Finley’s work is part of a long and glorious tradition of satire in the world of military and foreign affairs. Her books are a welcome mental break for modern audiences, but the wellspring of military and diplomatic satire was already deep. For autocratic societies, where censorship is a defining characteristic, satirists walk fine lines to say quiet thoughts out loud.
#Reviewing Military History for the Modern Strategist
Michael O’Hanlon, a senior fellow at the Brookings Institution, is an influential advisor to the national security elite with a reputation for deep expertise and careful judgment. Though O’Hanlon is a political scientist, he argues that military history can usefully inform current policy debates. His latest work, Military History for the Modern Strategist: America’s Major Wars since 1861, attempts to do just that through a survey of over 150 years of U.S. military history.
#Reviewing: Mud Soldiers: Life in the New American Army
Mud Soldiers: Life Inside the New American Army is an examination of the post-Vietnam U.S. Army and the pre-Gulf War Army. It serves as an excellent supplement to recent works on the AVF by authors like Beth Bailey, Bernard Rostker, and William A. Taylor. Author George C. Wilson writes a broad study of Charlie Company, 2nd Battalion, 16th Infantry Regiment (2-16), 1st Infantry Division spanning two generations of soldiers.
#Reviewing Preparing for War: Law, Strategy, and the Making of the Geneva Conventions:
Brian Drohan joins The Strategy Bridge to review “Preparing for War” by Boyd van Dijk” “International humanitarian law has only appeared to be absent during recent wars in Yemen, Syria, and Ukraine, but Boyd van Dijk’s Preparing for War: The Making of the Geneva Conventions reveals that the 1949 Geneva Conventions have an enduring influence. He shows that the Conventions have retained their legal, moral, and ethical applicability through a contextualized understanding of their history.
Change and Continuity? #Reviewing Reconsidering American Civil-Military Relations
Reconsidering American Civil-Military Relations shows how the various views of civil-military relations have transformed in a dramatic fashion, but also how much we rely on old conceptual tools to study new phenomena. It definitely shifts existing conversations about civil-military relations, allowing us to imagine that it is possible to move beyond Huntington…Moving past Huntington's model means recognizing complication and fluid boundaries. This departure from Huntington could also build better military and civilian expertise to understand and navigate civil-military relations, rather than dangerously assuming superiority in a military class that is isolated from democratic society.
#Reviewing An Army Afire
An Army Afire offers lessons for leaders throughout the joint force in how to approach and solve complex and seemingly overwhelming problems. Bailey’s work is an important addition to the historical record of the U.S. military, and, more specifically, the U.S. Army. Innovative ideas and novel courses of action are necessary for combat and institutional actions. The military that fought in the 1991 Gulf War, and later in Afghanistan and Iraq were more than the product of combat platforms, the Goldwater-Nichols Act, and AirLand Battle; it was a force composed of a diverse set of men and women who stood on the shoulders of those who suffered and fought to change a system of inequality.
4Q23 Call for Strategy Bridge Submissions: The State of Civil-Military Relations
The Strategy Bridge explores the state of civil-military relations in the United States and beyond for the final quarterly series of 2023. What are the most pressing issues to consider? What overlooked issues may be key to understanding, influencing, and managing the future of civil-military relations? These two-wide ranging questions could be framed in a number of ways, but we envision publishing essays providing our readers with insights into the broad sweep of contemporary civil-military relations.
Re-Envisioning the Cyber Domain for Deterrence
By adjusting our paradigm for understanding the threats and opportunities in cyberspace, the United States can incrementally build cyber deterrence to shift the balance toward stability. States will still develop and exploit vulnerabilities. However, the proliferation of simple cyber tools for criminal usage can be defeated through increased resiliency. Improved capability and a demonstrated willingness to respond will encourage states to limit offensive cyber to espionage, saving cyber-attacks for the onset of hostilities where attribution is no longer a concern. Reshaping our national cyber defense organization by creating a cyber reserve force, implemented in a flatter, horizontal organization than typically found in government, can disseminate defensive and responsive cyber capabilities against U.S. adversaries.
Countering China's Use of Information Laundering Via Minds and Media
China’s influence operations have evolved to employ “information laundering” to shape global narratives. Information laundering—the process of introducing disinformation into the Internet ecosystem and legitimizing it through transitions from fringe sites to public discourse—is the next generation of information operations. While Russia’s 2016 election interference is a well-documented and heavily litigated example of this process, China’s social media forays have been characterized as more overt and less skillful.Their actions have garnered minimal engagements, were easily attributed, and were ultimately blocked as state-sponsored content. However, China’s recent history with influence operations demonstrates a continually evolving tactic and narrative, with information laundering as the most recent and successful approach.
Primacy of Maritime Strategy in Naval Shipbuilding? The Case of Imperial Germany
Beyond strategy, domestic factors in Imperial Germany impacted naval shipbuilding. Domestic factors could strengthen naval expansion or constrain it…It may be inferred, therefore, that the conventional wisdom of the primacy of maritime strategy in naval shipbuilding may also hold true for mature navies. At all times, but especially for rising navies, non-strategic factors such as economic subsidies and technological innovation may exhibit influences that precede or override maritime strategy in naval shipbuilding. Put another way, leaders often exhibit composite thinking in naval shipbuilding decisions, but maritime strategy’s primacy does not always hold.
The Strategic Competition to Shape Cyberspace
The U.S. strategy to positively shape the international community to favor a democratic and accessible Internet requires a sustained, long-term commitment. Practiced behaviors, precedents, dialogue, and agreements will set expectations and reinforce norms over time. Washington must use a comprehensive, whole-of-government effort using various approaches and options to shift the environment away from China and Russia’s repressive vision of cyberspace. Authoritarian regimes will continue to push for norms and governance structure in cyberspace, favoring an illiberal model that threatens the U.S. vision of a free and open domain. The United States can take an active role in countering this authoritarian vision.
Remind Me Again...What Were We Deterring? Cyber Strategy and Why the United States Needed a Paradigm Shift
Persistent engagement is a strategic paradigm for cyberspace born out of failure. Deterrence theory proved neither flexible enough nor well adapted to the domain. A new domain called for a new strategy. Rather than prevent cyber-attacks by convincing the attacker the cost is not worth the risk, persistent engagement seeks to prevent cyber-attacks by disabling the attacker’s capacity preemptively. There are fears around the precedents that persistent engagement sets and how those norms may one day be quite damaging. However, these concerns miss the broader nature of the environment and the already emerging norms that called for a response. To be fair, open questions remain. How the role of national sovereignty in cyberspace continues to develop could drastically alter the evolution of persistent engagement. Nonetheless, persistent engagement is a much sounder starting point for American cyber strategy than deterrence.
Paradox and Prose: Lessons in Nuclear Strategy
When faced with a paradox, our immediate instinct is to try to resolve it. But as Orwell makes clear through the concept of doublethink, attempts to reconcile the irreconcilable achieve only the corrosion of language and thought. Contradictions should be seen not as flaws but as fundamental features of nuclear strategy. Does this consign nuclear strategists—and, by extension, the societies they serve—to perpetual discomfort? Likely it does. But discomfort at the thought of nuclear use can hardly be considered a bad thing.
Factors Influencing Strategy: The Objective-Narrative Nexus
Strategy must evolve with the changing environment of war, and this means strategic thinking must consider the power derived from the nexus of clear objectives and a unified narrative. Commanders and their staff cannot afford to dismiss political considerations in warfare or great power competition. They must think of objective and narrative as tools for the design of campaigns, be they security force assistance or large scale combat operations.
Beyond Joint: The Need for an Interests-Centric Approach to Integrated Campaigning
When General Dempsey pondered what comes after jointness, he was trying to see over the horizon towards our next era of struggle. That era has come. From the levée en masse to mechanized warfare and the advent of the networked world, social and technological revolutions have underpinned the great conflicts of the past. Another such inflection point looms. Gray-zone warfare, the blurring line between war and peace, and the boundary-erasing zeitgeist of social media all point to a rapidly changing security environment. The joint force must not wait to be dragged into the future, but rather act as the vanguard of change. Recognizing the paradox that increased deterrence can result in decreased security will be key.
Applying Behavioral Economics to Improve Cyberspace Strategy
Addressing cybersecurity through an economic lens highlights the impact of market failures—information asymmetries and misaligned incentives. Some entities fail to invest in adequate security controls because they do not incur the full costs associated with a security incident. The current public and private divide creates an environment where society shoulders most of the risk of cyber-insecurity. To keep pace with relevance, all organizations, including those beyond critical infrastructure sectors, must be able to share information and respond to cyber risk in as close to real-time as possible.
Chinese Political Warfare: A Strategic Tautology? The Three Warfares and the Centrality of Political Warfare within Chinese Strategy
All told, by looking at the development of the Three Warfares concept and its implementation in the context of disputes in the South China Sea, it becomes clear that China does not merely conduct political warfare in pursuit of various individual geostrategic objectives. Rather, it is fundamentally integrated within China’s broader maritime strategy, which, in turn, translates into China’s grand strategy of national rejuvenation. This deduction is further underpinned by China’s long strategic legacy, which firmly resembles Kennan’s definition of political warfare. Chinese political warfare should, therefore, not be considered separate from the larger strategic context because China’s conception of national strategy incorporates all levers of comprehensive national power, as defined by Xi Jinping himself, leading to the symbolic characterization of Chinese political warfare as a strategic tautology, as political warfare seems fundamentally inherent within Chinese strategic thinking.
Writing Strategy 2023
Earlier this year, The Strategy Bridge asked civilian and military students around the world to participate in our seventh annual student writing contest on the subject of strategy. The response was once again amazing. We’ll publish the winners and some additional submissions earning an honorable mention in the coming weeks. In the meantime, congratulations to all the winners!
The Psychology of Killing with Drones: #Reviewing On Killing Remotely
To date, moral injury remains a syndrome, that is, a group of symptoms lacking clear definition or cause. Phelps exemplifies a possible way ahead in On Killing Remotely. In terms of quantifiability, Phelps makes room for analyzing a new arena for moral injury without stretching the term past its breaking point. In terms of severity, Phelps clarifies that stakes can be high without involving immediate personal danger, thus opening up discussions of comparable scenarios with the potential to morally injure. In terms of technology, Phelps distinguishes between kinds of unmanned or remote aerial technology, sketching a taxonomy and noting the unique stressors of each tool or mission.
#Reviewing Space Civilization
In Space Civilization: An Inquiry into the Social Questions for Humans Living in Space, political science professor James Gilley provides an ambitious interdisciplinary overview of the social factors, from the interpersonal to the international levels, that will affect humanity’s ability to become a truly interplanetary species. In its relatively short format, the book moves briskly through many of the broad technological and biological, legal, economic, psychological, sociological, and political issues that will shape the future human exploration and potential settlement of outer space.