The Army has been involved with space-based military operations for well over a half-century. During this time, space operations have changed from a realm exclusive to scientists and engineers, to highly classified activities largely unknown to the general population, to the unveiling of space-based communication, imagery, surveillance, and environment capabilities that have become a foundation for all modern warfare. Today, such support is so ingrained into daily operations that most soldiers, sailors, airmen, and marines assume it has been, and always will be, available for their use. But with such reliance comes vulnerability that potential adversaries may try to exploit. The evolution of Army space operations is well documented in many sources, thus this monograph serves not as a comprehensive history or detailed critique of the myriad accomplishments. Rather, it serves as a primer for current and future space-based operations to provide senior policymakers, decisionmakers, military leaders, and their respective staffs an overall appreciation for existing Army space capabilities and the challenges, opportunities, and risks associated with their use in joint operations.
So-called gray zone wars are not new, but they have highlighted shortcomings in the way the West thinks about war and strategy. This monograph proposes an alternative to the U.S. military's current campaign-planning framework, one oriented on achieving positional advantages over rival powers and built around the use of a coercion-deterrence dynamic germane to almost all wars as well as to conflicts short of war.
Urbanization is one of the most important mega-trends of the 21st century. Consequently, the possibility of U.S. military involvement in a megacity or sub-megacity is an eventuality that cannot be ignored. After elucidating the nature of urbanization and developing a typology in terms of smart, fragile, and feral cities, we give consideration to the kinds of contingencies that the U.S. military, especially the Army, needs to think about and prepare for. Understanding the city as a complex system or organism is critical and provides the basis for changes in intelligence, recruitment, training, equipment, operations, and tactics.
One of the key takeaways is the need to understand the urban environment and the need to work with (instead of against) the flows and rhythms of a city. Without such an approach, the results of military involvement in such a formidable environment would likely be disastrous; with it, the prospects for success would at least be enhanced.
Counterinsurgency (COIN) continues to be a controversial subject among military leaders. Critics argue that the wars in Iraq and Afghanistan have made the U.S. military, particularly the Army, "COIN-centric." They maintain that equipping U.S. forces to combat insurgency has eroded their conventional war fighting capabilities. Those committed to preserving and even enhancing COIN capabilities, on the other hand, insist that doing so need not compromise the ability of the military to perform other tasks. They also point out that the likelihood of even a mid-level conventional war remains low while the probability of unconventional engagements is high. This monograph reviews the COIN debate, analyzes current force structure, and concludes that contrary to the more extreme positions taken by critics and proponents, the U.S. military has achieved a healthy balance between COIN and other capabilities.
Untruthfulness is surprisingly common in the U.S. military even though members of the profession are loath to admit it. Further, much of the deception and dishonesty that occurs in the profession of arms is actually encouraged and sanctioned by the military institution. The end result is a profession whose members often hold and propagate a false sense of integrity that prevents the profession from addressing—or even acknowledging—the duplicity and deceit throughout the formation. It takes remarkable courage and candor for leaders to admit the gritty shortcomings and embarrassing frailties of the military as an organization in order to better the military as a profession. Such a discussion, however, is both essential and necessary for the health of the military profession.
U.S. competitors pursuing meaningful revision or rejection of the current U.S.-led status quo are employing a host of hybrid methods to advance and secure interests contrary to those of the United States. These challengers employ unique combinations of influence, intimidation, coercion, and aggression to incrementally crowd out effective resistance, establish local or regional advantage, and manipulate risk perceptions in their favor. So far, the United States has not come up with a coherent countervailing approach. It is in this “gray zone”—the awkward and uncomfortable space between traditional conceptions of war and peace—where the United States and its defense enterprise face systemic challenges to U.S. position and authority. Gray zone competition and conflict present fundamental challenges to U.S. and partner security and, consequently, should be important pacers for U.S. defense strategy.
What does the Department of Defense hope to gain from the use of autonomous weapon systems (AWS)? This Letort Paper explores a diverse set of complex issues related to the developmental, operational, legal, and ethical aspects of AWS. It explores the recent history of the development and integration of autonomous and semi-autonomous systems into traditional military operations. It examines anticipated expansion of these roles in the near future as well as outlines international efforts to provide a context for the use of the systems by the United States. As these topics are well-documented in many sources, this Paper serves as a primer for current and future AWS operations to provide senior policymakers, decisionmakers, military leaders, and their respective staffs an overall appreciation of existing capabilities and the challenges, opportunities, and risks associated with the use of AWS across the range of military operations. Emphasis is added to missions and systems that include the use of deadly force.
Perhaps the best starting point for those looking to “borrow” a deterrent strategy for cyberspace from other fields is not the example of nuclear deterrence but instead the example of United States-Mexican border security. The nuclear deterrent analogy is not the best fit for understanding cyber-deterrence—due to the ways in which rewards and payoffs for would-be attackers in cyberspace are different from those in the nuclear analogy—among other factors. The emphasis here is not on deterrent effects provided by specific weapons but rather on the ways in which human actors understand deterrence and risk in making an attempt to violate a border, and the ways in which security architects can manipulate how would-be aggressors think about these border incursions. This Letort Paper thus borrows from the criminology literature rather than the military-security literature in laying out how individuals may be deterred from committing crimes in real space and in cyberspace through manipulating rewards and punishments. Lessons from attempts at deterring illegal immigration along America’s borders are then presented, with lessons derived from those situations, which are helpful in understanding how to deter incursions in cyberspace.
Leadership receives a tremendous amount of attention, but what about the day-to-day command challenges that confront O-4s, O-5s, and O-6s in today’s war zones? What has command entailed over the past decade and a half for special operations force (SOF) commanders who have deployed to Afghanistan (and Iraq) either to lead or to work under Special Operations Task Forces (SOTFs) or Combined Joint Special Operations Task Forces (CJSOTFs)? In both theaters, officers have had to contend with various competing hierarchies and significant churn. What then might the Army and military do to obviate or mitigate these and other problems? The contours of a potential solution are described and its benefits discussed.
Despite leaps in technological advancements made in computing system hardware and software areas, we still hear about massive cyberattacks that result in enormous data losses. Cyberattacks in 2015 included: sophisticated attacks that targeted Ashley Madison, the U.S. Office of Personnel Management (OPM), the White House, and Anthem; and in 2014, cyberattacks were directed at Sony Pictures Entertainment, Home Depot, J.P. Morgan Chase, a German steel factory, a South Korean nuclear plant, eBay, and others. These attacks and many others highlight the continued vulnerability of various cyber infrastructures and the critical need for strong cyber infrastructure protection (CIP). This book addresses critical issues in cybersecurity. Topics discussed include: a cooperative international deterrence capability as an essential tool in cybersecurity; an estimation of the costs of cybercrime; the impact of prosecuting spammers on fraud and malware contained in email spam; cybersecurity and privacy in smart cities; smart cities demand smart security; and, a smart grid vulnerability assessment using national testbed networks.