The Joint Force in a Contested and Disordered World
JCS-JOE-2035
JCS-JOE-2035
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Anticipat<strong>in</strong>g that more adversaries around the world, to <strong>in</strong>clude both state <strong>and</strong> non-state actors,<br />
will develop advanced capabilities to threaten critical U.S. <strong>in</strong>terests <strong>in</strong> cyberspace, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong><br />
must be prepared to conduct Cyberspace Disruption to attack adversary assets <strong>and</strong> impede their<br />
ability to adversely affect the unrestricted use of cyberspace by the United States. Offensive cyber<br />
operations will impose costs on adversaries by identify<strong>in</strong>g <strong>and</strong> exploit<strong>in</strong>g their cyber<br />
vulnerabilities, <strong>and</strong> may <strong>in</strong>clude distributed denial of service attacks, targeted cyber denial<br />
measures, <strong>and</strong> actions to physically impair military systems through cyberspace. Additionally, the<br />
<strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> may conduct proportional cross-doma<strong>in</strong> operations to physically damage an<br />
adversary’s cyber <strong>in</strong>frastructure, us<strong>in</strong>g weapons operat<strong>in</strong>g <strong>in</strong> other doma<strong>in</strong>s to suppress enemy<br />
cyber defenses <strong>and</strong> specifically strike their critical cyber <strong>in</strong>frastructure. Furthermore, these<br />
operations should be coupled with defensive cyber efforts to block adversary responses, <strong>and</strong> might<br />
<strong>in</strong>clude the use of autonomous or semi-autonomous cyber defense systems or the activation of war<br />
reserve networks when peacetime networks are unavailable.<br />
<strong>The</strong> future security environment will feature well-organized states or even powerful non-state<br />
entities seek<strong>in</strong>g to take advantage of weak <strong>and</strong> fragile states. In certa<strong>in</strong> situations, the United States<br />
might want to prevent an adversary from violat<strong>in</strong>g the <strong>in</strong>tegrity of a state or block an adversary<br />
from benefitt<strong>in</strong>g from an already shattered state or region. <strong>The</strong>refore, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> may conduct<br />
Defense Support to Stabilization to disrupt an adversary attempt<strong>in</strong>g to take advantage of a<br />
disordered state or region. <strong>The</strong>se missions might focus on strengthen<strong>in</strong>g local partners by isolat<strong>in</strong>g<br />
<strong>and</strong> degrad<strong>in</strong>g adversary proxy forces through unconventional warfare or targeted strikes <strong>and</strong> raids.<br />
Furthermore, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> might conduct block<strong>in</strong>g operations designed to impede the sources<br />
of external <strong>in</strong>fluence, control, <strong>and</strong> support to local proxies. This may <strong>in</strong>clude the enforcement of<br />
multi-doma<strong>in</strong> exclusion zones, the use of cross-border punitive raids, or military support to a local<br />
resistance movement oppos<strong>in</strong>g the targeted adversary. F<strong>in</strong>ally, these missions may also <strong>in</strong>clude<br />
activities to prevent adversaries from seiz<strong>in</strong>g <strong>and</strong> us<strong>in</strong>g fissile materials <strong>and</strong> warheads, <strong>and</strong><br />
chemical/biological agents <strong>and</strong> precursors.<br />
Impose Change <strong>and</strong> Enforce Outcomes<br />
In the most dangerous cases, some adversaries will pursue strategic goals<br />
that are <strong>in</strong>tolerable to the United States. In these cases, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> will<br />
force compliance by adversaries to a new <strong>and</strong> susta<strong>in</strong>able equilibrium<br />
protected by the United States, its allies, <strong>and</strong> partners. When the United<br />
States decides to impose change <strong>and</strong> enforce preferred outcomes, the<br />
military tasks associated with this endur<strong>in</strong>g strategic goal are:<br />
Compel. To employ the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to force an adversary to mentally<br />
or physically submit to U.S. preferences, priorities, <strong>and</strong> arrangements.<br />
Destroy. To employ the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to render adversary capabilities<br />
physically unusable or to cause its political or military structures to<br />
cease to exist as a dist<strong>in</strong>guishable entity.<br />
<strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be prepared to fully defeat adversaries directly<br />
threaten<strong>in</strong>g the United States or the global system of allies, rules, <strong>and</strong><br />
norms that it supports by ensur<strong>in</strong>g that they are no longer will<strong>in</strong>g or able<br />
to present a threat to U.S. <strong>in</strong>terests. Consequently, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> will<br />
Figure 9. Missions to<br />
Compel or Destroy<br />
48