28.11.2016 Views

The Joint Force in a Contested and Disordered World

JCS-JOE-2035

JCS-JOE-2035

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

to deploy blockers <strong>and</strong> grapplers to impede the free operation of commercial <strong>and</strong> military satellites,<br />

<strong>and</strong> they will use ASAT weapons launched at space assets from the ground as well as from other<br />

satellites. Ultimately, this may generate space debris lead<strong>in</strong>g to a runaway cha<strong>in</strong> reaction which<br />

destroys other satellites <strong>and</strong> threatens the <strong>in</strong>tegrity of many important orbits.<br />

<strong>The</strong> near-uncontested freedom to operate on the seas, through the air, <strong>in</strong> orbit <strong>and</strong> over the<br />

electromagnetic spectrum has provided the United States with a high degree of freedom of<br />

maneuver <strong>and</strong> the ability to securely trade with partners around the world. It has also when<br />

necessary allowed the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to project power <strong>and</strong> concentrate force <strong>in</strong> order to effectively<br />

conduct military activities on other cont<strong>in</strong>ents. However, it is very unlikely that future adversaries<br />

will allow U.S forces to move through the commons to forward positions <strong>and</strong> await a set-piece<br />

U.S. onslaught as, for example, the Serbs or Iraqis did <strong>in</strong> the past. <strong>The</strong> next two decades will see<br />

adversaries build<strong>in</strong>g the capacity to control approaches to their homel<strong>and</strong>s through the commons,<br />

<strong>and</strong> later, translat<strong>in</strong>g comm<strong>and</strong> of the nearby commons <strong>in</strong>to the connective architecture for their<br />

own power projection capabilities.<br />

Use of the commons is central to <strong>in</strong>fluenc<strong>in</strong>g events abroad, <strong>and</strong> as the sea, air, space, <strong>and</strong><br />

electromagnetic capabilities of others grow, competitors will <strong>in</strong>creas<strong>in</strong>gly use the commons for<br />

their own military purposes. In the future, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> will encounter “comb<strong>in</strong>ed swarms”<br />

featur<strong>in</strong>g seabed, subsurface, surface, <strong>and</strong> aerial unmanned, autonomous platforms. <strong>The</strong>se will be<br />

used to observe more of the commons at high resolution <strong>and</strong> complicate defensive efforts.<br />

Conflicts <strong>in</strong> the commons will feature repeated attempts by adversaries to mutually disrupt one<br />

another’s power projection capabilities – often from great distances, <strong>and</strong> to develop <strong>and</strong> safely use<br />

bases at home <strong>and</strong> with<strong>in</strong> the commons themselves to <strong>in</strong>fluence events on l<strong>and</strong>.<br />

Context 5: A Contest for Cyberspace<br />

<strong>The</strong> United States depends on an <strong>in</strong>terdependent network of <strong>in</strong>formation technology that <strong>in</strong>cludes<br />

the Internet, telecommunications networks, computer systems, embedded processors <strong>and</strong><br />

controllers – <strong>and</strong> the data, <strong>in</strong>formation, <strong>and</strong> knowledge that is stored <strong>in</strong> <strong>and</strong> flows through these<br />

systems – for its economic, <strong>in</strong>dustrial, societal, <strong>and</strong> military well-be<strong>in</strong>g. This doma<strong>in</strong> – cyberspace<br />

– has emerged as a significant sett<strong>in</strong>g with<strong>in</strong> which strategic competition takes place. <strong>The</strong> United<br />

States will cont<strong>in</strong>ue to be <strong>in</strong>volved <strong>in</strong> a global struggle to def<strong>in</strong>e <strong>and</strong> defend this doma<strong>in</strong>. State<br />

actors will attempt to make clear dist<strong>in</strong>ctions between sovereign <strong>and</strong> non-sovereign parts of<br />

cyberspace, while cyber-capable non-state actors, hacktivists, <strong>and</strong> other <strong>in</strong>dividuals might take<br />

action to complicate or ignore these dist<strong>in</strong>ctions altogether. In 2035, the United States will need to<br />

defend its sovereign cyberspace, protect the use<br />

of non-sovereign cyber commons, <strong>and</strong> control<br />

key parts of cyberspace (both sovereign <strong>and</strong> nonsovereign).<br />

Character of Conflict<br />

“…because cyberweapons are not overtly violent, their use is unlikely to fit the traditional<br />

criterion of <strong>in</strong>terstate war; rather, the new capability is exp<strong>and</strong><strong>in</strong>g the range of possible<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!