28.11.2016 Views

The Joint Force in a Contested and Disordered World

JCS-JOE-2035

JCS-JOE-2035

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

adversaries; <strong>and</strong> demonstrat<strong>in</strong>g the read<strong>in</strong>ess of these forces through exercises <strong>and</strong> other flexible<br />

deterrent operations. <strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must also deter state <strong>and</strong> non-state adversaries from pursu<strong>in</strong>g<br />

terrorist attacks aga<strong>in</strong>st the homel<strong>and</strong>. This will likely feature <strong>in</strong>telligence <strong>and</strong> data collection with<br />

domestic agencies <strong>and</strong> <strong>in</strong>ternational partners to identify <strong>and</strong> track domestic terrorists comb<strong>in</strong>ed<br />

with the use of punitive strikes <strong>and</strong> raids to disconnect them from their sources of foreign support.<br />

As a number of states seek to extend their power <strong>and</strong> <strong>in</strong>fluence more broadly, they are likely to<br />

threaten U.S. global <strong>in</strong>terests <strong>and</strong> commitments around the world. <strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be<br />

prepared to conduct Extended Deterrence to assure allies <strong>and</strong> partners <strong>and</strong> to raise the cost to<br />

adversaries who threaten critical national <strong>in</strong>terests. Assurance <strong>and</strong> deterrence <strong>in</strong> a world of many<br />

capable regional powers will require the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to apply active <strong>and</strong> passive security measures,<br />

<strong>in</strong>clud<strong>in</strong>g the development of credible expeditionary <strong>and</strong> power projection capabilities, protected<br />

forward bas<strong>in</strong>g, jo<strong>in</strong>t nuclear assurance missions, <strong>and</strong> a range of fixed <strong>and</strong> deployable military<br />

presence postures. In the future, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> should be capable of reduc<strong>in</strong>g the likelihood or<br />

impact of coercive diplomacy that seeks to exclude U.S. <strong>in</strong>fluence or access. Specifically, the force<br />

should be prepared to cooperate with allies to preempt competitor <strong>in</strong>itiatives or prevent threats<br />

from exp<strong>and</strong><strong>in</strong>g through comb<strong>in</strong>ed Foreign Internal Defense, Security <strong>Force</strong> Assistance,<br />

unconventional warfare, <strong>and</strong> show of force operations directed aga<strong>in</strong>st an aggressive adversary.<br />

<strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be prepared to conduct Global Commons Stabilization to deter adversaries<br />

from contest<strong>in</strong>g free use of the seas, air, space, <strong>and</strong> electromagnetic spectrum. <strong>The</strong>se missions will<br />

h<strong>in</strong>ge on a <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> capable of conduct<strong>in</strong>g <strong>in</strong>telligence operations with allies <strong>and</strong> partners to<br />

develop awareness of competitor activities <strong>in</strong> the commons <strong>in</strong>clud<strong>in</strong>g establish<strong>in</strong>g a common<br />

operat<strong>in</strong>g picture, but also identify<strong>in</strong>g <strong>and</strong> analyz<strong>in</strong>g trends with advanced pattern recognition<br />

capabilities to better underst<strong>and</strong> the difference between regular traffic <strong>and</strong> impend<strong>in</strong>g military<br />

closure or <strong>in</strong>terdiction. Furthermore, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be capable of protect<strong>in</strong>g national<br />

objectives <strong>in</strong> the global commons despite the use of asymmetric, unconventional, <strong>and</strong> hybrid<br />

approaches by competitors to assert new claims <strong>and</strong> exercise more control <strong>in</strong> the commons. This<br />

will require operations that impose costs on adversaries who impede free use of the commons,<br />

such as targeted electromagnetic <strong>and</strong> space denial measures, the enforcement of sanctions, or the<br />

establishment of electromagnetic exclusion zones.<br />

As more devices, systems, <strong>and</strong> national <strong>in</strong>frastructure are connected to cyberspace, critical systems<br />

will be targeted by adversary cyber weapons. In order to deter adversaries from violat<strong>in</strong>g U.S.<br />

<strong>in</strong>terests <strong>in</strong> cyberspace <strong>and</strong> deny their ability to <strong>in</strong>terdict critical U.S. cyber systems, the future<br />

<strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be prepared to conduct national <strong>and</strong> allied Network Defense. <strong>The</strong>se missions will<br />

require steady-state <strong>in</strong>formation operations <strong>in</strong> support of national cyber deterrence strategies that<br />

communicate the resiliency of critical U.S. systems <strong>and</strong> <strong>in</strong>frastructure, while protect<strong>in</strong>g their<br />

vulnerabilities. Key actions may <strong>in</strong>clude the development of a Department of Defense cyber<br />

umbrella; the creation of a national “cyber border patrol;” more comprehensive <strong>in</strong>telligence<br />

shar<strong>in</strong>g efforts; contributions to national level cyber exercises; the development of hardened<br />

networks; <strong>and</strong> re<strong>in</strong>forced coord<strong>in</strong>ation with domestic law enforcement.<br />

<strong>The</strong> future security environment will feature adversaries underm<strong>in</strong><strong>in</strong>g the <strong>in</strong>tegrity of states or<br />

tak<strong>in</strong>g advantage of a state that is fail<strong>in</strong>g. <strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be prepared to conduct Military<br />

Support to Foreign Partners to bolster or re<strong>in</strong>force the government of a fail<strong>in</strong>g state. Dur<strong>in</strong>g these<br />

45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!