immediate capability and a foundation
was a completely DOD-run event, it by- Yemen. The U.S. Embassy evacuated in
of expertise to support or augment
passed normal state and Federal agencies February 2015. An undetermined num-
GCC staffs during a NEO contingency.
that ordinarily handle repatriation and ber of U.S. citizens were left to remain
I propose that DOD create a Joint
reception of evacuees. or find their own way out.29 Several other
NEO Support Element (JNSE) to
The Arab Spring Uprisings and nations, including India, China, Pakistan,
provide a rapidly deployable joint plan-
Their Aftermath: Libya (2011, 2012), and Somalia, did evacuate their citizens.
ning team specifically focused on NEOs.
Yemen (2015). The Arab Spring move-
Marine Expeditionary Units remain an
ment that began in December 2010 Lessons Learned ideal tactical force to execute NEOs
demonstrated a controversial shift in U.S. Military-assisted NEOs will always be
when available. Geographic combatant
policy. In Libya and Yemen, the United a unique and complex tactical, opera-
commands should retain ownership for
States decided not to attempt evacuation tional, and strategic mission. Despite
NEO contingency plans in their AOR.
or did so only after allied NEOs were this, a NEO is something most head-
What a proposed JNSE could provide
already under way. quarters and units historically have just
is specialized NEO planning and
Joint Task Force Odyssey Dawn “muddled through.” Every NEO has its
coordination expertise that is deploy-
(JTF-OOD) included a multinational share of unique problems, and so far the
able worldwide and has reachback to
evacuation from Libya and Tunisia in United States has avoided a repeat of
Washington.
March 2011. By then, however, most the 1970s experiences. But it only takes
The ideal structure for such a JNSE is
Americans had already left. Several one disaster to rewrite the strategic
under USTRANSCOM as part of Joint
NATO countries conducted NEOs in narrative.
Enabling Capabilities Command (JECC),
February that evacuated Americans.27 We should expect a few recurring
which was formed in 2008 as a result of
These included the United Kingdom challenges in any future NEOs:
past lessons learned from contingency
(Operation Deference), Canada
operations and the Millennium Challenge
(Operation Mobile), Germany (Operation

JFQ 85, 2nd Quarter 2017 Dixon 55


Marines and Sailors with Special-Purpose Marine Air-Ground Task Force Crisis Response help U.S. citizens into Marine Corps KC-130J Hercules airplane in
Juba, South Sudan, during evacuation of personnel from U.S. Embassy, January 3, 2014 (U.S. Marine Corps/Robert L. Fisher III)

2002 wargame. There was often a trou- humanitarian assistance/disaster relief as militaries that might be involved in a
blesome lag at the outset of a crisis before well as NEOs would dilute their focus, NEO. This could enhance interop-
a JFHQ could assemble and ramp to full training, and deployable manpower. erability, build trust, and provide
operating capability. History suggests commanders will pri- reachback capability during a crisis.
The existing JECC provides fast-de- oritize other missions at the expense of •• The JNSE could also liaise with
ploying joint headquarters staff elements NEOs. The JNSE could also be based other governmental agencies at
to provide a nucleus for a contingency closer to Washington, DC,where it could Federal, state, and territory levels
JFHQ.30 Currently, there are three sub- access State, other U.S. Government who share responsibility for repatria-
ordinate commands under the JECC: the agencies, and foreign embassies. JPSE is tion and reception of Americans back
Joint Planning Support Element (JPSE), located several hours away in Norfolk, to the homeland. This includes the
Joint Public Affairs Support Element, and Virginia. Department of Health and Human
Joint Communications Support Element The new JNSE could address the fol- Services and other entities with
(JCSE). The JNSE would become a lowing concerns: which most GCCs would not rou-
fourth element of JECC. tinely interact.
•• It could increase GCC staff capabili-
The role of the new JNSE would •• JNSE would serve as the subject
ties quickly. This would preserve a
be similar to the existing Joint Planning matter expert on NEOs to refine and
focus on the NEO even during situ-
Support Element. However, rather than share doctrine, techniques, tactics,
ations where multiple simultaneous
expand the JPSE’s mission set, a similarly procedures, and situational aware-
operations are unfolding in the AOR
structured but separately organized JNSE ness. They could develop exercises
or the GCC staff is overloaded.
is needed. NEOs often arise concurrently and training for military units,
•• JNSE staff could cultivate ongoing
with other crises that require their own Embassies, the State Department,
professional relationships and liaise
joint planning support. Tasking JPSE to and allies.
with all the combatant commands,
prepare for combat contingencies and
State Department, NATO, and allied

56  Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
Perhaps the most important strategic
14
Non-Combatant Evacuation Operations,
B-GJ-005-307/FP-050 (Ottawa, Canada:
purpose for a JNSE will be to demon-
strate a concrete U.S. commitment to
Department of National Defence, 2003). New from
15
Ibid.
prepare for evacuating American citizens 16
Ibid. NDU Press
anywhere, at any time, if necessary. This 17
Ibid., 70. for the Center for Strategic Research
could be especially important in today’s
18
Adam B. Siegel, “Eastern Exit: The Non-
Strategic Forum 298
combatant Evacuation (NEO) from Mogadi-
environment of globalization, instant Cross-Functional Teams in Defense
shu, Somalia, in January 1991,” CNA Research
communication, and extremist groups Memorandum 91-211 (Alexandria, VA: Center Reform: Help or Hindrance?
using ultraviolent propaganda footage. for Naval Analyses, October 1991). By Christopher J. Lamb
The strategic consequence of a disastrous 19
Ibid. There is
evacuation or hostage situation could
20
Ibid. strong bipar-
21
Ibid.
linger for decades. JFQ tisan support
22
GAO, U.S. Evacuation from Lebanon,
Report 07-893R (Washington, DC: GAO, June for Section
7, 2007). 941 of the
Notes 23
World Reach Market Research Series, Senate’s ver-
“Lebanon Evacuation Summary,” June 7, sion of the
1
Ronald W. Reagan, “United States 2007.
National
Casualties in Lebanon and Grenada,” remarks 24
Ibid., 5.
to military personnel, Cherry Point, NC, No- 25
Ibid., 6. Defense
vember 4, 1983. 26
Jeff Corthell and Chris Faith, presenta- Authorization Act for 2017, which
2
Ronald W. Reagan, “Peace: Restoring the tion slides from the Pacific Passage NEO Track- requires the Pentagon to use cross-
Margin of Safety,” speech, Veterans of Foreign ing System Conference, August 8–9, 2011, functional teams (CFTs). CFTs are
Wars Convention, Chicago, IL, August 18, available at <www.jllis.mil>.
a popular organizational construct
1980. 27
Tim Ripley, “Western Militaries Conduct
3
U.S. Government Accountability Office NEO Missions Out of Libya,” Jane’s Defence with a reputation for delivering bet-
(GAO), State Department: Evacuation Plan- Weekly, March 4, 2011. ter and faster solutions for complex
ning and Preparations for Overseas Posts Can Be 28
Joe Quartararo, Sr., Michael Rovenolt, and rapidly evolving problems. The
Improved, GAO Report 08-023 (Washington, and Randy White, “Libya’s Operation Odyssey Department of Defense reaction to
DC: GAO, October 19, 2007). Dawn: Command and Control,” PRISM 3, no.
the bill has been strongly negative.
4
Executive Order 12656, 3 C.F.R., “As- 2 (March 2012), 151.
signment of Emergency Preparedness Responsi- 29
Smitha Khorana and Spencer Acker- Senior officials argue that Section
bilities,” November 18, 1988. man, “Americans in Yemen Fear They Have 941 would “undermine the author-
5
Ibid. Been Left Behind as Bombing Escalates,” The ity of the Secretary, add bureaucracy,
6
Memorandum of Agreement Between Guardian, April 1, 2015. and confuse lines of responsibility.”
the Departments of State and Defense on the 30
U.S. Transportation Command, Joint
The Senate’s and Pentagon’s dia-
Protection and Evacuation of U.S. Citizens and Enabling Capabilities Command (JECC), “His-
Nationals and Designated Other Persons from tory of the JECC,” available at <www.jecc.mil/ metrically opposed positions on the
Threatened Areas Overseas, July 1998. About/BriefHistory.aspx>. value of CFTs can be partially recon-
7
Ibid. ciled with a better understanding of
8
Joint Publication 3-68, Noncombatant what CFTs are, how cross-functional
Evacuation Operations (Washington, DC: The groups have performed to date in
Joint Staff, November 18, 2015).
9
Army Technical Publication 3-05.68,
the Pentagon, and their prerequi-
Special Operations Noncombatant Evacuation sites for success. This paper argues
Operations (Washington, DC: Headquarters there is strong evidence that CFTs
Department of the Army, September 30, could provide impressive benefits if
2014), table 6-1. the teams were conceived and em-
10
North Atlantic Treaty Organization
(NATO) Doctrine Standardization Document
ployed correctly.
AJP-3.4.2, Allied Joint Doctrine for Non-
Combatant Evacuation Operations (Brussles:
NATO, March 2007).
11
Joint Doctrine Publication 3-51,
Non-Combatant Evacuation Operations, 2nd
ed. (London: United Kingdom Ministry of
Defence, February 2013).
12
Australian Defence Force Publication
3.10, Evacuation Operations (Canberra: Austra-
lian Defence Headquarters, 2004).
13
Joint Doctrine JD-3.4.2, Non-combatant
Visit the NDU Press Web site for
Evacuation Operations (No. 136/DEF/
more information on publications
CICDE/NP) (Paris: Joint Centre for Concepts,
at ndupress.ndu.edu
Doctrines, and Experimentations, July 2009).

JFQ 85, 2nd Quarter 2017 Dixon 57


Airmen from New Jersey Air National Guard’s
177th Security Forces Squadron and local law
enforcement officers move toward sound of
gunfire, October 24, 2014, during active shooter
exercise at Atlantic City Air National Guard Base,
New Jersey (U.S. Air National Guard/Matt Hecht)

Policing in America
How DOD Helped Undermine Posse
Comitatus
By Steven C. Dowell, Jr.

ith the recent events of police follow—aptly, to protect and to serve. you’re pro-police, then you surely hate

W shootings and domestic ter-


rorism, many are calling into
question whether our law enforcement
Claims of lingering societal racism and
police brutality are under constant
scrutiny by social and police reform
black people.”3 But why should this
concern the Department of Defense
(DOD)?
strategies are standing up to the ideals activists and media coverage.1 Other At some point, the image of civilian
that police everywhere are known to studies state these claims are myths police changed from the popular public
being reported daily as facts and are, servant, such as Sheriff Andy Griffith
sadly, finding their way into changing of the 1960s’ The Andy Griffith Show,
public policy.2 Tension between these to the strict enforcer of the law, as por-
First Lieutenant Steven C. Dowell, Jr., USA, is arguments was succinctly stated best trayed in the movies RoboCop (1987)
currently training to become a Civil Affairs Officer
at the John F. Kennedy Special Warfare Center
as “if you’re pro–Black Lives Matter, or Judge Dredd (1995). Today, civilian
and School at Fort Bragg, North Carolina. you’re assumed to be anti-police, and if police agencies’ capabilities and mindsets

58  Features / Policing in America JFQ 85, 2nd Quarter 2017


are intimately related to DOD training When military personnel supplied their Beginning with structure, research-
and resourcing. Recent questions over utilities in aid of law enforcement, civilian ers who study civilian policing versus
similarities between civilian police and police units found it hard to ignore those militarized policing claim that there
the military involve the use of a robot units’ methods given their effectiveness is beginning to be a “blurring of the
and explosives to end a standoff between in locating a sniper’s “point of origin,” boundary between policing and soldier-
a shooter and Dallas police after several just as the military was trained to do in ing.”13 As mentioned, civilian police
officers were murdered in July 2016. combat scenarios; however, if the sniper organizations receive an ever-increasing
This event grasped national headlines was found, it was expected that the civil- number of tactics and ideologies from
just as the 1992 Los Angeles riots did, ian police would make contact.9 In fact, it the military. This training includes,
and again, in 2005, during Hurricane was found that “aerial photographic and but is not limited to, weapons ma-
Katrina.4 In fact, these instances have visual search and surveillance by military nipulation in high-stress environments,
taken place in a variety of forms since personnel [did] not violate the Posse low-visibility and urban tactical opera-
the late 1960s and early 1970s.5 Two Comitatus Act.”10 tions, counterterrorism operations, and
thoughts come to mind. First, during all In times of great civil need the intelligence-gathering operations. Former
these events that involved either military military’s logistical capabilities, not to Servicemembers have started their own
cooperation or equipment, the Posse mention manpower and leadership sup- weapons training curricula or have been
Comitatus Act must have been a topic port, are almost too invaluable for civilian hired by civilian weapons training acad-
of conversation. If so, and after so many police not to utilize. This was the issue emies, such as those offered by Magpul
instances, civilian police and DOD have particularly in the Katrina aftermath when Core, which offer courses that teach mili-
supposedly found an acceptable balance “[many] police officers actually turned in tarily developed techniques.14 Some of
between these civil events and military their badges so to speak and just walked these courses are offered both to law en-
intervention. In contrast, however, this off of the job,” in which the “National forcement and current military members.
article argues that the militarization of a Guard was the quickest response force Civilian police take this training back to
civilian police force undermines the Posse that the government could provide to fill their agencies and then train each other
Comitatus Act, and DOD’s equipment, that void.”11 Civilian police organizations, on the methods.
training, and transitioning personnel have even those not in the midst of a disaster One not-so-recent change in police
fueled this evolution for decades. relief effort, understand the expanded work involves the use of military-grade
capabilities that the military provides weapons by police across the Nation. In
The Posse Comitatus Act where civilian police in turn attempt to addition, police are also given ballistic
and Police Militarization recreate these same aspects and features protection that is able to stop projectiles
In general, the Posse Comitatus Act’s within themselves. This militarization fired from similar weapons in an effort
intent is that the “military is currently could be what is causing reform activists to defend against violent criminals and
prohibited by Federal statute from to speculate that we are “going too far.”12 provide the ability to fight back against
participating in domestic law enforce- That implies that we are superseding the ever-evolving, capable criminals and ter-
ment.”6 This act was established in original intent of the Posse Comitatus rorist threats. It is reasonable to want law
1878 and allowed lawmakers to sanc- Act by simply transitioning military styles, enforcement officers to have the most
tion those who “willfully use members skills, technology, and tactics to civilian reliable and effective equipment, but are
of the Army or Air Force to execute police officers. While we are not allowing we attempting to focus on officer surviv-
the laws” of the United States.7 These the military to wear a badge, we are al- ability or are we trying to win in a combat
instances do occur in modern times, lowing those with badges to don combat environment? Arguments can be made
but parties disagree on how lawful their helmets—and the mentality that comes that both are occurring and are necessary.
usage is versus their effectiveness toward with it. The procurement of such gear pressed
the enforcement of the law. When a civilian police force wields the Barack Obama administration, both
One specific example would be the military equipment, it requires train- in rhetoric and in executive action, to
Washington, DC, Beltway sniper attacks, ing. This training includes a combat prohibit the sale of “military-style equip-
which occurred from October 2 to 24, mindset—an ingredient that may be ment from the Federal government to
in 2002. Two individuals systematically more powerful than any assault rifle. The civilian police.”15 But not all equipment
committed 10 murders and 3 near-fatal change of character and personality that a procurements are being used to fight
attacks in the National Capital Region via civilian police officer experiences through crime. Civilian police are also using mili-
the use of a Bushmaster XM-15 rifle. The militarization may alter his or her percep- tary vehicles to aid in rescues and natural
3-week spur of attacks solicited heavy tion of what a public servant’s purpose disaster relief efforts, but opinions on
national media coverage. This “led to the truly is. In this case, the civilian police are usefulness in the civilian police commu-
enlistment of military aircraft and crews transforming into quasi–military police, nity differ.16
to search the Maryland and Virginia sub- and with that comes a unique area of self- With this equipment and training,
urbs of Washington for the gunmen.”8 identity that drives that behavior. civilian police are continually developing

JFQ 85, 2nd Quarter 2017 Dowell 59


Security forces members from Oregon Air National Guard’s 142nd and 173rd fighter wings train together during door-to-door search at training village in
Warrenton, Oregon, during exercise Cascadia Rising, June 10, 2016 (U.S. Air National Guard/John Hughel)

specific teams more specialized than Some have suggested that the Central In the U.S. Armed Forces,
the easily recognizable Special Weapons Intelligence Agency originally developed Servicemembers are taught to follow all
and Tactics (SWAT) teams developed many of these practices for Agency oper- the orders of the officers appointed over
in the late 1960s. A quick online search atives.17 These tactical training regimens them and the orders of the President of
will find units that range from the U.S. involved techniques such as counter- the United States as long as they are legal,
Border Patrol Tactical Unit, Federal surveillance, identifying dead drops, and moral, and ethical. This is a militaristic
Bureau of Investigation’s National Joint eluding law enforcement. These tactics hierarchy of control and is enforced by
Terrorism Task Force (NJTTF), U.S. have good intent behind them, but the the chain of command. This same chain
Marshal’s Special Operations Group, fact that their roots come from “espio- is replicated in part in civilian police orga-
U.S. Department of Energy’s Special nage” and “special operations” should nizations. For a police officer to advance
Response Team, to the U.S. Park be a concern for the average citizen. in the hierarchy of the department, “the
Police SWAT team, among numerous Moreover, civilian police attend train- policeman must exhibit behavior indica-
other state and local tactical/assault ing with military members, sometimes tive of a ‘relatively unquestioning belief
teams. Interestingly, the NJTTF has through formal joint training events in and acceptance of the organizational
Active-duty military liaisons specifically or by chance encounters at a local gun system.’”18 The same could be said for
provided by the U.S. Army Criminal range or civilian training academy, and the U.S. military. If Servicemembers do
Investigation Command—a division of adapt the methodologies learned and not adapt to the doctrine and culture
the U.S. Army Military Police Corps. bring them back to their home police of their unit, then they will likely not
These teams are jointly using practices departments. These militaristic mindsets progress within the ranks. Many civil-
learned by their parent agencies decades carry over when Servicemembers com- ian police are no different. This is what
ago from their military mentors, if municate these same military principles two researchers call the “quasi-military
they are not still learning them today. to civilian police officers. command model.”19 Civilian police

60  Features / Policing in America JFQ 85, 2nd Quarter 2017


departments that do indeed practice this take the time to get to know their “appearance” of militarized policing dis-
leadership model demonstrate behavior patrol areas’ citizens better, talk to them mantles any trust a community may have
that is naturally derived from the Armed about their daily lives, and take note of with its police force.
Forces. This traditional practice in the urban issues that the city can solve, this
military does produce an efficient style would result in the citizens of that area Possible Solutions
of mission execution, and this command being more apt to report crimes and to Eliminating Posse Comitatus.
model is effectively used with all other assist the officers in helping to reduce The Posse Comitatus Act has several
aspects of the military’s operational and solve crimes. Police usually reduce good intentions, but in recent times the
specialties. This may be giving civilian the amount of time in patrol vehicles act has been described as “archaic.”26
police officers, including some civilian and increase the use of bicycles or the Additionally, any military response today
police who are also retired military, a false frequency of foot patrols. Some pro- is usually complicated and difficult to
sense of militaristic purpose. This goes grams resulted in the resident citizens work through solely due to the act’s own
deeper into the personal identity of the of the targeted areas feeling as though bureaucracy; thus a solution could quite
individual civilian police officer, and how their police force was “more hospitable possibly be to eliminate it.27 This action
he or she sees themselves working within than central police [traditional patrol would favor civilian police as it would
the community. officers]” and thus the citizens’ levels widen the path the military is already
This militarization of police depart- of contentment were increased.22 They on in assisting law enforcement. While
ments may be having a negative effect on felt as though their rights had been pro- civilian police would still interact with
police officers’ self-defined job descrip- tected, and they were more concerned civilians on a daily basis, the military
tions as they “began to confuse the role of about fighting crimes by assisting law would theoretically still only ever need
police officers with a [S]ervice orientation enforcement rather than shunning to be deployed in times such as crises of
with that of military personnel engaged in police and fearing that their own rights either natural or manmade events, but
a domestic war.”20 This may point toward were being sacrificed. could also be used more quickly in law
the militarization of civilian police that, In contrast, there have been examples enforcement capacities when needed. The
in turn, creates concern for opponents where community policing was the intent repeal of the act would likely necessitate
of these changes. Despite the Posse but, based on witness accounts, appeared a lengthy congressional action to draft
Comitatus Act, which protects us from to have a negative effect. In Richland and approve, but to maintain the current,
the use of Active-duty Servicemembers County, South Carolina, between 2005 loose balance between militarization and
against our citizens, we may have by- and 2007, the sheriff’s department at- civilian policing, a recommendation could
passed this act all together simply by tempted to integrate community policing be to adopt a system more closely related
recreating soldiers in the civilian sector of while still maintaining a standard of to that of France.
law enforcement. While our civilian police militarized policing. Community Action On November 13, 2015, France
forces are transforming to adapt to new Teams (CATs) were developed in order suffered the deadliest attacks on its soil
threats, they are sacrificing significant per- to meet with citizens and community since World War II when 130 innocent
spectives of Service orientations and the leaders in an effort to gain intelligence people were killed in Paris by Islamic
community openness that goes with it. on illicit drug networks. However, after extremists. Given the complexity and le-
meeting with community leaders and thality of the attacks, the French response
How Communities citizens during the day, the people who began from a disadvantage. Numerous
View This Change made up the CATs would coordinate issues already existed with French police
Among U.S. citizens, 65 percent of and execute counterdrug operations in structure, such as a lack of history of
Americans admit that “police officers the form of surveillance and raids during community policing and a tradition of
have a very dangerous job” and, despite the night.23 This method of community highly centralized decisionmaking.28
conflicts between both sides of the policing, swiftly followed by militarized However, while their immediate response
argument on how policing should counterdrug operations, unraveled the has been criticized for lacking sufficient
be conducted, as many as 58 percent concept of community engagement, firepower and coordination, the results
state that they themselves “show too and citizens began to lose trust in their were surprisingly successful as local civil-
little respect for police officers these civilian police. Soon, CATs were avoided ian police effectively contained terrorists
days.”21 Over the last 25 years, a altogether by citizens.24 Incidentally, the only minutes after their initial attacks.29
popular method called “community county sheriff at the time, Sheriff Leon France’s police structure is completely
policing” has attempted to create a Lott, was an institutionalized and trained nationalized and is broken down into
mutual support effect on the fear of Military Police officer with additional ties two police forces: the Police Nationale,
crime, and thus on the overall welfare to the special operations forces commu- essentially representing the civilian po-
and satisfaction of the citizens of a nity.25 Even without concrete statistics on lice, and the Gendarmerie Nationale,
neighborhood. In general, community the effectiveness of Community Action essentially representing the military.30
policing has a basic idea: if the police Teams, it can be argued that even the When the attacks occurred, it was the

JFQ 85, 2nd Quarter 2017 Dowell 61


civilian police force that responded first, enforceable, and many military leaders agencies immediately after leaving the
containing the terrorists across the city, and civilian police agencies would be hard military; however, this issue may be more
namely at the Bataclan Concert Hall. pressed not to follow the law without appropriately addressed by a third course
After the attacks, an aggressive search was legal consequences, as well as regular of action that DOD could implement
initiated where “within 48 hours of the media coverage scrutinizing their deci- itself.
attacks, 168 homes had been raided and sionmaking processes. DOD Oversight on Military
104 people had been placed under house Continuing with the Obama admin- Relations with Civilian Police. If
arrest.”31 This was accomplished by both istration’s intent, prohibitions on military Americans trust their military, then per-
the Police Nationale and Gendarmerie equipment procurement by civilian police haps our military can serve them directly
Nationale—a logistical feat that could agencies would be maintained as well as by changing DOD’s relationship with
not have been achieved without military elaborated on. This would require a com- civilian police themselves. Enforcing
assistance. In this case, using the military prehensive review of what equipment has Posse Comitatus at the DOD level could
as law enforcement swiftly aided in not already made its way into civilian markets, present the best of both worlds for both
only ending the attacks but also bringing as well as what has been restricted but au- opponents of militarization and civilian
to justice those who had escaped or aided thorized to sell only to law enforcement. police.
the terrorists. However, any measures taken to cut Continuing with policies that prohibit
In any case, a certain amount of trust the direct link between the military and equipment procurement, DOD would
must be placed in the military that they civilian law enforcement would not stop not only adhere to the already published
will not overstep their bounds. There the sale of military-style equipment from list set out by the White House but also
will always be those who undoubtedly civilian companies that resource both the develop a required internal “trading
conclude that we are allowing the Armed defense and law enforcement industries delay” for any other equipment sales
Forces to gain too much freedom and separately.35 intended for combat—slightly similar
that we should fear an eventual coup Besides equipment procurement, to trading delays as seen in the stock
d’état. Ironically, this is exactly what hap- joint training between the military and market.36 But unlike stock market trading
pened recently in Turkey. On July 15, civilian police would require closer delays, where the delay amounts to hours,
2016, a faction of the Turkish military scrutiny to ensure that military-specific the DOD trading delay would need to be
opposed the president of Turkey, Recep tactics and techniques do not find their determined in years, or even decades, but
Tayyip Erdogan, so strongly that it at- way into civilian police agencies without not so long that the sale would render
tempted to topple the government and an approved need. Sadly, the control equipment obsolete by the time civilian
impose martial law “in order to restore measure for such a restriction would police would require it. Hence, if DOD
democracy.”32 Regarding the United generate a maelstrom of bureaucracy. sells combat equipment too soon, there
States, there has never been an organized That supervisory oversight to ensure will be no difference between the military
coup against our own government by the prohibitions are adhered to and training and police on American streets, and if
military. A reminder: the Armed Forces regimens are screened for necessity in DOD sells combat equipment too late,
swear oaths to defend the Constitution civilian law enforcement agencies would civilian police and similar commercial
of the United States prior to swearing to add another time-sapping requirement industries will attempt to recreate their
obey orders from anyone else. At home to DOD’s burden. Nonetheless, the own, potentially less-refined solutions.
and abroad, the Armed Forces have time result would be intended to satisfy op- The solution of trading delays could
and again proved to be most accountable ponents of militarization and, more allow DOD to influence, if not control,
to the people they serve. Few countries importantly, eliminate future instances of this conundrum.
in the world trust their militaries as much police misconduct that could be tied to Regarding training and mindsets,
as America does theirs.33 In fact, the militarization. In any case, these changes joint training events could ultimately
military is the most trusted institution in would likely take years to have any effect. be restricted to both disaster relief and
American society today.34 This could not The military’s technologies and tactics counterterrorism operations. Disaster
be in more contrast to much of the rest would need to evolve without substantial, relief is quite simple pertaining to lo-
of world. routine interaction with civilian police, gistical, medical, search and recovery
Maintaining Posse Comitatus. thus increasing the gap between the two support, and so on. Enforcing policies
Maintaining the act would be more in entities. Expectedly, many within the against the transferring of counterterror-
favor of advocates for social and police civilian police community would still ism operational knowledge, specifically
reform. Ideally, no further drafting of embody the remnant mentalities gained knowledge involving combat techniques,
the act would be required. While some in past joint training events or even those would require more scrutiny. While
Members of Congress would undoubt- civilian police that recently served in the it would be easier to deny any and all
edly lobby for continued leniency toward military. This points toward another issue combat-related techniques from being
the act if new, stricter policies were of whether separated Servicemembers taught to civilian police, that course
ever issued, the act would already be should be allowed to join civilian police of action unfortunately overlooks the

62  Features / Policing in America JFQ 85, 2nd Quarter 2017


Sailors and Federal law enforcement personnel conduct live-fire training during Navy Security Forces Training Course pilot program, training civilian and
military police forces to work together, June 23, 2010, San Diego (U.S. Navy/AC Rainey)

potential for DOD to improve civilian techniques to a higher security clearance the Defense Authorization Measures
police survivability and service to their more strictly and lower those of less-than- of 2008 and 2009, coercing DOD to
citizens if it were to impart at least de- lethal capability than it has in the past, enact a policy to prevent this.38 The
escalation and less-than-lethal training to allowing civilian police to still benefit existing policy is applied to “very senior
civilian police, which most civilian police from those techniques that are absolutely employees” of DOD concerning defense
already receive. An example would be the “must share.”37 This again would con- contracting companies where they are
U.S. Marine Corps Inter-Service Non- strain military personnel from imparting “subject to a two-year restriction” from
Lethal Individual Weapons Instructor large amounts of knowledge to civilian being employed by those civilian contrac-
Course, which for 2 weeks focuses on police, preventing further instances where tors.39 This policy has seen controversy
the proper use and familiarization of police misconduct could occur due to and is alleged to have “done little to slow
TASERs, batons, OC (pepper spray), militarization, especially when citizen en- the rush” of Servicemembers transition-
ocular and acoustic hailing devices, and counters result in the use of lethal force. ing to civilian agencies involved with the
verbal de-escalation techniques, among Finally, as retired Servicemembers defense industry.40 But the policy could
other techniques. The course culminates leave the military, a control measure be more effective if first enforced by
with an understanding by the police of- would need to be implemented to ensure DOD before the Servicemember sepa-
ficer that the overarching theory behind that they do not accelerate the procure- rates from the Service and, subsequently,
less-than-lethal capabilities is that, to ment of these techniques to civilian by the Department of Justice where waiv-
avoid lethal situations, less-than-lethal police, essentially creating a loophole ers to that policy would be required by
options should be used “early and often.” around both equipment and training the former Servicemember, and second if
Accordingly, a more favorable action restriction policies. Congress has ad- the policy were implemented specifically
for DOD would be to classify lethal dressed this type of loophole before in toward those in the military who wish to

JFQ 85, 2nd Quarter 2017 Dowell 63


Servicemembers, civilians, dependents, and retirees from Joint Base Charleston, South Carolina, and local community competed during Security Forces
Shooting Competition, May 15, 2013, in honor of National Police Week (U.S. Air Force/Dennis Sloan)

pursue civilian policing positions where a Yet while police continue to serve vast amount of influence it will continue
2-year restriction also applies. This could and protect, there are those who are to have on civilian police—and that it
mitigate that rush and allow a period of turning policing into something it was will have a response when this question
reflection for those Servicemembers post- not meant to be. DOD has invented is posed. JFQ
retirement before joining the ranks of devastatingly effective means of elimi-
civilian law enforcement. nating its enemies, but there must be a
moral question of whether we should Notes
As recent as 2016, a criminal justice allow civilian police to use those same
survey was taken where 54 percent of methods on U.S. citizens. Even in
1
Emily Ekins, Policing in America: Under-
standing Public Attitudes Toward the Police. Re-
Americans stated that “police using ancient Rome, the natural progression sults from a National Survey (Washington, DC:
military weapons and armored vehicles of policing evolved from simple fire Cato Institute, December 7, 2016), 50–51.
is ‘going too far,’ while 46 percent brigades meant to remedy the spread 2
Richard R. Johnson, Dispelling the Myths
[stated] these tools are ‘necessary for of a fire outbreak to an eventual strictly Surrounding Police Use of Lethal Force (Raleigh,
law enforcement purposes.’”41 This military force that was not the intent of NC: Dolan Consulting Group, July 2016).
3
The Daily Show with Trevor Noah, Comedy
trend toward militarization cannot be its originator, Emperor Augustus.42 And Central, July 7, 2016. Specific excerpts from
ignored; however, this could be the much like in ancient Rome, this change Noah were that “America has a problem within
natural progression of any law enforce- in policing in the United States is some- its police force,” “and although it is a problem
ment entity throughout a civilization’s thing that DOD can and should assist that disproportionately affects black people, it’s
lifetime. To combat new weapons and in for the better while there is still time, not just a black problem. This is an American
problem,” and that “with police shootings, it
new threats and deter enemies of the and while it still has overwhelming favor shouldn’t have to work that way.”
peace, police will need improved forms with the American people. Choosing to 4
The California Army National Guard was
of deterrence and apprehension. Thus, maintain or eliminate Posse Comitatus activated on April 29, 1992, to assist civilian
with ever-looming threats around the will be a question to be answered in the police with conducting law enforcement includ-
world, the last thing we want to do is future. We should hope, though, that ing conducting patrols within the city.
5
Radley Balko, “The Militarization of
lessen the abilities and effectiveness of DOD understands and accepts the role America’s Police Forces,” Cato’s Letter 11, no.
uniformed civilian police officers. it has played in police development, the

64  Features / Policing in America JFQ 85, 2nd Quarter 2017


4 (Fall 2013), 1–5. “Leader Behavior in a Police Command Bu- available at <www.sec.gov/answers/tradinghalt.
6
Sean T. Kealy, “Reexamining the Posse reaucracy: A Closer Look at the Quasi-Military htm>.
Comitatus Act: Toward a Right to Civil Law Model,” Administrative Science Quarterly 24, 37
Must Share is a phrase based on the tradi-
Enforcement,” Yale Law & Policy Review 21, no. 1 (March 1979), 1–23. tional military classification system of sensitive
no. 2 (Spring 2003), 383–442. 19
Ibid., 2. This is apart from other models military documents including “For Official Use
7
Ibid., 384; the Air Force was added into that deal with discretion rather than having a Only” or “Law Enforcement Sensitive,” indi-
the language of Posse Comitatus in 1956, and more authoritative system, such as the military. cating that all relevant personnel should read or
the Navy and Marines were made subject to the 20
Daryl Meeks, “Police Militarization know the information marked as “Must Share”
act via a Department of Defense regulation in in Urban Areas: The Obscure War Against to improve the military unit as a whole toward
1992. the Underclass,” The Black Scholar 35, no. 4 their mission. It is a phrase used within the spe-
8
Ibid., 387–388. (2006), 33–41. cial operations forces community in particular.
9
Phillip Carter, “Why Can the Army 21
Ekins, 74–75. 38
“Senior DOD Officials Seeking Employ-
Help Cops Catch the D.C. Sniper?” Slate. 22
Kuotsai T. Liou and Eugene G. Savage, ment with Defense Contractors,” DFARS Case
com, October 17, 2002, available at <www. “Citizen Perception of Community Policing 2008-D007, Federal Register 74, no. 10 (Janu-
slate.com/articles/news_and_politics/ex- Impact,” Public Administration Quarterly 20, ary 15, 2009), 2408–2410, available at <www.
plainer/2002/10/why_can_the_army_help_ no. 2 (Summer 1996), 163–179. gpo.gov/fdsys/pkg/FR-2009-01-15/html/
cops_catch_the_dc_sniper.html>. In addition to 23
Larie Lunceford, interview, Criminal E9-679.htm>.
this exception, this article notes that there have Investigation Command, U.S. Army, July 20, 39
Robert Brodsky, “New Pentagon Rule
been numerous, major exceptions to the act all 2016. Tightens Revolving Door,” Government Execu-
in the name of quelling violence and fighting 24
Ibid. tive, January 15, 2009, available at <www.gov-
drugs or terrorism. 25
Leon Lott, biography, Richland County exec.com/defense/2009/01/new-pentagon-
10
Eric V. Larson and John E. Peters, Sheriff’s Department, available at <www.rcsd. rule-tightens-revolving-door/28365/>.
Preparing the U.S. Army for Homeland Security: net/bio.html>. 40
David Francis, “DOD Retirees: From
Concepts, Issues, and Options (Santa Monica, 26
Richard T. Sylves, “President Bush and 4-Star General to 7-Figure Income,” Fis-
CA: RAND, 2001), appendix D, available at Hurricane Katrina: A Presidential Leadership cal Times, June 5, 2013, available at <www.
<www.rand.org/content/dam/rand/pubs/ Study,” Annals of the American Academy of thefiscaltimes.com/Articles/2013/06/05/
monograph_reports/MR1251/MR1251. Political and Social Science 604 (March 1, DOD-Retirees-From-4-star-General-to-7-Fig-
AppD.pdf>. 2006); William L. Waugh, Jr., ed., Shelter from ure-Income>.
11
Mark Anderson, interview, Military Police the Storm: Repairing the National Emergency 41
Ekins, 56–57.
Corps, U.S. Army, November 26, 2012. Management System after Hurricane Katrina 42
Paul Kenneth Baillie Reynolds, The Vigiles
12
Ekins, 56–57. (Washington, DC: Sage Publishing, 2006), of Imperial Rome (London: Oxford University
13
Catherine Lutz, “Making War at Home 26–56. Press, 1926).
in the United States: Militarization and the 27
Ibid., 40.
Current Crisis,” American Anthropologist 104, 28
“The Attacks on Paris: Lessons Learned,”
no. 3 (September 2002), 723–735. Homeland Security Advisory Council, Quinn
14
These courses have been around for Williams, LLC, June 2016.
years, but the focus here is that instructors for 29
Ibid., 25–26.
many similar companies, not just Magpul Core, 30
Ibid., 9.
have regularly been former Servicemembers, 31
Ibid., 16.
particularly special operations personnel and 32
Krishnadev Calamur et al., “What’s
law enforcement personnel who served in the Going on in Turkey?” Atlantic Monthly, July
military. See Magpul Core Web site at <www. 21, 2016, available at <www.theatlantic.com/
magpulcore.com/training>. news/archive/2016/07/turkey-govern-
15
The ban was imposed on June 8, 2015. ment/491579/>.
Items that were sold before the ban included 33
“Military and National Defense,” Gallup,
101 M113 armored personnel carriers, 6,600 available at <www.gallup.com/poll/1666/
bayonets, and almost 200 grenade launchers. military-national-defense.aspx>.
While M113s and grenade launchers could be 34
“Confidence in Institutions,” Gallup,
used for riot control, one must ask why issue available at <www.gallup.com/poll/1597/
civilian police bayonets, especially when some confidence-institutions.aspx>.
went to Lincoln University campus police. 35
For example, well-known weapons
See John Kelly and Steve Reilly, “Many Local manufacturers like Sig Sauer produce weapons,
Police Already Got Banned Military Gear,” such as the MPX, with specific capabilities
USA Today, May 18, 2015, available at <www. including fully automatic actions and shorter
usatoday.com/story/news/2015/05/18/ barrel lengths that are advertised as only being
police-already-have-military-gear-white-house- permitted to be sold to the military or law
aims—ban/27547527/>. enforcement. This weapon was demonstrated
16
Ibid. One M113 procured has “sat as recently as the summer of 2016 for an
unused in a [police] agency’s barn for three undisclosed military unit for this exact purpose.
years,” while others have used it frequently in I attended this weapons demonstration, which
arresting violent individuals and during rescue was publicly released in Quantico, Virginia. Sig
efforts. Sauer demonstrated the MPX weapon system
17
Eric L. Haney, Inside Delta Force: The to Servicemembers to aid in their missions deal-
Story of America’s Elite Counterterrorist Unit ing, coincidentally, with law enforcement.
(New York: Delacorte Press, 2006), 129. 36
“Trading Halts and Delays,” U.S. Securi-
18
John M. Jermier and Leslie J. Berkes, ties and Exchange Commission, July 23, 2010,

JFQ 85, 2nd Quarter 2017 Dowell 65


Member of Cameroonian Battalion
d’Intervention Rapide gives eye exam with
equipment provided by U.S. Navy during
healthcare workshop as part of Africa
Partnership Station 2013, Douala, Cameroon,
March 27, 2013 (U.S. Army/Jeffrey Hernandez)

The U.S. Government’s


Approach to Health Security
Focus on Medical Campaign Activities
By George E. Katsos

he U.S. Government plans, con- responsible for providing security; there-

T ducts, supports, and participates


in activities that reinforce national
interests. These interests perpetuate
fore, a healthy populace is a necessity.
With the U.S. Government’s increasing
responsibility as a security provider and
an international order underpinned its political emphasis on health security,
by stable democratic governments and the U.S. military will undoubtedly be
regional security. One critical compo- expected to have a larger role in support
Colonel George E. Katsos, USAR, is the
nent of national stability is the capability of health security objectives. While
Department of Defense Terminologist located to protect citizens from internal and natural or manmade threats to human
on the Joint Staff, and a Deputy Director of Civil- external threats. This capability nor- health can lead to illness or injury,
Military Training for the Innovative Readiness
Training program at the Office of the Secretary
mally requires a nation to draw upon illness transmitted by proximity between
of Defense. its citizenry to populate internal forces humans remains among the foremost

66  Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
dangers to human health, international Health Service Act that produced an The Executive Branch
stability, and the global economy. In entity now known as the U.S. Depart- Offices, departments, and independent
other words, health security is crucial to ment of Health and Human Services agencies make up the executive branch;
U.S. national security. (DHHS).4 Since then, the United States however, our focus is on departments
For purposes of this analysis, U.S. has steadily increased economic and with Presidential-appointed depart-
health security focuses on human health social development assistance to foreign ment heads that implement U.S.
and is sought and maintained through nations that, in turn, contributed to policy. The President’s Cabinet today
successful public health and global health their own public health systems. includes 15 department heads known
activities. While “public health” focuses In 1949, the United States became a as Cabinet Secretaries. A smaller group
on domestic or national human health signatory to a set of international treaties of appointed advisors known as the
issues, “global health” focuses on interna- known as the Geneva Conventions and National Security Council (NSC) is a
tional human health issues that are linked Protocols. One subject included protect- forum used by the President to consider
to U.S. domestic security. For an overview ing civilian victims of armed conflict and national security and foreign policy
of U.S. health security responsibilities and internal violence.5 Further enhancements matters.9 One policy document that
the role of the U.S. military in providing addressed “protection of civilians” be- links executive policy to department
medical aid, this discussion is separated yond hostilities to include accessibility to activities is a national strategy. For
into four sections that capture analysis essential services and medical care. Over security policy, the President’s National
based on documents, informal discus- the next decade, these treaties influenced Security Strategy (NSS) connects U.S.
sions, and military briefings: the history the United States to support more policy goals managed by the NSC to
of U.S. health policy through legislative requests abroad for military assistance. objectives on security matters.10 Subse-
actions and international engagements, In 1961, Congress passed the Foreign quently, the U.S. National Health Secu-
health policy as articulated in Federal Assistance Act (FAA) to better assist rity Strategy (NHSS) issued by DHHS
department strategies and other executive partner nations with security challenges, further articulates health security policy
branch documents, medical campaign which eventually led to public and global objectives that are linked to NSS objec-
activities executed under the U.S. Code, health support. One tenet distinguished tives. As a result, health security roles
and recommendations for strengthening military assistance from humanitarian and within the executive branch are further
U.S. Government health security efforts. development assistance while another defined.
created the U.S. Agency for International The President also articulates policy
Legislative Actions and Development (USAID), which carries through executive orders. One order
International Engagement out U.S. global health policy develop- that provides the President’s position
U.S. legislative history and interna- ment, coordination, and execution.6 on national security matters is called
tional agreements capture methods In 2005, the United States became a a Presidential Directive. In the last 20
that attempt to address modern health signatory to the WHO’s International years, five directives set conditions that
security concerns. The government’s Health Regulations (IHR), a legally bind- impact health security. In 1996, President
public health infrastructure originates ing agreement among 196 state parties, Bill Clinton signed a directive on emerg-
from early congressional legislation that, which obligates member states to develop ing infectious diseases that increased
just 9 years into the Nation’s existence, and maintain international public health U.S. surveillance, training, research, and
created the U.S. Public Health Service threat detection, assessment, notifica- response. It also directed the develop-
to treat those who served the country tion, and response capabilities.7 Under ment of the Department of Defense’s
at sea.1 Fifteen years after the Civil War, the IHR, the United States globally as- (DOD) Global Emerging Infections
the American Red Cross was created sists other nations to ensure that health Surveillance and Response Program.11
to provide medical treatment for those security capabilities are in place and In 2009, President Barack Obama is-
citizens who served in uniform. Fol- procedures followed.8 Additionally, the sued a directive on the implementation
lowing World War I, an international Global Health Security Agenda (GHSA) of the national strategy for countering
League of Nations was created2 that and the Global Health Security Initiative biological threats that focused on global
administered a separate Health Orga- (GHSI) accelerate international progress health security promotion with other
nization to address prevention and against infectious diseases and chemi- nations to prevent, detect, and respond
control of certain diseases.3 The League cal, biological, radiological, and nuclear to infectious disease.12 Shortly thereafter,
and Health Organization eventually (CBRN) exposure, respectively. the President issued a directive named
became the United Nations (UN) and With such maturation in U.S. health U.S. Global Development Policy,13 which
World Health Organization (WHO), policy and support for human rights, elevated development efforts to be on par
respectively, both of which the United a more focused national direction on with diplomacy and defense.14 Another,
States provides humanitarian assistance health security has emerged. The follow- National Preparedness,15 enhanced the
to upon request. During World War II, ing discusses Presidential and department Department of Homeland Security
the U.S. Congress passed the Public strategies on health security policy. (DHS) and its National Response

JFQ 85, 2nd Quarter 2017 Katsos 67


Member of 89th Airlift Squadron during training on CBRN defense techniques, October 4, 2014, Wright-Patterson Air Force Base, Ohio
(U.S. Air Force/Frank Oliver)

Framework (NRF) to better synchronize the Department of State and USAID State also manages diplomatic efforts
a whole-of-government response to a Joint Strategic Plan.18 For the purposes that result in foreign assistance to other
spectrum of security threats that include of this discussion, the U.S. Government nations including countering threats to
health security.16 More recently, Security development agency responsible for human health. One effort is focused on
Sector Assistance was issued to promote administering civilian foreign aid known global health, which is identified as the
partner-nation support of U.S. interests as USAID, although considered a sepa- largest component of U.S. long-term
to include cooperation on humanitarian rate government agency, is categorized development assistance.21 Within global
efforts.17 All of these directives impact as an entity here under State as they health is an integrated approach to im-
health security strategy development. The both share one Cabinet Secretary.19 prove global health conditions known
following department overviews capture For disaster relief missions, State as the Global Health Initiative (GHI).
Federal health security efforts in three regional bureaus take the diplomatic lead Distinct from the GHSA and GHSI
cascading categories: significant, addi- due to their regional expertise. However, international agreements, USAID-led
tional, and remaining. USAID’s Office of U.S. Foreign Disaster GHI implementation includes the de-
Assistance (OFDA) administers govern- fense against threats toward population
Significant Efforts ment responses that include medical health,22 fight against communicable
Two departments play significant aid. Generally, when a foreign disaster is diseases transmitted by contact, and sup-
roles in achieving U.S. health security declared or humanitarian crisis emerges, port of international health advances.23
objectives: the Department of State the President selects USAID as the Separate from USAID efforts, State
and DHHS. State manages foreign operational lead for coordinating the manages the U.S. HIV/AIDS effort via
affairs for the President and persuades government response. Although not the President’s Emergency Plan for AIDS
other nations to support U.S. inter- a member of the President’s Cabinet, Relief.24
national efforts that impact global USAID’s administrator is elevated to DHHS is the other department
economic stability, regional security, and Cabinet-level member status separate that pursues U.S. health security objec-
national health security. Two strategic from the Secretary of State and invited to tives.25 Per its Strategic Plan and Global
documents that provide guidance to NSC meetings when development and Health Strategy, DHHS cooperates
organizational efforts are the non- global health issues are concerned.20 For with scientists worldwide to diagnose,
congressionally mandated Quadrennial domestic response, State manages poten- prevent, and control the spread of dis-
Diplomacy and Development Review and tial international contributions of support. ease.26 Additionally, DHHS produces the

68  Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
congressionally mandated quadrennial administers domestic quarantine sta- abroad, DOD contributes to engagement
NHSS27 that guides health consequence tions at U.S. ports of entry in support and prevention programs, surveillance
mitigation of large-scale emergencies, of DHS,36 and maintains a unique force and response systems, and a network of
provides strategic direction, and stream- of 6,700 uniformed but nonmilitary overseas research laboratories. DOD also
lines health security approaches.28 DHHS health professionals known as the supports civil authorities through medical
information-sharing, disease surveillance, U.S. Public Health Service (USPHS) research, preparation, surveillance, and
and laboratory research capabilities also corps.37 In times of national emergency, response to biological threat requests. In
play significant roles in its illness mitiga- the corps can deploy with other U.S. addition, DOD provides military medical
tion strategy. departments.38 DHHS also oversees a support to the NDMS49 as well as pre-
In support of U.S. global efforts, domestic network of volunteers known planned domestic medical civic action
DHHS provides assessments, disease as the Medical Reserve Corps program events with local communities through its
control mitigation, crisis and disaster that strengthens public health systems Innovative Readiness Training program.50
response, and CBRN support.29 Via its and improves preparedness, response, The Department of Agriculture’s
components, the Centers for Disease and recovery capabilities.39 Furthermore, strategic plan addresses animal health,
Control and Prevention (CDC) per- CDC Epidemic Intelligence Service public health, plant health, environ-
sonnel, National Institutes of Health personnel identify global causes of dis- mental health, and improved access to
laboratory researchers, and Food and ease outbreaks, recommend prevention nutritious food.51 This includes participa-
Drug Administration scientists support and control measures, and implement tion in activities abroad with DOD on
responses to prevent further conse- strategies to protect people from health provincial reconstruction efforts, coun-
quences to human health.30 Moreover, threats.40 tering terrorism, and managing animal
under GHSA and GHSI arrangements, disease control.52 The Department of
the CDC assists partner nations in health Additional Efforts Commerce’s strategic health objectives
surveillance against emerging infectious The following departments make sub- focus on fostering healthy and sustainable
diseases, combats injuries from CBRN stantial contributes to U.S. health secu- marine resources such as fish stocks, habi-
events and infectious diseases such as rity: DHS; DOD; and the Departments tats, and ecosystems.53 It also administers
pandemic influenza with immuniza- of Agriculture, Commerce, Energy, and a nonmilitary but uniformed response
tions,31 manages the President’s Malaria Treasury. DHS guidance is provided service54 known as the National Oceanic
Initiative, participates with DOD in in- in the DHS Strategic Plan41 and the and Atmospheric Administration,55 which
formal international partnerships such as congressionally mandated Quadrennial interacts with the U.S. Navy via the
the Global Outbreak Alert and Response Homeland Security Review.42 DHS core Global Fleet Station sea base program.56
Network and the Laboratory Response responsibilities are to provide domes- The Department of Energy’s57 non-
Network,32 and actively engages in global tic security and coordinate domestic congressionally mandated Quadrennial
partnerships to reduce the impacts of Federal crisis response to include estab- Energy Review58 and Quadrennial
HIV/AIDS. lishing Federal response structures, del- Technical Review59 both articulate
For domestic activities, DHHS leads egating domestic emergency response strategies to prevent the proliferation of
U.S. efforts to protect against public to the Federal Emergency Manage- weapons of mass destruction abroad,60
health threats and provide countermea- ment Agency (FEMA), maintaining a address threats to public health and the
sures for mitigation, as well as contributes maritime domain capability through environment from energy transmission,61
to crisis response.33 As such, DHHS the U.S. Coast Guard,43 and supporting and pursue the cleaning up of legacy nu-
conducts public outreach as well as main- medical cooperative efforts through the clear waste locations.62 Also the Treasury
tains the federally coordinated National NDMS with DHHS and other inter- Department63 uses its significant global
Disaster Medical System (NDMS). This agency stakeholders.44 However, DHS reach to fund immediate needs that may
system encompasses out-of-hospital does play a supporting role in global include medical activities based on U.S.
medical care during crisis response to health efforts through cross-border approval and mitigate emerging threats
disaster stricken areas, patient movement protection to include U.S. airports and against the U.S. and global economies by
for those unable to transport themselves, seaports.45 relieving or enforcing sanctions.64
and treatment at participating hospitals DOD supports health security ef-
in unaffected areas.34 DHHS activates forts primarily through its military Remaining Efforts
the NDMS under its own authorities or workforce. Key strategic documents A couple of remaining departments
through the NRF where it is delegated include the Defense Security Guidance,46 maintain significant capabilities to
authority by DHS to be the operational the National Military Strategy,47 and address domestic public health con-
lead for Emergency Support Function the congressionally mandated Defense cerns but have minimal, if any, equity
#8, Public Health and Medical Services.35 Strategic Review (formerly known as the in support of global health efforts.65
Furthermore, DHHS leads the recep- Quadrennial Defense Review).48 In sup- The Department of Transportation
tion of evacuees in the United States, port of U.S. capacity-building activities administers a National Defense Reserve

JFQ 85, 2nd Quarter 2017 Katsos 69


Airman treats patient during U.S. Pacific Command’s Operation Pacific Angel 12-4 in Nepal, on September 11, 2012 (U.S. Air Force/Jeffrey Allen)

Fleet, Ready Reserve Force, and Civil a framework. Such a framework could practices. Relevant Joint Publications
Reserve Air Fleet that can augment produce a mechanism that would be (JPs) for this discussion include JP 4-02,
the transportation of military Services useful due to the fact that most foreign Joint Health Services, JP 3-07, Stability,
to potentially support public health governments are not prepared to respond JP 3-08, Interorganizational Cooperation,
activities.66 Moreover, the Department to out-of-the ordinary, severe catastro- JP 3-20, Security Cooperation, JP 3-28,
of Veteran’s Affairs (DVA) provides phes that overwhelm local and regional Defense Support of Civil Authorities, JP
health professionals and incident-related response capacity. In Haiti, for example, 3-29, Foreign Humanitarian Assistance,
medical care via Federal medical stations relief efforts were hampered as respond- and JP 3-57, Civil Military Operations.
and coordinating centers to care for ers, including U.S. forces, operated in a
those with injuries in support of NDMS severely disrupted environment. The abil- Medical Campaign Activities
hospital activation.67 ity of Haiti’s leadership to prioritize and DOD leads or supports Federal efforts
As U.S. Government departments coordinate U.S. humanitarian assistance that shape operational environments to
continue to develop their own strategies to was disabled and healthcare infrastructure set, establish, reestablish, or maintain
achieve health security objectives, the fu- to be supported was destroyed. Future interaction with political entities. One
ture is uncertain on how they will plan for demands on the United States for more effort is the provision of U.S. humani-
a robust international workforce response. coordinated relief and lifesaving assistance tarian assistance that includes medical,
Currently, USAID-led foreign disaster will continue to be expected, placing more general engineering, food and water,
relief is effective for routine disasters but burdens on the U.S. Government depart- educational, professional exchange, and
additional progress is needed to better ments that make up the NSC system to disaster preparation activities. DOD
coordinate U.S. humanitarian assistance prepare and contribute. contributions underpin these efforts
for catastrophes with cascading effects to Furthermore, while departments known in joint doctrine as maintaining
public infrastructure (for example, the loss develop their own strategies, they should stability or building capacity abroad via
of electrical power grids and exposure to also keep a watchful eye on how they are foreign humanitarian assistance (FHA),
chemical and radiological events).68 One portrayed in joint doctrine—the core providing crisis response support
solution is to use the domestic NRF as foundation of military workforce best through domestic defense support to

70  Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
civil authorities (DSCA), and delivering FHA, its unique and time-sensitive capa- and assisting in the development of
foreign disaster relief under FHA. While bilities deliver medical campaign activities or improving medical capacity of gov-
there are many terms that describe mostly in the form of direct patient care, ernment entities. Medical campaign
DOD medical contributions to U.S. medical supplies transportation, and activities in foreign countries funded
medical efforts (medical civil-military casualty evacuation generally funded by by Humanitarian and Civic Assistance
or stability operations, global health or Overseas Humanitarian, Disaster, and include events that allow U.S. military
partnership engagement, public health Civic Aid. In 2010, DOD medical cam- medical professionals to practice on
services, health diplomacy, disease surveil- paign activities in support of USAID-led real patients to improve their skills.80
lance, security assistance or cooperation, Haiti earthquake disaster relief response Geographic combatant commands
etc.), this discussion refers to those efforts included immediate and urgent conduct these preplanned medical
contributions as “medical campaign medical treatment by medical teams from readiness training exercises and dental
activities.” Medical campaign activities the USNS Comfort.70 When the ship or veterinarian exercises in conjunction
are DOD specific, unlike the categoriza- reached capacity, severely injured Haitian with foreign Ministries of Health and
tion of U.S. Government or other entity patients were evacuated to U.S. hospitals Defense that impact people, livestock,
medical efforts or activities. Selecting a under the authority of the NDMS and and pets in distant regions and remote
label is not to minimize the importance were treated by DHHS and DVA person- villages.81 Additionally, these activities
of the mission, operation, activity, or nel.71 In 2014, DOD conducted medical bolster host-nation health service capa-
task; it is used only to provide clarity for campaign activities to support the U.S. bilities that in turn build local civilian
those in uniform who participate in or response to Ebola in Western Africa.72 population confidence in the delivery of
implement it. The following articulates These medical campaign activities in- government essential services. In 2015,
medical campaign activities within Title cluded laboratory testing and oversight DOD’s Continuing Promise and Pacific
10 and Title 22 legal authorities of the of Ebola treatment unit construction.73 Partnership missions conducted FHA
U.S. Code. DHHS/USPHS personnel cooperated activities in 15 foreign nations across
with DOD to stabilize, mitigate, and pre- Central America and the Caribbean
Title 10 of the U.S. Code vent contagion74 through expeditionary with nongovernmental organizations as
Title 10 is a compilation of permanent medical system support and training of well as Southwest Asia and the Oceana
legal authorities that the Secretary of international health workers.75 regions with allied nations, respectively.
Defense uses to authorize federalized When domestic Federal disaster relief Medical campaign activities included
military forces to conduct military assistance is requested, DHS/FEMA over 142,000 patients treated in local
missions in support of U.S. efforts leads domestic coordination with DHHS ports and over 1,900 surgeries conducted
including humanitarian mission prepara- managing the medical response. Medical aboard hospital ships.82
tion and response. For this discussion, campaign activities to DSCA includes Other medical campaign activities
DOD medical campaign activities fall restoring essential health services in col- abroad include risk reduction and build-
under three categories: disaster relief, laboration with the state and local health ing capacity programs, communicable
byproduct of conflict, and force health entities.76 In support of 2005 Federal disease prevention, infectious disease
protection. While it is important to assistance to Hurricane Katrina victims, surveillance and response, an overseas
acknowledge that DOD provides for medical campaign activities included research laboratory network,83 and
the well-being of military personnel and airlift operations and medical treatment academic courses taught by DOD insti-
supports U.S. stabilization efforts that in support of civilian organization ef- tutions. On the domestic front, DOD
sets or reestablishes interaction with forts along the Gulf Coast.77 In support conducts medical campaign activities in
political entities, the following focuses of 2012 Federal assistance to Hurricane the form of preplanned civic events with
on the first mentioned category of Sandy victims, medical campaign activi- local communities.
DOD disaster relief via combatant com- ties conducted by preventive medicine
mander oversight. personnel included testing the safety Title 22 of the U.S. Code
For crisis situations abroad, USAID/ of food, water, and air in the storm- Title 22 is a compilation of permanent
OFDA generally leads the U.S. response damaged areas where military personnel legal authorities that the Secretary of
when disaster relief is requested of the were sent to assist.78 DOD also approved State uses to provide foreign assistance
Federal Government. In support of U.S. FEMA’s request for transport of over 120 to partner nations. DOD components
humanitarian assistance, DOD, with its medical personnel to serve as augmenta- participation in activities authorized
sheer size, budget, and ready capabili- tion for hospitals and nursing homes.79 in the FAA and by the President that
ties make it an attractive candidate for Veterinarian services were also provided. include health security. Per the FAA,
international aid requests; however, In noncrisis situations that include U.S. foreign assistance provides a
DOD normally contributes to less than preparation, risk reduction, and build- comprehensive list of assistance, some
10 percent of all OFDA managed disaster ing capacity, medical campaign activities of which DOD personnel deliver for
relief.69 When DOD does contribute to generally focus on training U.S. forces State.84 Within foreign assistance,

JFQ 85, 2nd Quarter 2017 Katsos 71


Army microbiologist on Edgewood Chemical Biological Center in vitro research team conducts laboratory research (U.S. Army/Conrad Johnson)

elements such as security assistance, activities that fall within Foreign Military security.89 Furthermore, GPOI funds cer-
humanitarian assistance, and develop- Sales (FMS), Foreign Military Finance tain activities that build partner country
ment assistance are codified in law.85 (FMF), International Military Education peacekeeping capacity and proficiency for
Formerly known as military assistance Training (IMET), and the Global Peace the deployment of foreign militaries that
in the FAA, security assistance is the most Operations Initiative (GPOI). For FMS, include medical training to foreign forces
profound way that DOD supports State military material is delivered to partner that may deploy to UN peacekeeping
in delivering foreign assistance. Most nations upon formal agreement (for operations.
likely, the term security assistance was example, first aid kits, warrior aid and As for State-managed U.S.
later adopted by Congress to lessen the litter kits, bandages, and medical equip- Government humanitarian and develop-
appearance of the militarization of dip- ment sets). Under FMF, funding includes ment assistance, they do not normally
lomatic efforts during the Cold War. Per defense article acquisition, provision involve military personnel. Per the FAA,
the FAA, security assistance is defined as of services, medical facility construc- humanitarian assistance is aid that meets
a group of planned programs authorized tion, and training to nations with weak humanitarian needs, including medicine,
by law where the U.S. provides defense economies87 (for example, in the 1990s medical supplies, equipment, and educa-
articles, military training, and other the U.S. Government provided Egypt tion.90 U.S. Government development
defense-related services, by grant, loan, with tens of millions of dollars that assistance is aid in support of another
credit, or cash sales to further national went to constructing a 650-bed inter- nation’s self-help efforts that are essential
policies and objectives.86 Within U.S. national medical center for the Egyptian to successful long-term development.91
security assistance programs, medical military).88 Moreover, IMET funds the As DOD has no formal leadership role
campaign activities range from medi- educational instruction by U.S. offices, in the delivery of Title 22 humanitarian
cal training to medical equipment and employees, contract technicians, and assistance or development assistance, it
donation of medical supplies. Prioritized contractors to foreign military students, has been the view of some civilian-led
by both State and DOD, DOD per- units, and courses on a nonreimburs- organizations that certain long-term
sonnel administer medical campaign able (grant) basis that includes health humanitarian or development-like Title

72  Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
10 activities, which include medical Congressionally mandate a 1949, 6 UST. 3516, 75 U.N.T.S. 287.
6
Foreign Assistance Act of 1961, Public
campaign activities, mostly fall under Quadrennial Security Review to better Law 87-195, 87th Cong., 1st sess., September
traditional civilian-led responsibilities. To coordinate a government approach to na- 4, 1961.
mitigate confusion, DOD is encouraged tional security matters, including human 7
International Health Regulations (2005),
by these organizations to label humani- health security, therefore forcing depart- 2nd ed. (Geneva: World Health Organization,
tarian efforts as something other than ments to plan for non-DOD workforce 2008), available at <www.who.int/ihr/publica-
tions/9789241596664/en/>.
humanitarian assistance and only provide emergency and disaster relief packages. 8
National Health Security Strategy and
support to U.S. development efforts.92 Create a Presidential Directive for an Implementation Plan (NHSS/IP) 2015–2018
International Response Force to assist (Washington, DC: Department of Health and
Conclusion in codifying a U.S. Government cata- Human Services, 2015), 30.
DOD medical campaign activities strophic coordination mechanism that
9
Barack H. Obama, Presidential Policy Di-
rective (PPD)-1, Organization of the National
is a useful term to identify medical will raise department priorities for devel-
Security Council System (Washington, DC: The
contributions within DOD activities opment of a complex medical response White House, February 13, 2009).
to U.S. health security efforts and capacity. 10
National Security Strategy (Washington,
programs. In support of U.S. national Create a Presidential Directive on DC: The White House, May 2010), 39.
interests, medical campaign activities Health Security to raise the priority for
11
William J. Clinton, Presidential Decision
Directive NTSC-7, Emerging Infectious Diseases
are a core element of strategic competi- planning and importance of U.S. health
(Washington, DC: The White House, June 12,
tion and will continue to be planned security efforts expressed and implied 1996).
for in support of DOD FHA activities in existing directives and strategic 12
Barack H. Obama, PPD-2, Implementa-
to overall U.S. Government efforts. documents. tion of the National Strategy for Countering
Abroad, medical campaign activi- Identify non-DOD U.S. entities that Biological Threats (Washington, DC: The White
House, November 23, 2009).
ties provide a good tool for not only can potentially execute existing DOD 13
Barack H. Obama, PPD-6, U.S. Global
mitigating threats to health security but medical campaign activities and assist in Development Policy (Washington, DC: The
also countering insurgencies that offer the development of their capabilities to White House, September 23, 2010).
their own medical care to influence plan for and fill potential DOD health 14
Foreign Assistance Act of 1961, Public
and control local civilian populations.93 security capability shortfalls in future Law 94-161, 94th Cong., 1st sess., Decem-
ber 20, 1975. In 1993, President Clinton
At home, medical campaign activities missions due to constrained budget envi-
nominated the Director for the U.S. Agency
provide immediate lifesaving assistance ronments and sequestration. for International Development (USAID) as the
to U.S. state and local governments and Encourage interorganizational partici- Special Coordinator for foreign humanitarian
build confidence in Federal government pation in joint doctrine development to assistance and disaster relief; PPD-6.
intentions. capture best practices and create aware-
15
Barack H. Obama, PPD-8, National Pre-
paredness (Washington, DC: The White House,
Although medical campaign ac- ness of extant non-DOD health security
March 8, 2011).
tivities that defend against infectious capabilities used in cooperation with 16
Ibid.
disease efforts such as the Ebola virus DOD to further expose stakeholders to 17
Barack H. Obama, PPD-23, Security
are less common, involvement by the each other’s capabilities and systems.95 JFQ Sector Assistance (Washington, DC: The White
U.S. military most likely will increase House, April 5, 2013).
18
The first combined Department of State
considerably due to its robust logistics
and USAID strategic plan was published in
and rapid transportation and surveillance Notes 2003.
capabilities. In 2015, DOD conducted 19
Title 22 U.S. Code § 6592, Foreign
medical campaign activities in support
1
An Act for the Relief of Sick and Disabled Affairs Agencies Consolidation, Administrator
Seamen, 1 Stat. L., 605, 5th Cong., 2nd sess., of AID [the Agency for International Develop-
of U.S. humanitarian assistance efforts July 16, 1798. ment] reporting to Secretary of State. For or-
to protect civilians from the Zika virus.94 2
Derek Licina, “The Military Sector’s ganizational purposes, under U.S. law, USAID
With national direction on health security Role in Global Health: Historical Context and falls under State.
and missions of the U.S. military evolv- Future Directions,” Global Health Governance 20
Quadrennial Diplomacy and Development
ing, changes in joint doctrine should 6, no. 1 (Fall 2012), 4; League of Nations, Review (Washington, DC: Department of State,
Covenant of the League of Nations, April July 2009), 115; PPD-6, 5.
more clearly reflect the shift beyond force 28 1919, available at <www.refworld.org/ 21
FY 2014–2017 Department of State and
health protection toward the protection docid/3dd8b9854.html>. USAID Strategic Plan (Washington, DC: De-
and medical treatment of civilians in mul- 3
Iris Borowy, Coming to Terms with World partment of State, 2014), 23.
tiple types of operating environments. Health: The League of Nations Health Organ- 22
U.S. Global Health Policy, The U.S.
To more adequately address health isation 1921–1946 (Frankfurt: Internationaler Government Engagement in Global Health: A
Verlag Der Wissenschaften, 2009), 57. Primer (Washington, DC: The Henry J. Kaiser
security issues in the future, the follow- 4
Public Health Service Act of 1944, Public Family Foundation, January 2013), 20–25.
ing recommendations would be of value Law 78-410, 78th Cong., 2nd sess., July 1, 1944. 23
See Global Health Initiative, available at
to assist the United States in improving 5
International Committee of the Red <www.ghi.gov>.
health security response capabilities: Cross, Geneva Convention Relative to Protection 24
FY 2014–2017 Department of State and
of Civilian Persons in Time of War, August 12, USAID Strategic Plan, 23.

JFQ 85, 2nd Quarter 2017 Katsos 73


DOD deployed medical teams from Joint Task Force–Bravo to Peru to provide aid in aftermath of 8.0 magnitude earthquake that struck area on August 15,
2007 (DOD/Jeremy Lock)
25
Edwin K. Burkett, “Foreign Health Sec- 34
See the National Disaster Medical Act of 2002, Public Law 107-296 § 707, 107th
tor Capacity Building and the U.S. Military,” System, Public Health Emergency, available Cong., 2nd sess., November 25, 2002, 154.
Military Medicine 177 (March 2012), 298. at <www.phe.gov/preparedness/responders/ 43
JP 4-06, Joint Mortuary Affairs (Wash-
26
The Global Health Strategy of the U.S. ndms/Pages/default.aspx>. ington, DC: The Joint Staff, October 12,
Department of Health and Human Services 35
National Response Framework (Washing- 2011), VII-1.
[DHHS] (Washington, DC: DHHS, October ton, DC: Department of Homeland Security, 44
See “Standard National Disaster Medical
13, 2011). See also “Strategic Goal 3: Advance January 2008). System Provider Memorandum of Agreement
the Health, Safety, and Well-Being of the 36
JP 3-08, 172. for Definitive Medical Care,” Public Health
American People,” available at <www.hhs.gov/ 37
Strategic Plan FY 2014–2018 (Washing- Emergency, available at <www.phe.gov/ndms/
strategic-plan/goal3.html>. ton, DC: DHHS, March 2014). reimbursement/Documents/NDMS-Provider-
27
Public Health Service Act, Public Law 38
Committee on Oversight and Investiga- MOA.pdf>.
109-417 § 103, 109th Cong., 2nd sess., Decem- tions, “Testimony from Rear Admiral Boris D. 45
Ibid., 31.
ber 19, 2006, 120; see also National Health Lushniak on Update on the U.S. Public Health 46
Sustaining U.S. Global Leadership:
Security Strategy and Implementation Plan Response to the Ebola Outbreak,” November Priorities for 21st Century Defense (Washington,
(NHSS/IP) 2015–2018. 18, 2014, available at <www.hhs.gov/asl/tes- DC: Department of Defense [DOD], January
28
See the National Health Security Strategy, tify/2014/11/t20141118b.html>. 2012).
Public Health Emergency, available at <www. 39
See the Medical Reserve Corps Program 47
National Military Strategy (Washington,
phe.gov/Preparedness/planning/authority/ Web site, available at <https://mrc.hhs.gov/ DC: The Joint Staff, January 2012).
nhss/Documents/nhss-ip.pdf>. HomePage>. 48
National Defense Authorization Act for
29
The Global Health Strategy of the U.S. 40
See the Centers for Disease Control’s Fiscal Year 2015, Public Law 113-291 § 1701,
Department of Health and Human Services, 10. Disease Detectives, available at <www.cdc.gov/ 113th Cong., 2nd sess., December 19, 2014,
30
Strategic Plan FY 2014–2018 (Washing- eis/diseasedetectives.html>. 128.
ton, DC: DHHS, March 2014). 41
Strategic Plan for Fiscal Years (FY) 49
See Emergency Support Function Annex-
31
JP 3-08, Interorganizational Coordina- 2012–2016 (Washington, DC: Department of es, Federal Emergency Management Agency,
tion (Washington, DC: The Joint Staff, Revi- Homeland Defense, 2012). available at <www.fema.gov/pdf/emergency/
sion First Draft), 173–174. 42
Quadrennial Homeland Security Review nrf/nrf-annexes-all.pdf>.
32
Ibid., 174. (Washington, DC: Department of Homeland 50
See DOD Innovative Readiness Training
33
Ibid., 171. Security, June 18, 2014). See Homeland Security Web site, available at <http://irt.defense.gov>.

74  Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
51
Strategic Plan for FY 2014–2018 (Wash- in West Africa,” October 9, 2014. Military Aid,” New York Times, March 5, 2011.
ington, DC: Department of Agriculture, 2014). 74
Government Accountability Office 89
JP 3-20, 37.
52
JP 3-08, 114. (GAO), Regionally Aligned Forces: DOD Could 90
Foreign Assistance Act of 1961, Public
53
FY 2014–FY 2018 Strategic Plan (Wash- Enhance Army Brigades’ Efforts in Africa by Law 87-195, 87th Cong., 1st sess., September 4,
ington, DC: Department of Commerce, 2014), Improving Activity Coordination and Mission- 1961, as Amended Through Public Law 113-
26. Specific Preparation, GAO 15-568 (Washington 76 § 499 (January 17, 2014), 160.
54
See Uniformed Service Rank Chart, U.S. DC: GAO, August 26, 2015), 8. 91
Ibid., § 102, 3. See also JP 3-08, 268.
Public Health Service, available at <www.usphs. 75
See Haiti Earthquake 2010, Public DOD defines development assistance as pro-
gov/docs/pdfs/uniform/Uniformed%20Ser- Health Emergency, available at <www.phe.gov/ grams, projects, and activities carried out by
vice%20Rank%20Chart.pdf>. emergency/news/sitreps/Pages/haitiearth- USAID that improve the lives of the citizens
55
JP 3-08, 117. quake.aspx>. of developing countries while furthering U.S.
56
Ibid. 76
JP 3-29, xii. foreign policy interests in expanding democracy
57
Strategic Plan 2014–2018 (Washington, 77
Steve Bowman, Lawrence Kapp, and and promoting free market economic growth.
DC: Department of Energy, March 2014). Amy Belasco, Hurricane Katrina: DOD 92
Independent Review of the U.S. Govern-
58
Quadrennial Energy Review: Energy Disaster Response, RL33095 (Washington, DC: ment Response to the Haiti Earthquake, Final
Transmission, Storage, and Distribution Infra- Congressional Research Service, September 19, Report, 71.
structure (Washington, DC: Department of 2005), 6. 93
JP 3-24, Counterinsurgency (Washington,
Energy, April 2015). 78
“Military Provides Critical Assistance DC: The Joint Staff, November 22, 2013),
59
Quadrennial Technical Review: An As- in Aftermath of Massive Storm Sandy,” U.S. II-15.
sessment of Energy Technologies and Research Medicine, December 2002, available at <www. 94
Patricia Kime, “Zika Virus: Pentagon
Opportunities (Washington, DC: Department usmedicine.com/agencies/department-of-de- Will Relocate At-Risk Family Members,”
of Energy, September 2015). fense-dod/military-provides-critical-assistance- Military Times, February 1, 2016, available
60
JP 3-08, 122. in-aftermath-of-massive-storm-sandy/>. at <www.militarytimes.com/story/military/
61
Quadrennial Energy Review, 251. 79
“DOD Provides Hurricane Sandy Re- benefits/health-care/2016/02/01/zika-
62
Ibid., 3. sponse, Relief Update,” November 3, 2002, virus-pentagon-relocate—risk-family-mem-
63
Strategic Plan for Fiscal Years 2014–2017 available at <http://archive.defense.gov/ bers/79515660/>.
(Washington, DC: Department of Treasury, news/newsarticle.aspx?id=118438>. 95
James C. McArthur et al., “Interorga-
2014). 80
DOD Instruction 2205.02, “Humanitar- nizational Cooperation III of III: The Joint
64
Ibid., 27. ian Civic Assistance Activities,” Washington, Force Perspective,” Joint Force Quarterly 81
65
For example, the Departments of Edu- DC, June 23, 2014. (2nd Quarter 2016), 129–139.
cation, Housing and Urban Development, 81
See Joint Task Force–Bravo, available at
Interior, Justice, Labor, Transportation, and <www.jtfb.southcom.mil>.
Veteran’s Affairs. 82
U.S. Senate Armed Services Committee,
66
JP 3-08, 137, 140. “Posture Statement of Admiral Kurt W. Tidd,
67
Ibid., 175. Commander, United States Southern Com-
68
Paul N. Stockton, All-Hazards Foreign mand, Before the 114th Congress”; “Infograph-
Response: Lessons Learned from Haiti, Fukushi- ic: Pacific Partnership and Continuing Prom-
ma, and Other Catastrophes (Falls Church, VA: ise,” NavalToday.com, available at <http://
Anser, October 30, 2013). navaltoday.com/2015/10/02/infographic-
69
Ibid. pacific-partnership-and-continuing-promise/>;
70
See “Operation Unified Response: Sup- Jeanette Steele, “Mercy Returns from Medical
port to Haiti Earthquake Relief 2010,” U.S. Mission,” San Diego Union-Tribune, September
Southern Command, available at <www.south- 25, 2015, available at <www.sandiegounion-
com.mil/newsroom/Pages/Operation-Uni- tribune.com/news/2015/sep/25/mercy-
fied-Response-Support-to-Haiti-Earthquake- returns-10th-pacific-partnership/>.
Relief-2010.aspx>. 83
Kellie Moss and Josh Michaud, The U.S.
71
Independent Review of the U.S. Govern- Department of Defense and Global Health:
ment Response to the Haiti Earthquake, Final Infectious Disease Efforts (Washington, DC:
Report (Washington, DC: USAID, March The Kaiser Family Foundation, October
28, 2011), 54; Gary Cecchine et al., The U.S. 2013), 7–15; James B. Peake et al., The Defense
Military Response to the 2010 Haiti Earthquake: Department’s Enduring Contributions to Global
Considerations for Army Leaders (Washington, Health: The Future of the U.S. Army and Navy
DC: RAND, 2013), 27. Overseas Medical Research laboratories (Wash-
72
Kristina Peterson, “Congress Releases ington, DC: Center for Strategic and Interna-
Funding to Aid Fight Against Ebola,” Wall tional Studies, June 2011).
Street Journal, October 10, 2014, avail- 84
Foreign Assistance Act of 1973, Public
able at <www.wsj.com/articles/congress- Law 93-189 § 23, 87 Stat, 93rd Cong., 1st sess.,
releases-funding-to-aid-fight-against-ebo- December 17, 1973, 727.
la-1412959345>. 85
JP 3-29, GL-7.
73
U.S. Senate Appropriations Committee, 86
International Security Assistance and
“Statement for the Record Honorable Michael Arms Export Control Act of 1976, Public Law
D. Lumpkin, Assistant Secretary of Defense 94-329 § 301, 90 Stat, 94th Cong., 2nd sess.
Special Operations and Low-Intensity Con- (June 30, 1976), 750.
flict,” 113th Congress, November 12, 2014; 87
JP 3-20, 37.
House Armed Services Committee, “HASC 88
Aram Roston and David Rohde, “Egyp-
Update: DOD Response to the Ebola Outbreak tian Army’s Business Side Blurs Lines of U.S.

JFQ 85, 2nd Quarter 2017 Katsos 75


As seen from back seat of Fighter Squadron
41 F-14A Tomcat aircraft, pilot brings
aircraft in for arrested landing on flight
deck of USS Theodore Roosevelt during
Operation Desert Storm (DOD/Parsons)

The Advent of I
t has been three decades since the
passage of the Goldwater-Nichols
Department of Defense Reorganiza-
tion Act of 1986, a piece of legislation

Jointness During the that changed how the Department of


Defense (DOD) functions and how
the military conducts operations. By

Gulf War adopting the concept now known as


“jointness,” it restricted the Services to
an administrative and organizational
A 25-Year Retrospective role as force providers, while combatant
commanders held operational author-
ity with a chain of command leading
By Christopher G. Marquis, Denton Dye, and Ross S. Kinkead directly to the Secretary of Defense and
the President.1 The intent of the legisla-
tion could be compared to that of the
Constitution supplanting the Articles
of Confederation, which drew the rela-
tively independent states into a more
closely centralized political body.
Major Christopher G. Marquis, USAF, is an Instructor in the Joint Warfighting Department at the Air
Less than 5 years after its passage,
Command and Staff College. Lieutenant Colonel Denton Dye, USA, is a Member of the Interoperability Goldwater-Nichols encountered its first
and Standardization Team at North Atlantic Treaty Organization Headquarters, Supreme Allied big test when Saddam Hussein’s forces
Command Transformation. Major Ross S. Kinkead, USA, is a Member of the Directorate for Intelligence
at the Joint Intelligence Center, U.S. European Command, following his most recent assignment as the
invaded Kuwait in August 1990. In
Executive Assistant to the Director for Intelligence, Joint Staff J2. response, a U.S.-led coalition reacted

76  Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
with a buildup of forces in Saudi Arabia This article examines the concerns On October 14, 1983, rivalry within
and an offensive that drove the Iraqis Goldwater-Nichols was meant to address the Marxist People’s Revolutionary
out of Kuwait—the Gulf War. Its success and demonstrates that the United States Government of Grenada resulted in a
seemed a vindication for Goldwater- and its coalition partners would have militant coup and the execution of the
Nichols specifically and joint operations achieved victory in the Gulf War even country’s leader, Prime Minister Maurice
more generally. General H. Norman without the legislation. What follows is an Bishop. The resulting chaos threatened
Schwarzkopf, USA, the commander in explanation of the historic context lead- the safety of more than 650 American
chief of U.S. Central Command, an- ing to Goldwater-Nichols, its application medical students on the island.6 This led
swered to Secretary of Defense Richard in Operation Just Cause (1989), and an to the U.S. launch of Operation Urgent
Cheney through the Chairman of the abridged overview of Operations Desert Fury on October 25. The deployed force
Joint Chiefs of Staff, General Colin Shield and Desert Storm. The balance of for this mission consisted largely of a
Powell. Lieutenant General Charles the article deals with the varying opinions joint Army and Marine ground force,
Horner, USAF, who held the newly of jointness in the Gulf War. It provides supported by special operations, naval,
established position of Joint Forces Air an analysis summarizing the ideas of the and air assets. The mission resulted in the
Component Commander (JFACC), was authors and delivers recommendations to successful rescue of 720 U.S. and foreign
in control of the air war. military leadership. Above all, jointness citizens and the restoration of popular
With the hindsight of a quarter- must be continually developed in order to government on the island at a cost of 135
century since the conflict, the verdict on maintain its effectiveness. U.S. casualties.7
jointness in the Gulf War is now more Although generally viewed as a suc-
nuanced. In part, this is due to the fact Operations Eagle Claw cess by military leaders, Urgent Fury was
that the U.S. military failed to replicate and Urgent Fury marred by many of the same issues that
the spectacular success of Operation On November 4, 1979, militant follow- plagued Eagle Claw. There were fail-
Desert Storm in subsequent engage- ers of the Ayatollah Ruhollah Khomeini ures of communication and equipment
ments.2 Also, the Services had not all overran the U.S. Embassy in Tehran, shortfalls, as Army units were unable
embraced jointness without reservations. taking 66 American citizens hostage. to coordinate air support with naval as-
The Marine Corps seemed the most When diplomatic negotiations proved sets. Assault plans were not coordinated
skeptical of the benefits of jointness, and fruitless, DOD planned a raid to liber- between Services prior to combat opera-
their limited interoperability with other ate the hostages with a joint task force tions, leaving units largely unaware of
Services during the Gulf War appeared to (JTF) comprised of personnel from four what adjacent unit objectives were and
reinforce their doubts. of the military Services. In April 1980, how they fit into the overall scheme of
Jointness clearly was not the decisive the JTF attempted its rescue operation, maneuver. These shortcomings resulted
factor in the coalition victory in the codenamed Eagle Claw. The result was in fratricide and the inadvertent bombing
Gulf War, although it was likely a posi- a complete disaster, culminating in a of noncombatants.8 The complications
tive contributing factor. The superiority fatal collision between a U.S. helicopter suffered in Iran and Grenada eventually
of the coalition forces over Iraqi forces and supporting C-130. No hostages led Congress to pass Goldwater-Nichols,
was so comprehensive that it alone was were rescued, and eight members of triggering the largest reorganization since
sufficient to achieve the mission objec- the JTF were killed. Additional losses the formation of DOD in 1947.9
tives. The coalition was better equipped, included aircraft, equipment, and secret
better trained, and better led than the documents.3 Passage of Goldwater-Nichols
Iraqis. The coalition benefited from wide- In May 1980, a special commis- The year prior to Urgent Fury, Chair-
spread international support, especially sion chartered by the Joint Chiefs of man of the Joint Chiefs of Staff General
regional support, and focused objectives. Staff examined the operation’s failure. David C. Jones told the House Armed
Moreover, jointness was not fully realized The review’s chairman, Admiral J.L. Services Committee, “The system is
during the operation. In some cases, it Holloway III, USN (Ret.), identified broken. I have tried to reform it from
was improperly applied. U.S. forces are the “major issues” that ultimately led to the inside, but I cannot. Congress is
much closer to realizing the full pos- the operation’s demise.4 These included going to have to mandate necessary
sibilities of jointness today, after several separate training between the units prior reforms.”10 He stressed the need for
years of major combat operations and to the mission, a muddled command and “an organization which will allow us
counterinsurgencies in the Middle East. control hierarchy, and problems with to develop the proper strategy, neces-
The concept of globally integrated opera- equipment interoperability.5 Congress sary planning, and the full warfighting
tions, introduced by then–Chairman of failed to act decisively on the findings of capability.”11 To accomplish these goals,
the Joint Chiefs of Staff General Martin the Holloway Commission, but events in Congress sought the following changes:
Dempsey in 2012, may further help in the Caribbean a few years later would fur-
•• clarifying the military chain of
the development of jointness as a con- ther the argument for legislative reform.
command from operational com-
tinuous state of military operations.

JFQ 85, 2nd Quarter 2017 Marquis, Dye, and Kinkead  77


manders through the Secretary of The operation, codenamed Just Nations’ backing to oppose Saddam’s
Defense to the President Cause, began on December 20 and forces. On August 6, King Fahd of Saudi
•• giving Service chiefs responsibility would be the largest military undertaking Arabia consented to allow coalition
for training and equipping forces, since Vietnam. The campaign comprised troops to deploy into his nation.23
while making clear that they were a joint force of over 20,000 personnel Eighteen nations provided ground
not in the chain of command for and 300 aircraft deployed from both the forces to the effort. The United States
military operations United States and Panama to strike 27 alone deployed 500,000 troops and
•• elevating the Chairman of the Joint different locations simultaneously.16 The 2,000 tanks, with the British in second
Chiefs of Staff relative to other results from the operation in Panama place, providing 35,000 troops and 210
Service chiefs by making him the appeared to be generally positive. The tanks.24 On paper, the Iraqi military was a
principal military advisor to the military accomplished its objectives formidable opponent. Its army consisted
President, creating a Vice Chairman within a few days.17 Clear lines of author- of about one million troops. Coalition
position, and specifying that the ity and command were established early analysts estimated that 43 Iraqi divisions,
Joint Staff worked for the Chairman through a JTF headquarters.18 The Joint including 12 armor, were in the Kuwaiti
•• requiring military personnel enter- Staff kept policymakers informed and theater of operations, although only 4
ing strategic leadership roles to provided latitude for lower headquarters. of these divisions were from the elite
have experience working with their Joint rehearsals and appropriate training Republican Guard.25 Even though the
counterparts from other Services (so- by the Services were also credited with coalition held the airpower advantage
called joint credit) the success.19 with a maximum strength of 1,820 com-
•• creating mechanisms for military Ser- It appeared that Goldwater-Nichols bat aircraft,26 the Iraqi air force appeared
vices to collaborate when developing had passed its initial test. However, the ready to challenge air superiority with
capability requirements and acquisi- Just Cause operation was short lived and about 750 combat aircraft, the sixth larg-
tion programs, and reducing redun- small scale. Operations lasted only a few est air force in the world, and a vast air
dant procurement programs through days, and only about 4 percent of the par- defense system.27
the establishment of the Office of ticipating U.S. troops would be deployed General Schwarzkopf used his author-
the Under Secretary of Defense for in the Gulf War, so few concrete lessons ity to organize forces as he saw fit. He
Acquisition.12 were drawn from it. There would be a made the decision to organize air com-
much greater challenge the following ponents under one functional command.
These reforms met with staunch
summer, when Iraqi forces marched into He then named Lieutenant General
resistance from within the Pentagon.
the small nation of Kuwait. Horner, commander of U.S. Central Air
However, by late 1986, the experiences
Force, as the JFACC “to provide central-
of Eagle Claw and Urgent Fury had
Operations Desert Shield ized planning, decentralized execution,
shifted political opinion decisively toward
and Desert Storm and the integration of both service and
the need for legislation. Congress voted
In the early morning hours of August 2, allied air capabilities.”28 In contrast, he
overwhelmingly for Goldwater-Nichols,
1990, three Iraqi divisions crossed the did not appoint a separate Joint Force
with only four Members of both houses
border into Kuwait. The small Kuwaiti Land Component Commander.
voting in opposition.13
army and navy provided courageous Operation Desert Storm, also known
but futile resistance against the superior as the Gulf War, began at 1:30 a.m. on
Operation Just Cause invading force. Kuwait’s ruler, Sheikh January 17, when U.S. Navy ships in
Congress would not have to wait long
Jaber al-Ahmad al-Sabah, fled to Saudi the Persian Gulf and Red Sea launched
before its reorganization efforts were
Arabia. By August 4, Iraqi troops had Tomahawk cruise missiles toward
put to the test. In 1989, tensions in
completed their conquest and were Baghdad. Throughout Iraq on that first
Panama began to rise as the actions of
lining up on the Saudi-Kuwaiti border.20 night, coalition helicopters and fixed-
General Manuel Noriega’s government
Most officials in the U.S. Government wing aircraft struck key targets to cripple
became increasingly provocative. The
were surprised by Iraq’s action. Although air defenses and disable communica-
situation reached a boiling point on
Iraqi officials had made threatening tions.29 Tomahawks and F-117s scored
December 15, when Panama’s National
charges against Kuwait in the months a number of hits in Baghdad, shutting
Assembly declared a state of war with
leading up to the invasion, U.S. officials down the electrical system and knocking
the United States and a Marine lieuten-
had assumed it was merely a bluff. 21 out CNN’s live telecast.30
ant was killed by Noriega’s forces at a
Having realized this assumption was a The Iraqi air force and air defenses
roadblock in Panama City.14 As a result,
mistake, President Bush decided to act proved no match for the sudden on-
President George H.W. Bush activated
and made his determination clear to his slaught. Coalition forces achieved air
a contingency plan to secure American
administration and the public.22 American superiority within a week, forcing Iraqi
interests in Panama and remove Noriega
and British leaders began to gather an pilots to attempt to hide their planes,
from power.15
international coalition with the United place them next to residential buildings

78  Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
Airman, front, of 68th Aeromedical Evacuation Squadron (AES), Norton Air Force Base, Airman, right, of 118th AES, Tennessee Air National Guard, and
Airman, left, of 137th AES receive mission briefing during Operation Desert Storm (U.S. Air Force/Kimberly Yearyean)

or landmarks, or fly them to Iran for pro- the Kuwaiti border, engaging a mecha- Desert Storm “raised the execution of
tection.31 Moreover, Iraqi responses were nized infantry division and armored joint warfare to an unprecedented level
disjointed and ineffective. They launched division of Saddam’s elite Republican of competence.”40
Scud missiles at Saudi Arabia to cause Guard.36 All the attacks succeeded spec- James Locher, a former staffer on the
terror and at Israel to draw it into the tacularly, and by February 26, Kuwaiti Senate Committee on Armed Services,
conflict and thus wreck the coalition, but forces were able to march into Kuwait observed the widespread approval of the
these efforts ultimately failed.32 Similarly, City as part of an army of liberation.37 operational chain of command estab-
a desperate Iraqi assault at Khafji in late The Iraqi forces had been reduced to a lished by the legislation. He considered
January was repulsed.33 disorganized mob attempting to retreat the recognition of its success to be “uni-
The coalition launched its ground back to their homeland. The next day, the versal.” According to Locher, William
offensive at 3:00 a.m. on February 24 coalition declared a ceasefire. Kuwait was Perry, Secretary of Defense in the Bill
with a three-pronged attack. In the liberated. The Gulf War was won.38 Clinton administration, remarked to
east, the 1st Marine Expeditionary Force the committee, “All commentaries and
advanced into southeast Kuwait, sup- Positive Reactions to after-action reports on [Desert Shield/
ported by the multinational Joint Forces Jointness in Desert Storm Desert Storm] attribute the success of
Command–East.34 In the west, XVIII Many viewed the overwhelming success the operation to the fundamental struc-
Corps, including the 101st Airborne of the Gulf War as a vindication of tural changes in the chain of command
Division and 24th Infantry Division, Goldwater-Nichols and a clear sign of brought about by Goldwater-Nichols.”41
along with the French Daguet 6th Light the benefits of joint warfighting. Harry Katherine Boo, writing for the
Armored Division, maneuvered north be- G. Summers, in On Strategy II, stated Washington Monthly, proclaimed that
fore swinging east toward Highway 8, to that the legislation was “long overdue” the effects of Goldwater-Nichols were
the rear of Iraqi forces in Kuwait.35 In the and credited it with attaining unity of “gloriously apparent” in the Gulf War
center, U.S. VII Corps and the British 1st effort in the operation.39 Robert H. victory.42 She placed upon the Services
Armored Division drove into Iraq near Scales, in Certain Victory, wrote of how much of the blame for the then-recent

JFQ 85, 2nd Quarter 2017 Marquis, Dye, and Kinkead  79


chain of military disasters, such as the development, along with a “revolution” operations inefficiency for inefficiency.
helicopter crash during Operation in training and doctrine from the 1970s.48 Aspects of both Somalia and Bosnia come
Eagle Claw, the Beirut Marine barracks As these opinions make clear, the changes to mind.”52 The failure to replicate the
bombing, and the friendly fire incidents brought about by Goldwater-Nichols overwhelming success of Desert Storm
during Operation Urgent Fury.43 “By were not universally recognized as the key suggests that jointness is not by itself a
elevating international safety over service to victory in Desert Storm. decisive factor. If it were, we might expect
politics,” Boo wrote, “Congress helped every operation to turn out with a similar
the military win the Gulf War—a fact Skeptical Reactions to the degree of success.
crucial to recognize now, not for the Impact of Jointness Furthermore, even if the Services rec-
sake of praising Congress, but for the Some researchers went even further, ognized the Gulf War as a “joint” victory,
cause of broader military reform.”44 By arguing that Desert Storm was actually they took different lessons from the con-
her reasoning, Goldwater-Nichols was a poor example of jointness. Michael R. flict and emerged with different opinions
an antidote for the follies of the Services’ Gordon and Bernard E. Trainor, in The of jointness. Some viewed it as a zero-
control of operations. Generals’ War, addressed this point: sum game, with one Service benefiting
at another’s expense. Bruce Watson and
Other Factors in the The campaign was “joint” more in name his team exemplified this idea in Military
Gulf War Victory than in fact. Each service fought its own Lessons from the Gulf War, when they
To many observers, however, the leg- war, concentrating on its own piece of the declared the Air Force “prevailed,” while
islation was a minor factor in the coali- conflict with a single-minded intensity, the Marines afloat were “reduced to pos-
tion victory. Dominic Caraccilo, writing and the commanders in Washington and ing a threat that was never realized.”53
for Army Magazine in 2015, made Riyadh failed to fully harmonize the war
no mention of jointness in his article plans. In this sense, the Gulf War shows that Jointness and Airpower
and instead credited the success of the there is much to be done if the American For many, the Gulf War was a vindica-
mission to the fact that the goals were armed forces are to operate in a truly coor- tion not of joint warfare, but of the
“well-defined, resourced, and limited dinated and integrated manner.49 strategic use of airpower. Within the
to driving the Iraqis out of Kuwait Air Force, the Gulf War was seen as
and defending the Kingdom of Saudi Weitz, writing in 2004, largely agreed the culmination of many of the previ-
Arabia.”45 Richard Weitz of the Insti- with this opinion. He elaborated on how ously unfulfilled promises of airpower
tute for Foreign Policy Analysis noted the Services, in the lead-up to Desert advocates. For those who shared this
the Gulf War was “over-determined” Storm, each focused on its own war plans, perspective, the success of the operation
and that “so many factors favored an rather than collaborating jointly. The would usher in an era in which the air
allied victory” that a change in any Special Planning Group, working on the domain would be the most prominent.
single factor, jointness presumably air plan, was known as the “Black Hole.” Price T. Bingham, then an Air Force
included, would not have affected the The ground campaign was devised by lieutenant colonel, expressed an opinion
ultimate result.46 the “Jedi Knights,” many of whom widely held within that Service when he
Don D. Chipman, a retired mili- were Army graduates of the U.S. Army wrote, “Campaign success now depends
tary professor from the faculty at Air School of Advanced Military Studies. on superiority in the air more than it
University’s Squadron Officer College, The Marines seemed to lack easy access does on surface superiority.”54 According
acknowledged the positive effect of joint to either group and were left to generate to Bingham, existing joint doctrine was
doctrine on the success of the Gulf War their own plan.50 outdated and needed to be brought into
but compiled it with other elements, Even Katherine Boo conceded the alignment with Air Force doctrine.55
including the use of modern technology imperfect application of jointness in the Perhaps of all the Services, the Air
such as precision-guided munitions and Gulf War, documenting the important Force most favorably embraced the
stealth technology, training, and strong detail that Navy communication systems potential of joint operations. Air Force
leadership, particularly in the person of were not able to receive messages over doctrine defines the Airmen’s Perspective
General Schwarzkopf. “Yet, even with secure modems from Riyadh. This neces- as including a belief in the centralized
all of these factors,” Chipman observed, sitated the physical transfer of the air control of airpower by Airmen.56 Since
“ultimately the final victory depended on tasking order to the Navy Service com- 1947, fixed-wing air assets had been
the proper application of airpower.”47 ponent commander aboard his aircraft distributed between the Air Force, Navy,
General Fred Franks, who com- carrier in the Persian Gulf or Red Sea and Marines. The innovation of the
manded VII Corps during Desert Storm, each day.51 position of JFACC, used in Desert Storm
and his co-author Gregory Fontenot Mackubin T. Owens, writing in 1996, under the control of Lieutenant General
concluded in a recent article in Army made a key point when he noted that Horner, at long last brought many of
Magazine that the key to the victory in “there have been several operations in the these assets under the tactical control of
the Gulf War lay with improved leadership Goldwater-Nichols era that match earlier one Airman.

80  Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
Air-to-air view of two U.S. Air Force F-15C Eagle fighter aircraft of 33rd Tactical Fighter Wing, Eglin Air Force Base, and Royal Saudi air force F-5E Tiger II
fighter aircraft during mission in support of Operation Desert Storm (U.S. Air Force/Chris Putman)

However, this championing of both late changes to the air tasking order and tive and inevitable. The point is that the
airpower and jointness was not necessarily listing preferred targets as secondary in Services must see jointness as a normal
shared by the other Services. According the hope of increasing the likelihood for state of operations, not a special condi-
to Weitz, Navy aviators believed the joint approval.60 tion to be used only during wartime.
air campaign limited their involvement. It should come as no surprise that the Also, jointness is not a cure-all for the
Both the Navy and Marine Corps were Marines were the most reluctant to buy multitude of problems that emerge in
skeptical of the doctrinal legitimacy of the into the joint warfighting concept. The the conduct of war. In fact, the learning
JFACC concept.57 The communication Marines had, and retain, a reputation curve of the Services operating together
systems aboard Navy aircraft were in- for independence and self-sufficiency in can create its own short-term problems.
compatible with the secure systems of the land and air operations. Their symbiotic The ultimate benefit of achieving unity
Airborne Warning and Control System, relationship with the Navy was in place of effort necessitates the Services work
which limited the Navy’s ability to con- centuries before Goldwater-Nichols. through these challenges.
duct missions over Kuwait and Iraq.58 They were thus less likely to embrace a Jointness requires continuous in-
There were plenty of disputes between concept that would potentially disrupt teroperability among the Services. The
Army and Air Force personnel regard- this composition. As a case in point, spe- idea that the U.S. military would fight as
ing target selection. The mutual distrust cial conditions regarding the deployment a joint team, then separate into its Service
manifested itself with the Army disputing of Marine air assets have been incorpo- corners in peacetime, mutes the long-
many of the claimed strikes and damage rated into joint doctrine.61 term benefits of joint operations. Now
assessments of the Air Force pilots.59 that our military has waged major combat
Perhaps the most serious disagree- Jointness for the Long Term and counterinsurgency operations for 15
ments were between the Air Force and This article is not a criticism of the years in Afghanistan and Iraq, it is adopt-
Marines. The Marines, distrustful of idea of jointness. The current nature ing a more realistic, workable method of
the joint air tasking cycle process that of war, in both tempo and scope, and operating jointly.
selected targets and assigned sorties, the limited resources now available for In 2014, William Odom and
admittedly gamed the system by offering national defense make jointness impera- Christopher Hayes stated, “Today the

JFQ 85, 2nd Quarter 2017 Marquis, Dye, and Kinkead  81


Oil wells burn out of control after set ablaze by retreating Iraqi forces during Operation Desert Storm (DOD)

separate military Services that make up Dempsey’s goal was for the Services to work properly, it must be a continuous
America’s Armed Forces work together become “pervasively interoperable,” with state, not merely a temporary condition
more often than at any time in the the result being that Servicemembers for the Services to participate in dur-
Nation’s history. Their success over the throughout the military would see them- ing contingencies. While Desert Storm
last decade of war has cemented the selves as part of a joint force.65 obscured its impact on mission success,
power of ‘jointness’ in accomplishing D.H. McCauley of the Joint Forces 15 years of continuous joint operations
military objectives.”62 It is only through Staff College concurred with General have provided a more sober perspective.
time, and continuous operations, that a Dempsey’s advocacy of globally inte- Globally integrated operations are a prac-
truly joint force can take form. Fittingly, grated operations. The dynamic nature tical attempt to apply jointness to modern
“perseverance” is a joint principle of war.63 of the modern international environment warfare.
General Martin Dempsey offered demanded a change in force posture:
a viable solution to these issues with Conclusion
the introduction of globally integrated Given the Chairman’s new operating Jointness was not the decisive factor
operations in the Capstone Concept for concept of globally integrated operations, in the coalition’s victory over Saddam
Joint Operations in September 2012. The the military will transform from a conven- Hussein’s Iraqi forces in the Gulf War.
idea was to require “a globally postured tionally focused and capital-intensive (for There were several factors to the victory,
Joint Force to quickly combine capa- example, costly weapons systems such as the including superior technology, leader-
bilities with itself and mission partners F-35) force to one oriented on small, adapt- ship, international support, plentiful
across domains, echelons, geographic able, globally deployable units that require resources, and limited objectives. It is
boundaries, and organizational af- well-trained, experienced counterinsur- more accurate to say jointness was a
filiations.”64 Among the implications gency forces and military police.66 positive contributing factor.
of globally integrated operations are a Goldwater-Nichols was an attempt to
professional military education focus on Although it took over two decades correct the failings of coordination and
mission command and jointness. General to recognize, if jointness is going to synchronization between the Services

82  Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
and to allow the combatant command-
4
James L. Holloway, Rescue Mission Report 40
Robert H. Scales, Jr., Certain Victory
(Washington, DC: Joint Chiefs of Staff, 1980), (Washington, DC: Office of the Chief of Staff
ers to conduct operations as they best 56. of the United States Army, 1993), 370.
saw fit without undue interference from 5
McInnis, 3. 41
James R. Locher III, “Taking Stock of
multiple commands. Its simplification 6
Sharon Tosi Lacey, “Grenada 1983: Small Goldwater-Nichols,” Joint Force Quarterly 34
of the operational chain of command is Island, Big Lessons: A Three-day Cold War (July 2003), 36–37, brackets in source docu-
perhaps its most highly valued and endur- Clash in the Caribbean Had Far-Reaching Im- ment.
pacts on American Joint Operation,” Military 42
Boo, 32.
ing contribution. It is less clear how well
History (2013), 46–48. 43
Ibid., 33–35.
it accomplished its other goals by the 7
Ronald H. Cole, “Grenada, Panama, and 44
Ibid., 33.
time of the Gulf War. The Service chiefs Haiti: Joint Operational Reform,” Joint Force 45
Dominic J. Caraccilo, “Desert War
had to tolerate their new role as advisors Quarterly 20 (Autumn–Winter 1998/1999), Taught Lessons in How Superpower Uses
subordinate to the Chairman of the Joint 59. Force,” Army Magazine 65, no. 7 (2015), 45.
8
Lacey, 52. 46
Richard Weitz, “Jointness and Desert
Chiefs of Staff, and the Services had to 9
Ibid., 53. Storm: A Retrospective,” Defense and Security
accept their restriction to administrative 10
James R. Locher III, “Has It Worked?” Analysis 20, no. 2 (2004), 133.
and organization functions, but inter- Naval War College Review 54, no. 4 (2001), 47
Don D. Chipman, “Desert Storm and the
Service rivalry persisted. It appeared that 101. Triumph of Joint Warfare Planning,” Air Power
the Services saw jointness as a wartime
11
McInnis, 6. History 52, no. 1 (2005), 54.
12
Ibid., 8. 48
Fred Franks and Gregory Fontenot,
condition, while peacetime would remain 13
Katherine Boo, “How Congress Won the “Decisive U.S. Response Was Both End of an
Service-centered. The problem with this War in the Gulf,” Washington Monthly 23, no. Era, Birth of a New One,” Army Magazine 65,
notion was that the Services would have 10 (October 1991), 35. no. 7 (2015), 43.
to learn to be joint again each time a new 14
Richard Fournier, “A Just Cause in 49
Gordon and Trainor, xiv.
conflict arose. Panama,” Veterans of Foreign Wars Magazine 1 50
Weitz, 146.
(2015), 23. 51
Boo, 36.
It was not until the continuous joint 15
James H. Embrey, “Operation Just 52
Owens, 52–53.
operations of the war on terror com- Cause: Concepts for Shaping Future Rapid 53
Watson, 218.
pelled the Services to work together on a Decisive Operations,” in Transformation Con- 54
Price T. Bingham, “Air Power in Desert
regular basis that the concept of jointness cepts for National Security in the 21st Century, Storm and the Need for Doctrinal Change,”
started to become fully realized. General ed. Williamson Murray (Carlisle Barracks, PA: Airpower Journal 5, no. 4 (1991), 33.
Strategic Studies Institute, 2002), 202. 55
Ibid.
Dempsey’s concept of globally integrated 16
Ibid., 198, 205. 56
LeMay Center for Doctrine, “Airmen’s
operations is poised to continue this de- 17
Ibid., 223. Perspective,” available at <https://doctrine.
velopment, so that future military leaders 18
Ibid., 236. af.mil/download.jsp?filename=V1-D24-Air-
will think of jointness as second nature 19
Ibid., 234. mans-Perspective.pdf>.
to their operations. It is recommended
20
Bruce W. Watson et al., Military Lessons 57
Weitz, 136–137.
of the Gulf War (London: Greenhill Books, 58
Ibid., 141.
that military officers at all levels study
1993), 15. 59
Ibid., 137.
and recognize both the benefits and the 21
Michael R. Gordon and Bernard E. 60
Ibid., 139.
challenges of jointness. It is only through Trainor, The Generals’ War: The Inside Story of 61
JP 1, IV-4.
persistent synchronization and collabora- the Conflict in the Gulf (Boston: Little, Brown 62
William O. Odom and Christopher D.
tion that the Services can fully realize the and Company, 1995), 14. Hayes, “Cross-Domain Synergy: Advancing
22
Ibid., 49. Jointness,” Joint Force Quarterly 73 (2nd Quar-
possibilities of joint operations and build 23
Ibid., 52. ter 2014), 123.
appropriate coordinating mechanisms 24
Watson, 81. 63
JP 3-0, Joint Operations (Washington,
and practices organically. JFQ 25
Ibid., 246. DC: The Joint Staff, 2011), A-4.
26
Ibid., 226. 64
Martin E. Dempsey, Capstone Concept
27
Ibid., 69. for Joint Operations (CCJO): Joint Force 2020
28
Damian J. McMarthy and Susan A. (Washington, DC: The Joint Staff, 2012), 4.
Notes Medlin, “Two Hats for the Joint Force Com- 65
Ibid., 8–10.
mander?” Joint Force Quarterly 25 (Summer 66
D.H. McCauley, “Globally Integrated
1
Doctrinally described as “cross-Service
2000), 91. Operations: A Reflection of Environmental
combination wherein the capability of the joint 29
Gordon and Trainor, 209–210. Complexity,” Joint Force Quarterly 71 (4th
force is understood to be synergistic, with the 30
Ibid., 216. Quarter 2013), 66.
sum greater than its parts.” See Joint Publica- 31
Watson, 70.
tion (JP) 1, Doctrine for the Armed Forces of 32
Ibid., 180–181.
the United States (Washington, DC: The Joint 33
Gordon and Trainor, 285–286.
Staff, 2013), ix. 34
Watson, 96–98.
2
Mackubin T. Owens, Jr., “Goldwater- 35
Ibid., 99, 111.
Nichols: A Ten-Year Retrospective,” Marine 36
Ibid., 101–102, 111–113.
Corps Gazette 80 (1996), 52–53. 37
Ibid., 110.
3
Kathleen J. McInnis, Goldwater-Nichols 38
Ibid., 116–118.
at 30: Defense Reform and Issues for Congress, 39
Harry G. Summers, Jr., On Strategy II:
R44474 (Washington, DC: Congressional
A Critical Analysis of the Gulf War (New York:
Research Service, June 2, 2016), 3.
Dell Publishing, 1992), 241.

JFQ 85, 2nd Quarter 2017 Marquis, Dye, and Kinkead  83


building in Iraq and Afghanistan. to export its political and democratic
Mandelbaum paints a picture of a ideals into societies with little capacity
foreign policy apparatus beset by lack of for change. Mandelbaum draws excellent
interest and political cohesion, demo- comparisons with the U.S. occupations
tion in importance to domestic policy, in both Germany and Japan, describ-
and a repeated failure to understand ing how their prewar national identities
key aspects of the societies in which the and civil structures were instrumental
United States chose to intervene. in their postwar success. In contrast,
Mandelbaum’s early chapters high- when American policymakers intervened
light key points that set the stage for in Haiti and Bosnia, they encountered
the later portions of the book: the U.S. kinship-based societies with little record
insistence on imposing its ideals on other of accountable, impersonal institutions
nations, a lack of a clear post–Cold War or rule of law, facts that were repeatedly
goal in regard to foreign policy, and the ignored.
absence of a counterweight to oppose Mandelbaum adequately addresses
U.S. ambitions overseas. The United actions prior to 9/11, but the book
States was caught unaware by the rela- takes an interesting shift when he pivots
tive freedom to act in which it found to discussing post-9/11 foreign policy.
itself; Mandelbaum refers to this when he These chapters are truly the highlight
mentions that “historically, where their of the book, as the author delves into
foreign policies are concerned sovereign the minutiae of the American response.
states inhabit the realm of necessity; Pointing out how 9/11 reprioritized
they do what they must to survive. The foreign policy for U.S. policymakers,
Mission Failure: America and the United States after the Cold War, by Mandelbaum describes the shifting per-
World in the Post–Cold War Era contrast, dwelled in the difficult-to-reach ception of terrorism from being a crime
By Michael Mandelbaum
kingdom of choice.” With a policy ap- to being an act of combat as al Qaeda
Oxford University Press, 2016
paratus built mainly to deter and dissuade focused its methods on mass slaughter.
485 pp. $29.95
the Soviet Union, the United States This change set the stage for other U.S.
ISBN: 978-0190469474
emerged from the Cold War determined actions of the time, such as the increasing
Reviewed by Bruno Carvalho to spread its core ideals of democracy use of targeted drone strikes, the extrale-
and the free-market system. At the same gal rendition of suspected terrorists, the
time, Mandelbaum notes how the United use of torture, and the National Security
eactionary, expansive, naive: these States, having “won” the Cold War, Agency’s domestic collection pro-

R are the themes that Michael Man-


delbaum alludes to most often
in his extensive look at U.S. foreign
switched its priorities to a domestic focus,
with its domestic political class also losing
the cohesion that the need to counter the
grams—all done in the name of fighting
terrorism. Pointing out that in hindsight,
the lack of attacks after 9/11 means that
policy since the end of the Cold War. Soviet Union had fortified. the terrorist threat may have been over-
Mandelbaum examines foreign policy Mandelbaum’s strength lies in dem- blown, Mandelbaum frames this change
from the end of the George H.W. Bush onstrating the results of a less focused as the United States returning to acting
Presidency through the Barack Obama foreign policy, with goals driven by niche on its interests instead of its ideals. The
administration, highlighting the mix of wants and domestic popularity rather U.S. intervention in Afghanistan in 2001
wishful thinking and lack of focus that than actual strategic needs or interests. is described the same way; in acting on its
prevailed as the United States found A case in point is his description of the interests to root out al Qaeda and capture
itself unchecked on the global stage Clinton administration’s Somalia inter- Osama Bin Laden, the United States
following the decline and eventual dis- vention in 1993, which details how a failed to give Afghanistan’s government
solution of the Soviet Union in 1991. humanitarian mission descended into the tools it would need to succeed later,
Mandelbaum assesses several notable mission creep that resulted in U.S. casual- setting the stage for the corruption of the
foreign policy failures: the North ties. The resulting fallout would then set Hamid Karzai regime.
Atlantic Treaty Organization expansion the stage for future American interven- Mandelbaum’s description of the Iraq
and the bungled rapprochement with tions to be casualty averse and beholden War and the continuous failure of U.S.
Russia; the failure to instill democracy to politicians focused on domestic needs involvement in the Israeli-Palestinian
in China; Bill Clinton’s interventions and approval ratings. peace process further highlights his
in Bosnia, Haiti, and Somalia; and the This pattern of shallow interventions overall theme of U.S. foreign policy
mixed record on the Israeli-Palestinian would be repeated in both Haiti and the shortcomings. Briefly describing Iraq’s
conflict and U.S. attempts at nation- Balkans, as the United States attempted history as a nation with kinship- and

84  Book Reviews JFQ 85, 2nd Quarter 2017


tribal-based societies, he lambasts the was appointed the British Secretary of
U.S. expectation that such a fractious War in December 1905, reformed the
country would embrace American-style British army despite its well-established
democracy and freedom. The author naval supremacy and significant spending
details how the United States, in its at- restraints. After analyzing the strategic
tempts at post-invasion order, simply environment, Haldane concluded he did
replaced Iraq’s Sunnis with its Shia not know precisely which power or alli-
population in the ruling structure, ance Britain would face in the next war.
setting the stage for a sectarian govern- He asked first-order questions: Whom do
ment, reprisals, and the eventual start we fight? Where do we fight? And how
of Iraq’s brutal insurgency and civil war. do we fight? The reforms were nested
Mandelbaum describes the Iraqi mission under the answers to these questions.
as one doomed to fail from the start—a The subsequent battle of Mons in 1914
“struggle between American will and the would reveal that Haldane’s reforms
laws of gravity of the region.” The U.S. served the British army well. The British
involvement in the Israeli-Palestinian Expeditionary Force proved to be stra-
peace process is similarly described as an tegically decisive in protecting France
attempt to force dissimilar cultures to until the Allied powers, which eventu-
accept American concepts of negotiation, ally included U.S. forces, could defeat
acceptance, and rule of law. Germany.
The thread that ties together Mission Next, Macgregor details the Japanese
Failure is the repeating theme of disin- rise to power and embrace of many
terested, unfocused, and mismanaged Western ideas in the early 1900s. General
foreign policy after the end of the Cold
Margin of Victory: Five Ugaki Kazushige “embodied the fight
War. Describing an American public and
Battles that Changed the for change inside the Imperial Japanese
government apparatus eager to return to
Face of Modern War Army (IJA),” as the Japanese struggled
by Douglas Macgregor
domestic needs, Mandelbaum paints a with reform and balancing resources
Naval Institute Press, 2016
picture of conflicts defined by ideology between the navy and army. Much like
288 pp. $34.95
and not interests; of interventions run Haldane, many of his reforms were
ISBN: 978-1612519968
according to fickle domestic popularity; resisted, blocked, or ignored by some
and, perhaps most damaging, of under- Reviewed by John Dethlefs military leadership. The subsequent battle
resourced and mismanaged missions, of Shanghai in 1937 put these reforms
from Haiti, Somalia, and Bosnia to Iraq, to the test: “The disparity in Chinese
Afghanistan, and the Israeli-Palestinian ouglas Macgregor’s newest book and Japanese losses highlights the impact
peace process. In his closing chapter,
Mandelbaum describes a “restoration”
of historic power politics and declares the
D offers a tutorial and blueprint for
the strategically guided devel-
opment of the U.S. military. This is
of Ugaki’s modest modernization ef-
forts and the high quality of Japanese
troops and leadership, but the struggle
end of the post–Cold War period of U.S. timely, as the Department of Defense for control of Shanghai was harder and
preeminence in world affairs. Ironically, finds itself preparing for our future bloodier that it should have been. The
Mandelbaum describes this return to national defense strategy, which in IJA had failed to change enough to
form as an opening for the United States the Barack Obama administration was achieve a true margin of victory.” Herein
to revert to its interest-based roots—a often referred to as the Third Offset. lies a subtle warning to U.S. planners that
conclusion that may assure students of Planning for it should be nested within they must be ruthless with our reform as
history but leaves us wondering, who will the current and anticipated strategic we adjust to the new strategic environ-
fill that vacuum? JFQ environment, emerging technolo- ment and growing capabilities of possible
gies, and how we intend to fight our adversaries.
next war. Macgregor analyzes the The author next analyzes the
Bruno Carvalho is a graduate student in the preparation for, execution of, and modernization of the post–World War
School for Conflict Analysis and Resolution at
George Mason University. He previously served 6 consequences of belligerence in five I Soviet and German forces and subse-
years with the U.S. Army. significant battles. He also includes a quent destruction of the German Army
chapter with recommendations (some Group Center in June 1944 by Soviet
of which are quite controversial) for the forces in Eastern Europe. Macgregor
U.S. military’s development. argues the German defeat was decided
In the opening chapter, the author well before any German forces entered
recounts how Sir Richard Haldane, who the Soviet Union. The difference was

JFQ 85, 2nd Quarter 2017 Book Reviews 85


ultimately how the Soviets and Germans concurs with that assessment at the of responsibility and lower echelons face
approached military reform based on tactical level, he makes the argument even greater micromanagement.
desired strategy. that the campaign was a lost strategic Macgregor recommends changing the
Before the war, “the idea of wag- opportunity for the United States. While way we fight, stating that “full spectrum
ing total war to make Germany a world successful, this battle did reveal flaws in military dominance on a global basis is
power was absent from German strategic our strategic thinking and execution. both unaffordable and unnecessary,”
thinking.” Macgregor goes on to explain Macgregor contends that “although the which directly challenges our past empha-
Adolf Hitler’s demand that officers twentieth century closed on a note of sis on building global security. This makes
obey orders without dissent and his unrivaled American superiority in military sense in the face of decreasing budgets
replacement of very capable officers with affairs, the failure of policymakers and and changes in the strategic environment.
obedient technocrats. Their efforts in military leaders in Washington to define Other recommendations include reduc-
developing mechanized forces did not go the purpose, method, and end state of ing the number of light infantry forces
far enough, as the Wehrmacht remained military operations robbed the United due to the increase in lethality of modern
too reliant on horses and light infantry. States and its coalition partners of a de- weapons and replacing them with more
The Soviets made many mistakes (includ- cisive strategic victory.” He argues that armored combat formations requiring
ing their own purges of capable officers), U.S. aversion to risk allowed most of the fewer—but more mobile, protected, and
but weather and distance granted them Republican Guard to escape, ensuring lethal—people. Hardening or expanding
the time to recover and regenerate their Saddam Hussein would remain in power. intelligence, surveillance, and recon-
officer corps. The Soviets ultimately From this, he claims that “the myth of naissance (ISR), communications, and
learned from their mistakes more quickly the bloodless victory was born, and with space-based capabilities is important, as
and developed more strategic agility it, the seductive promise of silver bullet our potential adversaries arguably see dis-
wherein a Soviet marshal had more joint technology that encourages arrogance rupting these as the best method to gain
command authority than General Dwight and fosters illusions of victory with zero parity with us.
D. Eisenhower did or our current com- casualties was made.” Macgregor makes many profound
batant commanders can. The subsequent Macgregor concludes by looking at recommendations based on significant
warfare rewarded operational agility, America’s “margin of victory” for the 21st historical evidence. This is a must-read
mobility, protection, and firepower—at- century. He is quite critical of the current for strategic leaders seeking ideas on
tributes Macgregor contends are even strategic direction. He correctly warns military reform. In what I have read
more important today. that “without effective strategic direction, about future strategy and the defense
In assessing the Yom Kippur war in battles such as 73 Easting can be won, innovation (including the Third Offset),
the Sinai in 1973, the success of Egypt’s but wars can still be lost.” few to none of Macgregor’s proposals
reforms after its defeat in 1969–1970, His more detailed recommendations are being considered. The focus is on
coupled with Israeli complacency, almost are quite controversial. The first discusses technology improvements—mostly in
led to an overwhelming victory for the need for a change in U.S. national regard to ISR and autonomous sys-
Anwar Sadat. However, Israeli culture, military strategy, contending that “the tems—and not the fundamental changes
leadership, training, technology, and United States must act now to build the Macgregor champions. They deserve
adaptability eventually turned the tide. means of commanding its armed forces serious consideration. JFQ
Considering this battle, Macgregor and impose unity of effort across service
contends that recent ideas to convert the lines,” which he finds currently lacking.
Israeli army largely into a light force of He writes expansively about ruthless re- Colonel John Dethlefs, USAR, is the Commander
of the 209th Digital Liaison Detachment and a
riflemen that depends on airstrikes for form focused on building joint integrated student at the U.S. Army War College.
effectiveness is perilous. He highlights the command structures at the operational
enduring Israeli principle that diversity of level. This will improve American political
capability is vital to success and implies and military leaders’ ability to compre-
it should be copied. He correctly points hensively and decisively direct military
out that unless Egyptian and Arab society power. Macgregor recommends that
changes in fundamental ways, they are we have fewer command and control
unlikely to acquire the capabilities re- echelons, faster decision cycles, and more
quired for success in war against modern independence at lower levels, and that
forces such as those of Israel. we become more mobile and dispersed.
The last battle analyzed is one that This is a direct challenge to the current
Macgregor participated in personally. The “fighting by concept of operations,” in
Battle of 73 Easting during Operation which four-star commands need approval
Desert Storm is regularly cited as an for almost all actions in their own area
overwhelming success. While Macgregor

86  Book Reviews JFQ 85, 2nd Quarter 2017


that could encompass “grand strategy,” a “purpose driven application of . . .
its recommendation that strategy be resources to . . . synergistically converge
purposeful, systematic, and forward with, reinforce and leverage one another.”
thinking to ensure that resilience and The major implication is that Americans
sustainability are the foundation of lon- need to create a cycle in which demand,
gevity and continued greatness should skill, diversity, and global systems combine
be heeded. to ensure sustained, systemic resilience
The New Grand Strategy’s key theme and prosperity becomes and remains
is that “we the people” must lead the the foundation to our security. This is a
shaping and rebuilding of the world, the broader definition of grand strategy than
bid for resilience and self-sustainability. many military readers will initially appreci-
For Americans, leading change begins in ate, but it bears strong consideration for
our own communities and by example, our greater overall security.
extending influence to all global residents. The altruistic and idealist character of
The days of expending vast amounts The New Grand Strategy may be both the
of time and resources on seemingly strongest and weakest feature for readers.
“important” current issues and treating Ideas such as bringing together public,
symptoms must give way to addressing private, and civil sectors in an integrated
root causes and investing for the long and coordinated system and aligning
term in our most precious asset, the long-term planning as the essence of
human. Though the authors propose a community sustainability and resilience
way to address the challenges forecast may be difficult to compartmentalize.
in the 21st-century narrative, the nature Moreover, collectively understanding that
The New Grand Strategy: (versus the character) of their argument is efforts to impact and achieve successes
Restoring America’s Prosperity, sound: addressing generational challenges, at the local levels inevitably engender
Security, and Sustainability demand, and sustainability in a systematic productivity at the highest levels of
in the 21st Century solution that shows that “the whole [is] the Nation and world may be seen as
By Mark Mykleby, Patrick Doherty, and
greater than the sum of its parts” is inte- a stretch to attain. However, this is the
Joel Makower
gral to collectively formulating strategy. challenge the text argues we undertake
St. Martin’s Press, 2016
Within this theme, The New Grand with some urgency. I agree with the
288 pp. $18.61
Strategy addresses three aspects of to- authors that the above is possible because
ISBN: 978-1250072306
day’s environment and suggests how Americans and global citizens embrace
Reviewed by Micheal D. Russ designing and implementing a strategy liberty and understand the communal
where the “representative democracy” aspect of preserving it community. It will
supports “demand-plus-capital” sustain- take time to think, create, implement,
n The New Grand Strategy, the ability is possible. The first section, “The and iterate a strategy that works.

I authors correctly assert that the


United States cannot rely on the
bureaucracy of international and
Challenge of a Generation,” outlines
the idea that implementing a plan to tap
into the “vast stores of pent-up capital”
The New Grand Strategy is pertinent
to all sectors of society. When building
resilient, sustainable communities, we can
national entities to move forward and in response to “new pools of demand” achieve positive, distinct gains for all citi-
purposefully lead change, when and is a powerful mechanism for the rapid, zens of the world when we strive for and
where it matters. This book is a call to sustainable growth of a “secure America.” achieve collective impacts. Moving for-
action in which a synthesis of strategy, The next section, “Pools of Demand,” ward to address generational challenges
planning, and operations trumps analy- shows that collective security is at risk due and the issues of demand and sustainabil-
sis, avoids trivial pursuits, and catalyzes to the fact that it is caught in a whirlpool ity systematically is going to be difficult,
action by “we the people.” Whereas of self-centered activities that encour- but it is also our greatest responsibility.
“grand strategy” is largely debated in age and “incentivize waste” rather than The authors are clear: with “a spirit of
academia and think tanks as an abstrac- reward “resource efficiency.” In the last innovation, a stubborn grit, and an ir-
tion, strategy requires purpose and section, “Full-Spectrum Sustainability” repressible belief that nothing is beyond
implementing operations. It also neces- is touted as integral to multilevel com- our grasp,” we will move forward. JFQ
sitates frequent institutional reflection, munity resilience and prosperity and
refinement, and changing of paradigms focused on the long term rather than
that inhibit the ability to adapt to a looking backward to “keystone industries Lieutenant Colonel Micheal D. Russ, USMC, is
the Associate Dean and Warfighting Department
changing world order. Though the designed for the last economic engine.” Head at the Marine Corps Command and Staff
book may not account for every element The authors also profess the need for College, Marine Corps University, Quantico, VA.

JFQ 85, 2nd Quarter 2017 Book Reviews 87


AV-8B Harrier aircraft pilot with Marine Attack Squadron 211,
Marine Aircraft Group 13, 3rd Marine Aircraft Wing (Forward),
relocates Harrier to Camp Bastion, Helmand Province, to
increase overall readiness level after September 14, 2012
attack (DOD/Keonaona Paulo)

Improving Joint Doctrine for


Security in Theater
Lessons from the Bastion-Leatherneck-
Shorabak Attack
By Nicholas J. Petren

n September 2012, Taliban insur- 14, 15 insurgents exploited a weak- Marine Corps AV-8B Harriers and

I gents conducted one of the most


significant attacks against an airfield
from which U.S. forces were operating
ness in the perimeter of the sprawling
Bastion-Leatherneck-Shorabak (BLS)
complex to gain access and attack coali-
severely damage two others. In addi-
tion, an Air Force C-130 Hercules,
a C-12, three MV-22 Ospreys, and
since the Vietnam War. On September tion equipment and personnel. Over a British Sea King helicopter were
the next 6 hours, responding U.S. and damaged, while several aircraft shel-
British personnel captured 1 attacker ters, hangars, fuel bladders, and other
Major Nicholas J. Petren, USAF, is a student at the
and killed the other 14. However, the equipment in the area were damaged or
U.S. Army Command and General Staff College. insurgents were able to destroy six destroyed. In all, the attack caused over

88  Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
$200 million in damage,1 but the most Background coalition forces and contractors that were
tragic losses were two U.S. Marines, By September 2012, the International not operating as one team. The interac-
killed during the firefight that also Security Assistance Force (ISAF) was tions between these units were regulated
injured 17 U.S. and British personnel.2 in the midst of the drawdown from the by a memorandum of understanding,
The causal factors permitting this Afghanistan surge and was under pres- under which the Camp Bastion and
attack to happen included a convoluted sure to begin turnover of responsibility Camp Leatherneck SECFOR operated
force protection task organization, lack for security to the Afghan forces. The independently with separate standard
of unit integration, and failure to identify overall number of ISAF soldiers in operating procedures and did not effec-
a single tactical-level commander with Afghanistan was steadily drawing down tively coordinate perimeter surveillance or
the responsibility for base defense, all of from a high of more than 130,000; on patrol activity on and off base.
which contributed to and were exacer- September 10, the number stood at Camp Bastion was defended by a
bated by failures in risk management.3 112,579, with 74,400 of those from the 134-person unit from the Royal Air Force
Complex operating environment or not, United States.5 The BLS complex (now (RAF) regiment, assisted by an augment-
this tragic incident was avoidable. If the called Camp Shorabak by the Afghan ing force drawn from other assigned units
defending security forces were better government) in Helmand Province was along with a small force of the Tongan
organized and not decremented to the home to more than 20,000 coalition Defense Services. The RAF provided
point that they were not reasonably ca- personnel. Major General Gurganus headquarters, a quick reaction force
pable of effectively maintaining a secure was commander of ISAF’s Regional (QRF), and patrols, while the Tongans
perimeter or dominating the terrain im- Command–Southwest (RC[SW]), and the augmentation force personnel
mediately around the base, the insurgents headquartered on BLS. RC(SW) manned the perimeter towers. Of the 24
would have been much less likely to have encompassed a 99,700-square-kilometer towers on Camp Bastion, only 11 were
gained access to the aircraft parking area. area made up of Nimruz Province and routinely manned due to a lack of avail-
Clearly, this incident required the the troubled Helmand Province, with a able personnel, a risk accepted by the
assessment of responsibility. The U.S. host nation population of approximately RAF Camp Bastion commander.9
commanders responsible for the defense 1.1 million.6 RC(SW) was supported by The Camp Leatherneck defense
of the BLS complex, Marine Corps Major the 3rd Marine Aircraft Wing (Forward), comprised 255 contractors, a 288-per-
Generals Charles Gurganus and Gregg commanded by Major General Stur- son force from the Jordanian military, a
Sturdevant, were censured and asked to devant, headquartered and primarily 105-member element from the Bahraini
retire following the completion of the U.S. operating from BLS. In March 2012, armed forces, and a 110-member team
Central Command (USCENTCOM) RC(SW) included 17,800 U.S. Marines. from 2d Battalion, 10th U.S. Marine
investigation. Furthermore, as the By September 2012, there were 7,400.7 Regiment (2/10), a field artillery unit.10
British House of Commons Defence This force drawdown necessitated oper- The contractors and non–U.S. military
Committee’s report concluded: ational and tactical force allocation and personnel manned entry control points,
mission curtailment decisions. These perimeter towers, and provided internal
Insufficient attention was given to the fun- decisions were risk management calcula- QRF for Camp Leatherneck, while
damental requirement of defending Camp tions, accounting for force protection. the Marines performed a myriad of
Bastion from external assault. We believe Major General Gurganus’s higher com- security-related tasks. Camp Shorabak
that this was complacent. Given that the mander, U.S. Army Lieutenant General (formerly Camp Bastion) is an Afghan
attack took place in the British sector of James Terry, stated that “there was a ministry of defense airbase located
the camp, British commanders must bear constant balance between projecting northwest of the city of Lashkar Gah,
a degree of responsibility for these systemic forces and protecting the force during in Helmand Province, and the 2/10
failures.4 this period with priority to protecting commander had primary responsibility
the force.”8 for off-base patrolling in the approxi-
It is evident that the risk management In terms of tactical elements or- mately 1,000-square-kilometer area of
decisions of the British commander of ganized to defend BLS, the base was operation (AO) surrounding BLS.11
Camp Bastion were found to be lacking. a complex of camps grouped primar- The task force responsibilities included
Beyond individual accountability, an ily in three areas. Camp Bastion, “providing [field artillery] support for
examination of the doctrinal and opera- including the airfield, was operated and Task Force (TF) Leatherneck, operating
tional context is necessary in order to defended largely by British forces. Camp the Combined Joint Operations Center
address shortcomings and decrease the Leatherneck was the Marine Corps area, (CJOC), manning [entry control points]
possibility of similar incidents during fu- and Camp Shorabak was the Afghan on Camp Leatherneck, manning a QRF,
ture operations. Specifically, joint doctrine National Army area. The entire complex manning Patrol Base Boldak, and man-
addressing security in theater must stress was contained within a 37-kilometer-long ning the Tactical Recovery of Aircraft
the importance of planning to secure stra- perimeter. The security force (SECFOR) and Personnel (TRAP) mission.”12 Due
tegic airfields and logistical hubs. available included a broad array of to their varied responsibilities, the 110

JFQ 85, 2nd Quarter 2017 Petren 89


members of 2/10 could only generate they made their way toward the Camp loss of life and equipment.”18 Of note,
one squad per 24-hour period to patrol Bastion perimeter using a ravine to Lieutenant Colonel Christopher Raible,
off base. The RAF regiment element was mask their approach. They were armed the Harrier squadron commander, was
able to generate one to three squad-sized with AK-47s, rocket-propelled grenades killed while valiantly leading the charge
patrols as well, but their activity was not (RPGs), and fragmentation grenades, to defend his aircraft and fellow Marines
consistent or effectively integrated with and some of the attackers were huffing along with Sergeant Bradley Atwell. The
U.S. security forces. Although the CJOC paint. On that night, there was 2 Air Force pararescue team that voluntarily
existed in order to coordinate force percent illumination, and per Camp ran into the firefight and played an im-
protection activity and performed in that Bastion standard operation procedures, portant role in defeating the attackers by
task during the attack, coordination was only every other perimeter tower was coordinating with attack helicopters and
primarily reactive, as structured in the manned.16 The insurgents breached the participating in clearing operations with
memorandum of understanding. If the perimeter fence with wire cutters 150 the RAF QRF is another example of the
combined manpower available for force meters from unmanned tower 16 and day’s heroic actions.
protection had operated as a single, effec- entered the base undetected to begin
tive unit, the BLS perimeter would likely their attack at approximately 2200. They Improving Joint Doctrine
have been more secure. split into three groups of five, targeting Doctrine is relevant to the tactical-level
In June 2012, a Joint Staff Integrated Harriers, helicopters, and personnel, decisions of base defense because it
Vulnerability Assessment (JSIVA) team respectively. After the insurgents started guides how leaders in the joint force
visited Camp Leatherneck and Bastion shooting, it took 16 minutes for the think about and prepare for expedition-
airfield. The team concluded that the first elements of the Camp Bastion ary base defense. The 2014 version of
airfield’s security was inferior to that at QRF to make contact with the enemy. Joint Publication (JP) 3-10, Joint Secu-
Bagram Airfield and identified six vul- Over the next few hours, the insurgents rity Operations in Theater, incorporated
nerabilities. Further, the team “assessed caused the damage described earlier numerous constructive updates based
the two routine patrols assigned to the before 14 of them were neutralized on lessons learned in Operation Iraqi
airfield as largely ineffective from a pre- by RAF, Marine Corps, and Air Force Freedom (OIF) and Operation Endur-
ventative/detection perspective, primarily personnel on the ground with support- ing Freedom (OEF). However, given
because of the size of the airfield and ing fire from attack helicopters, while the likelihood of similarly complex joint
ramps, the aircraft dispersion, the light- the fifteenth was captured wounded. interagency intergovernmental multina-
ing, the lack of detection and warning Post-attack analysis showed the attackers tional operations in the future, there is
systems in place,” and “not being able to used Soviet-era F1 grenades to destroy still room for significant improvement.
control access (vehicle and pedestrian) to the Harriers, meaning they were close First, large, joint-use airfields, often
the airfield.”13 enough to accurately roll, throw, or collocated with equally critical ground
During June and July 2012, Camp place them under the aircraft.17 This force–operated sustainment hubs, are
Bastion perimeter breaches were discov- is significant because it illustrates the often the primary platforms from which
ered after the fact but were accepted by failure of the combined elements of the the force projects military power across
the 3rd Marine Air Wing and RAF Camp Camp Bastion SECFOR or organic units joint operational areas or theaters, and
Bastion commanders as criminal “scrap- to detect the approach of the Taliban, their protection must be a priority. This
ping” rather than evidence of insurgent their breach of the perimeter, or their must be formally acknowledged and
probing of perimeter defenses in prepara- free movement around the Harriers planned for in initial phases of joint
tion for an attack.14 The July breach was on the flight line until the attack was operations planning. Defending these
performed by individuals who penetrated under way. Furthermore, the initial types of bases or base clusters is critical
the same area of Camp Bastion targeted contact with the enemy and disruption across the spectrum of conflict. Surely,
in the September 2012 attack and then of the Taliban attack was conducted by they will appear on a near peer enemy’s
exited the base through their breach maintenance/support personnel and high value target list equivalent, just as
point undetected. Surveillance video of pilots of the 3rd Marine Air Wing rather they will continue to be targeted by in-
another breach revealed reconnaissance than base SECFOR. During the attack, surgent or terrorist forces. JP 3-10 states
of an empty guard tower.15 integration of highly effective fire from that when facing Level I and II threats
Marine aviation was as much the result (including terrorists or enemy special
The Attack of ad hoc coordination by Marines and operations forces), commanders should
The Taliban attackers were provided Airmen who rose to the occasion as it organize security forces “drawing from
with intelligence on their targeted area was a controlled integration of fires in the units available.”19 This is appropriate
of the Camp Bastion airfield. They the BLS CJOC. for small command observation posts or
were transported to just outside the As the USCENTCOM report states, forward operating bases in lower threat
camp, where they donned U.S. Army “Only heroic action by U.S. and UK environments, but for large air bases
uniforms. At approximately 2000 hours, forces on the scene prevented greater or sustainment hubs, it exacerbates the

90  Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
Marine with Mobile Assault Platoon 4, Weapons Company, 1st Battalion, 25th Marine Regiment patrols southern Washir District, Helmand Province,
October 2, 2011

tension between projecting power and [joint security operations] within the base command. . . . Unity of command would
force protection. JP 3-10 should direct boundary22 to a single commander.”23 have provided the single commander
commanders to incorporate all available These are valuable improvements to the with common oversight and enforcement
units into base security plans but not to document, but some thorny issues remain of standards for all units responsible for
draw from them as the primary source of unresolved. For example, the challenge of protection of the BLS Complex.”24 If
SECFOR. Units tasked as SECFOR must incorporating coalition forces is addressed current or future leaders see a fragmented
be specifically identified, trained, and de- only superficially. It is understood that SECFOR chain of command or lack of
ployed for that mission. This will provide U.S. joint doctrine only applies to U.S. organization similar to that which existed
commanders in theater the flexibility to forces. However, joint doctrine should at BLS prior to the 2012 attack, red flags
shift focus without taking imprudent risk. clearly direct commanders to ensure a should immediately go up, and corrective
Second, doctrine must stress the need single commander retains tactical control action must be taken promptly.
for a single commander at the appropriate of all coalition forces incorporated into a Lastly, the joint force must overcome
level with the authority and responsibility base cluster SECFOR. The United States cultural resistance to expanding the base
over not only the base or base cluster, but should be more insistent on this when boundary of critical air bases in theater
also the surrounding tactically relevant it comes to national caveats or coalition based on threat, vulnerability, and ter-
AO. JP 3-10 currently includes “Air command and control arrangements. rain analysis. Currently, the concept of
Base Defense Considerations”20 and the Rather than dismissing this assertion expanding the base boundary is included
“establishment of base and base cluster as politically naive, challenge others to in JP 3-10 as something commanders
command relationships,”21 directing “it justify why irresponsibly vague com- should “consider.” Rather, it should be
is critically important that the JFC [joint mand structures are acceptable. In the the preferred procedure, while retain-
force commander], normally through case of BLS, the USCENTCOM report ing the flexibility to adjust due to local
the JSC [joint security coordinator], stated that “the BLS Complex also conditions. A base commander with
delegate the authority to conduct JSO lacked a single commander with unity of base defense as a key component of the

JFQ 85, 2nd Quarter 2017 Petren 91


wearing suicide vests. They attempted
to breach the perimeter in two separate
locations simultaneously.29 In contrast
to the BLS incident, the attackers were
detected outside the perimeter and were
defeated before they could penetrate the
base defenses. Sixteen of the attackers
were killed in the firefight.30 The attack
failed to inflict any major damage to the
base, although nine friendly personnel
were injured. A critical factor that con-
tributed to a better outcome than the
BLS attack was clear responsibility and
authority for base defense. The 455th Air
Expeditionary Wing commander was
the base commander responsible for base
defense, and the SECFOR was led by
the 455th Expeditionary Security Forces
Squadron (ESFS) commander. The ESFS
was responsible for the perimeter defense,
Security during Relief in Place ceremony at Base Defense Operations Center, Camp Leatherneck, internal QRF, and screening of personnel
Afghanistan, to commemorate Transition of Authority from 1st Battalion, 23rd Marines to 1st Battalion,
and vehicles entering base. The 455 ESFS
25th Marines, September 13, 2011 (Royal Air Force/Mitch Moore)
also operated the joint defense operations
mission will have the focus and ability Indirect fire attacks on the base and other center, which effectively coordinated
to drive intelligence-based operations to attacks inside TF 1041’s AO were re- support from Air Force aircraft, Army
reduce indirect, direct, small unmanned duced to nearly zero.26 aviation, and Army ground units operating
aerial systems, and improvised explosive In part, due to this demonstrated outside the perimeter during the attack.
device (IED) attacks affecting the area. success, when Joint Base Balad was later In order to build upon this success and
For proof, one needs to look no further reorganized in 2008 under the command better defend the largest coalition military
than the success of Task Force 1041 at of the 332nd Expeditionary Air Wing, operating location in Afghanistan, in
Joint Base Balad during OIF or Task the 332nd Expeditionary Security Forces November 2012 Task Force 455 stood
Force 455 at Bagram Air Base during Group (ESFG) stood up. Its commander up. The initial 1,200-member 455th
OEF. was an O-6 leading a nearly 1,000-person Expeditionary Security Forces Group
In late 2004, Balad Air Base was under coalition SECFOR team focused on the evolved into a 2,200-person Expeditionary
frequent indirect fire attack and located in mission of defending Joint Base Balad.27 Base Defense Group (EBDG) and
one of the region’s most violent areas.25 This combination of unity of command, Combined Joint Task Force with the
Balad Air Base had an effective perimeter authority, responsibility, and clear task or- addition of a U.S. Army field artillery
defense, but the base commander had no ganization set conditions for effective base battalion, a Jordanian infantry battalion,
authority outside of it. After successful defense. While the ESFG achieved notable and a Czech Republic force protection
negotiations with higher and adjacent results, inconsistent willingness to more company. Tasked to defend Bagram and
commanders, the base commander was permanently expand the base boundary patrol the surrounding AO, the 455
granted the authority to temporarily ex- around Balad remained problematic. EBDG commander effectively oper-
pand the base boundary. Task Force 1041 Bagram Air Base was mentioned in ated as a brigade-level battlespace owner
consisted of a reinforced company-sized the 2012 Leatherneck JSIVA report as an under the tactical control of the 101st
element whose mission was to operate off example of superior perimeter security. Airborne Division (Air Assault)/Regional
base in a 5-by-10-kilometer area between In May 2010, the Taliban conducted Command East commanding general
the base perimeter and the Tigris River, an attack on Bagram Air Base that was within a 570-square-kilometer area.”31
where the majority of indirect fire and more determined than the September This evolution of command structures
IED attacks affecting base operations 2012 attack on BLS. Between 20 and and responsibilities evolved at Joint Base
originated. After focused intelligence 30 Taliban insurgents assaulted the base Balad and Bagram from lessons learned,
preparation, Operation Desert Safe Side around 0300 hours.28 They were armed and they should serve as positive examples
commenced on January 1, 2005. Over with AK-47s, RPGs, and hand grenades, of large base defense in theater. This is
the next 60 days Task Force 1041 cap- and were supported by coordinated not to say that each should be replicated
tured 17 high-value individuals, 98 other indirect fire. The attackers were wearing exactly in the future, but the basic model
insurgents, and 8 major weapons caches. U.S. military uniforms, and some were of unity of base defense responsibility,

92  Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
authority, command, and effort is criti- We can do better to set up future
21
Ibid., II-11.
22
JP 1-02, Department of Defense Diction-
cal to success and applicable to joint or commanders for success by improving JP ary of Military and Associated Terms (Washing-
coalition forces. The Air Force uses the 3-10 to increase the likelihood of sound ton, DC: The Joint Staff, November 8, 2010,
term base security zone to describe the area risk management and coherent, tacti- as amended through February 15, 2016). The
outside of the base perimeter fence/ob- cally effective base defenses around our DOD dictionary defines the base boundary as
stacle line from which enemy forces could power projection platforms in theater. “a line that delineates the surface area of a base
for the purpose of facilitating coordination and
attack the base or affect air operations Our responsibility to current and future
deconfliction of operations between adjacent
using standoff threats. This concept is not Soldiers, Marines, Sailors, and Airmen units, formations, or areas.”
unique to the Air Force as it is equally demands no less. JFQ 23
JP 3-10, II-12.
important to all large joint use bases 24
AR 15-6, 26.
supporting joint operations. The base
25
Air Force Manual 31-201, Security Forces
History, vol. 1 (Washington, DC: Department
security zone should be identified during Notes of the Air Force, June 1, 2015), 16–17.
a terrain and threat analysis and be used 26
Ibid., 17.
to modify the base boundary as described
1
Alissa J. Rubin, “Audacious Raid on 27
Ibid.
NATO Base Shows Taliban’s Reach,” New York
in JP 3-10 to enable effective base defense Times, September 16, 2002, available at <www.
28
Amir Shah et al., “Taliban Attack Key
operations driven by a single commander U.S. Base in Afghanistan, Killing 1 U.S. Con-
nytimes.com/2012/09/17/world/asia/
tractor, Wounding 9 Troops,” Associated Press,
at the appropriate tactical level. green-on-blue-attacks-in-afghanistan-continue.
May 18, 2010, available at <www.foxnews.
html?pagewanted=all&_moc.semityn.www>.
com/world/2010/05/18/insurgents-launch-
2
“Army Regulation (AR) 15-6 Investiga-
Conclusion complex-attack-bagram-air-field.html>.
tion of the 14–15 September 2012 Attack on
U.S. forces took courageous action the Camp Bastion, Leatherneck, and Shorabak
29
Joint Training Counter IED Operations
during attacks on Bagram, Joint Base Integration Center, Sims Directorate Video,
(BLS) Complex, Helmand Province, Afghani-
“Airfield Complex Attack, Bagram Airfield
Balad, and BLS. In 2010 at Bagram, a stan,” August 19, 2013, 2.
Afghanistan,” December 5, 2011.
complex attack was defeated without 3
Ibid., 23–31. 30
Ibid.
significant impact on coalition opera-
4
House of Commons, Defence Committee, 31
Christopher J. Willis, “Bagram Se-
“Afghanistan—Camp Bastion Attack,” April
tions, and Balad was never penetrated 16, 2014, 15.
curity Forces Group Stands-Up,” Defense
by a significant insurgent force. Both Video Imagery Distribution System, January
5
“ISAF: Key Facts and Figures,” Septem-
1, 2013, available at <www.dvidshub.net/
stand in stark contrast to BLS, where ber 10, 2012, available at <www.nato.int/
news/104996/bagram-security-forces-group-
the appearance of a secure perimeter isaf/placemats_archive/2012-09-10-ISAF-
stands-up>.
did not withstand scrutiny. The key Placemat.pdf>.
6
Institute for the Study of War, “Regional
differences at BLS were the fragmented Command South,” 2009, available at <www.
base defense chain of command, inco- understandingwar.org/region/regional-com-
herent responsibility for security below mand-south-0>.
the two-star RC(SW) level, and lack of 7
Jim Michaels, “Two Generals Asked to
SECFOR integration. These factors, Retire in Wake of Bastion Attack,” USA Today,
September 30, 2013, available at <www.usato-
combined with optimistic risk manage- day.com/story/news/world/2013/09/30/
ment decisions by key leaders, left the bastion-marines-afghanistan-gurga-
base vulnerable to enemy attack. nus/2897953/>.
In future operations, enemies will 8
AR 15-6, 7.
continue to target critical coalition air
9
Ibid., 8.
10
Ibid., 9.
and logistics hubs in theater in order to 11
Katherine Keleher, “Task Force Belleau
disrupt our ability to project power and Wood Marines, Partners Celebrate Corps’ 236th
sustain operations. During major com- Birthday,” November 12, 2011, available at
bat operations, these threats will likely <www.iimef.marines.mil/News/NewsArticle/
include unconventional means such as tabid/472/Article/528985/task-force-belleau-
wood-marines-partners-celebrate-corps-236th-
enemy special operations forces or proxy birthday.aspx>.
insurgent/terrorist groups, in addition 12
AR 15-6, 10.
to conventional attack. Future attackers 13
Ibid., 17.
may be much better trained and prepared 14
House of Commons, 12.
than those at BLS in 2012. Therefore,
15
AR 15-6, 18.
16
Ibid., 22.
effective integrated base defense planning 17
Ibid., 6.
and execution in theater are critical across 18
Ibid., 2.
the spectrum of conflict and must not be 19
Joint Publication (JP) 3-10, Joint Security
dismissed as an exercise in preparing for Operations in Theater (Washington, DC: The
the last war. Joint Staff, November 13, 2014), xiv–xv.
20
Ibid., IV-17.

JFQ 85, 2nd Quarter 2017 Petren 93


Sailor in hangar bay of aircraft carrier USS
Dwight D. Eisenhower maintains E2-C Hawkeye
assigned to the Screwtops of Airborne Early
Warning Squadron 123, October 10, 2016
(U.S. Navy/Joshua Murray)

Joint Publication 3-20,


Security Cooperation
Adapting Enduring Lessons
By Keith D. Smith, Mark H. Lauber, and Matthew B. Robbins

oday’s security environment continues to develop the “four plus one”

Keith D. Smith is a Senior Analyst in the Joint


T demands that the Department of
Defense (DOD) employ a robust
strategy and assortment of capabili-
threat baseline described by the Chair-
man of the Joint Chiefs of Staff, the
Joint Force Development Directorate
Center for International Security Force Assistance ties across the entire range of military has taken steps to better align joint doc-
at Joint Staff J7 Joint Force Development. Mark operations and in support of America’s trine with the National Military Strat-
H. Lauber is a Senior Special Operating Forces
Analyst in the Joint Center for International
national security interests. A preponder- egy as part of an approach that empha-
Security Force Assistance. Lieutenant Colonel ance of these activities falls under the sizes the need for adaptive doctrine.1
Matthew B. Robbins, USMC, is a Joint Doctrine umbrella of security cooperation (SC) in Within this effort, the need to synergize
Development Officer in the Joint Doctrine
Analysis Division at the Joint Staff J7 Joint
which few, if any, U.S. forces participate U.S. capacity and capabilities with those
Education and Doctrine Division. directly in combat operations. As DOD of its partners remains paramount.2

94  Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
To this end, ongoing efforts to adapt Historical Overview Today, SC more broadly supports the
the disparate entities and authorities as- In 1971, the Secretary of Defense combatant command’s entire theater
sociated with SC into a unified strategy established the Defense Security Assis- campaign plan.
serve as an important next step. In 2008, tance Agency (DSAA) to direct, admin- Subsequent developments in SC
DOD published a directive that elevated ister, and supervise the execution of further expanded its scope by adding
the requirement for DOD expertise for approved SA plans and programs, such authorities from U.S. Code Title 10 for
SC activities to the same level as other as military assistance, international mili- programs such as multinational exer-
“integral [conventional] DOD activities.”3 tary education and training, and foreign cises—a move designed to gain synergy
To achieve parity, the Joint Doctrine military sales.5 In November 1997, the by coordinating peacetime Title 10 activi-
Development Community (JDDC) identi- Defense Reform Initiative transferred ties with Title 22 activities. Amended in
fied the need to incorporate the topic additional responsibility for program the reformative aftermath of the Vietnam
of SC into the joint publication library management of humanitarian assistance War, these Title 22 programs specifically
as Joint Publication (JP) 3-20, Security and demining, armaments cooperation, precluded the United States from em-
Cooperation. The approval of JP 3-20 is a export loan guarantees, and foreign ploying its forces in harm’s way using SA
major step toward the joint force recog- comparative testing functions, along funds. This contributed to a misunder-
nizing SC as a way to apply the military with their associated personnel and standing of both SA and SC as exclusively
instrument of national power in support resources, to DSAA. In October 1998, peacetime activities. This inaccurate
of partner nations (PNs) around the globe SC officially entered the DOD lexicon, conclusion led to confusion regarding
to achieve strategic objectives and to help accommodating the scope of these when and how SA and SC authorities
shape the operational environment for additional functions beyond DSAA’s and programs could and should be used.
current and future operations. This article traditional SA missions. This expansion Originally designed to limit American
outlines the continued adaptation of SC of mission necessitated a name change, participation in conflict, modern ver-
and the inextricable doctrinal security force hence DSAA’s redesignation as the sions of the vintage U.S. Lend-Lease
assistance (SFA) principles discussed in JP Defense Security Cooperation Agency.6 program, as the precursor to what we
3-20 that are applicable to the joint force. This consolidation of similar programs now know as SA, continue to evolve, but
JP 3-20 defines security cooperation from five dissonant agencies into one still contribute to the development of our
as “all DOD interactions with foreign stand-alone entity reflected efforts to foreign partners’ security force capacities
security establishments to build security improve efficiency and reduce adminis- and capabilities across the entire range of
relationships that promote specific U.S. trative redundancy. military operations.
security interests, develop allied and However, SC did not appear in The term security force assistance
friendly military capabilities for self- mainstream joint doctrine until mani- entered the DOD lexicon to provide
defense and multinational operations, and fested in a 2004 revision of JP 3-07.1, greater depth to the SC pillar of devel-
provide U.S. forces with peacetime and Joint Tactics, Techniques and Procedures oping PN capabilities. SFA was coined
contingency access to a partner nation.”4 for Foreign Internal Defense (FID). As (after early efforts in Iraq failed to create
These three categories, however, only the JDDC struggled to refine doctrinal a viable security force) to provide U.S.
hint at the true breadth and complexity treatment of SC, amended versions of forces with applicable means for develop-
of activities that make up the universe of then–JP 1-02, Department of Defense ing the capacity and capabilities of PN
security cooperation. Some SC activities Dictionary of Military and Associated forces and their supporting institutions.
are simple engagements between U.S. and Terms, revealed continuing efforts to The training of foreign security forces is
PN defense officials, while others are com- clarify myriad SC activities. Though a primary role of U.S. special operations
plex and may include multibillion-dollar not retained in the current JP 1-02, the forces. However, special operations forces
arms negotiations brokered at the highest meaning behind the original definition of were stretched to their limits conducting
levels of government through DOD- SC activity prevails: counterterrorism and counterinsur-
administered and Department of State–led gency operations throughout the Iraq
security assistance (SA) programs under Military activity that involves other and Afghanistan theaters of operation
U.S. Code Title 22 authority. These ex- nations and is intended to shape the and elsewhere. In response, significant
amples bracket the more common theater operational environment in peacetime. numbers of conventional forces were
security cooperation exercises routinely Activities include programs and exercises indoctrinated to conduct SFA activities
conducted within each geographic com- that the U.S. military conducts with other and further doctrine was developed. The
batant command’s area of responsibility. nations to improve mutual understanding initial incorporation of SFA into the 2010
While the recent and formal incorporation and improve interoperability with treaty replacement for JP 3-07.1, known after
of SC into joint doctrine may appear new, partners. They are designed to support a as JP 3-22, Foreign Internal Defense,
the United States has used various adapta- combatant commander’s theater strategy as defined it as DOD “activities that con-
tions of SC to protect and advance its vital articulated in the theater security coopera- tribute to unified action by the U.S.
interests abroad for decades. tion plan.7 Government to support the development

JFQ 85, 2nd Quarter 2017 Smith, Lauber, and Robbins  95


of the capacity and capability of foreign U.S. assistance to build capabilities to meet Chinese activity in the Arctic may lead
security forces and their supporting these challenges can yield critical benefits, to increased collaboration with Canada.
institutions.” Essential to SC, this stream- including reducing the possibility that the Transregionally, hybrid attacks conducted
lined definition established the enduring United States or partner nations may be against global trade and logistics nodes,
relevance of SFA, and subsequently SC, required to intervene abroad in response to but below the traditional U.S. threshold
in all circumstances where U.S. military instability.9 for military involvement, may warrant
forces must develop foreign security force further development of partner capac-
(FSF) capabilities. Implied in these statements from ity and capabilities to secure and defend
two different Presidents—who were these assets. JP 3-20 provides doctrinal
SC and SFA in the Current and separated by generations—is the fact guidance upon which combatant com-
Future Operating Environment that the United States faces a unique set mand planners can build an operational
While SC and SFA remain important to of security challenges. Today, they are framework to support U.S. defenses
steady-state operations, they are equally budgetary constraints and threats that against such threats.
valuable in support of major combat are increasingly complex, transregional, Foreseeable manifestations of these
operations because they can facilitate multidomain, and multifunctional. distinctive challenges will require more
operational access and improved Management of these challenges and than raw U.S. military capability and will
military relations and interoperability. associated threats demands greater inno- demand a more comprehensive solu-
Whether considering their preemptive vation and a higher degree of efficiency in tion. As the draft copy of the Capstone
use to shape the operational environ- mastering SFA activities and SC as force Concept for Joint Operations notes, “The
ment, provide trained and ready forces multipliers, shapers, and stabilizers. contexts of conflict represent a complex
to participate in operations, or create SC and SFA will continue to be mix of diplomatic, informational, eco-
a postconflict application to lay the necessary in the future operating envi- nomic, and social problems. . . . The
foundations for lasting peace and ronment, as characterized by persistent military can enable stable conditions
regional stability, SC and SFA present disorder and contested norms.10 in which to address these problems,
irreplaceable mechanisms for achieving Persistent Disorder. Within the con- but whole of government efforts are
conditions conducive to U.S. national text of violent ideological competition, better suited to solve them.”11 One
interests. the Joint Operating Environment 2035 shortcoming in the creation of a truly
As history shows, improving the secu- highlights identity networks as key ac- whole-of-government effect has been
rity capacity and capabilities of U.S. allies tors. Much like nonstate actors, identity lexicon. Interagency coordination faces
and partners contributes significantly to networks may be activated, guided, and great obstacles when even understanding
both the PN security strategies as well directed by states to perpetuate chaos the multitude of DOD terms associated
as U.S. national interests. Repeatedly, and disorder. These networks, and the with SC tends to cause more than a little
U.S. Presidents have illustrated the individuals identifying with them, cross confusion. The 2011 DOD Security
connection between the two. In March geographical boundaries and exploit Force Assistance Lexicon Framework,
1959, President Dwight D. Eisenhower the information environment, requir- written in response to an SFA doctrine,
conveyed to Congress that “we cannot ing more robust allied and PN security organization, training, materiel, leader-
safely confine government programs to institutions to thwart their attacks and ship and education, personnel, and
our own domestic progress and our own facilitate a more enduring peace and sta- facilities (DOTMLPF) change recom-
military power. We could be the wealthi- bility. Well-trained and properly equipped mendation and Joint Requirements
est and the most mighty nation and still internal security forces, supported by the Oversight Council memorandum,
lose the battle of the world if we do not appropriate institutional backbone, help should have provided just such an ap-
help our world neighbors protect their to reduce these types of threats. JP 3-20 proach given its intent to “develop a
freedom.”8 enables the joint force to tailor SC and framework that reconciles/clarifies SFA
Decades later, a White House fact SFA activities to develop just such PN with overlapping and related terms.”12
sheet detailing the U.S. Security Sector capacity and capabilities to defeat these As early as 2012, the U.S. Government
Assistance Policy from 2013, known as increasingly advanced threats. Accountability Office highlighted “the
Presidential Policy Directive–23 (PPD- Contested Norms. State and nonstate value of distinguishing security force
23), read as follows: actors will continue to threaten U.S. ter- assistance from other security coopera-
ritory and sovereignty, thus necessitating tion activities.”13 Soon after, the Joint
The United States has long recognized that increased efficiency and tempo in SC Staff J7, Joint and Coalition Warfighting
the diversity and complexity of the threats and SFA activities. The permeability of Directorate, conducted a front-end
to our national interest require a collab- U.S. borders may lead the joint force to analysis that prompted a 2012 special
orative approach, both within the United enhance cooperation with its neighbors study titled Security Force Assistance in
States Government and among allies, and partners in Central, South, and Joint Doctrine “to determine the proper
partners, and multilateral organizations. North America. Continued Russian and place and amount of doctrinal guidance

96  Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
MH-60R Sea Hawk helicopter assigned to Vipers of Helicopter Maritime Strike Squadron 48 conducts vertical replenishment training aboard guided-
missile cruiser USS Monterey, Gulf of Oman, November 21, 2016 (U.S. Navy/William Jenkins)

on security cooperation, SSR [secu- to clarify the joint force’s understanding executive, generating, and operating
rity sector reform], SFA, and FID.”14 of these relationships to JP 3-22, Foreign (EGO) functions that must be performed
Despite the eventual decision within Internal Defense. Complete resolution by any effective security force, while the
the JDDC to develop JP 3-20, many of of these complex relationships is tied to latter addresses the organize, train, equip,
the deliberations captured in this special current and future policy. The introduc- rebuild/build, and advise (OTERA)
study persist. tion of any subsequent terms or broader tasks associated with the conduct of SFA.
Because of its continued adaptation doctrinal content should reflect a com- EGO depends upon the delineation of
in policy and practice without a doctrinal mon understanding between multiple responsibilities for DOD as written in U.S.
anchor point, various interpretations of departments, as illustrated in PPD-23. Code Title 10. While many nations may
SC and its application have developed However, facilitating that common un- not want their defense apparatus to mimic
over time and still complicate under- derstanding is traditionally beyond the DOD, nor even possess the resources to
standing of the many terms related to scope of an operational-level publication. build similar organizations, they will need
its policies, programs, and authorities. With that in mind, JP 3-20 cursorily to perform these basic functions effectively
Such contention explains the conspicu- describes the sometimes hierarchical, in some way or fashion. When the United
ous omission and intentional exclusion sometimes conditional, and sometimes States has determined that it will help a
of much of the content of that original functional relationships among the SC- PN build capabilities, it must consider
lexicon discussion. Despite assuming and SFA-related programs and authorities which EGO function(s) require assistance.
the doctrinal responsibility for SFA and applicable to them. It does, however, Crafted to leverage expertise not available
promoting an articulation of the func- include appendix B, which explains two within U.S. operating forces, defense in-
tional relationships among SC, foreign particular SFA models relevant to devel- stitution building specifically addresses the
assistance, security assistance, SFA, and oping a viable and lasting security force. development of capacity and capabilities at
FID, JP 3-20 relegated the opportunity The first of these models represents the the ministerial level.

JFQ 85, 2nd Quarter 2017 Smith, Lauber, and Robbins  97


U.S. and Royal Thai marines participate in Indo-Asia-Pacific region exercise Cobra Gold, February 14, 2017, Ban Chan Krem, Thailand
(U.S. Marine Corps/Tiffany Edwards)

At this point, a second doctrinal SFA the PN. The “Employ” stage results in Security Cooperation establishes policy
model enables the United States to apply application of generated capacity or ca- that “prioritizes the outcomes that secu-
personnel and other resources as the pabilities toward their intended purpose. rity cooperation efforts should seek to
means to conduct SFA activities through The “Transition” stage shifts responsibil- achieve and provides additional guidance
one or more of the OTERA tasks. These ity for the generating and operational to the security cooperation enterprise
tasks roughly align with the DOTMLPF functions to the PN. The “Sustain” stage on Department-wide expectations for
and policy mechanisms of change used recognizes PN achievement of self-sus- planning, assessing, monitoring, and eval-
for U.S. joint force development, though taining capacity and capabilities across the uating (AME) security cooperation.”15
formatted as tasks for execution. Not EGO functions. This PGETS model ap- This guidance clearly describes the
yet recognized for inclusion in JP 3-20, plies to the development of an individual need for initial and follow-on assessment,
another SFA model offers a potential capability or an entirely new security force systematic monitoring to track imple-
solution to synchronizing U.S. activities (see figure). mentation and output, and evaluations
according to the level of development In form, the PGETS model evokes that analyze the relevance, effectiveness,
of the FSF. The development of ad- the familiar joint operation phasing and sustainability of SC activities not
ditional capacity and capabilities follows model as discussed in both JP 3-0, Joint well-detailed in JP 3-20, which enables
a distinctive pattern involving five con- Operations, and JP 5-0, Joint Planning, it to distinguish these efforts from
current stages with common activities: but transcends the doctrinal limitations of doctrinal operation assessment. It actu-
Plan, Generate, Employ, Transition, and its designed application at the operational ally offers a broader mechanism that
Sustain (PGETS). and tactical levels of joint operations. It complements operation assessment by
During the Plan stage, an assessment also complements the JP 3-22 efforts incorporating appropriate data from the
with the PN is conducted to help deter- to encapsulate an updated and viable measures of performance and measures
mine what the FSF must do to fulfill its framework or lexicon for SC and SFA at of effectiveness used to assess individual
role as a security force. Though planning this same level. By bridging the political SFA activities. Though contextualized
and resourcing activities comprise the and strategic levels where the prepon- for SC, this AME guidance may in fact
bulk of the activities during this stage, derance of SC guidance originates with warrant consideration for inclusion in the
they span all five stages. The majority of operational- and tactical-level details, keystone JP 5-0, as the need for feedback
the activities accomplished during the the PGETS model facilitates a linkage and accountability far exceeds the scope
“Generate” stage contribute to building not fully reflected in JP 3-20, whereby of Joint Doctrine Note 1-15, Operation
the required capacity and capabilities for the Department of Defense Guidance for Assessment. However, it is not without its

98  Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
own complications, as that same DOD Figure. Notional Level of Effort by Stage (PGETS) Over Time
policy portrays AME as a part of yet an-
other competing SC framework.
Plan & Generate Employ Transition Sustain
On a much broader scale, the Resource Stage Stage Stage Stage
fiscal year 2017 National Defense Stage
Authorization Act promises even more

Level of Effort
comprehensive whole-of-government re-
form. In addition to enforcing standards Employ Activities
for AME, “the statutes will enhance the

Tr
an
flexibility, transparency, and oversight

sit

Su
io
of SC authorities and resources; profes-

st
n

ai
Ac

n
tiv
sionalize the workforce; and improve

Ac
Generate Activities

iti

tiv
es
alignment of security cooperation activi-

iti
es
Plan & Resource
ties to defense strategy.”16 The ensuing
consolidation of train-and-equip author-
Time
ity, SC programming, budgeting, and (Organize, Train, Equip, Rebuild, and Advise/Assist (OTERA) Conducted Throughout each Stage)
management responsibilities will clearly
impact future developments of SC and
SFA within joint doctrine. power while addressing these challenges. able at <www.dtic.mil/whs/directives/corres/
pdf/510565p.pdf>.
JP 3-20 fills a persistent doctrinal gap by 7
Introduced into Joint Doctrine in the
Current and future manifestations of codifying SC and SFA doctrine into the 2006 revision of JP 3-0, Joint Operations, the
the four-plus-one threat will continue to changing character of warfare as essential term security cooperation activity was removed
necessitate transregional, multifunctional, to shaping the operational environment in the 2011 revision of JP 3-0 and thus from
and multidomain solutions that involve and, protecting U.S. and PN security JP 1-02, Department of Defense Dictionary of
Military and Associated Terms (Washington,
much more than the military instrument interests now and into the future. JFQ
DC: The Joint Staff, November 8, 2010, as
of national power. JP 3-20 offers the joint amended through February 15, 2016).
force guidance to protect U.S. security 8
See “Special Message to the Congress
interests in this increasingly complex Notes on the Mutual Security Program,” March 13,
world, harmonized with the develop- 1959, available at <www.eisenhower.archives.
1
In order to address one of the priorities gov/all_about_ike/quotes.html>.
ment of PN capacity and capabilities.
of the Chairman of the Joint Chiefs of Staff 9
“Fact Sheet: U.S. Security Sector Assis-
While JP 3-20 might be new, the notion (CJCS), the director of the Joint Staff J7 Joint tance Policy,” April 5, 2013, The White House,
of enabling partners and allies to thwart Force Development Directorate created the available at <www.whitehouse.gov/the-press-
threats and facilitate enduring peace and Campaign Plan for Joint Force Development office/2013/04/05/fact-sheet-us-security-
stability around the globe comprises a Next. This campaign plan involves four lines of sector-assistance-policy>.
effort, one of which includes a task that ensures 10
Joint Operating Environment JOE 2035:
long and storied history. The dynamic
joint doctrine remains adaptive to operational The Joint Force in a Contested and Disordered
complexities of the current and future priorities by using adaptive processes and adap- World (Washington, DC: The Joint Staff, July
operating environment associated with tive products. 14, 2016).
persistent disorder and contested norms 2
See CJCS commencement remarks to the 11
“Capstone Concept for Joint Operations:
demand that the joint force array itself to National Defense University’s Class of 2017, Joint Force 2030,” draft, June 28, 2016.
titled “Dunford Details Implications of Today’s 12
DOD Security Force Assistance Lexicon
address not only the conventional threats
Threats on Tomorrow’s Strategy,” August 23, Framework, November 1, 2011 (incorporating
presented by state actors, but also those 2016, available at <www.defense.gov/News/ Change 1, April 27, 2012).
represented by identity networks and Article/Article/923685/dunford-details- 13
U.S. Government Accountability Office
other nonstate entities. This disposition implications-of-todays-threats-on-tomorrows- (GAO) Report to Congressional Committees,
must also reflect current fiscal realities strategy>. Security Force Assistance: Additional Actions
3
Department of Defense Directive Needed to Guide Geographic Combatant Com-
amid the various legal ramifications of
(DODD) 5132.03, “DOD Policy and Respon- mand and Service Efforts (Washington, DC:
national sovereignty that further strain sibilities Relating to Security Cooperation,” GAO, May 2012), 14.
multinational relationships. The doc- October 24, 2008, available at <www.dtic. 14
Joint and Coalition Warfighting Study
trinal planning constructs of EGO and mil/whs/directives/corres/pdf/513203_ on Security Force Assistance in Joint Doctrine,
OTERA, as well as other relevant but not dodd_2016.pdf>. November 2012.
4
JP 3-20, Security Cooperation (Washing- 15
“DOD Guidance for Security Coopera-
yet extant or validated practices such as
ton, DC: The Joint Staff, September 2016, tion,” memo from the Deputy Secretary of
PGETS and AME, present planners from Signature draft). Defense, August 29, 2016.
across the joint force with an organized 5
DODD 5105.38, “Defense Security As- 16
Fiscal Year 2017 National Defense Au-
approach to enhancing the operational sistance Agency,” August 11, 1971. thorization Act, Title XII, Subtitle E, Summary
effectiveness of U.S. joint forces and op- 6
DODD 5105.65, “Defense Security of Key Reforms, December 5, 2016.
timizing the application of U.S. military Cooperation Agency,” October 26, 2012, avail-

JFQ 85, 2nd Quarter 2017 Smith, Lauber, and Robbins  99


New from Joint Publications (JPs) Under Revision
NDU Press (to be signed within 6 months)
for the Center for Strategic Research JP 1, Doctrine for the Armed Forces of the United States
Strategic Forum 295
JP 3-12, Cyberspace Operations
Reflections on U.S.-Cuba
Military-to-Military Contacts JP 3-27, Homeland Defense
by Hal Klepak JP 3-35, Deployment and Redeployment Operations
President
JP 3-57, Civil-Military Operations
Barack
Obama’s visit JP 3-59, Meteorological and Oceanographic Operations
to Cuba in JP 4-02, Joint Health Services
March 2016
JP 4-06, Mortuary Affairs
opened up
the possibility
of strategic JPs Revised (signed within last 6 months)
benefits for JP 2-01, Joint and National Intelligence Support to Military Operations
both nations. Well after over 50
JP 2-03, Geospatial Intelligence in Joint Operations
years of hostility, however, it will
not be easy to keep this nascent JP 3-0, Joint Operations
relationship on track. Avoiding JP 3-01, Countering Air and Missile Threats
missteps requires a deep knowledge
JP 3-04, Joint Shipboard Helicopter and Tiltrotor Operations
of Cuba and particularly its Revo-
lutionary Armed Forces (Fuerzas JP 3-08, Interorganizational Cooperation
Armadas Revolucionarias, or JP 3-13.4, Military Deception
FAR). The FAR are a complex and
JP 3-14, Space Operations
powerful institution that enjoys
great public respect—more so than JP 3-15.1, Counter-Improvised Explosive Device Operations
Cuba’s Communist Party—and JP 3-18, Joint Forcible Entry Operations
remain central to the function-
JP 3-20, Security Cooperation
ing of the Cuban economy and
state. Broadening rapprochement JP 3-25, Countering Threat Networks
without the support of the FAR is JP 3-33, Joint Task Force Headquarters
inconceivable.
JP 4-01, Defense Transportation System
This paper offers insights con-
cerning the FAR. It argues that it will JP 4-01.6, Joint Logistics Over-the-Shore
be important to expand cooperation JP 4-08, Logistic Support of Multinational Operations
in the right areas and that it will be
JP 5-0, Joint Planning
important to start small, go slow,
build trust, consult early and often,
let Cuba take the lead, and avoid
imposing or reflecting a U.S.-centric
view of civil-military relations.

Visit the NDU Press Web site for


more information on publications
at ndupress.ndu.edu

100  Joint Doctrine JFQ 85, 2nd Quarter 2017


From NDU Press
Lessons Encountered:
Learning from the Long War
NDU Press, 2015 • 488 pp.

This volume began as two questions from


General Martin E. Dempsey, 18th Chairman
of the Joint Chiefs of Staff: What were the
costs and benefits of the campaigns in Iraq
and Afghanistan, and what were the strategic
lessons of these campaigns? The Institute for
National Strategic Studies at the National
Defense University was tasked to answer these
questions. The editors composed a volume
that assesses the war and analyzes the costs,
using the Institute’s considerable in-house
talent and the dedication of the NDU Press
team. The audience for this volume is senior
officers, their staffs, and the students in joint
professional military education courses—the
future leaders of the Armed Forces. Other
national security professionals should find it of
great value as well.

The volume begins with an introduction that


addresses the difficulty of learning strategic
lessons and a preview of the major lessons
identified in the study. It then moves on to
an analysis of the campaigns in Afghanistan
and Iraq from their initiation to the onset of
the U.S. Surges. The study then turns to the
Surges themselves as tests of assessment and
adaptation. The next part focuses on decision-
making, implementation, and unity of effort.
The volume then turns to the all-important
issue of raising and mentoring indigenous
security forces, the basis for the U.S. exit strategy in both campaigns. Capping the study is a chapter
on legal issues that range from detention to the use of unmanned aerial vehicles. The final chapter
analyzes costs and benefits, dissects decisionmaking in both campaigns, and summarizes the lessons
encountered. Supporting the volume are three annexes: one on the human and financial costs of the
Long War and two detailed timelines for histories of Afghanistan and Iraq and the U.S. campaigns
in those countries.

The lessons encountered in Afghanistan and Iraq at the strategic level inform our understanding of
national security decisionmaking, intelligence, the character of contemporary conflict, and unity of
effort and command. They stand alongside the lessons of other wars and remind future senior offi-
cers that those who fail to learn from past mistakes are bound to repeat them.

Available at ndupress.ndu.edu/Books/LessonsEncountered.aspx
Women on the Frontlines of Peace and Security
Foreword by Hillary Rodham Clinton and Leon Panetta
NDU Press, 2015 • 218 pp.
This book reflects President Barack Obama’s commitment to advancing women’s
participation in preventing conflict and keeping peace. It is inspired by the countless
women and girls on the frontlines who make a difference every day in their communities
and societies by creating opportunities and building peace.
Around the globe, policymakers and activists are working to empower women as
agents of peace and to help address the challenges they face as survivors of conflict.
When women are involved in peace negotiations, they raise important issues that might
be otherwise overlooked. When women are educated and enabled to participate in
every aspect of their societies—from growing the economy to strengthening the security
sector—communities are more stable and less prone to conflict.
Our understanding of the importance of women in building and keeping peace is
informed by a wide range of experts, from diplomats to military officials and from human
rights activists to development professionals. The goal of this book is to bring together
these diverse voices. As leaders in every region of the world recognize, no country can
reach its full potential without the participation of all its citizens. This book seeks to add
to the chorus of voices working to ensure that women and girls take their rightful place in
building a stronger, safer, more prosperous world.
Available at ndupress.ndu.edu/Books/WomenontheFrontlinesofPeaceandSecurity.aspx

Have you checked out NDU Press online lately?


With 20,000 unique visitors each month, the NDU Press Web
site is a great place to find information on new and upcoming
articles, occasional papers, books, and other publications.

You can also find us on:

Facebook Flickr

Twitter Pinterest

Visit us online at: http://ndupress.ndu.edu


JFQ is available online at the Joint Electronic Library:
www.dtic.mil/doctrine/jfq/jfq.htm

JOINT FORCE QUARTERLY


Published for the Chairman of the Joint Chiefs of Staff by National Defense University Press
National Defense University, Washington, DC

You might also like