The latest US National Military Strategy (NMS) was published
in June 2015 (http://www.jcs.mil/Portals/36/Documents/Publications/National_Military_Strategy_2015.pdf,
which is also the photo source.) Conceptually it is derived from the National
Security Strategy (NSS) released in February 2015 and which can be found at: https://www.whitehouse.gov/sites/default/files/docs/2015_national_security_strategy.pdf.
Those of us with military experience know that ‘stuff’ rolls
down hill and the impact of strategic documents is a good example. However, it
is often hard to figure out what the direct impacts will be – impacts to be
felt within the next couple of years.
The NMS mentions a number of nation states: Russia, China,
Iran, North Korea, etc. However, it is clear that the emphasis is on non-state
actors, especially Violent Extremist Organizations (VEO).
Here are a couple of quotes WRT VEO.
“But it (the NMS) also asserts
that the application of the military instrument of power against state threats
is very different than the application of military power against non-state
threats. We are more likely to face prolonged campaigns than conflicts that are
resolved quickly…that control of escalation is becoming more difficult and more
important…and that as a hedge against unpredictability with reduced resources,
we may have to adjust our global posture.”
“In this complex strategic
security environment, the U.S. military does not have the luxury of focusing on
one challenge to the exclusion of others. It must provide a full range of
military options for addressing both revisionist states and VEOs. Failure to do
so will result in greater risk to our country and the international order.”
“Violent Extremist
Organizations (VEOs) are taking advantage of
emergent technologies as well, using information tools to propagate destructive
ideologies, recruit and incite violence, and amplify the perceived power of
their movements. They advertise their actions to strike fear in opponents and
generate support for their causes.”
The NMS then goes on to
identify 3 National Military Objectives:
1. Deter,
deny, and defeat state adversaries.
2. Disrupt, degrade, and defeat violent extremist
organizations.
3. Strengthen our global network of allies and partners.”
Accomplishing these objectives
will require a versatile, resilient and flexible force. From an influence
operations perspective, this means seamlessly reinforcing information
objectives across all forces and media. This implies that all of the services,
the PAO and others in the mix are all in synch and orchestrated to support the
CDR’s influence objectives.
One of the glaring issues is
the cyber influence world. LTG Cardon, the CG of the Army’s Cyber Command has
proposed that his agency be the proponent for influence in the cyber realm
(see: http://www.military.com/daily-news/2015/08/26/army-cyber-general-proposes-new-mission-to-fight-global-hacks.html).
The article quotes Cardon’s
simplistic vision: “Under
Cardon's vision, Signal Corps officers would manage communications systems,
public affairs staff would oversee information operations and develop social
media applications, and military intelligence units would collect and record
top-secret data for the Army Cyber Command.”
These
comments strike me as intelligence indicators that the responsibility for
directing and carrying out the influence war is murky at best. Anyone who has
ever worked with Public Affairs knows that they are very cautious about working
with other influence organizations for fear of ‘contaminating’ their position.
As the new leaders at the Joint
Chiefs level come into place and the Presidential election starts to come into
focus, we can only expect more turmoil and less continuity.
As Lou Costello once said: “Who’s
on 1st ?”