Tag Archives: featured

A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power

The following is a two-part series on how the U.S. might better utilize cyberspace and information operations as a Third Offset. Part I will evaluate current offset proposals and explores the strategic context. Part II will provide specific cyber/IO operations and lines of effort.

By Jake Bebber 

“It is better by noble boldness to run the risk of being subject to half of the evils we anticipate than to remain in cowardly listlessness for fear of what might happen.”

-Herodotus, The Histories

Introduction

In 2014, then Secretary of Defense Hagel established the Defense Innovation Initiative, better known as the Third Offset, which is charged with recommending ways to sustain American military superiority in the face of growing capabilities fielded by powers such as Russia and China.[i] The purpose of the Third Offset is to “pursue innovative ways to sustain and advance our military superiority” and to “find new and creative ways to sustain, and in some cases expand, our advantages even as we deal with more limited resources.” He pointed to recent historical challenges posed by the Soviets in the 1970’s which led to the development of “networked precision strike, stealth and surveillance for conventional forces.” Centrally-controlled, inefficient Soviet industries could not match the U.S. technological advantage, and their efforts to do so weakened the Soviet economy, contributing to its collapse.

Today, China represents the most significant long-term threat to America and will be the focus here. A number of leading organizations, both within and outside government, have put forward recommendations for a Third Offset. However, these strategies have sought to maintain or widen perceived U.S. advantages in military capabilities rather than target China’s critical vulnerabilities. More importantly, these strategies are predicated on merely affecting China’s decision calculus on whether to use force to achieve its strategic aims – i.e., centered around avoiding war between the U.S. and China. This misunderstands China’s approach and strategy. China seeks to win without fighting, so the real danger is not that America will find itself in a war with China, but that America will find itself the loser without a shot being fired. This paper proposes a Cyberspace-IO Offset strategy directly attacking China’s critical vulnerability: its domestic information control system. By challenging and ultimately holding at risk China’s information control infrastructure, the U.S. can effectively offset China’s advantages and preserve America’s status as the regional security guarantor in Asia.

All effective strategies target the adversary’s center of gravity (COG), or basis of power. “Offset strategies” are those options that are especially efficient because they target an adversary’s critical vulnerabilities, while building on U.S. strengths, to “offset” the opponent’s advantages. Ideally, such strategies are difficult for an adversary to counter because they are constrained by their political system and economy. Today, China’s COG is the Chinese Communist Party (CCP). The stability of this system depends greatly on the ability of the Chinese regime to control information both within China, and between China and the outside. Without this control, opposition groups, minority groups, and factions within the CCP itself could organize more effectively and would have greater situational awareness for taking action. Thus, information control is potentially a critical Chinese vulnerability. If the United States can target the ability of the Chinese regime to control information, it could gain an efficient means to offset Chinese power. This offset strategy, using cyberspace and other information operations (IO) capabilities, should aim to counter China during the critical window in the next ten to twenty years when Chinese economic and military power will surge, and then subside as demographic, economic and social factors limit its growth.

Targeting the CCP’s ability to control information can be considered a long-term IO campaign with options to operate across the spectrum of conflict: peacetime diplomacy and battlespace preparation; limited conflict; and, if deterrence fails, full-scale military operations. The goal is to ensure that PRC leaders believe that, as conflict escalates, they will increasingly lose their ability to control information within China and from outside, in part because the U.S. would be prepared to use more drastic measures to impede it.

This strategy is most efficient because it serves as an organizing concept for cyber options targeted against China that would otherwise be developed piecemeal. It could serve as a means to prioritize research and development, and better link military planning for cyberspace operations to public diplomacy, strategic communication, and economic policy initiatives. The nature of cyberspace operations makes it difficult to attribute actions back to the United States with certainty, unless we wish it to be known that the U.S. is conducting this activity. Finally, it provides an alternative array of responses that policy makers can use to offset growing Chinese power without immediate direct military confrontation.

Demographic, economic and social factors will combine to create a ceiling on Chinese power, ultimately causing it to enter a period of decline much sooner than it expects.[ii] These factors will stress the Communist Party’s ability to exclude economic, social and political participation of dissenters, and create further reliance by the Party on information control systems.

The Strategic Environment

The United States is a status quo power. It seeks to retain its position of dominance while realizing that relative to other powers, its position may rise or fall given the circumstances. It supports the post-World War II international order – a mix of international legal and liberal economic arrangements that promote free trade and the resolution of disputes through international organizations or diplomatic engagement when possible. The United States recognizes the growth of China, and that it will soon achieve “great power” status, if not already. It is most advantageous to the United States if the “rise” (or more correctly, return to great power status) of China occurs peacefully, and within the already established framework of international rules, norms, and standards.

There are two important considerations. First is the “singularity” of China with respect to its self-understanding and its role in the world. China views the last two centuries – a time when China was weak internally and under influence from foreign powers – as an aberration in the natural world order. Most Chinese consider their several thousand year history as the story of China occupying the center of the world with “a host of lesser states that imbibed Chinese culture and paid tribute to China’s greatness …” This is the natural order of things. In the West, it was common to refer to China as a “rising power,” but again, this misreads China’s history. China was almost always the dominant power in the Asia-Pacific, punctuated by short periods of turmoil. It just so happened that the birth and growth of the United States took place during one of those periods of Chinese weakness.[iii]

The strategic approach of China is markedly different, based on its concept of shi, or the “strategic configuration of power.” The Chinese “way of war” sees little difference in diplomacy, economics and trade, psychological warfare (or in today’s understanding, “information warfare”) and violent military confrontation. To paraphrase the well-known saying, the acme of strategy is to preserve and protect the vital interests of the state without having to resort to direct conflict while still achieving your strategic purpose. The goal is to build up such a dominant political and psychological position that the outcome becomes a foregone conclusion. This is in contrast to Western thought which emphasizes superior power at a decisive point.[iv]

To the American leadership, the “most dangerous” outcome of a competition with China would seem to be one that leads to war; hence the near-desperate desire to not undertake any action which might lead China down that path. Yet a better understanding of China suggests that it believes it can (and is) achieving its strategic purpose without having to resort to force. Its military buildup, use of economic trade agreements, diplomacy, and domestic social stability are creating the very political and psychological conditions where the use of force becomes unnecessary. China is quite content to remain in “Phase 0” with the United States, because it  believes it is winning there. Thus, the question for America is not “How do we maintain the status quo in Phase 0?” but “How do we win in Phase 0?” The most dangerous course of action is not war with China, but losing to China without a shot being fired.

cyber 2
Figure 1. In 2015, China reorganized the PLA and created a new Cyber Warfare branch under its Strategic Support Force.

Current Offset Proposals

In response to the call for proposals, a number of initiatives and programs have been put forward by both the Department of Defense and leading national security think tanks. The underlying assumption of most of these proposals is that the United States has lost or is quickly losing its “first mover” advantage – such as that offered by the shift from unguided to guided munitions delivered from a position of stealth or sanctuary. In this regard, China represents a “pacing threat,” leading the way in developing its own guided weapons regime and the ability to deliver them asymmetrically against the United States.[v] In order to regain America’s military advantage, most recommendations follow along these lines:

  • Development and procurement of new platforms and technologies that leverage current perceived technological advantages over China in such areas as:
    • Unmanned autonomous systems;
    • Undersea warfare;
    • Extended-range and low-observable air operations;
    • Directed energy; and
    • Improved power systems and storage.
  • New approaches to forward basing, including hardening of infrastructure (both physical and communication networks), the use of denial and deception techniques and active defense;
  • Countering China’s threats to U.S. space-based surveillance and command and control systems;
  • Assisting allies and friends in the development of or exporting of new technologies that impose smaller-scale anti-access and area denial (A2/AD) costs on China; and
  • Reconstitute and reinvigorate Department of Defense “iterative, carefully adjudicated tabletop exercises and model-based campaign assessments.”[vi]

These approaches[vii] may have much to offer and are commendable, however they suffer from a glaring weakness: none target China’s center of gravity or critical vulnerabilities. They seek to leverage capabilities where the United States appears to enjoy an advantage, such as undersea warfare. For example, while it may be true that the People’s Liberation Army-Navy (PLAN) is not as proficient as the U.S. Navy (or some allies) in the undersea domain, it is also true that the Chinese regime is investing heavily to “close the gap” in these and other capabilities or is developing asymmetric alternatives. The United States will face a diminishing marginal utility as it attempts to maintain or widen the gap, especially in an era when China’s cyberspace-enabled information exploitation capabilities are extremely robust, and capable of transferring intellectual property back to China on a scale unimaginable in the Cold War.

More fundamentally, the offsets proposed are not guided by an overarching grand strategy that utilizes all elements of national power attacking key weaknesses and critical vulnerabilities in the Chinese regime, much in the same way that the Reagan Administration was able to do against the Soviets. Reagan’s policy and strategy represented a “sharp break from his predecessors,” eschewing containment in favor of attacking “the domestic sources of Soviet foreign behavior.”[viii] By recognizing the inherent weakness of the Soviet economic system, the new policy sought to leverage national military, political and economic tools to press the American advantage home, causing the Soviet system to collapse. This is not to suggest that the Chinese economic system suffers from the same malaise as their Soviet brethren did. Despite growing demographic, social and economic headwinds, it is unlikely that the United States can “bankrupt” the Chinese. However, China does have acute vulnerabilities – vulnerabilities which align with unique American advantages.

China’s Center of Gravity and Critical Vulnerabilities

None of the proposed previously mentioned offset lines of effort attempt to identify or target China’s COG. The center of gravity is defined by Milan Vego is “a source of massed strength – physical or moral – or a source of leverage whose serious degradation, dislocation, neutralization, or destruction would have the most decisive impact on the enemy’s or one’s own ability to accomplish a given political/military objective.”[ix] Joint military doctrine defines it as “The source of power that provides moral or physical strength, freedom of action, or will to act.”[x] The center of gravity concept is important to offset strategies because it enhances “the chance that one’s sources of power are used in the quickest and most effective way for accomplishing a given political/military objective.” It is the essence of “the proper application of the principles of objective, mass and economy of effort.”[xi]

Using an analytic construct designed by Vego, we note that any military situation encompasses a large number of both “physical and so-called abstract military and nonmilitary elements.” These are the “critical factors” that require attention and are deemed essential to the accomplishment of the objective, both of the adversary and ourselves. Not surprisingly, these factors encompass both critical strengths and critical weaknesses – both of which are essential. Critical vulnerabilities are “those elements of one’s military or nonmilitary sources of power open to enemy attack, control, leverage, or exploitation.” By attacking critical vulnerabilities, we ultimately attack the enemy center of gravity.[xii] The figure below shows notionally how China’s information control systems are a critical vulnerability (note that it is not all-encompassing).

Figure 2. Notional Center of Gravity Analysis[xiii].
Figure 2. Notional Center of Gravity Analysis[xiii].
According to Vego, it is generally agreed that for most authoritarian/totalitarian regimes, the dictator, central governing party or leadership committee is the strategic center of gravity. In the case of China, the CCP is the sole governing political party. The top leadership of the CCP is the Politburo Standing Committee (or Central Standing Committee), currently made up of seven members and led by General Secretary Xi Jinping. A number of factors permit the continued rule of the CCP, including a massive domestic security apparatus and the world’s largest military, a growing standard of living and state control over media and information available to its people. In many ways, the Chinese leadership have already conducted their own vulnerability analysis and concluded that the free flow of information represents the biggest threat to their power – we can see this in both their words and deeds. China spends more on domestic security than on its own military. The last officially reported figures from the PRC in 2013 show the military budget was approximately 740.6 billion yuan ($119 billion) while domestic security received 769.1 billion yuan ($121 billion).[xiv] Beginning in 2014, the PRC stopped reporting on domestic security spending.[xv] In 2015, the PRC announced an 11 percent increase in “public security” spending to 154.2 billion yuan, or $24.6 billion. However, the total amount spent on domestic security remains unreported, and is certainly much higher, since regional and provincial figures are not provided. The reported military spending was 886.9 billion yuan, approximately $139 billion.[xvi] Fourteen separate state ministries are charged with domestic censorship responsibilities, everything from traditional press and broadcast media to text messages on cell phones.[xvii] A form of self-censorship has been institutionalized with Chinese internet companies being required to sign a “Public Pledge on Self-Regulation and Professional Ethics for China Internet Industry.”[xviii] In short, China has already shown what it fears most and where it is most vulnerable – it has performed its own “COG analysis” and has identified information control as a critical requirement to maintain CCP dominance.

cyber 3
Figure 3. In 2015, the U.S. and China met to discuss recent cyberspace issues.

A Cyberspace – IO Strategy

China’s regime identifies the free flow of information as an existential threat, and has erected a massive bureaucratic complex to censor and restrict free access to the nearly 618 million (and growing) Chinese internet uses (and 270 million social network users).[xix] However, the very nature of the Internet as a networked system makes censorship and restricted access difficult to maintain. As has been shown, China’s information control systems represent a critical vulnerability to their center of gravity. China’s network security is managed by a fragmented, disjointed system of “frequently overlapping and conflicting administrative bodies and managing organizations.”[xx]

China’s cyberspace operations and strategy are driven primarily by domestic concerns, with its central imperative being the preservation of Communist Party rule. Domestic security, economic growth and modernization, territorial integrity and the potential use of cyberspace for military operations define China’s understanding. Even its diplomatic and international policies are built around giving China maneuvering room to interpret international norms, rules and standards to serve domestic needs, principally through the primacy of state sovereignty. This creates a natural tension, as China must seek to balance economic growth and globalization with maintaining the Party’s firm grip on power. Not only is Internet usage controlled and censored, but it is also a tool for state propaganda.[xxi]

Chinese authorities use a number of techniques to control the flow of information. All internet traffic from the outside world must pass through one of three large computer centers in Beijing, Shanghai and Guangzhou – the so-called “Great Firewall of China.” Inbound traffic can be intercepted and compared to a regularly updated list of forbidden keywords and websites and the data blocked.[xxii] Common censorship tactics[xxiii] include:

  • Blocking access to specific Internet Protocol (IP) addresses;
  • Domain Name System (DNS) filtering and redirection, preventing the DNS from resolving or returning an incorrect IP address;
  • Uniform Resource Locator (URL) filtering, scanning the targeted website for keywords and blocking the site, regardless of the domain name;
  • Packet filtering, which terminates Transmission Control Protocol (TCP) transmission when a certain number of censored keywords are detected. This is especially useful against search engine requests.
  • “Man-in-the-Middle” attack, allowing a censor to monitor, alter or inject data into a communication channel;
  • TCP connection reset, disrupting the communication data link between two points;
  • Blocking of Virtual Private Network (VPN) connections; and
  • Network Enumeration, which initiates an unsolicited connection to computers (usually in the United States) for the purpose of blocking IP addresses. This is usually targeted against secure network systems or anonymity networks like “Tor.”

cyber 4
Figure 4. Simplified Chinese Firewall Topology[xxiv].
China also heavily regulates and monitors Internet service providers, Internet cafes, and university bulletin board systems. It requires registration of websites and blogs, and has conducted a number of high profile arrests and crackdowns on both dissidents and Internet service providers. This “selective targeting” has created an “undercurrent of fear and promoted self-censorship.” The government employs thousands who monitor and censor Internet activity as well as promote CCP propaganda.[xxv]

China’s information control regime is vulnerable on a number of levels to a coordinated strategy that seeks to hold it at risk. From a technical standpoint, the distributed nature of the internet makes it inherently vulnerable, the “Great Firewall” notwithstanding. The techniques used to filter and block content have a number of workarounds available to the average person. For example, IP addresses that have been blocked may be accessed utilizing a proxy server – an intermediary server that allows the user to bypass computer filters. DNS filtering and redirection can be overcome by modifying the Host file or directly typing in the IP address (64.233.160.99) instead of the domain name (www.google.com). These are simple examples that a novice government censor can easily outwit, but the point remains.

China has long been rightfully accused of being a state-sponsor of cybercrime and theft of intellectual property. One negative consequence of this from China’s perspective is the high level of cybercrime within China “due in large part to rampant use and distribution of pirated technology” which creates vulnerabilities. It is estimated that 54.9 percent of computers in China are infected with viruses, and that 1,367 out of 2,714 government portals examined in 2013 “reported security loopholes.”[xxvi] China’s networks themselves, by virtue of their size and scope, represent a gaping vulnerability.

At the same time, China’s information control bureaucracy is especially unwieldy. This is an ideal target to exploit the seams and gaps both horizontally and vertically in their notoriously byzantine structure. The fourteen agencies that conduct internet monitoring and censorship operations must all compete for resources and the attention of policy makers, leading to organizational conflict and competition. Any strategy should exploit these fissures, complicating China’s ability to control information.

Part 2 will outline several lines of effort the U.S. might pursue to attack China’s critical vulnerabilities in its information control system. It will advance the notion that the full range of American power – overt, covert, diplomatic, economic, information and military – must be coordinated and managed at the national level to wage a successful information operations campaign. Based on America’s past success, the future may be brighter than it first appears. Read Part 2 here.

LT Robert “Jake” Bebber USN is a Cryptologic Warfare Officer assigned to United States Cyber Command. His previous assignments have included serving as an Information Operations officer in Afghanistan, Submarine Direct Support Officer and the Fleet Information Warfare Officer for the U.S. Seventh Fleet. He holds a Ph.D. in Public Policy from the University of Central Florida. His writing has appeared in Proceedings, Parameters, Orbis and elsewhere. He lives in Millersville, Maryland and is supported by his wife, Dana and their two sons, Vincent and Zachary. The views expressed here are his own and do not reflect those of the Department of Defense, Department of the Navy or U.S. Cyber Command. He welcomes your comments at jbebber@gmail.com.

[i] Charles Hagel. “The Defense Innovation Initiative .” Memorandum for Deputy Secretary of Defense. Washington, D.C.: Department of Defense, November 15, 2014.

[ii] Robert Bebber. “Countersurge: A Better Understanding of the Rise of China and the Goals of U.S. Policy in East Asia.” Orbis 59 no. 1 (2015): 49-61.

[iii] Kissinger, Henry. On China. (New York, NY: Penguin Books, 2012).

[iv] David Lai. “Learning from the Stones: A Go Approach to Mastering China’s Strategic Concept, Shi.” U.S. Army War College Strategic Studies Institute. May 1, 2004, accessed Decmeber 26, 2014. http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=378

[v] Shawn W. Brimley. “The Third Offset Strategy: Security America’s Military-Technical Advantage.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[vi] David.Ochmanek. “The Role of Maritime and Air Power in the DoD’s Third Offset Strategy.” Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[vii] This list is certainly not exhaustive. For a more thorough review of the ones mentioned, see:. Brimley, Shawn W. “The Third Offset Strategy: Security America’s Military-Technical Advantage.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014. Martinage, Robert. “Statement Before the House Armed Services Subcommittee on Seapower and Projection Forces on the Role of Maritime and Air Power in DoD’s Third Offset Strategy.” Testimony Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014. Ochmanek, David. “The Role of Maritime and Air Power in the DoD’s Third Offset Strategy.” Testimoney Before the House Armed Services Committee Subcommittee on Seapower and Projection Forces. Washington, D.C., December 2, 2014.

[viii] Thomas G. Mahnken.”The Reagan Administration’s Strategy Toward the Soviet Union.” In Successful Strategies: Triumphing in War and Peace from Antiquity to the Present, by Williamson Murray and Richard Hart Sinnreich. Cambridge: Cambridge University Press, 2014.

[ix] Milan N. Vego. Joint Operational Warfare – Theory and Practice. (Newport, RI: Government Printing Office, 2007) VII-13-29.

[x] Joint Chiefs of Staff. Joint Publication 5-0: Joint Operational Planning. (Washington, D.C.: Department of Defense, 2011).

[xi] Vego, Joint Operational Warfare – Theory and Practice, VII-15

[xii] Ibid, VII-15.

[xiii] Joint Publication 5.0 defines Critical Capability as “A means that is considered a crucial enabler for a center of gravity to function as such and is essential to the accomplishment of the specified or assumed objective(s);” Critical Requirement as “An essential condition, resource, and means for a critical capability to be fully operational;” and Critical Vulnerability as “An aspect of a critical requirement which is deficient or vulnerable to direct or indirect  attack that will create decisive or significant effects.”

[xiv] Ben Blanchard and John Ruwich. “China Hikes Defense Budget, To Spend More on Internal Security.” Reuters, March 5, 2013, accessed December 23, 2014.http://www.reuters.com/article/2013/03/05/us-china-parliament-defence-idUSBRE92403620130305  

[xv] Michael Martina. “China Withholds Full Domestic Security-Spending Figure.” Reuters, March 4, 2014, accessed September 25, 2015.  http://www.reuters.com/article/2014/03/05/us-china-parliament-security-idUSBREA240B720140305

[xvi] Ting Shi and Keith Zhai. “China To Boost Security Spending as Xi Fights Dissent, Terrorism.” Bloomberg News, March 5, 2015 accessed September 25, 2015. http://www.bloomberg.com/news/articles/2015-03-05/china-to-boost-security-spending-as-xi-fights-dissent-terrorism

[xvii] Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.” The New York Times, April 7, 2010, accessed December 23, 2014.http://www.nytimes.com/2010/04/08/world/asia/08censor.html

[xviii] Biena Xu. Media Censorship in China. February 2014, accessed December 23, 2014. http://www.cfr.org/china/media-censorship-china/p11515

[xix] Ibid..

[xx] Amy Chang. Warring State: China’s Cybersecurity Strategy. (Washginton, D.C.: Center for a New American Security, 2014) 12.

[xxi] Rebecca MacKinnon. “Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China.” Public Choice 134 (2008): 31-46.

[xxii] Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.”

[xxiii] Jonathan Zittrain, and Benjamin Edelman. “Empirical Analysis of Internet Filtering in China.” Harvard Law School Berkman Center for Internet and Society. March 20, 2003, accessed December 23, 2014. http://cyber.law.harvard.edu/filtering/china/

[xxiv] Available at: https://news.ycombinator.com/item?id=4931595

[xxv] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress, (Washington, D.C.: Congressional Research Service, 2013).

[xxvi] Amy Chang. Warring State: China’s Cybersecurity Strategy. 15. 

Trident: An Introduction to the UK National Debate

By Alex Calvo

Introduction

Ever since its conception, the UK’s sea-based deterrent Trident has prompted a measure of controversy. This includes, among others, the wider question of nuclear armament, the system’s opportunity cost (in this context, the weapons or other security and defence assets the UK stops buying or producing in order to pay for Trident) the indirect impact on the conventional defence budget, and the British “minimal” nuclear posture and doctrine. Trident has also been part of debates such as the UK’s place in the world, her relationship with the EU, and the “special relationship” with the US, while featuring strongly in the 2014 Scottish referendum. While the Conservative victory in the last election featured a “manifesto that included a commitment to build four new ballistic missile submarines … replacing the Vanguard submarines that come out of service from the early 2030s,” as stressed by British Defence Secretary Michael Fallon, the debate is still likely to continue, boosted by both political and technological factors. The purpose of this four-part series is to outline the most important terms of the debate, in a language accessible to non-specialists, providing a short yet comprehensive look at the matter. An effort has been made to sum up the different views on this issue, and to present alternatives.

In the first installment in the series, we review some key concepts in nuclear strategy theory and look at the basic characteristics of the Trident system, which provides sea-based, national, and minimum deterrence. We then examine the costs involved, what is meant by “extending Trident,” and discuss the continued relevance of nuclear deterrence. This first part concludes with a look at the gap between the UK’s nuclear and conventional postures.

Preliminary Considerations

The basis of nuclear deterrence is the belief that a country equipped with nuclear weapons will not be attacked by another nuclear power because this would result in an exchange and the resulting destruction of both countries. As a result, a “balance of terror” is achieved, whereby nobody uses this kind of weapon, which nevertheless, in spite of being “unusable,” plays a key role in the national security of nuclear powers. The concept of nuclear “mutual deterrence” quickly gained currency as soon as the US nuclear monopoly was breached in 1949, with the Soviet Union’s maiden nuclear test, and became one of the defining characteristics of the Cold War. It is also known as MAD (“mutually assured destruction.”)

It is important to stress two aspects of mutual deterrence:

1. A key condition is the invulnerability of both nuclear deterrents. If there is no way country A can destroy the nuclear weapons of country B, and vice versa, then none will have an incentive to use them, since it would inevitably result in the attacker’s destruction. This would happen, no matter who attacked first, the end result being the same. Attacking first only means dying a bit later. Thus, this acts as a stabilizer at times of crisis, since there is no incentive to strike first in order not to lose one’s nuclear deterrent, there is thus no “use them or lose them” factor. This explains why, during the Cold War, the two superpowers agreed to limit work on anti-missile defences, signing the 1972 ABM (Anti-Ballistic Missile) Treaty. While it may seem counterintuitive, by agreeing to have their cities remain vulnerable to a nuclear strike, they considered to be favouring stability. A working missile shield may have tempted its owner into believing that a nuclear war was “winnable,” one of the reasons for continued Russian hostility in this area. This need to guarantee the invulnerability of one’s nuclear forces also explains the drive to develop sea-based deterrents in the form of submarines equipped with nuclear missiles. Since it is very difficult to detect a submarine, it is expected to survive an attack, thus removing any incentive for the enemy to strike first in the hope of destroying one’s nuclear missiles. Again, like in the case of the ballistic missile defence ban, this was considered to contribute to stability, reducing the risk of nuclear war.

2. The possession of nuclear weapons by two powers, under the above circumstances (vulnerability of their population and invulnerability of the weapons themselves) meant, according to the theory, that nuclear war would not take place. Proponents of nuclear deterrence cite the Cold War as evidence for this. However, neither the theory nor actual historical evidence excluded the possibility of conventional or asymmetrical war (in this series, we will understand “asymmetric warfare” in a broad sense of the term, including terrorism, insurgency, non-lethal use of force, and the currently very much en vogue “mixed war” or “hybrid warfare”). Indeed, the Cold War did not feature any nuclear exchange, but many conventional conflicts took place, involving proxies and sometimes one of the superpowers as well, in addition to myriad instances of terrorism and insurgency. Concerning the relationship between nuclear and conventional weapons, some countries have issued a guarantee that the former would not be used against a non-nuclear enemy, but not all have, and even where a formal guarantee exists, some observers doubt a nuclear-weapons state would renounce using them if its very existence or essential national interest was at stake.

2
October 2012 test off the coast of Florida, the first in three years by a British strategic nuclear submarine.

Right from the beginning it was clear that nuclear weapons would have a major impact on warfighting, and the British nuclear program and the later US Manhattan Project were fueled by fears that Nazi Germany may be more advanced in this field. Nuclear weapons were controversial even before they were first used, with some of the nuclear scientists involved making a last-minute attempt to employ a device for a “demonstration” in the hope Imperial Japan would surrender without the need for the mass destruction of civilian lives. Later years saw campaigns against nuclear weapons, often wider and including a blanket opposition to civil nuclear power, while some countries made desperate efforts to secure their own deterrent, and others signing the Non-Proliferation Treaty (NPT) as non-nuclear weapons states in exchange for some sort of guarantee by an accepted nuclear power that the latter would use, if necessary, its own nuclear weapons to defend them. This practice, known as “extended deterrence,” should not be forgotten, since it is doubtful that without it so many countries would have accepted the NPT. This division of countries into two leagues, only one of which was allowed to own nuclear weapons according to international law, was bitterly denounced by India, which branded it as “Nuclear Apartheid.” Other established nuclear powers kept insisting that “non-proliferation,” the policy of restricting the spread of nuclear weapons to other countries, was conducive to stability. One may note a certain contradiction between the concepts of deterrence and non-proliferation, whose relationship is complex. In recent years New Delhi has signed a number of agreements with the US and other countries, the International Atomic Energy Agency, and the Nuclear Suppliers Group, so that we can now say India is a “de facto” recognized nuclear weapons state outside the NPT.

Trident: The Basics

In a few words, Trident is a sea-based national minimum nuclear deterrent.

Sea-based because it consists of four Vanguard-class submarines equipped with nuclear missiles. As explained above, submarines are considered to be very difficult to detect and destroy, making them the ideal platform for deterrence, since an aggressor managing to destroy UK population centers could expect swift retaliation in kind. To achieve this, it is necessary to always have at least one submarine on patrol (known as CASD, “Continuous At Sea Deterrence”), with four widely considered to be the minimum number of boats needed to achieve this. Otherwise, an aggressor aware of a window of vulnerability, with no submarines on patrol, may choose to strike at that particular time. This minimum number means that it is not really possible to cut the cost of the program by reducing the number of units deployed, since below this minimum the key objective of one submarine in patrol at all times would no longer be achievable. It should also be stressed that there is no absolute guarantee that a submarine is invulnerable, since technological developments may enable an enemy to track and destroy or otherwise neutralize them. In part three of our series we will discuss cyberwarfare and submarine drones, whose potential impact on Trident has been discussed over the last few months. It is also necessary to take into account that, while four is widely considered to suffice for the purposes of nuclear deterrence, this number comes from statistical studies and past experience, but does not amount to any iron-clad guarantee in the face of possible trouble from, among others, damage, malfunction, or cyber attacks.

3
Infographic with details of Trident submarines and their missiles.

National, since it is owned and operated by Her Majesty’s Government, being under national command. It must be noted though, as discussed later, that the technology employed is not exclusively British, being dependent to a considerable extent on the United States. The missiles are American, the submarines and warheads British. Second, British nuclear doctrine does not exclude the possibility of employing Trident to protect NATO Allies. The UK’s 2010 Strategic Defence and Security Review states that “The UK has long been clear that we would only consider using our nuclear weapons in extreme circumstances of self-defence, including the defence of our NATO Allies, and we remain deliberately ambiguous about precisely when, how and at what scale we would contemplate their use.”

Minimum, for a number of reasons. First, because it only features submarines, one of the legs of a possible “Nuclear Triad,” the others being land-based missiles and aircraft-dropped bombs. Second, because the number of submarines is the smallest compatible with a continued patrol capability. Third, because these submarines only carry a fraction of the missiles and warheads they are capable of delivering (8 and 40 respectively, instead of 16 and 192 originally envisaged). Fourth, because British nuclear doctrine, while not going as far as ruling out, for example, a first nuclear strike, or an attack against a non-nuclear country, seeks to considerably restrict the scenarios in which atomic weapons may be employed. This is clear for example in the section on “Five Enduring Principles” in the 2006 white paper titled The Future of the United Kingdom’s Nuclear Deterrent. The 2006 white paper states that “the UK will retain only the minimum amount of destructive power required to achieve our deterrence objectives.”

Trident can thus be seen as a compromise solution between, on the one hand, the perceived need for a nuclear deterrent, and on the other the wish to minimize its scope. This does not mean that it results from a simplistic calculation, since many other factors may have influenced the choice including inter-service considerations and relations with the US, just to mention two, and to be discussed later.

How Much Does Trident Cost?

Given that a key aspect of the debate is financial, it is necessary to bear in mind how much money we are talking about, both concerning the existing Trident system, and the possible replacement of its submarines. In 2012 the Secretary of State for Defence replied to two parliamentary questions covering these issues, saying that “As stated in the White Paper, The Future of the United Kingdom’s Nuclear Deterrent (Cm 6994) published in December 2006, we expect that once the new successor nuclear deterrent submarine comes into service, the in-service costs of the UK’s nuclear deterrent, which will include Atomic Weapons Establishment’s costs, will be similar to today (around 5% to 6% of the defence budget)” and, concerning the estimate for “the cost of design and build for a replacement continuous at-sea nuclear deterrent system” that “current forecast costs, including planned Submarine Enterprise Performance Programme efficiency measures, indicate that we remain within the 2006 White Paper estimates of £11 billion to £14 billion (at 2006-07 prices) for the Successor platform costs (assuming a four boat fleet).”

With regard to the cost of the new submarines, the then coalition government officially confirmed in 2011 the 2006 estimate by the previous Labour administration. In present-day pounds, it would be “£20 billion to £25 billion at out-turn” according to then Secretary of State for Defence Liam Fox, who added “Between now and main gate [in 2016] we expect to spend about 15% of the total value of the programme. That is entirely consistent with defence procurement guidance. The cost of long lead items is expected to amount to about £500 million.” As is generally the case with defence procurement, it may be difficult to provide accurate cost estimates given possible overruns, unexpected contingencies, and evolving technological and doctrinal changes. The long life span makes any calculation even more difficult, with London-based think-tank RUSI noting that “estimating total costs for a programme which will last beyond 2050 is a highly speculative exercise.” What seems clear is that the sums involved are substantive, yet within the means of the UK. Thus, although cost may be used by detractors of the program or of nuclear deterrence in general, what matters the most from a defence policy perspective is first whether a more economic alternative may be found to provide the UK with an equivalent nuclear deterrent, and second the opportunity cost of Trident for conventional defence. Both will be covered later in our four-part series.

We should also note that in assessing the cost of alternatives to Trident, the schedule to replace the existing submarines must be taken into account. This means that some alternatives that may seem cheaper are no longer so when the time to develop them is taken into account. The Trident Alternatives Review admits that “The costs of delivering an alternative system could theoretically have been cheaper than procuring a like-for-like renewal of Trident” but adds “were it not for timing and the fact that the UK deterrent infrastructure is finely tuned to support a submarine-based Trident system. In particular, the time it would take to develop a new warhead (itself a costly and high risk exercise) is judged to be longer than the current Vanguard-class submarines can safely be operated.” Also relevant is the fact that, as noted by think-tank BASIC, “Replacement of the submarines is already underway in several respects,”

What do we mean by “extending” Trident?

We should briefly note that the decision to be taken by the current parliament does not, strictly speaking, directly involve the Trident missiles or their warheads but the Vanguard class submarines carrying them. As noted by an observer, “The same Trident 2 D5 missiles currently in service will continue to be used at least out to 2042, so it is most definitely not a matter of replacing Trident. The warheads are also good out to 2032 at least, as they are subject to a life extension programme which brings them to MK4A standard” but “The four Vanguard submarines, on the other hand, can no longer be life extended safely and effectively. Their useful life has already been stretched and the first of the class is now due to soldier on until 2028, but it is assessed that extending further is not desirable.”

Nuclear Deterrence: Still Needed?

The first question to answer when considering the future of Trident is whether the concept of nuclear deterrence is still current or has become obsolete. A second question is whether a country needs to be a nuclear weapons state in order to be a top diplomatic power. Third, we have the relationship between nuclear and non-nuclear defence, and more precisely whether nuclear weapons are necessary to wage conventional or asymmetric war.

As discussed later, an affirmative answer to these questions does not automatically mean we should support Trident, since other nuclear alternatives exist, but should we answer them in the negative then it would be logical to defend Trident’s end.

4
Nuclear-themed pin-up. Ever since its invention, the bomb has had a contradictory place in popular culture, as a harbinger of both Armageddon and supreme power.

With regard to the first question, as long as other powers sport their own nuclear forces, and even more so if tensions or significant conflicts persist with some such powers, it is difficult to avoid the conclusion that it is indeed necessary for the UK to retain her own nuclear deterrent. Terminating it would mean that the country may become the victim of nuclear blackmail. It is true that the UK may seek to rely on extended deterrence (also known as the “nuclear umbrella”) by the United States, but this would mean outsourcing national security, with the corresponding loss of power and influence on the one hand, and the risk that American authorities may not be ready (or may be perceived by a potential aggressor as not being ready) to risk American lives to preserve British ones. Some observers in Japan, which relies on US extended deterrence, have often posed the question whether America would be willing to “trade LA for Tokyo,” and as noted by a Congressional Research Service paper “Since the threat of nuclear attack developed during the Cold War, Japan has been included under the U.S. ‘nuclear umbrella,’ although some ambiguity exists about whether the United States is committed to respond with nuclear weapons in the event of a nuclear attack on Japan.” A similar question could be asked with regard to London, Manchester, or Birmingham.

Furthermore, it should be noted from a financial and industrial perspective that relying on extended deterrence may also directly or indirectly lead to the UK shouldering part of the cost of providing that protection, without the industrial benefits from having a national system. This may be another consideration against the nuclear umbrella as opposed to an independent deterrent.

It must be noted, though, that some observers doubt the value of a nuclear deterrent, and furthermore point at recent history as evidence that money should best be spent elsewhere. For example, writing for RUSI, Hugh Beach argues that “It cannot be shown that by virtue of its UK nuclear arsenal, Britain has been able to take any action vis-à-vis another country that it could not otherwise have undertaken, nor prevented action by any other country that it could not otherwise have prevented. British nuclear weapons did not deter Argentina from attempting to annex the Falkland Islands in 1982,” a line of thought that he extends to other nuclear powers.

The Gap between the UK’s Nuclear and Conventional Posture

In connection with the above, we should mention that, as noted by RUSI’s Malcolm Chalmers, British conventional and nuclear defence policy may be seen as out of step. The former is based on the assumption that no state conflict involving the homeland is foreseeable, whereas the latter is posited on the opposite assumption. Chalmers wrote “Discussion of options for conventional capability in the Strategic Defence and Security Review (SDSR) is based on the assumption that the UK homeland does not face a significant threat of attack by other states. Nor, it is assumed, could one emerge without an extended period of strategic warning. While the UK plans to maintain and improve capabilities for a range of national tasks, including strategic intelligence, counter-terrorism, counter-cyber, and defence of dependent territories, these tasks do not include defence of the UK against military attack by other states. The main focus of conventional force planning, accordingly, is now on the appropriate size and shape of the UK’s contribution to collective capabilities for intervention and stabilisation in other parts of the world. By contrast, the commitment to maintain a nuclear-armed missile submarine on patrol at all times (i.e., CASD) has remained largely unchanged since the 1960s, when a surprise attack on Western Europe by the Soviet Union was a central driver for UK force planning.” Although this different posture is clearly in place and can be observed in the respective doctrinal documents, we should be careful before reaching any rushed conclusions. We should also be careful before imagining that the solution to the Trident debate is to put nuclear policy in line with conventional doctrine and forego or downgrade the British deterrent. Possibly because it is conventional doctrine that needs an in-depth review in a more realistic direction. Second, because there may not be, as discussed later, a gulf between conventional and non-conventional defence, but rather a continuous spectrum. In other words, any cuts in nuclear capabilities or credibility may have a negative impact on conventional deterrence and the ability to wage conventional, unconventional, and hybrid war.

In our second part, we shall first examine the impact of nuclear weapons on a country’s hard and soft power, and then proceed to discuss “Hybrid warfare” under a nuclear umbrella. While this term has become a buzzword, it is often examined without taking into account its non-conventional dimension, thus failing to capture its complexity. We shall also cover Trident’s opportunity cost and, as some opponents argue, whether it may constitute an obstacle for British conventional rearmament. This second installment concludes with a look at the connection between Trident and, on the one hand, the “special relationship” between London and Washington, and, on the other, the UK’s place within the European Union, the subject of a referendum on 23 June.

Alex Calvo, a guest professor at Nagoya University, Japan, focuses on security and defense policy, international law, and military history in the Indian-Pacific Ocean Region. He tweets at Alex__Calvo and his papers can be found here. Previous work on British nuclear policy includes A. Calvo and O. Olsen, “Defending the Falklands: A role for nuclear weapons?” Strife Blog, 29 July 2014, available here.

Terrorists on the Ocean: Sea Monsters in the 21st Century

By CAPT Robert N. Hein, USN

The call of the ocean has enticed generations to explore, and at times exploit her domain. Ninety percent of world commerce transits the oceans. Cruise ships represent a $40 Billion industry, and 30% of the world’s oil originates offshore. It is no wonder criminals and terrorists also feel drawn to the sea. As these groups expand their reach, the question is: When will ISIS and other terrorist organizations bring their brand of mayhem to the oceans?

A senior NATO Admiral, VADM Clive Johnstone, recently expressed concern that ISIS desired its own maritime force to spread its nefarious activities into the Mediterranean. These activities could include launching attacks against a cruise liner, oil terminal, or container ship. Soon after VADM Johnstone’s comments, Former Supreme Allied Commander and retired Admiral James Stavridis weighed in with his own concerns about ISIS entering the maritime domain: “I’m surprised [Islamic State militants] have not, as yet, moved into the maritime world and gone after cruise ships, which I think are a logical and lucrative target for them.”

While ISIS’ maritime capabilities have been limited to date, this has not been true of all terrorist organizations. ISIS’ predecessor, Al Qaeda, launched a vicious and successful attack against the USS COLE in October 2000. Somali pirates experienced tremendous success at sea for years, but strong responses from the international community and force protection measures by the maritime industry have limited further successful attacks. ISIS’ limited attempts at sea have achieved some effects though, such as the shore-launched rocket attack on an Egyptian naval ship in August. Additionally, there was a recent attempt by ISIS to conduct an attack from the sea against a Libyan oil terminal, but it was thwarted by Libyan security forces.

Footage of ISIS affiliated insurgent group launching missile at Egyptian Timsah class patrol boat in July 2015. 

How Real is the Threat?

The lure of expanding operations into the maritime domain is enticing to terrorist groups. The relative isolation is real, and external response is limited. Terrorist attacks on land receive a rapid government response, in large numbers, and with many assets to thwart an attack. Case in point is the Al Qaeda attack at a luxury hotel in Burkina Faso in January 2016. Three members of an Al Qaeda group took 126 hostages and killed two dozen more before security forces stormed the hotel, killing the terrorists and freeing the hostages. A logical extension of the attacks in Burkina Faso would be an assault on a large and remote or underdefended luxury hotel- such as an underway cruise ship. The narrative ISIS hopes to convey from attacking a cruise ship at sea is akin to many horror movies: a captive victim with nowhere to turn for help.

Following VADM Johnson’s prediction, the Cruise Line International Association quickly stepped in to reassure its passengers that cruises are still safe, but are they? The last successful terrorist attack against a cruise ship was 30 years ago by Palestinians. Their original intent was to use the Achille Lauro as transport to Ashdod, Israel, to launch a terror attack ashore. This plan rapidly changed when a crew member discovered the terrorists/attackers cleaning their weapons.

Egyptian central security police guarding the gangplank on which diplomats and others go to and from the Italian cruise liner ?Achille Lauro? which arrived, Thursday, Oct. 10, 1985 in Port Said in this port after being hijacked by four Palestinian for more than 48-hours. The four hijackers has left Egypt after they surrendered go to the Egyptian authorities on Wednesday. (AP Photo)
Egyptian central security police guarding the gangplank on which diplomats and others go to and from the Italian cruise liner Achille Lauro which arrived, Thursday, Oct. 10, 1985 in Port Said after being hijacked by four Palestinian for more than 48-hours. (AP Photo)

While the Achille Lauro incident increased levels of security in the cruise ship world, threats to the cruise industry remain. In March 2015, cruise ship tourists visiting a museum during a stop in Tunis were attacked. Cruise lines are quick to cancel port visits in global hot spots, and most employ internal security forces. However, the allure for terrorists remains. Al Qaeda made plans as early as 2011 to capture a cruise ship and execute its passengers. Fortunately, those plans have failed to come to fruition as terrorist groups have found the task is harder than it looks.

While attacks on the open ocean remain a challenge, coastal attacks are more feasible. The Pakistani terrorist group Lashkar-e-Taiba launched an attack in 2008 against Mumbai. They hijacked an Indian fishing boat and launched 10 terrorists ashore, ultimately killing 166 and injuring almost 500. The lack of a strong Coast Guard in both India and Pakistan certainly contributed to the terrorists’ success, and served as a wakeup call. In response to the Mumbai attacks, the Indian Navy was placed at the apex of India’s maritime security architecture and made responsible for both coastal and oceanic security. Since then, the Indian Navy has successfully prevented further attacks. However, even with the additional forces, indications persist that ISIS may be trying to infiltrate India by sea, disguised as fishermen.

Arguably, the most successful terrorist group on the sea was the Sri Lankan separatist group, the Tamil Tigers. In his treatise A Guerrilla Wat At Sea: The Sri Lankan Civil War , Professor Paul Povlock of the Naval War College describes how at their strongest, their maritime branch (the Sea Tigers) boasted a force of 3000 personnel with separate branches for logistics, intelligence, communications, offensive mining, and — every terrorists’ favorite — the suicide squad. They conducted sea denial with great success, even demonstrating the ability to sink Sri Lankan patrol boats using fast attack craft and suicide boats.

Small vessels employed by the Sea Tigers.
Small vessels employed by the Sea Tigers.

The Tigers continued their attacks against Sri Lanka for 20 years until the Sri Lankan Navy was able to effectively neutralize them. The Sri Lankan Navy now has a formidable maritime patrol, but not before they lost over 1000 men to the Sea Tigers. Hardly a day goes by without illegal fishermen being chased away or arrested by the Sri Lankan government, who is ever mindful that their waters could again be used for more nefarious purposes.

Sometimes terrorists’ appetites are far bigger than their stomachs, as was the case in September 2014 when Al Qaeda operatives attempted to hijack a Pakistani frigate. If successful, it would have had epic implications. However, the attempted takeover was thwarted by a sharp Pakistani gunner who noticed the inbound boat did not have standard issue gear. He engaged, destroying the terrorist boat, while commandos onboard the frigate subdued crew members sympathetic to the terrorist cause.

Defeat and Deter

Operating in the maritime domain is far more challenging than operations on land. The Somali pirates were originally fishermen and familiar with operating at sea, but it still took them years to develop an offshore “over the horizon” capability. The lack of successful attacks at sea by terrorist organizations in spite of their indicated desire is at least a partial validation of the efforts made by the maritime security community.

The effective shutdown of piracy off Somalia served as a model for defeating maritime crime, showing coastal nations the effects of naval presence in deterring illegal behavior at sea. Malaysia has all but shut down sea crime in its waters, and blunted terrorist attempts to enter Malaysia by aggressively patrolling their coasts. Nigeria has similarly stepped up its game in the Gulf of Guinea where their navy stopped two hijackings in one week and separately announced they would soon take delivery of an additional 50 boats- both demonstrations of commitment to peaceful use of their waters. That doesn’t mean the work is over. ISIS, who has the funds for major purchases, is attempting to acquire naval capabilities like 2 man submarines, high powered speed boats, boats fitted with machine guns and rocket launchers, and mine planners made easily available by less discerning arms providers such as Korea, China, and Russia.

While the likelihood of near-shore attacks remains a possibility, including against cruise ships, the chance that ISIS will attack blue water objectives out of sight of land is still remote. However, the odds will remain remote only as long as the navies of the world continue to provide a credible presence on the oceans. When the seas are no longer effectively patrolled, terrorist organizations will take advantage of the same opportunities for freedom of maneuver at sea that they currently enjoy ashore.

Captain Robert N. Hein is a career Surface Warfare Officer. He previously commanded the USS Gettysburg (CG-64) and the USS Nitze (DDG-94). You can follow him on Twitter: @the_sailor_dog. The views and opinions expressed are his own and do not reflect those of the Navy or the Department of Defense.

Featured Image: The U.S.S. Cole in 2000 after suffering an Al Qaeda attack in the port of Aden. 17 American sailors were killed, and 39 were injured.

Rediscovering the Art of Strategic Thinking: Developing 21st-Century Strategic Leaders

This publication originally featured on National Defense University’s Joint Forces Quarterly and is republished with permission. It may be read in its original form here.

By Dr. Daniel H. McCauley

At a time when global instability and uncertainty are undeniable, the demand for astute American global strategic leadership is greater than ever. Unfortunately, tactical superficiality and parochial policies of convenience are undermining joint strategic leader development and the ability to operate effectively around the world.1 Tactical supremacy and the lack of a peer competitor have contributed to strategic thinking becoming a lost art. This critical shortfall has been recognized for a number of years. General Anthony Zinni, USMC (Ret.), and Tony Koltz stated in their 2009 book Leading the Charge that leaders today have no vision and consequently have “lost the ability to look and plan ahead.”2 Trapped within rigid bureaucracies, today’s joint strategic leaders immerse themselves in current operations, reacting to, rather than shaping, future events.

President Obama convenes meeting on Zika virus in Situation Room, January 2016 (The White House/Pete Souza)
President Obama convenes meeting on Zika virus in Situation Room, January 2016 (The White House/Pete Souza)

This strategic leadership shortfall is not unique to the military establishment. A 2014 leadership study conducted by the Palladium Group surveyed more than 1,200 companies in 74 countries. In this study, although more than 96 percent of the “respondents identified strategic leadership as an organizational ‘must-have’ and a key to future success,” over 50 percent of the respondents “stated that the quality of their organization’s strategic leadership was unsatisfactory.”3 Fully two-thirds of the respondents serving in an organizational capacity as board member, chief executive officer, or managing director “did not believe that their current leadership development approach was providing the necessary skills to successfully execute their strategy.”4

Obviously, there is a recognized strategic leadership gap across multiple disciplines, but how to remedy that shortfall has eluded both trainers and educators. The only certainty is that strategic leader development remains entrenched within the same development processes that are falling well short of the desired outcome. In an attempt to change this legacy thinking, General Martin Dempsey, USA, during his last 2 years as Chairman of the Joint Chiefs, issued white papers on mission command, the profession of arms, and joint education, as well as a memorandum on desired leader attributes. Each of these documents highlighted this shortfall in strategic leadership in some form.5 The then-Chairman’s direction, however, failed to change the approach to leader development in any meaningful way. Instead of designing a strategic leadership program to meet the demands of the 21st century, the military community continues to embrace the outdated practices of the past.

To rediscover the art of strategic thinking and planning, joint strategic leader development must disconnect itself from the paradigm of the past in which outcomes are known, risk is certain and manageable, and linear thinking is the norm. In its place, a developmental paradigm that embraces the discomforts of ambiguity, uncertainty, and complexity must be adopted. Modifying the training adage that the joint force must train the way it will fight, joint strategic leader development must reflect the realities of the global environment within which strategic decisionmaking occurs. Specifically, the joint force must develop strategic thinking competencies that will prepare strategic leaders for the ambiguities, uncertainties, and complexities of the 21st-century global security environment.

Strategic Leadership

Why are the Chairman and so many others focused on leadership? There are a number of reasons. First, local and regional trends, which were once somewhat isolated and constant, are interacting with global trends to accelerate rates of change. This increased acceleration leaves little decisionmaking time for cumbersome bureaucracies; rather, the environment demands timely strategic decisions at the field level. Second, the accelerated rates of change in local, regional, and global environments have increased uncertainty at all levels, paralyzing decisionmakers looking for risk-free strategies or plans. Third, as the world appears to grow smaller due to advanced communications and transportation systems, complexity actually increases because of the expanded numbers of stakeholders in today’s interconnected global systems. Fourth, global interdependencies—economic, social, religious, and military, among others—demand that local or regional issues be viewed in a depth and breadth not previously undertaken.6 Joint strategic leaders are reluctant to embrace security issues in their broader context even when the interrelated global security environment requires a long-term approach to do so. Finally, in a review of the lessons learned over the past 13 years of war, various organizations and studies assessed strategic thinking and strategic leadership as lacking during national strategic decisionmaking.7

These five reasons demand that joint officers develop a level of understanding not previously required from a national security perspective or demanded of them individually. This newly required depth and breadth of understanding entail the development of a perspective that encompasses longer periods of time—not only the present and near future, but also the distant past as well as the distant future. By drawing on an understanding of the past, joint strategic leaders can build a realistic vision that pulls joint organizations through the challenges of the present while positioning the Nation for future success. Without a vision of the future, the joint force is at a distinct disadvantage, as it will be caught unaware of developing trends, policies, and potential adversaries.

mccauley-figure12

Strategic leader responsibilities generally encompass multiple organizations and echelons diverse in missions and responsibilities.8The interdependencies and interactions of the global environment have created a skills mismatch for joint strategic leaders over the past few decades. The current challenge is how to address the multitude of global challenges, given the limited range of individual and staff expertise and experiences. Considering figure 1, one can get a sense of the skill requirements necessary in the industrial age. Generally, the degree of certainty of any given issue and the degree of agreement among experts for a solution (as indicated by the x and y axes) were fairly high. As such, knowledge—usually in the form of domain-specific experts—was foundational in developing an understanding of the issue. In most cases, both the tasks and the environment were familiar; thus, the need for different thinking methodologies (meta-knowledge) and cultural understanding (humanistic knowledge) was relatively small in comparison to foundational knowledge. If a problem was encountered, an expert was called in to “solve” it.9

mccauley-figure2

Figure 2 illustrates the transposition of skills needed in the information age. Again, generally speaking, the strategic operating environment has expanded to include regions for which the United States has little or no expertise, with tasks becoming increasingly unfamiliar. As the degrees of certainty and expert agreement have decreased, the need for domain-specific foundational knowledge has significantly diminished. In the information age, meta- and humanistic knowledge come to the fore as the need to address the dynamics of integrated domains and multiple cultural perspectives increases. Specific foundational knowledge is decreased proportionally because collaborative approaches can potentially develop multiple solutions needed to address the complexities of integrated security domains.

Joint Leadership

Given the skills required of strategic leaders in the information age, it is necessary to undertake a short review of Service and joint leadership development and doctrine to identify the current strategic leadership shortfall. As expected, the Services do an excellent job describing leadership at multiple command levels. For example, Army Doctrine Publication 6-22, Army Leadership,10 and the Air Force’s Core Doctrine, Vol. II, Leadership,11 provide definitions, purpose, competencies, and attributes required by leaders for conducting warfighting. Service leadership clearly formed the bedrock of American tactical and operational successes for many decades.

In his white paper titled America’s Military: A Profession of Arms, General Dempsey further amplified this symbiosis between battlefield success and leadership, stating that the foundation of the military profession is leadership.12Unfortunately, unlike the focus the Services place on leadership, the joint community falls short. In lieu of leadership, joint doctrine relies on operational concepts, functions, and processes. For example, Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States, does a very good job describing command and control within joint organizations.13 However, it fails to describe the leadership differences that emerge as leadership and decisionmaking transitions from the joint task force (JTF) or component level to the combatant command, Joint Staff, and interagency levels. JP 1 does provide a short description of the profession of arms, listing character traits, competencies, and values, but these are relegated to an appendix not quite two-and-a-half pages in length.14

Recognizing this shortfall in joint doctrine and leader development, General Dempsey provided new guidance for the joint community based on a review of the past 13 years of war. In 2013, he laid out six desired attributes for leaders in a memorandum for Service chiefs, combatant commanders, the National Guard bureau chief, and the directors of the Joint Staff. These attributes assist the joint force in developing “agile and adaptive leaders with the requisite values, strategic vision, and critical thinking skills to keep pace with the changing strategic environment.”15Coupled with the character, values, and competencies listed in JP 1, a leadership framework begins to emerge.16

Examining this framework, two issues become readily evident. First, the definition of joint leadership is missing. Second, the competencies as described in joint doctrine focus primarily on the tactical and low operational levels of war and fail to address strategic leadership in any form. Unfortunately, each of these missing pieces reinforces a tactical perspective of leadership at all echelons. Joint doctrine appears to assume that Service leadership development is adequate for strategic leadership despite recent evidence to the contrary.

As General Dempsey and others have noted, the required leadership skills can vary broadly depending on the level of operations. For example, most joint officers are familiar with their Services’ roles and missions, having spent the majority of their careers in the tactical environment. This familiarity generally includes the types of organizations (for example, JTFs and components) and processes (for example, troop-leading procedures and the air-tasking cycle). At this level, complexity is limited because most interaction is at the individual or small group level, with decisionmaking measured in seconds, minutes, hours, or a few days.

Nepalese army ranger works with U.S. Army Soldier during Situational Training Exercise portion of U.S. Army Alaska Warrior Leader Course on Joint Base Elmendorf-Richardson, August 2015 (U.S. Air Force/Justin Connaher)
Nepalese army ranger works with U.S. Army Soldier during Situational Training Exercise portion of U.S. Army Alaska Warrior Leader Course on Joint Base Elmendorf-Richardson, August 2015 (U.S. Air Force/Justin Connaher)

The operational level of leadership expands complexity to include multiple organizations and the proliferation of the number and types of processes and products used. Reflecting this increased complexity, combatant commands operate at a different speed of decisionmaking to incorporate increased stakeholder views and desires. Combatant command regional and functional strategies and plans are complicated further by the needs of the individuals and organizations at the tactical level. The strategic level of leadership expands complexity to include the defense enterprise decisionmakers, such as the Secretary of Defense and Chairman. At this level, specific processes reduce in number, but the numbers of stakeholders, including allies and partners, increase across a broader range of domains, such as the economic and domestic domains. Decisionmaking can lengthen to months, years, or even decades. Finally, at the national strategic level, decisionmakers such as the President must deal with global complexity that involves decisions spanning the time range of each of the lower levels—seconds, days, months, and years.

Wherever one resides in an organization—whether at the tactical, operational, or strategic level, or some level in between—different leadership paradigms exist. To meet strategic leadership demands, the joint community must develop strategic thinking competencies. Strategic thinking is a cognitive process used to design and sustain an organization’s competitive advantage.17 It is a holistic method that leverages hindsight, insight, and foresight, and precedes strategy or plan development. Strategic thinking relies on an intuitive, visual, and creative process that explores the global security environment to synthesize emerging patterns, issues, connections, and opportunities.18Developing strategic thinking skills or competencies fills the strategic leadership shortfall while incorporating the desired leadership attributes identified by General Dempsey. Joint leader development thus becomes the vehicle that transitions the outdated military educational paradigm of the industrial age into one that serves the realities of the current information age environment.

Strategic Thinking Competencies

To reacquire the lost art of strategic thinking, seven competencies have emerged as vital for strategic leaders:

  • critical thinking
  • creative thinking
  • contextual thinking
  • conceptual thinking
  • cultural thinking
  • collaborative thinking
  • communicative thinking.19

Cultivating these strategic thinking competencies can provide current and future strategic leaders with the skills necessary to develop and execute strategies and plans successfully.

The first competency, critical thinking, provides joint strategic leaders with a depth and breadth of understanding that leverage hindsight, insight, and foresight. Insight represents the ability to analyze a thing and break it apart to see how its individual components are related and work together. By breaking a thing down into its component parts, elements and relationships not usually visible or understood are exposed. To gain an appreciation of a system’s current state, the past, including the environmental dynamics responsible for system creation, must be understood. The continued interplay of these dynamics provides additional system insights and aids in the development of foresight. Trend extrapolation provides strategic leaders with a temporal bridge between the past and present to the future. This extrapolation of both environmental change and constants aids joint strategic leaders in developing an understanding of what may lie ahead and in anticipating future events and subsequent plan development.20 Understanding the possible, plausible, and probable futures of a system aids strategic leaders in shaping the current conditions into those that are more preferable.

When applying critical thinking to the global security environment, the sheer volume of information and potential actors is overwhelming. Two key tools of critical thinking that facilitate joint strategic leader understanding and enhance their organizational principles are systems thinking and visual thinking. Systems thinking is an approach that promotes understanding of events and behavior through the identification and understanding of underlying structures.21 Viewed as systems, these structures are an organized set of elements interconnected in a way that achieves the stated purpose. Systems, therefore, have three components: elements, relationships, and purpose. System elements can be either tangible or intangible, although tangible elements are naturally more readily identifiable. System relationships or interconnections hold the elements together and represent the physical flow governing a system’s processes. A system’s purpose is not easily discerned because the formal stated function is often different from its actual purpose. So the best way to deduce the system’s purpose is to observe it for a while.22

Visual thinking engages the unconscious mind23 and is vital in problem-solving and modeling systems, especially ill-structured problems.24 Visual thinking allows for the processing of enormous amounts of information across multiple dimensions,25 adds clarity to communication, more fully engages group members, and enhances memory.26 Visual thinking assists joint strategic leaders by increasing their ability to recognize patterns and similarities and to see formal and informal relationships.

mccauley-figure3

An example of critical thinking that leverages systems and visual thinking is the international security challenge the United States faces with Iran. Critical thinking requires the strategic leader to undertake a historical analysis of the two countries to develop an understanding of the current grievances between them. A systems map, leveraging visual thinking, helps to illustrate the current U.S. national security system and how Iran is undermining it (see figure 3). National security interests and the intensity of those interests, along with key leverage elements, could be identified using a systems map. In addition, possible strategies or approaches to limiting Iranian influence are more easily identified, together with the associated first-, second-, and third-order effects. Systems and visual thinking enhance joint strategic leader critical thinking by portraying system complexity and interrelationships in ways that simple narratives or discussion cannot.

Solving globally complex security problems is the raison d’état of joint strategic leaders; unfortunately, finding enduring solutions is frustratingly elusive. Why is that? Typically, the same assumptions that created the problem continue to frame any potential approaches to solving it. As assumptions are the personal or organizational perceptual bedrock used to develop and sustain views of reality, the second strategic thinking competency, creative thinking, is needed to overcome this flawed perception. Creative thinking forces joint strategic leaders to challenge underlying assumptions, look for system patterns, view relationships and actors in new ways, take more risks, and leverage opportunities. Creative thinking uses the critical thinking tools of systems thinking and visual thinking to expose preexisting paradigms and develop new paradigms for developing and integrating new perspectives. Joint strategic leaders who can represent problems in as many ways as possible will ultimately achieve higher rates of success.

Systems and visual thinking tools enable joint strategic leaders to develop different perspectives of an opposing system. For example, creating a depiction of the Iranian socopolitical system might provide the strategic leader with new insights into why current policies or operations are not creating the desired results. Systems and visualization tools are particularly effective for gaining insights into complex, adaptive systems (see figure 4). Creative thinking leverages primarily critical and collaborative thinking.

mccauley-figure4

The third strategic thinking competency is contextual thinking. Contextual thinking leverages the skilled judgment of the joint strategic leader by analyzing an environmental fact or situation as an individual part of a complex continuum rather than the outcome of a specific cause or influence. Contextual thinking assists strategic leaders in the development of a better understanding of the nature of social interactions and the effects on cognitive processing. In complex problems, when context is missing, meaning is lost. In the global strategic security environment, the multiple solutions, methods, criteria, and perspectives surrounding the ill-structuredness of the security issue must be conveyed, not eliminated. Joint strategic leaders must then learn to sift through layers of context to identify those that are most relevant and important when solving problems.27

For example, in a typical military context, there is often a failure to differentiate between the strategic, operational, and tactical levels of war when discussing an issue. As we know, stakeholders and problems change depending on perspective. There are a number of questions that can be used to help frame context. What is the history of the issue? What was the strategic political and social context? Who were the actors? What was the central issue? What were the surrounding issues? Contextual thinking frames a point of common understanding for all stakeholders and participants. It leverages critical, creative, and conceptual thinking.

The fourth strategic thinking competency, conceptual thinking, is used by joint strategic leaders to understand a situation or problem by integrating issues and factors into a conceptual framework. Concepts, and the resulting maps, are the basis for human understanding and reasoning. Therefore, concepts are a form of knowledge structure that facilitates understanding.28 Purposeful models help strategic leaders structure the exploration of a problem situation and are the most common means of initiating a comparison stage of problem-solving or understanding.29

When dealing with complex problems, conceptual thinking helps joint strategic leaders illustrate interrelationships, facilitating much-needed discourse. Complex systems must be conceptually simplified to make them understandable.30 Conceptual thinking requires joint strategic leaders to be open to new ways of viewing the world, with a willingness to explore issues through alternative disciplines. Conceptual thinkers can effectively translate abstract thoughts to unfamiliar audiences. Conceptual thinking leverages critical, creative, contextual, and communicative thinking competencies.

mccauley-39
General Dunford gives remarks on leadership at Wall Street Journal Chief Executive Officer Council annual meeting, November 2015 (DOD/Dominique A. Pineiro)

The fifth strategic thinking competency is collaborative thinking, which creates synergy, improves performance, and motivates people to learn, develop, share, and adapt to changes. Collaborative thinking assists joint strategic leaders in developing synergy from stakeholders by openly sharing knowledge and experience, while acknowledging and affirming the same in others. Mutual sharing, respect, diversity, and equal participation that occur through high-order social learning, thinking, and communicating characterize collaborative groups.31 Collaborative communication is the foundation of effective engagement, peak performance, and innovative outcomes; more importantly, it helps to develop and achieve common goals across national and institutional boundaries.

In today’s global security environment, the joint force cannot claim expertise across the globe. Rather, joint strategic leaders must integrate stakeholders’ deep understanding of their environments to find a heightened level of perception and new ways to think about issues. Collaborative thinking directly enhances critical and creative thinking and is influenced by cultural and communicative thinking competencies.

Cultural thinking, the sixth strategic thinking competency, is used to understand the interconnected world, incongruence of national borders, and synthesis of perspectives across a broad spectrum of cultures. Cultural thinking enables joint strategic leaders to understand a wider range of views and the beliefs, norms, values, and rituals associated with the global security environment. Enabled by information technology, the post–Cold War security environment collapsed into an intrinsically connected economic, cultural, and security global village. This interconnected world requires joint strategic leaders to understand that today’s security environment is not only multipolar but also exhibits characteristics of cross-pollinated perspectives, ideologies, goals, and capabilities.

Within this global village, the costs of individual action have been intensified, with potentially substantial implications for the international security community. This new security reality has created a different ideological context that calls for international security responsibilities that go beyond individuals and nation-states.32 Joint strategic leaders regularly face tough ethical challenges because of various cultural factors. The greater the complexity of the environment within which the joint force is operating, the greater potential there is for ethical problems or misunderstandings to exist. As joint strategic leaders become ethically attuned, they must learn to view the world through a variety of lenses, developing a personal sense of right and wrong, and to interpret the influences that affect individual and group behavior.33 Cultural thinking leverages critical, collaborative, and communicative thinking.

The last strategic thinking competency is communicative thinking. Communicative thinking is used by joint strategic leaders to understand the various means and modes of communicating, as well as the challenges associated with communicating complex issues among individuals, organizations, societies, cultures, and nations. A strategic leader must be able to build a desired, shared vision for the organization and communicate that vision internally and externally to various audiences. Joint strategic leaders must conceptualize complex issues and processes, simplify them, and inspire people around them. In today’s multicultural world, strategic leaders must be able to communicate across cultures as easily as they can communicate internally.

Joint strategic leaders must understand the cultural nuances of communication and be capable of communicating using multiple modes and methods, including blogs, tweets, written and oral reports, videos, storyboards, PowerPoint presentations, and formal and informal sessions. They must also be aware that communication occurs continuously and that it can occur nonverbally and through inactivity. Joint strategic leaders must understand that communication is a filtered, continuous, and active process and cannot be undone.34 Communicative thinking leverages critical, collaborative, and cultural thinking competencies.

Recommendations and Conclusion

In the slower moving world of the industrial age, joint strategic leaders could plod their way through familiar tasks and concepts, developing solutions to a level of certainty most experts could agree on. In the fast-moving interconnected global security environment of today, however, strategic leaders do not have the luxury of time, task familiarity, or certainty. As a result, strategic leader competencies are needed more than ever. The difference between strategic leadership and “regular” leadership is that a strategic leader’s responsibilities are far broader and deeper in scope. These responsibilities typically cross not only functions and domains, but also often encompass multiple organizations that have diverse roles and responsibilities.

As officers transition from the tactical to the operational to the strategic level, new skills and competencies are needed, and that is where strategic leadership comes into play. With unmatched tactical and operational skills, U.S. joint doctrine should not be changed to deemphasize this critical operational leadership focus. Rather, doctrine must be expanded to include strategic leadership to address the competencies needed for strategy and policy development. Given this understanding of the leadership environment, and lacking a current joint definition ofstrategic leadership, the following definition is proposed:

The interactive process of leveraging unique stakeholder capabilities in the pursuit of common and enduring national, partner, and alliance security needs by identifying and communicating the goals and objectives of cooperative and willing stakeholders, and influencing their attainment.

As Zinni and Koltz state in their book, the joint force needs officers who possess the requisite strategic thinking competencies demanded by both the current and the future global security environments.35 Current joint doctrine focuses on the low operational and tactical levels of war, and is insufficient for the development of joint strategic leaders.

Joint officer development must change the paradigm of the past 50 years or so to acknowledge the new skills required as the world continues the transition from the industrial age to the information age. As the Chairman and others have identified, strategic leadership is a necessity for operating in the 21st-century security environment. This framework provides an approach to fill the leadership development shortfall in joint officer development, education, and doctrine. JFQ

Dr. Daniel H. McCauley is an Assistant Professor at the Joint Forces Staff College in Norfolk, Virginia.

Notes

1 Jason Katz, “America’s Lack of Leadership Is Feeding Global Instability,” Congress Blog, September 18, 2014, available at <http://thehill.com/blogs/congress-blog/foreign-policy/217930-americas-lack-of-leadership-is-feeding-global-instability>.

2 Tony Zinni and Tony Koltz, Leading the Charge: Leadership Lessons from the Battlefield to the Boardroom (New York: Palgrave Macmillan, 2009), 28.

3 James Creelman et al., 2014 Global State of Strategy and Leadership Survey Report (New York: Palladium Group, Inc., 2014), 8, 18.

4 Ibid., 9.

5 Martin E. Dempsey, America’s Military—A Profession of Arms, White Paper (Washington, DC: The Joint Staff, 2012); Mission Command, White Paper (Washington, DC: The Joint Staff, 2012); Joint Education, White Paper (Washington, DC: The Joint Staff, 2012); Desired Leader Attributes for Joint Force 2020, Memorandum (Washington, DC: The Joint Staff, 2013).

6 Richard L. Hughes, Katherine M. Beatty, and David Dinwiddie, Becoming a Strategic Leader: Your Role in Your Organization’s Enduring Success, 2nd ed. (San Francisco: Jossey-Bass, 2014), 11.

7 Linda Robinson et al., Improving Strategic Competence: Lessons from Thirteen Years of War (Santa Monica, CA: RAND, 2014), xi–xii.

8 Richard L. Hughes and Katherine L. Beatty, Becoming a Strategic Leader: Your Role in Your Organization’s Enduring Success, 1st ed. (San Francisco: Jossey-Bass, 2005), 11.

9 Sarah W. Fraser and Trisha Greenhalgh, “Complexity Science: Coping with Complexity: Educating for Capability,”The British Medical Journal 323 (2001), 799.

10 Army Doctrine Publication 6-22, Army Leadership (Fort Eustis, VA: Training and Doctrine Command, 2012).

11 Air Force Core Doctrine, Vol. II, Leadership (Maxwell Air Force Base, AL: USAF Doctrine Center, 2012).

12 Dempsey, America’s Military, 1–6.

13 Joint Publication (JP) 1, Doctrine for the Armed Forces of the United States (Washington, DC: The Joint Staff, March 25, 2013), V-1–V-20.

14 Ibid., B-1–B-3.

15 Dempsey, Desired Leader Attributes, 1–2.

16 JP 1-0, B-1–B-3.

17 T. Irene Sanders, Strategic Thinking and the New Science: Planning in the Midst of Chaos Complexity and Change (New York: The Free Press, 1998), 162.

18 Hughes and Beatty, 43–51.

19 Daniel H. McCauley, “An Institution for the Profession of Arms and Thought,” Campaigning, Fall 2014, 7.

20 Edward Cornish, Futuring: The Exploration of the Future (Bethesda, MD: World Future Society, 2004), 1–8.

21 Peter M. Senge, The Fifth Discipline: The Art and Practice of the Learning Organization (New York: Doubleday, 1990), 6, 186.

22 Donella H. Meadows, Thinking in Systems: A Primer (White River Junction, VT: Sustainability Institute, 2008), 11–17.

23 Michel Marie Deza and Elena Deza, Encyclopedia of Distances (New York: Springer, 2009).

24 David H. Jonassen, Learning to Solve Problems: An Instructional Design Guide (New York: Routledge, 2011), 1–3.

25 Tony Buzan, The Mindmap Book: How to Use Radiant Thinking to Maximize Your Brain’s Untapped Potential(London: Penguin Group, 1993).

26 Tom Wujec, “3 Ways the Brain Creates Meaning,” TED Talk, February 2009, available at <www.ted.com/talks/tom_wujec_on_3_ways_the_brain_creates_meaning?language=en>.

27 Jonassen, 209.

28 Ibid., 210.
29 Peter Checkland, “Soft Systems Methodology: A Thirty Year Retrospective,” Systems Research and Behavioral Science 17, supplement 1 (November 2000), S11–S58.

30 Jonassen, 29–31.

31 Timothy Stagich, Collaborative Leadership and Global Transformation: Developing Collaborative Leaders and High Synergy Organizations (Miami Beach: Global Leadership Resource, 2001), 1–18.

32 Elizabeth Filippouli, “Cultural Understanding and Global Thinking in Business,” Huffington Post, March 6, 2014.

33 Robert Rosen et al., Global Literacies: Lessons on Business Leadership and National Cultures (New York: Simon & Schuster, 2000), 32–53.

34 Hughes, Beatty, and Dinwiddie, 145–191.

35 Zinni and Koltz, 24–25.