JFQ 78
JFQ 78
An Interview with
Martin E. Dempsey
21st-Century SOF
American Land Power in Korea
Joint Force Quarterly
Founded in 1993 • Vol. 78, 3rd Quarter 2015
http://ndupress.ndu.edu
Executive Editor
Jeffrey D. Smotherman, Ph.D.
Production Editor
John J. Church, D.M.A.
Copyeditor
Erin L. Sindle
Art Director
Marco Marchegiani, U.S. Government Printing Office
Advisory Committee
COL Michael S. Bell, USA (Ret.), Ph.D./College of International
Security Affairs; Maj Gen Brian T. Bishop, USAF/Air War College;
LTG Robert B. Brown, USA/U.S. Army Command and General Staff
College; BG Guy T. Cosentino, USA/National War College;
Col J. William DeMarco, USAF/Air Command and Staff College;
Col Keil Gentry, USMC/Marine Corps War College; Lt Gen David L.
Goldfein, USAF/The Joint Staff; BGen Thomas A. Gorry, USMC/
Dwight D. Eisenhower School for National Security and Resource
Strategy; Col Steven J. Grass, USMC/Marine Corps Command and
Staff College; RADM P. Gardner Howe III/U.S. Naval War College;
MG William E. Rapp, USA/U.S. Army War College; RADM John W.
Smith, Jr., USN/Joint Forces Staff College;
LtGen Thomas D. Waldhauser, USMC/The Joint Staff
Editorial Board
Richard K. Betts/Columbia University;
Stephen D. Chiabotti/School of Advanced Air and Space Studies;
Eliot A. Cohen/The Johns Hopkins University;
COL Joseph J. Collins, USA (Ret.)/National War College;
Mark J. Conversino/Air War College;
Thomas P. Ehrhard/Office of the Secretary of Defense;
Aaron L. Friedberg/Princeton University;
Col Thomas C. Greenwood, USMC (Ret.)/Office of the Secretary
of Defense; Douglas N. Hime/Naval War College;
Mark H. Jacobsen/Marine Corps Command and Staff College;
Col Jerome M. Lynes, USMC (Ret.)/The Joint Staff;
Kathleen Mahoney-Norris/Air Command and Staff College;
Thomas L. McNaugher/Georgetown University;
Col Mark Pizzo, USMC (Ret.)/National War College;
James A. Schear/Office of the Secretary of Defense;
LtGen Bernard E. Trainor, USMC (Ret.)
certain domains, and then you have to to contribute to foreign relations strategy can’t develop a relationship of trust and
account for this in military planning. as a statutory advisor of the National credibility—credibility first and trust sec-
So my successor will have to deal Security Council. In my early days, we ond, because trust is earned—then you
with the reality of state actors who can would go around the room, and the won’t be successful in contributing to our
now coerce and constrain us, as well as staff would be talking about something national security strategy.
nonstate actors. So, to your point, I don’t I didn’t want to talk about. Pick a topic.
think the pendulum will swing entirely Whatever it was, as it came around the Collins: You come down almost exactly
back to Russia or China as peer compet- room for me, I would say, “I am here at the same point JFK did after the Bay of
itors, but I think the institution will have as your military advisor; that is not a Pigs. He wrote instructions to the Joint
to adapt to have aspects of both in them. military issue.” And the President would Chiefs that said very much what you just
say, “Yes, but you are here, and I want said in the last 2 or 3 minutes. We have
Hooker: How should future senior officers your view on this strategic issue that has had a number of issues having to do with
who are combatant commanders or the national security implications.” detainees’ enhanced interrogation. Some
Chairman view their role in the highest If you are going to understand how of those shoes have not dropped yet for
councils of government? Are they there decisions are made in our government, the Department of Defense, military
to provide the best military advice only, or you must build relationships, and if commissions, and so forth. Were these
are they there, as Clausewitz noted, to be you’re going to build relationships, you problems inevitable, or did we get off on
both the statesman and general? have to demonstrate a certain gravitas. the wrong foot? If 10 years from now we
You’ve got to be able to have a con- have another situation akin to the situa-
General Dempsey: When you become a versation about grand strategy, not just tions in Afghanistan and Iraq, what would
senior military leader, you have multiple military strategy. If I had to give advice you tell your successor about the lessons
responsibilities, one of which is to give to my successors about job number one and how we did it in these two cases?
the best military advice possible, and in terms of being influential inside deci-
another is to help the force. But there is sionmaking boardrooms, it would be that General Dempsey: The detention opera-
a third one, too. I have the responsibility relationships matter most of all. If you tions have to be included in any campaign
plan that includes the use of military force aspirations than the reality, was that [we assumptions were flawed. So yes, we got
because we can’t ever put a young man or would] go into Iraq and we would be off on the wrong foot, but we also hadn’t
woman in the position where there’s no welcomed because we would be seen as done detainee operations since 1991.
possibility of detention. The alternative is liberators, and we could take as much But if you remember in 1991, the 96
capture and release, or kill not capture. risk getting out as we took getting in. Hour War, I can remember as part of VII
I think this is what happened in these One of the risks we took going in was Corps accumulating large numbers of
conflicts regarding detention operations. that we went in with fewer forces than Iraqi soldiers surrendering, and we pulled
You know what they say about campaign the commander thought he needed to them down into Saudi Arabia into tem-
assumptions: if the assumptions are flawed accomplish the task. Fewer forces mean porary camps. But I think we repatriated
or invalid, the campaign has to be adapted. fewer capabilities. We didn’t have the them within weeks, not months. And so
That’s why you make assumptions about number of MPs [military police] that we if you go back to the time before when
campaigns. So one of the assumptions probably needed to account for detention we did detainee operations, you have to
I think we made, again I was in Riyadh operations because we didn’t think that go all the way back to Vietnam, so there
when all this was being developed, but we’d be detaining enemy personnel. Or if was a lot of rust on that function. If there
I think one of the campaign assump- we were detaining, we would be turning is a lesson here, it’s the lesson that comes
tions, probably driven more by political them over to I don’t know whom, but the to us instinctively, which is to address the
Executive Summary
very so often we find ourselves in he experienced both “in country” as of a nation’s wars and the place for the
n September 2013, an attack carried of Eastleigh, known for its large Somali threat to its national interests in Kenya
lobal climate change has cata- ities, ranging from resource extraction maritime and air, can play a narrow but
24 Forum / The Arctic Domain: A Niche for Joint SOF JFQ 78, 3rd Quarter 2015
relevant region. Danish and Finnish activity raise concerns of competing routes, with the security interests of
examples are highlighted to illustrate that Arctic sovereignty claims: increased Arctic nations closely related to their
the United States, in partnership with the commercial shipping through the Arctic; territorial boundaries and exclusive eco-
other Arctic NATO and neutral nations, aggressive oil, gas, and mineral explora- nomic zones (EEZ). Since commercial
should focus on customizing an appro- tion; threats to endangered Arctic species; objectives are often seen as potentially
priate SOF segment to perform specified and expanding military operations in the conflicting rather than shared, a “zone of
tasks, given future uncertainties in this region that could lead to conflict.9 peace” in the sense of an Arctic security
unique ecosystem. The primary catalyst for greater community has not yet developed.17 This
Arctic activity in the wake of the receding situation is exacerbated by the geography
Climate Change, Resources, ice cap is the potential economic value of the Arctic as a semi-enclosed sea en-
and Territorial Disputes inherent in the region. For energy re- circled by littoral states, since extensions
The Arctic covers more than one-sixth sources, Science magazine indicated that of continental shelves and delimitations
of the Earth’s total land mass plus the 30 percent of the world’s undiscovered of maritime boundaries invariably lead
Arctic Ocean.4 The geopolitical signif- natural gas and 13 percent of its undis- to overlapping sovereignty claims, which
icance of the Arctic Ocean increases covered oil might be found north of the can cause interstate friction.18 This is
because of growing shortages of Arctic Circle.10 A 2008 U.S. Geological not a new phenomenon, though. The
land-based raw materials, its expected Survey appraisal of undiscovered oil and Canadian archipelago, for example, has
resource wealth, new conveyor and gas north of the Arctic Circle reinforced been investigated, mapped, and claimed
transport technologies, and progressive this view with the assertion that the by different nations in the past.19 Overall,
climatic amelioration.5 According to the “extensive Arctic continental shelves the combination of melting Arctic sea ice,
Intergovernmental Panel on Climate may constitute the geographically largest potential polar riches, and conflicting ter-
Change, the Arctic warms nearly twice unexplored prospective area for petro- ritorial claims creates the conditions for
as fast as the rest of the world. Along leum remaining on Earth.”11 While more heightened interstate tensions among all
with rising temperatures, the Arctic research is needed to define the resource the players. This state of affairs is further
has experienced a dramatic decrease potential accurately, the Arctic stands magnified by increased, yet unpredict-
in the annual extent of sea ice. This out as one of the most promising energy able, Russian actions in the region.
decline in sea ice coverage is particularly venues in the world.12 Furthermore,
pronounced in September.6 Estimates the Arctic is an important commercial A Russian Threat?
show that approximately 41 percent of fishing ground, especially for the largest The Arctic is vital to Russia’s relevance
the permanent Arctic ice has completely populations (salmon, cod, and coalfish).13 in world affairs. In addition to possess-
disappeared, “and every year a further Beyond natural resources, professional ing the longest Arctic coastline, Russia
million square miles or so vanishes, tourism, particularly polar cruises, will encompasses at least half of the Arctic
shrinking the ice cap to around half of become more attractive as the ice melts.14 in terms of area, population, and prob-
the size it covered in the mid-twentieth Finally, new maritime routes from Asia to ably mineral wealth.20 As such, with its
century.”7 In fact, the U.S. Navy’s the Atlantic will create opportunities to geographical location and the length
“Arctic Roadmap” predicts ice-free save vast fuel costs for the shipping indus- of its northern coastline, Russia is a key
conditions for a portion of the Arctic by try. Use of the Northwest Passage over regional player, and its future geopo-
the summer of 2030.8 These spectacular North America could shorten transport litical and economic power in interna-
changes in the Arctic environment will routes between Asia and the U.S. East tional matters is directly linked to its
have a range of economic, political, and Coast by 5,000 miles. The Northern Sea potential exploitation of valuable Arctic
security consequences. Route over Eurasia is also important be- resources.21 Moreover, the Arctic has
Arctic climate change makes the cause it shortens shipping routes between always played a significant role for the
region the subject of growing inter- northern Europe and northeast Asia by Russian military, particularly its navy.22
national attention. The melting of the 40 percent compared with the existing Consequently, Russia has a stake in
ice cap has led to speculation that new routes through the Suez or Panama ca- essentially all contentious Arctic issues:
economic opportunities are opening in nals, and takes thousands of miles off sea delimitation of territory; ownership and
a region that has been frozen for cen- routes around Africa or Latin America.15 management of economic resources,
turies. Beyond commercial conjecture, Obviously, the Arctic emerges as an particularly natural resource deposits;
the diminishment of Arctic sea ice has increasingly attractive market for invest- and the prevention of conflict between
led to increased human activities in the ment and trade, based largely on the the military forces of the Arctic coastal
Arctic and has heightened interest in, and opening of new Arctic sea lines and the states, all of which are improving, to
concerns about, the region’s future. The access they provide.16 Considering the one degree or another, their Arctic-ori-
Arctic Ocean seabed is rich in mineral re- aforementioned commercial opportu- ented defense capabilities.23
sources, most notably natural gas and oil. nities, Arctic politics center increasingly Russia’s North is one of the country’s
However, forecasts of greater economic on access to natural resources and sailing richest areas. Its value derives from the
26 Forum / The Arctic Domain: A Niche for Joint SOF JFQ 78, 3rd Quarter 2015
Attack submarine USS New Mexico surfaces at Ice
Camp Nautilus in Arctic Ocean during Ice Exercise 2014
(DOD/Joshua Davies)
policy almost by default. The Arctic is While the first decade of the 21st next few years, we’re going to have to
a complex environment, and a report century has seen an enormous increase sort of return to those roots.”45 Similarly,
by the Arctic Institute noted that “the in the use of U.S. and NATO SOF for then–Major General Brad Webb, com-
armed forces, beyond their responsibility the campaigns in Iraq and Afghanistan, mander of U.S. Special Operations
for handling all contingencies, are also SOF focus has skewed to direct-action Command Europe, affirmed, “while
the only agencies with both the requisite operations. These operations are defined Africa may be the challenge for this gen-
monitoring instruments and the physical as short-duration strikes and other small- eration the Arctic will be the challenge for
capabilities to operate in such a vast and scale offensive actions that are conducted the next.”46 For the Arctic, the tasks of
inhospitable region.”41 A further concern in hostile, denied, or diplomatically sen- special reconnaissance, sovereignty opera-
is that the Arctic is an environment of sitive environments, and which employ tions, and platform seizure missions come
extreme operational challenges, even for specialized military capabilities to seize, to the forefront for SOF employment.
armed forces with longstanding Arctic destroy, capture, exploit, recover, or
experience.42 These problems range from damage designated targets.44 The most Special Reconnaissance and
limited communications due to mag- visible of such activities was the elimi- Sovereignty Assertion
netic and solar phenomena that reduce nation of Osama bin Laden in the May Considering Arctic climate dynamics
radio signals to environmental degrada- 2011 raid on his compound in Pakistan. and increased human activity on polar
tion of personnel, weapons systems, and This emphasis on direct action has come air, land, and sea routes, the assertion
navigation equipment. Considering the at a price, however, causing SOF units to of sovereignty and the need for “on the
nature of SOF, with their recruitment of neglect a number of other useful mission surface” situational awareness takes on
more experienced personnel, a rigorous sets. The commander of the Colorado- strategic significance. This requirement
selection process, high resilience, and based U.S. Special Operations Command is compounded by key challenges that
extensive training to achieve proficiency North, Rear Admiral Kerry Metz, stated include shortfalls in ice and weather
in applicable mission sets, these elite that over the past decade of war in the reporting and forecasting and limita-
units offer the innovative, low-cost, Middle East, “we’ve gotten out of [the tions in command, control, commu-
and small-footprint approach needed to habit of doing] the routine work up in nications, computers, intelligence,
achieve nuanced national security objec- the Arctic area. SOF as an entity has not surveillance, and reconnaissance due to
tives in a challenging region.43 focused on that area, and I think over the lack of assets and harsh environmental
28 Forum / The Arctic Domain: A Niche for Joint SOF JFQ 78, 3rd Quarter 2015
U.S. Navy Arctic Submarine laboratory
technician takes break from preparing
submarine surfacing site near Ice Camp
Nautilus in Arctic Ocean during Ice Exercise
2014 (DOD/Joshua Davies)
support. Possible units of action for this their ability to train selected crews to and polar military presence make its
assignment are U.S. Air Force Special specialize in Arctic air and survival as well intentions unclear, and thus a key player
Operations, MC-130P aircraft squad- as their overall organizational linkage to watch in Arctic affairs.60 As the ice
rons, and related CV-22 tiltrotor units, to SOF maritime units performing the recedes and maritime passages open,
coupled with selected SOF parares- other SR, sovereignty, and platform sei- the potential for territorial conflict and
cuemen and combat rescue officers zure missions in the polar environment. state-on-state confrontations could
from the special tactics squadrons. By While direct military conflict may be increase. Hence, this is an ideal niche
locating such assets at Thule Air Base in unlikely in the Arctic, the uncertainty situation for low-profile, small-footprint
Greenland and Joint Base Elmendorf- about the direction in which develop- maritime and air SOF teams to monitor
Richardson in Alaska, selected air SOF ments in the region will unfold and, as a the region and provide presence, strate-
units could provide air coverage and result, the uncertainty about the precise gic reconnaissance, and surveillance for
support for most of the North American nature of the challenges and threats de- sovereignty purposes, as well as platform
Arctic and Northwest Passage. Although riving from those developments, justify seizure or recovery capacity in readiness.
the Air Force has assets in its conven- the increased attention of the interna- For the United States, these Arctic
tional Service with similar profiles and tional community toward the Arctic.59 missions require a mix of specialized
equipment, air SOF may be better suited Simultaneously, Russia’s bellicose actions maritime and air SOF that can leverage
for a niche Arctic mission because of in other regions, overall martial rhetoric, the Arctic expertise and capabilities of
30 Forum / The Arctic Domain: A Niche for Joint SOF JFQ 78, 3rd Quarter 2015
benchmark-setting partner nations such
16
Charles M. Perry and Bobby Anderson, 38
Virtanen, 45, 5.
New Strategic Dynamics in the Arctic Re- 39
Oran Young, “Arctic Politics in an Era of
as Denmark and Finland, and operate in gion: Implications for National Security and Global Change,” Brown Journal of World Af-
a unique joint special operations environ- International Collaboration (Washington, DC: fairs 19, no. 1 (Fall/Winter 2012), 165–178,
ment. JFQ Institute for Foreign Policy Analysis, February specifically 169.
2012), 28. 40
“The Arctic: Special Report,” The Econo-
17
Kristian Atland, “Russia and Its Neigh- mist, June 16, 2012, 10.
bors: Military Power, Security Politics, and 41
O’Rourke, 59; and Ebinger and Zambe-
Notes Interstate Relations in the Post-Cold War takis, 1218.
Arctic,”Arctic Review on Law and Politics 1 42
Zysk, “Evolving Arctic,” 109.
1
Charles K. Ebinger and Evie Zambetakis,
(February 2010), 295. 43
Arctic Strategy, 7.
“The Geopolitics of Arctic Melt,” International 18
Ebinger and Zambetakis, 1227; and 44
Joint Publication (JP) 3-05, Special Oper-
Affairs 85, no. 6 (November 2009), 1215–
Claudia Cinelli, “The Law of the Sea and the ations (Washington, DC: Joint Chiefs of Staff,
1232, specifically 1215.
Arctic Ocean,” Arctic Review on Law and Poli- April 18, 2011), II-5–II-6.
2
Arctic Strategy (Washington, DC: Depart-
tics 2, no. 1 (2011), 4–24. 45
Paul McLeary, “U.S. Special Ops Com-
ment of Defense, November 2013), 2. 19
Ingenfeld, 258. manders: We Need ISR in Africa, Comms in
3
Luke Coffey, “The Future of U.S. Bases in 20
Zysk, “Evolving Arctic,” 97; “The Arctic: Arctic,” Defense News, May 20, 2014, available
Europe—A View from America,” Baltic Securi-
Special Report,” The Economist, June 16, 2012, at <www.defensenews.com/article/20140520/
ty & Defence Review 15, no. 2 (2013), 135.
11; and Barbora Padrtova, “Russian Approach DEFREG02/305200052/US-Special-Ops-
4
Kingdom of Denmark Strategy for the
Towards the Arctic Region,” in Panorama of Commanders-We-Need-ISR-Africa-Comms-
Arctic 2011–2020 (Copenhagen: Ministry of
Global Security Environment 2012, ed. M. Ma- Arctic>.
Foreign Affairs, August 2011), 9.
jer, R. Ondrejcsak, and V. Tarasovic (Bratisla- 46
Ibid.
5
See Eva Ingenfeld, “Just in Case Policy
va: Centre for European and North Atlantic 47
O’Rourke, 66.
in the Arctic,” Arctic 63, no. 2 (June 2010),
Affairs, 2012), 339–350. 48
Julian E. Barnes, “Cold War Echoes Un-
257–259. 21
Virtanen. der the Arctic Ice,” Wall Street Journal, March
6
Intergovernmental Panel on Climate 22
Padrtova. 24, 2014, available at <http://online.wsj.com/
Change (IPCC) Working Group 1 Contribu- 23
Perry and Anderson, 50. news/articles/SB10001424052702304679404
tion to the IPCC Fifth Assessment Report, 24
Valery P. Pilyavsky, “Russian Geopolit- 579461630946609454>; and O’Rourke, 64.
June 7, 2013, 12–33.
ical and Economic Interest,” Friedrich Ebert 49
Government of Canada, “Statement on
7
Roger Howard, The Arctic Gold Rush: The
Stiftung Briefing Paper, March 2011; and Canada’s Arctic Foreign Policy: Exercising
New Race for Tomorrow’s Natural Resources
Padrtova, 341. Sovereignty and Promoting Canada’s Northern
(New York: Continuum, 2009), 8. 25
Virtanen. Strategy Abroad,” August 2010, available at
8
David Titley and Courtney St. John, “Arc- 26
Atland, 280; and O’Rourke, 54. <www.international.gc.ca/polar-polaire/assets/
tic Security Considerations and the U.S. Navy’s 27
See Katatzyna Bozena Zysk, Russian Mil- pdfs/ CAFP_booklet-PECA_livret-eng.pdf>.
Roadmap for the Arctic,” Naval War College
itary Power and the Arctic (Brussels: EU-Russia 50
Perry and Anderson, 172.
Review 63, no. 2 (Spring 2010), 36.
Centre, October 2008); and Virtanen. 51
JP 3-05.
9
Andrei Zagorski, “The Arctic: A New 28
Mikkola Kaplya and Harri Juha, “The 52
Kingdom of Denmark Strategy for the
Geopolitical Pivot?” Russia Direct Monthly
Global Arctic: The Growing Arctic Interests Arctic 2011–2020, 13; and Perry and Anderson,
Memo, no. 5 (December 2013), 2; and Ronald
of Russia, China, the United States and the 71.
O’Rourke, Changes in the Arctic: Background
European Union,” The Finnish Institute of In- 53
Gerard O’Dwyer, “Denmark Boosts Re-
and Issues for Congress, R41153 (Washington,
ternational Affairs Briefing Paper 133, August sources for the Arctic,” Defense News, October
DC: Congressional Research Service, April
2013, 4; and Padrtova, 347. 8, 2013.
2014), 1. 29
Zagorski, 6; and Virtanen. 54
Ibid.; Kingdom of Denmark Strategy
10
Donald L. Gautier et al., “Assessment 30
Zagorski, 6. for the Arctic 2011–2020, 21; Mia Ben-
of Undiscovered Oil and Gas in the Arctic,” 31
Strategia natsional’noi bezopasnosti nett, “Denmark’s Strategy for the Arctic,”
Science 324, no. 5931 (2009), 1175–1179.
Rossiiskoi Federatsii do 2020 goda, 2009, Sovet Foreign Policy Association, November 14,
11
U.S. Geological Survey Fact Sheet 2008-
Bezopasnosti Rossiiskoi Federatsii, available at 2011, available at <http://foreignpolicy-
3049, “Circum-Arctic Resource Appraisal:
<www.scrf.gov.ru/documents/1/99.html>; blogs.com/2011/11/14/denmarks-strate-
Estimates of Undiscovered Oil and Gas North
and Osnovy gosudarstvennoi politiki Rossiiskoi gy-for-the-arctic/>; and “Greenland by Dog
of the Arctic Circle,” available at <http://pubs.
Federatsii v Arktike na period do 2020 goda i Sledge: The Sirius Patrol in Numbers,” BBC
usgs.gov/fs/2008/3049/>.
dalneishuiu perspektivu, September 2008, Sovet News, November 30, 2011, available at <www.
12
See Kataryna Zysk, “The Evolving Arctic
Bezopasnosti Rossiiskoi Federatsii, available at bbc.co.uk/news/magazine-15940985>.
Security Environment: An Assessment,” in
<www.scrf.gov.ru/documents/15/98.html>. 55
Finland’s Strategy for the Arctic Region
Russia in the Arctic, ed. Stephen Blank (Carl- 32
“Russia Plans Arctic Army Brigades,” 2013 (Helsinki: Prime Minister’s Office, August
isle, PA: U.S. Army War College, July 2011),
BBC News, July 1, 2011, available at <www. 2013), 14.
91–138.
bbc.co.uk/news/world-europe-13997324>; 56
Virtanen, 93.
13
Ingenfeld, 258.
and Padrtova, 345. 57
JP 3-05, xi; and Atland, 279–298, specif-
14
Vesa Virtanen, The Arctic in World 33
Virtanen. ically 284.
Politics. The United States, Russia, and China in 34
Roger Howard, “Russia’s New Front 58
O’Dwyer.
the Arctic—Implications for Finland (Bos-
Line,” Survival 52, no. 2 (April–May 2010), 59
Zysk, “Evolving Arctic,” 117.
ton: Weatherhead Center for International
141–155. 60
Atland, 280.
Affairs, Harvard University, 2013), available at 35
O’Rourke, 62; and Virtanen, 45.
<http://projects.iq.harvard.edu/files/fellows/ 36
Perry and Anderson, 64.
files/virtanen.pdf>. 37
Justyna Gotkowski, “Swedish Security in
15
Ibid.; and Ebinger and Zambetakis,
Crisis,” Centre for Eastern Studies, February
1221.
13, 2013.
here is widespread agreement istan”—that is, another large-scale, to pursue forcible regime change in
32 Forum / Regeneration of Irregular Warfare Capacity JFQ 78, 3rd Quarter 2015
“another Vietnam.” This article considers insurgencies typically last many years, deployed 25,000 or more forces have
the challenge of maintaining readiness for intervening forces have considerable done so for only 5 years on average, and
large-scale irregular warfare (IW) contin- time to adapt to the operational theme rarely—if ever—for more than 8 years.
gencies when the national mood has so and environment.4 In contrast, conven- Even these numbers, however,
decisively turned against such operations. tional contingencies may conclude in probably overstate the amount of time
The need to hedge against such a victory or defeat in mere weeks. If one a democratic power such as the United
contingency is recognized in both the cannot pay the price necessary to be States has to adapt to the requirements
2012 Defense Strategic Guidance and prepared for every kind of conflict, it is of IW. For instance, although the United
the 2014 Quadrennial Defense Review better to be prepared for conventional States deployed large numbers of forces
(QDR). Whereas both documents are contingencies and, if necessary, adapt in South Vietnam from 1965 to 1972,
widely interpreted as rejecting large-scale over time to irregular warfare rather it was searching for a way out after the
counterinsurgency and stability opera- than vice versa. Second, IW is typi- Tet Offensive in January–February
tions, they actually provide more nuanced cally fought by small units on a highly 1968—a mere 3 years after escalating its
guidance. Although U.S. forces will not decentralized battlefield—a much easier involvement. Similarly, the United States
be sized to conduct such operations, task militarily than coordinating fire intervened on a large scale in Iraq from
the QDR insists that “we will preserve and maneuver across large numbers of 2003 to 2011, but by 2007—less than
the expertise gained during the past ten higher echelon formations. The skeptics 4 years after its invasion—the United
years of counterinsurgency and stability of IW investments maintain it is easier States had committed to either win
operations [and] protect the ability to to adapt from more complex military the war through the so-called surge or
regenerate capabilities that might be tasks to less complex ones than it is to withdraw. And the United States is not
needed to meet future demands.”2 It is go in the other direction.5 Again, such alone in this respect. In the case of the
less clear what this guidance means in an argument suggests that the bulk of large-scale French counterinsurgency in
practice. To sketch the outlines of such an investments should be made in conven- Algeria (1954–1962), many observers
“adaptability hedge,”3 we first review the tional warfighting capabilities. Finally, argue the war became unwinnable for
history of large-scale IW operations to skeptics of IW contend that counter- France as a result of its widespread use
determine the timelines that intervening insurgency and stability operations of torture in the Battle of Algiers, which
forces have historically needed to adapt have historically been “wars of choice” ended in 1957—3 years after the esca-
to such contingencies, how quickly they fought by the United States in less lation of French involvement. Similarly,
have adapted in practice, and the costs of strategically vital regions of the world. India completely withdrew its forces from
slow adaptation. Second, we examine the These skeptics maintain that if fiscal aus- large-scale counterinsurgency operations
sorts of ground forces that are typically terity imposes the need for U.S. Armed in Sri Lanka within 3 years (1987–1990),
required for such operations and—using Forces to accept a higher degree of risk and Israel withdrew the bulk of its
simple metrics—estimate the amount of than usual, this risk is best assumed in forces from Lebanon in less than 2 years
time required to regenerate them. Based less-vital IW capabilities. (1982–1983).
on this analysis, we suggest which capa- While defensible, each of these In short, there appears to be a small
bilities could be regenerated relatively arguments overstates its case and mini- window of time before an intervening
quickly for large-scale IW contingencies mizes the extent of the risk the United democracy such as the United States
as the need arises and which would be States would incur by failing to invest in reaches a “culminating point” by which it
priorities to keep in the ground force standing IW capabilities or the ability to must be on a clear path to an acceptable
structure due to the long lag times asso- regenerate them quickly. outcome or face strong domestic political
ciated with rebuilding these capabilities How Long Do Militaries Have to pressures to withdraw.
once they are lost. Finally, we briefly Adapt to IW? The answer to this ques- How Long Does It Take to Adapt to
review the pipeline for regenerating IW tion in any particular case obviously the Requirements of IW? There is no way
capabilities and how to ensure the pipe- depends on circumstances. But history to measure exactly what “good enough”
line could function rapidly if needed. provides an approximate answer that adaptation looks like and how long it has
can be used for force planning. While taken across a range of contingencies.
The Imperative of Rapid insurgencies typically last for more than Instead, an examination of a single case—
Adaptation for Large-Scale IW 10 years (15 years, more recently), for- the U.S. experience in Operation Iraqi
Even if they accept that the United eign militaries usually intervene in them Freedom (OIF)—is helpful to illustrate
States might at some point get drawn for much shorter periods of time—at how long it took U.S. forces to adapt in a
into another such contingency, many least when they are deployed in large recent war.
observers are skeptical of making sizable numbers by democracies. Looking at There is some debate about what
investments in standing capabilities for the best-known cases of expeditionary constituted sufficient adaptation in
large-scale IW. These skeptics generally counterinsurgency by democratic inter- Iraq and how long it took. A few ob-
make three arguments. First, because veners, we see that democracies that have servers—mostly counterinsurgency
34 Forum / Regeneration of Irregular Warfare Capacity JFQ 78, 3rd Quarter 2015
Survival evasion resistance and escape specialist and rescue squadron flight engineer Airmen conduct combat survival training near Osan Air Base, South
Korea, during 2012 Pacific Thunder exercise (DOD/Sara Csurilla)
of war. As in all readiness debates, pol- relatively quickly are candidates to be can be adapted, with mockups of foreign
icymakers face tradeoffs among cost, regenerated on demand. Once we know villages built and role-players hired on a
military effectiveness, and time.13 In this which capabilities need to be kept as contract basis, in relatively short order.
era of fiscal constraints, policymakers forces in being, and what infrastructure Such adaptations are necessary, and the
are seeking to limit costs by reducing is necessary to maintain a pipeline to following section will detail some of the
military readiness for large-scale IW regenerate other forms of IW capacity, infrastructure necessary to ensure they
contingencies, while still paying for the we can determine (at least roughly) are executed rapidly. But for IW, the long
necessary infrastructure to regenerate the price tag associated with the 2014 pole in the tent is typically human capi-
such capabilities quickly if needed. QDR’s pledge to “preserve the expertise tal—the development of military leaders
This approach is reasonable in prin- gained during the past ten years of coun- who can rely on the education and expe-
ciple. In practice, it requires answering terinsurgency and stability operations rience they have gained over many years
difficult questions: How quickly can [and] protect the ability to regenerate (or even decades) to adapt to a complex
such capabilities be regenerated? Can capabilities that might be needed to environment. Such leaders cannot be re-
they be regenerated quickly enough, meet future demands.” generated quickly if decisionmakers have
given the relatively short timelines for Estimating Requirements for guessed incorrectly about the nature of
IW adaptation discussed in the previous Capabilities in Being. Once the need for future contingencies.14
section? Capabilities in high demand adaptation is recognized, it can occur in What types of leaders are most
for IW that can only be built or achieve many domains relatively quickly. Training in demand? Studies have found that
adequate readiness over long periods and doctrine, for instance, can be ori- several types of units were particularly
of time are candidates to be retained as ented toward the specific circumstances stressed by IW requirements in Iraq
forces in being. Capabilities required for of new irregular contingencies within as and Afghanistan: combat arms, rotary
IW that can be built or achieve readiness little as a few months. Similarly, facilities aviation, military intelligence (especially
assets related to human intelligence), personnel in quartermaster companies or not practical unless decisionmakers are
military police (particularly law enforce- light- and medium-truck companies pos- willing to accept dramatic declines in
ment), explosive ordnance disposal sess approximately 3 years of service on quality, no matter how large the pipeline
(EOD), and special operations forces average. In contrast, many of the enablers for regeneration.
(SOF).15 Nor are these demands unique in high demand for IW contingencies Capabilities that are in high demand
to Iraq and Afghanistan; many of these possess personnel with considerably more for IW and have lengthy development
same types of units were in high demand experience. Personnel in interrogation times are high-priority candidates to
in a variety of other IW campaigns, both battalions, law and order detachments, be retained in disproportionately large
counterinsurgency (in Vietnam) and tactical military information support op- numbers if the Department of Defense
other forms of stability operations (for erations detachments, civil affairs teams, (DOD) makes a commitment to quickly
instance, in Bosnia and Kosovo). and EOD companies all possess between regain critical IW proficiencies and ca-
Unfortunately, many of the types 5 and 7 years of service on average—ap- pacity. These capabilities include aviation,
of units in highest demand for IW are proximately twice that of the logistical certain types of military intelligence,
rank-heavy formations filled with per- support units discussed above and sub- law enforcement, EOD, and SOF. They
sonnel with many years of experience stantially higher than the experience in could be retained as formed units, or
in their fields. For example, personnel a BCT. Moreover, the average years of their leadership could be retained in
comprising a Brigade Combat Team service in these units is approximately as disproportionately large numbers in a
(BCT) possess approximately 4 years long as the United States ever remains “grade over-structure” or cadre that
of service on average. Many enablers, committed on a large scale to IW contin- would serve as the basis for regenerating
such as transportation or administrative gencies. Regenerating these capabilities fully formed units in times of need.16
units, require far less experience; the on demand, in other words, is probably Regardless of how these capabilities are
36 Forum / Regeneration of Irregular Warfare Capacity JFQ 78, 3rd Quarter 2015
maintained, DOD needs to ensure that it Warfare Fusion Cell, for instance, closed operational themes as might be desirable.
gains appropriate experience operating in on October 1, 2014.17 There is ample Consequently, DOD should also monitor
real-world environments, ideally through precedent to anticipate further such cuts. IW proficiency by monitoring units’
security cooperation and similar activities. Service culture celebrates command performance at the Services’ premier
True proficiency in tasks conducted in functions and operational experience, exercises, such as the Army’s combat
“wars among the people” is simply too and the leadership is largely drawn from training centers and Marine Corps’
difficult to attain in the classroom or in the warfighting branches. If money and predeployment exercises. DOD should
artificial training environments. manpower allocations are tight, Service track data on the content of exercises
Maintaining a Pipeline to priorities are likely to favor deployable (goals, types of threats, operational envi-
Regenerate Other IW Capabilities. units and operational functions over insti- ronment, tactics executed and evaluated,
Clearly, the United States cannot afford tutions—like IW organizations—whose and so forth), performance of the trainee
to maintain all the capabilities it needs for product is less tangible and longer term. units,18 and percentage of leaders in key
large-scale IW in capacities sufficient to For example, the post–Cold War draw- positions—battalion commanders, S-3s,
meet the requirements of many plausible down resulted in sizable reductions in executive officers, company command-
scenarios. Particularly where regeneration Army institutions (particularly at the U.S. ers—who actually execute a premier
times are relatively rapid (for capabilities Army Training and Doctrine Command). exercise rotation emphasizing IW skills
that require relatively less expertise) or Similarly, when units were under pressure during their tenure in that position.
where the overall numbers of forces to deploy at full strength during the Assuming that the scale of current
involved make it impractical to maintain 1990s, the Army moved to increase man- operations declines as expected, fewer
a force optimized for IW (as is the case ning in operational units at the expense military leaders will have direct expe-
for combat arms other than SOF), the of manning in the its institutional base. rience in IW. As a result, professional
United States will need to regenerate Therefore, we should expect that lower education courses will represent a critical
capacity and proficiency for IW as quickly priorities are likely to be accorded to means through which IW knowledge and
as possible. doctrine writers, training developers, ex- skills will be inculcated in future cohorts
Three elements of the Services’ activ- perts in training/advising foreign forces, of officers and noncommissioned officers.
ities are especially important in providing and even experts at the combat training School curricula, however, are limited
a basis for regenerating IW capability centers. For these reasons, DOD should in the amount of student instructional
in the future: organizations, exercises, monitor the size of IW institutions and time available; each domain of expertise
and school curricula. To ensure that the the seniority of their staff to assess their must compete with others for curriculum
Services maintain their pipelines for re- well-being and capacity to contribute to hours (or “blocks of instruction”). How,
generating IW capabilities, DOD should preserving IW capabilities. then, could defense leadership monitor
ensure adequate funding and attention Just as the Services developed orga- the curriculum profile to gauge the ade-
for each of these elements. nizations to gain IW proficiency over quacy of IW focus? Previous studies have
Both the Army and Marine Corps the past decade, they also oriented their made a start by calculating occurrence of
created many organizations to develop training programs to the requirements of key words and phrases related to IW.19 A
proficiency for large-scale IW during the the wars in Iraq and Afghanistan. With more complete monitoring effort would
wars in Iraq and Afghanistan. The Army’s the withdrawal of most American troops establish goals and criteria for determin-
focal point for this area was the Army from both countries and the rebalancing ing which skills and knowledge are most
Irregular Warfare Fusion Cell, which of U.S. defense capabilities toward the important and then use small panels
helped to coordinate IW-related activities Asia-Pacific region, the Services are of knowledgeable veterans (preferably
among the U.S. Army Peacekeeping justifiably reorienting their training to at the O-4 or O-5 level, who have IW
and Stability Operations Institute, regain proficiency in conventional war- experience and some academic research
Asymmetric Warfare Group, Center fighting. Yet this reorientation does not training) to monitor and track the extent
for Army Lessons Learned, and U.S. mean the Services have abandoned IW. to which these skills are taught in profes-
Army Special Operations Command. In fact, both the Army and Marine Corps sional military education at all levels.
Similarly, the Marine Corps established have adopted scenarios based on hybrid DOD cannot afford to maintain the
the Center for Irregular Warfare, Security threats, and both plan to incorporate Services’ current levels of proficiency
Cooperation Group, and Center for these features into their major exercises. in IW, nor is it necessary to do so for
Advanced Operational Culture Learning. Steps have already been taken to test and the majority of U.S. forces. Outside of
These organizations that study and codify refine these concepts. the high-demand, long-development
IW operations formed DOD’s intellectual As with institutional budgets, how- time capabilities for IW discussed
foundation for preserving expertise. ever, training budgets are also coming above—capabilities such as aviation, law
In a period of fiscal constraint, these under pressure. Moreover, there are a enforcement, certain types of military
organizations’ budgets have already finite number of days in a year, making it intelligence, EOD, and SOF—the goal
come under pressure; the Army Irregular difficult to retain proficiency in as many should be rapid regeneration of IW
38 Forum / Regeneration of Irregular Warfare Capacity JFQ 78, 3rd Quarter 2015
Jordanian F-16 Fighting Falcon leads another Jordanian F-16, American F-16, and two Marine F-18s over training base in Northern Jordan as part of Eager
Lion exercise (U.S. Air National Guard/John P. Rohrer)
anced Strategy: Reprogramming the Pentagon Experienced and effective leaders are not grown 2014.
for a New Age,” Foreign Affairs 88, no. 1 (Jan- quickly.” See 2012 Army Strategic Planning 18
For a related evaluation effort, see Bryan
uary/February 2009), 3; Frank G. Hoffman, Guidance (Washington, DC: Headquarters W. Hallmark and James C. Crowley, Company
“Hybrid Warfare and Challenges,” Joint Force Department of the Army, April 19, 2012), 12. Performance at the National Training Center:
Quarterly 52 (1st Quarter 2009), 34–48; and 15
See Michael L. Hansen et al., Reshaping Battle Planning and Execution, MR-846-A
T.X. Hammes, The Sling and the Stone: On War the Army’s Active and Reserve Components, (Santa Monica, CA: RAND Corporation,
in the 21st Century (St. Paul, MN: Zenith Press, MG-961-OSD (Santa Monica, CA: RAND 1997).
2006). This view has since become embedded Corporation, 2011), 32–35; and Donald P. 19
Stephen J. Mariano, “Between the Pen
in a wide range of Defense Department doctri- Wright and Timothy R. Reese, On Point II: and the Sword: 40 Years of Individual and
nal publications. Transition to the New Campaign (Fort Leav- Institutional Attitudes Toward Small Wars,”
13
Richard K. Betts, Military Readiness: enworth, KS: Combat Studies Institute Press, Harvard University, Weatherhead Center for
Concepts, Choices, Consequences (Washington, 2008). International Affairs, 2012 (PowerPoint brief-
DC: Brookings Institution Press, 1995). 16
See Watts et al. for more precise analysis ing summarizing a Ph.D. thesis in war studies
14
The 2012 Army Strategic Planning Guid- of historical IW utilization and the characteris- at the Royal Military College of Canada).
ance states, “The development of mid-grade of- tics of the priority capabilities for retention.
ficers and non-commissioned officers has been 17
Kevin Lilley, “Irregular Warfare Center
the historical limiting factor in expansibility. to Close Oct. 1,” Army Times, September 1,
his article considers approaches to mendation that USAWC faculty design in public departments and agencies,
40 JPME Today / The Education of Senior Military Officers JFQ 78, 3rd Quarter 2015
programs have been generally ignored the faculty (up from 20 seminars in 2011). that would argue distinctions without
in public administration literature.2 Each faculty team has leeway in the delivery differences. This contention caused us as
Like other U.S. public administra- of content and is responsible for achieving educators to revisit the assumptions of
tors, DOD officers both at home and lesson objectives for each session. adult learning or andragogy:9
abroad assume responsibilities in public As an educational institution,
•• Adults have the need to know why
security and law enforcement, in public USAWC should be the role model of
they are learning something.
works, and in emergency management a learning organization4 within DOD.
•• Adults learn through doing.
and services. Thus, DOD senior-level Organizational scholar Peter Senge as-
•• Adults are problem-solvers.
education should prepare its graduates, serts in The Fifth Discipline that a learning
•• Adults learn best when the subject is
among other things, to serve as effective organization is “continually expanding its
of immediate use.
public administrators. capacity to create its future.”5 The future
The U.S. Army War College is one we seek to create is one of relevancy to In a larger forum, the debate contin-
of DOD’s senior-level colleges and pro- the military members of our society who ued on what our approach should be—to
vides the capstone of joint professional are charged with protecting U.S. national provide a framework with an application
military education for U.S. military values and interests. Thus, we continu- of the concepts presented in each of the
officers. Mostly in their mid-40s and ally assess the design and delivery of the lessons or to present multiple frameworks
with more than 20 years of service, curriculum to provide graduates with so that students would have a broad
these military professionals are high the best possible preparation for future understanding of the topics. The battle
performers with extensive experience service. The faculty conducts an examina- lines seemed drawn superficially between
in leading and managing organizations. tion of each core course and individual faculty members with postgraduate
This formal professional development lessons therein—a crucial and often pain- educational experience and those with
opportunity provides them a foundation ful experience. My experiences in these traditional operational “field” or func-
for future high-level service. Each year “hot washes” or “after action reviews” tional experience within the military.
approximately 300 officers from across generated this article on the education of It would be convenient but wrong to
the Armed Forces participate in USAWC USAWC students. characterize the debate as “how to think”
seminars of the Resident Education versus “what to think.” The essential
Program (REP) throughout a 10-month The Stimulus question faced by all faculty is how to
opportunity to “confer on the three great At an end-of-course review with teaching teach “how to think” in the limited time
problems of national defense, military colleagues for the REP, I was the leader we have in seminar. The USAWC faculty
science, and responsible command.”3 The of a small group for a subset of lessons of represents a range of educational and
Distance Education Program engages our core course on Strategic Leadership. military experiences (it is a mix of civilian
over 700 students in two 2-year cohorts. What followed was a pointed discussion academics and predominantly military
Like the other senior Service colleges, on the faculty role in educating our Active-duty and retired officers). With
USAWC programs are designed to equip students for senior-leadership responsi- that in mind, our faculty members have
graduates with critical thinking skills that bilities. One faculty member argued that preferred teaching styles for delivering
facilitate analysis of strategic situations, our teaching philosophy should seek to our diverse curriculum.
enable them to provide sound assess- provide graduates with tools that can be
ments and advice to senior leaders, and applied in their assignments immediately Stakeholder Surveys
prepare them to manage complex na- following graduation. One teaching This is not a unique debate for us, or for
tional security organizations in the joint, method put forth in The Adult Learner educators writ large.10 Our institution
interagency, international, and multina- was the use of adult learning models as has explored this question through exter-
tional environment. the guiding process in seminars.6 The nal and internal studies to determine
The USAWC REP curriculum is other was based on Education for Judg- the needs of future military officers and
delivered by three academic departments: ment.7 The faculty member decried the study approaches to educating military
National Security and Strategy; Command, practice of providing students with mul- leaders for the 21st century.11 Recent
Leadership, and Management; and Military tiple frameworks and theoretical perspec- reviews of the USAWC curriculum
Strategy, Plans, and Operations. The curric- tives without first giving them tools to focused on educating strategic leaders
ulum currently consists of five core courses use in the “real world.” He asserted that and educating strategic thinking.12
followed by two terms of electives, along not allowing students the opportunity Each study addresses presenting specific
with special programs providing in-depth to apply the perspectives to case studies knowledge to develop competencies for
study of selected areas. Seminar cohorts was a waste of time given his perception near-term assignments—a pragmatic and
of 16 to 17 students are led by a three- to of theoretical discussions with limited or rational approach to meet the short-term
four-person faculty team. As of academic no application.8 With passion, the faculty needs of the officers and their gaining
year 2012–2013, there are 24 seminars member commented that such discus- organizations—as well as providing
with standardized lesson plans designed by sions could be purely academic exercises students with several tools that can be
42 JPME Today / The Education of Senior Military Officers JFQ 78, 3rd Quarter 2015
This reflection on USAWC education true framework and allow students to test
3
Elihu Root, “The Army War College,
Address at the Laying of the Cornerstone,
began with a forceful nudge by colleagues their understanding of its concepts and Washington, DC, February 21, 1903,” in
to examine how we should attempt to applications in a case study. Even then, The Military and Colonial Policy of the United
educate our USAWC students. I came to we faculty must encourage students to States, Addresses and Reports by Elihu Root,
realize that we are faced with several para- challenge even approved solutions. There ed. Robert Bacon and James B. Scott (Cam-
doxes: We must educate both broadly and will be other lessons where tried and true bridge, MA: Harvard University Press, 1916),
121–129.
deeply. We must not only expose them to is not a viable approach and may even 4
Christopher Argyris and Donald Schön,
proven ways to address known challenges be counterproductive. These are better Organizational Learning: A Theory of Action
but also enhance their ability to adapt and addressed by working through multiple Perspective (Reading, MA: Addison-Wesley,
create their own tools for new situations. perspectives. Faculty members who are 1978).
We must encourage students to share responsible for specific lessons must keep
5
Peter Senge, The Fifth Discipline: The
Art and Practice of the Learning Organization
their experiences while helping them view in mind the deliverability of the lessons by
(Boston, MA: Currency, 1990), 14.
situations through different lenses. Each the collective faculty and to the students. 6
Malcolm S. Knowles, Elwood F. Holton,
of these paradoxes presents a challenge The overarching goal is to provide our and Richard A. Swanson, The Adult Learner:
to our faculty, who want to fully equip graduates with the best possible prepara- The Definitive Classic in Adult Education and
our students for the future while enabling tion for future service to the Nation Human Resource Development, 6th ed. (San
Diego: Elsevier, 2005).
them to perform effectively in their next through this educational experience. 7
C. Roland Christensen, David A. Garvin,
assignment. One colleague called this Implicitly, this goal must be sought and Ann Sweet, eds., Education for Judgment:
“educating for certainty.” But we must at each of the DOD professional military The Artistry of Discussion Leadership (Boston:
acknowledge that we are unable to do education institutions, whereby its at- HBS Press, 1992).
that. The future provides both continuity tainment will support success of the joint
8
Louis B. Barnes, C. Roland Christensen,
and Abby J. Hansen, Teaching and the Case
and change. So our educational approach force. With the persistent challenges in
Method, 3rd ed. (Boston: Harvard Business
should account for both and prepare our the joint, interagency, international, and School Press, 1994).
students to operate in the strategic land- multinational environment, it is doubly 9
Knowles, Holton, and Swanson; Peter
scape they will encounter. important that the Armed Forces resist the Renner, The Art of Teaching Adults: How to Be-
A portfolio approach may be the pull of parochialism in the face of policy come an Exceptional Instructor and Facilitator,
10th ed. (Vancover: Training Associates, 2005).
most pragmatic way to meet our insti- and fiscal uncertainty. Successful graduates 10
Frans-Bauke van der Meer and Ar-
tutional goals. The portfolio curriculum of joint professional military education thur Ringeling, “An Education Strategy for
design and materials offers established programs will have learned “how to think” Practitioners in Public Administration Master’s
frameworks and theories combined and pragmatism in collaborative planning Programs,” Journal of Public Affairs Education
with opportunities to explore emerging and execution of operations to support 16, no. 1 (2010), 77–93.
11
“The Military Officer in 2030: Secretary
theoretical constructs. During a visit to national security interests.
of Defense 2003 Summer Study,” slide presen-
USAWC seminars, a noted journalist and These reflections are intended to tation (Newport, RI: Office of the Secretary of
military historian challenged our students prompt the public administration and Defense, 2003); and William T. Johnsen et al.,
to use their year as “an opportunity to leadership education communities to also “The Army War College: Educating Strategic
get bigger.” Through historical examina- reflect on how to assist the U.S. military Leaders in an Age of Uncertainty,” in The
Future of Military War Colleges, ed. Jeffrey D.
tions, he discerned that successful military in its functions and responsibilities. The
McCausland (Carlisle, PA: Dickinson College,
leaders had the uncanny abilities “to breadth and depth of research in these December 2005), 22–185.
accommodate other opinions” and “to fields offer knowledge and practical ap- 12
Harry R. Yarger and Charles D. Allen,
be open to other points of view.” These plications that can be useful in national Educating Strategic Leaders: Report of the Elec-
abilities help inform “bigger judgments” security matters. Further engagement and tive Program Review Working Group (Carlisle,
PA: U.S. Army War College, 2007); and Harry
that senior leaders have the responsibility collaboration—a conversation—between
R. Yarger, Educating Strategic Thinking in
and obligation to make. the public administration, leadership edu- JSOU (Washington, DC: Joint Special Opera-
I realized that we as faculty must also cation, and defense communities would tions University, 2007).
accept the challenge to get bigger and benefit all. JFQ 13
“The Military Officer in 2030: Secretary
move away from our own areas of com- of Defense 2003 Summer Study.”
14
2012 U.S. Army War College General
fort. We have to accept that we may not
Officer Survey (Carlisle, PA: U.S. Army War
always have the right answer to provide Notes College, 2012).
to our students to solve problems that 15
Ibid., 1.
have yet to materialize. In designing
1
Donald F. Kettl and James W. Fesler, The 16
David H. Brendel, Healing Psychiatry:
Politics Of The Administrative Process, 3rd ed. Bridging the Science/Humanism Divide (Cam-
courses and lessons, we should bridge the (New York: CQ Press, 2005). bridge, MA: MIT Press, 2006); and Patricia M.
gap between preparing students for their 2
Jeffery A. Weber and Johan Eliasson, eds., Shields, “Rediscovering the Taproot: Is Clas-
next assignment and preparing them for Handbook of Military Administration: Public sical Pragmatism the Route to Renew Public
their roles in an uncertain future. Some Administration and Public Policy (London: Adminstration?” Public Administration Review
lessons will lend themselves to a tried and CRC Press, 2007). (March/April 2008), 205–221.
veryone wants to be a good Yet the newspapers are frequently filled The dictionary defines ethics as
44 JPME Today / A Framework for Ethical Decisionmaking JFQ 78, 3rd Quarter 2015
be helpful throughout the day-to-day posted speed limit. However, behavior choice and judgment.”12 Finally, Nucci
moments that sometimes challenge our today is often far more transparent than it concluded that “a person of good char-
professional ethics. was when Moulton first gave his speech. acter is someone who attends to the
Modern-day transparency warrants as- moral implications of actions and acts in
Vertical Respect and the sociating Moulton’s obedience to the accordance with what is moral in most
Choice Continuum unenforceable with what we call the red circumstances.”13 In other words, people
This first part of the framework has its zone. In the red zone we have choices. of good moral character have the habit of
roots in a 1924 speech given by Lord For example, we all should obey the making choices based on ethical values.
Moulton in Great Britain. John Fletcher posted speed limit, right? To summarize, the choice continuum
Moulton was the Minister of Muni- In his paper “Ethics in the U.S. considers three things: the individual, the
tions for Great Britain at the onset of Navy,” Rear Admiral Ted Carter de- situation, and the available choices. For
World War I.2 In what came to be titled scribed Moulton’s obedience to the DOD members, the heart of the choice
Law and Manners, Moulton talked unenforceable as “the sphere where continuum is in demonstrating vertical
about a continuum of choices ranging individuals must exercise discretion and respect—making choices that reflect the
from total freedom on one end to total judgment, making decisions when the values of DOD as embodied in the pro-
restriction on the other. (Moulton used only enforcer is themselves.”6 Carter fession of arms. If there is any use at all in
different terms, but the meaning is emphasized that decisionmaking in the the choice continuum, it is in its ability to
essentially the same.) red zone “relies upon an internalized highlight the red zone, where individuals
On the one hand, with total restric- sense of responsibility and an intrinsically- may be tempted to make choices based
tion the individual has no choice but to developed ethical core.”7 In other words, on personal interests at the expense of or-
comply. Think of this as externally im- the red zone represents where one’s true ganizational interests. After all, everyone
posed obedience. One image that comes character comes to light. Do we consis- wants to be good, but sometimes we can
to mind is a prisoner complying with the tently choose service above self? benefit from a little reminder.
orders of a prison guard. On the other We all make choices in the course of
hand, with total freedom there are no carrying out our duties. Some choices Theory to Practice: Life
rules. People are free to do as they please. are ethical and others are not. Rather in the Red Zone
In Moulton’s words, this realm “includes than emphasizing right and wrong, the The DOD Encyclopedia of Ethical
all those actions as to which we claim and Joint Ethics Regulation describes ethics as Failure is a readily available source of
enjoy complete freedom.”3 “standards by which one should act based cases involving red zone decisionmak-
Together, total restriction and total on values” and values as “core beliefs ing. Here, the Standards of Conduct
freedom represent the ends of a con- such as duty, honor, and integrity that Office publishes a selection of cases for
tinuum of choice. Yet Moulton’s speech motivate attitude and actions.”8 As one use in DOD ethics training. The Office
was not about the ends of the continuum might expect, the Joint Ethics Regulation cautions, “some cases are humorous,
but rather the gray area of decisionmaking is “applicable to all DOD employees, some sad, and all are real. Some will
that lies between. Moulton called this gray regardless of military or civilian grade.”9 anger you as a Federal employee and
area “obedience to the unenforceable.”4 The Joint Ethics Regulation goes on to some will anger you as an American
Said differently, if total restriction is the say that “not all values are ethical values taxpayer.”14 They all reflect individu-
realm of what we “must do,” then some- (integrity is; happiness is not).”10 The als making choices in a given situation
where beyond total restriction is the realm unspoken message is to subordinate where obedience to organizational rules
of what we “should do.” In Moulton’s personal interests to organizational (that is, vertical respect) was seemingly
words, obedience to the unenforceable interests (that is, service above self). unenforceable—at least to them.
“is the obedience of a man to that which Making choices that are consistent with Members who rise within the DOD
he cannot be forced to obey. He is the en- organizational values demonstrates verti- hierarchy accumulate both responsibility
forcer of the law upon himself.”5 Behavior cal respect. and authority. Authority brings with it
here is reflected in the old cliché, “it is People who consistently make good control of resources. The two examples
what we do when no one is looking.” ethical choices are said to be of good that follow from the Encyclopedia of
It is here that we take a slight depar- moral character. In his book Education in Ethical Failure illustrate bad choices by
ture from Moulton’s original concept. the Moral Domain, Larry Nucci defined individuals in the red zone:
The “choice continuum” relabels morality as “knowledge of right and
Moulton’s obedience to the unenforce- wrong. Conduct is moral if it involves Your Posters Are My Posters. An Army
able as obedience to the (seemingly) selection of particular courses of action officer was convicted both for making false
unenforceable. Furthermore, obedience that are deemed to be right.”11 Again, statements, including false statements in
to the (seemingly) unenforceable often the theme of choice takes center stage. his confidential financial disclosure report
carries a sense of what we “might get Nucci posited: “The central feature (failure to report an outside position and
away with”—for example, exceeding the of human morality is our capacity for the income from that position), and for
stealing government property. The employee colonel resigned from the military service Take, for example, the use of govern-
put in an order at the department print for the good of the service under other than ment vehicles. Many in DOD, including
shop, certifying that a series of posters honorable conditions.16 those in the lower ranks or grades, have
were for official business. The posters were access to government vehicles. The rules
actually for the employee’s side business. In the first case, the Army officer regarding the use of government ve-
Additionally, the employee purchased a abused his official position for personal hicles (including government-provided
conference table, for which his own business gain. Following the explanation of rental cars) can vary depending on
got a $400 credit toward a conference table ethical versus nonethical values from the whether one is at a permanent duty
of its own. The employee was sentenced to 2 Joint Ethics Regulation, we see that the station or on temporary duty (TDY).
years of probation, 6 months house arrest, Army officer chose personal happiness Generally, government vehicles are
a fine of $25,000, and was ordered to pay over integrity. In the second case, the for official use only. However, what
$1,600 in restitution.15 lieutenant colonel also chose personal constitutes “official” use can vary from
happiness over integrity by accepting one situation to the next. For example,
a gift while in an official capacity and using a government vehicle to make
Sampling of Gift Not Sufficient. A
failing to follow the rules for doing a burger run is permissible while on
lieutenant colonel committed dereliction
such. In each case, individuals had to TDY, but not so while at a permanent
of duty when, in violation of the Joint
choose between what they “should do” duty station.17 Thus, use of government
Ethics Regulation, he received a bottle of
and what they “might get away with.” vehicles is an area where government
Ballantine’s 30-year-old Scotch valued at
Unfortunately, they chose the latter. employees must be knowledgeable and
$400 and failed to report it and properly
One does not have to be senior to careful of the rules. Beyond the area of
dispose of it. In lieu of a court martial, the
make bad decisions in the red zone. government vehicles, many in DOD at
46 JPME Today / A Framework for Ethical Decisionmaking JFQ 78, 3rd Quarter 2015
Johns Hopkins University student reasons with warlord of Centralian Revolution Army during ethical decisionmaking field exercise at The Basic
School (U.S. Marine Corps/Emmanuel Ramos)
all levels hold U.S. Government credit Although the choice continuum has Horizontal Respect and
cards, which carry their own list of dos value in promoting ethical decisionmak- Domain Theory
and don’ts. ing relative to organizational values, it If ethics is the philosophy of right and
As members of the government in has some significant limitations. It covers wrong behavior, then morals frequently
general and the DOD in particular, we only one dimension in decisionmaking— refers to what is “considered right and
hold a public office. We serve, and the respect amid an organizational hierarchy good by most people.”18 Good behavior
public trusts us to serve ethically. The red (that is, vertical respect). The choice is moral behavior, whereas bad behavior is
zone is called the red zone for a good continuum is focused on rules, not on immoral. Furthermore, moral issues often
reason: it represents a danger area where relationships. Although one might argue center on person-to-person behavior.
normally good people have the opportu- that “relationship to others” is already Domain theory in ethics considers the
nity to make bad choices. Bad choices in a part of the choice continuum, it is not social standards of right and wrong in how
the red zone jeopardize the public trust obvious. This is where the second dimen- we treat others. Dr. Larry Nucci begins his
enjoyed by all members of DOD. The sion of our proposed framework comes discussion of domain theory by drawing
choice continuum highlights the need to into play. Where “rules” and “choice” a distinction between morals and social
think clearly when making decisions in are the cornerstones of the choice con- conventions. Where ethics considers is-
the red zone. tinuum, “relationship to others” is the sues of right and wrong, “conventions are
Bystanders play a role in the red zone, foundation of domain theory. arbitrary because there are no inherent
too. Just as a single candle can light the interpersonal effects of the actions they
dark, sometimes all it takes is a single regulate.”19 Nucci provides the following
voice of reason to highlight the right example taken from an interview with a
choice—the right way ahead. child to illustrate his point:
48 JPME Today / A Framework for Ethical Decisionmaking JFQ 78, 3rd Quarter 2015
enduring, giving a sense of permanence test, when someone has to ‘take the lead’
Notes
to this part of domain theory. in life,”37 was moral leadership in action.
With this definition in mind, the issues 1
Merriam-Webster Online Dictionary
Horizontal Respect: of sexual assault and of integrating gay (2015).
Theory to Practice men and women into the military will be 2
John Fletcher Moulton, “Law and Man-
ners,” Atlantic Monthly, July 1924, 1–4.
One issue regarding horizontal respect solved only by people whose character 3
Ibid., 1.
gaining significant attention in today’s reflects moral leadership. 4
Ibid.
military is sexual assault. In a December To summarize, the strength of do- 5
Ibid.
2014 news conference, former Secretary main theory is its ability to highlight 6
Walter E. Carter, Jr., “Ethics in the U.S.
of Defense Chuck Hagel told reporters: horizontal respect—our ability to get Navy,” U.S. Naval War College, March 24,
along with each other. By accepting our 2014, 9.
7
Ibid.
Sexual assault threatens the lives and own personal freedoms, we incur an 8
Department of Defense (DOD), DOD
well-being of both the women and the obligation to allow others to also realize 5500.07-R, The Joint Ethics Regulation, includ-
men who serve our country in uniform. It their personal freedoms via the principle ing Changes 1–7, November 17, 2011, 118.
destroys the bonds of trust and confidence, of reciprocity. 9
Ibid., i.
which [are] at the heart of our military.
10
Ibid., 118.
11
Larry P. Nucci, Education in the Moral
Eradicating sexual assault from our ranks Framework Conclusion Domain (New York: Cambridge University
is not only essential to the long-term health Chapter 12 of the Joint Ethics Regula- Press, 2001), 4–5.
and readiness of the force, it is also about tion lists 10 ethical values all DOD 12
Ibid., 112.
honoring our highest commitments to employees should consider when car- 13
Ibid., 124.
protect our fellow Soldiers, Sailors, Airmen, rying out their duties. The first four
14
Standards of Conduct Office, Encyclope-
dia of Ethical Failure (Washington, DC: DOD,
and Marines.32 deal with attaining vertical respect. October 2014), 3.
They are honesty, integrity, loyalty, and 15
Ibid., 70.
Similarly, the DOD 2014 accountability. The next five deal with 16
Ibid., 82.
Quadrennial Defense Review (QDR) horizontal respect. They are fairness, 17
DOD, Joint Travel Regulations, April 1,
states: “Eliminating sexual assault is one caring, respect (for others), promise- 2015, O-7.
18
Merriam-Webster Online Dictionary.
of the Department of Defense’s highest keeping, and responsible citizenship. 19
Nucci, 7.
priorities.”33 Using domain theory as a The final value listed, pursuit of excel- 20
Ibid., 8.
lens, we see that sexual assault is a viola- lence, charges DOD members to be 21
Ibid., 10.
tion of the moral domain, where mutual examples of excellence and to “strive 22
Ibid.
respect and concern for the victim’s well- beyond mediocrity.”38 This final attitu-
23
Ibid., 19.
24
Ibid.
being are superseded by the perpetrator’s dinal value is designed to maintain the 25
Ibid., 73.
selfish desires. In simple terms, sexual public trust. Though it uses different 26
Ibid.
assault violates horizontal respect. words, the message in the Joint Ethics 27
Ibid.
Another issue mentioned in the QDR Regulation is clear. Members of DOD 28
Ibid.
is the urgency to implement changes are expected to exhibit both vertical and
29
Ibid., 50–51.
30
Ibid., 51.
needed “to fully realize [DOD’s] deci- horizontal respect. 31
Ibid., 7.
sion to allow gay men and women to Our goal was to come up with an 32
Tyrone C. Marshall, “More Must Be
serve openly in the military.”34 Using do- ethical framework that could be useful in Done to Eliminate Sexual Assault, Hagel Says,”
main theory as a lens, these are items of everyday decisionmaking. The concepts DoD News, December 4, 2014.
the personal domain—personal rights of of vertical and horizontal respect seem
33
Quadrennial Defense Review 2014 (Wash-
ington, DC: U.S. Department of Defense,
expression and association. Again, these to capture just that. Vertical respect is 2014), 7.
are items of horizontal respect. explained via the choice continuum, 34
Ibid., xii.
Just as they did in the choice con- which highlights choices made in the 35
Robert Coles, Lives of Moral Leadership:
tinuum, bystanders too can play an red zone that are inconsistent with our Men and Women Who Have Made a Difference
important role by speaking up when wit- values as members of the Department of (New York: Random House, 2001), ix.
36
Ibid., 7.
nessing violations. Pulitzer Prize winner Defense. Domain theory highlights hori- 37
Ibid., 226.
Robert Coles defines moral leadership as zontal respect and human relationships. 38
The Joint Ethics Regulation, 118–119.
“a willingness to say and do what needs Professionalism means integrating verti-
to be expressed.”35 He further argues, cal and horizontal respect as we execute
“This is one of the hallmarks of a leader— our duties, even at the expense of self-
having the courage to speak up despite interest. Together, vertical and horizontal
others’ moods or discouragement.”36 respect represent a practical framework
Coles concludes that “what happens that can illuminate better choices in ethi-
when moral values are really put to the cal decisionmaking. JFQ
Waffles or Pancakes?
Operational- versus Tactical-Level
Wargaming
By Dale C. Eikmeier
sk people what the difference if there is a difference; after all, the enced chefs, however, will tell you the
50 JPME Today / Operational- versus Tactical-Level Wargaming JFQ 78, 3rd Quarter 2015
Wargaming at the operational and is the type of questions and issues each Arrangements of unit capabilities in time
tactical levels is a lot like waffle and pan- focuses on. Simply put, the difference is and space to achieve effects and objectives
cake batter: it might look the same and a focus on what to do versus how to do it form the core of tactical-level courses of
share many of the same ingredients, but questions. This is important especially action. Therefore, tactical-level wargaming
it has important and subtle differences. for operational-level planners because deals primarily with the how questions:
Ask military planners what the difference their level is the bridge that connects how are capabilities used, how are they
is between operational-level and tactical- broad strategic guidance and aims toward brought to bear, how are they maneu-
level wargaming methodologies used tactical actions. That bridge is built out vered, supported, and sustained. Like the
in course of action (COA) analysis, and of what questions—what endstate, what operational level, the tactical level is also a
you will probably get the same pancake- effects, what objectives, what tasks, what continuum of what to how questions, but
versus-waffle–type answers, with many capabilities—that are arranged with when the scale at the tactical level is tipped to-
telling you that the difference is nonex- and where questions. If operational-level ward the how side. So at the tactical level,
istent or not important. The truth is the planners do not understand this differ- think big how and little what.
wargaming processes may look the same, ence, they tend to wrestle with the easier
but the “ingredients” and outcomes and more concrete tactical how questions Other Ingredients
are very different. Using a tactical-level rather than the more difficult conceptual The following discussion highlights
wargaming focus at the operational level what questions. Operational wargaming some of the other important but subtle
can result in the direction of well-planned asks, “Are we doing the right things?” differences planners need to be aware of.
and synchronized tactical actions at ques- Tactical wargaming asks, “Are we doing These differences may be generalities,
tionable operational tasks and the aiming things right?” but they do represent key divergences
of mismatched capabilities at ill-defined The purpose of the wargame, at between the two levels.
effects that fail to achieve operational and both levels, is to collect information to Aim. The aim of wargaming at the
strategic objectives. determine the advantages and disadvan- operational level, according to joint
Many planners agree that opera- tages of each COA when compared to an doctrine, is to determine the feasibility
tional-level wargaming using the Joint evaluation criteria.2 The operational-level and acceptability of a course of action.3
Operation Planning Process is different COA and its wargame analysis are largely At the tactical level, according to Army
from tactical-level wargaming using the concerned with identifying and arranging doctrine, the aim is to refine, identify,
Military Decision Making Process or the the right endstates, objectives, effects, analyze, develop, and determine key
Marine Corps Decision Process. But they and tasks, along with matching the elements of the COA.4 This doctrinal
struggle with understanding the differ- tasks to capabilities and resources in the difference reflects some of the what are
ences because Service doctrines and joint correct sequence. These arrangements we doing versus the how we are going
doctrine describe only the processes and in time (when and sequencing), space to do it approaches of operational and
do not compare or point out differences (where), and purpose (goals) to achieve tactical levels. COA development at
between them. Not fully understanding an endstate form the core of operational- both levels uses the screening criteria
the subtle differences, planners default to level courses of action. Therefore, the of adequate, feasible, acceptable, distin-
what they know best—which is usually operational level deals primarily, although guishable, and complete.5 The tactical
the tactical level—and will apply tactical not exclusively, with the what questions— level, however, assumes that a COA
“pancake techniques” to the operational what is the endstate, what objectives will has already met the screening criteria
“waffle processes.” This manifests itself achieve it, what effects must we create to and that the aim of the wargame is to
when planners lose focus on the opera- achieve the objectives, and what tasks and determine the how to details of the COA.
tional-level issues and drift toward trying action will produce those effects—and The operational level does not assume
to maneuver and fight functional or lastly the other what questions—when, the screening criteria have been met.
Service-component tactical actions rather where, and who will execute those tasks With its focus on what questions, the
than focusing on identifying and validat- and actions. This is not to say there are wargame is the tool to determine feasi-
ing operational-level tasks. Planners can no how questions at the operational level, bility and acceptability.6
avoid this tactical drift only if they un- but they are secondary to the more criti- Focus. The operational-level com-
derstand the difference between “tactical cal what questions; if they are wrong, it mander is concerned with identifying what
pancakes” and “operational waffles.” does not matter how well tactical actions to do, and the wargame helps validate
are executed. So think big what and little the selection of objectives, effects, and
What versus How how at the operational level, but keep in tasks that will create the endstate condi-
The two wargaming processes are mind both are present; the scale simply is tions. The commander then resources,
similar but not identical, and when things tipped toward what questions. sequences, and synchronizes those tasks,
are not identical, the differences are im- The tactical level is concerned with and subsequently assigns those tasks to
portant. The key difference between the how to achieve assigned missions and components. The COA is an arrange-
operational- and tactical-level wargame objectives using the resources provided. ment of these elements, and the wargame
52 JPME Today / Operational- versus Tactical-Level Wargaming JFQ 78, 3rd Quarter 2015
Soldiers provide covering fire for platoon during assault on enemy position during wargame exercise at Fort Bragg (U.S. Army/Michael J. MacLeod)
different questions. The operational level Not recognizing these differences can
looks for the correct assignment of tasks result in the wrong things done right,
to components one level down and asks just like putting pancake batter in a waffle
whether the component has the correct iron. JFQ
capabilities two levels down to achieve
the assigned task. The primary questions
asked are who has the task and whether Notes
they have the resources or capabilities to
accomplish it. Resourcing the right capa-
1
Credit for the pancake/waffle anal-
ogy goes to Dwayne Wagner, Command and
bilities at the right time is the operational General Staff Officers Course Instructor, Fort
level’s primary focus; how the capabilities Leavenworth, Kansas.
are used is secondary. The tactical level 2
Joint Publication (JP) 5-0, Joint Operation
looks at how the subordinate one level Planning (Washington, DC: The Joint Staff,
down will use assets two levels down to August 11, 2011), IV-27.
3
Ibid., IV-29.
accomplish the task. Using capabilities is 4
Field Manual (FM) 5-0, The Opera-
the tactical level’s primary focus; resourc- tions Process (Washington, DC: Headquarters
ing them is secondary. Department of the Army, March 2010), B-
The processes of wargaming at the 32–B-33.
operational and tactical levels are similar
5
JP 5-0, IV-24–IV-25; FM 5-0, B-15.
6
JP 5-0, IV-29.
but not identical, and it is the differences 7
Ibid., IV-32; FM 5-0, B-26.
that become important. The key differ- 8
JP 3-0, Joint Operations (Washington,
ence is a primary focus on questions of DC: The Joint Staff, August 11, 2011), I-8.
what at the operational level and ques- 9
JP 5-0, IV-30; FM 5-0, B-31.
tions of how at the tactical level. Planners,
especially at the operational level, need
to fully understand the differences. The
operational-level wargame strives to de-
termine if we are doing the right things
and creating the right effects. The tacti-
cal-level wargame strives to determine the
right way to accomplish the right thing.
54 Commentary / An Interview with Christopher C. Bogdan JFQ 78, 3rd Quarter 2015
F-35, but it’s important for the rest of the
weapons systems around the F-35. When
we connect with them, it makes them
and all those around the F-35 that much
smarter and more survivable.
56 Commentary / An Interview with Christopher C. Bogdan JFQ 78, 3rd Quarter 2015
Captain Brent Golden, 16th Weapons Squadron instructor, taxis F-35A Lightning II at Nellis Air Force Base, January 2015 (U.S. Air Force/Siuta B. Ika)
and that gun will work, but it’s not the F-35’s survivability, sensor fusion, and is a great lesson for them. Also, we have
only thing we use in the CAS mission. the situational awareness it brings, you all eight of our other partners’ personnel
It will be used in conjunction with have an excellent weapon system. in the program office who work as part
other capabilities such as precision- of the program—another great learning
guided munitions. It will have the right JFQ: Can you talk about the interna- experience for them and for us.
kinds of communications systems to tional portion of the program and how There are two other important
work with ground forces. Eventually in that has evolved? aspects of the partnership. First is the
Block 4, we’ll have full-mission video. ability for our partners to be able to fight
The jet already has incredible sensors, Lt Gen Bogdan: There’s a much deeper alongside us as equals and be able to use
so at night and in inclement weather relevance to the international part of the the same ROEs [rules of engagement]
you have the same capabilities as day- program, and I’ll start first with the part- because their airplanes, pilots, and main-
time. I think it’s a little unfair when nership itself. There are nine partners in tainers are just as capable as we are. This
folks who have an affinity for other the program when you count the United means they can also lead in the hardest
airplanes in the CAS role compare those States as a single partner; so we have eight missions. The last piece has to do with
aircraft to an F-35 without acknowledg- other partners, with most of them in the fifth-generation technology and our
ing that the F-35 can do so many other Europe. The only two not in Europe are partners’ industries participating in the
things that those aircraft cannot do be- Canada and Australia. The first important program. We’re providing technologies
yond the CAS mission. When you build piece about the partnership is that the that we expect our partners to protect,
a multirole airplane, it’s probably not partners get a say in what happens with just like we would. So, in one sense, we’re
going to be a superstar in everything it this program, and for some of them, that requiring them to upgrade their security
does, but it’s going to do a lot of things experience of being part of a big and infrastructure to a level beyond what they
really well. And, when you compare the complicated airplane acquisition program may already have. Also, many partner
58 Commentary / An Interview with Christopher C. Bogdan JFQ 78, 3rd Quarter 2015
industries involved in the program are Now let’s talk about the airplane to be in 10, 15, or 20 years, we’ll have
getting an opportunity to understand and the weapons system itself. Without 2,000-plus airplanes out there, located
and be part of modern manufacturing getting into details, what I will tell you all over the globe and being flown by
techniques and advanced technologies is if you know from the beginning of at least 14 customers. We are trying
and are being asked to hold themselves a program you will be exporting the to build the support and sustainment
to a pretty high standard if they want to weapon system—and you want to hand system to take care of all those airplanes.
be suppliers on this program. From the it to allies to let them operate it in their We’re building depot and heavy main-
DOD’s perspective, a stronger, allied own environments—you can, from the tenance capabilities in the Pacific and
industrial base gives us future access to start of the program, build in the ap- Europe just like we have here in the
better technologies and also pushes U.S. propriate protections. This is one of the United States. We are creating a global
industry to get better. first airplanes that I know of where at supply chain; we are creating a global
the start of the program we consciously network of repair capability in all 3
JFQ: News media reports have mentioned knew it would be an exportable weapon regions. All of this is not fully built or
an increasing number of cyber attacks system. Therefore, from a design and ar- mature yet. Over the next 5 to 7 years
being conducted against the Defense chitectural standpoint, one of the upfront the person who comes next is going to
Department in recent years. What impact requirements was to protect the critical have to take that onboard full steam
has this growing threat of cyber attacks technologies of the weapons system. That because our partners and FMS custom-
had on your program’s ability to deliver is pretty powerful when you start from ers will have aircraft in operations soon.
a capability that can effectively deal with the beginning because you don’t have to We’re adding 17 operating locations in
these cyber-related concerns? adapt, you don’t have to strap things on, the next 5 years and almost half of them
you don’t have to make what I would are overseas. We’ve got to be ready to
Lt Gen Bogdan: When we talk about consider to be secondary or tertiary have a global sustainment structure in
cyber threats to this program, we talk changes to protect things. As a result, it place and ready to operate. We’re on a
about them in two different environ- has what I would consider to be a very really tight timeline to get that done for
ments. The first environment is the strong built-in protection scheme. our partners and Foreign Military Sales
infrastructure we use to design, develop, customers. They expect that the day
sustain, and field the airplane; for exam- JFQ: What challenges and risks do you they get their airplanes in country, all
ple, the F-35 IT system we use to pass see for the program ahead and what will the infrastructure they need to support
program and design information among you recommend your successor focus on? the weapon system will be in place and
the partners, services, and program of- ready to go: supply chain, repair chain,
fice. From this perspective, I have the Lt Gen Bogdan: From a technical and maintenance manuals, training systems,
utmost confidence in the protections the performance standpoint, I think we etc.—all of it. That’s big. From that per-
Department of Defense has put in place will be able to solve any problems we spective, it’s probably where the focus
for those IT systems. We still have to encounter. We have to think about really needs to be in the next 5 years.
remain extremely vigilant when it comes continuing to evolve the airplane to
to industry’s systems. In the past, this is meet future threats. The good news is JFQ: Would you recommend future
where we have found vulnerabilities in the architecture of the airplane was built weapons systems that meet similar
the F-35 program. Consequently, DOD such that it has growth potential. We’re requirements for multiple Services be
and industry have worked together to working toward things like open-systems managed by a joint program office such
increase the protections we put in place architecture for sensors. We have already as this one?
to prevent F-35 information from get- done our first upgrade of all the major
ting into the wrong hands. Each and computers on the program and are plan- Lt Gen Bogdan: First, if the warfighters
every day we’re feeling a little bit better ning another upgrade in about 4 or 5 and customers are willing to compromise
about both government IT and industry years. So from a technical standpoint, I with each other on the requirements,
IT systems. I say this because a number would tell my successor to keep an eye joint programs can work. Our history of
of times every year multiple agencies—to on the need to make the weapon system joint programs is such that they don’t
include [U.S.] Cyber Command and more open. In addition, I would tell my work very well—not only because of the
22nd Air Force—visit the F-35 program successor that from a business perspec- lack of compromise but because we’ve
and do penetration and vulnerability tive I think we’re starting to get costs also thrown on some mismanagement.
testing. Not of the airplane and the under control, but we must continue When you put those two together—folks
weapons system, but of our IT systems. to take deliberate actions now to drive who weren’t willing to compromise with
So from that perspective, they are truly down future costs. The real big thing their requirements along with a program
helping us by showing us what we need that’s still out there is building what I that doesn’t have those management
to do to make ourselves more resilient, call the global sustainment enterprise. and leadership fundamentals down pat—
robust, and secure. If you think about where we’re going you’ve got a train wreck coming. We’ve
seen that in the past and the result is world can be very effective and efficient. or 40 years, you’d better start building
that the program dies or is split up along If you’re a U.S. Marine Corps B-model them so they have growth potential
Service lines. deployed in the Pacific and something and adaptability.
Congress has asked me this same goes wrong with the airplane, you can get
question a number of times. If you a part or repair in the Pacific theater from JFQ: Is anything you would like to add
would have tried to develop an A-model a partner or FMS customer. From that that we have not discussed?
for the Air Force, a B-model for the perspective, I think the program has an
Marine Corps, and a C-model for the advantage over a single-Service program. Lt Gen Bogdan: The biggest issue I
Navy as separate programs, I think you But joint programs are hard to manage. would like your readers to understand
would have probably run into similar They tend to be riskier for all the reasons is that this is not the same program
problems, but the solutions and cost and discussed compared to single-Service pro- it was years ago. We had some really
time required to implement those solu- grams, but the rewards are greater if you rough times in the past, and I think the
tions would have been a unique Service can get it there. Department, the partnership, and indus-
problem versus a partnership problem. Additionally, in this austere budget try have begun moving this program in
The advantage this program has over environment, the Department and a better direction. We’re not there yet,
three separate programs is that there are Services must share technology, not but like a large ship, it takes a long time
huge economies of scale to be had: for duplicate effort, and build airplanes to turn . . . but it is turning. I would
example, global supply pooling (where that can adapt and do many things. ask people to judge the program on the
one part can service many customers) Adaptability is very important. If we’re progress it’s made since the re-baseline
or multiple repair facilities around the going to keep airplanes around for 30 and not look in the rearview mirror. JFQ
60 Commentary / An Interview with Christopher C. Bogdan JFQ 78, 3rd Quarter 2015
Civilian Expeditionary Workforce member engages local business owner in discussion regarding
poultry feed production, Kandahar Province (Kentucky National Guard/Dallas Kratzer)
Turnaround
The Untold Story of the Human Terrain System
By Clifton Green
he U.S. Army’s Human Terrain early experiences had a lasting impact the organization’s progress over time,
a template that could significantly Prior to U.S. involvement in Iraq In the mad dash to fill positions, HTS
improve existing Department of and Afghanistan, cultural research and hiring standards ranged from minimal
Defense (DOD) support to deployed analysis had only a small place in the to nonexistent. In many cases, new em-
civilians, thousands of whom have pro- Army thought process. HTS changed ployees were not even interviewed. When
vided critical services to war-fighters that. Designed to provide a better un- combined with high starting salaries, this
around the globe. derstanding of indigenous populations in lack of selectivity caused HTS to attract
these countries, it was hoped that HTS a peculiar mix of highly qualified person-
History would help U.S. and allied forces reduce nel, absolutely unqualified personnel, and
Inception to Government Transition. violent misunderstandings and dampen everyone in between.
HTS was developed as a response to the insurgencies. In 2006, the Army, fac- As the number of workers swelled
concerns about mismanagement of ing progressively worsening situations in at the HTS base of operations in Fort
U.S. military operations in Iraq and Iraq and Afghanistan, needed new ideas Leavenworth, Kansas, two distinct camps
Afghanistan, in particular the lack of and thus backed a $20 million, five-team emerged. Army Reservists, with varying
cultural understanding of these coun- HTS proof of concept. Even before all levels of military experience, formed one
tries demonstrated by the U.S. military. five teams had been deployed, early reac- group, while contractors formed another.
Soldiers, commanded by leaders with tions from theater commanders were Although it is contractors who typically
limited cross-cultural experience, were favorable. Within a year, the requirement play a supporting role to government
being asked to navigate a complex foreign for Human Terrain Teams mushroomed and military personnel, in the early days
environment with little or no training, to 26 teams as the price tag surpassed of HTS it was the military members who
and they were failing. $100 million annually. lacked a clearly defined role. The vast
62 Commentary / The Untold Story of the Human Terrain System JFQ 78, 3rd Quarter 2015
majority of deployed team members and the jurisdiction of the Iraqi legal system. decision to relocate several sections of the
support staff were contractors, while Panicked that Iraqi police (or insurgents organization caused further division. At
HTS acquired Reservists with no plan to masquerading as Iraqi police) might ar- the same time, the lack of strong manage-
integrate them. In some cases, military rest employees, HTS initiated a plan to ment limited the organization’s ability
personnel battled the contractors for convert all 150 Human Terrain Team to make necessary changes. Competing
control, but the HTS support contract (HTT) members from contractors to HTS staff elements struggled to fill the
required that contractors administer most government employees. To facilitate the vacuum, resulting in a critical lost year.
daily operations. This difficult situation process, a government transition assistant In the middle of the conversion
was exacerbated by the fact that HTS’s was assigned to manage the conversion process, the HTS program manager
program manager and its contract over- from Fort Monroe, Virginia, with HTS created a Program Management Office–
sight were both based a thousand miles designating several personnel to assist. Forward (PMO-Forward) in both Iraq
away in Virginia. All HTS team members had to become and Afghanistan in response to real
To deal with these problems and government employees by May 31, 2009, problems, including the lost account-
provide better government oversight, a or return to the United States. ability of employees in a war zone. The
deputy program manager was appointed The conversion, which seemed role of the PMO-Forwards, however,
at Fort Leavenworth in late 2008. His simple in the abstract, quickly became was never clearly established, and HTS
role was to oversee the work of both a nightmare. HTS employees, a notori- staff members generally viewed the
contractors and military personnel. It was ously vocal workforce, were bewildered PMO-Forwards as deployed staff ele-
a difficult task. HTS’s highly matrixed by the turn of events. They deluged ments. The PMO-Forwards, by contrast,
organization, internal rivalries, and lack of the transition assistant with thousands considered themselves deputy program
controls had created a dysfunctional work of questions, complaints, and pages of managers. Mutual mistrust inhibited col-
environment, which operated in an ad paperwork, and productivity in theater laboration, and a months-long standoff
hoc manner in almost every way. Policies declined while employees wondered ensued. In spite of the need for internal
and procedures were virtually nonexis- about their futures and haggled for better cooperation, HTS program manage-
tent, and most work was done by key terms. At the same time, numerous other ment never publicized or enforced clear
employees with narrow areas of expertise. issues, from travel orders to timesheets, guidelines for how the PMO-Forwards
Mid- to senior-level managers were, in required HTS to establish a large number should interact with the staff. Staff
too many cases, absent or ineffective. of new internal processes. Like HTS meetings between PMO-Forwards and
Some HTS managers who did work managers, the transition assistant had no U.S.-based support staff devolved into
hard to address the program’s problems system to handle the volume and was uncomfortable stalemates. The ensuing
were overwhelmed. When decisions quickly overwhelmed. As the situation discord severely restricted HTS capacity
were made, they were often inadequate deteriorated, it was unclear whether the to improve support processes and fed
to resolve the problem or simply too deadline could be met, or if HTS would into the HTS culture of dysfunction.
late to matter, and the staff required to be forced to embarrassingly remove all Once teams were staffed with gov-
implement the decisions was insufficient. personnel from theater. ernment employees, HTS found itself
Such problems were largely due to Fortunately, through furious last- poorly equipped to meet the needs of its
management officials who had difficulty minute efforts by HTS and U.S. Army workforce. Contractor-to-government
navigating the unstructured work envi- Training and Doctrine Command transition planning had been exclusively
ronment. Instead of establishing systems (TRADOC) staff members, the conver- focused on the conversion process; little
and frameworks to deal with problems, sion process was completed on time. preparation had been made for actually
managers generally approached each However, tremendous damage had supporting government civilians. As
problem as a unique circumstance. At the already been done to HTS credibility, and contractors, HTS personnel had been
same time, the lack of structure enabled dozens of employees (over one-third of supported by corporate human resource
many employees to perform poorly and the HTS deployed workforce) had quit. (HR) and finance sections, but now those
face few consequences. Without structure Bureaucratic infighting caused several organizations were out of the picture.
to regulate behavior, HTS employees staff principles, including the deputy pro- While regulations and support agencies
often succumbed to a kind of organi- gram manager, to depart in mid-2009, already existed for government civilian
zational attention deficit disorder. This and a large portion of the organiza- HR and finance issues, those agencies
combination of factors created serious tion was suddenly moved from Fort were unequipped to deal with the range
deficiencies for HTS quality of support.2 Leavenworth to Virginia. Although HTS and complexity of issues presented by
In late 2008, these problems were had survived the crisis, many inside and HTS employees.
compounded by a new looming crisis. outside of the program began to question HTS needed experts to create pro-
The United States and Iraq had signed HTS’s fundamental level of competence. cesses and integrate systems. Lacking
a Status of Forces Agreement that put Wandering in the Wilderness. After both, the newly formed HTS HR
U.S. contractors working in Iraq within the conversion debacle, HTS drifted. The Directorate was drowning in problems.
64 Commentary / The Untold Story of the Human Terrain System JFQ 78, 3rd Quarter 2015
Fort Monroe, Virginia, began intensive
work on overhauling the program’s
administration. The group had detailed
insight into the workings of HTS
and significant expertise in civilian
HR and finance. Over the next few
months, a number of policies cover-
ing a range of issues were drafted and
sent to HTS program management for
review. At the same time, the group
received additional manpower and was
able to improve payroll processing,
eliminating a backlog of over 80 pay-
related complaints that affected most
deployed employees. Unfortunately,
implementation of other policy changes
was limited. Although the proposals
provided a clear and legally compliant
model for managing the program, they
remained in limbo, neither approved
nor rejected. The HTS program man-
ager was simply not enthusiastic about
institutionalizing the program.4
By mid-June 2010, the pressure of
the investigations and HTS manage-
ment’s continuing resistance to reform
brought the situation to a breaking
point. Two key changes, however, ap-
Afghan girl peeks around door as U.S. Special Forces and Cultural Support Team speak with her
peared to signal a fresh start for the father, Uruzgan Province (DOD/Kaily Brown)
program. First, the position of program
manager was eliminated. Second, an New guidance documents eventually with the position of Theater Support
Active-duty Army colonel, who had covered dozens of topics, and improved Officer, which reported to the HTS
previously served as the TRADOC internal processes gave managers better director of operations.
Deputy G2 and was thus familiar with insight into how well HTS was running. While process improvements occurred
the HTS program and its difficulties, In addition, new HTS policies estab- rapidly, improving the HTS workforce
was named director. The new director lished a change management structure took longer. Because HTS had been will-
had longstanding and positive relation- that allowed the program to continue ing to hire almost anyone in the early days,
ships with TRADOC G2 staff members to improve. Finally, more discipline was it had a large number of unproductive
and thus understood how to balance the imposed on the hiring process, resulting employees. Other employees were com-
considerations of TRADOC with the in more accurate recruitment targets and petent professionals but had a contentious
goals of HTS. Most importantly, she was 61 percent lower attrition in training.5 As relationship with the program as a result
more pragmatic than her predecessor, positive change continued, many employ- of the years of mismanagement. By 2012,
who had generally declined to focus on ees expressed relief that HTS was finally however, a combination of changes had
day-to-day management issues. turning a corner. significantly improved workforce qual-
Anxious to implement change, the Not everyone agreed, however. For ity. These included better management,
HTS director gave the green light to a example, although travel privileges had the termination of more than a dozen
number of the policies drafted by the been significantly misused, some super- employees, more stringent hiring criteria,
Fort Monroe group. The group also visors were annoyed about having to and a requirement that most employees
gained authority and leadership support ask for permission under the new, more separate from HTS at the end of their
in a number of significant areas, includ- accountable procedures. Timesheet deployment. Employees wishing to deploy
ing program administration, program reviews turned up cases of excess that, again could reapply just like anyone else.
development, payroll, travel, hiring, and when addressed, created some hostility. This not only improved workforce quality,
separations. These changes significantly The PMO-Forward positions, which but it also enhanced the program’s ability
improved efficiency, transparency, regula- lacked accountability to other staff to fine-tune recruiting requirements. By
tory compliance, and internal controls. elements, were abolished and replaced 2013, terminations for cause had declined
Implications
Centralizing Support for Deployed
Civilians. While poor management
limited HTS during its early years, the
program was also hindered by DOD’s
ineffective civilian deployment system. The
U.S. military is capable when deploying
66 Commentary / The Untold Story of the Human Terrain System JFQ 78, 3rd Quarter 2015
uniformed Servicemembers, but its civil- wars may require wholly different and would also ensure that deployed civilians
ian deployment process is minimal and unexpected types of knowledge. In the received proper assistance and care, while
poorly integrated. For small organizations, past, such needs were often filled through making certain they performed the work
or units with only a few civilians, this is a the contracting process. However, gov- they were hired to do.
nuisance to be endured. For HTS, which ernment civilians may be preferable to Such a program would need to ac-
deployed civilians at a larger scale, the contractors for several reasons: they are commodate itself to the reality of defense
system’s weaknesses created massive chal- more cost effective; they fall under the budget cycles, expanding and contracting
lenges to mission accomplishment. direct control of government authorities; as required. During peacetime, it could
The effects were significant. The U.S. and they can perform inherently govern- be sustained by a minimal number of
Government spent almost $800 million on mental functions. In other cases, the use of employees; during wartime, it would ex-
HTS from its inception through the 2014 contractors is unnecessary because the de- pand by using limited-term government
Afghanistan drawdown, a period of over 7 sired expertise already exists within DOD’s employees and contractor support. The
years. During much of that time, misman- permanent civilian workforce. This capa- program would serve individual deployers
agement, excess attrition, inflated salaries, bility was previously leveraged through the as well as large organizations and would
and poor support practices wasted hun- Civilian Expeditionary Workforce (CEW) centralize functions currently duplicated
dreds of millions of dollars. Furthermore, program, which provided opportunities across DOD, paying for itself by elimi-
assuming HTS provided value to battlefield for existing government civilians to deploy. nating waste. As a “one-stop shop,” the
commanders, the years it took to fix these Regardless of the source, though, experi- program would encourage consistent
issues and field more effective teams may ences in Iraq and Afghanistan prove that support of deployed civilians while
well have cost lives and worsened the out- such skills will be required. maintaining administrative best practices,
comes in both Iraq and Afghanistan. Unfortunately, civilian personnel are reducing the amount of waste and fraud
Some might argue that waste was an often inadequately prepared to deal with committed during deployments.
inevitable byproduct of the program’s the military deployment bureaucracy, which Naturally, there are always concerns
rapid creation in the middle of two con- is focused primarily on military person- about the use of government employees
flicts. There is truth to that. However, if nel and contractors. As an example, HTS rather than contractors. First, government
a civilian deployment infrastructure had employees who received care at military hiring is an extremely slow process. To
existed prior to the creation of HTS, treatment facilities in theater would often circumvent this issue, HTS developed a
the program could have used it directly. be categorized as “contractors” simply be- hybrid contractor/government hiring pro-
Instead, HTS, like other programs that cause there was no option for “government cess that utilized the strengths of the private
deploy civilians, had to figure everything civilian,” creating unnecessary challenges sector to augment government hiring
out, build its own infrastructure, and to medical support. Civilians drawn from methods. Contract recruiters were able to
endure numerous failures on the road to the private sector had even greater dif- find large numbers of potential candidates
getting things right. That was a phenom- ficulty adapting to the military’s way of with needed expertise. The candidates
enally inefficient way of doing business. It doing business. These distractions made were screened and their names were then
was also completely unnecessary. them and their organizations less produc- submitted for government qualification. If
DOD should establish a program tive and increased the amount of turnover. qualified, the candidates attended a training
to manage the recruitment, training, The HTS experience demonstrates that an class prior to being sworn in as government
deployment, and sustainment of gov- entire program’s operations can be hobbled civilians. This approach allowed HTS to
ernment civilian personnel in overseas by the investigations, negative publicity, and provide a volume of personnel that would
environments. This centralized program employee issues that accompany deficien- never have been possible using normal gov-
would enable deployed forces to quickly cies in administrative support. ernment recruiting methods.
obtain needed civilian skills to augment A centralized DOD civilian deploy- The second main issue with govern-
their capabilities. At the same time, it ment program would provide support ment workers is the concern that they
would allow programs and supported throughout the entire tour, from the become permanent employees who are
units to focus on core competencies receipt of notice to deploy through to the difficult to remove from service. This is
rather than administrative distractions. end of the deployment. Programs and units not the case. Term-limited appointments
Finally, such a program, by eliminating sending civilians downrange would use this allow management to decline employment
inefficiencies, could save the government program’s centralized support capabilities extensions as needed. Term employment
hundreds of millions of dollars during fu- and expertise. It would prepare civilians thus makes adjustments to the size of the
ture conflicts. While that may sound like for deployment, ensure coordination with workforce relatively easy, avoiding the
an overstatement, the HTS experience deployment centers and receiving units, ac- need for a reduction in force, and provides
demonstrates that cost savings of this count for them in theater, ensure a smooth a mechanism to release underperforming
magnitude are not theoretical. redeployment home, and provide accurate employees while avoiding the difficult and
While HTS provided civilian cultural administrative, finance, and logistical sup- emotionally draining termination process.
expertise in Iraq and Afghanistan, future port throughout the entire process. It Employment can end with the expiration
68 Commentary / The Untold Story of the Human Terrain System JFQ 78, 3rd Quarter 2015
not necessarily beneficial for hiring and size. Employees, supervisors, leadership, the important role civilians will play in
that they can be more destructive than and support sections all possessed limited winning future conflicts. JFQ
helpful, both financially and operationally. faith in one another’s abilities and motives.
Process Defeats Politics. During its Additionally, the “short timer” mentality
early years, HTS was an organization of many employees, a high turnover rate, Notes
driven by personalities, not procedures. and a lack of coordination all enhanced
When difficult or unusual situations in- this lack of confidence. When employees
1
For a detailed account of Human Ter-
rain System (HTS) history, see Christopher
volving HTS employees arose (an almost asked a question and received an answer J. Lamb et al., Human Terrain Teams: An
everyday occurrence), staff members they did not like, they had learned to Organizational Innovation for Sociocultural
would many times quickly defer the ques- simply ask another decisionmaker until Knowledge in Irregular Warfare (Washington,
tion to the program manager, who was someone provided the desired answer. DC: Institute of World Politics Press, 2013),
not physically present and likely would Leaders often had trouble saying no to which is detailed, even-handed, and accurate.
Unfortunately, it does have some blind spots,
not make a decision. This was a symptom reasonable-sounding requests that were, in but this article fills in some of those.
of HTS’s broader challenge wherein the fact, not reasonable. By establishing clear 2
Ibid., 147. Lamb et al. reference three
organization’s decisionmaking process and enforceable written policies, HTS types of Human Terrain Team (HTT) mem-
had failed to evolve in the face of rapid significantly reduced this deeply ingrained bers: “ne’er-do-wells,” “fantasists,” and “work-
growth. Because the program had few and disruptive pattern of behavior. Given ers.” While these categories are crude, they are
also quite accurate. Within the HTS staff, the
policies or guidelines, even a minor the complexity of government personnel vast majority of personnel could be categorized
variation to a routine procedure created rules and the volume of turnover, merely as ne’er-do-wells or fantasists. Even if new
decisional gridlock. As a result, every establishing informal guidelines would not arrivals did not begin their tenure with HTS in
decision point became an opportunity for have been effective. one of those two frames of mind, the environ-
organizational politics or simple inertia to This approach benefited HTS in ment tended to have a negative effect on those
exposed to it. Workers were rare.
run the program aground. numerous ways. The amount of atten- 3
It is important to note that timecard
To meet this challenge, HTS gen- tion from management that was required exploitation was routine for civilians in Iraq and
erated internal policies, an employee to administer the program declined Afghanistan. To HTS’s credit, team members
handbook, a pay and allowances guide, significantly because routine matters never approached the excesses of deployed
and more than a dozen internal “bul- could be handled at a lower level. In Department of Justice employees, who often
claimed to continuously work 16 hours per day,
letins” that explained the nuances of addition, rather than having to bargain 7 days a week. See Department of Justice, Of-
complex issues such as workers’ com- for everything, employees could review fice of the Inspector General, An Investigation
pensation and emergency leave. Because HTS policies and understand what they of Overtime Payments to FBI and Other Depart-
of the continuously changing nature of were and were not entitled to. As a result, ment of Justice Employees Deployed to Iraq and
the HTS program, a fixed catalogue of when disgruntled employees disagreed Afghanistan (Washington, DC: Department of
Justice, 2008), available at <www.justice.gov/
policies would have been inadequate. with established policies and filed com- oig/special/s0812/final.pdf>.
Documents were thus revised as nec- plaints, it was relatively straightforward 4
Lamb et al., 73–74.
essary to ensure that they remained to have the complaints dismissed. Finally, 5
Based on decline in attrition from HTS
relevant, sensible, and responsive. In once the values animating those policies training, from 2009 to 2013.
addition, HTS policies were designed became entrenched, a cultural change
6
Tom Vanden Brook, “Army Plows
Ahead with Troubled War-Zone program,”
in such a way that they were not only took hold and HTS became a radically USA Today, February 28, 2013, avail-
enforceable, but would also actually be different place at which to work. able at <www.usatoday.com/story/news/
enforced. This proved crucial to mak- world/2013/02/17/human-terrain-system-
ing the changes work. Where possible, While HTS may be remembered for its iraq-afghanistan/1923789>.
consequences were applied automati- chaotic early blunders, the program’s later,
7
John Stanton’s articles were the product
of numerous sources within the program, but
cally rather than at the discretion of a quieter years demonstrate the effectiveness were also largely based on second-or third-hand
manager. This limited accusations of of its turnaround. Although the program rumors. In many if not most cases, his specific
favoritism and ensured fair treatment may not survive in today’s difficult fiscal allegations were inaccurate. However, his
across the workforce. environment, future sociocultural research articles often did accurately reflect the tone of
As these reforms were implemented, efforts will likely be institutionalized in internal dissent within HTS.
8
Lamb et al., 78–79.
some within the program argued that new and different ways. However, there 9
Government Accountability Office
a policy-centric and enforcement- does not appear to be any equivalent effort (GAO), Afghanistan: Improvements Needed to
based approach was too heavy handed. to improve DOD’s poorly functioning Strengthen Management of U.S. Civilian Pres-
Unfortunately, HTS’s toxic environment civilian deployment system. It would be a ence, GAO-12-285 (Washington, DC: GAO,
required far greater articulation of the shame to throw away $800 million worth 2012), available at <www.gao.gov/products/
GAO-12-285>.
rules and far more comprehensive enforce- of hard-won experience. After more than 10
Department of Defense, “The Civilian
ment strategies than would ordinarily a decade of counterinsurgency and uncon- Deployment Experience,” available at <cpms.
have been required in a program of its ventional warfare, leaders must recognize osd.mil/expeditionary/home.html>.
ecently, the subject of military E. Dempsey has directed each of the starting to be given to improving and
The Professional Soldier: A Social and Political to America Today (Cambridge: Cambridge
Portrait (New York: Free Press, 1960). University Press, 2012), chap. 8.
3
Gayle L. Watkins and Randi C. Cohen, 7
See James Burk, “Expertise, Jurisdiction,
“In Their Own Words: Army Officers Discuss and Legitimacy of the Military Profession,” in
Their Profession,” in The Future of the Army The Future of the Army Profession, chap. 2.
Profession 2nd ed., dir. Don M. Snider and ed. 8
Justin Kelly and Mike Brennan, Alien:
Lloyd J. Matthews (Boston: McGraw Hill, How Operational Art Devoured Strategy
2005), chap. 5. (Carlisle Barracks, PA: U.S. Army War College,
4
Huntington, chap. 4. September 2009).
5
For a recent perspective, see especially 9
See especially Richard Lacquement,
Mackubin Thomas Owens, U.S. Civil-Military “Mapping Army Professional Expertise and
Relations After 9/11: Renegotiating the Civil- Clarifying Jurisdictions of Practice,” in The Fu-
Military Bargain (London: Continuum, 2011). ture of the Army Profession, chap. 9; and Nadia
6
The contemporary debate on civilian Schadlow, Charles Barry, and Richard Lacque-
control of the U.S. military was initiated by ment, “A Return to the Army’s Roots: Gover-
Richard H. Kohn, “Out of Control,” The Na- nance, Stabilization, and Reconstruction,” in
tional Interest 35 (Spring 1994), 3–17. On the The Future of the Army Profession, chap. 11.
combatant commanders’ role, see Dana Priest, 10
H.R. McMaster, Dereliction of Duty: Lyn-
The Mission: Waging War and Keeping Peace don Johnson, Robert McNamara, the Joint Chiefs
with America’s Military (New York: Norton, of Staff, and the Lies That Led to Vietnam (New
2003), as well as Carnes Lord, Proconsuls: Del- York: HarperCollins, 1997).
egated Political-Military Leadership from Rome
The world must collectively recognize the challenges posed by malevolent actors’ entry into
cyberspace, and update and strengthen our national and international policies accordingly. Activities
undertaken in cyberspace have consequences for our lives in physical space, and we must work towards
building the rule of law, to prevent the risks of logging on from outweighing its benefits.
—U.S. International Strategy for Cyberspace, May 2011
lackouts. School testing. Electri- they have all been targets for cyber thousands of cyber assaults every
DHS essentially sees itself as facilitat- government services. It also leads efforts and cybersecurity initiatives for both
ing the cyber neighborhood watch for to protect the Federal dot.gov domain of government and industry partners,
the United States.11 The core division civilian government networks and collabo- and is the Executive Secretariat for the
of DHS that addresses cyber threats is rate with the private sector—the dot.com Joint Program Office for the NS/EP
the National Protection and Programs domain—to increase the security of critical Communications Executive Committee.
Directorate (NPPD), whose primary networks.13 CS&C carries out its mission CS&C relies on SECIR to streamline co-
goal is to reduce the risks of homeland through its five divisions: ordination and engagement with external
threats and make the physical and digital partners, while leveraging capabilities and
•• The Office of Emergency
infrastructure of the U.S. Government significant subject matter expertise to
Communications
more resilient and secure.12 Within the meet stakeholder requirements.14
•• The National Cybersecurity and
NPPD, the most prominent cyber secu- The National Cybersecurity and
Communications Integration Center
rity offices are the Office of Cybersecurity Communications Integration Center
•• Stakeholder Engagement and Cyber
and Communication (CS&C), Office (NCCIC) serves as a focal point for
Infrastructure Resilience
of Infrastructure Protection, and Office coordinating cyber security information-
•• Federal Network Resilience
of Cyber and Infrastructure Analysis. sharing with the private sector; provides
•• Network Security Deployment.
Outside of the NPPD, cyber security technical assistance, onsite analysis, miti-
operations also take place within U.S. The CS&C Stakeholder Engagement gation support, and assessment assistance
Immigrations and Custom Enforcement and Cyber Infrastructure Resilience to cyber attack victims, as well as situ-
and the U.S. Secret Service. (SECIR) division is the primary DHS ational awareness capability that includes
CS&C works to prevent or minimize point of engagement and coordina- integrated, actionable information about
disruptions to critical information net- tion for national security/emergency emerging trends, imminent threats, and
works to protect the public, economy, and preparedness (NS/EP) communications the status of incidents that may impact
yberspace is frequently referred their objectives. It is an understatement and was dubbed by some researchers as
84 Features / The Multifaceted Nature of Cyber Statecraft JFQ 78, 3rd Quarter 2015
Soft Power Hard Power
(carrots) (sticks)
86 Features / The Multifaceted Nature of Cyber Statecraft JFQ 78, 3rd Quarter 2015
information such as daily market prices—
essential knowledge in agrarian areas. As
Kenya’s situation demonstrates, invest-
ments in Internet expansion are critical
to a government’s ability to provide the
environmental conditions for the effective
use of soft power. While not necessar-
ily new, this phenomenon has recently
received more rigorous attention as
governments devote resources specifically
for the creation and expansion of Internet
architecture and a technology-based
economy. In the 1970s, for example, India
set aside an area near Bangalore to create
an electronic city. However, the legal and
economic systems lagged behind, and the
information technology hub did not truly
begin to emerge until economic liberaliza-
tion took hold in the 1990s.
Building up a cyber architecture is not
solely a tool for achieving inward-facing
domestic objectives, but it is also emerging Ohio National Guard Computer Network Defense Team members conduct operations during Cyber
as a component of power politics as states Shield 2015, March 2015, at Camp Atterbury, IN (Ohio National Guard/George Davis)
vie for regional influence. For example,
fiber networks and cell towers can be used state and nonstate actors also lever- people interact with the new military-
to help build alliances between countries age cyberspace as a means to diffuse led government.
and expand a major power’s sphere of factual information to their popula- Governments also employ cyber tools
influence. This tactic is also increasingly tions, provide greater transparency, and to defend their actions or indirectly signal
employed by some multinational corpo- signal their intent. In Iran, President intent that would be politically imprudent
rations to achieve their own objectives. Hassan Rouhani ran on a platform of to express directly. For instance, President
Google’s Project Link, which aims to greater Internet openness. While he Dilma Rousseff used her Twitter account
build fiber networks in Africa, is a case has undoubtedly implemented coercive to defend Brazil’s preparation for the
in point. Conversely, the Europe/Brazil cyber tools, which will be discussed World Cup. Prime Minister Shinzo Abe
effort to build an underwater cable with subsequently, Rouhani simultaneously also appears to be using his Twitter ac-
the goal of circumventing U.S. surveil- uses his Twitter account to spread a count to signal to the Japanese people his
lance efforts demonstrates the role of more positive message of transparency. foreign policy intentions. Abe only follows
power politics within cyberspace. Finally, Recently, he used Twitter to congratu- a handful of people on Twitter, but India’s
the creation of cyber infrastructure could late Iranian mathematician and Fields Prime Minister Narendra Modi is one of
become a tool in peacekeeping missions Medal–winner Maryam Mirzakhani, them. It is too soon to tell whether this in-
and conflict interventions. Following a and included a picture of her without dicates closer future ties between the two
conflict, restoring the cyber infrastructure a headscarf—an apparent attempt at countries, but social media is an easy and
may become just as important as provid- demonstrating openness and prevent- subtle way to inform the population of a
ing access to essential services such as ing further “brain drain” from Iran. leader’s intent or interests.
security, water, and electricity as technol- This is not a single occurrence with Finally, mobile technologies have
ogy becomes the medium through which Rouhani. He also previously tweeted provided the technological foundation
disparate aid efforts and financial assistance the content of his call with President for community policing programs in
can be coordinated and systematically dis- Barack Obama following the Septem- both the developing and the developed
persed, while also serving as the bedrock ber 2013 United Nations General world. Rwanda has implemented crowd-
for reconstructing postconflict political, Assembly in New York. Similarly, the sourcing initiatives that leverage mobile
economic, and social institutions. Thai government’s tweet announcing platforms to strengthen the rule of law,
martial law can be viewed as a means thereby enabling the community to pass
Factual Information and of promoting transparency by openly along information regarding looting and
Data Dissemination disseminating critical information to violent incidents and to simply serve as
While the popular discussion focuses the greater population. Twitter remains citizen journalists. The crowd-sourcing of
heavily on Internet censorship, many a mechanism through which the Thai information for the purpose of depicting
88 Features / The Multifaceted Nature of Cyber Statecraft JFQ 78, 3rd Quarter 2015
events factually and in real time is not Violent extremist organizations ship to control the narrative, removing
limited to state actors but is actually a similarly employ cyber statecraft as a sites that highlighted erroneous gov-
tactic employed more often by nonstate propaganda tool and a key mechanism ernment actions or were critical of the
actors such as nongovernmental organi- for recruitment and radicalization. Social government writ large.
zations as well as the general population. media is largely used as the venue for While the previous examples focus
This is apparent during events as diverse these propaganda instruments. However, on Internet censorship as a means to
as the Venezuelan protests, the Wenzhou some of the more tech-savvy groups, limit antigovernment content, China
train crash in China, and the recent Ebola such as Hizballah, have also created apps has taken a somewhat different ap-
crisis in West Africa. Of course, intent to recruit followers and disperse their proach, albeit with similar tools. A recent
plays a key role in categorizing cyber ideologies. Other nonstate groups, such Harvard publication, “How Censorship
behavior as the insertion of factual infor- as the Sinaloa Cartel and those linked in China Allows Government Criticism
mation or as propaganda. Government closely to governments such as the but Silences Collective Expression,”5
propagation of false information is in- Syrian Electronic Army, similarly create analyzes a wide range of social media data
creasingly common. YouTube videos and Twitter accounts as and finds that the major goal of Chinese
revisionist mechanisms to shape the dis- censorship is to prevent social mobiliza-
Propaganda course on current events or to propagate tion. While the previous examples focus
The spectrum of cyber statecraft has the promise of a luxurious lifestyle as a on limiting antigovernment rhetoric,
geopolitical relevance not only through member of their groups. Chinese leadership is much more likely
its positive tools of persuasion and to censor any content that may lead to
attraction. Cyber statecraft is also used Censorship group mobilization, regardless of the
by governments and nonstate actors State use of cyberspace applies to both topic of the content. This tendency sur-
for more punitive intents and the the manipulation of content, as previ- faced in 2014 with the 25th anniversary of
dispersal of misinformation. Vladimir ously discussed, and the censorship of the 1989 Tiananmen Square Massacre.
Putin’s aggressive behavior epitomizes it. Internet censorship has produced Chinese censors blocked major social
the exploitation of cyberspace as a a wide range of outcomes, and the media outlets and references pertain-
propaganda machine. He has used fake conditions under which it achieves the ing directly or indirectly to Tiananmen
Facebook accounts and other well- desired result remain vague. Depend- Square, with the objective of preventing
known social media outlets to depict ing on its depth and breadth, Internet any similar social mobilization.
the Crimean annexation in a positive censorship may actually fuel unrest
light. This includes, but is not limited instead of extinguishing it. For instance, Offensive Cyber Attacks
to, falsifying crimes and atrocities com- Venezuela’s attempts in 2014 to censor At the extreme end of the cyber state-
mitted by Ukrainian extremists. He also Twitter only ignited growing protests craft spectrum, an actor’s offensive use
has employed the Web to shape the against the government. Thailand has of cyber tools rounds out their punitive
narrative regarding Malaysian Flight 17, similarly tried to censor various social uses in statecraft. Offensive cyber tools
providing a range of incredible scenarios media sites, both after protests began range dramatically in severity and they
ranging from denial that it was shot last year and after the imposition of themselves comprise a broad spectrum
down to claiming he was the intended martial law. Turkey recently lifted its of statecraft tools. They could arguably
target. Similar to how leaders used block on YouTube, which was enacted be compartmentalized into four distinct
traditional tools of statecraft in previous after recordings of a security meeting areas: insertion (for example, malware),
eras, he relies on cyber tools to promote were leaked. The subsequent politi- blocking (distributed denial of service
a rally-round-the-flag effect and gain cal crisis resulted in increased Internet [DDoS]), removal (cyber espionage),
domestic support for Russian policy. censorship over the last year, which and destruction (such as of critical
As in historical examples, Putin applies sparked protests that still plague the information or infrastructure). In 2009,
not just one tool of cyber statecraft but Recep Tayyip Erdogan government. the United Arab Emirates relied on the
instead integrates cyber propaganda Similarly, Rouhani recently banned partially state-owned telecommunica-
with rising censorship and greater gov- Instagram, which now joins Facebook tions company Etisalat to request that
ernment control of the Internet. China and Twitter as an officially banned its BlackBerry users update their phones
takes a somewhat different approach social media outlet in Iran. Ironically, with service enhancements, which
to online propaganda. The govern- Rouhani himself is a prolific Instagram consequently implemented spyware on
ment hires online commentators, often user with a large following. Finally, the devices that provided the government
referred to as the 50-cent party, who Serbian government’s mismanagement with unauthorized access to private
are paid to participate in online com- in the wake of some of the country’s information. The pro-government Syrian
munities to counter anti-party content, worst flooding in over a century ignited Electronic Army, a loosely knit group of
promulgate the party agenda, or deter a vocal cyber backlash. In response, the hacktivists, went even further and has
sensitive content. Serbian government employed censor- been credited with—among other cyber
90 Features / The Multifaceted Nature of Cyber Statecraft JFQ 78, 3rd Quarter 2015
Standard Missile 3 launched from Aegis combat system–
equipped USS Decatur during Missile Defense Agency
ballistic missile flight test intercepting separated ballistic
missile threat target (U.S. Navy)
It is true today as it was ten years ago that this effort holds the promise of changing the
course of human history, by freeing the world from the ominous threat of ballistic missile
attack. Given the choice, shouldn’t we seek to save lives rather than avenge them?
—President Ronald Reagan on the 10th Anniversary of the Announcement of the Strategic Defense Initiative
92 Features / Indications and Warning Efforts of BMD JFQ 78, 3rd Quarter 2015
Korea would actually use nuclear weapons in its overall strategy to “deter—and of a high-resolution X-band radar
is hotly debated. However, an irrational if need be retaliate—against forces in primarily deployed in support of U.S.
North Korea equipped with nuclear- the region, including U.S. forces.”21 allies in Asia, Europe, and the Middle
armed ICBMs perceiving a threat to its An Iran equipped with nuclear-tipped East; however, it can also provide
regime could result in a serious and dan- ICBMs would likely extend that strat- acquisition and tracking data for the
gerous miscalculation that would threaten egy to include North America, thereby integrated BMD system.25
North America. seriously affecting the U.S. position Sea-based components of the BMD
Iran does not currently possess an and leverage against Iran in regional warning system include the ship-based
ICBM capability; however, Tehran security issues by holding major U.S Aegis and semi-submersible platform-
continues to prioritize and advance its population areas hostage. Again, any based radars, which can each detect and
ballistic missile programs. Since the perceived threat to the Iranian regime provide acquisition and tracking informa-
1980s, Iran has relied on its North could result in a serious miscalculation. tion for the BMD system. The mobile
Korean and Syrian partners to export nature of naval platforms allows them to
and then assist in the development of I&W Capabilities for BMD be repositioned around the globe with
short- and medium-range ballistic mis- To effectively use ground-based inter- efficiency to improve BMD detection cov-
sile systems. Despite its original reliance ceptors to counter threats, WRAs must erage during heightened tensions within a
on third parties, Iran’s missile program have substantial intelligence resources given region. There are currently 31 cruis-
has evolved over time, demonstrating to detect and monitor perceived indi- ers and destroyers based in the Atlantic
the engineering and technical expertise cators via analysts and tools that may and Pacific fleets that are fitted with the
necessary to develop missile technolo- offer adequate warning. Whether a Aegis BMD system, with an additional
gies on its own.16 In particular, Iran single source of information or a fusion two undergoing installation. Aegis Ashore
has continued to work on its satellite of multiple sources, I&W intelligence Installations will be located in Romania
launch vehicles (SLVs). In February provides time-sensitive information to and Poland as part of the European
2009, Iran successfully launched a military commanders or other senior Phased Adaptive Approach, with an Aegis
satellite into orbit using its Safir-2 SLV leaders who may authorize a response Ashore test facility in Hawaii.26 The Aegis
platform. Since then, it has been work- to an adversarial action or intention. system works in conjunction with the
ing on upgrades for delivering heavier BMD warning is enabled by a layered Army Navy/Shipboard Phased-Array
payloads into higher orbits.17 According multisensor architecture that consists Radar (AN/SPY-1) S-Band radar and can
to Director of National Intelligence of fixed and mobile land-, sea-, and detect, cross-cue, and track ballistic mis-
James Clapper, “Iran continues to ex- space-based assets located around the siles to provide warning to other regional
pand the scale, reach and sophistication world. Future I&W capabilities for and national assets.27 Aside from U.S.-
of its ballistic missile forces—many of BMD will most likely include greater operated systems, Japan purchased Aegis
which are inherently capable of carrying numbers of systems as described, for its four Kongo-class guided missile
a nuclear payload.”18 in addition to more technologically destroyers,28 and smaller, less capable Aegis
The Defense Intelligence Agency robust systems in development. Nev- versions are carried by Australia, Norway,
assesses that Iran’s development of large ertheless, the U.S. Government has South Korea, and Spain.29 Furthermore,
space launch vehicles demonstrates an signaled it will also incorporate joint the Sea-Based X-Band (SBX) radar is
intent to develop ICBM technologies. and multinational efforts beyond those mounted on a twin-hulled, self-propelled
In January 2012, Secretary of Defense that already exist.22 drilling platform that is jointly operated by
Leon Panetta noted that “Iran might be Land-based components of the the Missile Defense Agency and Military
able to develop a nuclear-armed missile BMD warning system include fixed sites Sealift Command.30 Primarily used for
about a year or two after developing a and mobile phased-array radar sensors. BMD testing purposes in the Pacific, the
nuclear explosive device.”19 The rapid Upgraded early warning radars located SBX radar can also be deployed in support
progress of Iranian missile technology in Alaska, California, Greenland, and of homeland defense. The land-, sea-, and
and development is changing the minds the United Kingdom provide all- space-based sensor systems can provide
of many senior leaders who had been weather, long-range tactical warning target track information to the command,
skeptical about the future of Iranian of ballistic missile launches, including control, battle management, and commu-
ICBM capabilities and ability to threaten estimated launch and impact points, to nications (C2BMC) system, which then
North America.20 the command authority.23 The Cobra provides tracking information to other
Similar to North Korea, concerns Dane Upgrade is a midcourse radar radar systems and track and discrimination
exist regarding an ICBM-equipped in Alaska that detects missiles out to information to the shooter systems for
Iran armed with nuclear devices. Iran 2,000 miles and operates in the L-band organic or remote engagement.
possesses an extensive inventory of radio frequency.24 The Army Navy/ Space-based systems have provided
short- and medium-range ballistic mis- Transportable Radar Surveillance and the United States a strategic and tacti-
siles. Tehran incorporates these missiles Control (AN/TPY-2) consists in part cal I&W capability for more than five
decades. The once-classified, second-gen- warning capabilities. In addition, multi- I&W for ICBM threats as well as plan-
eration satellite constellation known as national efforts in the Asian, European, ning and operational issues related to
the Defense Support Program (DSP) was and Middle Eastern regions will become BMD, each geographic combatant
first launched into orbit in 1970.31 DSP more robust and include nontraditional commander is responsible for protect-
satellites use short- and mid-wave infrared partners such as China and Russia,35 ing the homeland in the command’s
sensors in a geosynchronous Earth orbit suggesting that the United States and its respective area of responsibility (AOR).
(GEO), allowing constant or near-con- allies perceive North Korea and Iran as USNORTHCOM and USPACOM
stant vigilance in support of the overhead the primary antagonists of the ballistic have specific roles and tasks within
persistent infrared mission.32 The third- missile threat. These future platforms will this construct.36 The USNORTH-
generation satellite constellation known enable earlier I&W, which will increase COM commander has the overarching
as Space-Based Infrared Systems uses a the engagement windows for the BMD responsibility of protecting North
mix of GEO and highly elliptical orbit systems and provide additional decision America as the supported command,
satellites, which allows for scanning and timeframes for the WRAs. with assistance from USPACOM and
staring33 of selectively targeted areas with NORAD as supporting commands.37
increased sensitivity as compared to the Combatant Commander The USSTRATCOM commander
older DSP satellites.34 Responsibilities for I&W is responsible for synchronizing global
Future sensors are in development Although USSTRATCOM provides BMD plans and operations, in addi-
to improve and enhance current BMD subject matter expertise on global tion to providing missile warning to
94 Features / Indications and Warning Efforts of BMD JFQ 78, 3rd Quarter 2015
NORAD and other combatant com- by sharing targeting information and ICBM flight last less than 30 minutes.
manders if the appropriate combatant engagement control for a WRA. During this time, a WRA must identify
command is unable to do so.38 To The U.S. GMD missile system cur- the ICBM launch, determine if the
this end, the USSTRATCOM com- rently is the only demonstrated capability launch is a threat to the United States,
mander established the Joint Functional for defense against ICBM threats to the decide to engage the ICBM with GBIs,
Component Command for Integrated United States.43 Planners bin ballistic mis- and achieve a successful kill while the
Missile Defense (JFCC-IMD) as the siles into one of five categories based on missile is still in its midcourse phase of
synchronizing body for the BMD sys- their maximum range capabilities: close flight. Currently, the BMD system relies
tem.39 The Missile Defense Agency and range (62–186 miles), short range (under on intelligence and sensors to indicate
JFCC for Intelligence, Surveillance, and 620 miles), medium range (between 620 the construction or deployment of
Reconnaissance support JFCC-IMD in and 1,800 miles), intermediate range rogue nation systems to provide warning
providing “shared situational awareness, (between 1,800 and 3,400 miles), and of an impending attack. This additional
integrated battle management C2 [com- intercontinental (greater than 3,400 time allows for deployment of additional
mand and control], adaptive planning, miles).44 For ICBM threats to the United radar sensors toward the anticipated
and accurate and responsive battle dam- States, the BMD system relies on GBIs launch site in order to detect and track
age assessment.”40 launched from U.S. bases to intercept any incoming missile.
and kill the missile or warhead during
BMD System the midcourse phase of its flight. (GBIs Integrated Threat Analysis:
The ballistic missile defense system is a are the only system available to attack an Current Situation
complex, distributed system of five ele- ICBM during this phase.) The United A number of factors degrade effective
ments (four shooter elements and one States currently has GBI silos at Fort strategic I&W, creating a particularly
C2 element), five sensor systems (four Greely, Alaska, and Vandenberg Air Force dangerous situation with respect to the
radar systems and one space-based Base, California.45 North Korean ICBM threat and timely
system), and supporting efforts. The Ground-based interceptors are WRA response for BMD employment.
integration of these many elements and three-stage, solid-fueled boosters with an First, North Korea is an isolated, closed
efforts enable a robust, layered defense exoatmospheric kill vehicle (EKV). Upon state that denies robust, comprehensive
against a hostile missile in all phases of ICBM launch detection and recognition intelligence collection operations. As
flight.41 The shooter elements include as a threat to the United States, a WRA a result, the Intelligence Community
the Aegis BMD, Terminal High- can launch GBIs in self-defense. The relies on nonpersistent, space-based
Altitude Area Defense system, Patriot decision to launch must be made with imagery collection for North Korea.50
missile defense system, and Ground- enough time available for the GBI to reach Second, these nonpersistent,
Based Midcourse Defense (GMD) the ICBM during the midcourse phase. space-based assets are in high demand, es-
system. The sensor systems include During the GBI flight, the EKV separates pecially by coalition commanders focused
the Aegis BMD AN/SPY-1 radar, from its booster and uses onboard sen- on the Korean Peninsula. The capabilities
Cobra Dane radar, upgraded early sors for target detection, guidance, and needed for BMD I&W are shared with
warning radars, AN/TPY-2 (forward- discrimination, resulting in a collision with other PIRs, such as North Korean long-
based mode) radar, and Space-Based the targeted reentry vehicle while it is still range artillery; short-, medium-, and
Infrared Systems/DSP. In addition, in its midcourse phase.46 intermediate-range ballistic missiles; and
the Sea-Based X-Band radar (primar- ICBMs have three stages of flight: ground, air, and air defense forces.
ily a test asset that can be operation- boost, midcourse, and terminal. The Third, even when these space-based
ally deployed as needed) will be used boost phase begins with the launch of assets are used to collect information on
within the BMD system when available. the missile/warhead and lasts until the North Korean ICBMs, the road-mobile
The command and control element rocket engine burns out, approximately threats, combined with North Korean
is the C2BMC, a vital operational 3 to 5 minutes.47 The midcourse phase, camouflage, concealment, and deception
system that enables the President, which is the longest phase of flight, efforts, make them extremely difficult to
Secretary of Defense, and combatant starts after rocket engine burnout and find and track. Thus, it is conceivable that
commanders at strategic, regional, continues with the missile/warhead the first indication of a North Korean
and operational levels to systematically exiting Earth’s atmosphere, reaching its ICBM launch against North America
plan BMD operations, collectively see apogee, and beginning its descent, and would come from tactical I&W from
the threat develop, and dynamically can last up to 20 minutes.48 During the overhead persistent infrared assets, start-
manage designated networked sensors terminal phase of flight, the detached ing the clock for a WRA to make a GBI
and weapons systems to achieve global warhead reenters Earth’s atmosphere engagement decision.
and regional mission objectives.42 This and continues until detonation or According to Joint Publication 3-27,
group of automated systems enables impact. This generally lasts less than a Homeland Defense, and the Unified
each sensor and shooter to integrate minute.49 In total, the three stages of Command Plan, it is incumbent upon
96 Features / Indications and Warning Efforts of BMD JFQ 78, 3rd Quarter 2015
timely manner to the USNORTHCOM (July–August 2013), 80, available at <www. It is self-scanned electronically, can provide
worldaffairsjournal.org/article/us-missile- enhanced sensitivity, and is suitable for light-
commander. Upon notification of a defense-closing-gap>. weight cameras [emphasis added].” See Lester
launch, the commander has only a few 14
Emma Chanlett-Avery and Ian Rinehart, J. Kozlowski and Walter F. Kosonocky, “Infra-
minutes from launch identification to de- North Korea: U.S. Relations, Nuclear Diplo- red Detector Arrays,” 33.6–33.7, available at
termine if it is a threat to North America macy, and Internal Situation, R41259 (Wash- <www.mhprofessional.com/handbookofoptics/
and to successfully engage the threat. ington, DC: Congressional Research Service, pdf/Handbook_of_Optics_vol2_ch33.pdf>.
2013), 6, available at <www.fas.org/sgp/crs/ 34
“Infrared Space Systems Directorate,”
Finally, due to limited time and
nuke/R41259.pdf>. U.S. Air Force Fact Sheet, November 23, 2011,
resources, actions and reactions to a mis- 15
Ibid., 1. available at <www.losangeles.af.mil/library/
sile launch must be flawless, especially 16
Chris Smith and Matthew Wallin, “Irani- factsheets/factsheet.asp?id=5330>.
among geographic combatant command an Ballistic Missiles,” AmericanSecurityProject. 35
BMDR, 31–35.
areas of responsibility. The entire system org, August 2013, 1, available at <http://amer- 36
JP 3-27, Homeland Defense, II-18.
icansecurityproject.org/featured-items/2013/ 37
Ibid., III-17–III-19.
must work as one unit despite its geo-
fact-sheet-iranian-ballistic-missiles/>. 38
Ibid., III-19.
graphically distributed parts. To aid in the 17
Ibid., 5. 39
Ibid., III-18–III-19.
effective handoff of BMD responsibilities 18
Masters and Bruno, 6. 40
Ibid.
between AORs, shared, pristine situ- 19
Kenneth Katzman, Iran: U.S. Concerns 41
“A System of Elements,” Missile Defense
ational awareness is paramount. North and Policy Responses (Washington, DC: Council Agency Fact Sheet, July 18, 2013, available at
on Foreign Relations, 2012), 36, available at <www.mda.mil/system/elements.html>.
Korean intent is evident. Ballistic missile
<www.cfr.org/iran/crs-iran-us-concerns-policy- 42
“Command, Control, Battle Manage-
defense of the homeland is a no-fail mis- responses/p282737>. ment, and Communications (C2BMC),”
sion that starts with collaborative and 20
Smith and Wallin, 6. Missile Defense Agency Fact Sheet, November
timely strategic and tactical I&W pro- 21
Katzman, 36. 2012, available at <www.mda.mil/system/
vided by USNORTHCOM, USPACOM,
22
Ballistic Missile Defense Review Report c2bmc.html>.
(BMDR) (Washington, DC: Department of 43
Baker Spring, “Protecting U.S. Terri-
and USSTRATCOM. JFQ
Defense, February 2010), v–vii. tory Against Long-Range Missiles: Second
23
“Upgraded Early Warning Radar,” Mis- Approach Needed,” Heritage Foundation Issue
sile Defense Agency Fact Sheet, April 2013, Brief #3987, July 15, 2013, available at <www.
Notes available at <www.mda.mil/global/docu- heritage.org/research/reports/2013/07/pro-
ments/pdf/uewr1.pdf>. tecting-us-territory-against-long-range-missiles-
1
“The Threat,” Missile Defense Agency 24
“Cobra Dane,” Missile Defense Agency 2nd-approach-needed>.
Fact Sheet, December 2014, available at <www. Fact Sheet, February 2013, available at <www. 44
Masters and Bruno, 1–2.
mda.mil/system/threat.html>. mda.mil/global/documents/pdf/cobradane. 45
Ibid., 4.
2
Ibid. pdf>. 46
Weitz, 83.
3
Ibid. 25
“Army Navy/Transportable Radar 47
Robert G. Gard and Kingston Reif, “Fact
4
Ibid. Surveillance (AN/TPY 2),” Missile Defense Sheet: U.S. Ballistic Missile Defense,” Center
5
Bernard Ulfers and George LeFurjah, “AN/ Agency Fact Sheet, February 2013, available for Arms Control and Non-Proliferation, 2013,
SPY-1B/D RADAR Design Changes Supporting at <www.mda.mil/global/documents/pdf/ available at <http://armscontrolcenter.org/is-
Aegis Ballistic Missile Defense,” Leading Edge 7, an_tpy2.pdf>. sues/missiledefense/articles/fact_sheet_us_bal-
no. 2 (2013), 101. 26
“Aegis Ballistic Missile Defense,” Missile listic_missile_defense/>.
6
Ibid. Defense Agency Fact Sheet, August 2013, 48
Ibid., 1.
7
Jonathon Masters and Greg Bruno, “U.S. available at <www.mda.mil/system/aegis_bmd. 49
Ibid.
Ballistic Missile Defense,” Council on Foreign html>. 50
JP 3-14, Space Operations (Washington,
Relations Backgrounder, May 2006, available 27
Ronald O’Rourke, Navy Aegis Ballistic DC: The Joint Staff, January 6, 2009), V-5‒V-6.
at <www.cfr.org/defensehomeland-security/us- Missile Defense (BMD) Program: Background 51
JP 3-27, Homeland Defense, II-9, II-12,
ballistic-missile-defense/p30607>; Joint Publi- and Issues for Congress, RL33745 (Washington, III-13.
cation (JP) 3-27, Homeland Defense (Washing- DC: Congressional Research Service, 2011), 52
Ibid., III-19.
ton, DC: The Joint Staff, 2009), III-18. 2–3, available at <https://opencrs.com/docu-
8
Frank Harvey, North Korea, Ballistic Mis- ment/RL33745/>.
sile Defence, and Canada-US Defence Coopera- 28
“Aegis Ballistic Missile Defense.”
tion, Canadian Defence and Foreign Affairs 29
O’Rourke, 3.
Institute (CDFAI) Policy Paper (Calgary, 30
“Sensors,” Missile Defense Agency Fact
AB: CDFAI, 2013), 1, 5, available at <www. Sheet, November 2012, available at <www.
cdfai.org/PDF/North Korea Ballistic Missile mda.mil/global/documents/pdf/sbx.pdf>.
Defence.pdf>. 31
“Defense Support Program: Satellites,”
9
Greg Thielmann, Sorting Out the Nuclear U.S. Air Force Fact Sheet, February 2, 2011,
and Missile Threats from North Korea (Wash- available at <www.losangeles.af.mil/library/
ington, DC: Arms Control Association, 2013), factsheets/factsheet.asp?id=5323>.
6, available at <www.armscontrol.org/files/ 32
Ibid., 1.
TAB_Sorting_Out_North_Korea_2013.pdf>. 33
“The two basic types of focal plane
10
Ibid., 7. arrays are scanning and staring. The simplest
11
Ibid., 3, 6. scanning device consists of a linear array. An
12
Ibid., 1. image is generated by scanning the scene
13
Richard Weitz, “US Missile Defense: across the strip. . . . A staring array is the
Closing the Gap,” World Affairs Journal two-dimensional extension of a scanning array.
Lieutenant General John “JD” Johnson, USA, is Director of the Joint Improvised Explosive Device Defeat
Organization. Colonel Bradley T. Gericke, USA, currently serves on the Army Staff.
98 Features / American Land Power and a Korean Crisis JFQ 78, 3rd Quarter 2015
ashed from the yellow earth and But now a young leader sitting atop economic, and security interests tightly
catalyst would be the perceived threat It is better to remain firmly in control and and even Bashar al-Asad are surely near to
posed by the West to regime leadership. resist for as long as possible than to incur mind; none serves as models for paths to
Readiness—and the sacrifices demanded the high risk posed by instability. accommodation with the United States.
by the public to stay ready—to fight to It is axiomatic that North Korea’s Thus U.S. and ROK military planning
protect the ethnic Korean nation whose leaders see their own authority as an exis- must admit that North Korea’s leaders
only true defender is the North is inherent tential issue and would have little interest are motivated to protect their interests.
to their ruling ideology. North Korea’s in restraint in defending themselves. They That translates to war across the range of
leaders comprehensively prioritize a would employ every tool at their disposal military operations, against a determined
military mindset and act accordingly.5 to preserve their regime: conventional adversary, in Asia—complexity posing
Their ambition to protect the North’s forces, special operations capabilities, severe challenges for American planners.
self-declared concept of Korean racial cyber attacks, missile and artillery volleys, The North’s aggressive promotion
and cultural purity means that the regime and, logically, WMD. The U.S. joint of confrontation also heightens the risk
cannot go far down the path of economic force must not presume that the selective of unintended consequences such as
reform and political liberalism. The elastic- application of U.S. weapons in an attempt an escalatory spiral driven by emotion,
ity that Western policymakers seek from to limit the scope of the conflict would be miscalculation, and chance. It is entirely
the regime is simply incompatible with feasible. Once its ruling elites see them- feasible—in fact most likely—that any
that mindset. This does not mean the selves in jeopardy, North Korea could be major military engagements would start
North’s rulers are martyrs, but it does expected to fight with all its capabilities. with little or no notice. The scenarios for
leave plenty of decision space to risk a war, The fates of recent U.S. adversaries such escalation are remarkably complex and
even if they could be defeated eventually. as Muammar Qadhafi, Saddam Hussein, merit a clear-eyed consideration of the
100 Features / American Land Power and a Korean Crisis JFQ 78, 3rd Quarter 2015
kind of campaigns likely to be waged in longstanding approach of provocation highly suited to the diverse challenges
crisis. In all cases military action would followed by extraction of concessions posed by North Korea.
certainly be many things: fast-paced, continues to work. This is especially true
violent, fought in multiple domains, high now, as Kim Jong-un tightens his author- The Operational Environment
risk, and international in scope. What it ity through assassination of his political If wars really do end in the mud, then
would not be is easily limited or waged rivals in a rare third-generation hereditary the physical environment of northeast
only on American terms. transition within an autocratic state. Asia offers plenty. Korea’s weather is
Here is where U.S. policy desires and In the meantime, change is under extreme—brutally humid and monsoonal
the shadow of history collide. Common way south of the DMZ, which further in the summer and bitterly cold in the
wisdom asserts that another war on the heightens military risk. The population winter. Most of the peninsula features
Korean Peninsula is, in effect, unthink- of South Korea is justifiably proud of rugged, compartmented terrain char-
able. Regional stakes are too high. Too hard-earned prosperity, and while they acterized by low-lying rice paddies and
many global powers and their economies long tolerated provocations by the farm fields with steeply sloped moun-
are in play. Enormous populations are at North, that forbearance is now being tains. U.S. mobility would be challenged.
risk. At home, an American public and sorely tested.7 The public made their Logistical support would be severely
policy class is weary from a decade of displeasure known by reacting with tested. In short, the Korean Peninsula
war in the Middle East. The default then revulsion to the civilian loss of life as a presents considerable challenges that
is to hold the prospect of war in Asia at consequence of the Yeonpyeong shell- would test U.S. troops and equipment.
arm’s length while hoping for time to re- ing. In the years since, the public’s The military resources available to
muster American military strength and perception of their security has declined the North are more formidable than
for something—anything—to change significantly.8 ROK political leaders they may at first appear. Despite their
on the Korean Peninsula that leads to an have taken note. After each of the aging equipment, inadequate transport,
end-of-Cold-War–style soft landing. But North Korean provocations in 2010, outdated communications gear, and poor
given North Korea’s record, one should senior ROK leaders were dismissed, maneuver training, they retain significant
hold little optimism for a negotiated including ministers of defense, the lethal capabilities. While conquest of the
settlement to conclusively lessen tension chairman of the joint chiefs of staff, peninsula may no longer be feasible—a
on the peninsula.6 It is a risky proposi- and a number of general officers. The fact that the North’s military leaders likely
tion to assume that the relatively orderly result is that the armed forces are more understand—the North’s armed forces
endgame of the Cold War in Europe determined and readier than ever to pose multiple, in-depth, and complex chal-
would be replicated in northeast Asia. deliver a prompt, firm, and unequivocal lenges to U.S. and ROK armed forces.11
The history is simply different, and so military response in the event of an- The North Koreans would still be a for-
are the cultures in play. other such North Korean attack. This is midable adversary in ground combat and
It should not be surprising then that just the kind of tinder that could spark possess strategic and operational attack
the North’s leaders appear to be sticking a broader conflagration. options via robust short-, medium-, and
to their playbook. Their March 2010 A salutary development at the long-range missile and cannon capabili-
sinking of the ROK Cheonan, with the level of national policy is that the U.S. ties, which alone could put at risk most
loss of more than 40 ROK sailors, and Department of Defense is beginning of the ROK’s population. North Korea’s
the shelling of Yeonpyeong Island in the rebalance of force capabilities to the armed forces are the fourth largest in the
November of that year, the largest mili- Asia-Pacific region.9 In addition, the world, including an active-duty strength
tary assault against the South since the U.S. Army, despite its ongoing commit- of more than 1.2 million—at least twice
armistice, are provocations very much ments in the Middle East, has recently the size of the South’s.12 The North does
in the North’s customary style. Then published its operating concept, Win in a not possess the professional officers and
in April 2012, North Korea launched Complex World, with its embedded idea modernized equipment of the South,
a 90-ton Unha-3 rocket ostensibly for of “joint combined arms operations.” but the regime’s military leadership is
the purpose of placing a satellite in orbit Such operations consist of “synchronized, indoctrinated and loyal, and the North
but likely serving as a test platform for simultaneous, or sequential application Korean People’s Army (NKPA) boasts
long-range missile technologies. (It is of two or more arms or elements of one both large numbers of armored vehicles
in this context that the alleged cyber service, along with joint inter-organiza- and an especially lethal indirect fire inven-
attacks by North Korea against Sony in tional and multinational capabilities to tory: 7,500 mortars, 3,500 towed artillery
late 2014 must be understood.) And of ensure unity of effort and create multiple pieces, 4,400 self-propelled cannons, and
course even more seriously, the North has dilemmas for the enemy.”10 The Army’s 5,100 multiple-rocket launchers. These
claimed several successful underground concept proposes the kind of integrated, can deliver both standard high explosives
nuclear tests in recent years. Leaders in adaptable maneuver that would be neces- and chemical munitions.
Pyongyang no doubt see little incentive sary to confront and then defeat likely Swiftly neutralizing a large number
to try a new approach so long as their adversaries in any theater, but seems of delivery systems is problematic even
102 Features / American Land Power and a Korean Crisis JFQ 78, 3rd Quarter 2015
follow-on forces from all Services to the
peninsula. These alone are monumental
undertakings that would require dedi-
cated manpower and consume that most
precious commodity, time. And then,
when conflict erupts, U.S. forces would
confront a threat posing complexity and
scale unlike any combination faced else-
where in the world.
In the face of this threat, the first
campaign to command the attention of
the world’s capitals would be to render
neutral North Korea’s strategic weapons
and associated capabilities, especially
nuclear weapon launch and detonation.
In 2006, the North publicly declared
that it had conducted a successful un-
derground nuclear test, and 3 years later
it claimed to possess a nuclear weapon.
No doubt it continues to pursue nuclear
weapons capability, the only purpose of
which could be to hold its neighbors
and adversaries hostage, including the
United States. In the interim, the North
is ambitiously developing a range of mis-
sile technologies and platforms, some of
them near fielding and possibly already in
low-rate production, which could enable
it to strike farther into the depth of the
peninsula and as far as Japan.
Taking down the North’s strategic U.S. Army Prepositioned Stock IV receives upgraded Bradley Fighting Vehicles as ongoing effort to
and operational strike weapons capabil- strengthen readiness across Korean Peninsula (U.S. Army/Bryan Willis)
ity would include eliminating its ability
to perform centralized command and a massive artillery and rocket barrage if the officially sanctioned SOF, armed
control. The regime, being the center of it is afforded the opportunity to do so. bands inspired either through deprivation
gravity of the North Korean state, would Vigorous measures from the ground, sea, and hope of food or gain or simply out
remain a viable political reality only and air would be necessary to stymie the of desperation and fear of ROK and U.S.
as long as it could provide centralized North’s indirect fire attacks. troops could be expected to resist vehe-
control. However, as we have seen in the Elsewhere north of the DMZ, uni- mently in northern areas. North Korean
Middle East in recent years, this does formed troops and regime security forces arsenals and underground facilities near
not mean that violence is terminated. would likely continue to fight, what- the border area no doubt number in the
Lack of central authority can in fact ever the status of the central regime in hundreds, replete with munitions and
serve as an accelerant, which leads to the Pyongyang. They would almost certainly explosives that could easily be turned into
next challenge. follow their “last orders” and resist until improvised explosive devices.
The next component of the ground they are killed or unable to offer any re- Finally, it is inevitable that ground
campaign would be to wage a fight that sistance. At the same time, North Korean forces must to some extent participate
in some respects resembles the battlefields SOF, highly trained and well equipped by in stability operations, particularly dur-
of Northern France in 1918 as much as a the regime and one of the largest special ing the transition following offensive
21st-century fight: lots of artillery, lots of operating formations in the world, would combat operations. While the ROK
chemical weapons, and large numbers of pose a significant threat. These purpose- would formally take on the requirement
dug-in forces. One urgent aspect of this built organizations are intended to to establish a competent government
conventional fight is the ROK determina- open a “second front” behind the allied authority to initiate the reconstitution
tion—and U.S. obligation—to protect lines—in both South Korea and North of civic functions and services in the
the city of Seoul and its environs. There is Korea—and could be expected to achieve North, U.S. forces would inevitably be
little doubt that the North would launch considerable disruptive effect. Alongside required to pacify chaotic conditions on
the ground. A critical mission within this is denied the ability to employ these
environment is for the Army to lead joint
WMD: New Missions weapons, their elimination—their isola-
force efforts on the ground to perform
on the Ground tion and ultimate destruction—poses
The North’s extensive WMD archi-
CWMD missions.18 Harnessing the full the next inevitable and important step
tecture has matured to the point that
suite of capabilities of the joint force to for U.S. forces in conjunction with our
it is now a dominating feature of the
address the WMD threat would be a nec- ROK allies. There is no U.S. agency
Korean battlespace. It endangers civil-
essary and demanding priority that would with the requisite mission command
ian populations and military forces on
influence nearly every aspect of ground and robust means to protect friendly
the peninsula, and it puts in harm’s
operations. This is a central feature of forces and allies on the ground—and
way, either by deliberate use or even as
the Korean Peninsula’s warfighting with the requisite special skills—other
a result of an accidental release, every
environment and one with worldwide than U.S. Army forces enabled by joint
neighboring state. Once the North
implications for U.S. forces. capabilities.
104 Features / American Land Power and a Korean Crisis JFQ 78, 3rd Quarter 2015
The precise number, function, and system engenders renders any balance View National Security,” Wall Street Journal–
Asia, April 11, 2013.
location of the North’s WMD sites and of power inherently unstable. 9
Secretary of Defense Leon Panetta in Da-
associated installations are not known. Defeating North Korea militarily vid Alexander, “U.S. Will Put More Warships in
The North keeps its programs shrouded in would require the joint force to operate Asia,” Reuters, June 2, 2012.
secrecy. Thus U.S. and ROK forces would in every domain. The land campaign 10
The U.S. Army Operating Concept: Win
undoubtedly discover many facilities would be decisive. In every eventuality, in A Complex World, U.S. Army Training and
Doctrine Command Pamphlet 525-3-1, Octo-
that are currently hidden. Joint CWMD among key U.S. objectives is that the
ber 7, 2014, 45.
operations would constitute a WMD North Korean WMD program must be 11
Alexandre Y. Mansourov, “North Korea:
“movement to contact” as our forma- rendered safe. If crisis erupts in Korea, Turning in the Wrong Direction,” 38North.
tions gain contact with the adversary’s American military forces on the ground org, April 2013, available at <http://38north.
network and construct a more accurate would be central actors to safeguard U.S. org/2013/04/amansourov041013/>.
12
Anthony Cordesman et al., The Korean
and comprehensive picture of the threat. interests and restore stability. JFQ
Military Balance: Comparative Korean Forces
Operations would require specific chemi- and the Forces of Key Neighboring States (Wash-
cal, biological, radiological, nuclear, and ington, DC: Center for Strategic and Interna-
explosives–trained and –equipped person- Notes tional Studies, 2011), 40.
nel and units at every echelon.19
13
Regarding North Korean nuclear weap-
1
For a short quote from Secretary of State ons effects on select Republic of Korea targets,
The U.S. strategy for combating see Bruce W. Bennett, “Deterring North Korea
Henry Kissinger concerning balances of power,
WMD contains several components, see Niall Ferguson, “America’s Global Retreat,” from Using WMD in Future Conflicts and
including nonproliferation, counterpro- Wall Street Journal, February 21, 2014. Crises,” Strategic Studies Quarterly (Winter
liferation, and consequence management. 2
Lukas Milevski, “Fortissimus Inter Pares: 2012), 125.
WMD-elimination operations are both The Utility of Landpower in Grand Strategy,” 14
“South Korea: EU Bilateral Trade and
Parameters (Summer 2012), 9. Trade with the World,” DG Trade Statistics,
technically demanding and manpower- 3
Andrew Bacevich, “The Endless Army: Is March 21, 2012.
intensive actions to systematically locate, ‘Pacific Pathways’ a Necessary Pivot or Military 15
Raymond T. Odierno, “The U.S. Army
characterize, secure, disable, or destroy Budget Grab?” Boston Globe, January 10, 2014. in a Time of Transition: Building a Flexible
WMD programs and related capabilities, 4
The crimes of the North Korean regime Force,” Foreign Affairs, May–June 2012.
each of which is manpower intensive.20 against its own people are increasingly well 16
Not discussed in this article are the
documented, adding further pressures to enabling operations to be waged in cyberspace
There is no substitute for trained and and space, or other instruments of national
regime decisionmaking. See “Commission of
ready forces on the ground to perform Inquiry on Human Rights in the Democratic power such as economic sanctions or blockades.
these necessary mission tasks. People’s Republic of Korea,” United Nations Nor discussed are the prominent roles to be
Office of the High Commissioner for Human played by key powers in the region, to include
In Summary Rights, February 2014. Russia, Japan, and prominently, China.
5
See B.R. Myers, “Planet Pyongyang,” 17
About 20,000 of the 28,000 troops
During the intervening six decades since stationed in Korea are U.S. Army Soldiers.
Newsweek, April 15, 2013. See also B.R. My-
the 1953 Korean Armistice Agreement, ers, The Cleanest Race: How North Koreans It is already fashionable among the military
the divide between North and South— See Themselves and Why It Matters (New York: intelligentsia to charge that the Air-Sea Battle
in effect between the past and the Melville House, 2010). Professor Myers’s book concept will trump the imperative of U.S. Army
future—has only deepened. This dispar- offers a penetrating assessment of the North forces in Asia. The facts on the ground speak
Korean regime’s ideology. differently. For a short review of the debate
ity is increasingly perilous as the regime 6
Provocations of course are longstand- among the Services, see Sydney J. Freedberg,
in the North depends ever more exclu- ing features of North Korean behavior. In the Jr., “The Next War,” Government Executive
sively on its military-political complex mid-1960s the North initiated more than a Magazine, August 15, 2012.
for its survival. It lacks international decade of violent acts along the Demilitarized 18
See Joint Publication (JP) 3-40, Counter-
legitimacy and possesses only a fractured Zone (DMZ) that took dozens of lives. Major ing Weapons of Mass Destruction (Washington,
terrorist actions included a raid to assassinate DC: The Joint Staff, October 31, 2014).
and declining economy, and its people
the South’s president, Park Chung-hee, at his 19
“White Paper,” U.S. Army 20th Support
have been starved, slaughtered, brain- official residence in the Blue House in Seoul Command (CBRNE) [chemical, biological,
washed, and coerced into submission. (1968); seizing the U.S. naval vessel USS radiological, nuclear, and explosives], Back-
In a region featuring important Pueblo (1968); and the murder of two U.S. ground Information, September 2011.
U.S. national interests, the persistent Army Officers in the DMZ (August 18, 1976). 20
JP 3-40, A-1.
presence of American forces and capa-
7
Karl Friedhoff, “South Korean Public
Opinion Following North Korea’s Third
bilities, in close partnership with the Nuclear Test,” Public Opinion Studies Center,
Republic of Korea and regional part- The Asan Institute for Policy Studies, March 8,
ners, has kept war at bay. How much 2013. For the South’s immediate response in
longer this balance (the spinning top) 2010, see Keith B. Richburg, “South Korean
can be kept in play cannot be known. President Takes Responsibility for Failing to
Protect Country, Signals Hardened Military
The severe rigidity of the North Korean Stance Toward North,” Washington Post, No-
political-military nexus and the po- vember 29, 2010.
tential for miscalculation that such a 8
Karl Friedhoff, “How South Koreans
irst published in Europe in 1947 approaching a village where the peas- The people of the village, impressed by
106 Features / JMTC Partnership and NATO JFQ 78, 3rd Quarter 2015
anniversary of the Munich Security making these capabilities work together Proximity does not directly equal
Conference on February 1, 2014, most effectively. The Connected Forces access, however, so the JMTC uses the
then–Secretary of Defense Chuck Hagel Initiative mobilises all of NATO’s resources “3P” approach to developing partner-
outlined “renewed and enhanced” part- to strengthen the Allies’ ability to work ship—persistence, patience, and presence.
nership and cooperation with NATO as a together in a truly connected way. This is Once trust, confidence, sincerity, and
fundamental component of our National particularly important as we wind down respect are achieved at all levels of en-
Security Strategy: our combat operations in Afghanistan at gagement, the access we acquire enables
the end of 2014. I see three areas to focus effective training and presents more
In reviewing U.S. defense priorities, tem- our efforts in the coming years: expanded training opportunities. This access pro-
pered by our fiscal realities, it’s clear that education and training; increased exer- motes mutual understanding and greater
our military must place an even greater cises, especially with the NATO Response interoperability among soldiers and lead-
strategic emphasis on working with our al- Force; and better use of technology.3 ers. Brigadier General Walter Piatt, the
lies and partners around the world. . . . The JMTC commander, likes to remind us
United States will engage European allies These three important focus areas of that “Nations do not have relationships,
to collaborate more closely, especially in CFI are complementary to Secretary people do. We gain credibility through
helping build the capabilities of other global Hagel’s defense priorities of collabora- shared hardship.”5
partners. We’re developing strategies to ad- tion and building joint capacity with Global challenges have offered ample
dress global threats as we build more joint our European Allies. occasions to share hardship, but as the
capacity, joint capacity with European These three focus areas are also United States and NATO prepared to
militaries. In the face of budget constraints manifested within the U.S. Army conclude the ISAF mission at the end
here on this continent, as well as in the Chief of Staff Strategic Priorities. of 2014, the Alliance is expected to shift
United States, we must all invest more These tenets of developing “Adaptive its emphasis from operational engage-
strategically to protect military capability Army Leaders for a Complex World,” ment to operational preparedness. This
and readiness. The question is not just how sustaining “A Globally Responsive presents an unprecedented opportunity
much we spend, but how we spend together. and Regionally Engaged Army,” and for education and training with our
It’s not just about burdens we share, but maintaining “A Ready and Modern European partners at JMTC. We can
opportunities, as well.1 Army” provide nested and neces- continue to capitalize on the relationships
sary guide posts for future operations and sustain the partnerships established
This idea not only sustains the and engagements, particularly for a during a time of war, but with latitude to
marriage of cooperation the United Combat Training Center (CTC).4 To shift from an operational environment–
States has developed for the past 12 that end, the leaders and Soldiers of specific “readiness exercise” to a decisive
years with the International Security the U.S. Joint Multinational Training action “leadership laboratory” with first-
Assistance Force (ISAF) in Afghanistan, Command (JMTC) headquartered at class, realistic training against a near-peer
but also provides an endorsing re- Grafenwoehr, Germany, to include the competitor tailored to specific objectives
minder for Smart Defense outlined Joint Multinational Readiness Center and desired outcomes.
by NATO Secretary General Anders (JMRC) at Hohenfels, have worked While a majority of partnered edu-
Fogh Rasmussen at the 2011 Munich tirelessly to “make soup” with these cation and training occurs at JMTC, a
Security Conference. During his key- “three stones” that comprise the CFI tremendous amount of this effort oc-
note address, aptly titled “Building and advance the intent of our Army and curs on the home soil of our allied and
Security in an Age of Austerity,” the national defense leadership. partner nations. Enabled by geographi-
Secretary General invoked the Alliance cal proximity, a majority of our senior
to recognize Smart Defense—“how Education and Training experienced trainers travel to various
NATO can help nations to build greater The JMTC, especially throughout the countries to conduct leader training
security with fewer resources but more past decade, has been instrumental programs, specialty training, training
coordination and coherence”—as in preparing U.S. and multinational center development, and military-
a means to prudently maintain and units for service abroad in operations to-military cooperation events. This
improve our collective security in a re- in Iraq, Afghanistan, and Kosovo. The expeditionary capability and ability to
source constrained environment.2 state-of-the-art facilities and equipment, export our training expertise has greatly
One year later the Secretary General maneuver area, and most importantly its strengthened our partnership with
identified the Connected Forces Initiative proximity to allied and partner nations other nations, both reinforcing the U.S.
(CFI) as a critical component and ex- in Europe have made the JMTC an Army Europe (USAREUR) and U.S.
ample of Smart Defense: affordable, accessible, and economical European Command (USEUCOM) key
location of choice to train, validate, and task of Theater Security Cooperation
Smart Defence is about acquiring the certify coalition units to enable their and, perhaps demonstrated more tan-
necessary capabilities. Connectivity is about operational success. gibly, enabled U.S. and multinational
108 Features / JMTC Partnership and NATO JFQ 78, 3rd Quarter 2015
Soldiers provide cover for bounding troops
during exercise Combined Resolve III, October
2014, in Grafenwoehr, Germany (U.S. Army/
Marcus Floyd)
training days to truly test the rigors of beyond JMTC to allow multi-echelon virtual, and constructive events. At the
multinational brigade operations and training across a connected domain division level and three-star headquarters,
sustainment in a decisive action environ- throughout Europe. There are many JMTC events focus on using both virtual
ment. Fifteen countries and over 3,000 aspects of technology that drive interop- and constructive realms. Technology
personnel—including the European erability and Smart Defense, many of enables JMTC to conduct exercises that
Response Force from Fort Hood, Texas, which are beyond the JMTC sphere of integrate allied forces based in various
as well as numerous joint, multinational, influence. Relative to our focus within global locations and has been demon-
and National Guard partner states—are CFI, however, is leveraging technology strated in numerous named regional
scheduled to participate in this exercise, to build on our dedication to realistic exercises such as Saber Strike, Saber
making it one of the largest multina- training and increased exercises that Guardian, and Saber Junction. Under
tional exercise events ever to be hosted stress enhanced interoperability and the auspice of Connected Training,
at JMTC. NATO compliance. Accordingly, JMTC JMTC is now pursuing the capability to
is developing an initiative to harness conduct simultaneous live exercises that
Technology network and simulation technology to are distributed among partner CTCs
Given the strong interest and recog- enable “Connected Training.” throughout Europe.
nized value in conducting multinational Currently, JMTC supports individual A majority of USEUCOM and
exercises, JMTC is working to use tech- training to collective training, soldiers USAREUR partner nations have es-
nology to expand these training events to brigades, in exercises that blend live, tablished fully operational and capable
110 Features / JMTC Partnership and NATO JFQ 78, 3rd Quarter 2015
Led by RB-66 Destroyer, pilots flying Air Force F-4C Phantoms drop bombs on
communist military target in North Vietnam, August 1966 (U.S. Air Force)
or most of the world’s population, destroyer USS Maddox in the Tonkin and Cambodia—supposedly “neutral”
later, Cambodia, Laos, and South a strategy dependent on it when trying an independent, stable, noncommunist
Vietnam were communist countries. to achieve conflicting political goals. South Vietnam. His successor, President
Did the inability of bombing—and The legacies of the air wars there remain Richard Nixon, pursued a much more
innumerable airlift and reconnaissance relevant to political and military leaders limited goal that he dubbed “peace
sorties—to prevent the fall of South grappling with the prospects of applying with honor”—a euphemism for a South
Vietnam demonstrate the limits of air- airpower in the 21st century. Vietnam that remained noncommunist
power, or did it reveal that the strategy The reliance on airpower to produce for a so-called decent interval, accompa-
that relied heavily on airpower’s kinetic success in Vietnam was a classic rendi- nied by the return of American prisoners
application to achieve success was funda- tion of the “ends, ways, and means” of war (POWs).2
mentally flawed? From the perspective of formula for designing strategy taught Yet those definitions of victory were
50 years after the bombing began, and 40 today at staff and war colleges worldwide. only partial definitions of the term. They
years after the last bomb fell, the answer Airpower was a key “means” to achieve defined the positive political objectives
to both questions remains yes. Yet the the desired “ends”—victory—and how sought—those that could be achieved
two questions are intimately related, and American political and military leaders only by applying military force. Equally
answering them reveals the enormous chose to apply that means to achieve important, though, were the negative
impact that a political leader can have victory yielded the air strategy they fol- political goals—those achievable only by
on the design and implementation of an lowed. Much of the problem in Vietnam, limiting military force. To achieve true
air strategy, especially in a limited war. though, was that the definition of vic- victory in Vietnam, both the positive and
Ultimately, Vietnam demonstrates both tory was not a constant. For President negative objectives had to be obtained—a
the limits of airpower and the limits of Lyndon Johnson, victory meant creating truism for any conflict. That challenge
112 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
was enormously difficult for American in the South and create a stable govern- than 6,000 Americans died from mines
political and military leaders in Vietnam ment there. Although they knew that and booby traps.5
because the negative goals often appeared the indigenous Viet Cong contributed For President Johnson, the real
to have an equal, if not greater, weight more manpower to the enemy’s cause problem was translating the application
than the positive goals, especially during than did the North Vietnamese army of military force into a stable, noncom-
the Johnson era of the war. (NVA), they also believed that the Viet munist South Vietnam, and doing so in
Cong (VC) could not fight successfully a way that minimized American involve-
Johnson’s Use of without North Vietnamese assistance. ment and the chances of a broader war
Airpower in Vietnam Accordingly, they designed an air with China or the Soviet Union while
President Johnson had a multitude of strategy that gradually increased pres- also maximizing American prestige on the
negative objectives that prevented him sure on the North, allowing President world stage. While airpower had seemed
from applying massive military force in Johnson to gauge reactions from the an ideal means to accomplish those ends,
Vietnam. While he did not intend to Chinese, Soviets, American public, and in truth it could not do so. The original
lose “that bitch of a war” in Southeast other global audiences while he slowly Rolling Thunder raids in March and April
Asia, he also had no intention of surren- opened the bombing spigot. Rolling 1965 bolstered the morale of many South
dering “the woman [he] really loved,” Thunder would creep steadily northward Vietnamese who desired a noncommunist
the Great Society programs aimed at until it threatened the nascent industrial government, but the South’s government
reducing poverty and achieving racial complexes in Hanoi and Haiphong, and was in shambles. After enduring seven
equality.3 Achieving the Great Society North Vietnamese President Ho Chi different regime changes—including five
became an important negative objective Minh, being a rational man who certainly coups—in 1964, South Vietnam’s politi-
for Johnson, one that would prevent prized that meager industry, would real- cal leadership faced another crisis on the
him from applying extensive military ize the peril to it and stop supporting eve of Rolling Thunder, delaying the start
force. Doing so, he feared, would cause the Viet Cong. Denied assistance, the of the air campaign by 2 weeks before a
the American public to turn away from insurgency would wither away, and the semblance of order returned to Saigon.
the Nation’s disadvantaged to focus war would end with America’s high-tech The governments that followed—those
instead on its military personnel in aerial weaponry providing a victory that of presidents Nguyen Cao Ky and
harm’s way. Johnson further feared that was quick, cheap, and efficient. Nguyen Van Thieu—were corrupt and
applying too much force against North Those assumptions provided the out of touch with the Southern popu-
Vietnam would cause its two large foundation for President Johnson’s air lace.6 No amount of American airpower
allies, China and the Soviet Union, to strategy against North Vietnam, and all could sustain such regimes. Indeed, less
increase their assistance to the North, of them were seriously flawed. Battles than 6 weeks after the start of Rolling
possibly even with overt intervention. such as Ia Drang and Khe Sanh, as well as Thunder, National Security Advisor
As a U.S. Senator on the Armed Ser- the Tet Offensive, were anomalies during McGeorge Bundy advised President
vices Committee, he had seen firsthand the Johnson presidency; for most of his Johnson that South Vietnam would fall
what could happen when American time in office, the Viet Cong and their to the Viet Cong if Johnson did not shift
leaders miscalculated regarding China North Vietnamese allies rarely fought the focus of America’s military involve-
during the drive to the Yalu River in the at all. Together, they fought an average ment to ground power. The President
Korean War, and he aimed to prevent of one day a month from 1965 to 1968, ultimately concurred, and in summer
a similar mistake in Vietnam. Finally, and as a result, their external supply re- 1965 he embarked on a program that
Johnson was concerned about America’s quirements were minimal. VC and NVA increased American troop totals from
worldwide image, with the globe seem- forces in August 1967 numbered roughly 75,000 to more than 200,000 by the end
ingly divided into camps of communism 300,000, of whom 250,000 were Viet of the year, with further escalations to fol-
and capitalism. Exerting too much force Cong. Yet that combined force needed low.7 The shift in emphasis from airpower
against North Vietnam would make only 34 tons of supplies a day from to ground power preserved the Saigon
the United States appear as a Goliath sources outside of South Vietnam—an government, but did little to assure that it
pounding a hapless David, and likely amount that just seven 2½-ton trucks governed competently.
drive small nations searching for a bene- could carry and that was less than 1 per- Yet Johnson never completely aban-
factor into the communist embrace. cent of the daily tonnage imported into doned his hope that airpower might
Those negative objectives combined North Vietnam.4 No amount of bombing yield success. In the summer of 1966, he
to produce an air strategy founded could stop that paltry supply total from ordered the bombing of oil storage facili-
on gradual response, particularly for arriving in the South. Still, in fighting ties in Hanoi and Haiphong, convinced
President Johnson’s bombing of North an infrequent guerrilla war, the VC and that trucks were vital to move North
Vietnam. American political and military NVA could cause significant losses. In Vietnamese men and supplies south and
leaders believed that they had to defeat 1967 and 1968, 2 years that together that gasoline was essential to keep the
North Vietnam to stop the insurgency claimed 25,000 American lives, more trucks moving. The attacks destroyed
much of the North’s oil facilities but American bombing could not prevent the Johnson cronies such as lawyers Clark
failed to affect the pace of the war. A year VC and NVA from stockpiling enough Clifford and Abe Fortas) met with the
later, believing that the loss of North supplies to sustain a series of massive con- President to select Rolling Thunder
Vietnam’s meager electrical power pro- ventional attacks. bombing targets following lunch on
duction capability and its one steel mill Despite the failure of Operation Tuesday afternoons. Not until October
and single cement factory would affect Rolling Thunder to achieve suc- 1967—after Rolling Thunder had been
not only its ability to fight but also its will cess, Johnson monitored it closely underway for more than 2½ years—did
to do so, Johnson bombed those targets. and tightly constrained actions that a military officer sit in regularly on the
The war continued as it had before, even American aircrews could take over the lunch sessions, when Johnson asked
after intrepid Air Force pilots destroyed North. His negative objectives led to a Army General Earle Wheeler, the
the mile-long Paul Doumer Bridge in long list of rules of engagement (ROE) Chairman of the Joint Chiefs of Staff,
Hanoi in August 1967. In short, air- that did everything from preventing to begin a steady attendance.9
power could not affect the outcome of flights through the airspace over Hanoi The political restrictions that Johnson
the conflict as long as the VC and North or Haiphong without his personal ap- placed on the air war over North Vietnam
Vietnamese chose to wage an infrequent proval to limiting how closely aircraft caused military commanders tremen-
guerrilla war—and as long as American could fly to the Chinese border. Many dous difficulty in implementing Rolling
political leaders chose to back the inept of those restrictions stemmed from his Thunder, but those constraints were not
government in Saigon. The rationale for “Tuesday lunch” sessions at the White the only ones they had to overcome.
bombing the North became to “place a House, during which Secretary of Indeed, military leaders developed their
ceiling” on the magnitude of war that the Defense Robert McNamara, Secretary own restrictions that limited airpower’s
VC and NVA could wage in the South.8 of State Dean Rusk, National Security effectiveness. Probably the most oner-
That goal faded into oblivion with the Advisor McGeorge Bundy (or Walt ous of those self-inflicted wounds was
opening salvos of the January 1968 Tet Rostow after 1967), and Press Secretary the “Route Package” system created in
Offensive, which demonstrated that Bill Moyers (and often joined by spring 1966 that divided North Vietnam
114 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
into seven bombing zones. Ostensibly Union provided much of the North’s force with its small number of fighters,
developed to deconflict the multitude hardware, including SA-2 surface-to-air helicopters, and transports. Retired Air
of Air Force and Navy sorties in North missiles and MiG fighters. By 1966, many Force General Richard Myers, who flew
Vietnamese airspace, the system soon analysts considered Hanoi the world’s two tours as an F-4 pilot during the war,
became a warped way to assess which most heavily defended city, an assessment afterward lamented the lack of unity
Service seemingly contributed more that most Air Force fighter pilots would of command: “We had seven air forces
toward Rolling Thunder’s effectiveness. certainly have endorsed.14 working over there. Coordination be-
The Navy received four of the bombing In contrast to the limited inputs that tween bombers and fighters was a rarity.
zones, while the Air Force received the American military leaders had in select- Seventh Air Force, Thirteenth Air Force,
other three. Targets in the Navy zones ing targets in North Vietnam, in South the Navy, the Marines, bombers, and
were off-limits to Air Force fighters Vietnam the military chiefs faced rela- airlift all did their own thing. It wasn’t
without approval from the Navy, and tively few political restrictions. President as well coordinated as it could’ve—and
those in the Air Force zones were forbid- Johnson and his advisors deemed that should’ve—been.”16
den for Navy aircraft without permission raids against enemy positions in the Much to the chagrin of Air Force
from the Air Force. Such approvals rarely South would provoke only minor reac- leaders, operational control of B-52s
occurred.10 As a result, a competition de- tions from the Chinese or Soviets, and in South Vietnam transferred from the
veloped between the Air Force and Navy that the strikes condoned by Southern Joint Chiefs in Washington, DC, to the
to determine which Service could fly the leaders on their own territory would pro- commander of U.S. Pacific Command,
most sorties into enemy airspace.11 Much duce a meager outcry from the American Admiral Ulysses S. Grant Sharp, Jr., in
as “body count” became the measure of public or world community. Such attacks Hawaii, and finally to Army General
success for commanders on the ground, required approval only from the South William Westmoreland, America’s in-
“sortie count” became the measure of Vietnamese province chief who was re- theater commander, who used the giant
success for air commanders and often led sponsible for the welfare of those living in bombers as flying artillery to support
to promotions. Perhaps the most egre- his province. Yet obtaining that approval ground forces. Air Force Chief of Staff
gious examples of competition occurred did not guarantee a successful mission. General John McConnell believed that
during the bomb shortage of 1966, when American commanders were often un- B-52s were inappropriate for Vietnam
increased bombing had expended much certain of enemy positions and bombed but nevertheless supported their contin-
of the surplus ordnance from World War “suspected” staging areas. In particular, ued employment there, “since the Air
II and the Korean War. To maintain the American and South Vietnamese troops Force had pushed for the use of airpower
desired sortie rate, Air Force and Navy pi- created “free fire zones” where they to prevent Westmoreland from trying
lots flew missions with less than a full load removed the populace and declared that to fight the war solely with ground
of bombs, thereby endangering more anyone found in the area was hostile.15 troops and helicopters.”17 The twisted
aircrews than necessary.12 One Navy A-4 The people traversing the zones, though, parochialism and absence of central-
pilot even attacked North Vietnam’s fa- were often innocent villagers trying to ized control diminished the prospects
mous Thanh Hoa Bridge with no bombs return to their ancestral homes. Raids that the “airpower means” could make
at all, having been told to simply strafe against such areas that killed civilians worthwhile contributions to obtaining
the structure with 20-millimeter (mm) inspired hatred against the United States the desired end of a stable, independent,
cannon fire.13 and the Saigon regime and made excel- noncommunist South Vietnam. Instead,
“Operational controls” amplified lent recruiting vehicles for the Viet Cong. such deficiencies significantly increased
the effects of Rolling Thunder’s political In the effort to win so-called hearts and the likelihood that the aerial means—es-
and military constraints. Those controls minds and enhance the stability of the pecially its kinetic component—would
included such factors as environmental Saigon government, the airpower applied work against achieving that positive end.
conditions and enemy defenses. The over South Vietnam was frequently a America’s subsequent positive goal in
North Vietnamese were masters of double-edged sword. the war would prove easier to achieve
camouflage and carefully obscured the Whereas the air war over North with airpower, but that was because the
highways and trails used to send troops Vietnam was a conflict for control waged negative objectives changed as well, along
and supplies south. Many of those roads between the Air Force and Navy, the air with the character of the war itself.
were extremely difficult to identify to war over the South was an even more
begin with, given the dense jungle veg- disparate affair. An array of air forces Nixon’s Use of Airpower
etation that covered much of the country. participated in it—the Marine Corps in Vietnam
Meanwhile, the North Vietnamese with its helicopters and jets, the Army Despite the high-sounding tone of
supplemented their deception techniques with its helicopters and transport aircraft, “peace with honor,” President Nixon’s
with an extensive air defense system that the Navy with its fighters, the Air Force positive goal in Vietnam was far more
guarded lines of communication and the with its bombers, transport aircraft, and circumscribed, and he relied heavily on
cities of Hanoi and Haiphong. The Soviet fighters, and the South Vietnamese air airpower to help him create a decent
116 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
U.S. Air Force Boeing B-52F Stratofortress
from 320th Bomb Wing dropping bombs over
Vietnam in mid-1960s (U.S. Air Force)
grabbed sustained attention in the media. reaction to mean preventive reaction on the February 8 report, he scribbled a
The National Security Advisor told where a SAM site is concerned. . . . Who note in the margin for Kissinger: “K—is
Admiral Thomas Moorer, the Chairman the hell’s gonna say they didn’t fire?” The there anything Abrams has asked for that
of the Joint Chiefs of Staff, “Our experi- President added, “Do it, but don’t say I have not approved?”29
ence has been that you get the same anything. . . . He [Abrams] can hit SAM Lavelle’s actions did not, how-
amount of heat domestically for a four sites period.”28 ever, receive universal endorsement.
plane attack as you do for 400.”27 Nixon’s directive reached Lavelle, Lonnie Franks, an Air Force technical
At the meeting with Kissinger and who then began an assault on SAM sites sergeant who recorded mission results
Ambassador Bunker on February 3, in the southern panhandle of North for computer compilation in Saigon,
1972, Nixon revealed that his un- Vietnam. Nixon requested to be kept was baffled when pilots erroneously
derstanding of ROE did not exactly apprised of air attacks on all North reported enemy ground fire as the ra-
match that of Laird and Lavelle, but the Vietnamese targets and received a de- tionale for bombing Northern targets.
President’s intent was the same. Nixon tailed, daily compilation of the missions. Lavelle had told subordinates that they
declared that against SAMs, “protective Those reports originated from Lavelle could not report “no enemy reaction”
reaction strikes” would now become and were in turn passed up the chain after raids, but he had failed to explain
“preventive reaction strikes” and that of command, with Admiral Moorer, that any North Vietnamese radar ac-
no one would know if SAMs had been Secretary Laird, and Kissinger reviewing tivation constituted a hostile act that
fired at American aircraft first or not. them before they went to the President. justified a bombing response. The form
He elaborated, “I am simply saying that On no occasion did Nixon express dis- that Franks used to record data con-
we expand the definition of protective pleasure with the bombing; in contrast, tained only four reasons for expending
118 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
relieved and retired. And I think it was military leaders as they worked to imple- risking the B-52—a vital component of
the proper action to take, and I believe ment his increasingly effective air strategy. America’s nuclear triad—in raids against
that will assure that kind of activity may That strategy proved successful partly targets in the well-defended Northern
not occur in the future.”32 because the North Vietnamese persisted heartland would demonstrate just how
Lavelle became the highest-ranking in waging conventional war. As long as serious his efforts were to end the war.
American officer to receive a public they did so, their troop concentrations On December 14, in Washington, Nixon
rebuke for trying to implement his in the South were vulnerable to aerial gave the order for bombing to begin 3
President’s air strategy, but he was not assault, as were their vital supply lines. days later—December 18 in Vietnam.
the only air commander to suffer from The strategy was also successful because In customary fashion, he told Admiral
Nixon’s callousness and ego. Air Force the positive ends that Nixon sought from Thomas H. Moorer, the Chairman of the
General John W. Vogt, Jr., who replaced it were extremely limited. Besides secur- Joint Chiefs of Staff, “I don’t want any
Lavelle, visited the White House on his ing the return of American POWs, he more crap about the fact that we couldn’t
way to Saigon and described Nixon as aimed for an agreement assuring South hit this target or that one. This is your
“wild-eyed” as he berated commanders Vietnam’s survival for a brief period of chance to use military power effectively
for lacking aggressiveness in attacking the time, and personally guaranteed to South to win this war and if you don’t I’ll con-
Easter Offensive. “He wanted somebody Vietnamese President Nguyen Van Thieu sider you personally responsible.”36
to use imagination—like Patton,” Vogt that the South would not fall while he For the crews of more than 200
remembered.33 The President elaborated was in office.35 Accordingly, Nixon had B-52s, the operation dubbed Linebacker
on those thoughts to Kissinger in a Kissinger propose an “in-place cease-fire” II marked the first time that any of them
memorandum soon after the Linebacker to Northern negotiators in Paris, which had flown against targets in Hanoi; the
campaign had begun: spurred NVA efforts to secure additional bombers had raided Haiphong targets
territory despite the aerial pounding only once before, in April 1972. Still, as
I want you to convey directly to the Air they sustained. The North Vietnamese the influx of bombers in the Pacific had
Force that I am thoroughly disgusted with responded to Nixon’s offer by dropping steadily increased, Air Force General
their performance in North Vietnam. their demand for Thieu to resign, and a J.C. Meyer, the SAC commander, an-
Their refusal to fly unless the ceiling is peace accord appeared imminent in late ticipated such an operation and ordered
4,000 feet or more is without doubt one October 1972 when the President ended Lieutenant General Gerald Johnson,
of the most pusillanimous attitudes we Linebacker. Neither Nixon nor Kissinger the commander of Eighth Air Force, on
have ever had in the whole fine history had informed Thieu of the in-place Guam, to design a plan for it. Johnson
of the U.S. military. I do not blame the cease-fire offer, however, and once Thieu and his staff submitted the desired plan
fine Air Force pilots who do a fantastic learned of it, he was incensed. to Meyer in November 1972.37 Yet when
job in so many other areas. I do blame the Thieu’s refusal to accept the tenta- Nixon’s order to begin the assault arrived
commanders who, because they have been tive Paris settlement led to a breakdown at SAC headquarters, Meyer chose to
playing “how not to lose” for so long, now in the peace talks and caused Nixon to disregard the Eighth Air Force plan, and
can’t bring themselves to start playing “how return to his “airpower means” to secure had his own staff in Omaha, Nebraska,
to win.” Under the circumstances, I have his positive ends—which now included create one instead.
decided to take command of all strikes in convincing Thieu that he could depend The short timespan to produce a plan
North Vietnam in the Hanoi-Haiphong on Nixon’s promise of future military led to a design with minimal ingenuity.
area out from under any Air Force juris- backing. In addition, the President now Aircraft used the same flight paths to
diction whatever. The orders will be given had a negative political objective that attack targets at the same times for the
directly from a Naval commander whom would constrain the amount of force first 3 nights. The North Vietnamese
I will select. If there is one more instance of that he could apply. Although he had took advantage of the repetitive routing
whining about target restrictions we will won a resounding reelection victory in to mass their SAM batteries in the areas
simply blow the whistle on this whole sorry early November, the Democrats seized where the B-52s turned off target and
performance of our Air Force in failing for control of both houses of Congress and then fired their SAMs ballistically, which
day after day after day in North Vietnam threatened to terminate spending for the negated the bombers’ defensive capabili-
this past week to hit enormously important war when Congress convened in early ties. The initial 3 nights produced the loss
targets when they had an opportunity to January. With limited time available to of eight bombers, with five more heavily
do so and were ordered to do so and then achieve results, Nixon decided to turn damaged; another two fell to SAMs on
wouldn’t carry out the order.34 to the B-52, with its enormous 30-ton the night of December 21. Meyer ended
bomb load, to do the job. The President the repetitive routing and, after a 36-hour
Nixon never followed through on had already shifted more than half of stand-down for Christmas, turned over
his threat to eliminate Air Force com- the Strategic Air Command (SAC) fleet planning for the remainder of the opera-
manders from the air war against North of 400 heavy bombers to air bases in tion to Eighth Air Force.
Vietnam, but he continued to berate Guam and Thailand. He thought that
On December 26, General Johnson’s the North Vietnamese downed 15 bomb- spring 1965.40 Nixon himself made a
staff implemented the plan they had ers, but in doing so exhausted most of similar assertion in April 1988 when he
designed, with 120 B-52s attacking their supply of SAMs. The mercurial appeared on Meet the Press and stated
targets in Hanoi and Haiphong from Nixon credited the Air Force with suc- that his greatest mistake as President
nine different directions in a 15-minute cess, telling aide Chuck Colson, “The was not Watergate but the failure to
timespan. Two bombers fell to SAMs North Vietnamese have agreed to go conduct Linebacker II in 1969 after he
(a loss rate of 1.66 percent), and the back to the negotiating table on our took office. “If we had done that then,”
next day, in Washington, Nixon received terms. They can’t take bombing any lon- he said, “I think we would have ended
word that the North Vietnamese were ger. Our Air Force really did the job.”39 the war in 1969 rather than 1973.”41
ready to resume negotiations in Paris on The President continued bombing North Such assertions demonstrate that the
January 8. The President responded that Vietnam south of the 20th parallel until Commander in Chief—as well as many
negotiations had to begin on January 2 the initialing of the Paris Peace Accords military leaders—never really understood
and would have a time limit attached, on January 23, 1973. that the character of the war in 1972 had
and that the North Vietnamese could For many air commanders, Nixon’s changed dramatically from what it had
not deliberate on agreements already dramatic “Christmas Bombing” vindi- been for most of the conflict. The change
made.38 On December 28, Hanoi ac- cated their belief that airpower could to conventional warfare with the Easter
cepted Nixon’s conditions, and he ended have won the war had President Johnson Offensive was a key reason why airpower
Linebacker II the next day. In 11 days, employed a comparable operation in yielded tangible results.
120 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
Moreover, the success that Nixon South Vietnamese government lasted for Our airpower did not fail us; it was the de-
achieved with airpower stemmed from his a few more years. cision makers. And if I am unsurprisingly
pursuit of positive and negative political critical of those decision makers, I offer no
objectives that differed significantly from Legacies of Airpower in Vietnam apology. My conscience and my professional
those of his predecessor. Nixon had no In the final analysis, several legacies record both stand clear. Just as I believe
illusions about pursuing a stable, inde- emerged from airpower’s ordeal in unequivocally that the civilian authority
pendent, noncommunist South Vietnam; Vietnam. The dismal lack of unity of is supreme under our Constitution, so I
the shock of the 1968 Tet Offensive command displayed there spurred hold it reasonable that, once committed,
turned American public opinion against development of the joint force air com- the political leadership should seek and,
the war and made leaving Vietnam the ponent commander concept, in which a in the main, heed the advice of military
new positive goal. Although he labeled single air commander directs the flying professionals in the conduct of military
that objective “peace with honor,” in the activities of multiple Services to achieve operations.46
end Nixon accepted a settlement that objectives sought by the joint force
offered South Vietnam a possibility of commander. In terms of Air Force doc- Many American Airmen from the war
survival, not a guarantee. He gave South trine, Linebacker II’s perceived success likely agreed with Sharp’s critique.
Vietnamese President Thieu an ultima- in compelling the North Vietnamese Operation Rolling Thunder high-
tum to accept that agreement, noting to negotiate reinforced the belief that lighted how negative political objectives
that without Thieu’s approval the U.S. airpower could achieve political goals could limit an air campaign. Indeed,
Congress would likely cut off all funding cheaply and efficiently. The 1984 in the American air offensives waged
to South Vietnam. Whether Linebacker edition of the Air Force’s Basic Doctrine since Vietnam—to include the use of
II persuaded Thieu that he could count Manual noted: unmanned aerial vehicles against “high-
on Nixon for support after the signing of value” terrorist targets—negative goals
the Paris Peace Accords remains a matter unless offensive action is initiated, military have continued to constrain the use of
for conjecture; the agreement that Thieu victory is seldom possible. . . . Aerospace military force. Projecting a sound image
reluctantly endorsed in January 1973 forces possess a capability to seize the of- while applying airpower was difficult
differed little from what Kissinger had fensive and can be employed rapidly and enough for American leaders in Vietnam;
negotiated in October 1972. directly against enemy targets. Aerospace today’s leaders must contend with 24/7
Nixon’s lack of negative political forces have the power to penetrate to the news coverage as well as social media
goals enabled him to apply airpower heart of an enemy’s strength without first accounts that enable virtually anyone to
more aggressively than Johnson. With no defeating defending forces in detail.44 spin a story and reach a large audience.
conflicting loyalties to a domestic agenda In the limited wars that the Nation will
like Johnson, and with détente effectively The manual further encouraged air fight, negative objectives will always be
removing China and the Soviet Union commanders to conduct strategic present, and those objectives will produce
from the equation, Nixon had mainly to attacks against “heartland targets” that ROE that limit airpower. “War is always
worry about the compressed time that would “produce benefits beyond the going to have restrictions—it’s never
Congress gave him to achieve a settle- proportion of effort expended and costs going to be [Curtis] LeMay saying ‘Just
ment. Nixon knew that his image would involved,” but cautioned that such bomb them,’” stated General Myers, the
suffer because of the intensified bombing attacks could “be limited by overrid- most recent Air Force Chairman of the
and was willing to accept that tarnishing, ing political concerns, the intensity of Joint Chiefs of Staff.47 Against insurgent
though he did not condone indiscrimi- enemy defenses, or more pressing needs enemies, the negative objectives may well
nate attacks. The 20,000 tons of bombs on the battlefield.”45 eclipse the positive goals sought. When
dropped in Linebacker II killed 1,623 The impact of such “overriding that occurs, kinetic airpower’s ability to
civilians, according to North Vietnamese political concerns” on the application of yield success will be uncertain.
figures—an incredibly low total for the airpower is a key legacy of the air wars Yet because airpower, as a subset of
tonnage dropped.42 Yet in all likelihood, in Vietnam. To commanders who had war, is not only a political instrument
the comparatively unrestrained, nonstop fought as junior officers in World War II, but also one that is applied by humans,
aerial pounding that the NVA received in where virtually no negative objectives lim- it will be subject to the whims and frail-
South Vietnam counted as much, if not ited military force, the tight controls that ties of the political leader who chooses
more, than Nixon’s focused bombing President Johnson placed on bombing to rely on it. Richard Nixon saw himself
of the North. The attacks in the South North Vietnam chafed those charged with as a Patton-esque figure who could
directly threatened the NVA’s survival, wielding the air weapon. Navy Admiral swiftly and efficiently brandish military
and without that force on Southern soil, U.S. Grant Sharp, who directed Rolling force to achieve his aims. He felt little
the North faced a more difficult path Thunder as the commander of U.S. Pacific compunction in berating his air com-
conquering South Vietnam.43 Ultimately, Command, wrote in the preface of his manders or—in the case of General
airpower helped to assure that a flawed 1977 memoir Strategy for Defeat: Lavelle—casting one adrift when he
Notes
1
Raphael Littauer and Norman Uphoff,
eds., The Air War in Indochina (Boston:
Beacon Press, 1972), 11, 168–172; and Earl H.
Tilford, Jr., Crosswinds: The Air Force’s Setup in
Vietnam (College Station: Texas A&M Univer-
sity Press, 1993), 109.
2
U.S. Foreign Policy for the 1970s: Shaping
a Durable Peace—A Report to the Congress by
Richard Nixon, President of the United States,
thought that doing so might save him with thoughtful solemnness—with the re- May 3, 1973 (Washington, DC: U.S. Gov-
embarrassment. Nixon believed that alization that innocent people, along with ernment Printing Office, 1973), 59. Nixon
airpower gave him the ideal military combatants, will get hurt.49 commented about the Paris Peace Agreement:
tool for threatening an opponent or “While our essential principles were met, we
and the Communists had to make compro-
persuading an ally, and that perspective Were he alive today, the Prussian mises. Many of these were more significant for
has gained traction since he left the military philosopher Carl von Clausewitz our ally than for us. . . . Our friends have every
White House. The last four occupants would doubtless nod in agreement at opportunity to demonstrate their inherent
of the Oval Office, to include President General Myers’s observation. strength.” Two months earlier the President
Barack Obama, have all relied heavily But Clausewitz never saw an airplane; had told Alexander Haig: “The country would
care if South Vietnam became Communist in
on airpower in the conflicts they have if he had, though, his airpower notions a matter of six months. They would not give
fought. The positive goals pursued— would likely have been unsurprising. a damn if it’s in two years.” See Tape Subject
“stability,” “security,” and, on occasion, Had he examined America’s air wars in Log, Conversation 416-43, Nixon Presidential
“democracy”—have proved difficult Vietnam, he would certainly have com- Library and Museum, March 17, 1973 (hereaf-
to achieve with any military force, mented about the difficulty of achieving ter, Nixon Presidential Library).
3
Doris Kearns Goodwin, Lyndon Johnson
particularly with airpower. Its siren political objectives in a limited war. In and the American Dream (New York: Signet,
song is an enticing one, however, as all probability, he would have looked at 1976), 263.
Johns Hopkins Professor Eliot Cohen President Johnson’s Tuesday lunch–tar- 4
“Meeting with Foreign Policy Advisors on
has astutely observed, “Airpower is an geting process, the Route Package system Vietnam,” August 18, 1967, Meeting Notes
unusually seductive form of military dividing North Vietnamese airspace, the File, Box 1, Lyndon Baines Johnson Presi-
dential Library (hereafter, Johnson Library);
strength, in part because, like modern creation of free fire zones in the South, Headquarters U.S. Air Force, Analysis of
courtship, it appears to offer gratifica- Nixon’s condemnation of his air com- Effectiveness of Interdiction in Southeast Asia,
tion without commitment.”48 That manders and dismissal of General Lavelle, Second Progress Report, May 1966, Air Force
promise is a dangerous one, as General the repetitive B-52 routing for Linebacker Historical Research Agency (hereafter, AF-
Myers warns: II, and any number of other elements HRA), file K168.187-21, 7. Robert McNamara
acknowledged in 1967 that communist forces
of the U.S. experience in Vietnam fought an average of 1 day in 30 and that they
The last thing that we want is for the po- and stated simply: “Friction rules.” needed 15 tons of supplies daily from external
litical leadership to think war is too easy, “Everything in strategy is very simple,” sources. The Joint Chiefs of Staff had estimated
especially in terms of casualties. It’s awful; Clausewitz wrote, “but that does not in August 1965 that the enemy needed 13 tons
it’s horrible, but sometimes it’s necessary. mean that everything is very easy.”50 per day of “external logistical support.” See
U.S. Congress, Senate, Committee on Armed
[The decision for war] needs to be taken Perhaps the most enduring legacy of the
122 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
Services, Preparedness Investigating Subcom- 10
U.S. Air Force Oral History interview strongholds . . . virtually uninhabited by
mittee, Air War against North Vietnam, 90th of Major General Robert N. Ginsburgh by noncombatants” where any identified activity
Cong., 1st sess., August 25, 1967, pt. 4, 299; Colonel John E. Van Duyn and Major Richard was presumed to stem from enemy forces and
and Annex A to JCSM 613-65, August 27, B. Clement, May 26, 1971, AFHRA, file was thus susceptible to immediate air or artil-
1965, National Security Files (hereafter, NSF), K239.0512-477, 65–68; and interview of Lieu- lery strikes. See Sean A. Kelleher, “Free Fire
Country File: Vietnam, Folder 2 EE, Box tenant Colonel William H. Greenhalgh by the Zones,” in Dictionary of the Vietnam War, ed.
75, Johnson Library. The standard military author, Maxwell Air Force Base, May 17, 1985. James S. Olson (Westport: Greenwood, 1988),
2½-ton truck could transport 5 tons of goods 11
U.S. Air Force Oral History interview of 163.
over roads and 2½ tons overland. Regarding Lieutenant General Joseph H. Moore by Major 16
Interview of General Richard Myers by
North Vietnam’s import capacity, see Walt Samuel E. Riddlebarger and Lieutenant Colo- the author, National Defense University, No-
Rostow to the President, May 6, 1967, NSF, nel Valentino Castellina, November 22, 1969, vember 26, 2013.
Country File: Vietnam, Folder 2EE, Box 75, AFHRA, file K239.0512-241, 17–18. 17
John Schlight, The United States Air
Johnson Library; and The Pentagon Papers: The 12
Robert L. Gallucci, Neither Peace nor Force in Southeast Asia: The War in South
Defense Department History of United States Honor: The Politics of American Military Policy Vietnam: The Years of the Offensive 1965–1968
Decisionmaking on Vietnam, The Senator Gravel in Viet-Nam (Baltimore: The Johns Hopkins (Washington, DC: Office of Air Force History,
Edition, 5 vols. (Boston: Beacon Press, 1971), University Press, 1975), 80–84; Littauer and 1988), 82.
4: 146. Uphoff, 38. In July 1966, after a span of poor 18
Earl H. Tilford, Jr., Setup: What the Air
5
Guenter Lewy, America in Vietnam (New weather obscured targets over the North, Sev- Force Did and Why in Vietnam (Maxwell Air
York: Oxford University Press, 1978), 309. enth Air Force Commander General William C. Force Base, AL: Air University Press, 1991),
6
Stanley Karnow, Vietnam: A History (New Momyer ordered his fighter pilots not to fly and 196. The secret bombing deposited 120,578
York: Penguin Books, 1997), 455–456, 672, called for ground crews to perform preventive tons of bombs on Cambodian soil. See Carl
675. maintenance on the aircraft. A message then Berger, ed., The United States Air Force in
7
National Security Action Memorandum arrived from the Pentagon telling Momyer to Southeast Asia, 1961–1973: An Illustrated Ac-
328, April 6, 1965, NSF, Boxes 1–9, Johnson fly to prevent the Navy from achieving a higher count (Washington, DC: Office of Air Force
Library. sortie count. See Greenhalgh interview, May History, 1984), 141.
8
Memorandum, McNamara for the Presi- 17, 1985. 19
Tilford, 194; and Richard Nixon, RN:
dent, July 28, 1965, NSF, National Security 13
Interview by the author of a Navy A-4 The Memoirs of Richard Nixon, 2 vols. (New
Council History, “Deployment of Major U.S. pilot who wished to remain anonymous. York: Warner Books, 1978), 1: 472.
Forces to Vietnam, July 1965,” Vol. 1, Box 40, 14
Air Force Colonel Jack Broughton, a 20
By May 1972, only 69,000 American
Johnson Library. veteran F-105 pilot, called North Vietnam “the troops remained in Vietnam, and most of them
9
David C. Humphrey, “Tuesday Lunch center of hell with Hanoi as its hub.” See Jack were not in combat units.
at the Johnson White House: A Preliminary Broughton, Thud Ridge (New York: Bantam 21
Hanoi’s communist party newspaper
Assessment,” Diplomatic History 8 (Winter Books, 1969), 24. Nhan Dan described China and the Soviet
1984), 90. 15
Free fire zones were “known enemy Union’s policy of détente as “throwing a life-
U.S. Air Force F-5 aircraft refueling from KC-135 tanker before bombing
Viet Cong position (U.S. Air Force photo)
124 Recall / The Air Wars in Vietnam and Their Legacies JFQ 78, 3rd Quarter 2015
This book is the definitive history Once formed, training for the 15th New
of the 369th Regiment in World War I, York National Guard Regiment was dif-
an outstanding black infantry regiment ficult for a number of reasons, most of
comprised of 3,000 men led by a white them racial.
command element. It is the most com- Black political and social leaders
plete, scholarly, and fully documented including W.E.B. Du Bois thought there
account of this famous (and underpub- was a positive correlation between serving
licized) unit, unlikely to be superseded. as uniformed soldiers and possessing full
The authors, both prominent historians, citizenship. Why they believed they could
are renowned experts in their fields. improve the situation of black Americans
Sammons and Morrow tell the through military service is difficult to
complete story of the 369th—a combat understand. A dearth of both recognition
unit that grew out of the 15th New York and reward defined the service of black
National Guard Regiment—from the soldiers during the Civil War, in which
bigotry that black leaders initially had to nearly 40,000 died, the Indian Wars,
overcome to create the unit and the her- in which they comprised a far greater
culean efforts required to convince both proportion of the Army than they did
New York city and state politicians hostile the U.S. population in general, and the
to the idea of an all-black unit to their Spanish-American War, during which
valiant service in France and their ulti- all four historic black regiments fought.
mately humiliating return to the United These black leaders struggled continually
States after having spent more time in the to convince the War Department and
Harlem’s Rattlers and the Great trenches that any other U.S. combat unit. U.S. Government to establish black in-
War: The Undaunted 369th The book also examines the postwar trib- fantry units and to permit blacks to serve
Regiment and the African ulations of the 369th and contains several in combat. Even men as sophisticated
American Quest for Equality epilogues that detail the unit’s combat as Du Bois, however, underestimated
losses, postwar histories of the key officers the depth of bigotry in the country;
By Jeffrey T. Sammons and John H.
and men, and unfortunate lives of two of there would be no rewards for the black
Morrow, Jr.
the unit’s most famous warriors: Henry soldiers for their service in World War I.
University Press of Kansas, 2014
Johnson, who, nearly 100 years after the In fact, following the end of the conflict,
616 pp. $34.95
war’s end, is under consideration to re- political and social conditions for black
ISBN: 978-0700619573
ceive the Congressional Medal of Honor, civilians were worse than they had been
Reviewed by Alan L. Gropman and Neadom Roberts. prior to its outbreak.
Why the title Harlem’s Rattlers? Training for the 369th was to have
That was what the men called them- been completed in Spartanburg, South
n 1903, W.E.B. Du Bois, the selves—not “Men of Bronze” or Carolina, prior to the soldiers’ depar-
ince the establishment of the “This process cannot be taken lightly, COGs has been a point of contention
130 Joint Doctrine / Three Approaches to COG Analysis JFQ 78, 3rd Quarter 2015
since 2014 has been the establishment of
an Islamic caliphate in which it possesses Figure 1.
authority over Muslims worldwide and
aims to bring most Muslim-inhabited
regions of the world under its politi- STRAT COG- STRAT CCs- OP COG- OP CCs- OBJs (Ends)
Means that does Ways (verb) Means that Ways (verb)
cal control, beginning with the Levant CCs for OP COG do CCs Operational Strategic
region, which generally includes Syria,
Jordan, Israel, Palestine, Lebanon, Lead/Direct/Organize Maneuver
Land, Money,
lishment of a caliphate. Its current leader, ISIL ISIL Forces Oil secured
Leadership (Fighters)
Abu Bakr al-Baghdadi, who has renamed
Seize
Govern
Abu Bakr Governance Islamic
himself Amir al-Mu’minin Caliph al-Baghdadi, emplaced State
inner circle, Occupy Caliphate
Ibrahim, was named as caliph.10 and combat
Sharia Rule
of Law
To accomplish this strategic objective, leaders
Enforce Commerce
the following operational objectives must Established
be successfully completed: Opposition in Fund
Susceptible
Syria and Iraq (military and civilian) must Recruit/Equip/Maintain
recruitment
be neutralized or destroyed.11 Land must population
CRs (other
be seized and secured within Syria and Baghdadi both
shapes and
Pay, personal gain, emigration, INS
Group mergers, thrills, no choice, critical means)
Iraq.12 Governance must be established uses ideology protection, social, religious, political
Step Five: Further Validates COG Iraq in 2010 and developed it into the Events such as these could also poten-
Selection. From the remaining items on formidable force that it is today.23 As tially increase friction and distrust in
the critical requirement list that are vital a kingdom requires a king, a caliphate leadership. Exploitation of these vulner-
for the execution of the critical capabili- requires a caliph, and al-Baghdadi estab- abilities could significantly damage ISIL’s
ties, the fighters “do” the operational lished himself as the first caliph. It is one centers of gravity.
work by “using” the other critical thing to need or employ an existing force; Eikmeier’s COG determination
requirements necessary, which were it is another thing to create it first. If ISIL methodology provides tangible centers
mostly seized by the fighters in the first becomes more firmly established and of gravity, which are determined through
place. The fighters themselves seized continues to be successful, the strategic a testable “does/uses” criteria. For the
more weapons and equipment for use center of gravity likely will shift toward its operational COG, identification of this
and did not attain enhanced capabilities revenue sources. Removing a key leader criterion is a more objective process than
as a result of prior government issuing. from a securely established entity prob- with identification of the strategic COG,
Furthermore, although ISIL has gained ably would not cause it to collapse, as but it is still testable under the criteria. If
greater capabilities, its fighters—infantry- a new leader would move in to take his the methodology is followed correctly,
men—are ISIL’s core strength. Military place; however, as of now, ISIL is still a COG identification likely would be more
equipment, money, and other resources nascent organization that requires astute consistent with its results, regardless of
cannot be employed, seized, or exploited leadership to hold it together.24 who applies the technique.
without ISIL fighters. The process concludes by identifying
ISIL leadership “does” the work those critical requirements vulnerable to Godzilla COG Methodology
to create, maintain, and lead its army, adversary actions. As the ISIL fighters Another alternative methodology that
and “uses” this army to accomplish its are the operational COG, various factors possesses testable criteria is Butler’s
objectives. If ISIL were already a state contribute to the filling of ISIL’s fighter Godzilla COG determination approach.
actor with an established government, ranks. The mergers of convenience The Godzilla methodology is relatively
military, and economy, its current leader- (personal/group survival and protec- simple. Butler essentially determines
ship would not qualify as the strategic tion) indicate that if more ideal options the overall strategic goal of the force to
center of gravity, according to Eikmeier.22 became available, fighters might consider be examined—friendly or enemy—and
However, ISIL is not a state actor. Abu renouncing ISIL. Disruption in revenue examines the objective that must be met
Bakr al-Baghdadi took the helm of the could hinder incentives to fight for ISIL, to achieve that goal. Once the opera-
moderately effective Islamic State in inciting reconsiderations of convictions.25 tional objective has been determined,
132 Joint Doctrine / Three Approaches to COG Analysis JFQ 78, 3rd Quarter 2015
the critical strengths for achieving that
objective are identified. Next, these Figure 2.
strengths are removed and examined Center of Gravity Candidates (Identified Critical Strengths)
one at a time. The Godzilla methodol- ISIL leader removed ISIL Leader GODZILLA
ogy posits that one of these critical • Could slow momentum Seize
or even cause collapse Funding/resources Islamic State
strengths is the center of gravity. To • Could be replaced
land and
control Caliphate
Equipment
identify that center, as a critical strength • Remaining strengths people
is removed, the question then asked could still accomplish OBJs
NOT COG
is: can the objective still be achieved Funding sources removed
ISIL Leader
without this strength? If the answer • Would slow momentum
Seize
ISIL Leader • Can extort & steal Funding/resources
GODZILLA
land and Islamic State
is yes, that strength is not the center • Leader still has army and Equipment control Caliphate
of gravity. The strength is replaced Funding/ equipment to seize land people
(more resources) and control ISIL army
and another is removed, asking the Resources people
NOT COG
same question. Once we find the sole Equipment removed ISIL Leader
strength—the removal of which pre- Equipment • Did not originally have as Seize
Funding/resources
much equipment; gained it land and Islamic State
cludes the accomplishment of the objec- incrementally; funding could control Caliphate
ISIL Army Equipment GODZILLA
tive—the center of gravity has been procure more equip people
ISIL army
• Army still present to lead
identified (see figure 2).26 NOT COG
Butler uses Milan Vego’s defini- ISIL army removed ISIL Leader
tions to best describe critical strengths • no army for leader Seize
Funding/resources land & Islamic State
as the “primary sources of physical or • money alone cannot seize
control Caliphate
territory; weapons cannot wield Equipment
moral potential/power or elements that themselves; only ISIL army can people
integrate, protect, and sustain specific seize land and control people ISIL army GODZILLA
COG
sources of combat potential/power.”27 ISIL leader, funding, and equipment are certainly critical strengths, but these strengths are applied to ensure ISIL
Strengths are therefore considered criti- has a capable army to accomplish its objectives. The leader needs an army. Critical to amassing a capable army is
cal if they “affect or potentially affect adequate funding. Only its army can physically seize and control people–other strengths are enablers to this.
Just because the ISIL army is the COG as per the Godzilla method does not mean planning excludes focus on the
achievement of the objective.”28 other critical strengths. Contrarily, if unable to kinetically destroy the army, then focusing on some or all of the
To get to that point with ISIL, we identified strengths may be the only way to dismantle the ISIL army.
must examine its stated strategic objec-
tive and means for achieving it. ISIL has
declared an Islamic caliphate, and its stra- next removed one at a time to identify the throughout its territory in Iraq and Syria.
tegic objective is to expand the borders indispensable strength that is the center They are well armed, trained, brutal,
and influence of that caliphate as far as of gravity. and, from all outward appearances, moti-
possible, governing all its citizens under Abu Bakr al-Baghdadi’s leadership vated and highly capable of conquering,
strict sharia law. With this as its stated and will to expand territory and govern holding, and governing the territories
strategic objective, what must ISIL ac- people are key elements that set ISIL and people they are charged with domi-
complish to make this goal a reality? apart from its contemporaries. Removing nating. ISIL is well armed largely because
First and foremost, what ISIL has so that leadership in the early days of the of the sizeable amounts of military hard-
far accomplished is what sets it apart from movement might have completely ware it has captured through progressive
other Islamic extremist groups. It has derailed its progress and dispersed its victories. Through these victories,
seized land, controls a large population, followers. But the momentum of the ISIL also has seized valuable sources of
and currently governs as the declared organization, as it currently is, has revenue, notably oil fields, to continue
caliphate. Therefore, controlling land and grown beyond just the influence of one funding its operations.
people to spread its sphere of governance man, and removing al-Baghdadi might Large quantities of newly acquired
is the decisive operational objective that even promote him to martyr status and weapons, while critical, cannot exclusively
defines the caliphate. Accomplishing galvanize his followers behind his replace- accomplish ISIL’s objectives; someone
these advances has taken several critical ment. The replacement might not be as must wield them. Impeding money and
strengths unique to ISIL: capable and effective a leader, but there is no guar- resources could prove critical in suppress-
charismatic leadership, an army of 20,000 antee that removing this strength would ing ISIL, but its fighters intrinsically retain
to 31,500 armed members, large amounts prevent ISIL from attaining its objectives. the capability to seize territory, subjugate
of equipment, and highly lucrative fund- Therefore, it does not follow at this point citizens, and hold territory. Removing these
ing sources. This army has been critical that al-Baghdadi is the center of gravity. militants from the equation would render
in seizing much of the previously men- The army ISIL has amassed is a mo- the leadership of ISIL relatively impotent.
tioned equipment and revenue. Using the tivated group that has obeyed the orders Declaring a caliphate will fall on deaf ears
Godzilla methodology, these strengths are to seize territory and subjugate citizens if the means for enforcing it and growing
Ways:
Extreme
Violence
4. Critical Capabilities
• Recruiting Counters a. ability to recruit followers
Garner Legitimacy
• Command and Control
Ideological Legitimacy b. ability to garner support for
• Ideological Support
Support Lack of ideology
International
Means: ISIL Ideology Support c. command and control of forces
• Adequate Fighter Strength
across wide areas of terrain.32
• Military Equipment Command Area Contested ISIL
and Control Governors Rule in Region
• Leadership 5. Critical Requirements
• Funding
Recruit Willing
Followers Lose a. legitimacy
Ideological
Followers Fighters
Belief b. sustainment
c. fighters.
Critical Strengths:
• Seized territory 6. Critical Vulnerabilities
• Ability to impose will on people a. no cohesive acceptance of
• Large capable force Islamic ideology (that is, Sunni
• Revenue and Finance
versus Shia) in disputed area
• Weapons and Equipment
b. extreme violence could reduce
willingness of fighters.
it are taken away. Therefore, based on the 1a. Strategic Objective(s)
7. Decisive Points
COG identification criteria outlined by the a. creation of an Islamic State
a. control of towns and villages
Godzilla method, the substantial army that b. uniting all Muslims
within Iraq and Syria
ISIL has amassed is its center of gravity. c. defeating U.S. and Western
b. terrorist activity is a backup to
allies.
overt rule in Iraq and Syria and
Critical Factors Analysis 1b. Operational Objective(s) will contribute to overall objec-
COG Methodology a. control of Sunni areas in Iraq tives of ISIL.
Now that nondoctrinal COG method-
and Syria
ologies have been applied to the current
b. recruit more fighters Based on analysis of the identified criti-
ISIL problem set, the Critical Factors
c. gain funding to support efforts. cal factors, the conclusion we reach is that
Analysis COG determination method-
the ISIL movement appears reliant on the
ology outlined in the JOPP is applied 2a. Critical Strengths
continuation of popular support for the
to ISIL. Joint Publication 5-0 states a. large following of personnel
radical Sunni ISIL ideology, that is, the stra-
that the first step in COG analysis is to willing to fight for the cause
tegic COG. If belief in the strategic COG
identify the desired objectives.29 Upon b. weapons seized from captured
followed by al-Baghdadi and his immediate
examination of ISIL from various open areas in Iraq and Syria
supporters wavers, or if other Islamic ideo-
sources, its main strategic objective is c. financially gain from seized
logical variants garner more support, the
to create an Islamic state across Sunni equipment, oil fields, and traf-
ISIL movement likely will fall apart.
areas of Iraq and in Syria.30 Al-Baghdadi ficking operations
is ISIL’s self-declared leader and seeks d. rule by terror to subjugate
authority over all Muslims. inhabitants.
Comparison Findings
Eikmeier’s COG application identified
Nested with this strategic objective,
2b. Critical Weakness(s) ISIL leadership as the strategic center
operational objectives are to control Sunni
a. nonstate actor (seeking to of gravity, with the ISIL fighters as
areas in Iraq, recruit more fighters, and
become legitimized state) the operational center of gravity. The
continue to gain funding. As the JOPP
b. no international endorsement Godzilla methodology determined
COG methodology next outlines, critical
(further delegitimizes ISIL) that the ISIL fighters are the COG.
strengths, critical weaknesses, centers of
c. rule by terror (could espouse The JOPP method identified the ISIL
gravity, critical capabilities, critical require-
uprising) ideology as the strategic COG, with the
ments, and critical vulnerabilities must be
d. radical followers’ loyalty is tied ISIL fighters as the operational COG.
identified. Finally, decisive points are iden-
to religious and ideological As evident, all three methods yielded
tified (see figure 3). Below, these variables
beliefs of leader. similar results for the ISIL fighters as a
are outlined with the JOPP process.31
COG, with differences in the identifica-
134 Joint Doctrine / Three Approaches to COG Analysis JFQ 78, 3rd Quarter 2015
tion of the strategic COG. With the
Eikmeier application, the ISIL ideology
is identified as a critical requirement
(means) that its leadership shapes and
uses to recruit, motivate, and influence
ISIL fighters to accomplish its objec-
tives. Leadership in this JOPP applica-
tion is not specifically identified as a
critical factor but is inherently implied
within other outlined critical factors; it
is also implied as necessary in the JOPP
method conclusion statement.
For argument’s sake, whether identi-
fied as a COG or a critical requirement,
understanding all variables that contrib-
ute to the effectiveness of ISIL ideology
in recruiting and motivating is essential
if planning is focused on countering the
ideology. To plan operations centered on Then-Secretary Hagel and General Dempsey testify before Senate Armed Services Committee
regarding President Obama’s authorized military strikes in Syria to destroy, degrade, and defeat ISIL
the neutralization of an ideology means (DOD/Daniel Hinton)
to focus on the people it is influencing. In
addition to the ISIL recruitment base de- determination, whereas the JOPP process Center of Gravity,” Joint Force Quarterly 59
scribed earlier, much research conducted lacks a definitive COG qualifying proce- (4th Quarter 2010); James P. Butler, “Godzilla
Methodology: Means for Determining Center
on ideology-driven terrorist organizations dure, making it more subjective in nature of Gravity,” Joint Force Quarterly 72 (1st Quar-
indicates that most terrorists are social and thus more susceptible to biases, pref- ter 2014); Joint Operation Planning Process
solidarity seekers. They search for social erences, or dominant personalities. (JOPP) Workbook, Naval War College Joint
acceptance, with a majority of members With the analyses and findings of these Military Operations Department (Newport, RI:
being poor, unmarried, rejected socially, methodologies, current joint doctrine for U.S. Naval War College, January 21, 2008),
appendix C.
or dislocated from their native lands.33 center of gravity determination should 4
“ISIS Rebels Declare “Islamic State” in
Recent studies on al Qaeda, Fatah, be revised. A new methodology does Iraq and Syria,” BBC News, June 30, 2014,
Hamas, Hezbollah, Palestinian Islamic not necessarily need to directly mirror available at <www.bbc.com/news/world-
Jihad, and Turkish terrorists have revealed Eikmeier’s or Butler’s COG method- middle-east-28082962>; “What is ISIS? The
that a key reason for joining was that a ologies, but it does need to make joint Short Answer,” Wall Street Journal, June 12,
2014, available at <http://blogs.wsj.com/
friend or relative was already a member, a doctrine COG determination a testable briefly/2014/06/12/islamic-state-of-iraq-and-
conclusion consistent with prior research process. Whether it is deliberate elimina- al-sham-the-short-answer/>.
on many other terrorist groups.34 Much tion symbolized by a mythical creature, a 5
Jim Sciutto, Jamie Crawford, and Chelsea
terrorism research tends to gravitate “does/uses” criterion, which singles out a J. Carter, “ISIS Can “muster” Between 20,000
toward ideological causation but fails to distinctive relationship between two vari- and 31,500 Fighters, CIA Says,” CNN.com,
September 12, 2014, available at <www.cnn.
address consistent socioeconomic and ables, or a hybrid of both, joint doctrine com/2014/09/11/world/meast/isis-syria-
demographic variables that are prevalent COG determination should be testable. iraq>.
within terrorist organizations. ISIL is no With qualifying standards, COGs are less 6
JP 5-0, III-22.
exception to this phenomenon. likely to be misidentified. JFQ 7
Eikmeier references that the use of the
The COGs identified with the JOPP word primary is attributed to Joe Strange,
Centers of Gravity and Critical Vulnerabilities:
method are not testable under this pro- Building the Clausewitzian Foundation So That
cess. As different people apply the JOPP Notes We Can All Speak the Same Language, Perspec-
process, varying results are inevitable and tives on Warfighting, no. 4, 2nd ed. (Quantico,
often become subject to debate. All three
1
Joint Publication (JP) 5-0, Joint Operation VA: Marine Corps Association, 1996), ix.
Planning (Washington, DC: The Joint Staff, 8
Eikmeier, “Redefining the Center of
methods provide structured processes August 11, 2011), III-23. Gravity.”
for identifying critical COG variables. 2
On May 14, 2014, the Department of 9
“Daash Announce the Establishment of
Objectives (ends), critical capabilities State officially stated that the Islamic State of the Caliphate State and Renamed the ‘Islamic
(ways), critical requirements (means), and Iraq and the Levant (ISIL) will be the terrorist State’ Only without Iraq, Syria,” ArabicCNN.
other critical variables are inherent in all organization’s primary name. Department of com, June 29, 2014, available at <http://
State, “Terrorist Designations of Groups Oper- arabic.cnn.com/middleeast/2014/06/29/
three methods. The primary difference is ating in Syria,” available at <www.state.gov/r/ urgent-isis-declares-caliphate>; Office of
that the Eikmeier and Godzilla applica- pa/prs/ps/2014/05/226067.htm>. the Director of National Intelligence, “Abu
tions provide testable criteria for COG 3
Dale C. Eikmeier, “Redefining the
136 Joint Doctrine / Three Approaches to COG Analysis JFQ 78, 3rd Quarter 2015
NEW from NDU Press
A Low-Visibility Force Multiplier:
Assessing China’s Cruise Missile Ambitions
By Dennis M. Gormley, Andrew S. Erickson, and Jingdong Yuan
China’s military modernization includes ambitious efforts to
develop antiaccess/area-denial (A2/AD) capabilities to deter
intervention by outside powers. Highly accurate and lethal
antiship cruise missiles and land-attack cruise missiles carried by
a range of ground, naval, and air platforms are an integral part
of this counter-intervention strategy. This comprehensive study
combines technical and military analysis with an extensive array
of Chinese language sources to analyze the challenges Chinese
cruise missiles pose for the U.S. military in the Western Pacific.
“This book provides an excellent primer on the growing challenge of Chinese cruise missiles. It
shows how antiship and land-attack cruise missiles complicate U.S. efforts to counter China’s
expanding A2/AD capabilities and are becoming a global proliferation threat. The authors also
demonstrate just how much progress China has made in modernizing and upgrading its defense
industry, to the point of being able to develop and produce world-class offensive weapons systems
such as land-attack cruise missiles. This book belongs on the shelves of every serious observer of
China’s growing military prowess.”
—Richard A. Bitzinger, Coordinator, Military Transformations Program,
S. Rajaratnam School of International Studies, Singapore
A first of its kind, this book—of, by, and for noncommissioned officers and petty officers—
is a comprehensive explanation of enlisted leaders across the United States Armed Forces.
It balances with the Services’ NCO/PO leadership manuals and complements The Armed
Forces Officer, the latest edition of which was published by NDU Press in 2007. Written by
a team of Active, Reserve, and retired enlisted leaders from the five Service branches, this
book describes how NCOs/POs fit into an organization, centers them in the Profession
of Arms, defines their dual roles of complementing the officer and enabling the force, and
exposes their international engagement. As Chairman of the Joint Chiefs of Staff General
Martin E. Dempsey writes in his foreword to the book, “We know noncommissioned offi-
cers and petty officers to have exceptional competence, professional character, and soldierly
grit—they are exemplars of our Profession of Arms.”
Aspirational and fulfilling, this book helps prepare young men and women who strive to
become NCOs/POs, re-inspires currently serving enlisted leaders, and stimulates reflection
by those who no longer wear the uniform. It also gives those who have never served a com-
prehensive understanding of who these exceptional men and women are, and why they are
known as the “Backbone of the Armed Forces.”
Facebook Flickr
Twitter Pinterest