Archive for the 'Navy' Category
Writing professional articles has a long history in all the U.S. military services. American naval publications date as far back as the 1830s. While military personnel are commonly lauded for their willingness to take physical risks in defense of the nation, sometimes we are less open to taking the intellectual risks involved in the betterment of our profession. In #RTSW 2 we discussed the fear some writers have that they might embarrass themselves through a small mistake or problem in a professional article. Taking an intellectual or academic risk is far different than strapping into an aircraft, rigging to dive the boat, or free-falling out of a perfectly good airplane.
The reality is there are a number of things military authors do which are sort of embarrassing from an editor’s perspective. Military personnel hold themselves up as professionals, but occasionally behave like inexperienced freshman undergraduates when it comes time to submit an article for publication. Most of the issues can be addressed by acting like the professional we all claim to be. These are not actually hard things to do, but generally fall into the GI Joe category of knowledge.
Follow the contributors guidelines. Seriously. If the journal or publication says they take feature articles with a maximum word count of 3000 words, do not send them 4500 words. Some will give you some latitude, maybe 10% overage, but not always. It is not the editor’s job to turn your over-length piece into something appropriate. You are telling them either you could not be bothered to check the guidelines, you have never read their publication, you just don’t care, or you think you are so brilliant the rules don’t apply to your ideas. None of these interpretations will help you impress anyone.
From my experience as an editor this is an across the board issue. Frankly, most junior personnel tend to follow the rules, but sometimes they don’t understand the difference between “departments” at some journals. Some mid-grade officers, senior officers, and Flags, however, have issues understanding the rules apply to them. One would hope the professors from our PME institutions who encourage officers to use their school papers for articles would help them understand how it works. Yet, I have also seen PME professors who submit articles which are thousands of words over maximum, so sometimes they are part of the problem.
Papers and assignments written in the professional military education system, or from academic work, are a great source of material for articles. I have used the work I wrote for class in a number of articles I have published. But, a school paper and an article are not the same thing. We’ve already covered the length issue, but this is a common problem with academic papers. There are also differences in style and tone, occasionally in formatting, and in the types of arguments that will fit at certain publications. Do not simply send your PME paper to an editor. Always rewrite and reformat the paper to ensure it fits the publication you are sending it to. The editors will still help you make it better, but it is on the author to make the first effort of getting it right for the publication in question. It should not require mentioning, but the editor is also not interested with the grade you got on the paper. No need to share, the work should stand on its own.
Ensure you are sending the right submission to the right publication. If a certain publication has a name for a “department,” or type of article, don’t use that same name at a different publication. For example, Proceedings has opinion pieces called “Nobody Asked Me But…” An author who sends a commentary submission to War on the Rocks or The Bridge “for your Nobody Asked Me But section” is immediately off on the wrong foot.
Simple freelance manuscript format is the best way to approach an editor. Do not try and impress with multiple fonts, complicated formatting, etc. Depending on what software they are working with, your fancy format may get thrown off anyway. You aren’t applying for a job in desktop publishing, the words in the article are what matter and speak for themselves. Name, contact info, word count, title, one font, double spaced, simple paragraph format. Use bold, underline, or italics to set things off, but only sparingly. It is designed for fiction authors, but William Shunn’s website gives a good image of how to set things up. Avoid pdf’s to the best of your ability, because the editor will probably want to digitally mark up the piece.
The concept of authorship is directly tied to the question of personal integrity in the academic world. Almost every university or institution of higher learning has an authorship policy statement (read Yale’s here). Fundamentally “authorship” is the question: who belongs on the byline of an article? Who should get credit? This is a question every senior officer looking to publish an article must ask themselves when they think about the staff process which might have helped them produce the article. Senior officers and civilian leaders sometimes have speechwriters who help them. At what point, and in what venues, should they get mentioned for written work? Is a shared byline proper? Or is a mention in the author bio at the end of the article the right place? “LCDR Jones contributed to the writing of this article.” Perhaps a junior officer on the staff amassed the research and wrote the first draft of sections of the piece. Do they deserve some credit? These questions don’t always apply, but in colleges and universities this is a key ethical question. If we are going to pursue professional integrity in the military services, and consider it intellectually, it makes sense for us to examine authorship as well.
Professional articles on military subjects are not the place for personal attacks or for antagonism. Even if the spark which got you writing was disagreement with someone else’s idea, take a step back and make sure you are writing about ideas and content and you are not being antagonistic. Sometimes this is unintentional, and requires you to look at your own work closely. Also, some publications do not publish this kind of tit-for-tat writing, so expect rejections if you are writing something focused on being critical. You should be focused on new ideas and solutions. It is ok to be constructively critical of another writer, thinker, or publication, but avoid personal or professional antagonism: try and follow Dennett’s rules. Aim at the ideas, not the people, and give credit where credit is due.
Cite Your Work
Footnotes, endnotes, hyperlinks…they matter. They help prove you have done the research and reading discussed earlier in this series. More importantly, perhaps, they acknowledge the hard work of others who have tackled the same or similar subjects and on whose shoulders your work stands. They offer the editor and the reader a chance to check up on you. None of us form our ideas or opinions in a vacuum. Even senior officers haven’t come to all their knowledge through experience or epiphany. We should acknowledge that through good use of notes and links. This does not mean every article must be peppered with quotes from Clausewitz or Mahan. You do not have to tackle the great masters. Sometimes it makes you look silly. I know from experience.
Say something in your article. Identifying a problem is certainly a contribution, but often times it is not enough. It only becomes a good article when you also suggest a solution or a path to a solution. You have to argue for something, not just report on a situation. In the first post in this series we talked about John Adams’ call to “dare to read, think, speak, and write.” Professional articles are at their best when they remember that first word. Writers must dare.
Take It or Leave It
This series of three posts has tried to offer a starting point for military professionals and members of the national security community who want to take up the call to contribute to our profession, all call which was recently echoed by the CNO and Lt O’Keefe. The observations offered are intended as a little bit of what naval folks call gouge to get started. Like all gouge, the advice offered is worth exactly what you have paid to read it. These are simple observations from my past several years both writing and editing on military and naval subjects. Individual experience will vary. As we say in the navy, if you live by the gouge you’ll likely die by the gouge. But it least it gives us somewhere to start.
This post is the third in a three part series where the author shares lessons learned from a decade of his own professional writing, almost four years on the editorial board of the U.S. Naval Institute, as a Senior Editor with War on the Rocks, and as series editor of the 21st Century Foundations books from the Naval Institute Press. The opinions expressed are offered in the author’s personal capacity and do not represent the policy of the US Navy, Department of Defense, or any government agency.
Chief of Naval Operations Richardson has put out a call for more naval professionals to contribute to their profession through writing. Other Flag Officers have followed his lead and there is a rising movement across the joint force. The first post in this series examined how someone can develop an idea into a professional article. The next two posts will look to offer a clearer picture of what a writer should expect once their article is written: from submission to when it is out in print or online.
The advice in this series is based on professional writing for a print or online magazine/journal. People interested in blogging can certainly also learn from these ideas. But blogging has a slightly different place in our digital society, and frequently has different (sometimes looser) standards. As seen from the fact this series is published on a pair of blogs (USNI and the Military Writer’s Guild), I see a lot of value in both approaches.
One of the most intimidating things about publishing a professional contribution is fear the author will get something wrong, or embarrass themselves through small mistakes. The reality is a typo, an improperly used italics formatting, or a misspelled name is not something most editors care about. If the problems are repeated and glaring, that is different, but a couple of small mistakes are not very important.
Personally, this is why I like working with journals and magazines more than unedited blogs, or blogs run from personal websites. My work always benefits from the critical eye of a dedicated editor, whether a paid employee of a publication or sometimes a volunteer. That kind of sanity check has kept me from embarrassing myself when the editor asks “hey, are you sure that is right?” or “what is your citation or link for this fact?” From fixing typos, to helping improve the writing in terms of style or house format, and challenging flawed logic or argument, editors have always made my work better. Once the article or essay has made it through them, or their editorial board, there’s a much smaller chance I am embarrassing myself.
Finding a Publication
With a completed draft on the computer screen, it is time to decide where to submit the article. There are many, many options. For naval writers there are the big time naval professional journals like Proceedings and Naval War College Review, to the magazines published by community organizations like Tailhook and the Naval Helicopter Association. The other services have similar venues like Military Review, The Gazette, or branch publications like Armor. There are also the online publications about defense and national security issues. Authors must realize each and every publication has its own niche and its own style. Your manuscript should aim to fit their unique niche and style.
There are two good rules of thumb for selecting where to send the article. First, make sure you’ve read articles from the publication you want to target and ensure your article is the kind of thing they publish. Second, find the publication’s “contributor guidelines.” They all have them, and the editors actually put hard work into getting them just right. Here is the link to Proceedings, and here is War on the Rocks, to give you an idea of what they include. Frequently, these pages are also a wealth of advice on good writing. FOLLOW THE GUIDELINES. (Yes, I just stomped my foot and yelled at you.) Do not let the word “guidelines” fool you, these are the rules for the publication. The quickest way to get rejected by an editor is to send them something clearly violating the rules they have put out in the open. And don’t blast the article out to multiple publications at the same time. Pick one, submit, and be patient. Give the editors a couple days to acknowledge your submission, and even more time before you demand an answer. Some have review processes which take months. Even if the article is rejected, you frequently will get constructive feedback that will help you make it better before sending it to the next publication.
You may decide you are interested in a less formal arrangement, and go with a blog such as USNI Blog or work with junior folks like at CIMSEC. But deciding where to send your article should be a conscious choice based on knowledge of what they publish and how you fit into their corner of national security or professional discussion. You do not need a personal introduction to an editor. Find the email address for submissions, write a brief introductory email (include who you are, title of the article, length, and where you see it fitting into the publication), attach the article (or just make a pitch if that is what the guidelines say), and hit send.
Working with Editors
Editors are here to make our work better. Sometimes, we don’t like to hear their criticism, but it is really crucial we listen and consider it. You can push back against an editor’s changes or suggestions, but you should be able to explain why. Also, you can ask an editor to explain the reasons they have made or suggested a certain change. The writer-editor relationship should have plenty of back and forth, with give and take from both sides.
A professional editor will also never talk about the details of the work they do with you. For example, the Editorial Board at the Naval Institute has very strict privilege rules covering what is discussed in the boardroom. Some new writers fear editors will bad mouth them to other publications or with other writers, but that has never been my experience. In fact, I’ve had many editors try and help me by suggesting other publications which might be a “better fit” if they have rejected my work. Editors have also offered to make introductions to other publications for me. While talking with an editor isn’t quite like talking with a Chaplain, respected outlets are run by respectable people. Publishers always want you to come back with good material, because it is how they keep their journal up and running.
The vast majority of material published today ends up online. Even print journals like Proceedings place their articles on their website. Along with this comes the dreaded “comments section.” Realize there is no obligation for you to read the comments section. Frankly, most of the time I try and ignore it. For each ego stroking reassurance you have offered a brilliant analysis, there’s a troll looking for a fight or a pedantic fact checker ignoring the actual point. Sometimes, a genuine expert in your subject might respond with good insight. When I am tempted to look, and I discover someone like that, I have been known to contact them directly to learn more, but not engage in the furball of likes and unlikes and replies. Most publications want their authors to engage, on more than one occasion staff at USNI have suggested I dive in. However, the key for any author is to realize engaging with commenters is entirely a personal choice. There is no requirement to do it, and there is no requirement you ignore it.
A number of professional naval journals have had a history of allowing the use of pen names. Many excellent digital commentators, like our friend Cdr Salamander, use them with skill and for excellent reasons. The first thing to realize is most publications have a specific policy on the use of pseudonyms. They probably are not going to break their own rules for you, and you better know what they are before you try and submit as “W.T. Door” or “Sailor Timmy.” Many blogs also have a policy on it as well. If you decide you need to use a pen name to protect yourself, you may be limiting how seriously your work will be taken and limiting the kinds of publications you can approach.
Personally, I have also found my writing is far better when I do it under my own name. There is less of a temptation to resort to snark and sarcasm and greater incentive to make sure the research is fully and rigorously sourced. Since we have been talking about writing for professional journals and magazines, it is uncommon for them to resort to pen names. If you are publishing in a respected journal or online publication the odds are you want some credit for your ideas, and for having the guts to get them out there, anyway.
This post is the second in a three part series where the author shares lessons learned from a decade of his own professional writing, almost four years on the editorial board of the U.S. Naval Institute, as a Senior Editor with War on the Rocks, and as series editor of the 21st Century Foundations books from the Naval Institute Press. The advice contained is worth exactly what you have paid to read it and individual experience will vary. The opinions expressed are offered in the author’s personal capacity and do not represent the policy of the US Navy, Department of Defense, or any government agency.
It is funny how a topic can keep coming in to your scan after being in the background for so long. The last few weeks, the Navy and the Atom kept breaking above the ambient noise.
First was something I first wrote about 30-yrs ago as an undergrad. The topic of the paper, which I received a very disappointing B- on if I recall correctly (NB: when your POLYSCI professor rants against militarism and you are NROTC, avoid military topics on papers) was New Zealand deciding they were going to ask, and we were going to tell, or we could shove off.
New Zealand Prime Minister John Key announced during a joint news conference with Biden in Auckland that New Zealand had invited the U.S. to send a ship to participate in the Royal New Zealand Navy’s 75th anniversary later this year. Biden, who is visiting New Zealand as part of a tour of the Pacific, said he had gladly accepted the offer.
“It will be yet another expression, another expression of our close and cooperative relationship between both of our countries that we’ve worked together so hard to strengthen,” Biden said.
No U.S. warships have been allowed to visit the country since the 1980s, when New Zealand introduced its nuclear-free policy. Because the U.S. won’t officially confirm or deny if its ships have nuclear capabilities, New Zealand’s default position has long been to ban them from its waters. But as military relations have improved between the two countries in recent years, speculation had grown that New Zealand would allow the U.S. to participate in its anniversary celebration.
“It would be very odd for us to have all of our friends and acquaintances there, sending ships to celebrate our 75th Naval commemorations, and yet on the same point not have the United States there,” Key told reporters.
Key still needs to formally sign off on the ship visit. The prime minister said he did not yet know what type of vessel the U.S. was planning to send, but said it would still need to comply with New Zealand law, which requires that he be satisfied that any ship entering the country’s waters has no nuclear capabilities.
PEO LCS, call your office. Great liberty. Congrats to whoever goes.
That little move got my attention, and as I pondered one 30-yr old topic, look what else came through the mists of time;
The Russian Navy is preparing a contract with the nation’s largest shipbuilder for eight new nuclear-powered missile cruisers.
According to local media, United Shipbuilding Corporation Deputy President Igor Ponomarev says the contract is currently under review. The construction of the first vessel is expected to commence in early 2018.
The new missile cruisers will be designed by the Severnoye Design Bureau in St. Petersburg and are expected to have a deadweight of 17,500 tons, a length of 200 meters (650 feet0 and to be equipped with more than 200 missiles including a version of the S-500, the newest and most lethal Russian missile system.
That is about 80% of a Kirov Battle Cruiser and, if they move forward with what will unquestionably be an very expensive warship, it will be interesting to see deployed.
The Russians have been modernizing the smaller units its fleet in the last few years with quite a bit of success, and this would be a step in modernizing their blue water fleet. Interesting concept, not unlike the one they had for the Kirov;
“Nuclear-powered cruisers are autonomous and well-armed. They can face various challenges in any part of the world ocean. The Russian Navy has not placed orders for vessels of this class since 1989. The decision to build several ships means that Russia pursues geopolitical interests to maintain its presence in remote parts of the world.”
Things come in threes, and after reading the bit about the newest Russian aspirations, I thought of one of my more dystopian conversations as of late that involved nuclear weapons and nuclear power. This doesn’t go boom, or glow all that much at all – but compared to dirty bombs or nuclear war – this is more likely to occur.
In your mind, picture all the CVN we have. Now picture all the SSN/BN we have as well. Add to that how many port visits they make globally each year. Put that to one side.
Recall the reaction to the rather insignificant release of radioactivity at Three Mile Island, and the reaction to very significant nuclear releases at Chernobyl and Fukushima. In between these data points are a lot of possibilities. Put those to the other side.
Put this in the center. Though the Russians (nee Soviets) have had a few significant nuclear accidents, we have not. The Russians have a different press and social culture than the West, so impact is different. What would the impact be here of either a nuclear accident (unlikely) or some kind of release – however small – following a terrorist attack against one of our nuclear powered ships (unlikely, but not hard to outline)?
The American people and our friends are comfortable with our nuclear ships because they are used to them. They are comfortable because we have had such a superb safety record for decades. Our nuclear designs are the best in the world and everything comes second to safety.
All that being said, all human institutions and creations are flawed. None are perfect. It would be one thing to have a nuclear armed ship sunk in combat on the open seas with miles of water between it and the nearest person; but what about the bottom of Pearl Harbor? Norfolk? Groton? Yokosuka?
No one could claim this as a black swan; this is a pink flamingo. Exotic, but well known.
What would the domestic and international response be following an incident where even a small amount of radioactive leakage occurred, especially if it followed an attack while tied up to the pier or moored close ashore upwind from a city of over a million souls?
When does nuclear power become “that?” What would be the tipping point?
The June issue of Proceedings offered a call from CNO Admiral Richardson, and his speechwriter Lt. Ashley O’Keefe, encouraging naval professionals to engage with their service through the act of professional writing. The CNO has not discovered a new idea, but instead lends his voice to something a number of recent senior officers have called for, from Stavridis to Winnefeld. Even some “not so senior” officers have suggested the same. Others have written indications and warnings about the risks the voyage entails.
There have been a long list of professionals throughout our history who have participated in the development of naval affairs in this way, from Maury to Mahan, Nimitz to Zumwalt. And while the spark for this post came from the CNO and the Navy, the other services have a history here too: from soldiers in the 19th century to leaders like Patton in the 20th century. However, the repeated calls to arms over time, or perhaps calls to pens, have missed something. How do you do it?
Our Navy is a technically oriented service. This is also generally true of the other services to greater or lesser degrees. Our educational policies focus on engineering and technical study, and rarely encourage us to learn how to communicate in writing beyond a bare minimum. In our staff positions we use briefing slides and other communication methods which inspire partial thoughts, quick hits, and incomplete sentences and no concept of paragraph structure or style. For cultures raised on procedural compliance and powerpoint, what is the procedure for writing a professional article? Some simple steps inspired by the words in the Naval Institute’s mission can help set our course.
The mission of USNI is to:
Provide an independent forum for those who dare to read, think, speak, and write to advance the professional, literary, and scientific understanding of sea power and other issues critical to global security. [emphasis added]
The bold words are borrowed from President John Adams. In his 1765 pamphlet “Dissertation on the Canon and Feudal Law,” Adams examined monarchy and feudalism and compared them to the growing movement for freedom and liberty in the American colonies. The future president called for Americans who valued liberty to develop their knowledge, and their argument, by daring to read, think, speak, and write on the subject. It was a clarion call, but it also hinted at a certain amount of process. Adams was a careful writer and it is quite possible he put these words in a very specific order. Following his counsel can help professionals chart their process for developing an article which contributes to understanding of our profession.
In order to make a contribution to the field of military, naval, or national security knowledge, you have to know the state of the field. The way to do this is by reading. If you have come up with an interesting analogy for a current debate the only way to know if someone has made the argument before is by reading the field. If you wonder what counter-arguments may be against your position, that also comes with reading the field. Articles in journals like Proceedings, Military Review, or Naval War College Review, online publications like War on the Rocks and The Bridge, blogs like Next War, all contribute to the state of the field. Not only will reading them give you new information, and new ideas, but they also tell you what others have said before. It can save you from the embarrassing retort: “yeah, Lieutenant Commander Jones said it six months ago and had a better argument.” (Not that you have to be entirely original, but knowing the field helps you understand where you fit.)
It is not just articles and online posts we should be reading. Books have long given us the deep knowledge needed to understand where the profession has been and where it may head in the future. There is a common refrain in the modern world that we simply do not have time for books. The watch schedule keeps us too busy. Digital media has affected our attention span. Military service is demanding, and we need time with our families. Yet we find time for physical exercise, while we discount intellectual exercise. According to some studies the average college graduate reads around 300 words a minute. If we read 15 minutes each evening, it totals up to 18-20 books a year. The excuse there is “no time” would never be accepted when we failed the PFT. Accept the challenge to read more widely. Maybe this sounds “high brow” or too “egg headed” but as President Truman, a WWI Army veteran, said: “Not all readers are leaders, but all leaders are readers.”
Once a servicemember or natsec professional has an idea of the subject they want to write about, has done some research and reading about it, and has come up with the initial kernel of an argument, they must spend some time thinking about it. This advice probably goes against the grain of what digital media incentivises, or what social media seems to encourage. However, the point of this effort is to make a contribution to the field of military and naval affairs or national security, not to rush into being a “thought leader” in the crashing tide of the blogosphere. Thinking hard about the subject you intend to tackle includes attempting to employ the skills of critical thinking.
Critical thinking gets a lot of attention these days and there are numerous competing definitions of what it means. Unfortunately, too many people seem to think “critical thinking” means “thinking about important or critical things.” That’s not the case. Instead we need level criticism at ourselves and our ideas. We need to examine our ideas with depth, and rigor, in order to get to the heart of whatever issue we want to write about. This includes becoming a critic of yourself and your own ideas, as well as the ideas of others. As you develop the concept for your article, be exacting and penetrating with the evidence you have amassed either through research or your own experience.
Having researched, considered experience, and critically examined the subject in your own mind, it is important to get a sanity check from someone else. In the academic world, this is part of the reason there is peer review before journal articles are published. In the professional and popular press, editors and editorial boards will judge your work with a dispassionate eye. The best way to ensure your argument makes sense, and you have developed a sound approach before contacting an editor, is to talk about it with other people.
Speaking about your idea can take a number of forms. It can happen with a pint in your hand at a pub with a mentor or group of respected friends. In the lost days of our Officer Clubs this was actually a common way of helping people develop professional ideas. It could also involve a cup of coffee. Seek out a mentor who you trust, whether a senior officer or a former professor or co-worker, and see what sticks in your conversation with them. Speaking also does not have to be taken literally, even if some of us work better in the give and take of live conversation. It can take the form of an email or social media exchange. The goal is to introduce new criticisms the writer has not considered, or clarifying the way to express the ideas.
Sit down and write the article. Just do it. Don’t allow the blank page on the computer screen to intimidate. One of the benefits of having thought through the idea systematically, and then spoken about it with a trusted friend or mentor, is you have already started to develop the words to express the idea. As many successful authors have told us, from Stephen King and Anne Lamott to Ernest Hemingway: the first draft is going to be bad. It does not matter. Sit at the keyboard and bang away until you have said everything you want to say.
Once the words are on the page, raw and terrible as they might be, the writer has crossed a major hurdle. After that, it is a matter of editing, organizing, and rewriting, which should be easier than putting the idea down the first time. The editing does not need to be rushed, and the mentor or friend you spoke with probably will be excited to take a look at the article and help make suggestions to improve it. You have already made them feel like a part of the process. When the draft is something which reads well, and you’re happy with it, then it is time to start looking for a place to publish it. Good editors, strong editorial boards, and the review process they use will help strengthen the piece even more. Be ready to make more adjustments to help clarify any issues they discover.
The RTSW Loop
The steps of RTSW might be seen as a sort of OODA loop for professional writing. In some ways it is similar to Boyd’s strato-tactical ideal. For example, each element can send you back to a previous spot. Speaking with a mentor may send you to a book or article you had not heard of before which you need to read, or the process of writing may cause you to return to your thinking and reorganize your approach. But there are also differences with Boyd’s Observe-Orient-Decide-Act sequence, most notably speed. Speed can be your enemy when writing a good professional article. There is no hurry. Please do not try to beat the rush of modern media, this can lead to shallow writing, weak argument, and poorly sourced facts. Doing it right may take time, and multiple rounds of the “RTSW loop,” but that only makes the article stronger and a better contribution.
Writing for publication can be a rewarding challenge. It is also something a legion of Sailors, Soldiers, Marines, Airmen, and security professionals have done throughout history. Many discover the process of writing clarifies their thinking. It also develops our communication skills, our critical faculties through practice, and our leadership ability. All of these make us better military professionals. Writing for publication is not something we should do because we need another FITREP or evaluation bullet, or because we think we can impress our boss. We don’t do it simply because the CNO says so. It is something we do in order to move our profession forward and to improve our service or our nation’s security. So, it is time to dare. Dare to read, think, speak, and write.
The author would like to thank Cdr Mike Flynn and his Naval Academy summer school class on “Professional Writing” for their invitation to join them for a day of class, where the author had a chance to speak about and refine some of these ideas.
This post is the first in a three part series where the author shares lessons learned from a decade of his own professional writing, almost four years on the editorial board of the U.S. Naval Institute, as a Senior Editor with War on the Rocks, and as series editor of the 21st Century Foundations books from the Naval Institute Press. The advice contained is worth exactly what you have paid to read it and individual experience will vary. The opinions expressed are offered in the author’s personal capacity and do not represent the policy of the US Navy, Department of Defense, or any government agency.
Photo Credit: FVAP
“All qualified electors of this state who shall be in the actual military service of the United States or of this state…shall be entitled to exercise the right of suffrage at any general election…at the several posts, camps, or places where the regiment or battery of artillery may be…”
Wisconsin State Law, Section One
Passed September 25, 1862
Voting while serving in the military was not always as easy as it is today. For a long time, if a soldier or sailor was away from their hometown, they simply didn’t vote. It wasn’t until the Civil War when most states confronted the challenging issue of voting in the military. In the run-up to the 1862 congressional election, there were many questions about how to handle voting for a significant number of military members that were far from home.
The first two states that led the way with passing military suffrage laws were Wisconsin and Minnesota. In Wisconsin, their state constitution was interpreted to allow military members to vote outside of state boundaries, and just before the 1862 election a bill was passed that, “directed officers in the army camps to conduct the vote…and to forward to the governor and the secretary of state for final tabulation the results of the vote.” Just two days later, Minnesota passed a law allowing any soldier who had enlisted at least ten days prior to the election, “to vote wherever he might be. Having done so, he should place his marked ballot in an envelope, then seal said envelope with wax, and mail to the judges of his district.” With those simple pieces of legislation behind them, the first military absentee ballots were cast!
In 1863, several more states followed suit. By 1864, most state governments had provisions enabling their residents serving outside their state to vote in various forms. Some states chose to allow voting by proxy, some followed Wisconsin and Minnesota’s example and allowed absentee voting for the first time, and others even sent election commissioners to their state units to verify voting procedures and tally results. However, several states, purely for political reasons, chose not to enact legislation until 1865, too late for their soldiers’ votes to count in the 1864 presidential election.
Photo Credit: Missouri State Historical Society
Union Soldiers voting in the field during the Civil War
Fortunately, we have come a long way since the Civil War and the United States has passed a number of laws protecting a servicemember’s right to vote. The 1955 Federal Voting Assistance Act urged states to pass laws to improve voting procedures for the military, by simplifying the absentee process, creating a uniform ballot, and providing adequate time for ballots to be returned. The 1975 Overseas Citizens Voting Rights Act repealed and updated the 1955 law, guaranteeing absentee registration for citizens outside the United States. The 1986 Uniformed Overseas Citizens Absentee Voting Rights Act (UOCAVA) directed states to provide overseas personnel with the ability to vote in all elections, specifically protecting members of the uniformed services and their families. As a result of UOCAVA, states must provide requested absentee ballots at least 45 days prior to an election. Finally, the 2002 Help America Vote Act (HAVA) required the Federal Voting Assistance Program (FVAP) to ensure that military servicemembers assigned to voting assistance positions have the “time and the resources needed to provide voting related services.”
These changes have helped ensure that members of the military have every opportunity to register and to vote in elections. As a direct result, servicemembers have increasingly registered to vote and turned out in higher percentages than their civilian counterparts. Here are some of the military voting turnout rates over the last 40 years:
-1976: <40% (15% less than the civilian turnout rate)
-1984: 55% (military exceeded the civilian turnout for the first time)
-1992: 67% (compared to 55% civilian turnout rate)
-1996: 64% (compared to 49% civilian turnout rate)
-2000: 69% (compared to 54% civilian turnout rate)
-2004: 79% (compared to 60% civilian turnout rate)
In the 2008 presidential election, the overall voter turnout rate for the country was 61.7% – the highest since 1964. In the 2012 presidential election, the military again turned out and voted in higher percentages than the civilian populace.
Most recently in the 2014 congressional election, data from the Federal Voting Assistance Program (FVAP) showed that in the 2014 congressional elections 71% of Active Duty Military members registered to vote. Conversely, only 58% of civilians of the same demographics (age, gender, education, region, family status, etc.), registered. However, when it came to actually voting in the 2014 election, active duty members had a voter participation rate of only 23%, compared to 25% of those not in the military.
The 2014 results should not overshadow the fact that as an overall group, the military and veterans have increasingly become more likely to register and to vote in elections. Our job now is to continue to encourage everyone to exercise his or her right to vote. The bottom line is that in today’s day and age, even if you are deployed to a combat zone, underway on a ship halfway across the world, or stationed at a base abroad, there is virtually no excuse for not being able to vote. There are great informational tools out there and most states allow you to handle just about everything online – some even allow you to utilize an online ballot!
A great website to refer to for state by state guidelines on how to register to vote, how to request an absentee ballot, and how to check the status of your ballot is https://www.fvap.gov.
Alexander Hamilton wrote in April 1784 that, “A share in the sovereignty of the state, which is exercised by the citizens at large, in voting at elections is one of the most important rights of the subject, and in a republic ought to stand foremost in the estimation of the law. It is that right, by which we exist a free people.” Hamilton went on to note that voting is a citizen’s, “right to a share in the government. That portion of the sovereignty, to which each individual is entitled, can never be too highly prized. It is that for which we have fought and bled.”
This is something we should be talking about in our squadrons, on our ships, and within our units. By not voting, even if you think there are no good choices, you are ceding your voice to someone else. The only way we as a democracy can move forward and truly represent the will of the people is for the people to vote. This is an area where the military has led in the past, and must surely lead in the future.
General Robert Neller has always been regarded as a tough, no-nonsense Marine, and as Commandant of the Marine Corps he has also emerged as a genuine visionary. He deeply understands the future military environment and how his service must prepare for it. At the 2016 U.S. Naval Institute/AFCEA West Conference, the general provided critical insight into his vision, which closely aligns with that of Chief of Naval Operations (CNO) Admiral John Richardson, on the direction of leadership development the Naval Services should take.
According to the 37th Commandant:
I think the training systems we have as far as simulators and simulation are pretty good for individual task/condition/standard, for air crew, for drivers, for even firing individual weapons, gunnery, things like that, I think the thing that we’re looking for is, where’s the equivalent of our Holodeck, where a fleet commander or division commander or air wing commander can go in and get a rep. Right now that almost requires an actual provision of the real stuff, which is really expensive . . . . Where’s our Enders Game battle lab kind of thing where we can not just give our leadership reps, but we can actually find out who the really good leaders are.
General Neller’s comments compel us to further analysis. He invokes aspects of popular science fiction to paint a picture for how leaders will be trained, evaluated, and readied for operational challenges in the not-so-distant future. He identifies critical gaps in today’s approach to leadership development, where mid- and senior-grade officers have few opportunities to experiment with novel operational concepts, using multiple units, in a risk tolerant environment. He also places cognitive development, or military decision-making, on par with the physical fitness which has long been a hallmark of Marine Corps officers. Finally, Neller highlights the problem of assessing the true quality of leadership in today’s ranks, where a significant portion of an officer’s career is in non-operational assignments.
One Army study of the novel Ender’s Game describes the “battle lab” (or school) in this way:
Using virtual training environments, the children go head-to-head on an individual level against computers that simulate Formic battle tactics to gain the knowledge and abilities required to defeat the enemy. The children can then compete against one another in the virtual environments to further develop their strategies. The next phase involves live collective training. Divided into armies, the soldiers must learn to function as a single unit to accomplish a mission objective in the battleroom. With enough skill, soldiers can become commanders of their armies and must learn to lead them effectively. By merging these individual and collective training components, the soldiers’ knowledge, skills, and abilities can translate into operational readiness.
While the concept of an Ender’s Game battle lab may seem like pure fantasy to some, the technology to build it may be right around the corner. In order to turn Neller’s vision into reality, several organizational changes must occur.
Harnessing advances in several emergent fields is critical for creating a naval battle lab, but we must exercise prudence in our approach. We must take full advantage of better private sector platforms and systems, and make using them our first choice, rather than taking the more expensive approach of designing our own systems. Reinventing the wheel, and the resulting exorbitant costs, will be the death knell of a naval battle lab long before the project would get underway in earnest.
As the current Pokémon Go craze clearly demonstrates, working augmented reality is now widely available to the public at virtually no cost. If built from scratch using the defense acquisition process, its cost surely would render such a system unaffordable. In fiscally constrained times, the DON must adopt new business practices and modernize outdated IT policies to capitalize on these types of commercial initiatives. Senior leaders and acquisition professionals need to consider open source software (OSS) services, such as GitHub, as the new norm for software procurement. OSS services allow users to take available code and modify it for a specific use at potentially a much lower cost than developing their own version from scratch or purchasing a commercial software license.
Another form of technological advancement needing consideration is the rise of machine learning and “bot” technology. Sophisticated software algorithms show great utility in modern computer networks, with their ability to monitor computer systems, offer data access, and to check network activity, while adapting themselves to varying conditions without human direction. This capability is being commercially used to improve customer service and to monitor network activity, among other private sector functions. Such advanced machine learning tools will be critical for creating virtual exercise controllers or simulated adversaries, using their adaptable artificial intelligence to challenge military tacticians based on their level of expertise.
Mobility will be an important enabler for leadership development in the future. It is difficult to find a naval officer today who does not own a smart phone. We must take advantage of these powerful tools by providing our people with appropriate network access and software to enable them to participate in scalable leadership exercises alone or as members of a networked team. Such access will allow them to develop professionally wherever they are. In short, we must make cognitive development as accessible as doing a set of push-ups. Leveraging commercial technology, however, is only one part of the changes required to implement General Neller’s vision.
The naval services have led at wargaming for decades. Over the past few years, improvements to analytical methods have resulted in game outcomes informing organizational decision-making processes. However, we must not lose sight of the fact that wargaming, and gameplay in general, serves as an excellent leadership development tool. In essence, traditional wargaming is a competition among participants based on a scenario that is conducted in a turn-based manner. They make people think and solve problems. This same process is easily replicated, repeated and expanded by using a virtual environment.
Virtual wargaming offers many advantages over traditional simulations. Consider popular online games such as World of Warcraft or Call of Duty. These games are played by millions of networked participants around the world every day. Fundamentally, they are designed to pose tactical problems to players who have a set of options from which to select. This interaction presents an incredible opportunity both to learn and collect useful data on military decision making.
In the future, for example, tactical problem X could be posed to a large and diverse group of naval officers in a virtual game format. From their answers, it would be possible to determine that a certain percentage would chose option Y, while others would chose option Z. This data could then influence policy changes or improve training and education programs, using any observed shortfalls. Further, if this virtual environment is shared with other services and coalition partners, it will be possible to determine the effect service and national culture has on tactical decision making.
Another advantage of virtual gaming is its ability to draw upon the expertise of the crowd to solve challenging problems. This is contrary to the norm of giving only a few elite players the opportunity to participate in large-scale events. Virtual environments are also more accommodating to various personality types and better for overcoming the power dynamics and hierarchies associated with the traditional approach to military wargaming.
The DON is at the forefront of crowdsourcing in the Department of Defense through its use of online platforms such as MMOWGLI, The Hatch, and the Marine Corps Innovation Challenge. Each of these forums provides Sailors, Marines, and DON civilians the opportunity to participate in virtual problem solving challenges. The lessons from these nascent systems could influence operational planning in the future, as the multitude of options available to our adversaries could be given to a network of operational planners, rather than myopically focusing on one or two likely courses of action. History has shown the current approach to planning often results in failure to anticipate our adversaries’ actions, an inflexibility we must remedy.
Virtual games are only as good as the environment in which they are conducted. Commercial gaming technology, geographic information systems, intelligence collection sensors, and repositories of global societal data are constantly improving. Much work remains to integrate these various sources of data in order to develop virtual environments of sufficient quality to enable realistic decision-making exercises. Excessive emphasis on environmental fidelity can often become an expensive distraction, however.
Virtual environments may be used to represent complex, networked, “wicked problems” better, as well as demonstrating the impact of our actions within, for example, complex civilian population centers. In short, virtual environments can present a different set of decision making problems and feedback mechanisms not available in live training exercises or traditional war games. This is yet another advantage offered by new forms of simulation.
The term “game” often connotes a recreational activity. If gameplay in the battle lab of the future is to become an effective tool for assessing the tactical decision making of naval leaders, proper incentives must be put in place so these exercises are taken as seriously as time on the rifle range. The emerging concept of gamification rests upon rewards or meaningful status upgrades to reinforce positive behavior, while penalizing negative behavior. Performance in the naval battle lab consequently must be incorporated into annual performance assessments and ultimately influence career decisions.
In an examination of military innovation, Dima Adamsky notes a significant difference between the US and Soviet militaries during the Cold War in their approaches to technological adaptation. The Soviets would develop concepts and strategy for use ahead of delivering a technology, whereas the US military usually had the technology and then often took a decade to figure out how to turn it into an operational advantage. To prevent this problem in the future, DARPA and ONR could insert the latest weapons technology into the battle lab years ahead of its actual fielding. This would give future naval leaders the opportunity to experiment with weapons of the future, then speedily integrate them into their decision making cycle as soon the new systems arrive in the operating forces.
The DON’s Task Force Innovation was comprised of over 150 naval innovators from across the operating forces. Improving wargaming and expanding virtual environments were identified as important tools to promote innovative thinking. As a result, Secretary Mabus directed two policy memos to emphasize these two issues and take an integrated naval approach, when possible. While great progress is being made as a result of these directives, these two areas will ultimately form the foundation for a naval battle lab and must proceed in parallel and complement one another.
To operationalize this concept, the numerous stakeholders from across the naval enterprise must work towards a common vision. Developing the functional system as described here will require strong leadership and collaboration across numerous DON organizations. As we have seen, this topic is of great interest to the SECNAV, CNO and CMC. Therefore the current bureaucratic environment may be optimal to make meaningful progress.
There are many technical, fiscal, and organizational barriers which must be overcome to fully operationalize the naval battle lab concept. The most significant obstacle, however, will be cultural. Ultimately our leaders must see the lessons learned from traditional leadership tasks and day-to-day decision-making in an operational environment are invaluable and cannot be supplanted. As cognitive decision-making emerges as a critical capability on the battlefield of the future, we must leverage every opportunity to build the most tactically and operationally proficient naval officers possible. As we see in every aspect of society, technology will play a vital role. If a battle-hardened, infantry Marine like General Neller, who entered military service long before personal computing became part of our daily lives, recognizes the potential of a naval battle lab for building and testing naval leaders, others must take notice too.
“As our platforms and missions become more complex, our need for talented people continues to be a challenge. We need to recruit, train and retain the right people…”
Admiral John Richardson, U.S. Navy
Chief of Naval Operations
In 2017, nearly 2,000,000 young men and women will graduate from colleges and universities throughout America. We want 200 of the very best to commission through Officer Candidate School (OCS) and serve America as a Navy Surface Warfare Officer (SWO).
To be sure, we have historically attracted and retained great people in Surface Warfare. With an eye toward our return to Sea Control and distributed, more lethal warships, we should ask ourselves a series of critical questions, “Can we do better?”… and… “Are we tapping into the full potential of America’s shining youth?” Former Joint Chiefs Chairman, Admiral Mike Mullen, referred to the “sea of goodwill” that has given rise to a tide of support for our military since the attacks of 9/11. Is that goodwill sustainable?
Talented young men and women matriculating from our nation’s colleges and universities have life options. Surface Warfare could be one of those options, but it is not enough to sit back and wait for talent to come to us. In the competitive market of America, we must reach out, connect with, inform and attract the most talented into our community – and our Navy – in order to position our warships to fight and win when the nation calls.
There are extraordinary young men and women throughout this nation who would thrive as Surface Warfare Officers, but literally have no idea that the amazing opportunity to serve on warships… leading at sea… undertaking impactful work for our country… is even a remote possibility in their lives.
We are positioned to turn a life opportunity into reality for our nation’s best. Here is how we are doing it.
We know who we want
Through a series of surveys and data collection efforts, we have mapped attributes and characteristics of successful young SWOs.
These include: previous proven leadership experience – of any sort, at any level – in a varsity sport, club or organization; demonstrated initiative; oral and written communication skills; positive contribution to organizational efforts as part of a “team” – assessed through previous participation in organizations, clubs and sports; work experience that illustrates a sense of discipline and accountability; time management and organizational skills that reflect an ability to follow established procedure and demonstrate attention to detail; enthusiasm and passion for the nation and the Navy that would prompt internal motivation in the face of adversity; and, a desire to work hard, remain committed to mission accomplishment with a strong desire for service with impact.
In March, we worked with Navy Recruiting Command and we generated guidance to the entire officer recruiting force in the country, reflecting these attributes and characteristics.
Leveraging our competitive advantage
Junior Officers have told us that the principal attractors to Surface Warfare are: 1) the opportunity for immediate leadership; 2) the opportunity for adventure and travel; 3) the opportunity for a flexible, option-based career; and, 4) the opportunity for postgraduate level education.
In business terms, Surface Warfare has a near-monopoly on these attractors. Can we better leverage that competitive advantage in a more meaningful and vibrant way?
Outreach and the Power of Social Media
In Fiscal Year 2016, 18 young men and women applied to be SWOs through Officer Candidate School from the states of North and South Carolina –combined. We met our “numbers” and we got great people. But there are more than 125 colleges and universities in these two states. Do graduates from these schools – and thousands like them around the country – even know that Navy Surface Warfare is a life option for them and, consequently, are we missing out on large segments of the population who could serve and propel us to even greater heights as a Navy?
Through the power of social media, we can – at a minimum – begin to raise nation-wide awareness of the opportunities in Surface Warfare. This is not about numbers. This is about reaching out and connecting with talented young men and women to ensure they are aware of the opportunities to serve in our community today, ultimately leading our Navy and serving as the sea captains of tomorrow.
Bringing it together
We know who we want, we know what attracts men and women to serve in Surface Warfare and we have the ability to connect with America at our fingertips. Can we take these pieces and integrate them in a meaningful way? Conceptually, we want to move toward “getting who we want” to serve as Surface Warfare Officers – quality men and women, with characteristics that set themselves up for success as a SWO and who are drawn to our community. Along the way, we should connect with America’s exceptional youth from backgrounds and demographics that are under-represented in today’s force.
This is possible today. So we are seizing an opportunity – and moving out quickly!
In a collaborative effort with Navy Recruiting Command, we launched our community’s first-ever targeted outreach into America using the power of social media. Through a newly formed teaming effort with LinkedIn – the largest connector on the planet – we now have the ability to “meet people where they are,” connecting directly with people all over the country using high end talent matching and recruiting functionalities imbedded in LinkedIn.
We also have the ability to provide interested candidates with access to our #1 asset – our people. Today, a cadre of more than 50 junior officers in the current force who have “walked a mile in the shoes of a SWO candidate” are aggregated in an on-line platform. Have a question about serving in the Navy? How to apply for a commission? What does a Surface Warfare Officer do? Those answers are a keystroke away on social media.
The overall concept is simple. Connect directly with the people we want to serve in our ranks, invite their attention to the opportunities of future service as a SWO and provide on-line access to the exceptional men and women we have in today’s fleet. Then, turn interested candidates over to the exceptional professionals in our Navy Recruiting Districts all over the country to support application for Officer Candidate School.
Earlier this month, we conducted our first significant outreach — a direct communication to 150 students possessing the background, attributes and characteristics we want in future SWOs. These students are enrolled in universities and colleges in North and South Carolina – among them: Duke, Wake Forest, the Universities of North and South Carolina, Clemson, Appalachian State, Elon, Davidson, and Historically Black Colleges and Universities (HBCU’s) like North Carolina A&T and Benedict College.
In a great example of the power of high velocity learning, we have already captured key lessons and applied them – enabling outreach to specific people in even larger audiences on-line.
More broadly, perhaps we open new doors and find opportunities by using a similar approach in critical areas for national security like cyber.
We are also thinking differently about how to more vibrantly leverage social media and networks of influencers to connect with young men and women seeking a commission through the U.S. Naval Academy and Navy Reserve Officer Training Corps (NROTC).
From 2,000,000 young men and women, we want the best 200 to serve America as a Navy Surface Warfare Officer – executing military diplomacy, sea control and power projection.
Let’s go get ‘em!
Standing there, head bowed, pausing to reflect on the 46 Republic of Korea (ROK) navy Sailors whose lives were lost when their ship was sunk by an alleged North Korean submarine torpedo, makes one realize how precarious peace remains in the dynamic theater that is the Asia Indo-Pacific.
During what was a leadership symposium for other task force commanders, led by U.S. 7th Fleet commander, Vice Adm. Joseph Aucoin, I had the solemn privilege to tour the memorial dedicated to those Sailors, which includes the salvaged stern of the ship, ROKS Cheonan (PCC-772).
ROKS Cheonan was a Pohang-class corvette commissioned in 1989, one of the many worthy surface ships in the ROK navy fleet. On March 26, 2010, as the ship patrolled waters near the border with North Korea, she was struck by the torpedo, broke in two and sank.
As anyone with a Twitter account is well aware, North Korea continues to make headlines by test-launching ballistic missiles.
North Korea’s rhetoric and actions is just one fault line in a patchwork of tectonic plates that could lead to regional instability. And as such, we must remain steadfast in ensuring our forces, Sailors and Marines part of the Blue-Green team, are ready to deploy at a moment’s notice.
In early June, the Navy conducted a sort of stand down after a series of off-duty incidents. It may have seemed from outside that Navy leadership was going “high” and “right” – but instead it served as an important time to refocus us to readiness and the incredible importance we bare in being forward-deployed here.
As commander of Amphibious Force 7th Fleet, I command over a wide range of forces from an amphibious ready group to a mine countermeasures squadron to a helicopter sea combat squadron. Each unit has a unique role and each Sailor – and Marine – has an equally unique and important role.
To me, the recent stand down was about looking ourselves in the mirror – and looking each other in the eye – and challenging ourselves to do better, to conduct ourselves every second of the day with a recognition that we may be called to action.
One of the key components during this period was a buddy rule. The emphasis here was on accountability, a renewed attention on shipmates being shipmates.
While “shipmate” is a U.S. Navy term, it applies to all services and it applies to our bond with other nations. In my last year in command, I have grown bonds with several other amphibious leaders in different countries.
This past March, I had the privilege of commanding forces, more than 17,000 in total, alongside my ROK counterpart Navy Rear Adm. Park, Ki-kyung in the exercise Ssang Yong. Though we are from different militaries, we share the same oath to defend our nation.
While the specific policies of our recent stand down period have been eased, the mentality to stand tall at all times must remain. Our nation, this region, is counting on us too much for us to “slip.” We must realize that we are not only accountable to ourselves and our unit, but the partner forces that rely on us to answer the call with them.
The House of Representatives recently passed an amendment to the National Defense Authorization Act sponsored by Representative Ken Buck (R-CO) that would “prohibit funds to implement Department of Defense (DoD) Directive 4715.21 on Climate Change Adaption and Resilience.” It is a short-sighted and ill-conceived action that will jeopardize U.S. military effectiveness.
Successful, prudent planning requires considering all pertinent variables. For that reason, DoD needs the ability to factor climate change as a variable at the strategic, operational, and tactical levels. If Congress wishes to limit the scope or cost of a specific program it should do so, but it must not limit the ability of the military to plan.
Having served as the senior environmental executive for the United States Air Force in the George W. Bush Administration, I would like to address this, both as someone who had the responsibility to plan for and respond to environmental contingencies, and as a Republican needing to work with a Democrat Congress to effectively govern.
The fact that the climate changes is not a political issue, it is reality. It has been changing for millennia. While the cause may be debated by some, the reality is that climates evolve and such developments have a major impact on security interests. You don’t have to believe that the cause is man-made. You can believe it is part of an ongoing cycle and point to whatever study you want to back up your point of view.
Irrespective of the cause, the climate changes and those changes affect the weather, sea level, crop production and migration patterns. Rising sea levels have displaced populations, land failing to produce crops due to drought has exacerbated already complex Syrian issues, and ocean temperature killing coral is moving fishing grounds further into the South China Sea; all of these can lead to conflict and must be prepared for. These are key variables that are affected by climate change and impact everything from broad strategy to discrete tactics.
In a statement, Representative Buck said, “The military, the intelligence community [and] the domestic national security agencies should be focused on ISIS and not on climate change.”
To understand the importance of climate and weather in very concrete terms, one only needs to look back at the critical value of a weather forecast for the D-Day landings. To bring off the invasion, General Dwight D. Eisenhower needed a full moon, a low tide, little cloud cover, light winds and low seas. (The low tide was necessary to allow soldiers to see, avoid, and disarm the mined obstacles that the Germans had placed in the surf.) He could have had the full moon and low tide on June 5, 6, or 7. He could have had the low tide without the full moon on June 19 or 20. But what about the weather?
The landing was originally scheduled for June 5, but was moved to June 6 based upon a weather forecast and succeeded not because of the brilliant work of any solitary forecaster, but because a group of forecasters imitated the weather. They jostled, yelled, scribbled, and cast malevolent looks at one another. They fought it out and voted. And in the end, they were just right enough.
Imagine, if Congress, in 1944, had said that the military and the allied forces should be focused on the Germans and not on the weather, then passed an amendment that prohibited identifying and assessing the effects of the weather. Well, that is pretty much what Representative Buck’s amendment does in a 21st-century context.
The fact that the climate changes is a significant variable that needs to be considered by our military planners. Given the sophistication of modeling and analytic capability available to our military, being able to understand and predict broad patterns in the climate cannot be underestimated. It is a strategic advantage that will play out in tactics against the range of current and potential adversaries.
If you actually read Department of Defense (DoD) Directive 4715.2 [.pdf], you will find that it is not about pushing a “radical green agenda” as Representative Buck asserts. DoD Directives flow from policy and assign responsibilities for carrying out that policy. In this case, the DoD policy is to ensure that the DoD is able to adapt current and future operations to address the impacts of climate change in order to maintain an effective and efficient U.S. military.
Nowhere in the Directive is there language that speaks to the cause or reason for the climate changing. It is focused solely on identification and assessment of the effects of climate change on the DoD mission; taking those effects into consideration when developing plans and implementing procedures; and anticipating and managing any risks that develop as a result of climate change to build resilience.
Military planning is an art that requires an in-depth understanding of numerous critical elements or factors that may impact on the mission — both positively and negatively — and an assessment/analysis of how those elements or factors can be either negated, overcome or exploited to give the Commander the advantage required in the execution of the mission. The inability to take into account the changing climate would be catastrophic limitation. This limitation would be compounded by the fact that most of our efforts, against ISIS and other potential adversaries are carried out though multinational coalitions. U.S. joint strategic plans and contingency plans prepared in support of multinational efforts are developed, reviewed, and approved exclusively within U.S. operational channels. Currently, Combatant Commands are integrating climate-related impacts into their planning cycles to reduce the national security implications associated with climate change. This includes monitoring, analysis, and integration of climate related risks into existing overall risk management measures, as appropriate for each combatant command. The Buck Amendment would tie the hands of not only our Combatant Commanders and military planners, but render the United States ineffective in joint planning and operations.
If the purpose of the amendment is to limit spending on overly expensive showcase projects like the Navy’s Great Green Fleet, there are better ways to do that than prohibiting the assessment and analysis of a key long-term variable in our nation’s ability to fight and win.
For example, in 2007 and 2008 when the nation was facing oil prices of $140 per barrel, the Air Force undertook an effort to use domestically produced synthetic fuel in our aircraft to reduce the need for foreign oil. We made a conscious policy decision that the program would be market-based and that the Air Force would do only those things in our control that would create the conditions for success, but not to subsidize uneconomic alternatives.
The Air Force successfully certified every aircraft and associated system to be able to fly on a 50/50 blend of synthetic fuel, and we made a commitment to buy half of our domestic fuel requirement as a synfuel blend as long as the price of the synthetic fuel was competitive with conventional fuel.
At the same time, there were those in Congress who were concerned about the greenhouse gas emissions associated with the production of synthetic fuels from coal, but rather than completely stop the program, they passed Section 526 of the Energy Independence and Security Act of 2007, which restricts the federal government’s procurement of alternative fuels that exceed the lifecycle greenhouse gas emissions associated with conventional petroleum based fuels. While not ideal from the Air Force perspective, it was a proper and constructive use of Congressional prerogatives; it was congruent with the Air Force commitment to be good stewards of the environment, and simultaneously allowed the Air Force to move forward with our testing and certification.
Rather than Representative Buck’s draconian approach to prohibit funds to implement Department of Defense Directive 4715.21 and not allow planners to identify and assess the effects of climate change on the DoD mission, it is wholly appropriate for Congress to require that all efforts with regard to climate change be market-based and that the prices paid for biofuels and other alternative energy sources be competitive with the least cost alternative.
DoD’s ability to successfully counter terrorism, defeat a near-peer adversary, or respond to a natural disaster depends on its ability to collect, analyze and assess data regarding all contingencies, including changes in the climate. To limit that ability puts the lives or our sons and daughters who wear the cloth of our nation at risk.
An excerpt of this article was published in the July issue of Proceedings. The full article is provided here for further context and explanation. This article does not reflect the views of the Department of Defense, Department of the Navy or U.S. Cyber Command.
China and the United States appear to be engaged in a long-term competition, and one area of particular concern is cyberspace. What used to be considered a significant, overwhelming advantage of U.S. military capabilities relative to the rest of the world, including China, has recently been called into question. Recent Chinese military writings confirm the centrality of cyberspace operations to the People’s Liberation Army (PLA) concepts of “informationized warfare.” This paper examines Chinese writing on these concepts. It proposes that China has been actively seeking to position its sources of information power to enable it to ideally “win without fighting” or if necessary, win a short, overwhelming victory for Chinese forces. It concludes with some recommendations for how the U.S. might counter China’s informationized war strategy.
Chinese Strategic Thinking and “Informationized War”
There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all about the information!
-Cosmo, from the movie “Sneakers”, 1992
You may not be interested in war, but war is interested in you.
-Leon Trotsky (1879-1940)
Chinese military and strategic thought is markedly different from Western tradition. Fundamentally, China views the natural state of the world as one of “conflict and competition” rather peace and cooperation. The goal of Chinese strategy is to “impose order through hierarchy.” The natural conclusion is that due to this state, the world needs global powers, perhaps even a super power, to manage the conflict and competition and bring harmony. Timothy Thomas has identified several components to Chinese military thinking, to include: 
- A more broad and analytic framework that holistically incorporates information-age strategy;
- While remaining prominently Marxist, it “examines the strategic environment through the lens of objective reality and applies subjective judgment to manipulate that environment to one’s advantage”;
- The use of stratagems integrated with technological innovation, creating a hybrid combination targeting the adversary’s decision-making process to induce the enemy to make decisions China wants;
- The constant search for shi, or strategic advantage. Shi is thought to be everywhere, “whether it be with the use of forces, electrons, or some other aspect of the strategic environment”; and
- The object of “deceptively making someone do something ostensibly for himself, when he is actually doing it for you.”
Shi is the “concept born of disposition … of a process that can evolve to our advantage if we make opportune use of its propensity.” Chinese military thought seems to differ from Clausewitz, becoming focused on shi where Clausewitz finds “ends” and “means” as the most important. Shi aims to use “every possible means to influence the potential inherent in the forces at play” to its own advantage, before any engagement or battle takes place. Therefore, the engagement never actually constitutes the decisive battle that Clausewitz envisions, because it has already been won.
Chinese military writing contemplates war transitioning to an “informationized” state “in which informationized operations is the main operation form and information is the leading factor in gaining victory.” Information is a resource to be harvested and exploited, as well as denied to the enemy or manipulated for advantage. Nations and militaries “can be wealthy or poor in this resource. Overall wealth in information is what will ultimately matter most in peacetime competitions, crises or military conflicts.” 
China considers herself at an information disadvantage, so her use of information harvesting and exploitation in cyberspace align with her strategic intention. Thomas likens it to three faces of a “cyber dragon”: peace activist, spook and attacker. The peace activist is the face of the dragon concerned with internal and external soft power (improving China’s image, respect and perhaps fear or awe of China abroad, while remaining on guard internally against a Chinese version of an “Arab Spring” or “Orange Revolution”). The spook is the uses of cyber techniques to not only acquire information but also to reconnoiter adversary information systems, perhaps laying the groundwork for future attack or deterrence capabilities. The attacker face uses offensive capabilities and concepts to deter, or if necessary, paralyze the information capabilities of the adversary. The goal is that these three faces “work in harmony to achieve dominance over any potential adversary.”
People’s Liberation Army (PLA) books such as the Academy of Military Sciences’ Science of Military Strategy and Ye Zheng’s Lecture on the Science of Information Operations “reflect a consensus among Chinese strategists that modern war cannot be won without first controlling the network domain.” This tracks with current U.S. doctrine that emphasizes dominance in the network domain as “central to deterring Chinese forces and protecting U.S. interests in the event of crisis or conflict.”
Importantly, PLA writers emphasize first strike and first mover advantage in the network domain to “degrade or destroy the adversary’s information support infrastructure and lessen their ability to retaliate.” This creates strong incentive to strike in the network domain just prior to the formal onset of hostilities. China’s lines of effort in support of this strategy include:
- Gaining information through reconnaissance of cyber systems, and manipulating or influencing Western or American perception and technology to establish strategic advantage;
- Using that reconnaissance information to position its forces, to locate vulnerabilities, and be in a position to conduct system sabotage;
- In a crisis, using system sabotage to either render information technology systems impotent, or expose strategic cyber geography to establish offensive cyber deterrence.
Chinese writers publicly state that China lacks the ability to successfully launch a first strike at the present time. This is because they believe that Chinese networks are constantly penetrated by adversaries, and because of U.S./western control of most of the Internet’s core architecture. PLA writers do recognize the vulnerabilities of relying on Western technology supply chains for hardware and software operating systems.
Chinese writings suggest information is the bonding agent for strategic action from which China will be able to amass enough power that it will be unnecessary for her to use military force to accomplish her objectives. If force is necessary, China will be in such an advantageous position that the military conflict will be a forgone conclusion. Consider the game of chess. Andrew Marshall, former Director of the Office of Net Assessment, noted that “most of the game is not directly aimed at checkmating the opponent’s king. Instead, the early and middle parts of the contest are about building a more advantageous position from which checkmating the opponent almost plays itself out.” Indeed this is why most competitive games of chess end not in checkmate, but rather concession or a draw. The player on the losing end knows that he or she will lose, perhaps in a finite number of moves.
Recently, the Chinese political and military leadership established a new unit within the PLA to enhance its cyber operations capabilities, space operations and cyber espionage. This new unit, called the “Strategic Support Force,” is part of a larger military reorganization program. In some ways, it might be seen as a counter to the establishment in the United States of U.S. Cyber Command. Along with hoped for improvements to China’s already formidable cyber offensive and defensive capabilities, the unit will also focus on space assets and global positioning services, as well as interference with RADAR and communications. This is a clear sign of the importance that the leadership places on fighting and winning in the information domain.
Beyond its military activities, China’s information control system remains critical to ensuring regime survival. However, understanding this system is made more difficult by the fact that the PRC goes to great lengths to “deliberately and systematically attempt to control how China is understood by both foreigners and Chinese alike,” according to Christopher Ford. He goes on to note:
The modern Chinese information space remains a controlled one, subject to pervasive government monitoring and censorship, widespread and increasingly sophisticated methods of media-savvy opinion management, and the ever-present possibility that the citizenry will face penalties for venturing too far beyond the bounds of the CCP’s official line.
Diplomatic and international policies are also built around giving China maneuvering room to interpret norms, rules and standards to serve domestic needs, principally through the primacy of state sovereignty. China must constantly seek to balance economic growth with maintaining the Party’s grip on power. Not only is Internet usage controlled and censored, but it is also a tool for state propaganda. Chinese “journalists” are, to a large degree, arms of the Chinese propaganda system, transmitting the official “party line” to the population, while at the same time providing feedback “to the leaders on the public’s feelings and behavior.”
Chinese authorities use a number of techniques to control the flow of information. All Internet traffic from the outside world must pass through one of three large computer centers in Beijing, Shanghai and Guangzhou – the so-called “Great Firewall of China.” Inbound traffic can be intercepted and compared to a regularly updated list of forbidden keywords and websites and the data blocked.
Within China, the government heavily regulates and monitors Internet service providers, cafes and university bulletin board systems. It requires registration of websites and blogs, and has conducted a number of high profile arrests and crackdowns on both dissidents and Internet service providers. This “selective targeting” has created an “undercurrent of fear and promoted self-censorship.” The government employs thousands of people who monitor and censor Internet activity as well as promote CCP propaganda.
While the CCP retains the ability to shut down entire parts of the information system, to include Internet, cell phone, text messaging and long-distance communication, it truly prefers to “prevent such incidents from occurring in the first place. And here lies the real strength of the system.” The “self-censorship that the government promotes among individuals and domestic Internet providers is now the primary regulating and control method over cyberspace and has experienced great success.”
China has long been rightfully accused of being a state sponsor of cybercrime and intellectual property theft . This has led to a high level of domestic cybercrime “due in large part to rampant use and distribution of pirated technology,” which creates vulnerabilities. It is estimated that 54.9 percent of computers in China are infected with viruses, and that 1,367 out of 2,714 government portals examined in 2013 “reported security loopholes.” Chinese networks themselves, by virtue of their size and scope, may represent a gaping vulnerability.
Options for the U.S.
Both the 2015 National Security Strategy and 2015 DoD Cyber Strategy state that the U.S. desires to “deter” or “prevent” China from using cyberspace to conduct malicious activity. To do so, the United States may want to consider strategies which have the following desired outcomes:
- Build up Chinese confidence that they are achieving their goals and devote resources to attacking networks where the United States wants them to be;
- Increase ambiguity in China’s understanding of the information they are able to acquire;
- Introduce doubt in China believing it has the ability to disrupt American information networks; and
- Force China to expend more resources focused inward to controlling information within China that threatens Communist Party control.
Unlike the other domains, cyberspace is entirely man-made and the physical properties which characterize it can be altered, almost at will and instantaneously. Traditional geographic constraints do not apply, and we can alter the cyber strategic geography to reinforce American competitive advantages that can aid in achieving some of the goals mentioned above.
For example, many American networks that interest Chinese cyber forces reside on public and commercial Internet service provider (ISP) backbones, such as those owned by Verizon and AT&T, and use commercially available equipment, like Cisco routers. We like to think of “cyberspace” or “the Internet” as being a “global commons,” (see the 2015 NSS), but in reality, nearly all the physical infrastructure and equipment is privately owned and subject to manipulation. The information itself travels on electrons, which can also be manipulated.
The U.S. might develop alternative information pathways and networks, perhaps solely owned and operated by the government or military and not connected to the public ISP backbone. By keeping the existence of a separate network a secret, China may continue to devote resources to attacking and exploiting existing government networks residing on public ISP’s. Alternatively, the U.S. could permit China to acquire access to this surreptitious network in order to feed it deceptive information. In either case, the Chinese regime’s confidence in its ability to disrupt or deceive U.S. information networks could be placed in doubt at a time of our choosing.
Existing information networks could be made more resilient. Peter Singer recommends that we think about resilience in terms of both systems and organizations. He identifies three elements underpinning resiliency: the capacity to work under degraded conditions, the ability to recover quickly if disrupted, and the ability to “learn lessons to better deal with future threats.”
The DoD can also play a role by establishing more consistent network security standards. Cleared defense contractors (CDC), such as Lockheed Martin, Northrup Grumman and Boeing for example, are priority targets for espionage. The DoD can leverage its buying power to mandate accountability, not only for the products developed by the contractors, but also for the security of the information networks they use. It can work to bring “transparency and accountability to the supply chain” to include using agreed-upon standards, independent evaluation, and accreditation and certification of trusted delivery systems. It should address supply chain risk mitigation best practices to all contracting companies and the Department. Resiliency, risk mitigation and security can reduce China’s confidence that it can successfully execute system sabotage or offensive deterrence.
Another strategy might be to develop capabilities that permit the U.S. to execute cyber blockades or create cyber exclusion zones. A cyber blockade is a “situation rendered by an attack on cyber infrastructure or systems that prevents a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data beyond a geographical boundary.” Alison Lawlor Russell has researched the potential of blockades, carefully examining case studies of Russian attacks on Georgia in 2008 and Estonia in 2012, and comparing them to more traditional maritime blockades and “no fly zones.” She notes that it is a “legitimate tool of international statecraft … consistent with other types of blockades” and can be, though not always, considered an act of war.” Cyber exclusion zones seek to deny a specific area of cyberspace to the adversary, sometimes as a form of self-defense.
As previously stated, China’s information strategy is designed foremost to ensure regime survival. It has erected a massive information control system for the purpose of monitoring, filtering and controlling information within China and between China and the world. The Chinese Communist Party spends more money and resources on domestic security and surveillance than the PLA. Clearly, in the minds of the Chinese Communist Party, information control is a critical vulnerability. Therefore strategies which seek to keep China focused inward may be advantageous. The U.S. might invest in technologies which can be easily inserted into the Chinese market that encrypt communication or permit Chinese users to bypass government monitors. Targeting China’s information control regime should align with current and historic cultural proclivities. For example, environmental degradation, corruption and an urban-rural divide are areas of concern for the Chinese people. Sophisticated highlighting of these issues put pressure on the Communist Party.
The U.S. will not be as successful if does not address the modern, “informationized” concept of war. This should not be taken as a call to change our understanding of war or its nature. War remains violent and brutal, and should be avoided when possible. But the use of information to exploit the adversary and achieve strategic advantage is not being addressed by strategic and military planners as well as it might. Information capabilities in the electromagnetic spectrum, cyberspace, and elsewhere remain stove-piped and walled off from planners. The Department of Defense (and the U.S. government) continues to treat information as a separate compartmented capability rather than treat it holistically – a resource that supports our national security.
The 2015 DoD Cyber Strategy does make mention of force planning, to include the training and equipping of cyber forces. However, cyberspace is just one part of the information domain. We need to better integrate the growth in advanced technology into planning, not just acquisition. We need to consider the impact of dual use technology and its proliferation worldwide, not just to China. We must consider the implications of Chinese information technology companies providing goods and services in the U.S. – especially to the U.S. government. The DoD should develop human capital investment strategies that leverage America’s strengths, and consider new ways to recruit, train and keep the best and brightest in the military, intelligence and national security communities. Just as the “space race” of the Cold War ushered in the modern “Information Age,” .
China’s use of cyberspace operations to support her strategic goals is like the canary in the coal mine. While the U.S. maintains several competitive advantages, it is clear that China is investing large amounts of time, energy, people and resources to achieve her strategic desires, probably within our lifetime. Yet there is reason for the U.S. to be hopeful. It engaged in a long-term competition with the Soviet Union, and was ultimately victorious. This competition was not so long ago, and America has a wealth of talented veterans in the military, civilian and academic worlds who know what it takes to engage in a long-term competition with a rival while trying to avoid a shooting war.
 Jacqueline N. Deal, “Chinese Concepts of Deterrence and Their Practical Implications for the United States,” (Washington, DC: Long Term Strategy Group, 2014).
 Timothy L. Thomas, “China’s Concept of Military Strategy,” Parameters 44, no. 4 (2014-15).
 Francois Jullien, The Propensity of Things: Toward a History of Efficacy in China (New York: Zone Books, 1999). p. 34-38.
 Barry D. Watts, “Countering Enemy Informationized Operations in Peace and War,” (Washington, DC: Center for Strategic and Budgetary Assessments, 2014).
 Timothy L. Thomas, Three Faces of the Cyber Dragon: Cyber Peace Activist, Spook, Attacker (Ft. Leavenworth: Foreign Military Studies Office, 2012).
 Joe McReynolds et al., “Termite Electron: Chinese Military Computer Network Warfare Theory and Practice,” (Vienna, VA: Center for Intelligence Research and Analysis, 2015).
 Timothy L. Thomas. China’s Cyber Incursions. Fort Leavenworth: Foreign Military Studies Office, 2013.
 Watts, “Countering Enemy Informationized Operations in Peace and War.”
 (Rajagopalan 2016)
 Christopher A. Ford, China Looks at the West: Identity, Global Ambitions, and the Future of Sino-American Relations (Lexington: University of Kentucky Press, 2015). p. 13-14
 Rebecca MacKinnon,. “Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China.” Public Choice 134 (2008): 31-46.
 Ford, p. 19-21.
 Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.” The New York Times. April 7, 2010.
 Thomas Lum, , Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress, Washington, D.C.: Congressional Research Service, 2013.
 Ford, p. 32.
 Ibid. P. 38
 Amy Chang. Warring State: China’s Cybersecurity Strategy. Washington, D.C.: Center for a New American Security, 2014.
 P.W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (New York: Oxford University Press, 2014). p. 170-171
 Ibid., p. 202-205.
 Alison Lawlor Russell, Cyber Blockades (Washington DC: Georgetown University Press, 2014). p. 144-145.
 Ibid., p. 146-147.