28.11.2016 Views

The Joint Force in a Contested and Disordered World

JCS-JOE-2035

JCS-JOE-2035

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Anticipat<strong>in</strong>g that more adversaries around the world, to <strong>in</strong>clude both state <strong>and</strong> non-state actors,<br />

will develop advanced capabilities to threaten critical U.S. <strong>in</strong>terests <strong>in</strong> cyberspace, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong><br />

must be prepared to conduct Cyberspace Disruption to attack adversary assets <strong>and</strong> impede their<br />

ability to adversely affect the unrestricted use of cyberspace by the United States. Offensive cyber<br />

operations will impose costs on adversaries by identify<strong>in</strong>g <strong>and</strong> exploit<strong>in</strong>g their cyber<br />

vulnerabilities, <strong>and</strong> may <strong>in</strong>clude distributed denial of service attacks, targeted cyber denial<br />

measures, <strong>and</strong> actions to physically impair military systems through cyberspace. Additionally, the<br />

<strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> may conduct proportional cross-doma<strong>in</strong> operations to physically damage an<br />

adversary’s cyber <strong>in</strong>frastructure, us<strong>in</strong>g weapons operat<strong>in</strong>g <strong>in</strong> other doma<strong>in</strong>s to suppress enemy<br />

cyber defenses <strong>and</strong> specifically strike their critical cyber <strong>in</strong>frastructure. Furthermore, these<br />

operations should be coupled with defensive cyber efforts to block adversary responses, <strong>and</strong> might<br />

<strong>in</strong>clude the use of autonomous or semi-autonomous cyber defense systems or the activation of war<br />

reserve networks when peacetime networks are unavailable.<br />

<strong>The</strong> future security environment will feature well-organized states or even powerful non-state<br />

entities seek<strong>in</strong>g to take advantage of weak <strong>and</strong> fragile states. In certa<strong>in</strong> situations, the United States<br />

might want to prevent an adversary from violat<strong>in</strong>g the <strong>in</strong>tegrity of a state or block an adversary<br />

from benefitt<strong>in</strong>g from an already shattered state or region. <strong>The</strong>refore, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> may conduct<br />

Defense Support to Stabilization to disrupt an adversary attempt<strong>in</strong>g to take advantage of a<br />

disordered state or region. <strong>The</strong>se missions might focus on strengthen<strong>in</strong>g local partners by isolat<strong>in</strong>g<br />

<strong>and</strong> degrad<strong>in</strong>g adversary proxy forces through unconventional warfare or targeted strikes <strong>and</strong> raids.<br />

Furthermore, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> might conduct block<strong>in</strong>g operations designed to impede the sources<br />

of external <strong>in</strong>fluence, control, <strong>and</strong> support to local proxies. This may <strong>in</strong>clude the enforcement of<br />

multi-doma<strong>in</strong> exclusion zones, the use of cross-border punitive raids, or military support to a local<br />

resistance movement oppos<strong>in</strong>g the targeted adversary. F<strong>in</strong>ally, these missions may also <strong>in</strong>clude<br />

activities to prevent adversaries from seiz<strong>in</strong>g <strong>and</strong> us<strong>in</strong>g fissile materials <strong>and</strong> warheads, <strong>and</strong><br />

chemical/biological agents <strong>and</strong> precursors.<br />

Impose Change <strong>and</strong> Enforce Outcomes<br />

In the most dangerous cases, some adversaries will pursue strategic goals<br />

that are <strong>in</strong>tolerable to the United States. In these cases, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> will<br />

force compliance by adversaries to a new <strong>and</strong> susta<strong>in</strong>able equilibrium<br />

protected by the United States, its allies, <strong>and</strong> partners. When the United<br />

States decides to impose change <strong>and</strong> enforce preferred outcomes, the<br />

military tasks associated with this endur<strong>in</strong>g strategic goal are:<br />

Compel. To employ the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to force an adversary to mentally<br />

or physically submit to U.S. preferences, priorities, <strong>and</strong> arrangements.<br />

Destroy. To employ the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> to render adversary capabilities<br />

physically unusable or to cause its political or military structures to<br />

cease to exist as a dist<strong>in</strong>guishable entity.<br />

<strong>The</strong> <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> must be prepared to fully defeat adversaries directly<br />

threaten<strong>in</strong>g the United States or the global system of allies, rules, <strong>and</strong><br />

norms that it supports by ensur<strong>in</strong>g that they are no longer will<strong>in</strong>g or able<br />

to present a threat to U.S. <strong>in</strong>terests. Consequently, the <strong>Jo<strong>in</strong>t</strong> <strong>Force</strong> will<br />

Figure 9. Missions to<br />

Compel or Destroy<br />

48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!