Professional Documents
Culture Documents
JFQ 85
JFQ 85
JFQ 85
New Technologies,
New Strategies
An Interview with
David L. Goldfein
Operational Graphics
for Cyberspace
Joint Force Quarterly
Founded in 1993 • Vol. 85, 2nd Quarter 2017
http://ndupress.ndu.edu
Executive Editor
Jeffrey D. Smotherman, Ph.D.
Production Editor
John J. Church, D.M.A.
Associate Editor
Patricia Strait, Ph.D.
Art Director
Marco Marchegiani, U.S. Government Printing Office
Advisory Committee
COL Michael S. Bell, USA (Ret.), Ph.D./College of International
Security Affairs; LTG Robert B. Brown, USA/U.S. Army Command
and General Staff College; Brig Gen Christopher A. Coffelt,
USAF/Air War College; Col Keil Gentry, USMC/Marine Corps War
College; BGen Thomas A. Gorry, USMC/Dwight D. Eisenhower
School for National Security and Resource Strategy;
Col Steven J. Grass, USMC/Marine Corps Command and Staff
College; Brig Gen Darren E. Hartford, USAF/National War
College; Col Brian E. Hastings, USAF/Air Command and Staff
College; RADM P. Gardner Howe III/U.S. Naval War College;
LTG William C. Mayville, Jr., USA/The Joint Staff;
MG William E. Rapp, USA/U.S. Army War College;
LtGen Thomas D. Waldhauser, USMC/The Joint Staff;
RDML Brad Williamson/Joint Forces Staff College
Editorial Board
Richard K. Betts/Columbia University; Stephen D. Chiabotti/
School of Advanced Air and Space Studies; Eliot A. Cohen/The
Johns Hopkins University; COL Joseph J. Collins, USA (Ret.)/
National War College; Mark J. Conversino/Air War College;
Thomas P. Ehrhard/Office of the Secretary of Defense; Aaron L.
Friedberg/Princeton University; Bryon Greenwald/Joint Forces
Staff College; Col Thomas C. Greenwood, USMC (Ret.)/Office of
the Secretary of Defense; Douglas N. Hime/Naval War College;
Mark H. Jacobsen/Marine Corps Command and Staff College;
Col Jerome M. Lynes, USMC (Ret.)/The Joint Staff; Kathleen
Mahoney-Norris/Air Command and Staff College; Thomas L.
McNaugher/Georgetown University; Col Mark Pizzo, USMC (Ret.)/
National War College; James A. Schear/Office of the Secretary of
Defense; LtGen Bernard E. Trainor, USMC (Ret.)
Forum
4 Executive Summary
6 An Interview with
David L. Goldfein
16 Toward a Unified Metric Joint Force Quarterly is published by the National
of Kinetic and Nonkinetic Recall Defense University Press for the Chairman of the
Joint Chiefs of Staff. JFQ is the Chairman’s flagship
Actions: Meaning Fields 76 The Advent of Jointness joint military and security studies journal designed to
and the Arc of Effects During the Gulf War: A inform members of the U.S. Armed Forces, allies, and
other partners on joint and integrated operations;
By Bradley DeWees, Terry C. Pierce, 25-Year Retrospective national security policy and strategy; efforts to combat
Ervin J. Rokke, and Anthony Tingle By Christopher G. Marquis, Denton terrorism; homeland security; and developments in
Dye, and Ross S. Kinkead training and joint professional military education to
22 Information Warfare in transform America’s military and security apparatus
to meet tomorrow’s challenges better while protecting
an Information Age freedom today. All published articles have been vetted
By William R. Gery, SeYoung Book Reviews through a peer-review process and cleared by the
Defense Office of Prepublication and Security Review.
Lee, and Jacob Ninas 84 Mission Failure
NDU Press is the National Defense University’s
Reviewed by Bruno Carvalho cross-component, professional military and academic
30 The Rise of the Commercial publishing house.
Threat: Countering the Small 85 Margin of Victory The opinions, conclusions, and recommendations
Unmanned Aircraft System Reviewed by John Dethlefs expressed or implied within are those of the
contributors and do not necessarily reflect the views
By Anthony Tingle and David Tyree of the Department of Defense or any other agency of
87 The New Grand Strategy the Federal Government.
Reviewed by Micheal D. Russ Copyright Notice
Commentary This is the official U.S. Department of Defense edition
of Joint Force Quarterly. Any copyrighted portions
36 Forensic Vulnerability of this journal may not be reproduced or extracted
Analysis: Putting the “Art” Joint Doctrine without permission of the copyright proprietors. JFQ
88 Improving Joint Doctrine should be acknowledged whenever material is quoted
into the Art of War from or based on its content.
By Darryl Williams for Security in Theater: Submissions and Communications
Lessons from the Bastion- JFQ welcomes submission of scholarly, independent
42 Operational Graphics Leatherneck-Shorabak Attack research from members of the Armed Forces,
security policymakers and shapers, defense analysts,
for Cyberspace By Nicholas J. Petren academic specialists, and civilians from the United
By Erick D. McCroskey States and abroad. Submit articles for consideration
and Charles A. Mock 94 Joint Publication 3-20, to ScholarOne, available at https://mc04.
manuscriptcentral.com/ndupress, or write to:
Security Cooperation:
Editor, Joint Force Quarterly
Adapting Enduring Lessons NDU Press
Features By Keith D. Smith, Mark H. Lauber, 260 Fifth Avenue (Building 64, Room 2504)
50 The Need for a Joint Support Fort Lesley J. McNair
and Matthew B. Robbins Washington, DC 20319
Element in Noncombatant Telephone: (202) 685-4220/DSN 325
Evacuation Operations 100 Joint Doctrine Update Email: JFQ1@ndu.edu
By George K. Dixon JFQ online: www.dtic.mil/doctrine/jfq/jfq.htm
In Memoriam
General John W. Vessey, Jr., USA
By John Wagner
e mourn the passing and National Guard when he was just 16. A combat veteran of World War II and
Executive Summary
he old saying that history is the beginning of JFQ’s history. Colonel Academy cadets learning how to write
6 Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
what we bring from space, whether you JFQ: On a more domestic front, you stated mission areas across the Air Force, and
want to talk about communications or that one of your main focuses is to look at they go from 40-person organizations to
precision navigation and timing, or all the Air Force squadrons. I know you have writ- 1,400-person organizations, and every-
other things we do to sense the globe as ten a book about this; I remember the day thing in between. Now start doing the
part of the ISR [intelligence, surveillance, you talked about it as a fellow. Why is this math. Two thousand squadrons, 2,000
and reconnaissance] enterprise. still important to you? first sergeants, 2,000 superintendents,
You have to think about what the Air 2,000 DOs [directors of operations],
Force does for the Nation in the business General Goldfein: My experience has 2,000 times 2,000 times 2,000—that’s a
of space operations. Then you have been that the squadron is the level of lot of manpower.
to transition to cyber. Like space and command and the level of leadership in But do we have these sized correctly?
like nukes, the cyber force, with small the structure of the Air Force where we When we built the unit manning docu-
exceptions, is not required to deploy succeed or fail as an organization. It is ments for these organizations, we didn’t
forward and simultaneously defend the where the command team, which I define build them based on an expectation that
homeland, deter the nuclear threat, and as the squadron commander, a senior 20 to 30 percent of the squadron would
be involved in 4+1. [noncommissioned officer], is going to always be gone on continuous deployed
You have to walk yourself through have the most influence on the culture operations. We built them based on the
these mission sets, and I would add ISR of an organization. It is where we build force we needed to do the job. If you
to that, because the vast majority of the readiness. If you buy that and if you be- go to a personnel recovery squadron, I
ISR enterprise actually does not deploy lieve that’s the heartbeat of the Air Force, suspect the commander will never have
forward. The sensing piece does, but then it’s worth putting a laser focus on his squadron together, 4 months on, 4
the reachback that it takes to do the it across the Service to ask how are we months off, 4 months on, 4 months off.
analytical work every day and turn it into doing? How are we doing at first identify-
decision-quality information, that’s an ing the folks we believe have the potential
enterprise. for squadron command, and, once we JFQ: What is your assessment of how the
That’s this whole part of the Air Force have identified those individuals, what Air Force is doing?
that can be viewed as under the water- do we do about it? What do we do to
line. It contributes directly to 4+1 and prepare them? What tools are we arming General Goldfein: I think we are like
homeland defense—and it contributes to them with? If in fact it’s the most import- we have always been. We have squad-
strategic deterrence. Then we start think- ant level of command they will ever have, ron commanders out there who are
ing about what we deploy forward. We’ll and that we will ever have as a Service in absolutely crushing it. Here’s what is in-
start with global reach. We are truly a terms of what we contribute, what are we teresting. As I travel around, I find there
global power because of our global reach. doing to prepare them for success? are four things that go into a successful
You have to examine what that looks like Moreover, once these squadron command team. It’s family, organiza-
and the requirement for us to deliver a commanders are in command, are we tional culture, understanding the mission,
certain number of million-ton miles per tossing them in the pool to see if they and accomplishing the mission.
day across the globe as a validated joint can swim as a test for the next level, or I can walk you into a missile squadron,
requirement. Then we have to take a look are we supporting them with everything and then I’ll take you to a contracting
at what we are doing in the business of we can to ensure that we are investing in squadron at Mountain Home [Air Force
conventional airpower forward. We could their success? And are we holding them Base (AFB)], and then I’ll take you to a
consider what we are doing in the Middle accountable for success, and the mission space squadron at Schriever [AFB], and
East, on the Korean Peninsula, or in we have given them? I can show you every different kind and
Europe. We could also take a look at what There is this code that you and I grew flavor of squadron. Morale is high. They
we’re doing in U.S. Southern Command. up with. The code is “leadership chal- have taken on the culture of the organiza-
Getting the decision speed faster lenge.” What that really means is I’m not tion. The common thread between those
than your adversaries and then having going to give you all the money you need who are doing well and those not doing
the operational agility to move forces and I’m not going to give you all the as well is the command team.
where required to be able to produce people you need, but I expect you to get If a commander has taken on the
dilemmas for the enemy that they could the job done. Some of that has been part responsibility for family and culture, then
never match are paramount. If you take a of our history, and others have done this that squadron is going to be cooking.
look at that end to end, the reality is you before us, so how do we ensure we are Now we have some institutional issues
are going to be hard-pressed to find a fully supporting these squadrons while that we have to work, such as whether we
mission that the joint force performs that they are in? are sized right, giving the needed tools,
doesn’t have an Airman present. Whether There is also a sizing piece to this. and supporting the commander.
in space or in cyber or ISR or delivering Right now, we have over 2,000 squad- At the same time, I’m hoping that
airpower, we are always there. rons of different sizes, shapes, and one of the positive spinoffs will be a fresh
look at where decision authority resides. [continuing resolutions] followed by a operating concept, and as part of that,
My gut tells me that as an unintentional 1-year budget, possibly 2. he put in place a developmental planning
consequence of downsizing and con- What it does to a Service chief is you process that helps us look further out to
solidating and moving people out of start building in unintentionally bad determine where it is that we need to
squadrons, decision authority started behaviors. We are never going to get look, where we need to be in 2030—
moving up. Now I’ve got people who money in the first quarter of any given what we need to think about regarding
are entrusted with the mission of the Air year because, historically, we are going to the global security environment. It’s not
Force—whether we succeed or fail—but get a CR every year, and then the force a crystal ball, but planning. The value of
may not have the decision authority they starts thinking about how it spends, and planning is the planning.
need to accomplish their mission. We’re working a budget plan that we cram The first ECCT [Enterprise Capability
taking a fresh look at that, too. in at the last half of the year. We live Collaboration Team] that we did on air
on life support, and it becomes grossly superiority is already bearing fruit. In
inefficient. It’s budget instability and the terms of now laying out a path—where
JFQ: How have ongoing budget pressures lack of being able to plan that is keeping we need to head in the business of air
affected how the Air Force operates today us from getting into some programs superiority as a core mission of the U.S.
and its plans for the future, and what steps that, quite frankly, would be really good Air Force—the next step is going to be
have you taken to mitigate these fiscal issues? for the Nation—the multiyear kind of multidomain command and control.
programs that allow us to get the price
General Goldfein: The biggest challenge points we need to deliver the best capa-
that we face as Service chiefs is not having bility for the dollar. JFQ: Regarding the integration across
a stable budget environment to plan and What are we doing about it? I give multiple domains and components—and
build the best Service we can. We need General [Mark] Welsh [20th Chief of Staff the Air Force’s role as the connective tissue
a budget that allows us to have money of the Air Force] a lot of credit for this. to make that happen—how do you view
in more than 1-year increments. We He and his team spent 2 years building this role for the Air Force? Why is it so
have experienced so many years of CRs a strategic plan with the Air Force future important?
8 Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
General Goldfein: It starts with the fact that individual who can deny the enemy’s thinking about procuring all the apps in
that it is one of our five core missions, ability to do that same thing. He is going a way that is different from what we have
going back to 1947. Command and con- to win. done in the past, which is focusing all en-
trol is something that we do for the joint Looking through an obligation lens ergy on big programs, and lots of dollars.
force, as a member of the joint team. So, is why I believe that we, from a joint
first and foremost, I don’t look at this perspective, have to think through what
from a competitive lens; I look at this the future of multidomain is going to JFQ: You’re stating that in the past there
from an obligation lens. I think that we look like; it’s not a place. Anybody who were more pieces to the puzzle. You are now
have an obligation. I marry that idea with thinks about a “multidomain” as a bigger starting with a view of what the puzzle was
my experience as the CFACC [Combined CAOC with more screens is completely to begin with.
Forces Air Component Commander] missing the picture. It’s CONOP [con-
forward, and one of the lessons learned in cept of operations], and that CONOP is General Goldfein: That’s right.
that experience was this: I went into the about connecting a grid that senses the
job thinking that I’d spend most of my globe from six domains (I say six because
time just making sure I had the right kind I include the undersea as a domain). JFQ: To decide whether that fits or not.
of air with the right attributes over the When we think of the cyber domain,
ground force commander, understand we should start thinking about social General Goldfein: Yes. When I talk
the ground force commander’s scheme of media because we sense in these domains, about multidomain command and con-
maneuver and objectives, and just marry and then the question becomes how do trol, keep in mind that I’m looking at it
up and make sure we always had him we pull together all the sensing and turn from a network perspective. It’s actually
covered. it into decision-quality information? How cultural. It’s easy for an Airman to think
We did that, but to be honest with do we take pre-effects from those same about. An example I use when I talk
you, that’s not where I spent most of domains? It is sensing, effects, decision about family of systems is your typical
my time as a CFACC. I spent most of speed, and operational agility that are personnel recovery. What happens when
my time being the connective tissue for going to define the victors in future someone is injured in enemy territory,
the combatant commander and doing campaigns. a place where there is a contested envi-
regional command and control because ronment? Think about all the steps that
there was no parallel to the CAOC occur. This massive choreography that
[Combined Air Operations Center]. JFQ: I sense from what you just said that goes into place that is far beyond the
There was no parallel in any of the other your future vision is to disperse this as far HH-60. It goes from a radio call on a
components that brought the size of the down the command and control line as small handheld radio in the Hindu Kush.
various elements that I had on the floor you possible. Is that your vision? Similar to That call is bounced off an airborne layer
and on the staff. mission command? amplified into satellites over protected
My BCD [Battlefield Coordination or unprotected [communications] into
Detachment] was 60 soldiers. My SOF General Goldfein: Yes. Here’s how a command control headquarters, often
[special operations forces] element was I look at it. We walk around and look more than one. Then it is jumping into
rather robust. I had interagency coor- at pictures of airplanes on a wall. The chatrooms, determining information,
dination. Space and the Navy were our 20th-century approach would be to pulling up data on the individual, and de-
connective tissue to the maritime [opera- procure a weapon system to replace that termining what kind of help is needed.
tions] center. It was the place where it all weapon system so that I can expand the While all that is happening, we are
came together, and where we actually ac- mission set and get to the next level of ca- moving ISR overhead. We are catalog-
complished multidomain, multimission, pability. By the way, eventually you have ing where the enemy is. We’re building
and regional command and control. to figure out how to connect it to a net- the ingress routes, the HH-60, and the
I looked at it through a lens to say work. That’s the 20th-century approach. pararescuemen are getting their work.
that this is an obligation for the Air Here’s the 21st-century approach: build We have moved airborne battle manager
Force, and as I look toward the future the network, and then build your apps. over the top. We are doing the airborne
of combat and conflict, I’m one who Some of your apps fly, some of them C2. We have a C-CAT [Critical Care Air
believes victories in combat—planned drive, some of them walk. Some of them Transport Team] that’s jumping onto a
combat—are going to go to those who are in low Earth orbit. Some of them C-17. They are already launching. Think
successfully can command their forces, are in GEO [geostationary Earth orbit]. about that. Air, land, sea, space, cyber, all
make decisions, and move forces, and If you think about it in that mindset, it domains, multidomain, multimission, all
create dilemmas from all domains simul- totally reverses where you focus. coming together to save one life. This is
taneously if required, with resilience, so Actually, it’s the network that gives actually natural for us.
if I’m taken out in one domain, I can us the ability to have that asymmetric
attack you in five others. It’s going to be advantage, and then it allows us to start
JFQ: Let’s discuss the retirement plans for Afghanistan into regional commands other areas. A-10s worked well when we
the A-10 and how that relates to your per- [RCs]: RC-East, RC-South, RC-West, had them at Kandahar. When I needed
spective of how close air support will look in RC-North. These commands had dif- to get something in RC-North, I needed
the future. Related to this is the F-35 and ferent terrains, different schemes and something that could get there and could
how you are trying to leave the A-10, at maneuver, and somewhat different ob- stay there for a while. That’s where B-1s
least to some extent, to be able to have per- jectives based on where the battle was at tended to park. And then in RC-West,
sonnel to support the F-35 mission. How do the time. Each ground force commander it was a different battle line. In the same
you see this playing out during your term? required coverage that brought different mission, there were four different plat-
attributes. So, again, my job was to look forms, each that brought the attributes
General Goldfein: First, I look forward at the family of systems and make sure the ground force commander wanted.
to a time where I’m not having as many that those attributes were overhead and
discussions about platforms, and I’m that the ground force commander was
actually having far more meaningful covered. JFQ: Given the expansion of domains to
discussions about mission, and how In RC-East, there was mountainous include land, sea, air, space, and cyber,
we accomplish that mission. We have terrain and generally the worst weather. what is the Air Force doing to make sure it
evolved to the point where there is no That was a place where I needed to have provides a total force capability across all
silver bullet in any of the domains, so it’s something that could get into the valleys these domains?
not the F-35, it’s not the A-10, it’s not and provide the precision fires that were
this or that. It is how these things come required, and when things went bad, General Goldfein: We already are en-
together. they went bad in a hurry. I needed to gaged in all of them. It goes back to the
Here’s the example I would use. As a have something that could get there “always there”— take a look at all the
CFACC, understanding the ground force quickly. So quite frankly, MQ-9s were a missions, whether deployed-in-place or
commander’s scheme and maneuver, great asset to place there. RC-South was deployed forward. You would be hard-
terrain challenges, battle lines, and what generally flat, with a lot of agriculture and pressed to find a mission that we’re not
he was trying to accomplish, we divided a lot of challenges around Kandahar and engaged in. It’s always a balancing act
10 Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
against a finite number of resources. We
must balance not only capability and
capacity but also force readiness to ensure
we are able to contribute to all those
mission areas.
You mentioned total force. One of
the great gifts of Mark Welsh is the fact
that we are truly one Air Force with three
components and five core missions. But
how do we reinforce that we truly are
one Air Force with three components?
You can’t tell us apart. Each component
brings unique attributes. Whether we
are looking at squadrons, or how we
develop joint leaders in the future, or
how we look at multidomain command
and control and the network approach
to warfare, we have to look through the
lens of one total force. When we place
talent in all mission areas, how do we get
the most return on our investment? The
story of the Air Force is this: As we have
gotten smaller over the years and made a
conscious decision to trade capacity and
readiness for capability and moderniza-
tion, there were mission areas that grew,
some of them exponentially, such as ISR.
Space has become a more contested
place. Cyber. Nukes. All these areas. The
budget numbers are coming down and
the missions are getting bigger, so how
do we pay that bill? We pay through some
of our key enabling support, infrastruc-
ture, people, and conventional airpower.
The problem is that we have gotten to
the point where we are far too big of an
Air Force for the resources that we have
been given, and far too small for what the
Nation and the joint force requires. In be-
tween those two bookends lives risk on the
backs of our Airmen. That’s why you’re
hearing me coming out to talk about the
fact that this Air Force needs to grow.
Senior Airman of 932nd Aeromedical Evacuation Squadron participates in Exercise Global Medic
2011, a joint field training exercise for theater aeromedical evacuation system and ground medical
components (DOD/Carolyn Erfe)
JFQ: I would like to hear you talk about
joint leadership and how that is built. have to go fix things. The words that we four. The Air Force is not building joint
How do we step beyond the three-star level chose in each of my focus series is im- leaders; they are evidence that we are
for jointness and leadership? How do we portant, strengthening joint leaders and building great joint leaders.
get an Airman to become a joint force teams. I’ll give you four names, and you The question for me is how do we
commander? can use this list to describe how the Air strengthen that? I believe the Airmen of
Force is doing just fine: Lori Robinson, the future are working to provide the
General Goldfein: I started off by tell- Paul Selva, John Hyten, and Darren voices in building a joint plan, so there
ing you I think we do a pretty good job McDew. I don’t think we could find ought to be an assumption that they
right now. Again, I’m not thinking we better leaders on the planet than those understand the operational integration
of air, space, and cyber. We’re going and credibility because we understand I only know one thing with abso-
to do a complete scrub that goes from it. That goes to career path progression. lute clarity, and I believe I only have
entry level, for example, in the [Air How long are we staying within stove- one moral obligation as a chief. My
Force] Academy, ROTC, or BMT [Basic pipes versus migrating across the air, moral obligation is that I ought never
Military Training], through the life cycles space, and cyber domains and making to allow an Airman to be sent forward
of Airmen to look at where they are sure we understand it? How much time to do a mission in harm’s way without
and how are we exposing them to the do you have in a career to be able to get being properly organized, trained, and
operational art of air, space, and cyber. that kind of experience? We are going to equipped. That’s a moral obligation. The
I’ll be honest with you, the first time I look at all the curricula at the university, one area that I want to make sure that we
truly had to understand space—not be the Academy, and other places. stay focused on is our contribution as an
a user of space, but understand space air component as a member of the joint
as an Airman—was being the Space team for the joint force.
Coordinating Authority as the CFACC. JFQ: What have we not talked about that Then there are four elements to this.
That was a little bit late. The first time I you would like to talk about? There is an organizational element, a
truly had to understand the operational leader development element, a CONOPS
art, operations in the cyber domain, was General Goldfein: Perhaps it would be element, and a technological element.
a little bit late. Where I want to focus helpful if I give you a little perspective on The three focus areas actually cover those
on strengthening joint leaders in the Air why I picked the three areas I focused on four, so we have the organizational piece
Force is first and foremost that Airmen and how they tie together. There is actu- and the squadrons, leader development
are exposed to the operational art earlier ally a method behind the madness: When piece, as well as strengthening joint lead-
in their careers, earlier and more often. we connect the dots, and they actually ers and teams. CONOPS are associated
The expectation ought to be that equal joint warfighting excellence, that’s with the ECCT. How do we take the
when we sit down at the table, we can where I intend to stay focused for my sensing grid and combine it with the
speak air, space, and cyber with authority tenure as chief. effects grid and pull it together in the way
12 Forum / An Interview with David L. Goldfein JFQ 85, 2nd Quarter 2017
we discussed? The technological aspect ops [operations] tempo, and if the answer
is really that whole piece of the network.
How do we change the mindset on
is, that is the steady state and it’s all I
have to be ready for, then yes, I can. I will
New from
where we focus with future acquisitions? continue to pull from stateside units, and NDU Press
I will continue to have readiness in those for the Center for the Study of
units that are not next to deploy, but I Chinese Military Affairs
JFQ: How do you feel the Air Force is can sustain that level of readiness. Strategic Forum 299
doing readiness-wise? But if you ask, are you prepared to China’s Future SSBN Command and
simultaneously provide two-thirds of Control Structure
General Goldfein: If you want to find the strategic deterrence and most of the by David C. Logan
high morale, go where we have high NC-3 [nuclear command, control, and China is de-
readiness. You want to go find low mo- communications], that is, do those things veloping its
rale? Look where we have low readiness. from a deployed-in-place that defend the first credible
The two are inextricably linked. We homeland, contribute to the 4+1, con- sea-based
generate high readiness forward—pretty tinue the fight against extremism as the nuclear forces.
high morale on the Korean Peninsula lead striking force in that operation, and This emer-
and pretty high morale in the Middle take on any other contingency, I will tell gent nuclear
East, relatively speaking. That’s where we you that we will be challenged. ballistic mis-
generate and send supervisory capability, sile submarine
parts, readiness. (SSBN) force will pose unique chal-
I will tell you that if pilots don’t fly, air JFQ: You have to start making serious lenges to a country that has favored
traffic controllers don’t control, air battle choices. tightly centralized control over
managers don’t manage, maintainers its nuclear deterrent. The choices
don’t maintain—if we can’t affect their General Goldfein: That’s right. That is China makes about SSBN command
quality of service where they feel like they why “ready for what and when” is such and control will have important
can be the most competitive they can be an important part of the dialogue, or you implications for strategic stability.
regarding career path and combat capa- end up with a partial answer to a partial China’s decisions about SSBN com-
bility—then there is not enough money question. mand and control will be mediated
in the Treasury to keep them in the Air by operational, bureaucratic, and
Force. When I look at all the things that political considerations. A hybrid
build readiness and I look at where we JFQ: Chief, thank you so very much for approach to command and control,
are as an Air Force right now, my num- your time. This has really been a pleasure. with authority divided between the
ber one focus is people. If I’m going to navy and the Rocket Force, would
generate the airpower the Nation requires General Goldfein: Thanks, yes, great be most conducive to supporting
and deserves, I have to have more people. seeing you. JFQ strategic stability.
here is a critical need for new and space also demand a concept for
16 Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
levels.1 This incremental shift in focus challenge of considering the enemy’s “meaning,” that emerges on the part
from traditional instruments of warfare perspective becomes exponentially more of the adversary is what we define as an
toward desired effects opens the door difficult when the existing environment is “effect.” When assessing or measuring
for a more holistic consideration of the altered, for example, through the intro- such effects, a major challenge exists
broad spectrum of security instruments, duction of a new domain such as cyber, with the more subjective, moral side of
both kinetic and nonkinetic and across with substantial nonkinetic as well as the arc of effects. Unlike the physical
all domains. The challenge we face now kinetic potential. effects of kinetic actions, which we
is how best to assess and measure effects, Dissonance, such as that forced by can usually measure with some preci-
particularly those of a subjective character a new domain, is common throughout sion, moral effects are defined by the
such as the adversaries’ morale, courage, military history. Just prior to the out- adversary and are thus more difficult
willingness to fight, and views of their break of World War I, Sir Arthur Conan to assess.
security environment. Doyle wrote a fictional account of the To meet this challenge, we offer a
In this article, we introduce two defeat of Great Britain by unrestricted metaphor from the discipline of quantum
constructs: the arc of effects, which submarine warfare. At the time, it was physics, which we call meaning fields.
describes the continuum of national se- farfetched to believe that Germany The idea of “fields” is an elementary
curity actions, and meaning fields, which would use submarines to sink merchant component of quantum physics. While
describe how our actions create different vessels and to logistically isolate Britain. early Newtonian physics focused on
adversarial effects. Concurrently, we fur- Because Doyle’s ideas did not conform to a body and the forces acting upon it,
ther develop the definition of effects. We the naval zeitgeist, they were summarily quantum physics explains the physical
believe that these concepts are the initial dismissed by the military establishment. world as the result of particles moving
stages to developing a cognitive path for Submarines were a radical and complex through and being connected by fields
achieving holistic, unified measurements technology designed to function in a new (for example, electromagnetic fields or
of kinetic and nonkinetic effects in all domain of warfare, and surface navies gravity), much like a blanket connecting
domains, including the increasingly im- were slow to understand the domain individual patches of cloth. One ubiqui-
portant cyber domain. below the sea, ignoring its potential tous field, the Higgs Field, is of particular
impact. Almost immediately at the onset significance because it imparts mass onto
The Arc of Effects of submarine warfare, countries became particles as they pass through it. The
Traditionally, our military has tended aware of the physical results (the loss of more substantial the particle, the more
to measure effects in the natural shipping) but were less timely in appre- mass the Higgs Field imparts upon it.
domains (land, sea, air, and space) ciating its potential effects on the moral Because it imparts mass, the Higgs Field
in terms of physical outcomes, with forces end of the spectrum (uncertainty allows particles to join together, forming
the focus on linear measurement of and terror).4 the foundation on which the rest of the
destruction caused by kinetic instru- The submarine example is analogous universe is built.
ments of power. An emphasis on the to the rising contemporary challenge of We liken the Higgs Field to mean-
physical domains has led us to neglect nonkinetic effects. We are both reluctant ing fields, which we assert surround
an important characteristic of warfare. and unable to define or fully understand all actors in the international security
Actions during conflict exist on a the extent of these effects because we arena, be they individuals, organizations,
continuum, ranging from the purely have traditionally emphasized the physical subnational groups, or nation-states.6 A
physical to what Carl von Clausewitz end of the arc of effects. This deficiency major difference, however, between our
termed “moral forces.” These moral also limits our government’s capacity for metaphorical fields and the Higgs Field
forces encompass more ephemeral devising an effective deterrent to the full is that there are many meaning fields,
factors such as motivation, will, spirit range of security threats and allows our with every actor—from individuals to
of sacrifice, patriotism, and courage.2 opponents greater freedom of maneuver. nation-states—possessing its own. Such
We present a construct—the arc of In short, we need a tool for navigating meaning fields are a representation of
effects—for better understanding and the arc of effects that enables us to how actors bestow meaning on actions of
referencing physical and moral effects. identify and assess the full spectrum of the external world and are constructed,
While the physical results of kinetic physical and moral forces. inter alia, of human nature, culture,
operations are relatively well understood education, historical experiences, and
and can be measured with some precision Meaning Fields circumstance. In the same way that the
(even when considering second- and Clausewitz insisted that to be victo- Higgs Field imparts mass to an object
third-order effects),3 effects toward the rious, we must convince our enemies moving through it, meaning fields impart
moral end of the arc are more difficult to that they are defeated.5 Victory requires meaning on security-related actions or
measure because they require a degree that our adversaries perceive the totality lack thereof.7 Actions that do not inter-
of “military empathy,” or the ability to of our actions that create an unaccept- sect our adversaries’ meaning fields (that
consider the enemy’s perspective. The able environment. This perception, or is, that go unnoticed by the target actor)
are imparted no meaning and are irrel- for assessing the effect of inaction. It the less complicated metrics associated
evant. In short, the result of interaction draws attention to how actors other than with the physical side of the arc of ef-
with a meaning field is what we define as ourselves see the world, including the fects. While these kinetic effects can be
an effect. proposition that inaction can have just measured with relative precision and
We believe that the meaning field as much of an effect as action. Third, circumvent the challenge of additional
concept can provide a cognitive pathway the construct provides a pathway for analysis, it is perilous for countries to ne-
to better understand the full spectrum measuring follow-on (second-, third-, glect their adversaries’ meaning fields.
of the arc of effects and is useful for mil- fourth-order) effects.8
itary planners to assess how opponents Despite these advantages, the mean- Tactical- and Operational-
impart meaning to external actions. The ing field concept is also a humbling tool. Level Model Application:
meaning field construct attracts the right It complicates the security picture by The Fall of Singapore
kind of questions, including thoughts on exponentially increasing the number One of the most devastating defeats in
which meaning fields are most relevant. of variables military policymakers must the history of the British military had
Unlike measures of effects that focus consider. It also makes apparent the its roots in the moral region of the arc
primarily on attrition and destruction, uncomfortable reality that when we take of effects. On December 7, 1941, as
the meaning field concept is more likely actions to achieve desired effects, our the Japanese surprised the Americans
to accommodate effects on the moral own meaning fields are often irrelevant at Pearl Harbor, they simultaneously
side of the arc because it more explicitly to our opponents.9 Thus, to be effective attacked the British Empire on the
addresses the Clausewitzian emphasis on managers of effects, our focus must be on islands of Singapore, leading to what
how the enemy understands our actions. our opponent’s meaning fields. Without would become a painful embarrass-
A second advantage of the meaning understanding an adversary’s meaning ment and costly strategic setback for
field construct is that it offers a means field, the default instinct is to focus on the British.10 Although outnumbered
18 Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
Sailor assigned to Blue crew of ballistic missile submarine USS Maine receives her submarine warfare officer device at Naval Base Kitsap-Bangor,
Washington, December 5, 2012 (U.S. Navy/Ahron Arendes)
almost three-to-one, the Japanese were especially heavy forces, and that those The final Japanese victory over the
victorious against what was widely con- forces were most effective in open terrain. main island of Singapore was as remark-
sidered a vastly superior force in large The Japanese upended the British able as their initial 600-mile march to
measure because of their superior ability meaning field. Led by General Tomouki capture Malaya in just 54 days. With a
to assess and understand the meaning Yamashita, the Japanese amphibious recklessly low ratio of attackers to de-
field of their British opponent. assault occurred near the northern border fenders, and with supplies and morale
The defenses on the main island of of Malaya, well outside the influence of running low on both sides, Yamashita
Singapore were considered a crowning British forces.11 Aware of the advantages pressed the assault. In a last-ditch effort
achievement of the British Empire in the of blitzkrieg tactics, Yamashita focused to force British capitulation, Yamashita
Far East. At the time, the fortress con- on speed of maneuver. His relatively light ordered a massive artillery shelling of the
tained the largest fixed-position cannon forces blazed through the jungle, using city (expending the last of his stores) to
in the world. These guns, like most of bicycles, fixing partially destroyed bridges feign unlimited resources. Additionally,
the defenses on the island, were initially at night, and viciously giving no quarter, with a view toward the moral forces end
positioned to defend from a southerly sea as prisoners slowed their advance. With of the arc of effects, Yamashita attacked
attack. The British discounted a Japanese the preponderance of the British air the city’s water supplies instead of the
attack from the Malaysian Peninsula, as component being destroyed early in the British-defended city proper. With dead
any amphibious landing within proximity assault, the Japanese were able to press bodies accumulating in the streets and
of the main island would be slowed by across the peninsula relatively unim- facing the prospect of dying of thirst, the
the dense jungle and could be interdicted peded, overrunning the British, taking British surrendered.
by overwhelming land forces. The British valuable airfields, and reinforcing a cycle Superior Japanese understanding
meaning field assumed that strength was of rapid Japanese success. of the British meaning field, as well as
measured in the metric of total forces, audacity and determination, led to the
fall of Singapore. The Japanese asked while maintaining hostilities below of hybrid warfare and gray-zone conflict?
not how to defeat the British forces, but the threshold of conventional war. In Clearly the Russia-Ukraine conflict brings
how to sap the British will to fight. We this section, we examine the problem a change in the technological character of
argue that modeling meaning fields in of Russia’s gray-zone warfare in the war. A lack of understanding nonkinetics
the planning process could prompt our context of both the arc of effects and and cyber operations prevents our senior
forces to ask the same questions. For the meaning fields. policymakers from articulating actionable
British, their failure could have been pre- Russia’s actions against Ukraine, often desired effects and deterring gray-zone
vented by constructing a meaning field of referred to as hybrid or new-generation type incursions.
the Japanese view of Malaya, a view that warfare, encompass both the physical Successful gray-zone operations rely
focused on more than the physical side of and moral components of the arc of heavily on ambiguity and the adversary’s
the arc of effects. effects. The physical forces component resulting inaction. In the absence of strict
of Russia’s strategy includes conventional international policies and laws regard-
Strategic-Level Model strikes, train and equip operations, and ing hybrid warfare actions, aggressors
Application: Russia’s Spetsnaz incursions, while nonkinetic el- operate with relative impunity.14 While
Gray-Zone Warfare ements include information warfare with Ukraine is not a member of the North
While the example of Singapore rep- distributed and focused cyberattacks.12 Atlantic Treaty Organization (NATO)
resents a tactical and operational appli- When considering hybrid warfare strate- and is not privy to protections under
cation of the meaning field construct, gies, we are forced to consider the entire Article 5, Russia’s invasion clearly violates
the model is also valuable in analyzing arc of effects and the resulting synergies international norms against annexation.
both kinetic and nonkinetic strate- of simultaneously employing kinetic and Decisionmakers in gray-zone situations
gic-level effects. Russia’s actions in nonkinetic means. are often unable to articulate and uphold
Ukraine represent what is often referred The underpinning concepts behind diplomatic “red lines.” To counteract
to as “gray-zone” warfare, or the hybrid warfare are not new. At its core, gray-zone warfare, the need to under-
aggressive application of asymmetric hybrid warfare is simply a combination stand the adversaries’ meaning fields
and conventional techniques (including of asymmetric and regular warfare—the becomes paramount.
diplomatic, informational, military, existence of which has been present So it is that the meaning field con-
economic, and other political forces) throughout history.13 So what is the basis struct provides a cognitive path for
designed to achieve political goals for our current fervor over the dangers dealing with security problems such as
20 Forum / Toward a Unified Metric of Actions JFQ 85, 2nd Quarter 2017
hybrid warfare. Throughout this article mistake because it is convenient to think ish Empire through direct attacks that entirely
evaded the might of the British surface fleet.”
we have portrayed our adversary’s mean- in terms of physical forces rather than in 5
Clausewitz.
ing field as at least as important as our terms of how the enemy sees the world. 6
The authors credit Lieutenant Colo-
own. Regarding Russia, it appears that The meaning field concept provides nel Mario Serna, USAF, for his assistance in
Vladimir Putin’s meaning field was not a cognitive path for moving our focus translating the Higgs Field metaphor into the
considered adequately when deciding toward the mind of possible adversaries meaning field. Also see Sean Carroll, California
Institute of Technology, “The Higgs Boson and
to expand NATO. And now the West’s in the interconnected world of national
Beyond,” The Great Courses, 2015.
inaction toward Russia’s aggression security. The notion that military leaders 7
Meaning fields can also impart meaning
into Ukraine is presenting itself as a should focus on the mind of the enemy upon inaction. For inaction to be considered
particle through Putin’s meaning field. is not new; it was the basis of Sun Tzu’s significant vis-à-vis meaning fields, we must
By understanding our behavior in terms Art of War. But more than two millennia consider two factors: expectation of action and
time. An adversary must expect some action
of meaning fields, we are better able to after Sun Tzu, we still lack a means to ef-
(which is never taken), and the appropriate
articulate our desired effects and produce fectively incorporate his advice directly to amount of time must pass. An example of
viable counters to hybrid warfare actions. measuring effects. We continue to define significant inaction in this context is the relative
In sum, the meaning field con- effects based largely on our own intuition U.S. inaction in the face of Syria’s use of
struct can focus our efforts to counter rather than in terms of how the enemy chemical weapons in 2013, and the meaning
that the Bashar al-Asad regime imparted to this
gray-zone conflicts. While the U.S. sees the world. We see the meaning fields
inaction.
Government has the means to oppose concept as a helpful point of reference in 8
For every action, there are consequent
these types of hybrid threats, economy the doctrinal process for reorienting mili- actions and effects. Each initial action passes
of force and the threat of escalation are tary leaders to the mind of the enemy. through all meaning fields, producing effects.
underlying concerns. Possible solutions If we seek to defeat our adversaries, Each one of these effects then passes through
all meaning fields, producing another effect
to hybrid warfare include train and equip we must first perceive their meaning
(a second-order effect). This cycle is repeated,
(proxy) operations, special operations fields. Doing so would increase the with each order effect being influenced by the
forces, massive nonkinetic retaliation, and probability that we will think like the relevant meaning fields. If the military planner
conventional strikes. Any combination of enemy (minimizing the “mirror imaging” is cognizant that all actors have unique mean-
these options, including our own hybrid problem) and a greater probability of ing fields, then once the initial meaning field
is considered, it becomes easier to accurately
warfare, is a possibility.15 By predicting achieving desired effects. Moreover, this
comprehend and possibly predict second-,
our adversary’s response to our actions concept allows us to consider multiple, third-, fourth-, and fifth-order effects. This
using the meaning field theory, it is possi- increasingly complex and interconnected visualization is the first step in understanding
ble to achieve our desired effects through adversaries who strive to operate beyond ordered effects of our actions.
the most economical and politically palat- the second and third orders of effects. By
9
When considering the desired effects of
our actions, the opponent’s perception of our
able means available. understanding meaning fields, we access
meaning field is often irrelevant. Simply put,
the entire span of the arc of effects, creat- our adversaries are often equally negligent
Conclusion ing a definition of “effects” that unites all when considering meaning fields.
The British strategy for the defense of possible domains of warfare. JFQ 10
Due to the International Date Line
Singapore reflected their own meaning disparity, this was the date of the event in the
United States. The actual date in Singapore
field, which the Japanese correctly per- was December 8, 1941. The Japanese initially
ceived was predicated on a traditional Notes attacked the islands by air.
force-on-force strategy. However, this 11
These forces constituted a coalition from
is not how the Japanese perceived the
1
See Ervin J. Rokke, Thomas A. Dro- across the British Empire, including British,
han, and Terry C. Pierce, “Combined Effects Australian, and Indian troops.
operational environment. They viewed Power,” Joint Force Quarterly 73 (2nd Quarter 12
Patrick Duggan, “Strategic Development
the terrain, defenses, and the entire 2014); and James G. Stavridis, Ervin J. Rokke, of Special Warfare in Cyberspace,” Joint Force
island system in terms of how it would and Terry C. Pierce, “Crafting and Managing Quarterly 79 (4th Quarter 2015).
affect the British will to fight. Similarly, Effects: The Evolution of the Profession of 13
For a historical perspective on the exis-
the United States and our allies are slow Arms,” Joint Force Quarterly 81 (2nd Quarter tence of hybrid wars, see Frank G. Hoffman,
2016). “Hybrid Warfare and Challenges,” Joint Force
to consider our actions in regard to 2
Carl von Clausewitz, On War, ed. and Quarterly 52 (1st Quarter 2009).
Russia’s meaning field. trans. Michael Howard and Peter Paret (Prince- 14
See U.S. Special Operations Command,
We need to apply the meaning field ton: Princeton University Press, 1989), 97. “The Gray Zone,” September 9, 2015.
concept across all domains. The growth 3
When focusing only on physical results, 15
Joseph Votel et al. suggest that the most
of cyber is just one example of a techno- the follow-on effects are relatively simpler to effective counter to hybrid warfare is hybrid
discern than nonkinetic (moral forces) results. warfare. See Joseph Votel et al., “Unconven-
logical advance that spans the physical 4
According to Michael L. Hadley in Count tional Warfare in the Gray Zone,” Joint Force
and moral side of the arc of effects. Not the Dead: The Popular Image of the German Quarterly 80 (1st Quarter 2016).
The risk we run with this technological Submarine (Montreal: McGill-Queen’s Uni-
advance is forcing it into the physical versity Press, 1995), 14: “The submarines had
side of the arc of effects. We make this done so by isolating the vital centre of the Brit-
22 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
transits the Internet, and how it influences of this model. The Department of •• The United Kingdom reports 120,000
our daily decisions. The trend toward State coordinates the diplomatic role, cyber incidents a day. That is almost
a worldwide mesh-network is nearing, Department of Defense the military as many as the state of Michigan deals
and with the creation of an information role, and Department of Treasury the with.
technology (IT)-based domain comes in- economic role. Twenty-first-century •• Utah says it faces 20 million attempts
creased understanding of the environment challenges presented by the IoT require a day—up from 1 million a day 2
in which we live. There appears to be no a more innovative organization that years ago.8
deviation from Moore’s law, developed in promotes adaptability and agility in the
To meet the challenge that exists
1965, and popularized and demonstrated information space, akin to models used at
in the information age, organizational
since its inception. If Moore’s law contin- Google, Facebook, or Apple.
changes are required. Modern ideas and
ues to be upheld in the future, more apps, Winn Schwartau, author of
incorporating industry concepts may
algorithms, and daily functions will link Information Warfare and recognized
be one way to traverse the information
together each part of our lives, providing IW theorist, describes the information
space and create an advantage in future
increased processing capability and a age as “computers everywhere.”3 The
conflicts.
limitless stream of information creating ultimate fact of the information age is
Within the IoT, actions take place
maximum efficiency for humans. the proliferation of IT, which “incorpo-
in nanoseconds and occur billions of
The Westphalian design of society rates information systems and resources
times daily. Big data concepts attempt
and order contributes to the human need (hardware, software, and wetware) used
to harness massive amounts of infor-
to work within a set of logical models, by military and civilian decisionmakers
mation and distill that information into
whereas the principle of international law to send, receive, control, and manipulate
something that a human can use to make
and orderly division of nations enables information necessary to enable 21st-cen-
a decision. In the near future, the infor-
sovereignty over territory and domestic tury decisionmaking.”4 Additionally,
mation required to win the advantage
affairs. It is possible that globalization, the development of IT allows sharing of
over an enemy may be determined by
which would be nearly impossible information in near real time, at an expo-
who can extract data, identify key centers
without a relatively high transfer rate of nential rate, anonymously and securely.
of gravity in the information space, and
information, will play a critical role and These advances can be used as an asset,
automatically take action though rule sets
may challenge global order. Assuming but also pose a potential vulnerability
and computational criteria based on de-
an information advantage is required to to the United States, our allies, and our
fined “rules of engagement.” The ability
achieve nation-state and military objec- adversaries.5 It takes seconds to upload
to harness big data exists now and is only
tives, and information superiority is not pictures or comments on social media
increasing. Consumer product companies
guaranteed because of the complex IoT, networks. At the same time, adversaries
are mining Facebook, Google, and other
how does the U.S. Government present can use these systems to gain access
data to understand customer prefer-
effective and integrated information war- to critical information. According to a
ences, global trends, and public opinion
fare capability (IW) in the information New York Times article, “In July 2015,
on matters of interest. From a military
age? Moreover, if wars are fought in the 21.5 million people were swept up in a
standpoint, understanding the informa-
information space, can they be won with colossal breach of government computer
tion terrain in relation to the potential
information alone? In other words, can systems that was far more damaging than
adversaries is foundational to discerning
information warfare provide the ways and initially thought, resulting in the theft
points for information operations (IO)
means to fight wars, as well as the ends? of a vast trove of personal information,
across the range of military operations.
Also, does the U.S. Government need to including social security numbers and
Big data concepts used in business could
invest in an organization responsible for some fingerprints.”6 The following list
be advantageous and used in information
the coordination and integration of IW provides a general summary of the num-
warfare. It is possible that data-mining
capabilities and effects? ber of times systems have been attacked
and subsequently an information ad-
To increase the U.S. Government’s via cyber.7 The number of attacks on
vantage could achieve objectives purely
capability and capacity, a new organiza- information systems has increased each
through IW alone.
tion should be created within the U.S. year, reinforcing the fact that warfare is
The United States has used various
Government to focus on information currently being conducted in the infor-
IW strategies, agencies, and professionals,
warfare, with a fundamentally different mation space via IT.
with varying degrees of success. The U.S.
organizational structure than our current
•• The Pentagon reports getting 10 Information Agency (USIA) was created
governmental hierarchical structures.
million attempts a day. in 1953 and was in service until 1999.
Specifically, the U.S. Government sub-
•• The National Nuclear Security USIA was designed to consolidate all
scribes to the diplomatic, information,
Administration, an arm of the Energy information activities:
military, and economic (DIME) model
Department, also records 10 million
but does not have an organization de-
hacks a day.
signed to lead the information functions
24 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
Deputy Secretary of Defense Robert Work and Vice Chairman of the Joint Chiefs of Staff General Paul Selva meet with Commander of U.S. Pacific Command,
Admiral Harry Harris, to discuss Third Offset Strategy and its implications for Indo-Asia-Pacific region, October 18, 2016, Camp H.M. Smith, Hawaii
(U.S. Navy/Jay M. Chu)
cyber campaign, such as that observed of potential adversaries, understand their current planning process and traditional
in Estonia in 2007 and Georgia in 2008, lessons learned, and use them to our planning structure provide the formal
raises questions about Russian IW and advantage, the U.S. Government must links between national strategy and
Reflexive Control strategy. While this ensure that the current organization of the tactical level, they do not prescribe
may indicate a desire not to aggravate IW capabilities and strategic planning en- a way in which to gain the informa-
potential adversaries, it may also indicate ables an integrated and cohesive National tion advantage in future conflicts.
Russia’s inability to control all aspects of Security Strategy. Arguably, from a national perspective,
its offensive cyber actions such that it was an information strategy should drive
concerned that actions could produce Strategic Planning Guidance subsequent actions and be integrated
large-scale unintended consequences.19 to Tactical Execution? from the President to the individual
These consequences may have resulted In the joint planning process, IO plan- Servicemember. The information strat-
in the Russians’ inability to deny their in- ning is typically a supporting effort. If egy should be integrated with strategic
volvement, or brought powerful enemies we prescribe to the idea that all wars communications efforts of the U.S.
into the conflict. As discussed, the flaws are fought on the cognitive plane, at Government. However, as noted in the
noted in Reflexive Control doctrine serve least at some point, then it is logical to 2008 report from the Defense Science
as examples of how difficult it is currently, assume that, at one point or another, Board, “Strategic Communications is
and will be in the future, to control IW courses of action (COAs) should a dynamic process with responsibility
the consequences of offensive actions be the supported effort. Moreover, held by those at the highest levels of
and conduct information warfare in an “information operations support government—the President and senior
information age. In an effort to better themes” are sometimes developed after government leaders. . . . But to do so
understand the capabilities and intentions military kinetic COAs are.20 While the requires a commitment not yet seen,
though some steps have been taken.”21 to present ends that may be achieved Government shut down Internet Service
In fact, the report recommends the cre- through information warfare. Planners Providers (ISPs) (that is, the target) that
ation of a nonprofit, nonpartisan Center must articulate why a specific action is ISIL is using? Does the government con-
for Global Engagement as a focal point being taken and when it should occur duct a distributed denial-of-service attack
for strategic communication activities. based on commander’s intent, the oper- against certain Web sites? Does it put
In 2010, Joseph Biden provided the ational environment, and the operational influential messages onto ISIL message
President a report on strategic commu- approach designed to solve the problem. boards on the Internet? All options are
nications that urged synchronization Decades of trial and error in warfare have plausible, but many times are not exe-
and defined the overall concept.22 An led to institutional doctrine and rule sets. cuted due to lengthy and unsynchronized
interagency policy committee, led by While there is an argument that these plans. The lack of leadership and a focal
the National Security staff, was a recom- rules should be applied to both kinetic point in the U.S. Government who can
mended solution; however, a committee and nonkinetic effects, it is important to articulate the second- and third-order
is made up of individuals with allegiances realize that there are certain unique fac- effects of information operations often
to their own organization and likely with tors associated with both. For example, contributes to a lack of action. The ability
other responsibilities, not fully being targeting fundamentals are largely agreed to understand how the information space
dedicated to integrated strategic com- upon and accepted for offensive force-on- will be influenced by the outcome of a
munications. The little IW capability that force operations, but do the theories of U.S. action is not effective because there
exists is based on the current and legacy targeting need to adjust for information is no lead organization.
organizational structure, which hinders warfare? In addition to the tactical-level
effective IO planning and execution. Some argue that the center of gravity information effects, how are strategic
If information space can be consid- (COG) for the Islamic State of Iraq communications vetted and targeted?
ered a way and means to fight and win and the Levant (ISIL) is the Internet. Do the processes differ or are they the
wars, then a framework is required to If we accept this idea, how does the same? If the view of this process were to
assist in prioritization and planning and United States target ISIL? Does the U.S. change, and targeting were to become a
26 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
process within which information targets security apparatus? Furthermore, what members to develop solutions unabated
are held at risk (for example, the ISP organization is responsible for providing by personnel unfamiliar with the tech-
example or building a strategic weapon to information operation COAs for the nical situation. The concept capitalizes
deter an enemy), then it is possible that President, specifically designed as an end? on meritocracy-based principles and
realistic options could be presented to a The contrarian viewpoint to the focuses on a federated approach as well
combatant commander in a crisis action idea of driving development down to as crowd-sourcing solutions internally to
scenario. To execute a concept where the the operator level (that is, the Soldier) the military, or even in the public sector,
United States holds information targets is that authorities do not come with to arrive at solutions. Within the U.S.
at risk, it must have access to the target. capability. This is true. A tactical-level Government, it is unlikely that a lattice
Access for information-related effects unit should not have authority to execute organization would be wholly integrated;
delivered through the information space operations in the information space, just however, a hybrid concept that captures
is no different than for physical effects as the Soldier with the rifle would not the value of a legal and hierarchical
delivered by airplanes or ships. The fire without orders. There should be a framework along with realizing the po-
delivery method could be news, a cyber strategy with clear and precise guidance tential benefit of a lattice organization
capability, a military action, or even a for operational and tactical targeting. would be valuable, as globalization and
comment by the President. The path to This does not require “execution author- IT increasingly integrate our world.
employ information-related capabilities ities,” but it does require guidance from Additionally, a lattice framework would
(IRCs) requires access from the sender to national-level leadership on the issue. In more closely align conceptually with the
the receiver, and that targeting path must other words, because technical acumen is mass-network IT environment in which
be sustainable. Without sustained access, required, the U.S. Government cannot we live. Ideas presented in the corporate
a target cannot be held at risk because afford to have a disjointed IW strategy world are potential solutions that can
gaining access to the receiver could take in which progress is slowed due to an be used or modified for complicated IW
an extended amount of time, with rela- overly complicated and bureaucratic concepts within the U.S. Government. In
tion to the operation. hierarchical structure. A lack of unity of a thought piece from business, Cathleen
Additionally, the capability must be effort results, and risk to mission and risk Benko and Molly Anderson from Forbes
attainable. Software development can be to force increase. Developers, operators, magazine highlight a few key benefits of a
a potential strategic advantage. Driving and analysts need flexibility and agility to lattice organizational structure:
education and training for software solve problems quickly with innovative
development down to the tactical level technology and an understanding of the With employees working in geographically
empowers young Servicemembers to information age, just as a Soldier does dispersed teams, the old ways of commu-
create capabilities linked to the target, when in battle. nicating [are] no longer served. Lattice
reduce cost, and create efficiencies. For ways to participate moved the organization
example, a Soldier is taught how to use Is the World Organizationally toward more interactive, transparent com-
a rifle, the foundations are built in train- Changing? munication. In one instance, the finance
ing, and he is able to utilize the weapon Military organizations have generally division gave a role traditionally reserved
through the employment of various followed hierarchical models as early as for management—identifying improve-
tactics, techniques, and procedures on the the Greeks in 400 BCE for organizing ment priorities—to employees, by launching
battlefield as the situation dictates. If the and equipping. It is possible that global a “pain points” portal where they can voice
situation changes, he adjusts to the enemy IT trends will require a foundationally their views of current challenges for every-
in an instant. From an IW perspective, different way of thinking and organizing one to see. The company appoints teams to
software is but one tool, as is the rifle. IRCs in the U.S. Government to main- address the highest priorities.
Foundations are built, skills are honed, tain pace with the speed of information.
but it is left to the tactical level to ensure Largely, from the time of the Greeks to At Deloitte, our annual employee survey
the capability is “tuned” to the target that of the current U.S. Government, shows that 90% of workers who experience
because the tactical-level operator should militaries have been designed around all three lattice ways are engaged. Contrast
have the most accurate knowledge of that a hierarchical system. As IW becomes that with the results of a major global
target. Additionally, as accesses change, increasingly more important during workforce study by Towers Perrin in 2007–
the tactical and operational level should the conduct of government or military 2008 that found just over 60% of employees
ensure consistent and reliable access operations, a lattice framework and in surveyed companies were engaged.23
to the target. Indeed, the Soldier does system may be a logical way to organize
not develop the strategy; the national information warfare–based capabilities Not only does a lattice framework
security staff, President, and combatant and personnel. promote internal integration and
commanders do. But what organization This concept prescribes basic guid- idea-sharing, the concept also promotes
is responsible for coordinating the stra- ance and a certain rule set (that is, the use of solutions from external sources.
tegic message throughout the national authorities) but empowers individual In many cases, members of a lattice-type
organization are encouraged to look the desired data from the terrorist’s organizationally, to harness IW concepts
for nonstandard solutions to difficult phone. This example shows the power of and be positioned to maintain the in-
problems, even if that means branching information in multiple ways; the first is formation advantage in a dynamic and
outside of organizational norms. the fact that the government was unable unsure information age.
Analyzing a recent case, the iPhone to use traditional methods of gaining Future IW solutions will also need
encryption issue surrounding the San support from a private company. Second, to involve multidomain skills from in-
Bernardino terrorist attack is an example media, as the primary driver, brought dividuals with varying backgrounds. In
of a federated approach to problem-solv- attention to the problem and forced a today’s military, once a Servicemember is
ing. The Federal Bureau of Investigation public debate, which worked in favor of branded with a specific skill set, it is chal-
(FBI) was able to crack the iPhone’s the government. There were arguments lenging to break from that community
encryption, despite Apple’s unwillingness on both sides of the issue, but it should and maneuver effectively between com-
to support. Apple’s fear stemmed from be assumed that the challenge in and of munities, while still maintaining upward
the idea that if it provided the requested itself was enough to stimulate a solution, mobility. To achieve greater effectiveness
support, the government would then whether right or wrong. The key point to in IO planning and execution, cross-do-
own the key to all encryption security this example is that the proliferation of in- main and diverse IRC careers should
measures for iPhones around the world.24 formation drove a solution, regardless of become a desired career path option for
When the international media reported Apple’s standpoint, the FBI’s authority, future leaders.
and publically debated the issue, the and even despite popular public opinion
FBI received calls from individuals and for or against the FBI. If the power of Amazon Meets the
companies claiming to possess the tools information can easily dictate the out- U.S. Government
necessary to break the encryption. In fact, come of such an example, what are the To harness the information age and
one company was able to break the en- long-term implications for warfare? The enable IW capability toward the success
cryption and allowed the FBI to retrieve U.S. Government can take measures now, of future U.S. conflicts, a new organiza-
28 Forum / Information Warfare in an Information Age JFQ 85, 2nd Quarter 2017
tion should be created within the U.S.
14
Maria Snegovaya, Putin’s Information
Notes Warfare in Ukraine: Soviet Origins of Russia’s
Government. The Cold War has passed, Hybrid Warfare, Russia Report 1 (Washington,
and so has USIA; however, it is possible 1
“A mesh network is a Local Area Network DC: Institute for the Study of War, September
that a new version of USIA is required (LAN), Wireless Local Area Network (WLAN), 2015), 7, available at <http://understand-
as Russia continues to test its limits or Virtual Local Area Network (VLAN) that ingwar.org/report/putins-information-war-
of power. As in the case of Ukraine, employs one of two decentralized connection fare-ukraine-soviet-origins-russias-hybrid-war-
arrangements: full mesh topology or partial fare>.
Georgia, and Estonia, as well as the mesh topology. In a full mesh topology, each 15
Ibid.
need to combat terrorist groups such as network node is connected directly to others. 16
Ibid.
ISIL, a renewed effort on U.S. informa- In a partial mesh topology, some nodes are 17
Dimitry Gorenburg, “Crimea Taught
tion warfare is required. The dynamic connected to all the others, but are only Us a Lesson, But Not How the Russian
and ever-changing environment requires connected to those nodes with which they Military Fights,” War on the Rocks, May 19,
exchange the most data.” See “Mesh Network 2014, available at <http://warontherocks.
a fundamentally different organizational Topology (Mesh Network),” IoTAgenda.com, com/2014/05/crimea-taught-us-a-lesson-but-
structure than that of current govern- available at <http://internetofthingsagenda. not-about-how-the-russian-military-fights/>.
ment hierarchical structures in order to techtarget.com/definition/mesh-network-to- 18
LookingGlass Cyber Threat Intelli-
be flexible and adaptable for 21st-cen- pology-mesh-network>. gence Group, Operation Armageddon: Cyber
tury problems. Additionally, as we move
2
Machine-learning is a subfield of comput- Espionage as a Strategic Component of Russian
er science that evolved from the study of pat- Modern Warfare, CTIG-20150428-01 (Reston,
forward in the information age, our tern recognition and computational learning VA: LookingGlass Cyber Solutions, Inc., April
lives will be increasingly intertwined and theory in artificial intelligence. Machine-learn- 28, 2015), available at <https://lookingglass-
connected with information systems. ing explores the construction and study of cyber.com/wp-content/uploads/2015/08/
This information environment will con- algorithms that can learn from and make Operation_Armageddon_FINAL.pdf>.
tinue to play a critical role in how the predictions on data. 19
David Talbot, “Watching for a Crime-
3
Richard M. Crowell, War in the Informa- an Cyberwar Crisis,” MIT Technology Re-
U.S. Government and military interact tion Age: A Primer for Cyberspace Operations in view, March 4, 2014, available at <www.
with allies, partners, and adversaries in 21st Century Warfare (Newport, RI: U.S. Naval technologyreview.com/s/525336/watch-
all of the operational domains. War College, 2010). ing-for-a-crimean-cyberwar-crisis/>.
To shape the environment to meet 4
Ibid. 20
JP 5-0, Joint Operation Planning (Wash-
our desired endstates, we must recognize
5
Joint Publication (JP) 3-13, Information ington, DC: The Joint Staff, August 11, 2012),
Operations (Washington, DC: The Joint Staff, II-9.
the importance of information warfare November 27, 2012), I-1. 21
Report of the Defense Science Board Task
and work to ensure that IO concepts are 6
Julie Hirschfeld Davis, “Hacking of Force on Strategic Communication (Washing-
properly integrated into all actions and Government Computers Exposed 21.5 Million ton, DC: Department of Defense, January
operations, if not become an end them- People,” New York Times, July 9, 2015. 2008), available at <www.acq.osd.mil/dsb/
selves. We must also search for innovative
7
Brian Fung, “How Many Cyberattacks Hit reports/ADA476331.pdf>.
the United States Last Year?” National Journal, 22
National Framework for Strategic
ways to build and employ IO concepts. March 8, 2013, available at <www.nextgov. Communication (Washington, DC: The White
Our IO experts must have the required com/cybersecurity/2013/03/how-many-cy- House, 2010).
training and expertise necessary to meet berattacks-hit-united-states-last-year/61775/>. 23
Cathleen Benko and Molly Anderson,
these requirements by way of strategic 8
Ibid. “The Lattice that Has Replaced the Corporate
guidance. Operators must have flexibility
9
U.S. Information Agency, available at Ladder,” Forbes.com, March 16, 2011, available
<www.archives.gov/research/foreign-policy/ at <www.forbes.com/2011/03/16/corpo-
and agility engrained into their ethos related-records/rg-306.html>. rate-lattice-ladder-leadership-managing-hierar-
through a lattice-type organizational 10
Alvin A. Snyder, Warriors of Disinforma- chy.html>.
structure, which honors a multidomain tion: American Propaganda, Soviet Lies, and the 24
Pierre Thomas and Mike Levine, “How
career path. The ability to carry out all Winning of the Cold War (New York: Arcade the FBI Cracked the iPhone Encyption and
IW requirements must be done in a Publishing, 1995). Averted a Legal Showdown with Apple,” ABC
11
Brian Nichiporuk, “U.S. Military Op- News, May 29, 2016, available at <http://
timely and succinct manner that allows portunities: Information-Warfare Concepts of abcnews.go.com/US/fbi-cracked-iphone-en-
for the fastest possible action with the Operation,” in The Changing Role of Infor- cryption-averted-legal-showdown-apple/sto-
most flexibility. If we are not able to mation in Warfare, ed. Zalmay Khalilzad and ry?id=38014184>.
achieve these objectives, we will most John White (Santa Monica, CA: The RAND
definitely fall behind in the fast-paced Corporation, Project Air Force, 1999), 181.
12
Eric A. McVadon, “Systems Integration
and constantly changing world of IT in China’s People’s Liberation Army,” in The
and IW, and we will likely be ineffective People’s Liberation Army in the Information
in identifying and combating enemy Age, ed. James C. Mulvenon and Richard H.
COGs, such as ISIL’s reliance on IT. It Yang (Santa Monica, CA: The RAND Cor-
is time to implement ideas that exist in poration, 1999), available at <www.rand.org/
content/dam/rand/pubs/conf_proceedings/
industry, and force change, before change CF145/- CF145.chap9.pdf>.
is unattainable—through a sustainable 13
Sun Tzu, The Art of War (Oxford: Ox-
and repeatable process and organization ford University Press, 1963), 77.
within the U.S. Government. JFQ
30 Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
current counter-UAS initiatives within technologies may be necessary to defend lightweight power sources and materials
the Department of Defense (DOD), against the growing sUAS threat. such as carbon nanotubes (and corre-
and present policy ideas to mitigate the It is hard to understate the current sponding manufacturing processes such
future threat from militarized commercial complexity and importance of positively as adaptive printing) will enable smaller
technology. identifying sUASs. As sUASs continue to and faster sUASs with longer loiter and
be used for a variety of commercial and pri- greater operating distances.
Characteristics and Capabilities vate purposes (including package delivery While the size and maneuverability
The rapid rate of commercial technol- and photography), the sUAS operator’s are defining characteristics of the sUAS,
ogy’s advance has directly contributed intent becomes difficult to discern. Unlike advances in automation algorithms are
to the rise of sUASs. Improvements in traditional aircraft, which require runways a necessary component of the swarming
communication equipment, cryptog- and thus provide longer lead times for tactic. Simultaneous command and con-
raphy, and lightweight materials have tracking, the average sUAS is able to trol of a large number of small objects
led to the current state of the multiple become airborne quickly and close on its necessitates autonomy technology that
rotary-wing UASs, often referred to target. Additionally, positive identification will undoubtedly be available in the
as “quadcopters,” and extremely small is a necessary component of engagement near future.12 In fact, a number of UASs
fixed-wing UASs. For this article, we authority, especially when considering currently deployed or in development op-
define aircraft that fall into the DOD deployment of sUAS countermeasures erate with varying degrees of autonomy.13
UAS Category 1 (weighing less than on U.S. soil, including interdiction by law It is quite feasible that attacking sUAS
20 pounds) as an sUAS6 because the enforcement and the possibility of civilian swarms will be able to automatically
interdiction of larger than Category 1 casualties. To effectively counter sUASs, sense and communicate weaknesses in
aircraft quickly approaches traditional it will be necessary to refine and practice the opposing defense, thus adapting their
defensive counterair operations.7 procedures and doctrine, while developing swarming tactics accordingly.
As technology advances, the sUAS the capability to effectively detect, track, The development of sUAS swarm
will increase in lethality. If Moore’s law and positively identify the threat. tactics and techniques in many ways
continues to hold, we will see an increase Future advances in material and com- mirrors the introduction of Multiple
in sUAS command and control distances, putational science will enable the sUAS Independently Targetable Reentry
electro-optical sensor resolution, GPS to perform autonomously, increasing Vehicle (MIRV) technology in the early
guidance accuracy, and battlefield auton- their efficacy as an offensive weapon. One 1970s. The MIRV concept included the
omy. With advances in material science, of the characteristics of the sUAS is that use of multiple nuclear warheads included
especially considering adaptive (“3D”) it uniquely lends itself to advanced aerial in a single ballistic missile, greatly increas-
printing techniques and carbon nano- tactics. As battlefield automation pro- ing the probability of successfully striking
tubes, sUASs will become smaller, faster, gresses, militaries are advancing toward the enemy with nuclear missiles.14 Similar
and lighter, and will loiter longer and the use of multitudes of sUASs in coordi- to the inability of the Soviets to counter
carry heavier payloads. nated formations known as “swarming.” a larger number of potential inbound
The basic physical structure of the This swarming tactic could make defense nuclear warheads, the sUAS overwhelms
sUAS (including the use of advanced difficult, especially for large objects or those on the defense with possible multi-
materials) hinders radar technologies, fixed facilities. The use of swarm tactics ple aggressors. Although similar in terms
the primary component of modern air increases the destructive power of the of using mass, sUAS differs from MIRV
defense. Radar works by bouncing energy sUAS and presents adversaries with a in terms of maneuverability and the abil-
off airborne objects and interpreting defensive dilemma.10 In this regard, mili- ity to land and wait for more opportune
the return reflections. Although the taries may have to reconsider the concept times to attack. Not all the sUASs in the
carbon fiber and plastic components (of of mass on the battlefield. offensive swarm need to be deadly, as the
which the majority of most sUASs are Currently, the practical use of sUAS parallels with MIRVs extend beyond a
comprised) naturally reduce radar return, swarms suffers from a confluence of simple numerical advantage. Offensive
size appears to contribute most to the technological shortcomings seemingly sUAS tactics could co-opt the idea of
shortcomings in sUAS radar identifica- resolved by relatively minor advances in decoys from MIRV technology. With the
tion and tracking.8 While modern radar technology. The lift capacity, speed, and advent of MIRV decoys, or warheads that
technology has the capability to engage agility of the sUAS is directly dependent had the same physical characteristics as
smaller objects. Additionally, concerning on the amount of weight carried by the their nuclear counterparts, the economic
radar, sUASs are often indistinguishable vehicle. Reductions in the weight of efficiency of MIRV technology enabled
from other airborne objects (specifically communications equipment, sensors, asymmetric advantages.15 Similarly, the
birds).9 While additional methods such as onboard processors, and kinetic payload use of decoys may reduce the overall cost
acoustic-phased arrays and electro-optical (for example, “energetics”)11 will increase of simultaneously attacking with large
cameras show promise, a combination the range and maneuverability of these numbers of sUASs, presenting adversaries
of these tracking and identification systems. Likewise, advances in small, with multiple deadly dilemmas.
32 Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
Cadet-in-charge for Academy falconry team pulls lure as Ace, a black gyr-saker falcon, makes pass at it, September 10, 2010 (U.S. Air Force/Bennie J. Davis III)
inadequate defense procurement process. using the results of commercial R&D discovery of additional uses for their
The existing DOD procurement para- in the form of COTS, under the CARD technology. The dual-use nature of
digm relies on establishing requirements concept, DOD would seek to conduct technology is rarely immediately appar-
that are fulfilled, in part, by commer- research on technology at different stages ent, especially if the government is not
cial-off-the-shelf (COTS) systems and of development. This pre-market R&D exposed to or knowledgeable of that
components. Regarding DOD R&D, this has a number of advantages for both technology.32 By working closely with
requirements-based procurement happens DOD and the firm. large firms, DOD is able to discover new
either directly (from the national labs, First, DOD gains knowledge on national defense applications for com-
for example) or indirectly through using market-shaping technology that will mercial technology, helping both the firm
COTS. As emerging COTS capabilities inevitably find its way into the hands of and the government.
surpass the capacity of the government our adversaries. With commercial tech- Third, DOD can revive the chances
R&D establishment, the United States nologies’ rising level of capabilities, state for possibly useful technologies that
must develop policies to maintain its tech- and nonstate actors increasingly threaten have fallen “below the cut line”—or, in
nical advantage over its adversaries. U.S. ability to maintain technological other words, are deemed by the firm as
In terms of contribution to national overmatch. By conducting CARD, DOD not commercially viable. By signaling
defense, the United States currently fails gains vital knowledge on the possible its interest in these technologies, DOD
to take full advantage of its indigenous uses of new technologies, and possible provides an opportunity for a “second
private industry. We recommend that counters to these technologies, before life” to the firm’s technology, resulting in
DOD should work closer with private our adversaries. Much like the develop- possible commercialization.
industry prior to the release of com- ment of the Defense Advanced Research Lastly, the CARD construct reduces
mercial technology, a policy that we call Projects Agency after the launch of government R&D risk. The government
Commercial Adaptive R&D, or CARD.31 Sputnik in 1957, the use of the CARD no longer directly vets new technology
The CARD concept promotes the use strategy will help prevent the United as the industry bears the brunt of matu-
of DOD partnerships and relationships States from being surprised by significant ration of the innovation. Utilizing these
with commercial firms to enhance DOD commercial technology. market-shaping firms in partnership roles
visibility of impending commercial tech- Second, for both the firms and DOD, with government R&D is dispropor-
nological release. In contrast with simply there exists a possible benefit from the tionately low given the amount of R&D
that is conducted (for example, the Intel nentially more deadly. The asymmetric both offensive and defensive sUAS tech-
Corporation R&D budget for 2013 was nature of the sUAS, especially when nologies. Additionally, this is inherently
roughly $10.6 billion).33 A majority of considering swarm tactics, makes the a joint fight, with the technology and
the risk is placed on the commercial firm, technology difficult to defend against. techniques developed by each Service
whereas DOD begins to conduct R&D An sUAS is relatively inexpensive and synergistically contributing to the de-
on the product in mid-to-late stream. ubiquitous (it is estimated that there velopment of anti-sUAS doctrine. Now
By adopting new policies toward gov- are over one million sUASs in the may be the time to establish a joint orga-
ernment defense procurement and the United States alone).34 Conversely, nization specifically to address the sUAS
degree to which they conduct research most defense systems are—at least at threat, similar to the Joint Improvised-
with private industry before the commer- this stage of development—restrictively Threat Defense Organization (formerly
cial release of COTS products, DOD will expensive. It may be fiscally restrictive known as the Joint Improvised Explosive
develop early defenses against threatening and grossly inefficient to attempt to Device Defeat Organization), originally
technologies, help shape the develop- counter this commercial threat with established to counter improvised explo-
ment of defense-related technologies, large military programs. Additionally, sive devices.
and prevent technological surprise. The as technologically state-of-the-art as Additionally, since the early 2000s,
greater integration of DOD into private current commercial sUASs appear, small it has been widely accepted that DOD
R&D, or CARD, will help better ensure advances in supporting technologies needs to integrate COTS requirements
national defense in a period of increasing will yield huge leaps in sUAS capa- solutions. In this “linear model” of
commercial threats. bilities, further compounding defen- innovation, private industry conducts
sive problems such as detection and R&D to develop the COTS product,
Conclusion identification. and the government applies COTS to
Although current state-of-the-art sUAS To protect against this threat, the existing requirements. Most important,
capabilities are sufficiently threatening, United States must develop doctrines DOD needs to conduct R&D on the
we are on the cusp of technological both for sUAS attack and defense. It is pre-COTS product to discover new
advances that will make the sUAS expo- necessary to improve our capabilities in requirements based on new capabilities.
34 Forum / Countering the Small Unmanned Aircraft System JFQ 85, 2nd Quarter 2017
This form of R&D should supersede the System Airspace Integration Plan (Washington, 20
James Vincent, “Tokyo Police Unveil
DC: Department of Defense, March 2011), Net-wielding Interceptor Drone,” TheVerge.
old model of simply fulfilling government available at <www.acq.osd.mil/sts/docs/DoD_ com, December 11, 2015, available at <www.
requirements. DOD can accomplish this UAS_Airspace_Integ_Plan_v2_(signed).pdf>. theverge.com/2015/12/11/9891128/to-
through close interaction with private 8
William Camp, Joseph Mayhan, and Rob- kyo-interceptor-net-drone>.
industry to discover uses for emerging ert O’Donnell, “Wideband Radar for Ballistic 21
Andrew Tarantola, “The SkyWall 100 Is
COTS products before they are simul- Missile Defense and Range-Doppler Imaging of a Net-launching Anti-Drone Bazooka,” En-
Satellites,” Lincoln Laboratory Journal 12, no. gadget.com, March 3, 2016, available at <www.
taneously released to the public and our
2 (2000), 267–280. engadget.com/2016/03/03/the-skywall-100-
potential adversaries. 9
In the same vein as radar, infrared systems is-a-net-launching-anti-drone-bazooka/>.
In the history of modern warfare, have a similarly difficult time in detecting small 22
See Peter Holley, “Watch This Trained
there have been few purely commercial heat signatures of an sUAS. Eagle Destroy a Drone in a Dutch Police
technologies that so readily lend them-
10
John Arquilla and David Ronfeldt, Video,” Washington Post, February 2, 2016,
Swarming and the Future of Conflict (San- available at <www.washingtonpost.com/news/
selves to immediate weaponization as
ta Monica, CA: RAND, 2000), available at worldviews/wp/2016/02/01/trained-eagle-
the sUAS. The threat lies not only in the <www.rand.org/pubs/documented_briefings/ destroys-drone-in-dutch-police-video/>.
technology itself, but also in the degree DB311.html>. 23
Don Rhymer et al., “Falconry: Alternate
to which that technology is sufficiently 11
Energetics refers to the reduction of Lure Training (FALT),” Report nos. 56250
capable and available to all potential ne- explosive size while increasing explosive power. and 63300.
See John Gartner, “Military Reloads with 24
Don Rhymer, telephone interview by
farious actors. In this sense, the potential
Nanotech,” MIT Technology Review, January authors, November 11, 2015.
threat from sUASs should catalyze new 21, 2005, available at <www.technologyreview. 25
Ibid.
thinking in DOD about the uses of com- com/s/403624/military-reloads-with-nano- 26
William P. Head, Night Hunters: The AC-
mercial technology. Moving forward, it is tech>. 130s and Their Role in U.S. Airpower (College
this commercial availability of advanced
12
Daniel Gonzales and Sarah Harting, Station: Texas A&M University Press, 2014).
Designing Unmanned Systems with Greater 27
Thomas Masiello and Sydney Freedberg,
technology that is the true threat, and it
Autonomy (Santa Monica, CA: RAND, 2014), Jr., “Air Force Moves Aggressively on Lasers,”
is this new technological frontier that may available at <www.rand.org/pubs/research_re- BreakingDefense.com, August 7, 2015, available
pose the greatest future challenge to our ports/RR626.html>. at <http://breakingdefense.com/2015/08/
national security. JFQ 13
One example of autonomous UAS air-force-moves-aggressively-on-lasers/>.
operations is the use of the Israeli Harpy 2 for 28
For both microwaves and lasers, there ex-
suppression of enemy air defense operations. ist the possibility of countermeasures. In terms
See T.X. Hammes, “Cheap Technology Will of microwaves, electronic hardening of the
Notes Challenge U.S. Tactical Dominance,” Joint sUAS could provide protection. Against laser
Force Quarterly 81 (2nd Quarter 2016). attack, countermeasures such as smoke might
1
Wallace Ryan and Loffi Jon, “Examining 14
Lynn Etheridge Davis and Warner R. provide a level of survivability.
Unmanned Aerial System Threats and Defens- Schilling, “All You Ever Wanted to Know 29
Jason D. Ellis, Directed-Energy Weapons:
es: A Conceptual Analysis,” International Jour- About MIRV and ICBM Calculations but Were Promise and Prospects (Washington, DC: Center
nal of Aviation, Aeronautics, and Aerospace, no. Not Cleared to Ask,” The Journal of Conflict for a New American Security, April 2015),
4 (January 10, 2015). Resolution 17, no. 2 (1973), 207–242. available at <www.cnas.org/sites/default/
2
Faine Greenwood, “Man Who Crashed 15
John Wilson Lewis and Hua Di, “China’s files/publications-pdf/CNAS_Directed_Ener-
Drone on White House Lawn Won’t Be Ballistic Missile Programs: Technologies, Strat- gy_Weapons_April-2015.pdf>.
Charged,” Slate.com, March 18, 2015, egies, Goals,” International Security 17, no. 2 30
Additionally, we especially see this com-
available at <www.slate.com/blogs/fu- (1992), 5–40. merciality phenomenon in the cyber domain.
ture_tense/2015/03/18/white_house_lawn_ 16
Richard Whittle, “Military Exercise Black 31
The authors want to thank Dr. Terry
drone_the_man_who_crashed_it_there_won_t_ Dart to Tackle Nightmare Drone Scenario,” Pierce for providing the opportunity to observe
be_charged.html>. NewYorkPost.com, July 25, 2015, available the Department of Homeland Security’s Center
3
Michael Martinez, Paul Vercammen, and at <http://nypost.com/2015/07/25/ of Innovation, the operations on which the
Ben Brumfield, “Above Spectacular Wildfire military-operation-black-dart-to-tackle-night- Commercial Adaptive R&D (CARD) concept
on Freeway Rises New Scourge: Drones,” mare-drone-scenario/>. is based. Dr. Pierce also provided valuable input
CNN.com, July 19, 2015, available at <www. 17
While possible sUAS countermeasures into developing the CARD theory itself.
cnn.com/2015/07/18/us/california-free- exist, this article does not discuss technologies 32
John A. Alic, Beyond Spinoff: Military
way-fire>. and techniques associated with cyber effects, and Commercial Technologies in a Changing
4
The latest Federal Aviation Administration such as GPS spoofing and command link World (Cambridge: Harvard Business Press,
(FAA) reports are available at <www.faa.gov/ capture. 1992).
uas/law_enforcement/uas_sighting_reports/>. 18
The 20-mm Phalanx (Close-In Weapon 33
Michael Casey and Robert Hackett,
5
While the militarization of the Small Un- System) has a left-to-right limit of 300 degrees. “The Top 10 Biggest R&D Spenders World-
manned Aerial System (sUAS) would ostensibly For more information, see “USA 20 Mm wide,” Fortune, November 17, 2014, available
increase its lethality, this article focuses on the Phalanx Close-in Weapon System (CIWS),” at <http://fortune.com/2014/11/17/
possible capabilities of commercial sUASs (in- NavWeaps.com, June 16, 2010, available at top-10-research-development/>.
cluding the addition of an explosive payload). <www.navweaps.com/Weapons/WNUS_Pha- 34
Andrew Amato, “Drone Sales Numbers:
6
Practically, the discussion of sUASs should lanx.htm>. Nobody Knows, So We Venture a Guess,” Dro-
not be limited to this weight. The FAA catego- 19
Cheryl Pellerin, “Work Details the Future nelife.com, April 16, 2015, available at <http://
rizes aircraft under 55 pounds as an sUAS. of War at Army Defense College,” Defense dronelife.com/2015/04/16/drone-sales-num-
7
UAS Task Force Airspace Integration News, April 8, 2015, available at <www.defense. bers-nobody-knows-so-we-venture-a-guess/>.
Integrated Product Team, Unmanned Aircraft gov/News-Article-View/Article/604420>.
s warfare art or science? The debate, Many military scholars side with the able around instantaneous data flows
Addendum: Forensic
Vulnerability Analysis
Case Study
Research Research Research 3 The following is a real-world case study
in Uranium in Processing in Ballistic
Enrichment Plutonium Materials
DOD analyst of interesting dialogue in expert out to 4 degrees of separation. academic information, business informa-
financial blog sites. The banking leader In this case, the analyst was directed to tion, expert red team, and intelligence
stated that a particular financial blog a finance expert familiar with the five traffic. The result was actionable intelli-
produced a disturbing thread. A blogger European locations. He took part in a gence with increased fidelity and probable
posted a question asking how an entity red team exercise hosted by the analyst. intent. The complete forensic vulnerability
could collapse a nation-state’s economy. He was asked to put himself in the place analysis process took 48 hours from initial
Other bloggers answered to forgo at- of the terrorists and stage an effective message to research completion.
tacking structures and focus on attacking attack against economic leaders. When Actions Taken. The data, foren-
economic leaders. The bloggers went on asked, “In what European city would sic nodal analysis, and corroborating
to say that al Qaeda planned incorrectly you stage the attack and how?” the leader intelligence were given to the United
when they attacked the World Trade responded that because of close-hold in- Kingdom liaison at DOD. In post-event
Center; what they should have done formation that he was privy to, he would talks in London between the United
was attack the stock exchange leader- attack a “specified location” in London Kingdom’s cabinet secretariat, the minis-
ship and traders. (Note: This is a perfect with either a chemical/biological weapon try of defense, security services, the Joint
example of the value of forensic vulner- or a hijacked airliner. A successful attack Terrorism Analysis Center, the DOD
ability analysis [target finance leaders] in that area would cripple the United analyst, and the banking leader, it was
versus traditional nodal analysis [target Kingdom for years. learned that the al Qaeda unit members
the building]). This blog thread dem- Corroboration from the Intelligence were arrested before they could execute
onstrated al Qaeda’s crude attempt to Community. Intelligence databases were their plan. Of note, the al Qaeda unit was
accomplish forensic vulnerability analysis. queried for the subject of al Qaeda in known to the British authorities and they
Forensic Vulnerability Analysis. The London—the “specified location”—and were actively monitoring the unit’s activi-
DOD analyst started an effort to deter- airliners. Message traffic identified an al ties. The forensic vulnerability analysis
mine if the academic thread was linked Qaeda cell, but not much else was known. added fidelity to the United Kingdom’s
to the financial thread. An additional However, the DOD analyst was able, via case for action. Information learned via
benefit of a trusted relationship network non-obvious relationships and trusted interrogation confirmed the findings of
is that the network can find a singular subject matter expertise, to link the the forensic vulnerability analysis. JFQ
The growth of any discipline depends on the ability to communicate and develop ideas,
and this in turn relies on a language that is sufficiently detailed and flexible.
—Simon Singh, Fermat’s Enigma
To promote interoperability at the information level within the area of joint military
symbology, it is necessary to define a standard set of rules for symbol construction and
generation to be implemented in C2 [command and control] systems.
—Joint Military Symbology
42 Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
sergeant looks at an arrow Cybersecurity Assessment Program, Victory in a cyber-contested envi-
44 Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
network identified
by green boundary
defenders do not realize that they ought to Figure 3. Notional Cyber Unit Icons
sever the connections between the OA and xxxx xxxx xxxx II
the rest of the network—a prime mission
c. e. h.
for special forces. Red shading represents a. 1st Cyber
Army
CYBERCOM CSP
Bypass Maneuver around an obstacle, position, or enemy Credential-based access (use captured credentials
force to maintain the momentum of the operation for login).
while deliberately avoiding combat with an enemy
force.
Clear Remove all enemy forces and eliminate organized Comprehensive scans and forensics, removing all
resistance within an assigned area. malware and adversary points of presence and
external connections.
Control Maintain physical influence over a specified area to Standard cybersecurity mission to protect a
n/a prevent its use by an enemy or to create conditions domain, typically assigned to a cyber security
necessary for successful friendly operations. practitioner (CSP).
Counter- Provide early warning to the protected force. Detection activities on a boundary or domain.
reconnaissance
(Screen)
Counter- Protect the main body by fighting to gain time Domain-wide detection and hunt-type activities
reconnaissance while also observing and reporting information and by a cyber protection Team or local defensive unit,
(Guard) preventing enemy ground observation of and direct augmenting the capabilities of a CSP.
fire against the main body. Units conducting a guard
mission cannot operate independently because they
rely upon fires and combat support assets of the
main body.
Counter- Protect the main body by fighting to gain time Domain-wide detection, hunt, and reposturing of
reconnaissance while also observing and reporting information and defensive boundary controls by a CSP.
(Cover) preventing enemy ground observation of and direct
fire against the main body.
Exfiltrate Remove Soldiers or units from areas under enemy Movement of data from its original location to a
(No symbol exists. control by stealth, deception, surprise, or clandestine location under enemy control, typically by means of
Symbol shows the flow means. stealth, deception, or clandestine means.
of exfiltrated data, a
substantial deviation
from the existing
definition of this task.)
Occupy Move a friendly force into an area so that it can Deployment of a cyber protection team to a domain
control that area. Both the force’s movement to in advance of suspected adversary activity.
and occupation of the area occur without enemy
opposition.
Retain Ensure that a terrain feature controlled by a friendly Defense of a network device or domain to prevent
force remains free of enemy occupation or use. any adversary access.
Secure Prevent a unit, facility, or geographical location from Defense of a network device or domain to prevent
being damaged or destroyed as a result of enemy an adversary from making any changes to data or
action. functionality.
Seize Take possession of a designated area by using Gain control of a device, network, data, or
overwhelming force. credentials. In cyberspace, two opposing forces
may have simultaneous control of any or all of these
assets.
Support by fire A maneuver force moves to a position where it can Overt actions where an origination (or interim relay)
engage the enemy by direct fire in support of another point can be determined, such as distributed denial-
maneuvering force. of-service attacks, broad intrusive scans, and where
these actions are designed to set the conditions for
success for the primary attack actions.
46 Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
Table. Adaptation of Tactical Task Graphics to Cyberspace
Tactical Task Operational Graphic Doctrinal Description* Potential Use in Describing Cyberspace Operations
Effects on Enemy Force
Block Deny the enemy access to an area or prevent the Use or modification of blacklists, whitelists, access
enemy’s advance in a direction or along an avenue of control lists, routing policies, credentials (username-
approach. password pairs, or machine-issued), or filters on
Also an obstacle effect that integrates fire planning firewalls, domain name servers, domain controllers,
and obstacle efforts to stop an attacker along a Web servers, email servers, or others to prohibit or
specific avenue of approach or prevent the attacking terminate access based on specific criteria.
force from passing through an engagement area.
Canalize Restrict enemy movement to a narrow zone by Use of routing policies, honeypots/honeyports/
exploiting terrain coupled with the use of obstacles, honeynets, or other defensive techniques to direct
fires, or friendly maneuver. potential adversary traffic to desired network
locations.
Contain Stop, hold, or surround enemy forces or to cause Not strictly possible in cyberspace, since forces
them to center their activity on a given front and exist as a function of effort being expended.
prevent them from withdrawing any part of their However, could be used to indicate quarantine of
forces for use elsewhere. malware or emails.
Destroy Physically render an enemy force combat-ineffective Deleting all files from a server, flashing basic input-
until it is reconstituted. Alternatively, to destroy output system or firmware, or causing physical
a combat system is to damage it so badly that it damage to industrial control systems.
cannot perform any function or be restored to a
usable condition without being entirely rebuilt.
Disrupt Integrates direct and indirect fires, terrain, and Interrupting connections periodically, enforcing
obstacles to upset an enemy’s formation or time limits on sessions, or actions that require an
tempo, interrupt the enemy’s timetable, or cause enemy to repeat previous steps, upset an enemy’s
enemy forces to commit prematurely or attack in a tempo, interrupt the enemy’s timetable, or cause the
piecemeal fashion. enemy’s efforts to proceed in a piecemeal fashion.
Fix Prevent the enemy force from moving any part Not strictly possible in cyberspace, since forces
of that force from a specific location for a specific exist as a function of effort being expended, but
period. used to indicate actions that require an enemy
to focus effort to restore function (for example,
reboot a domain controller or data server following
an induced system crash); to expend much greater
effort than planned to obtain an objective (for
example, consuming attacker resources using
a realistic honeynet); or to refrain from using
capabilities for fear of detection (for example, refrain
from activating implants because of increased
random scans for active malware).
Interdict Prevent, disrupt, or delay the enemy’s use of an area Denial-of-network (data transport) services, or
or route. limiting access to services.
Isolate Requires a unit to seal off—both physically and Removal of a device infected with malware from the
psychologically—an enemy from sources of support, network, moving a phishing email from the server to
deny the enemy freedom of movement, and prevent a forensics sandbox.
the isolated enemy force from having contact with
other enemy forces.
Neutralize Render enemy personnel or materiel incapable of Any action taken against another cyberspace
interfering with a particular operation. unit that prevents it from using its offensive or
defensive capabilities (for example, interrupt
the sensor feeds from a target domain to the
responsible cyber defense unit).
* As described and depicted in various DOD sources, including MIL-STD-2525D, Joint Military Symbology, June 10, 2014; Field Manual (FM) 1-02/Marine
Corps Reference Publication 5-12A, Operational Terms and Graphics, February 2, 2010 (incorporating Change 1); FM 3-90-1, Offense and Defense, vol. 1,
March 2013; FM 3-90-2, Reconnaissance, Security and Tactical Enabling Tasks, vol. 2, March 2013.
core technical skills allows cyber person- engaging targets, occupying terrain) and equipment. Although cyber units
nel and units to perform diverse functions that are often required to execute typical may be equipped with specific “plat-
(for example, reconnaissance, identifica- missions, whereas units in the physical forms” and trained for unique missions
tion friend or foe, command and control, domain tend to have a more specialized at the lowest tactical levels, in general the
creating or modifying terrain features, set of functions based on their training diversity of the functions that cyber forces
48 Commentary / Operational Graphics for Cyberspace JFQ 85, 2nd Quarter 2017
Figure 6. Subsequent Adversary Actions on Friendly Terrain: Seizing of Credentials,
Reconnaissance, and Lateral Movement Within and Between Networks
DODIN CCMD HQ Network xxxx xxxx
CCMD HQ Network xxxx
Adversary Network CCMD JFHQ-
xxxx CSP DODIN 9. Adversary
CCMD
xxxx establishes
CSP presence,
75 CPT CCMD CSP begins recon
1st Cyber
Army CYBERCOM
8 email DMZ
75 CPT
server CCMD CSP
web application
server server
17 Atk 4 BDE
DMZ
xxxx email
Service Network server
II Service
CSP application
17 Atk 4 BDE web
server server
87 NWS 137 WG
xxxx
Service Network
II Service
CSP 8. Adversary uses captured credentials
to access CCMD network and log in to
application server (detailed actions
omitted for clarity)
87 NWS 137 WG
DMZ fil
email Ex
server application
web 17 Atk 4 BDE server
server
an understanding—an enormous red warfighters who are unfamiliar with the could potentially be implemented in
flag signaling risk to his mission—that technical details of cyberspace. Military cyberspace operational doctrine. For
has been missing from the cyber portion tasks, missions, and operations share instance, the doctrinal concepts of
of joint warfighting. commonalities regardless of the domain culmination and attrition that are criti-
Figures 4, 5, and 6 depict the in which they take place, and leveraging cal to operational campaign design and
progression of a notional battle in cy- warfighter familiarity with the common execution in the physical domains may
berspace, from the initial assignment language that has evolved to describe finally be examined fully for application
of defensive forces to their areas of them will enhance rapid understanding in the cyber domain. Ultimately, the
responsibility, followed by the attacker’s and decisionmaking. joint commander will have at his disposal
preparatory reconnaissance operations, The concepts presented here only a coherent body of operational doctrine
and culminating in the penetration of scratch the surface of an extremely large and the accompanying graphics that will
defenses and the attacker occupying de- problem. To date, there is little official enable him to understand, plan, and
fended territory and postured to conduct recognition that the cyber community fight the cyber battle. JFQ
follow-on operations. The astute reader should even conform to joint symbology
will notice the similarities to historical standards. Cyber symbols merit only 3
depictions of Civil War battlefields, which of the 885 pages of MIL-STD-2525D. The authors would like to extend their
appreciation to Robert Soule and Dr. Shawn
motivated the development of these If DOD intends to treat cyberspace as a Whetstone from the Institute for Defense
graphics to clearly depict complex, se- warfighting domain, then standards must Analyses for their continued support and
quential actions over extended durations. reflect that guidance. However, that is encouragement in developing these ideas, and to
Dr. J. Michael Gilmore, Dr. Kenneth M. Crosswait,
just the beginning. and Dan Burgess from Director, Operational
Conclusion Using operational graphics to de- Test and Evaluation, for recognizing the utility
Cyberspace operational graphics will scribe cyberspace actions should lead of cyberspace operational graphics, for their
insightful feedback, and for their continuing
allow cyber planners and operators to to the identification of parallels and challenge to us to improve the concepts.
convey mission-relevant information to analogies in the physical domains that
he U.S. Government’s first duty even compel policymakers to alter A quintessential image from the
50 Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
Another low point for the United would still provide the bulk of forces, lift, during an evacuation.6 It establishes three
States were the images of blindfolded and planning within their areas of respon- policy objectives:
Embassy staff being held hostage by sibility (AORs).
•• protect U.S. citizens and designated
Iranian revolutionaries and of burned
other persons, to include their evacu-
U.S. rescue aircraft in the desert. The Policy, Doctrine, and Practice ation to relatively safe areas when
Iran hostage drama punctuated a crisis Diplomatic evacuation events occur
necessary and feasible
of confidence in political and military quite often. From 1988 through
•• minimize the number of U.S. nation-
leadership during the 1970s. The failed October 2007, the Department of
als subject to risk of death and/or
rescue attempt in April 1980 reinforced State conducted 271 authorized and
seizure as hostages
doubts about U.S. military capability and ordered departures from overseas
•• reduce to a minimum the number of
led to a complete reorganization of U.S. posts,3 an average of nearly one every
designated noncombatants in prob-
Special Operations. This contributed to 3 weeks. Embassy or State Department
able or actual combat areas so that
perceptions of strategic drift and mal- personnel carried out the vast majority
combat effectiveness of U.S. and
aise leading into the 1980 Presidential of these without military assistance.
allied forces is not impaired.
campaign. However, a mass evacuation or a hostile
President Ronald Reagan’s funda- security environment can overwhelm DOD Directive 3025.14,
mental theme was renewing confidence Embassy and State Department capa- “Evacuation of U.S. Citizens and
in America. He ordered the invasion bilities, leading them to call for military Designated Aliens from Threatened Areas
of Grenada, vowing not to “wait for assistance. Abroad,” provides further guidance on
the Iran crisis to repeat itself, only this Withdrawing American citizens and supporting State overseas evacuations. It
time, in our own neighborhood—the diplomats from a foreign location has reiterates that the primary responsibility
Caribbean.”1 Operation Urgent Fury weighty strategic and political repercus- for NEOs is with State and the diplomatic
evacuated 800 American medical stu- sions. An ordered evacuation signals an Chief of Mission. But DOD and all com-
dents and toppled a communist-aligned official U.S. Government determina- batant commands must plan and prepare
regime. Grenada advanced Reagan’s stra- tion that the host government can no contingency plans to support NEOs.
tegic objective to reverse the “Vietnam longer guarantee the safety of foreign Military-assisted NEOs are excep-
Syndrome”2 and rebuild the credibility nationals and that staying in place is no tional in that the U.S. Ambassador, not
of U.S. power. But Grenada also uncov- longer worth the risk. It could further the military commander, has responsibil-
ered serious gaps in the military’s ability undermine the host region’s economy, ity for the overall operation. Embassy or
to operate jointly, leading directly to stability, and legitimacy and may forfeit State Department personnel coordinate
the Goldwater-Nichols Department of the diplomatic, informational, military, overflight and landing clearances and des-
Defense Reorganization Act of 1986. and economic assets an American pres- ignate marshalling areas and safe havens.
Military-assisted NEOs occur in- ence maintained. But the military commander has respon-
frequently, but they carry enormous The Department of State is always the sibility for execution once military forces
diplomatic, military, and national strategic lead Federal agency for “protection or and equipment commence operations.7 A
consequences. Images of noncombatants evacuation of United States citizens and NEO is always a unity of effort situation
in danger are powerful, and the audience nationals abroad,”4 including the “evacu- with overlapping responsibilities requir-
is unforgiving. Doing NEOs successfully ation and repatriation of United States ing intense coordination.
is even more imperative in a fully global- citizens in threatened areas overseas.”5 Military-assisted NEOs generally also
ized, cellphone-enabled, viral-video world The senior U.S. diplomat in a country is a involve multiple Services and sometimes
where cameras are everywhere and im- Chief of Mission or Ambassador and is the coalition forces. The NEO joint force
ages spread instantaneously. personal representative of the President of typically will insert a ground security
To maximize the success of such the United States with extraordinary deci- element to control evacuation sites and
important missions, the Department of sion authority over all U.S. Government marshalling areas; move evacuees by land,
Defense (DOD) should create a new operations in their assigned country. water, or air to a temporary safe haven;
Joint Planning Support Element specifi- The Chief of Mission controls all U.S. provide sustainment, administrative pro-
cally for NEOs. Geographic combatant Government personnel in that country cessing, communications, and safety to
commanders (GCCs) could use this en- except those assigned to a GCC. Military the evacuees at the temporary safe haven
tity to augment their staffs during a NEO personnel at the Defense Attaché Office or follow-on destinations; and then either
event. This Joint NEO Support Element (DAO), Security Assistance Office, and repatriate American citizens to U.S. ter-
would coordinate the strategic and op- Marine Corps Security Guard detachment ritory or return them to the affected area
erational aspects of NEOs and provide are under the authority of the Chief of once the crisis is over. Embassy or State
subject matter experts. GCCs should still Mission, not the GCC. officials maintain overall responsibility
designate a NEO joint force commander A 1988 memorandum of agreement throughout all phases of NEOs, but the
to retain overall military control, and they describes how DOD will support State military must be prepared to step in at
any point to maintain operations start to General purpose forces from any of the United Kingdom,11 Australia,12 France,13
finish. military Services may be tasked to execute and Canada14 each has its own established
Joint Publication 3-68, NEOs, typically on short notice with no NEO doctrine. The United States has
Noncombatant Evacuation Operations, prior preparation. mutual agreements with a number of
is the current joint doctrine for NEO An MEU also lacks the staff depth countries to evacuate each other’s desig-
operations. The main thrust of the publi- to handle operational- and strategic- nated persons in times of crisis. The Joint
cation is the tactical aspects of NEOs, but level coordination during a NEO event. NEO Support Element should build and
it also includes discussion of interagency These planning and coordination duties promote interoperability with the NEO
coordination, strategic communication, therefore default to the joint force com- doctrines, terminologies, and rules of
military deception, defense support to mander, GCC, or Service component engagement of potential mutual support
public diplomacy, information-sharing, staff. This is a problem because NEOs partners. Combatant commands are
geospatial intelligence, and use of psycho- require rapid response and focus, often unlikely to maintain the same familiarity
logical operations. while other operations are under way with all potential NEO doctrines, espe-
The Marine Expeditionary Unit elsewhere in the AOR. Assembling a cially from countries outside their AOR,
(MEU) is routinely trained and certi- new joint force headquarters (JFHQ) or leading to potential friction if multiple
fied for conducting NEOs in uncertain diverting GCC or Service component nations attempt evacuations concurrently.
or hostile environments.8 An MEU, if staff during a crisis may hinder operations
available, is the optimum tactical force. elsewhere or sidetrack the NEO. Case Studies
However, military-assisted NEOs often By its very nature, a NEO requires bi- Vietnam: Operation Frequent Wind,
occur at times and places where an MEU lateral coordination with the host nation. April 1975. The United States main-
is not nearby or available. Half of all mili- It frequently also becomes a multilateral, tained a large diplomatic presence fol-
tary-assisted NEOs over a recent 20-year allied, or coalition operation. The North lowing troop withdrawals from Vietnam
period were executed without an MEU.9 Atlantic Treaty Organization (NATO),10 in 1973. The American Embassy and
52 Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
DAO in Saigon were the largest of anarchy caused by civil war. Ambassador problematic. The Embassy had no secure
any foreign post. Tens of thousands James Bishop and a minimal Embassy link to the task force other than by dip-
of American citizens, U.S. Govern- staff remained into January hoping for an lomatic cable to Washington and then
ment employees, contractors, business Italian-brokered ceasefire.18 As the situa- relayed down through USCENTCOM.
people, and family members remained tion worsened, however, the Ambassador All radio traffic between the task force
in Vietnam. requested immediate evacuation. and Embassy went “in the clear.”
The situation across Southeast Asia Confusion and ongoing miscom- The flight crews had maps of
deteriorated rapidly throughout early munications between DOD, Ambassador Mogadishu from 1969 that did not show
1975. The U.S. Air Force and Marines Bishop, U.S. Central Command the location of the Embassy compound,
evacuated the U.S. Embassy in Phnom (USCENTCOM), and the NEO task which relocated during the 1980s. They
Penh, Cambodia, on April 12, 1975, in force caused problems throughout the had to circle the city for 20 minutes
Operation Eagle Pull 5 days before that operation. U.S. Naval Forces Central searching for the objective marked only
city fell to the Khmer Rouge. Meanwhile, Command (NAVCENT) was tasked to by a retired Marine waving a bedsheet.21
North Vietnamese army units invaded execute the NEO but was not monitor- The lead helicopters reached the
the South and by mid-April were closing ing events in Somalia. They got their Embassy just as gangs of looters were
on Saigon. first warning order on January 1 and about to breach the walls. It took perhaps
During April 1975, the United States received the execute order the next day. as long as 10 minutes to clear the landing
evacuated over 130,000 people by air and NAVCENT was unenthusiastic about zone and deploy into the compound.
sea in the largest NEO in history.15 U.S. committing significant forces, having Evacuation took place under sporadic
Ambassador Graham Martin, hoping to watched an earlier operation in Liberia gunfire as follow-on helicopters arrived.
negotiate a truce and reluctant to admit morph from a NEO into a protracted The evacuation control cell team was
failure or to cause panic, delayed final military reinforcement of the Embassy. cut from the mission, and the ground
Embassy evacuation as long as possible. NAVCENT assigned just two am- security team failed to fully search or
By the time he did request evacuation, phibious warfare ships to the operation. distribute the evacuees properly, resulting
16 North Vietnamese army divisions sur- They departed Oman, some 1,500 nauti- in one foreign diplomat almost getting
rounded Saigon, the airport was closed cal miles from Mogadishu, on January onboard with a loaded weapon. The mis-
by ground fire, and mobs of panicked 2. At one point the amphibious group sion safely evacuated some 281 people
civilians and communist “home guards” commander even ordered these ships to from 30 nations, including 8 ambassadors
filled the streets, making movement al- slow down to conserve fuel. Marines and and 39 Soviet embassy staff.
most impossible.16 Sailors onboard were instructed not to Lebanon: Israeli Invasion, July
Helicopter extraction was the only unwrap ammunition so it could be re- 2006. On July 12, 2006, Israel invaded
remaining option. During April 29–30, turned to contingency stocks later.19 Lebanon in response to Hizballah kid-
1975, Marine helicopters lifted 1,373 The Embassy’s emergency action plan napping two of its soldiers. The Israeli
American citizens and 5,595 Vietnamese was to evacuate from Mogadishu airport. military bombed roads, bridges, and
and third-country nationals from the But by January 2, roving bands of gun- airports, blockaded seaports, cut power,
U.S. Embassy compound in central men and runway damage closed the and jammed cellular service, all of which
Saigon and the DAO compound at Tan airport. Fixed-wing evacuation attempts created a mood of panic. This unantici-
Son Nhut airport. U.S. casualties in- by the Italians, French, and Soviets all pated event triggered one of the largest
cluded two Marines killed by indirect fire failed. By then, ground movement to the multinational NEO events in recent
and two aircrew lost at sea. As the official harbor was dangerous, and security near history. The scale, scope, and abruptness
after action report noted: “Trying more the Embassy was rapidly deteriorating. of the crisis overwhelmed the Embassy’s
attractive options may result in execution Diplomats from several nearby foreign ability to manage the evacuation.
decision being delayed until a worse case embassies began sheltering at the U.S. The State Department requested
situation has developed.”17 compound. DOD assistance on July 14. Evacuations
Mogadishu, Somalia: Operation Early on December 5, while still began with a limited helicopter extrac-
Eastern Exit, January 5–6, 1991. 500 nautical miles away, the task force tion on July 16 and continued through
Operation Eastern Exit took place during launched an initial flight of two CH-53 August 2.22 The United States evacuated
Operation Desert Shield and just 2 weeks helicopters carrying a ground security 15,000 Americans from Lebanon. Other
before the launch of Desert Storm. This team. The ground team was hastily nations also evacuated thousands of
created some complications. Military reorganized and cut to 60 men to save their citizens: Canada (15,000), France
forces in theater were concentrated in the space and weight.20 The inbound flight (14,000), Sweden (8,400), Germany
Persian Gulf and focused on preparing for required two air-to-air-flight refuelings to (6,300), Australia (5,000), Denmark
major combat operations. reach Mogadishu. (5,800), United Kingdom (4,600), and
Most Westerners fled Somalia by Communications between the Brazil (2,950).23 The massive numbers
late December 1990 due to the violent task force and Embassy were highly of evacuees and the breadth of countries
involved reflect globalization, with ever- Cypress or Turkey. Lebanon is within hotels, catering, and ground transporta-
increasing population mobility and dual the USCENTCOM AOR, but Israel, tion were soon overbooked. DOD had
nationalities. Cypress, and Turkey all fall under U.S. to construct an emergency tent city and
Initially there were no U.S. Navy European Command (USEUCOM). bring in additional forces and logistics for
ships in the eastern Mediterranean This required continuous coordination life support. U.S. evacuees flowed into
and the closest MEU was in the Red between combatant commands. Cypress faster than State could charter
Sea, 6 days away by ship. Airlift was in The U.S. Embassy and the State flights for them back to the United
heavy demand for ongoing operations Department in Washington had even States, which forced DOD to also man-
in Iraq and Afghanistan. However, bigger coordination challenges. State age repatriations.25
U.S. Transportation Command planners kept attempting to reserve Japan Earthquake: Operation
(USTRANSCOM) used its contracting commercial aircraft and ships, at times in Pacific Passage, March 2011. Following
channels to procure a commercial pas- direct competition with USTRANSCOM the massive earthquake in Japan on
senger ship to transport evacuees from and allied countries.24 State headquarters March 11, 2011, DOD authorized
Beirut to Cypress. The vast majority of in Washington restricted the Beirut a voluntary return of military family
Americans evacuated by sea between July embassy from talking directly with the members and DOD civilians to the
19–25 using contracted commercial ships media. Meanwhile, the department did United States. U.S. Northern Command
and then U.S. Navy and Marine Corps not communicate effectively with evacu- (USNORTHCOM) led the repatriation
vessels. ees, family members, or the media. This effort, which flew more than 7,800 DOD
Israel had blockaded the coastline, created delays and miscommunications noncombatants and their pets out of
and all ground movement and port that worsened the panic and confusion. Japan. Since this was a DOD-only evacu-
operations had to be cleared with the Cypress was used as a temporary safe ation, it was a rare instance of civilian
Israeli military. Evacuation also had to haven by several other Western countries. evacuation and repatriation conducted
be coordinated with Lebanon and either This was the height of tourist season. All
54 Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
entirely by the military without State Pegasus), and France. Operation •• Ambassadors and the State Depart-
Department participation. Deference also included multinational ment will defer requesting military
Although Pacific Passage was contributions by Romania, Kuwait, assistance as long as possible. By the
completed successfully, it uncovered is- Ireland, Spain, and Austria. time they do, the range of options
sues that could have been problematic The newly created U.S. Africa will be narrow.
under different circumstances. DOD’s Command (USAFRICOM) led JTF- •• GCCs may struggle to devote
computer database used to track non- OOD and then transitioned it to NATO resources to NEO, particularly if
combatant evacuations (NEO Tracking control. USAFRICOM’s intended they are already committed on other
System, or NTS) did not interface with mission was regional stability and en- operations.
the passenger manifesting system used gagement, not warfighting or JFHQ •• Communications, shared situational
by Air Mobility Command.26 Nor did operations. Their headquarters staff was awareness, and trust between the
NTS include all fields required for U.S. 50 percent civilian and lacked the depth Embassy and the NEO force will be
customs clearance. Pacific Passage was the to sustain a 24-hour tempo.28 Although untested or absent.
first real-world test of NTS. Operators Libya is within USAFRICOM’s AOR, •• Mission scope often expands
were able to work around the problem the forces involved and staging bases were into longer duration repatriation
by using manual processes and rekeying from USEUCOM or USCENTCOM. operations or resettlement duties and
data into multiple systems. However, USAFRICOM relied heavily on spills across combatant command
these flaws increased workload and delay. USEUCOM, NATO, and Arab League boundaries.
In a larger emergency, these glitches coalition partners for support. •• Globalization and modern technol-
could have resulted in passengers not The decision not to attempt a military ogy put more Americans in more
being tracked or appropriately screened rescue of U.S. Ambassador Christopher places with more connectivity than
or being misrouted. DOD has programs Stevens from Benghazi, Libya, on ever before.
under way to correct these issues. September 11, 2012, remains a topic •• Public attention is notoriously short,
USNORTHCOM’s estimates and of ongoing partisan arguments and ac- but if an incident resonates emotion-
plans only encompassed repatriation and cusations. Four Americans, including ally, it can sway policy, politics, and
onward movement to the continental Ambassador Stevens, died in an attack on perceptions dramatically.
United States. However, many evacuees the Benghazi compound. Controversy
went to destinations in the U.S. Pacific continues over whether military assistance
Command AOR. The units running the would have been possible and over who
The Need for a Standing
Joint Reception Coordination Center had made that determination.
Joint Capability for NEO
A Joint Support Element specifically
never trained in NEO or NTS and had to Another controversial decision was
organized for NEOs could provide
learn on the job. Because Pacific Passage not to evacuate private U.S. citizens from
immediate capability and a foundation
was a completely DOD-run event, it by- Yemen. The U.S. Embassy evacuated in
of expertise to support or augment
passed normal state and Federal agencies February 2015. An undetermined num-
GCC staffs during a NEO contingency.
that ordinarily handle repatriation and ber of U.S. citizens were left to remain
I propose that DOD create a Joint
reception of evacuees. or find their own way out.29 Several other
NEO Support Element (JNSE) to
The Arab Spring Uprisings and nations, including India, China, Pakistan,
provide a rapidly deployable joint plan-
Their Aftermath: Libya (2011, 2012), and Somalia, did evacuate their citizens.
ning team specifically focused on NEOs.
Yemen (2015). The Arab Spring move-
Marine Expeditionary Units remain an
ment that began in December 2010 Lessons Learned ideal tactical force to execute NEOs
demonstrated a controversial shift in U.S. Military-assisted NEOs will always be
when available. Geographic combatant
policy. In Libya and Yemen, the United a unique and complex tactical, opera-
commands should retain ownership for
States decided not to attempt evacuation tional, and strategic mission. Despite
NEO contingency plans in their AOR.
or did so only after allied NEOs were this, a NEO is something most head-
What a proposed JNSE could provide
already under way. quarters and units historically have just
is specialized NEO planning and
Joint Task Force Odyssey Dawn “muddled through.” Every NEO has its
coordination expertise that is deploy-
(JTF-OOD) included a multinational share of unique problems, and so far the
able worldwide and has reachback to
evacuation from Libya and Tunisia in United States has avoided a repeat of
Washington.
March 2011. By then, however, most the 1970s experiences. But it only takes
The ideal structure for such a JNSE is
Americans had already left. Several one disaster to rewrite the strategic
under USTRANSCOM as part of Joint
NATO countries conducted NEOs in narrative.
Enabling Capabilities Command (JECC),
February that evacuated Americans.27 We should expect a few recurring
which was formed in 2008 as a result of
These included the United Kingdom challenges in any future NEOs:
past lessons learned from contingency
(Operation Deference), Canada
operations and the Millennium Challenge
(Operation Mobile), Germany (Operation
2002 wargame. There was often a trou- humanitarian assistance/disaster relief as militaries that might be involved in a
blesome lag at the outset of a crisis before well as NEOs would dilute their focus, NEO. This could enhance interop-
a JFHQ could assemble and ramp to full training, and deployable manpower. erability, build trust, and provide
operating capability. History suggests commanders will pri- reachback capability during a crisis.
The existing JECC provides fast-de- oritize other missions at the expense of •• The JNSE could also liaise with
ploying joint headquarters staff elements NEOs. The JNSE could also be based other governmental agencies at
to provide a nucleus for a contingency closer to Washington, DC,where it could Federal, state, and territory levels
JFHQ.30 Currently, there are three sub- access State, other U.S. Government who share responsibility for repatria-
ordinate commands under the JECC: the agencies, and foreign embassies. JPSE is tion and reception of Americans back
Joint Planning Support Element (JPSE), located several hours away in Norfolk, to the homeland. This includes the
Joint Public Affairs Support Element, and Virginia. Department of Health and Human
Joint Communications Support Element The new JNSE could address the fol- Services and other entities with
(JCSE). The JNSE would become a lowing concerns: which most GCCs would not rou-
fourth element of JECC. tinely interact.
•• It could increase GCC staff capabili-
The role of the new JNSE would •• JNSE would serve as the subject
ties quickly. This would preserve a
be similar to the existing Joint Planning matter expert on NEOs to refine and
focus on the NEO even during situ-
Support Element. However, rather than share doctrine, techniques, tactics,
ations where multiple simultaneous
expand the JPSE’s mission set, a similarly procedures, and situational aware-
operations are unfolding in the AOR
structured but separately organized JNSE ness. They could develop exercises
or the GCC staff is overloaded.
is needed. NEOs often arise concurrently and training for military units,
•• JNSE staff could cultivate ongoing
with other crises that require their own Embassies, the State Department,
professional relationships and liaise
joint planning support. Tasking JPSE to and allies.
with all the combatant commands,
prepare for combat contingencies and
State Department, NATO, and allied
56 Features / The Need for a Joint Support Element in NEOs JFQ 85, 2nd Quarter 2017
Perhaps the most important strategic
14
Non-Combatant Evacuation Operations,
B-GJ-005-307/FP-050 (Ottawa, Canada:
purpose for a JNSE will be to demon-
strate a concrete U.S. commitment to
Department of National Defence, 2003). New from
15
Ibid.
prepare for evacuating American citizens 16
Ibid. NDU Press
anywhere, at any time, if necessary. This 17
Ibid., 70. for the Center for Strategic Research
could be especially important in today’s
18
Adam B. Siegel, “Eastern Exit: The Non-
Strategic Forum 298
combatant Evacuation (NEO) from Mogadi-
environment of globalization, instant Cross-Functional Teams in Defense
shu, Somalia, in January 1991,” CNA Research
communication, and extremist groups Memorandum 91-211 (Alexandria, VA: Center Reform: Help or Hindrance?
using ultraviolent propaganda footage. for Naval Analyses, October 1991). By Christopher J. Lamb
The strategic consequence of a disastrous 19
Ibid. There is
evacuation or hostage situation could
20
Ibid. strong bipar-
21
Ibid.
linger for decades. JFQ tisan support
22
GAO, U.S. Evacuation from Lebanon,
Report 07-893R (Washington, DC: GAO, June for Section
7, 2007). 941 of the
Notes 23
World Reach Market Research Series, Senate’s ver-
“Lebanon Evacuation Summary,” June 7, sion of the
1
Ronald W. Reagan, “United States 2007.
National
Casualties in Lebanon and Grenada,” remarks 24
Ibid., 5.
to military personnel, Cherry Point, NC, No- 25
Ibid., 6. Defense
vember 4, 1983. 26
Jeff Corthell and Chris Faith, presenta- Authorization Act for 2017, which
2
Ronald W. Reagan, “Peace: Restoring the tion slides from the Pacific Passage NEO Track- requires the Pentagon to use cross-
Margin of Safety,” speech, Veterans of Foreign ing System Conference, August 8–9, 2011, functional teams (CFTs). CFTs are
Wars Convention, Chicago, IL, August 18, available at <www.jllis.mil>.
a popular organizational construct
1980. 27
Tim Ripley, “Western Militaries Conduct
3
U.S. Government Accountability Office NEO Missions Out of Libya,” Jane’s Defence with a reputation for delivering bet-
(GAO), State Department: Evacuation Plan- Weekly, March 4, 2011. ter and faster solutions for complex
ning and Preparations for Overseas Posts Can Be 28
Joe Quartararo, Sr., Michael Rovenolt, and rapidly evolving problems. The
Improved, GAO Report 08-023 (Washington, and Randy White, “Libya’s Operation Odyssey Department of Defense reaction to
DC: GAO, October 19, 2007). Dawn: Command and Control,” PRISM 3, no.
the bill has been strongly negative.
4
Executive Order 12656, 3 C.F.R., “As- 2 (March 2012), 151.
signment of Emergency Preparedness Responsi- 29
Smitha Khorana and Spencer Acker- Senior officials argue that Section
bilities,” November 18, 1988. man, “Americans in Yemen Fear They Have 941 would “undermine the author-
5
Ibid. Been Left Behind as Bombing Escalates,” The ity of the Secretary, add bureaucracy,
6
Memorandum of Agreement Between Guardian, April 1, 2015. and confuse lines of responsibility.”
the Departments of State and Defense on the 30
U.S. Transportation Command, Joint
The Senate’s and Pentagon’s dia-
Protection and Evacuation of U.S. Citizens and Enabling Capabilities Command (JECC), “His-
Nationals and Designated Other Persons from tory of the JECC,” available at <www.jecc.mil/ metrically opposed positions on the
Threatened Areas Overseas, July 1998. About/BriefHistory.aspx>. value of CFTs can be partially recon-
7
Ibid. ciled with a better understanding of
8
Joint Publication 3-68, Noncombatant what CFTs are, how cross-functional
Evacuation Operations (Washington, DC: The groups have performed to date in
Joint Staff, November 18, 2015).
9
Army Technical Publication 3-05.68,
the Pentagon, and their prerequi-
Special Operations Noncombatant Evacuation sites for success. This paper argues
Operations (Washington, DC: Headquarters there is strong evidence that CFTs
Department of the Army, September 30, could provide impressive benefits if
2014), table 6-1. the teams were conceived and em-
10
North Atlantic Treaty Organization
(NATO) Doctrine Standardization Document
ployed correctly.
AJP-3.4.2, Allied Joint Doctrine for Non-
Combatant Evacuation Operations (Brussles:
NATO, March 2007).
11
Joint Doctrine Publication 3-51,
Non-Combatant Evacuation Operations, 2nd
ed. (London: United Kingdom Ministry of
Defence, February 2013).
12
Australian Defence Force Publication
3.10, Evacuation Operations (Canberra: Austra-
lian Defence Headquarters, 2004).
13
Joint Doctrine JD-3.4.2, Non-combatant
Visit the NDU Press Web site for
Evacuation Operations (No. 136/DEF/
more information on publications
CICDE/NP) (Paris: Joint Centre for Concepts,
at ndupress.ndu.edu
Doctrines, and Experimentations, July 2009).
Policing in America
How DOD Helped Undermine Posse
Comitatus
By Steven C. Dowell, Jr.
ith the recent events of police follow—aptly, to protect and to serve. you’re pro-police, then you surely hate
specific teams more specialized than Some have suggested that the Central In the U.S. Armed Forces,
the easily recognizable Special Weapons Intelligence Agency originally developed Servicemembers are taught to follow all
and Tactics (SWAT) teams developed many of these practices for Agency oper- the orders of the officers appointed over
in the late 1960s. A quick online search atives.17 These tactical training regimens them and the orders of the President of
will find units that range from the U.S. involved techniques such as counter- the United States as long as they are legal,
Border Patrol Tactical Unit, Federal surveillance, identifying dead drops, and moral, and ethical. This is a militaristic
Bureau of Investigation’s National Joint eluding law enforcement. These tactics hierarchy of control and is enforced by
Terrorism Task Force (NJTTF), U.S. have good intent behind them, but the the chain of command. This same chain
Marshal’s Special Operations Group, fact that their roots come from “espio- is replicated in part in civilian police orga-
U.S. Department of Energy’s Special nage” and “special operations” should nizations. For a police officer to advance
Response Team, to the U.S. Park be a concern for the average citizen. in the hierarchy of the department, “the
Police SWAT team, among numerous Moreover, civilian police attend train- policeman must exhibit behavior indica-
other state and local tactical/assault ing with military members, sometimes tive of a ‘relatively unquestioning belief
teams. Interestingly, the NJTTF has through formal joint training events in and acceptance of the organizational
Active-duty military liaisons specifically or by chance encounters at a local gun system.’”18 The same could be said for
provided by the U.S. Army Criminal range or civilian training academy, and the U.S. military. If Servicemembers do
Investigation Command—a division of adapt the methodologies learned and not adapt to the doctrine and culture
the U.S. Army Military Police Corps. bring them back to their home police of their unit, then they will likely not
These teams are jointly using practices departments. These militaristic mindsets progress within the ranks. Many civil-
learned by their parent agencies decades carry over when Servicemembers com- ian police are no different. This is what
ago from their military mentors, if municate these same military principles two researchers call the “quasi-military
they are not still learning them today. to civilian police officers. command model.”19 Civilian police
potential for DOD to improve civilian techniques to a higher security clearance the Defense Authorization Measures
police survivability and service to their more strictly and lower those of less-than- of 2008 and 2009, coercing DOD to
citizens if it were to impart at least de- lethal capability than it has in the past, enact a policy to prevent this.38 The
escalation and less-than-lethal training to allowing civilian police to still benefit existing policy is applied to “very senior
civilian police, which most civilian police from those techniques that are absolutely employees” of DOD concerning defense
already receive. An example would be the “must share.”37 This again would con- contracting companies where they are
U.S. Marine Corps Inter-Service Non- strain military personnel from imparting “subject to a two-year restriction” from
Lethal Individual Weapons Instructor large amounts of knowledge to civilian being employed by those civilian contrac-
Course, which for 2 weeks focuses on police, preventing further instances where tors.39 This policy has seen controversy
the proper use and familiarization of police misconduct could occur due to and is alleged to have “done little to slow
TASERs, batons, OC (pepper spray), militarization, especially when citizen en- the rush” of Servicemembers transition-
ocular and acoustic hailing devices, and counters result in the use of lethal force. ing to civilian agencies involved with the
verbal de-escalation techniques, among Finally, as retired Servicemembers defense industry.40 But the policy could
other techniques. The course culminates leave the military, a control measure be more effective if first enforced by
with an understanding by the police of- would need to be implemented to ensure DOD before the Servicemember sepa-
ficer that the overarching theory behind that they do not accelerate the procure- rates from the Service and, subsequently,
less-than-lethal capabilities is that, to ment of these techniques to civilian by the Department of Justice where waiv-
avoid lethal situations, less-than-lethal police, essentially creating a loophole ers to that policy would be required by
options should be used “early and often.” around both equipment and training the former Servicemember, and second if
Accordingly, a more favorable action restriction policies. Congress has ad- the policy were implemented specifically
for DOD would be to classify lethal dressed this type of loophole before in toward those in the military who wish to
pursue civilian policing positions where a Yet while police continue to serve vast amount of influence it will continue
2-year restriction also applies. This could and protect, there are those who are to have on civilian police—and that it
mitigate that rush and allow a period of turning policing into something it was will have a response when this question
reflection for those Servicemembers post- not meant to be. DOD has invented is posed. JFQ
retirement before joining the ranks of devastatingly effective means of elimi-
civilian law enforcement. nating its enemies, but there must be a
moral question of whether we should Notes
As recent as 2016, a criminal justice allow civilian police to use those same
survey was taken where 54 percent of methods on U.S. citizens. Even in
1
Emily Ekins, Policing in America: Under-
standing Public Attitudes Toward the Police. Re-
Americans stated that “police using ancient Rome, the natural progression sults from a National Survey (Washington, DC:
military weapons and armored vehicles of policing evolved from simple fire Cato Institute, December 7, 2016), 50–51.
is ‘going too far,’ while 46 percent brigades meant to remedy the spread 2
Richard R. Johnson, Dispelling the Myths
[stated] these tools are ‘necessary for of a fire outbreak to an eventual strictly Surrounding Police Use of Lethal Force (Raleigh,
law enforcement purposes.’”41 This military force that was not the intent of NC: Dolan Consulting Group, July 2016).
3
The Daily Show with Trevor Noah, Comedy
trend toward militarization cannot be its originator, Emperor Augustus.42 And Central, July 7, 2016. Specific excerpts from
ignored; however, this could be the much like in ancient Rome, this change Noah were that “America has a problem within
natural progression of any law enforce- in policing in the United States is some- its police force,” “and although it is a problem
ment entity throughout a civilization’s thing that DOD can and should assist that disproportionately affects black people, it’s
lifetime. To combat new weapons and in for the better while there is still time, not just a black problem. This is an American
problem,” and that “with police shootings, it
new threats and deter enemies of the and while it still has overwhelming favor shouldn’t have to work that way.”
peace, police will need improved forms with the American people. Choosing to 4
The California Army National Guard was
of deterrence and apprehension. Thus, maintain or eliminate Posse Comitatus activated on April 29, 1992, to assist civilian
with ever-looming threats around the will be a question to be answered in the police with conducting law enforcement includ-
world, the last thing we want to do is future. We should hope, though, that ing conducting patrols within the city.
5
Radley Balko, “The Militarization of
lessen the abilities and effectiveness of DOD understands and accepts the role America’s Police Forces,” Cato’s Letter 11, no.
uniformed civilian police officers. it has played in police development, the
66 Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
dangers to human health, international Health Service Act that produced an The Executive Branch
stability, and the global economy. In entity now known as the U.S. Depart- Offices, departments, and independent
other words, health security is crucial to ment of Health and Human Services agencies make up the executive branch;
U.S. national security. (DHHS).4 Since then, the United States however, our focus is on departments
For purposes of this analysis, U.S. has steadily increased economic and with Presidential-appointed depart-
health security focuses on human health social development assistance to foreign ment heads that implement U.S.
and is sought and maintained through nations that, in turn, contributed to policy. The President’s Cabinet today
successful public health and global health their own public health systems. includes 15 department heads known
activities. While “public health” focuses In 1949, the United States became a as Cabinet Secretaries. A smaller group
on domestic or national human health signatory to a set of international treaties of appointed advisors known as the
issues, “global health” focuses on interna- known as the Geneva Conventions and National Security Council (NSC) is a
tional human health issues that are linked Protocols. One subject included protect- forum used by the President to consider
to U.S. domestic security. For an overview ing civilian victims of armed conflict and national security and foreign policy
of U.S. health security responsibilities and internal violence.5 Further enhancements matters.9 One policy document that
the role of the U.S. military in providing addressed “protection of civilians” be- links executive policy to department
medical aid, this discussion is separated yond hostilities to include accessibility to activities is a national strategy. For
into four sections that capture analysis essential services and medical care. Over security policy, the President’s National
based on documents, informal discus- the next decade, these treaties influenced Security Strategy (NSS) connects U.S.
sions, and military briefings: the history the United States to support more policy goals managed by the NSC to
of U.S. health policy through legislative requests abroad for military assistance. objectives on security matters.10 Subse-
actions and international engagements, In 1961, Congress passed the Foreign quently, the U.S. National Health Secu-
health policy as articulated in Federal Assistance Act (FAA) to better assist rity Strategy (NHSS) issued by DHHS
department strategies and other executive partner nations with security challenges, further articulates health security policy
branch documents, medical campaign which eventually led to public and global objectives that are linked to NSS objec-
activities executed under the U.S. Code, health support. One tenet distinguished tives. As a result, health security roles
and recommendations for strengthening military assistance from humanitarian and within the executive branch are further
U.S. Government health security efforts. development assistance while another defined.
created the U.S. Agency for International The President also articulates policy
Legislative Actions and Development (USAID), which carries through executive orders. One order
International Engagement out U.S. global health policy develop- that provides the President’s position
U.S. legislative history and interna- ment, coordination, and execution.6 on national security matters is called
tional agreements capture methods In 2005, the United States became a a Presidential Directive. In the last 20
that attempt to address modern health signatory to the WHO’s International years, five directives set conditions that
security concerns. The government’s Health Regulations (IHR), a legally bind- impact health security. In 1996, President
public health infrastructure originates ing agreement among 196 state parties, Bill Clinton signed a directive on emerg-
from early congressional legislation that, which obligates member states to develop ing infectious diseases that increased
just 9 years into the Nation’s existence, and maintain international public health U.S. surveillance, training, research, and
created the U.S. Public Health Service threat detection, assessment, notifica- response. It also directed the develop-
to treat those who served the country tion, and response capabilities.7 Under ment of the Department of Defense’s
at sea.1 Fifteen years after the Civil War, the IHR, the United States globally as- (DOD) Global Emerging Infections
the American Red Cross was created sists other nations to ensure that health Surveillance and Response Program.11
to provide medical treatment for those security capabilities are in place and In 2009, President Barack Obama is-
citizens who served in uniform. Fol- procedures followed.8 Additionally, the sued a directive on the implementation
lowing World War I, an international Global Health Security Agenda (GHSA) of the national strategy for countering
League of Nations was created2 that and the Global Health Security Initiative biological threats that focused on global
administered a separate Health Orga- (GHSI) accelerate international progress health security promotion with other
nization to address prevention and against infectious diseases and chemi- nations to prevent, detect, and respond
control of certain diseases.3 The League cal, biological, radiological, and nuclear to infectious disease.12 Shortly thereafter,
and Health Organization eventually (CBRN) exposure, respectively. the President issued a directive named
became the United Nations (UN) and With such maturation in U.S. health U.S. Global Development Policy,13 which
World Health Organization (WHO), policy and support for human rights, elevated development efforts to be on par
respectively, both of which the United a more focused national direction on with diplomacy and defense.14 Another,
States provides humanitarian assistance health security has emerged. The follow- National Preparedness,15 enhanced the
to upon request. During World War II, ing discusses Presidential and department Department of Homeland Security
the U.S. Congress passed the Public strategies on health security policy. (DHS) and its National Response
Framework (NRF) to better synchronize the Department of State and USAID State also manages diplomatic efforts
a whole-of-government response to a Joint Strategic Plan.18 For the purposes that result in foreign assistance to other
spectrum of security threats that include of this discussion, the U.S. Government nations including countering threats to
health security.16 More recently, Security development agency responsible for human health. One effort is focused on
Sector Assistance was issued to promote administering civilian foreign aid known global health, which is identified as the
partner-nation support of U.S. interests as USAID, although considered a sepa- largest component of U.S. long-term
to include cooperation on humanitarian rate government agency, is categorized development assistance.21 Within global
efforts.17 All of these directives impact as an entity here under State as they health is an integrated approach to im-
health security strategy development. The both share one Cabinet Secretary.19 prove global health conditions known
following department overviews capture For disaster relief missions, State as the Global Health Initiative (GHI).
Federal health security efforts in three regional bureaus take the diplomatic lead Distinct from the GHSA and GHSI
cascading categories: significant, addi- due to their regional expertise. However, international agreements, USAID-led
tional, and remaining. USAID’s Office of U.S. Foreign Disaster GHI implementation includes the de-
Assistance (OFDA) administers govern- fense against threats toward population
Significant Efforts ment responses that include medical health,22 fight against communicable
Two departments play significant aid. Generally, when a foreign disaster is diseases transmitted by contact, and sup-
roles in achieving U.S. health security declared or humanitarian crisis emerges, port of international health advances.23
objectives: the Department of State the President selects USAID as the Separate from USAID efforts, State
and DHHS. State manages foreign operational lead for coordinating the manages the U.S. HIV/AIDS effort via
affairs for the President and persuades government response. Although not the President’s Emergency Plan for AIDS
other nations to support U.S. inter- a member of the President’s Cabinet, Relief.24
national efforts that impact global USAID’s administrator is elevated to DHHS is the other department
economic stability, regional security, and Cabinet-level member status separate that pursues U.S. health security objec-
national health security. Two strategic from the Secretary of State and invited to tives.25 Per its Strategic Plan and Global
documents that provide guidance to NSC meetings when development and Health Strategy, DHHS cooperates
organizational efforts are the non- global health issues are concerned.20 For with scientists worldwide to diagnose,
congressionally mandated Quadrennial domestic response, State manages poten- prevent, and control the spread of dis-
Diplomacy and Development Review and tial international contributions of support. ease.26 Additionally, DHHS produces the
68 Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
congressionally mandated quadrennial administers domestic quarantine sta- abroad, DOD contributes to engagement
NHSS27 that guides health consequence tions at U.S. ports of entry in support and prevention programs, surveillance
mitigation of large-scale emergencies, of DHS,36 and maintains a unique force and response systems, and a network of
provides strategic direction, and stream- of 6,700 uniformed but nonmilitary overseas research laboratories. DOD also
lines health security approaches.28 DHHS health professionals known as the supports civil authorities through medical
information-sharing, disease surveillance, U.S. Public Health Service (USPHS) research, preparation, surveillance, and
and laboratory research capabilities also corps.37 In times of national emergency, response to biological threat requests. In
play significant roles in its illness mitiga- the corps can deploy with other U.S. addition, DOD provides military medical
tion strategy. departments.38 DHHS also oversees a support to the NDMS49 as well as pre-
In support of U.S. global efforts, domestic network of volunteers known planned domestic medical civic action
DHHS provides assessments, disease as the Medical Reserve Corps program events with local communities through its
control mitigation, crisis and disaster that strengthens public health systems Innovative Readiness Training program.50
response, and CBRN support.29 Via its and improves preparedness, response, The Department of Agriculture’s
components, the Centers for Disease and recovery capabilities.39 Furthermore, strategic plan addresses animal health,
Control and Prevention (CDC) per- CDC Epidemic Intelligence Service public health, plant health, environ-
sonnel, National Institutes of Health personnel identify global causes of dis- mental health, and improved access to
laboratory researchers, and Food and ease outbreaks, recommend prevention nutritious food.51 This includes participa-
Drug Administration scientists support and control measures, and implement tion in activities abroad with DOD on
responses to prevent further conse- strategies to protect people from health provincial reconstruction efforts, coun-
quences to human health.30 Moreover, threats.40 tering terrorism, and managing animal
under GHSA and GHSI arrangements, disease control.52 The Department of
the CDC assists partner nations in health Additional Efforts Commerce’s strategic health objectives
surveillance against emerging infectious The following departments make sub- focus on fostering healthy and sustainable
diseases, combats injuries from CBRN stantial contributes to U.S. health secu- marine resources such as fish stocks, habi-
events and infectious diseases such as rity: DHS; DOD; and the Departments tats, and ecosystems.53 It also administers
pandemic influenza with immuniza- of Agriculture, Commerce, Energy, and a nonmilitary but uniformed response
tions,31 manages the President’s Malaria Treasury. DHS guidance is provided service54 known as the National Oceanic
Initiative, participates with DOD in in- in the DHS Strategic Plan41 and the and Atmospheric Administration,55 which
formal international partnerships such as congressionally mandated Quadrennial interacts with the U.S. Navy via the
the Global Outbreak Alert and Response Homeland Security Review.42 DHS core Global Fleet Station sea base program.56
Network and the Laboratory Response responsibilities are to provide domes- The Department of Energy’s57 non-
Network,32 and actively engages in global tic security and coordinate domestic congressionally mandated Quadrennial
partnerships to reduce the impacts of Federal crisis response to include estab- Energy Review58 and Quadrennial
HIV/AIDS. lishing Federal response structures, del- Technical Review59 both articulate
For domestic activities, DHHS leads egating domestic emergency response strategies to prevent the proliferation of
U.S. efforts to protect against public to the Federal Emergency Manage- weapons of mass destruction abroad,60
health threats and provide countermea- ment Agency (FEMA), maintaining a address threats to public health and the
sures for mitigation, as well as contributes maritime domain capability through environment from energy transmission,61
to crisis response.33 As such, DHHS the U.S. Coast Guard,43 and supporting and pursue the cleaning up of legacy nu-
conducts public outreach as well as main- medical cooperative efforts through the clear waste locations.62 Also the Treasury
tains the federally coordinated National NDMS with DHHS and other inter- Department63 uses its significant global
Disaster Medical System (NDMS). This agency stakeholders.44 However, DHS reach to fund immediate needs that may
system encompasses out-of-hospital does play a supporting role in global include medical activities based on U.S.
medical care during crisis response to health efforts through cross-border approval and mitigate emerging threats
disaster stricken areas, patient movement protection to include U.S. airports and against the U.S. and global economies by
for those unable to transport themselves, seaports.45 relieving or enforcing sanctions.64
and treatment at participating hospitals DOD supports health security ef-
in unaffected areas.34 DHHS activates forts primarily through its military Remaining Efforts
the NDMS under its own authorities or workforce. Key strategic documents A couple of remaining departments
through the NRF where it is delegated include the Defense Security Guidance,46 maintain significant capabilities to
authority by DHS to be the operational the National Military Strategy,47 and address domestic public health con-
lead for Emergency Support Function the congressionally mandated Defense cerns but have minimal, if any, equity
#8, Public Health and Medical Services.35 Strategic Review (formerly known as the in support of global health efforts.65
Furthermore, DHHS leads the recep- Quadrennial Defense Review).48 In sup- The Department of Transportation
tion of evacuees in the United States, port of U.S. capacity-building activities administers a National Defense Reserve
Fleet, Ready Reserve Force, and Civil a framework. Such a framework could practices. Relevant Joint Publications
Reserve Air Fleet that can augment produce a mechanism that would be (JPs) for this discussion include JP 4-02,
the transportation of military Services useful due to the fact that most foreign Joint Health Services, JP 3-07, Stability,
to potentially support public health governments are not prepared to respond JP 3-08, Interorganizational Cooperation,
activities.66 Moreover, the Department to out-of-the ordinary, severe catastro- JP 3-20, Security Cooperation, JP 3-28,
of Veteran’s Affairs (DVA) provides phes that overwhelm local and regional Defense Support of Civil Authorities, JP
health professionals and incident-related response capacity. In Haiti, for example, 3-29, Foreign Humanitarian Assistance,
medical care via Federal medical stations relief efforts were hampered as respond- and JP 3-57, Civil Military Operations.
and coordinating centers to care for ers, including U.S. forces, operated in a
those with injuries in support of NDMS severely disrupted environment. The abil- Medical Campaign Activities
hospital activation.67 ity of Haiti’s leadership to prioritize and DOD leads or supports Federal efforts
As U.S. Government departments coordinate U.S. humanitarian assistance that shape operational environments to
continue to develop their own strategies to was disabled and healthcare infrastructure set, establish, reestablish, or maintain
achieve health security objectives, the fu- to be supported was destroyed. Future interaction with political entities. One
ture is uncertain on how they will plan for demands on the United States for more effort is the provision of U.S. humani-
a robust international workforce response. coordinated relief and lifesaving assistance tarian assistance that includes medical,
Currently, USAID-led foreign disaster will continue to be expected, placing more general engineering, food and water,
relief is effective for routine disasters but burdens on the U.S. Government depart- educational, professional exchange, and
additional progress is needed to better ments that make up the NSC system to disaster preparation activities. DOD
coordinate U.S. humanitarian assistance prepare and contribute. contributions underpin these efforts
for catastrophes with cascading effects to Furthermore, while departments known in joint doctrine as maintaining
public infrastructure (for example, the loss develop their own strategies, they should stability or building capacity abroad via
of electrical power grids and exposure to also keep a watchful eye on how they are foreign humanitarian assistance (FHA),
chemical and radiological events).68 One portrayed in joint doctrine—the core providing crisis response support
solution is to use the domestic NRF as foundation of military workforce best through domestic defense support to
70 Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
civil authorities (DSCA), and delivering FHA, its unique and time-sensitive capa- and assisting in the development of
foreign disaster relief under FHA. While bilities deliver medical campaign activities or improving medical capacity of gov-
there are many terms that describe mostly in the form of direct patient care, ernment entities. Medical campaign
DOD medical contributions to U.S. medical supplies transportation, and activities in foreign countries funded
medical efforts (medical civil-military casualty evacuation generally funded by by Humanitarian and Civic Assistance
or stability operations, global health or Overseas Humanitarian, Disaster, and include events that allow U.S. military
partnership engagement, public health Civic Aid. In 2010, DOD medical cam- medical professionals to practice on
services, health diplomacy, disease surveil- paign activities in support of USAID-led real patients to improve their skills.80
lance, security assistance or cooperation, Haiti earthquake disaster relief response Geographic combatant commands
etc.), this discussion refers to those efforts included immediate and urgent conduct these preplanned medical
contributions as “medical campaign medical treatment by medical teams from readiness training exercises and dental
activities.” Medical campaign activities the USNS Comfort.70 When the ship or veterinarian exercises in conjunction
are DOD specific, unlike the categoriza- reached capacity, severely injured Haitian with foreign Ministries of Health and
tion of U.S. Government or other entity patients were evacuated to U.S. hospitals Defense that impact people, livestock,
medical efforts or activities. Selecting a under the authority of the NDMS and and pets in distant regions and remote
label is not to minimize the importance were treated by DHHS and DVA person- villages.81 Additionally, these activities
of the mission, operation, activity, or nel.71 In 2014, DOD conducted medical bolster host-nation health service capa-
task; it is used only to provide clarity for campaign activities to support the U.S. bilities that in turn build local civilian
those in uniform who participate in or response to Ebola in Western Africa.72 population confidence in the delivery of
implement it. The following articulates These medical campaign activities in- government essential services. In 2015,
medical campaign activities within Title cluded laboratory testing and oversight DOD’s Continuing Promise and Pacific
10 and Title 22 legal authorities of the of Ebola treatment unit construction.73 Partnership missions conducted FHA
U.S. Code. DHHS/USPHS personnel cooperated activities in 15 foreign nations across
with DOD to stabilize, mitigate, and pre- Central America and the Caribbean
Title 10 of the U.S. Code vent contagion74 through expeditionary with nongovernmental organizations as
Title 10 is a compilation of permanent medical system support and training of well as Southwest Asia and the Oceana
legal authorities that the Secretary of international health workers.75 regions with allied nations, respectively.
Defense uses to authorize federalized When domestic Federal disaster relief Medical campaign activities included
military forces to conduct military assistance is requested, DHS/FEMA over 142,000 patients treated in local
missions in support of U.S. efforts leads domestic coordination with DHHS ports and over 1,900 surgeries conducted
including humanitarian mission prepara- managing the medical response. Medical aboard hospital ships.82
tion and response. For this discussion, campaign activities to DSCA includes Other medical campaign activities
DOD medical campaign activities fall restoring essential health services in col- abroad include risk reduction and build-
under three categories: disaster relief, laboration with the state and local health ing capacity programs, communicable
byproduct of conflict, and force health entities.76 In support of 2005 Federal disease prevention, infectious disease
protection. While it is important to assistance to Hurricane Katrina victims, surveillance and response, an overseas
acknowledge that DOD provides for medical campaign activities included research laboratory network,83 and
the well-being of military personnel and airlift operations and medical treatment academic courses taught by DOD insti-
supports U.S. stabilization efforts that in support of civilian organization ef- tutions. On the domestic front, DOD
sets or reestablishes interaction with forts along the Gulf Coast.77 In support conducts medical campaign activities in
political entities, the following focuses of 2012 Federal assistance to Hurricane the form of preplanned civic events with
on the first mentioned category of Sandy victims, medical campaign activi- local communities.
DOD disaster relief via combatant com- ties conducted by preventive medicine
mander oversight. personnel included testing the safety Title 22 of the U.S. Code
For crisis situations abroad, USAID/ of food, water, and air in the storm- Title 22 is a compilation of permanent
OFDA generally leads the U.S. response damaged areas where military personnel legal authorities that the Secretary of
when disaster relief is requested of the were sent to assist.78 DOD also approved State uses to provide foreign assistance
Federal Government. In support of U.S. FEMA’s request for transport of over 120 to partner nations. DOD components
humanitarian assistance, DOD, with its medical personnel to serve as augmenta- participation in activities authorized
sheer size, budget, and ready capabili- tion for hospitals and nursing homes.79 in the FAA and by the President that
ties make it an attractive candidate for Veterinarian services were also provided. include health security. Per the FAA,
international aid requests; however, In noncrisis situations that include U.S. foreign assistance provides a
DOD normally contributes to less than preparation, risk reduction, and build- comprehensive list of assistance, some
10 percent of all OFDA managed disaster ing capacity, medical campaign activities of which DOD personnel deliver for
relief.69 When DOD does contribute to generally focus on training U.S. forces State.84 Within foreign assistance,
elements such as security assistance, activities that fall within Foreign Military security.89 Furthermore, GPOI funds cer-
humanitarian assistance, and develop- Sales (FMS), Foreign Military Finance tain activities that build partner country
ment assistance are codified in law.85 (FMF), International Military Education peacekeeping capacity and proficiency for
Formerly known as military assistance Training (IMET), and the Global Peace the deployment of foreign militaries that
in the FAA, security assistance is the most Operations Initiative (GPOI). For FMS, include medical training to foreign forces
profound way that DOD supports State military material is delivered to partner that may deploy to UN peacekeeping
in delivering foreign assistance. Most nations upon formal agreement (for operations.
likely, the term security assistance was example, first aid kits, warrior aid and As for State-managed U.S.
later adopted by Congress to lessen the litter kits, bandages, and medical equip- Government humanitarian and develop-
appearance of the militarization of dip- ment sets). Under FMF, funding includes ment assistance, they do not normally
lomatic efforts during the Cold War. Per defense article acquisition, provision involve military personnel. Per the FAA,
the FAA, security assistance is defined as of services, medical facility construc- humanitarian assistance is aid that meets
a group of planned programs authorized tion, and training to nations with weak humanitarian needs, including medicine,
by law where the U.S. provides defense economies87 (for example, in the 1990s medical supplies, equipment, and educa-
articles, military training, and other the U.S. Government provided Egypt tion.90 U.S. Government development
defense-related services, by grant, loan, with tens of millions of dollars that assistance is aid in support of another
credit, or cash sales to further national went to constructing a 650-bed inter- nation’s self-help efforts that are essential
policies and objectives.86 Within U.S. national medical center for the Egyptian to successful long-term development.91
security assistance programs, medical military).88 Moreover, IMET funds the As DOD has no formal leadership role
campaign activities range from medi- educational instruction by U.S. offices, in the delivery of Title 22 humanitarian
cal training to medical equipment and employees, contract technicians, and assistance or development assistance, it
donation of medical supplies. Prioritized contractors to foreign military students, has been the view of some civilian-led
by both State and DOD, DOD per- units, and courses on a nonreimburs- organizations that certain long-term
sonnel administer medical campaign able (grant) basis that includes health humanitarian or development-like Title
72 Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
10 activities, which include medical Congressionally mandate a 1949, 6 UST. 3516, 75 U.N.T.S. 287.
6
Foreign Assistance Act of 1961, Public
campaign activities, mostly fall under Quadrennial Security Review to better Law 87-195, 87th Cong., 1st sess., September
traditional civilian-led responsibilities. To coordinate a government approach to na- 4, 1961.
mitigate confusion, DOD is encouraged tional security matters, including human 7
International Health Regulations (2005),
by these organizations to label humani- health security, therefore forcing depart- 2nd ed. (Geneva: World Health Organization,
tarian efforts as something other than ments to plan for non-DOD workforce 2008), available at <www.who.int/ihr/publica-
tions/9789241596664/en/>.
humanitarian assistance and only provide emergency and disaster relief packages. 8
National Health Security Strategy and
support to U.S. development efforts.92 Create a Presidential Directive for an Implementation Plan (NHSS/IP) 2015–2018
International Response Force to assist (Washington, DC: Department of Health and
Conclusion in codifying a U.S. Government cata- Human Services, 2015), 30.
DOD medical campaign activities strophic coordination mechanism that
9
Barack H. Obama, Presidential Policy Di-
rective (PPD)-1, Organization of the National
is a useful term to identify medical will raise department priorities for devel-
Security Council System (Washington, DC: The
contributions within DOD activities opment of a complex medical response White House, February 13, 2009).
to U.S. health security efforts and capacity. 10
National Security Strategy (Washington,
programs. In support of U.S. national Create a Presidential Directive on DC: The White House, May 2010), 39.
interests, medical campaign activities Health Security to raise the priority for
11
William J. Clinton, Presidential Decision
Directive NTSC-7, Emerging Infectious Diseases
are a core element of strategic competi- planning and importance of U.S. health
(Washington, DC: The White House, June 12,
tion and will continue to be planned security efforts expressed and implied 1996).
for in support of DOD FHA activities in existing directives and strategic 12
Barack H. Obama, PPD-2, Implementa-
to overall U.S. Government efforts. documents. tion of the National Strategy for Countering
Abroad, medical campaign activi- Identify non-DOD U.S. entities that Biological Threats (Washington, DC: The White
House, November 23, 2009).
ties provide a good tool for not only can potentially execute existing DOD 13
Barack H. Obama, PPD-6, U.S. Global
mitigating threats to health security but medical campaign activities and assist in Development Policy (Washington, DC: The
also countering insurgencies that offer the development of their capabilities to White House, September 23, 2010).
their own medical care to influence plan for and fill potential DOD health 14
Foreign Assistance Act of 1961, Public
and control local civilian populations.93 security capability shortfalls in future Law 94-161, 94th Cong., 1st sess., Decem-
ber 20, 1975. In 1993, President Clinton
At home, medical campaign activities missions due to constrained budget envi-
nominated the Director for the U.S. Agency
provide immediate lifesaving assistance ronments and sequestration. for International Development (USAID) as the
to U.S. state and local governments and Encourage interorganizational partici- Special Coordinator for foreign humanitarian
build confidence in Federal government pation in joint doctrine development to assistance and disaster relief; PPD-6.
intentions. capture best practices and create aware-
15
Barack H. Obama, PPD-8, National Pre-
paredness (Washington, DC: The White House,
Although medical campaign ac- ness of extant non-DOD health security
March 8, 2011).
tivities that defend against infectious capabilities used in cooperation with 16
Ibid.
disease efforts such as the Ebola virus DOD to further expose stakeholders to 17
Barack H. Obama, PPD-23, Security
are less common, involvement by the each other’s capabilities and systems.95 JFQ Sector Assistance (Washington, DC: The White
U.S. military most likely will increase House, April 5, 2013).
18
The first combined Department of State
considerably due to its robust logistics
and USAID strategic plan was published in
and rapid transportation and surveillance Notes 2003.
capabilities. In 2015, DOD conducted 19
Title 22 U.S. Code § 6592, Foreign
medical campaign activities in support
1
An Act for the Relief of Sick and Disabled Affairs Agencies Consolidation, Administrator
Seamen, 1 Stat. L., 605, 5th Cong., 2nd sess., of AID [the Agency for International Develop-
of U.S. humanitarian assistance efforts July 16, 1798. ment] reporting to Secretary of State. For or-
to protect civilians from the Zika virus.94 2
Derek Licina, “The Military Sector’s ganizational purposes, under U.S. law, USAID
With national direction on health security Role in Global Health: Historical Context and falls under State.
and missions of the U.S. military evolv- Future Directions,” Global Health Governance 20
Quadrennial Diplomacy and Development
ing, changes in joint doctrine should 6, no. 1 (Fall 2012), 4; League of Nations, Review (Washington, DC: Department of State,
Covenant of the League of Nations, April July 2009), 115; PPD-6, 5.
more clearly reflect the shift beyond force 28 1919, available at <www.refworld.org/ 21
FY 2014–2017 Department of State and
health protection toward the protection docid/3dd8b9854.html>. USAID Strategic Plan (Washington, DC: De-
and medical treatment of civilians in mul- 3
Iris Borowy, Coming to Terms with World partment of State, 2014), 23.
tiple types of operating environments. Health: The League of Nations Health Organ- 22
U.S. Global Health Policy, The U.S.
To more adequately address health isation 1921–1946 (Frankfurt: Internationaler Government Engagement in Global Health: A
Verlag Der Wissenschaften, 2009), 57. Primer (Washington, DC: The Henry J. Kaiser
security issues in the future, the follow- 4
Public Health Service Act of 1944, Public Family Foundation, January 2013), 20–25.
ing recommendations would be of value Law 78-410, 78th Cong., 2nd sess., July 1, 1944. 23
See Global Health Initiative, available at
to assist the United States in improving 5
International Committee of the Red <www.ghi.gov>.
health security response capabilities: Cross, Geneva Convention Relative to Protection 24
FY 2014–2017 Department of State and
of Civilian Persons in Time of War, August 12, USAID Strategic Plan, 23.
74 Features / The U.S. Government’s Approach to Health Security JFQ 85, 2nd Quarter 2017
51
Strategic Plan for FY 2014–2018 (Wash- in West Africa,” October 9, 2014. Military Aid,” New York Times, March 5, 2011.
ington, DC: Department of Agriculture, 2014). 74
Government Accountability Office 89
JP 3-20, 37.
52
JP 3-08, 114. (GAO), Regionally Aligned Forces: DOD Could 90
Foreign Assistance Act of 1961, Public
53
FY 2014–FY 2018 Strategic Plan (Wash- Enhance Army Brigades’ Efforts in Africa by Law 87-195, 87th Cong., 1st sess., September 4,
ington, DC: Department of Commerce, 2014), Improving Activity Coordination and Mission- 1961, as Amended Through Public Law 113-
26. Specific Preparation, GAO 15-568 (Washington 76 § 499 (January 17, 2014), 160.
54
See Uniformed Service Rank Chart, U.S. DC: GAO, August 26, 2015), 8. 91
Ibid., § 102, 3. See also JP 3-08, 268.
Public Health Service, available at <www.usphs. 75
See Haiti Earthquake 2010, Public DOD defines development assistance as pro-
gov/docs/pdfs/uniform/Uniformed%20Ser- Health Emergency, available at <www.phe.gov/ grams, projects, and activities carried out by
vice%20Rank%20Chart.pdf>. emergency/news/sitreps/Pages/haitiearth- USAID that improve the lives of the citizens
55
JP 3-08, 117. quake.aspx>. of developing countries while furthering U.S.
56
Ibid. 76
JP 3-29, xii. foreign policy interests in expanding democracy
57
Strategic Plan 2014–2018 (Washington, 77
Steve Bowman, Lawrence Kapp, and and promoting free market economic growth.
DC: Department of Energy, March 2014). Amy Belasco, Hurricane Katrina: DOD 92
Independent Review of the U.S. Govern-
58
Quadrennial Energy Review: Energy Disaster Response, RL33095 (Washington, DC: ment Response to the Haiti Earthquake, Final
Transmission, Storage, and Distribution Infra- Congressional Research Service, September 19, Report, 71.
structure (Washington, DC: Department of 2005), 6. 93
JP 3-24, Counterinsurgency (Washington,
Energy, April 2015). 78
“Military Provides Critical Assistance DC: The Joint Staff, November 22, 2013),
59
Quadrennial Technical Review: An As- in Aftermath of Massive Storm Sandy,” U.S. II-15.
sessment of Energy Technologies and Research Medicine, December 2002, available at <www. 94
Patricia Kime, “Zika Virus: Pentagon
Opportunities (Washington, DC: Department usmedicine.com/agencies/department-of-de- Will Relocate At-Risk Family Members,”
of Energy, September 2015). fense-dod/military-provides-critical-assistance- Military Times, February 1, 2016, available
60
JP 3-08, 122. in-aftermath-of-massive-storm-sandy/>. at <www.militarytimes.com/story/military/
61
Quadrennial Energy Review, 251. 79
“DOD Provides Hurricane Sandy Re- benefits/health-care/2016/02/01/zika-
62
Ibid., 3. sponse, Relief Update,” November 3, 2002, virus-pentagon-relocate—risk-family-mem-
63
Strategic Plan for Fiscal Years 2014–2017 available at <http://archive.defense.gov/ bers/79515660/>.
(Washington, DC: Department of Treasury, news/newsarticle.aspx?id=118438>. 95
James C. McArthur et al., “Interorga-
2014). 80
DOD Instruction 2205.02, “Humanitar- nizational Cooperation III of III: The Joint
64
Ibid., 27. ian Civic Assistance Activities,” Washington, Force Perspective,” Joint Force Quarterly 81
65
For example, the Departments of Edu- DC, June 23, 2014. (2nd Quarter 2016), 129–139.
cation, Housing and Urban Development, 81
See Joint Task Force–Bravo, available at
Interior, Justice, Labor, Transportation, and <www.jtfb.southcom.mil>.
Veteran’s Affairs. 82
U.S. Senate Armed Services Committee,
66
JP 3-08, 137, 140. “Posture Statement of Admiral Kurt W. Tidd,
67
Ibid., 175. Commander, United States Southern Com-
68
Paul N. Stockton, All-Hazards Foreign mand, Before the 114th Congress”; “Infograph-
Response: Lessons Learned from Haiti, Fukushi- ic: Pacific Partnership and Continuing Prom-
ma, and Other Catastrophes (Falls Church, VA: ise,” NavalToday.com, available at <http://
Anser, October 30, 2013). navaltoday.com/2015/10/02/infographic-
69
Ibid. pacific-partnership-and-continuing-promise/>;
70
See “Operation Unified Response: Sup- Jeanette Steele, “Mercy Returns from Medical
port to Haiti Earthquake Relief 2010,” U.S. Mission,” San Diego Union-Tribune, September
Southern Command, available at <www.south- 25, 2015, available at <www.sandiegounion-
com.mil/newsroom/Pages/Operation-Uni- tribune.com/news/2015/sep/25/mercy-
fied-Response-Support-to-Haiti-Earthquake- returns-10th-pacific-partnership/>.
Relief-2010.aspx>. 83
Kellie Moss and Josh Michaud, The U.S.
71
Independent Review of the U.S. Govern- Department of Defense and Global Health:
ment Response to the Haiti Earthquake, Final Infectious Disease Efforts (Washington, DC:
Report (Washington, DC: USAID, March The Kaiser Family Foundation, October
28, 2011), 54; Gary Cecchine et al., The U.S. 2013), 7–15; James B. Peake et al., The Defense
Military Response to the 2010 Haiti Earthquake: Department’s Enduring Contributions to Global
Considerations for Army Leaders (Washington, Health: The Future of the U.S. Army and Navy
DC: RAND, 2013), 27. Overseas Medical Research laboratories (Wash-
72
Kristina Peterson, “Congress Releases ington, DC: Center for Strategic and Interna-
Funding to Aid Fight Against Ebola,” Wall tional Studies, June 2011).
Street Journal, October 10, 2014, avail- 84
Foreign Assistance Act of 1973, Public
able at <www.wsj.com/articles/congress- Law 93-189 § 23, 87 Stat, 93rd Cong., 1st sess.,
releases-funding-to-aid-fight-against-ebo- December 17, 1973, 727.
la-1412959345>. 85
JP 3-29, GL-7.
73
U.S. Senate Appropriations Committee, 86
International Security Assistance and
“Statement for the Record Honorable Michael Arms Export Control Act of 1976, Public Law
D. Lumpkin, Assistant Secretary of Defense 94-329 § 301, 90 Stat, 94th Cong., 2nd sess.
Special Operations and Low-Intensity Con- (June 30, 1976), 750.
flict,” 113th Congress, November 12, 2014; 87
JP 3-20, 37.
House Armed Services Committee, “HASC 88
Aram Roston and David Rohde, “Egyp-
Update: DOD Response to the Ebola Outbreak tian Army’s Business Side Blurs Lines of U.S.
The Advent of I
t has been three decades since the
passage of the Goldwater-Nichols
Department of Defense Reorganiza-
tion Act of 1986, a piece of legislation
76 Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
with a buildup of forces in Saudi Arabia This article examines the concerns On October 14, 1983, rivalry within
and an offensive that drove the Iraqis Goldwater-Nichols was meant to address the Marxist People’s Revolutionary
out of Kuwait—the Gulf War. Its success and demonstrates that the United States Government of Grenada resulted in a
seemed a vindication for Goldwater- and its coalition partners would have militant coup and the execution of the
Nichols specifically and joint operations achieved victory in the Gulf War even country’s leader, Prime Minister Maurice
more generally. General H. Norman without the legislation. What follows is an Bishop. The resulting chaos threatened
Schwarzkopf, USA, the commander in explanation of the historic context lead- the safety of more than 650 American
chief of U.S. Central Command, an- ing to Goldwater-Nichols, its application medical students on the island.6 This led
swered to Secretary of Defense Richard in Operation Just Cause (1989), and an to the U.S. launch of Operation Urgent
Cheney through the Chairman of the abridged overview of Operations Desert Fury on October 25. The deployed force
Joint Chiefs of Staff, General Colin Shield and Desert Storm. The balance of for this mission consisted largely of a
Powell. Lieutenant General Charles the article deals with the varying opinions joint Army and Marine ground force,
Horner, USAF, who held the newly of jointness in the Gulf War. It provides supported by special operations, naval,
established position of Joint Forces Air an analysis summarizing the ideas of the and air assets. The mission resulted in the
Component Commander (JFACC), was authors and delivers recommendations to successful rescue of 720 U.S. and foreign
in control of the air war. military leadership. Above all, jointness citizens and the restoration of popular
With the hindsight of a quarter- must be continually developed in order to government on the island at a cost of 135
century since the conflict, the verdict on maintain its effectiveness. U.S. casualties.7
jointness in the Gulf War is now more Although generally viewed as a suc-
nuanced. In part, this is due to the fact Operations Eagle Claw cess by military leaders, Urgent Fury was
that the U.S. military failed to replicate and Urgent Fury marred by many of the same issues that
the spectacular success of Operation On November 4, 1979, militant follow- plagued Eagle Claw. There were fail-
Desert Storm in subsequent engage- ers of the Ayatollah Ruhollah Khomeini ures of communication and equipment
ments.2 Also, the Services had not all overran the U.S. Embassy in Tehran, shortfalls, as Army units were unable
embraced jointness without reservations. taking 66 American citizens hostage. to coordinate air support with naval as-
The Marine Corps seemed the most When diplomatic negotiations proved sets. Assault plans were not coordinated
skeptical of the benefits of jointness, and fruitless, DOD planned a raid to liber- between Services prior to combat opera-
their limited interoperability with other ate the hostages with a joint task force tions, leaving units largely unaware of
Services during the Gulf War appeared to (JTF) comprised of personnel from four what adjacent unit objectives were and
reinforce their doubts. of the military Services. In April 1980, how they fit into the overall scheme of
Jointness clearly was not the decisive the JTF attempted its rescue operation, maneuver. These shortcomings resulted
factor in the coalition victory in the codenamed Eagle Claw. The result was in fratricide and the inadvertent bombing
Gulf War, although it was likely a posi- a complete disaster, culminating in a of noncombatants.8 The complications
tive contributing factor. The superiority fatal collision between a U.S. helicopter suffered in Iran and Grenada eventually
of the coalition forces over Iraqi forces and supporting C-130. No hostages led Congress to pass Goldwater-Nichols,
was so comprehensive that it alone was were rescued, and eight members of triggering the largest reorganization since
sufficient to achieve the mission objec- the JTF were killed. Additional losses the formation of DOD in 1947.9
tives. The coalition was better equipped, included aircraft, equipment, and secret
better trained, and better led than the documents.3 Passage of Goldwater-Nichols
Iraqis. The coalition benefited from wide- In May 1980, a special commis- The year prior to Urgent Fury, Chair-
spread international support, especially sion chartered by the Joint Chiefs of man of the Joint Chiefs of Staff General
regional support, and focused objectives. Staff examined the operation’s failure. David C. Jones told the House Armed
Moreover, jointness was not fully realized The review’s chairman, Admiral J.L. Services Committee, “The system is
during the operation. In some cases, it Holloway III, USN (Ret.), identified broken. I have tried to reform it from
was improperly applied. U.S. forces are the “major issues” that ultimately led to the inside, but I cannot. Congress is
much closer to realizing the full pos- the operation’s demise.4 These included going to have to mandate necessary
sibilities of jointness today, after several separate training between the units prior reforms.”10 He stressed the need for
years of major combat operations and to the mission, a muddled command and “an organization which will allow us
counterinsurgencies in the Middle East. control hierarchy, and problems with to develop the proper strategy, neces-
The concept of globally integrated opera- equipment interoperability.5 Congress sary planning, and the full warfighting
tions, introduced by then–Chairman of failed to act decisively on the findings of capability.”11 To accomplish these goals,
the Joint Chiefs of Staff General Martin the Holloway Commission, but events in Congress sought the following changes:
Dempsey in 2012, may further help in the Caribbean a few years later would fur-
•• clarifying the military chain of
the development of jointness as a con- ther the argument for legislative reform.
command from operational com-
tinuous state of military operations.
78 Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
Airman, front, of 68th Aeromedical Evacuation Squadron (AES), Norton Air Force Base, Airman, right, of 118th AES, Tennessee Air National Guard, and
Airman, left, of 137th AES receive mission briefing during Operation Desert Storm (U.S. Air Force/Kimberly Yearyean)
or landmarks, or fly them to Iran for pro- the Kuwaiti border, engaging a mecha- Desert Storm “raised the execution of
tection.31 Moreover, Iraqi responses were nized infantry division and armored joint warfare to an unprecedented level
disjointed and ineffective. They launched division of Saddam’s elite Republican of competence.”40
Scud missiles at Saudi Arabia to cause Guard.36 All the attacks succeeded spec- James Locher, a former staffer on the
terror and at Israel to draw it into the tacularly, and by February 26, Kuwaiti Senate Committee on Armed Services,
conflict and thus wreck the coalition, but forces were able to march into Kuwait observed the widespread approval of the
these efforts ultimately failed.32 Similarly, City as part of an army of liberation.37 operational chain of command estab-
a desperate Iraqi assault at Khafji in late The Iraqi forces had been reduced to a lished by the legislation. He considered
January was repulsed.33 disorganized mob attempting to retreat the recognition of its success to be “uni-
The coalition launched its ground back to their homeland. The next day, the versal.” According to Locher, William
offensive at 3:00 a.m. on February 24 coalition declared a ceasefire. Kuwait was Perry, Secretary of Defense in the Bill
with a three-pronged attack. In the liberated. The Gulf War was won.38 Clinton administration, remarked to
east, the 1st Marine Expeditionary Force the committee, “All commentaries and
advanced into southeast Kuwait, sup- Positive Reactions to after-action reports on [Desert Shield/
ported by the multinational Joint Forces Jointness in Desert Storm Desert Storm] attribute the success of
Command–East.34 In the west, XVIII Many viewed the overwhelming success the operation to the fundamental struc-
Corps, including the 101st Airborne of the Gulf War as a vindication of tural changes in the chain of command
Division and 24th Infantry Division, Goldwater-Nichols and a clear sign of brought about by Goldwater-Nichols.”41
along with the French Daguet 6th Light the benefits of joint warfighting. Harry Katherine Boo, writing for the
Armored Division, maneuvered north be- G. Summers, in On Strategy II, stated Washington Monthly, proclaimed that
fore swinging east toward Highway 8, to that the legislation was “long overdue” the effects of Goldwater-Nichols were
the rear of Iraqi forces in Kuwait.35 In the and credited it with attaining unity of “gloriously apparent” in the Gulf War
center, U.S. VII Corps and the British 1st effort in the operation.39 Robert H. victory.42 She placed upon the Services
Armored Division drove into Iraq near Scales, in Certain Victory, wrote of how much of the blame for the then-recent
80 Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
Air-to-air view of two U.S. Air Force F-15C Eagle fighter aircraft of 33rd Tactical Fighter Wing, Eglin Air Force Base, and Royal Saudi air force F-5E Tiger II
fighter aircraft during mission in support of Operation Desert Storm (U.S. Air Force/Chris Putman)
However, this championing of both late changes to the air tasking order and tive and inevitable. The point is that the
airpower and jointness was not necessarily listing preferred targets as secondary in Services must see jointness as a normal
shared by the other Services. According the hope of increasing the likelihood for state of operations, not a special condi-
to Weitz, Navy aviators believed the joint approval.60 tion to be used only during wartime.
air campaign limited their involvement. It should come as no surprise that the Also, jointness is not a cure-all for the
Both the Navy and Marine Corps were Marines were the most reluctant to buy multitude of problems that emerge in
skeptical of the doctrinal legitimacy of the into the joint warfighting concept. The the conduct of war. In fact, the learning
JFACC concept.57 The communication Marines had, and retain, a reputation curve of the Services operating together
systems aboard Navy aircraft were in- for independence and self-sufficiency in can create its own short-term problems.
compatible with the secure systems of the land and air operations. Their symbiotic The ultimate benefit of achieving unity
Airborne Warning and Control System, relationship with the Navy was in place of effort necessitates the Services work
which limited the Navy’s ability to con- centuries before Goldwater-Nichols. through these challenges.
duct missions over Kuwait and Iraq.58 They were thus less likely to embrace a Jointness requires continuous in-
There were plenty of disputes between concept that would potentially disrupt teroperability among the Services. The
Army and Air Force personnel regard- this composition. As a case in point, spe- idea that the U.S. military would fight as
ing target selection. The mutual distrust cial conditions regarding the deployment a joint team, then separate into its Service
manifested itself with the Army disputing of Marine air assets have been incorpo- corners in peacetime, mutes the long-
many of the claimed strikes and damage rated into joint doctrine.61 term benefits of joint operations. Now
assessments of the Air Force pilots.59 that our military has waged major combat
Perhaps the most serious disagree- Jointness for the Long Term and counterinsurgency operations for 15
ments were between the Air Force and This article is not a criticism of the years in Afghanistan and Iraq, it is adopt-
Marines. The Marines, distrustful of idea of jointness. The current nature ing a more realistic, workable method of
the joint air tasking cycle process that of war, in both tempo and scope, and operating jointly.
selected targets and assigned sorties, the limited resources now available for In 2014, William Odom and
admittedly gamed the system by offering national defense make jointness impera- Christopher Hayes stated, “Today the
separate military Services that make up Dempsey’s goal was for the Services to work properly, it must be a continuous
America’s Armed Forces work together become “pervasively interoperable,” with state, not merely a temporary condition
more often than at any time in the the result being that Servicemembers for the Services to participate in dur-
Nation’s history. Their success over the throughout the military would see them- ing contingencies. While Desert Storm
last decade of war has cemented the selves as part of a joint force.65 obscured its impact on mission success,
power of ‘jointness’ in accomplishing D.H. McCauley of the Joint Forces 15 years of continuous joint operations
military objectives.”62 It is only through Staff College concurred with General have provided a more sober perspective.
time, and continuous operations, that a Dempsey’s advocacy of globally inte- Globally integrated operations are a prac-
truly joint force can take form. Fittingly, grated operations. The dynamic nature tical attempt to apply jointness to modern
“perseverance” is a joint principle of war.63 of the modern international environment warfare.
General Martin Dempsey offered demanded a change in force posture:
a viable solution to these issues with Conclusion
the introduction of globally integrated Given the Chairman’s new operating Jointness was not the decisive factor
operations in the Capstone Concept for concept of globally integrated operations, in the coalition’s victory over Saddam
Joint Operations in September 2012. The the military will transform from a conven- Hussein’s Iraqi forces in the Gulf War.
idea was to require “a globally postured tionally focused and capital-intensive (for There were several factors to the victory,
Joint Force to quickly combine capa- example, costly weapons systems such as the including superior technology, leader-
bilities with itself and mission partners F-35) force to one oriented on small, adapt- ship, international support, plentiful
across domains, echelons, geographic able, globally deployable units that require resources, and limited objectives. It is
boundaries, and organizational af- well-trained, experienced counterinsur- more accurate to say jointness was a
filiations.”64 Among the implications gency forces and military police.66 positive contributing factor.
of globally integrated operations are a Goldwater-Nichols was an attempt to
professional military education focus on Although it took over two decades correct the failings of coordination and
mission command and jointness. General to recognize, if jointness is going to synchronization between the Services
82 Recall / The Advent of Jointness During the Gulf War JFQ 85, 2nd Quarter 2017
and to allow the combatant command-
4
James L. Holloway, Rescue Mission Report 40
Robert H. Scales, Jr., Certain Victory
(Washington, DC: Joint Chiefs of Staff, 1980), (Washington, DC: Office of the Chief of Staff
ers to conduct operations as they best 56. of the United States Army, 1993), 370.
saw fit without undue interference from 5
McInnis, 3. 41
James R. Locher III, “Taking Stock of
multiple commands. Its simplification 6
Sharon Tosi Lacey, “Grenada 1983: Small Goldwater-Nichols,” Joint Force Quarterly 34
of the operational chain of command is Island, Big Lessons: A Three-day Cold War (July 2003), 36–37, brackets in source docu-
perhaps its most highly valued and endur- Clash in the Caribbean Had Far-Reaching Im- ment.
pacts on American Joint Operation,” Military 42
Boo, 32.
ing contribution. It is less clear how well
History (2013), 46–48. 43
Ibid., 33–35.
it accomplished its other goals by the 7
Ronald H. Cole, “Grenada, Panama, and 44
Ibid., 33.
time of the Gulf War. The Service chiefs Haiti: Joint Operational Reform,” Joint Force 45
Dominic J. Caraccilo, “Desert War
had to tolerate their new role as advisors Quarterly 20 (Autumn–Winter 1998/1999), Taught Lessons in How Superpower Uses
subordinate to the Chairman of the Joint 59. Force,” Army Magazine 65, no. 7 (2015), 45.
8
Lacey, 52. 46
Richard Weitz, “Jointness and Desert
Chiefs of Staff, and the Services had to 9
Ibid., 53. Storm: A Retrospective,” Defense and Security
accept their restriction to administrative 10
James R. Locher III, “Has It Worked?” Analysis 20, no. 2 (2004), 133.
and organization functions, but inter- Naval War College Review 54, no. 4 (2001), 47
Don D. Chipman, “Desert Storm and the
Service rivalry persisted. It appeared that 101. Triumph of Joint Warfare Planning,” Air Power
the Services saw jointness as a wartime
11
McInnis, 6. History 52, no. 1 (2005), 54.
12
Ibid., 8. 48
Fred Franks and Gregory Fontenot,
condition, while peacetime would remain 13
Katherine Boo, “How Congress Won the “Decisive U.S. Response Was Both End of an
Service-centered. The problem with this War in the Gulf,” Washington Monthly 23, no. Era, Birth of a New One,” Army Magazine 65,
notion was that the Services would have 10 (October 1991), 35. no. 7 (2015), 43.
to learn to be joint again each time a new 14
Richard Fournier, “A Just Cause in 49
Gordon and Trainor, xiv.
conflict arose. Panama,” Veterans of Foreign Wars Magazine 1 50
Weitz, 146.
(2015), 23. 51
Boo, 36.
It was not until the continuous joint 15
James H. Embrey, “Operation Just 52
Owens, 52–53.
operations of the war on terror com- Cause: Concepts for Shaping Future Rapid 53
Watson, 218.
pelled the Services to work together on a Decisive Operations,” in Transformation Con- 54
Price T. Bingham, “Air Power in Desert
regular basis that the concept of jointness cepts for National Security in the 21st Century, Storm and the Need for Doctrinal Change,”
started to become fully realized. General ed. Williamson Murray (Carlisle Barracks, PA: Airpower Journal 5, no. 4 (1991), 33.
Strategic Studies Institute, 2002), 202. 55
Ibid.
Dempsey’s concept of globally integrated 16
Ibid., 198, 205. 56
LeMay Center for Doctrine, “Airmen’s
operations is poised to continue this de- 17
Ibid., 223. Perspective,” available at <https://doctrine.
velopment, so that future military leaders 18
Ibid., 236. af.mil/download.jsp?filename=V1-D24-Air-
will think of jointness as second nature 19
Ibid., 234. mans-Perspective.pdf>.
to their operations. It is recommended
20
Bruce W. Watson et al., Military Lessons 57
Weitz, 136–137.
of the Gulf War (London: Greenhill Books, 58
Ibid., 141.
that military officers at all levels study
1993), 15. 59
Ibid., 137.
and recognize both the benefits and the 21
Michael R. Gordon and Bernard E. 60
Ibid., 139.
challenges of jointness. It is only through Trainor, The Generals’ War: The Inside Story of 61
JP 1, IV-4.
persistent synchronization and collabora- the Conflict in the Gulf (Boston: Little, Brown 62
William O. Odom and Christopher D.
tion that the Services can fully realize the and Company, 1995), 14. Hayes, “Cross-Domain Synergy: Advancing
22
Ibid., 49. Jointness,” Joint Force Quarterly 73 (2nd Quar-
possibilities of joint operations and build 23
Ibid., 52. ter 2014), 123.
appropriate coordinating mechanisms 24
Watson, 81. 63
JP 3-0, Joint Operations (Washington,
and practices organically. JFQ 25
Ibid., 246. DC: The Joint Staff, 2011), A-4.
26
Ibid., 226. 64
Martin E. Dempsey, Capstone Concept
27
Ibid., 69. for Joint Operations (CCJO): Joint Force 2020
28
Damian J. McMarthy and Susan A. (Washington, DC: The Joint Staff, 2012), 4.
Notes Medlin, “Two Hats for the Joint Force Com- 65
Ibid., 8–10.
mander?” Joint Force Quarterly 25 (Summer 66
D.H. McCauley, “Globally Integrated
1
Doctrinally described as “cross-Service
2000), 91. Operations: A Reflection of Environmental
combination wherein the capability of the joint 29
Gordon and Trainor, 209–210. Complexity,” Joint Force Quarterly 71 (4th
force is understood to be synergistic, with the 30
Ibid., 216. Quarter 2013), 66.
sum greater than its parts.” See Joint Publica- 31
Watson, 70.
tion (JP) 1, Doctrine for the Armed Forces of 32
Ibid., 180–181.
the United States (Washington, DC: The Joint 33
Gordon and Trainor, 285–286.
Staff, 2013), ix. 34
Watson, 96–98.
2
Mackubin T. Owens, Jr., “Goldwater- 35
Ibid., 99, 111.
Nichols: A Ten-Year Retrospective,” Marine 36
Ibid., 101–102, 111–113.
Corps Gazette 80 (1996), 52–53. 37
Ibid., 110.
3
Kathleen J. McInnis, Goldwater-Nichols 38
Ibid., 116–118.
at 30: Defense Reform and Issues for Congress, 39
Harry G. Summers, Jr., On Strategy II:
R44474 (Washington, DC: Congressional
A Critical Analysis of the Gulf War (New York:
Research Service, June 2, 2016), 3.
Dell Publishing, 1992), 241.
n September 2012, Taliban insur- 14, 15 insurgents exploited a weak- Marine Corps AV-8B Harriers and
88 Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
$200 million in damage,1 but the most Background coalition forces and contractors that were
tragic losses were two U.S. Marines, By September 2012, the International not operating as one team. The interac-
killed during the firefight that also Security Assistance Force (ISAF) was tions between these units were regulated
injured 17 U.S. and British personnel.2 in the midst of the drawdown from the by a memorandum of understanding,
The causal factors permitting this Afghanistan surge and was under pres- under which the Camp Bastion and
attack to happen included a convoluted sure to begin turnover of responsibility Camp Leatherneck SECFOR operated
force protection task organization, lack for security to the Afghan forces. The independently with separate standard
of unit integration, and failure to identify overall number of ISAF soldiers in operating procedures and did not effec-
a single tactical-level commander with Afghanistan was steadily drawing down tively coordinate perimeter surveillance or
the responsibility for base defense, all of from a high of more than 130,000; on patrol activity on and off base.
which contributed to and were exacer- September 10, the number stood at Camp Bastion was defended by a
bated by failures in risk management.3 112,579, with 74,400 of those from the 134-person unit from the Royal Air Force
Complex operating environment or not, United States.5 The BLS complex (now (RAF) regiment, assisted by an augment-
this tragic incident was avoidable. If the called Camp Shorabak by the Afghan ing force drawn from other assigned units
defending security forces were better government) in Helmand Province was along with a small force of the Tongan
organized and not decremented to the home to more than 20,000 coalition Defense Services. The RAF provided
point that they were not reasonably ca- personnel. Major General Gurganus headquarters, a quick reaction force
pable of effectively maintaining a secure was commander of ISAF’s Regional (QRF), and patrols, while the Tongans
perimeter or dominating the terrain im- Command–Southwest (RC[SW]), and the augmentation force personnel
mediately around the base, the insurgents headquartered on BLS. RC(SW) manned the perimeter towers. Of the 24
would have been much less likely to have encompassed a 99,700-square-kilometer towers on Camp Bastion, only 11 were
gained access to the aircraft parking area. area made up of Nimruz Province and routinely manned due to a lack of avail-
Clearly, this incident required the the troubled Helmand Province, with a able personnel, a risk accepted by the
assessment of responsibility. The U.S. host nation population of approximately RAF Camp Bastion commander.9
commanders responsible for the defense 1.1 million.6 RC(SW) was supported by The Camp Leatherneck defense
of the BLS complex, Marine Corps Major the 3rd Marine Aircraft Wing (Forward), comprised 255 contractors, a 288-per-
Generals Charles Gurganus and Gregg commanded by Major General Stur- son force from the Jordanian military, a
Sturdevant, were censured and asked to devant, headquartered and primarily 105-member element from the Bahraini
retire following the completion of the U.S. operating from BLS. In March 2012, armed forces, and a 110-member team
Central Command (USCENTCOM) RC(SW) included 17,800 U.S. Marines. from 2d Battalion, 10th U.S. Marine
investigation. Furthermore, as the By September 2012, there were 7,400.7 Regiment (2/10), a field artillery unit.10
British House of Commons Defence This force drawdown necessitated oper- The contractors and non–U.S. military
Committee’s report concluded: ational and tactical force allocation and personnel manned entry control points,
mission curtailment decisions. These perimeter towers, and provided internal
Insufficient attention was given to the fun- decisions were risk management calcula- QRF for Camp Leatherneck, while
damental requirement of defending Camp tions, accounting for force protection. the Marines performed a myriad of
Bastion from external assault. We believe Major General Gurganus’s higher com- security-related tasks. Camp Shorabak
that this was complacent. Given that the mander, U.S. Army Lieutenant General (formerly Camp Bastion) is an Afghan
attack took place in the British sector of James Terry, stated that “there was a ministry of defense airbase located
the camp, British commanders must bear constant balance between projecting northwest of the city of Lashkar Gah,
a degree of responsibility for these systemic forces and protecting the force during in Helmand Province, and the 2/10
failures.4 this period with priority to protecting commander had primary responsibility
the force.”8 for off-base patrolling in the approxi-
It is evident that the risk management In terms of tactical elements or- mately 1,000-square-kilometer area of
decisions of the British commander of ganized to defend BLS, the base was operation (AO) surrounding BLS.11
Camp Bastion were found to be lacking. a complex of camps grouped primar- The task force responsibilities included
Beyond individual accountability, an ily in three areas. Camp Bastion, “providing [field artillery] support for
examination of the doctrinal and opera- including the airfield, was operated and Task Force (TF) Leatherneck, operating
tional context is necessary in order to defended largely by British forces. Camp the Combined Joint Operations Center
address shortcomings and decrease the Leatherneck was the Marine Corps area, (CJOC), manning [entry control points]
possibility of similar incidents during fu- and Camp Shorabak was the Afghan on Camp Leatherneck, manning a QRF,
ture operations. Specifically, joint doctrine National Army area. The entire complex manning Patrol Base Boldak, and man-
addressing security in theater must stress was contained within a 37-kilometer-long ning the Tactical Recovery of Aircraft
the importance of planning to secure stra- perimeter. The security force (SECFOR) and Personnel (TRAP) mission.”12 Due
tegic airfields and logistical hubs. available included a broad array of to their varied responsibilities, the 110
90 Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
Marine with Mobile Assault Platoon 4, Weapons Company, 1st Battalion, 25th Marine Regiment patrols southern Washir District, Helmand Province,
October 2, 2011
tension between projecting power and [joint security operations] within the base command. . . . Unity of command would
force protection. JP 3-10 should direct boundary22 to a single commander.”23 have provided the single commander
commanders to incorporate all available These are valuable improvements to the with common oversight and enforcement
units into base security plans but not to document, but some thorny issues remain of standards for all units responsible for
draw from them as the primary source of unresolved. For example, the challenge of protection of the BLS Complex.”24 If
SECFOR. Units tasked as SECFOR must incorporating coalition forces is addressed current or future leaders see a fragmented
be specifically identified, trained, and de- only superficially. It is understood that SECFOR chain of command or lack of
ployed for that mission. This will provide U.S. joint doctrine only applies to U.S. organization similar to that which existed
commanders in theater the flexibility to forces. However, joint doctrine should at BLS prior to the 2012 attack, red flags
shift focus without taking imprudent risk. clearly direct commanders to ensure a should immediately go up, and corrective
Second, doctrine must stress the need single commander retains tactical control action must be taken promptly.
for a single commander at the appropriate of all coalition forces incorporated into a Lastly, the joint force must overcome
level with the authority and responsibility base cluster SECFOR. The United States cultural resistance to expanding the base
over not only the base or base cluster, but should be more insistent on this when boundary of critical air bases in theater
also the surrounding tactically relevant it comes to national caveats or coalition based on threat, vulnerability, and ter-
AO. JP 3-10 currently includes “Air command and control arrangements. rain analysis. Currently, the concept of
Base Defense Considerations”20 and the Rather than dismissing this assertion expanding the base boundary is included
“establishment of base and base cluster as politically naive, challenge others to in JP 3-10 as something commanders
command relationships,”21 directing “it justify why irresponsibly vague com- should “consider.” Rather, it should be
is critically important that the JFC [joint mand structures are acceptable. In the the preferred procedure, while retain-
force commander], normally through case of BLS, the USCENTCOM report ing the flexibility to adjust due to local
the JSC [joint security coordinator], stated that “the BLS Complex also conditions. A base commander with
delegate the authority to conduct JSO lacked a single commander with unity of base defense as a key component of the
92 Joint Doctrine / Improving Joint Doctrine for Security in Theater JFQ 85, 2nd Quarter 2017
authority, command, and effort is criti- We can do better to set up future
21
Ibid., II-11.
22
JP 1-02, Department of Defense Diction-
cal to success and applicable to joint or commanders for success by improving JP ary of Military and Associated Terms (Washing-
coalition forces. The Air Force uses the 3-10 to increase the likelihood of sound ton, DC: The Joint Staff, November 8, 2010,
term base security zone to describe the area risk management and coherent, tacti- as amended through February 15, 2016). The
outside of the base perimeter fence/ob- cally effective base defenses around our DOD dictionary defines the base boundary as
stacle line from which enemy forces could power projection platforms in theater. “a line that delineates the surface area of a base
for the purpose of facilitating coordination and
attack the base or affect air operations Our responsibility to current and future
deconfliction of operations between adjacent
using standoff threats. This concept is not Soldiers, Marines, Sailors, and Airmen units, formations, or areas.”
unique to the Air Force as it is equally demands no less. JFQ 23
JP 3-10, II-12.
important to all large joint use bases 24
AR 15-6, 26.
supporting joint operations. The base
25
Air Force Manual 31-201, Security Forces
History, vol. 1 (Washington, DC: Department
security zone should be identified during Notes of the Air Force, June 1, 2015), 16–17.
a terrain and threat analysis and be used 26
Ibid., 17.
to modify the base boundary as described
1
Alissa J. Rubin, “Audacious Raid on 27
Ibid.
NATO Base Shows Taliban’s Reach,” New York
in JP 3-10 to enable effective base defense Times, September 16, 2002, available at <www.
28
Amir Shah et al., “Taliban Attack Key
operations driven by a single commander U.S. Base in Afghanistan, Killing 1 U.S. Con-
nytimes.com/2012/09/17/world/asia/
tractor, Wounding 9 Troops,” Associated Press,
at the appropriate tactical level. green-on-blue-attacks-in-afghanistan-continue.
May 18, 2010, available at <www.foxnews.
html?pagewanted=all&_moc.semityn.www>.
com/world/2010/05/18/insurgents-launch-
2
“Army Regulation (AR) 15-6 Investiga-
Conclusion complex-attack-bagram-air-field.html>.
tion of the 14–15 September 2012 Attack on
U.S. forces took courageous action the Camp Bastion, Leatherneck, and Shorabak
29
Joint Training Counter IED Operations
during attacks on Bagram, Joint Base Integration Center, Sims Directorate Video,
(BLS) Complex, Helmand Province, Afghani-
“Airfield Complex Attack, Bagram Airfield
Balad, and BLS. In 2010 at Bagram, a stan,” August 19, 2013, 2.
Afghanistan,” December 5, 2011.
complex attack was defeated without 3
Ibid., 23–31. 30
Ibid.
significant impact on coalition opera-
4
House of Commons, Defence Committee, 31
Christopher J. Willis, “Bagram Se-
“Afghanistan—Camp Bastion Attack,” April
tions, and Balad was never penetrated 16, 2014, 15.
curity Forces Group Stands-Up,” Defense
by a significant insurgent force. Both Video Imagery Distribution System, January
5
“ISAF: Key Facts and Figures,” Septem-
1, 2013, available at <www.dvidshub.net/
stand in stark contrast to BLS, where ber 10, 2012, available at <www.nato.int/
news/104996/bagram-security-forces-group-
the appearance of a secure perimeter isaf/placemats_archive/2012-09-10-ISAF-
stands-up>.
did not withstand scrutiny. The key Placemat.pdf>.
6
Institute for the Study of War, “Regional
differences at BLS were the fragmented Command South,” 2009, available at <www.
base defense chain of command, inco- understandingwar.org/region/regional-com-
herent responsibility for security below mand-south-0>.
the two-star RC(SW) level, and lack of 7
Jim Michaels, “Two Generals Asked to
SECFOR integration. These factors, Retire in Wake of Bastion Attack,” USA Today,
September 30, 2013, available at <www.usato-
combined with optimistic risk manage- day.com/story/news/world/2013/09/30/
ment decisions by key leaders, left the bastion-marines-afghanistan-gurga-
base vulnerable to enemy attack. nus/2897953/>.
In future operations, enemies will 8
AR 15-6, 7.
continue to target critical coalition air
9
Ibid., 8.
10
Ibid., 9.
and logistics hubs in theater in order to 11
Katherine Keleher, “Task Force Belleau
disrupt our ability to project power and Wood Marines, Partners Celebrate Corps’ 236th
sustain operations. During major com- Birthday,” November 12, 2011, available at
bat operations, these threats will likely <www.iimef.marines.mil/News/NewsArticle/
include unconventional means such as tabid/472/Article/528985/task-force-belleau-
wood-marines-partners-celebrate-corps-236th-
enemy special operations forces or proxy birthday.aspx>.
insurgent/terrorist groups, in addition 12
AR 15-6, 10.
to conventional attack. Future attackers 13
Ibid., 17.
may be much better trained and prepared 14
House of Commons, 12.
than those at BLS in 2012. Therefore,
15
AR 15-6, 18.
16
Ibid., 22.
effective integrated base defense planning 17
Ibid., 6.
and execution in theater are critical across 18
Ibid., 2.
the spectrum of conflict and must not be 19
Joint Publication (JP) 3-10, Joint Security
dismissed as an exercise in preparing for Operations in Theater (Washington, DC: The
the last war. Joint Staff, November 13, 2014), xiv–xv.
20
Ibid., IV-17.
94 Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
To this end, ongoing efforts to adapt Historical Overview Today, SC more broadly supports the
the disparate entities and authorities as- In 1971, the Secretary of Defense combatant command’s entire theater
sociated with SC into a unified strategy established the Defense Security Assis- campaign plan.
serve as an important next step. In 2008, tance Agency (DSAA) to direct, admin- Subsequent developments in SC
DOD published a directive that elevated ister, and supervise the execution of further expanded its scope by adding
the requirement for DOD expertise for approved SA plans and programs, such authorities from U.S. Code Title 10 for
SC activities to the same level as other as military assistance, international mili- programs such as multinational exer-
“integral [conventional] DOD activities.”3 tary education and training, and foreign cises—a move designed to gain synergy
To achieve parity, the Joint Doctrine military sales.5 In November 1997, the by coordinating peacetime Title 10 activi-
Development Community (JDDC) identi- Defense Reform Initiative transferred ties with Title 22 activities. Amended in
fied the need to incorporate the topic additional responsibility for program the reformative aftermath of the Vietnam
of SC into the joint publication library management of humanitarian assistance War, these Title 22 programs specifically
as Joint Publication (JP) 3-20, Security and demining, armaments cooperation, precluded the United States from em-
Cooperation. The approval of JP 3-20 is a export loan guarantees, and foreign ploying its forces in harm’s way using SA
major step toward the joint force recog- comparative testing functions, along funds. This contributed to a misunder-
nizing SC as a way to apply the military with their associated personnel and standing of both SA and SC as exclusively
instrument of national power in support resources, to DSAA. In October 1998, peacetime activities. This inaccurate
of partner nations (PNs) around the globe SC officially entered the DOD lexicon, conclusion led to confusion regarding
to achieve strategic objectives and to help accommodating the scope of these when and how SA and SC authorities
shape the operational environment for additional functions beyond DSAA’s and programs could and should be used.
current and future operations. This article traditional SA missions. This expansion Originally designed to limit American
outlines the continued adaptation of SC of mission necessitated a name change, participation in conflict, modern ver-
and the inextricable doctrinal security force hence DSAA’s redesignation as the sions of the vintage U.S. Lend-Lease
assistance (SFA) principles discussed in JP Defense Security Cooperation Agency.6 program, as the precursor to what we
3-20 that are applicable to the joint force. This consolidation of similar programs now know as SA, continue to evolve, but
JP 3-20 defines security cooperation from five dissonant agencies into one still contribute to the development of our
as “all DOD interactions with foreign stand-alone entity reflected efforts to foreign partners’ security force capacities
security establishments to build security improve efficiency and reduce adminis- and capabilities across the entire range of
relationships that promote specific U.S. trative redundancy. military operations.
security interests, develop allied and However, SC did not appear in The term security force assistance
friendly military capabilities for self- mainstream joint doctrine until mani- entered the DOD lexicon to provide
defense and multinational operations, and fested in a 2004 revision of JP 3-07.1, greater depth to the SC pillar of devel-
provide U.S. forces with peacetime and Joint Tactics, Techniques and Procedures oping PN capabilities. SFA was coined
contingency access to a partner nation.”4 for Foreign Internal Defense (FID). As (after early efforts in Iraq failed to create
These three categories, however, only the JDDC struggled to refine doctrinal a viable security force) to provide U.S.
hint at the true breadth and complexity treatment of SC, amended versions of forces with applicable means for develop-
of activities that make up the universe of then–JP 1-02, Department of Defense ing the capacity and capabilities of PN
security cooperation. Some SC activities Dictionary of Military and Associated forces and their supporting institutions.
are simple engagements between U.S. and Terms, revealed continuing efforts to The training of foreign security forces is
PN defense officials, while others are com- clarify myriad SC activities. Though a primary role of U.S. special operations
plex and may include multibillion-dollar not retained in the current JP 1-02, the forces. However, special operations forces
arms negotiations brokered at the highest meaning behind the original definition of were stretched to their limits conducting
levels of government through DOD- SC activity prevails: counterterrorism and counterinsur-
administered and Department of State–led gency operations throughout the Iraq
security assistance (SA) programs under Military activity that involves other and Afghanistan theaters of operation
U.S. Code Title 22 authority. These ex- nations and is intended to shape the and elsewhere. In response, significant
amples bracket the more common theater operational environment in peacetime. numbers of conventional forces were
security cooperation exercises routinely Activities include programs and exercises indoctrinated to conduct SFA activities
conducted within each geographic com- that the U.S. military conducts with other and further doctrine was developed. The
batant command’s area of responsibility. nations to improve mutual understanding initial incorporation of SFA into the 2010
While the recent and formal incorporation and improve interoperability with treaty replacement for JP 3-07.1, known after
of SC into joint doctrine may appear new, partners. They are designed to support a as JP 3-22, Foreign Internal Defense,
the United States has used various adapta- combatant commander’s theater strategy as defined it as DOD “activities that con-
tions of SC to protect and advance its vital articulated in the theater security coopera- tribute to unified action by the U.S.
interests abroad for decades. tion plan.7 Government to support the development
96 Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
MH-60R Sea Hawk helicopter assigned to Vipers of Helicopter Maritime Strike Squadron 48 conducts vertical replenishment training aboard guided-
missile cruiser USS Monterey, Gulf of Oman, November 21, 2016 (U.S. Navy/William Jenkins)
on security cooperation, SSR [secu- to clarify the joint force’s understanding executive, generating, and operating
rity sector reform], SFA, and FID.”14 of these relationships to JP 3-22, Foreign (EGO) functions that must be performed
Despite the eventual decision within Internal Defense. Complete resolution by any effective security force, while the
the JDDC to develop JP 3-20, many of of these complex relationships is tied to latter addresses the organize, train, equip,
the deliberations captured in this special current and future policy. The introduc- rebuild/build, and advise (OTERA)
study persist. tion of any subsequent terms or broader tasks associated with the conduct of SFA.
Because of its continued adaptation doctrinal content should reflect a com- EGO depends upon the delineation of
in policy and practice without a doctrinal mon understanding between multiple responsibilities for DOD as written in U.S.
anchor point, various interpretations of departments, as illustrated in PPD-23. Code Title 10. While many nations may
SC and its application have developed However, facilitating that common un- not want their defense apparatus to mimic
over time and still complicate under- derstanding is traditionally beyond the DOD, nor even possess the resources to
standing of the many terms related to scope of an operational-level publication. build similar organizations, they will need
its policies, programs, and authorities. With that in mind, JP 3-20 cursorily to perform these basic functions effectively
Such contention explains the conspicu- describes the sometimes hierarchical, in some way or fashion. When the United
ous omission and intentional exclusion sometimes conditional, and sometimes States has determined that it will help a
of much of the content of that original functional relationships among the SC- PN build capabilities, it must consider
lexicon discussion. Despite assuming and SFA-related programs and authorities which EGO function(s) require assistance.
the doctrinal responsibility for SFA and applicable to them. It does, however, Crafted to leverage expertise not available
promoting an articulation of the func- include appendix B, which explains two within U.S. operating forces, defense in-
tional relationships among SC, foreign particular SFA models relevant to devel- stitution building specifically addresses the
assistance, security assistance, SFA, and oping a viable and lasting security force. development of capacity and capabilities at
FID, JP 3-20 relegated the opportunity The first of these models represents the the ministerial level.
At this point, a second doctrinal SFA the PN. The “Employ” stage results in Security Cooperation establishes policy
model enables the United States to apply application of generated capacity or ca- that “prioritizes the outcomes that secu-
personnel and other resources as the pabilities toward their intended purpose. rity cooperation efforts should seek to
means to conduct SFA activities through The “Transition” stage shifts responsibil- achieve and provides additional guidance
one or more of the OTERA tasks. These ity for the generating and operational to the security cooperation enterprise
tasks roughly align with the DOTMLPF functions to the PN. The “Sustain” stage on Department-wide expectations for
and policy mechanisms of change used recognizes PN achievement of self-sus- planning, assessing, monitoring, and eval-
for U.S. joint force development, though taining capacity and capabilities across the uating (AME) security cooperation.”15
formatted as tasks for execution. Not EGO functions. This PGETS model ap- This guidance clearly describes the
yet recognized for inclusion in JP 3-20, plies to the development of an individual need for initial and follow-on assessment,
another SFA model offers a potential capability or an entirely new security force systematic monitoring to track imple-
solution to synchronizing U.S. activities (see figure). mentation and output, and evaluations
according to the level of development In form, the PGETS model evokes that analyze the relevance, effectiveness,
of the FSF. The development of ad- the familiar joint operation phasing and sustainability of SC activities not
ditional capacity and capabilities follows model as discussed in both JP 3-0, Joint well-detailed in JP 3-20, which enables
a distinctive pattern involving five con- Operations, and JP 5-0, Joint Planning, it to distinguish these efforts from
current stages with common activities: but transcends the doctrinal limitations of doctrinal operation assessment. It actu-
Plan, Generate, Employ, Transition, and its designed application at the operational ally offers a broader mechanism that
Sustain (PGETS). and tactical levels of joint operations. It complements operation assessment by
During the Plan stage, an assessment also complements the JP 3-22 efforts incorporating appropriate data from the
with the PN is conducted to help deter- to encapsulate an updated and viable measures of performance and measures
mine what the FSF must do to fulfill its framework or lexicon for SC and SFA at of effectiveness used to assess individual
role as a security force. Though planning this same level. By bridging the political SFA activities. Though contextualized
and resourcing activities comprise the and strategic levels where the prepon- for SC, this AME guidance may in fact
bulk of the activities during this stage, derance of SC guidance originates with warrant consideration for inclusion in the
they span all five stages. The majority of operational- and tactical-level details, keystone JP 5-0, as the need for feedback
the activities accomplished during the the PGETS model facilitates a linkage and accountability far exceeds the scope
“Generate” stage contribute to building not fully reflected in JP 3-20, whereby of Joint Doctrine Note 1-15, Operation
the required capacity and capabilities for the Department of Defense Guidance for Assessment. However, it is not without its
98 Joint Doctrine / Joint Publication 3-20, Security Cooperation JFQ 85, 2nd Quarter 2017
own complications, as that same DOD Figure. Notional Level of Effort by Stage (PGETS) Over Time
policy portrays AME as a part of yet an-
other competing SC framework.
Plan & Generate Employ Transition Sustain
On a much broader scale, the Resource Stage Stage Stage Stage
fiscal year 2017 National Defense Stage
Authorization Act promises even more
Level of Effort
comprehensive whole-of-government re-
form. In addition to enforcing standards Employ Activities
for AME, “the statutes will enhance the
Tr
an
flexibility, transparency, and oversight
sit
Su
io
of SC authorities and resources; profes-
st
n
ai
Ac
n
tiv
sionalize the workforce; and improve
Ac
Generate Activities
iti
tiv
es
alignment of security cooperation activi-
iti
es
Plan & Resource
ties to defense strategy.”16 The ensuing
consolidation of train-and-equip author-
Time
ity, SC programming, budgeting, and (Organize, Train, Equip, Rebuild, and Advise/Assist (OTERA) Conducted Throughout each Stage)
management responsibilities will clearly
impact future developments of SC and
SFA within joint doctrine. power while addressing these challenges. able at <www.dtic.mil/whs/directives/corres/
pdf/510565p.pdf>.
JP 3-20 fills a persistent doctrinal gap by 7
Introduced into Joint Doctrine in the
Current and future manifestations of codifying SC and SFA doctrine into the 2006 revision of JP 3-0, Joint Operations, the
the four-plus-one threat will continue to changing character of warfare as essential term security cooperation activity was removed
necessitate transregional, multifunctional, to shaping the operational environment in the 2011 revision of JP 3-0 and thus from
and multidomain solutions that involve and, protecting U.S. and PN security JP 1-02, Department of Defense Dictionary of
Military and Associated Terms (Washington,
much more than the military instrument interests now and into the future. JFQ
DC: The Joint Staff, November 8, 2010, as
of national power. JP 3-20 offers the joint amended through February 15, 2016).
force guidance to protect U.S. security 8
See “Special Message to the Congress
interests in this increasingly complex Notes on the Mutual Security Program,” March 13,
world, harmonized with the develop- 1959, available at <www.eisenhower.archives.
1
In order to address one of the priorities gov/all_about_ike/quotes.html>.
ment of PN capacity and capabilities.
of the Chairman of the Joint Chiefs of Staff 9
“Fact Sheet: U.S. Security Sector Assis-
While JP 3-20 might be new, the notion (CJCS), the director of the Joint Staff J7 Joint tance Policy,” April 5, 2013, The White House,
of enabling partners and allies to thwart Force Development Directorate created the available at <www.whitehouse.gov/the-press-
threats and facilitate enduring peace and Campaign Plan for Joint Force Development office/2013/04/05/fact-sheet-us-security-
stability around the globe comprises a Next. This campaign plan involves four lines of sector-assistance-policy>.
effort, one of which includes a task that ensures 10
Joint Operating Environment JOE 2035:
long and storied history. The dynamic
joint doctrine remains adaptive to operational The Joint Force in a Contested and Disordered
complexities of the current and future priorities by using adaptive processes and adap- World (Washington, DC: The Joint Staff, July
operating environment associated with tive products. 14, 2016).
persistent disorder and contested norms 2
See CJCS commencement remarks to the 11
“Capstone Concept for Joint Operations:
demand that the joint force array itself to National Defense University’s Class of 2017, Joint Force 2030,” draft, June 28, 2016.
titled “Dunford Details Implications of Today’s 12
DOD Security Force Assistance Lexicon
address not only the conventional threats
Threats on Tomorrow’s Strategy,” August 23, Framework, November 1, 2011 (incorporating
presented by state actors, but also those 2016, available at <www.defense.gov/News/ Change 1, April 27, 2012).
represented by identity networks and Article/Article/923685/dunford-details- 13
U.S. Government Accountability Office
other nonstate entities. This disposition implications-of-todays-threats-on-tomorrows- (GAO) Report to Congressional Committees,
must also reflect current fiscal realities strategy>. Security Force Assistance: Additional Actions
3
Department of Defense Directive Needed to Guide Geographic Combatant Com-
amid the various legal ramifications of
(DODD) 5132.03, “DOD Policy and Respon- mand and Service Efforts (Washington, DC:
national sovereignty that further strain sibilities Relating to Security Cooperation,” GAO, May 2012), 14.
multinational relationships. The doc- October 24, 2008, available at <www.dtic. 14
Joint and Coalition Warfighting Study
trinal planning constructs of EGO and mil/whs/directives/corres/pdf/513203_ on Security Force Assistance in Joint Doctrine,
OTERA, as well as other relevant but not dodd_2016.pdf>. November 2012.
4
JP 3-20, Security Cooperation (Washing- 15
“DOD Guidance for Security Coopera-
yet extant or validated practices such as
ton, DC: The Joint Staff, September 2016, tion,” memo from the Deputy Secretary of
PGETS and AME, present planners from Signature draft). Defense, August 29, 2016.
across the joint force with an organized 5
DODD 5105.38, “Defense Security As- 16
Fiscal Year 2017 National Defense Au-
approach to enhancing the operational sistance Agency,” August 11, 1971. thorization Act, Title XII, Subtitle E, Summary
effectiveness of U.S. joint forces and op- 6
DODD 5105.65, “Defense Security of Key Reforms, December 5, 2016.
timizing the application of U.S. military Cooperation Agency,” October 26, 2012, avail-
The lessons encountered in Afghanistan and Iraq at the strategic level inform our understanding of
national security decisionmaking, intelligence, the character of contemporary conflict, and unity of
effort and command. They stand alongside the lessons of other wars and remind future senior offi-
cers that those who fail to learn from past mistakes are bound to repeat them.
Available at ndupress.ndu.edu/Books/LessonsEncountered.aspx
Women on the Frontlines of Peace and Security
Foreword by Hillary Rodham Clinton and Leon Panetta
NDU Press, 2015 • 218 pp.
This book reflects President Barack Obama’s commitment to advancing women’s
participation in preventing conflict and keeping peace. It is inspired by the countless
women and girls on the frontlines who make a difference every day in their communities
and societies by creating opportunities and building peace.
Around the globe, policymakers and activists are working to empower women as
agents of peace and to help address the challenges they face as survivors of conflict.
When women are involved in peace negotiations, they raise important issues that might
be otherwise overlooked. When women are educated and enabled to participate in
every aspect of their societies—from growing the economy to strengthening the security
sector—communities are more stable and less prone to conflict.
Our understanding of the importance of women in building and keeping peace is
informed by a wide range of experts, from diplomats to military officials and from human
rights activists to development professionals. The goal of this book is to bring together
these diverse voices. As leaders in every region of the world recognize, no country can
reach its full potential without the participation of all its citizens. This book seeks to add
to the chorus of voices working to ensure that women and girls take their rightful place in
building a stronger, safer, more prosperous world.
Available at ndupress.ndu.edu/Books/WomenontheFrontlinesofPeaceandSecurity.aspx
Facebook Flickr
Twitter Pinterest