Defense Planning Paradigms and the Global Commons

Redden, Mark E.; Hughes, Michael p.
January 2011
JFQ: Joint Force Quarterly;2011 1st Quarter, Issue 60, p61
The article examines the national security interests within the context of the global commons in the U.S. It notes the dependence of the application of military power in and through the global commons upon the ability of military forces to maneuver and access within and across commons. It cites the design of joint military operating concepts to determine future military problems and propose innovative ways to conduct operations.


Related Articles

  • Sealift: Balancing Strategy and Capability. Smith, Bradley E. // Military Review;Jul/Aug98, Vol. 78 Issue 4, p70 

    Discusses what the United States (US) needs to give credence to its national security strategy. Threats to US vital interests in the 21st century; Diplomatic policy; Force structure considerations; Calculation of dry cargo surge requirements; Discussion on tallying sealift capabilities; Bulk...

  • Transformation and Homeland Security: Dual Challenges for the US Army. Kelly, Terrence K. // Parameters: U.S. Army War College;Summer2003, Vol. 33 Issue 2, p36 

    Presents arguments designed to show that military transformation, in its essence, is the act of changing the shape and functions of the military to meet the challenges of the future security environment of the U.S. Establishment of a homeland security segment in the U.S. army; Implications of...

  • Warfare Will Change in Information Age.  // USA Today Magazine;Apr99, Vol. 127 Issue 2647, p11 

    Focuses on the United States warfare in the Information Age. Information on the military's intangibles; Players in the Information Age.

  • Whose COIN? Etzioni, Amitai // JFQ: Joint Force Quarterly;2011 1st Quarter, Issue 60, p19 

    The article focuses on the importance of recasting counterinsurgency (COIN) to make it work in the U.S. The recasting of COIN would occur effectively by setting goals for the political element, identifying the elements that can be introduced into the prevailing culture and drawing forces already...

  • G2 Contributions to the Threat and Vulnerability Assessment.  // Military Intelligence Professional Bulletin;Apr-Jun2003, Vol. 29 Issue 2, p20 

    Provides information on role of the installation G2 in the threat and vulnerability assessment (TVA) process of the U.S. Army. Function of TVA; Background on the security program; Responsibilities of G2.

  • EW - A DIFFERENT TYPE OF BRACKET BUSTER. Glaze, Chris "Bulldog" // Journal of Electronic Defense;Apr2010, Vol. 33 Issue 4, p12 

    In this article the author reflects on the growing importance of electronic defense to U.S. military art and science. It is suggested that the renewed emphasis on the Electromagnetic Spectrum (EMS) has expanded to the realization that EMS is actually a maneuver space that is important to...

  • Military Transformation and Homeland Security Symposium.  // Journal of Electronic Defense;Jul2003, Vol. 26 Issue 7, p70 

    Highlights the 2003 Military Transformation and Homeland Security Symposium to be held in September 15-18, 2003 in New Jersey. U.S. Armed Forces divisions sponsoring the event; topics to be covered; Requirements for registration.

  • Is the Conduct of War a Business? Vego, Milan // JFQ: Joint Force Quarterly;2010 4th Quarter, Issue 59, p57 

    The article discusses the application of business models by the U.S. military to the conduct of war. It comments that the emphasis for warfighting and leadership in the U.S. military was affected by the use of business terms which describe the military activities. It notes the role of human...

  • National Will from a Threat Perspective. Phillips, E. Margaret // Military Review;Sep/Oct2010, Vol. 90 Issue 5, p33 

    The article discusses the role that national will, or political and public support, plays in military success by exploring U.S. military planning beyond 2010. It examines how irregular warfare will shape future military engagements and focuses on ways in which U.S. adversaries will try to weaken...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics