Pub Date : 2021-09-07DOI: 10.21140/mcuj.20211202008
Stephen M. Gordon, W. Yates, Andrew Gordon
Abstract:Nothing connects people more powerfully than well-told stories. Humans have been telling each other stories since long before they could write them down. Sharing stories is a critical part of building trust with others, and that trust is essential to creating meaningful connections with people. Great stories have structure and purpose; they appeal to our deepest emotions and are most compelling when they challenge or change our perceptions of reality. There are rules to the methods and techniques that create great stories. This article explores the benefits and challenges of applying successful storytelling techniques to designing wargame narratives that balance creative ambitions with achievable timelines. Wargames that incorporate such techniques will surface new trends and better inform future conflict planning.
{"title":"Wargaming Development Series: Developing Impactful Wargame Narratives through Storytelling","authors":"Stephen M. Gordon, W. Yates, Andrew Gordon","doi":"10.21140/mcuj.20211202008","DOIUrl":"https://doi.org/10.21140/mcuj.20211202008","url":null,"abstract":"Abstract:Nothing connects people more powerfully than well-told stories. Humans have been telling each other stories since long before they could write them down. Sharing stories is a critical part of building trust with others, and that trust is essential to creating meaningful connections with people. Great stories have structure and purpose; they appeal to our deepest emotions and are most compelling when they challenge or change our perceptions of reality. There are rules to the methods and techniques that create great stories. This article explores the benefits and challenges of applying successful storytelling techniques to designing wargame narratives that balance creative ambitions with achievable timelines. Wargames that incorporate such techniques will surface new trends and better inform future conflict planning.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133793341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-07DOI: 10.21140/mcuj.20211202003
E. Walters
Abstract:Given the emphasis to employ wargaming in professional military education, how can instructors in the schoolhouses, operating forces, and supporting establishment—particularly those who are not experienced wargamers themselves—go about it? This article explains the necessity of crafting desired learning outcomes to selected, modified, or in-house designed serious wargames with the assistance of accomplished experts. Summarizing relevant recent scholarship, it provides foundational terminology and concepts that facilitate collaborative conversations, as well as offers advice regarding common but avoidable pitfalls of this dynamic and immersive teaching method.
{"title":"Wargaming in Professional Military Education: Challenges and Solutions","authors":"E. Walters","doi":"10.21140/mcuj.20211202003","DOIUrl":"https://doi.org/10.21140/mcuj.20211202003","url":null,"abstract":"Abstract:Given the emphasis to employ wargaming in professional military education, how can instructors in the schoolhouses, operating forces, and supporting establishment—particularly those who are not experienced wargamers themselves—go about it? This article explains the necessity of crafting desired learning outcomes to selected, modified, or in-house designed serious wargames with the assistance of accomplished experts. Summarizing relevant recent scholarship, it provides foundational terminology and concepts that facilitate collaborative conversations, as well as offers advice regarding common but avoidable pitfalls of this dynamic and immersive teaching method.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201008
Michael Cserkits
Abstract:In this article, the author will examine the representation of armed forces in cinematic productions and anime, with case studies of the United States and Japan. The sample will consist of a movie that has a clear involvement of the United States armed forces and of an anime series that was cofinanced by the Japanese Self-Defense Forces. The analytical method used will be textual analysis, in combination with videography, a method that supports interaction analysis of moving images. In comparing those two different approaches of the armed forces of Japan and the U.S. military, the author hopes to shed light on not simply the representation of the groups but also desired self-identification of the respective armed forces.
{"title":"Representation of Armed Forces through Cinematic and Animated Pieces: Case Studies","authors":"Michael Cserkits","doi":"10.21140/MCUJ.20211201008","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201008","url":null,"abstract":"Abstract:In this article, the author will examine the representation of armed forces in cinematic productions and anime, with case studies of the United States and Japan. The sample will consist of a movie that has a clear involvement of the United States armed forces and of an anime series that was cofinanced by the Japanese Self-Defense Forces. The analytical method used will be textual analysis, in combination with videography, a method that supports interaction analysis of moving images. In comparing those two different approaches of the armed forces of Japan and the U.S. military, the author hopes to shed light on not simply the representation of the groups but also desired self-identification of the respective armed forces.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201005
Lev Topor, A. Tabachnik
Abstract:Cyber information warfare (IW) is a double-edged sword. States use IW to shape the hearts and minds of foreign societies and policy makers. However, states are also prone to foreign influence through IW. This assumption applies mainly to liberal democratic societies. The question examined in this article is how Russia uses IW on other countries but protects itself from the same activities. The authors' main argument is that while Russia executes influence operations and IW in cyberspace, it strives for uncompromising control over its domestic cyberspace, thus restricting undesirable informational influence over its population.
{"title":"Russian Cyber Information Warfare: International Distribution and Domestic Control","authors":"Lev Topor, A. Tabachnik","doi":"10.21140/MCUJ.20211201005","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201005","url":null,"abstract":"Abstract:Cyber information warfare (IW) is a double-edged sword. States use IW to shape the hearts and minds of foreign societies and policy makers. However, states are also prone to foreign influence through IW. This assumption applies mainly to liberal democratic societies. The question examined in this article is how Russia uses IW on other countries but protects itself from the same activities. The authors' main argument is that while Russia executes influence operations and IW in cyberspace, it strives for uncompromising control over its domestic cyberspace, thus restricting undesirable informational influence over its population.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201006
Don Bishop
Abstract:Disinformation, the disruptive effects of social media, and the prospect of information warfare increasingly preoccupy national security thinkers. In the twentieth century, years of prewar and wartime propaganda by the Axis powers and the Soviet Union made the World Wars and the Cold War longer and more costly. In this century, China and North Korea represent two nations that have propagandized their populations for 70 years, hardening them against informational initiatives. What are the lessons? How should the United States assemble a strategy to counter propaganda's effects?
{"title":"Propagandized Adversary Populations in a War of Ideas","authors":"Don Bishop","doi":"10.21140/MCUJ.20211201006","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201006","url":null,"abstract":"Abstract:Disinformation, the disruptive effects of social media, and the prospect of information warfare increasingly preoccupy national security thinkers. In the twentieth century, years of prewar and wartime propaganda by the Axis powers and the Soviet Union made the World Wars and the Cold War longer and more costly. In this century, China and North Korea represent two nations that have propagandized their populations for 70 years, hardening them against informational initiatives. What are the lessons? How should the United States assemble a strategy to counter propaganda's effects?","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201007
Phillip M. Zeman
Abstract:Social antiaccess/area-denial (A2/AD) describes the threat posed to U.S. and Western security by sociopolitical and socioeconomic means, primarily by China and Russia. This concern focuses on actions by China and Russia designed to fracture American and Western societies through information, disinformation, economic coercion, and creating economic dependencies—in many cases capitalizing on target nation propensities to accomplish strategic ends. Through these ways, China and Russia hope to prevent the will or ability of American or Western states to respond to aggressive acts.
{"title":"Social Antiaccess/Area-Denial (Social A2/AD)","authors":"Phillip M. Zeman","doi":"10.21140/MCUJ.20211201007","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201007","url":null,"abstract":"Abstract:Social antiaccess/area-denial (A2/AD) describes the threat posed to U.S. and Western security by sociopolitical and socioeconomic means, primarily by China and Russia. This concern focuses on actions by China and Russia designed to fracture American and Western societies through information, disinformation, economic coercion, and creating economic dependencies—in many cases capitalizing on target nation propensities to accomplish strategic ends. Through these ways, China and Russia hope to prevent the will or ability of American or Western states to respond to aggressive acts.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132059175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201003
Kyleanne M Hunter, Emma Jouenne
Abstract:Online misogyny is an under-studied form of information warfare. Often dismissed as "boys will be boys," online misogyny has been allowed to percolate and create communities that have far-reaching impacts. The impacts of online misogyny are not confined to the internet. In this article, the authors show how the ubiquitous nature of online misogyny poses a national security threat. We explore three diverse case studies: the United States military, the incel movement, and ISIS to demonstrate the far-reaching nature of the security threat. Though the nature of the security threats is different, the intervening cause—unchecked online misogyny—is the same.
{"title":"All Women Belong in the Kitchen, and Other Dangerous Tropes: Online Misogyny as a National Security Threat","authors":"Kyleanne M Hunter, Emma Jouenne","doi":"10.21140/MCUJ.20211201003","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201003","url":null,"abstract":"Abstract:Online misogyny is an under-studied form of information warfare. Often dismissed as \"boys will be boys,\" online misogyny has been allowed to percolate and create communities that have far-reaching impacts. The impacts of online misogyny are not confined to the internet. In this article, the authors show how the ubiquitous nature of online misogyny poses a national security threat. We explore three diverse case studies: the United States military, the incel movement, and ISIS to demonstrate the far-reaching nature of the security threat. Though the nature of the security threats is different, the intervening cause—unchecked online misogyny—is the same.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132336206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201009
A. Patrick
Abstract:This article explores the effects of social media penetration and internet connectivity on the likelihood that parties within a conventional intrastate conflict will enter negotiations. The proliferation of advanced information communications technologies, coupled with violent political collective action, calls for further examination of how these variables intertwine to affect conflict patterns. Beginning with a discussion on communications technology and the bargaining model of war, the author presents a theoretical model that seeks to create a foundation that can be used for future empirical testing.
{"title":"Streaming the Battlefield: A Theory of the Internet's Effect on Negotiation Onset","authors":"A. Patrick","doi":"10.21140/MCUJ.20211201009","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201009","url":null,"abstract":"Abstract:This article explores the effects of social media penetration and internet connectivity on the likelihood that parties within a conventional intrastate conflict will enter negotiations. The proliferation of advanced information communications technologies, coupled with violent political collective action, calls for further examination of how these variables intertwine to affect conflict patterns. Beginning with a discussion on communications technology and the bargaining model of war, the author presents a theoretical model that seeks to create a foundation that can be used for future empirical testing.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128811033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-28DOI: 10.21140/MCUJ.20211201004
Glen Segell
Abstract:The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel's adversaries do not share the same policies with regular cyber and terror attacks against civilian, government, and military targets. There is consistency in all four threats. Fencing, active defense, and preventive and preemptive strikes dominate.
{"title":"Consistency of Civil-Military Relations in the Israel Defense Forces: The Defensive Mode in Cyber","authors":"Glen Segell","doi":"10.21140/MCUJ.20211201004","DOIUrl":"https://doi.org/10.21140/MCUJ.20211201004","url":null,"abstract":"Abstract:The Israel Defense Forces (IDF) has four battle threats, where cyber is equitable to conventional (state), subconventional (nonstate), and nonconventional. An escalation in one could lead to an overall escalation in all. In the political areas and, by extension, in civil-military relations (CMR), the IDF has a defensive mode as routine, while an offensive mode is manifest rarely in emergencies and war. The IDF is engaged in a total war in a defensive mode yet a limited war in the offensive mode as Israel's adversaries do not share the same policies with regular cyber and terror attacks against civilian, government, and military targets. There is consistency in all four threats. Fencing, active defense, and preventive and preemptive strikes dominate.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116797832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.21428/CB6AB371.21E5B7E6
J. Forest
Abstract:The digital age has greatly expanded the terrain and opportunities for a range of foreign influence efforts. A growing number of countries have invested significantly in their capabilities to disseminate online propaganda and disinformation worldwide, while simultaneously establishing information dominance at home. This introductory essay provides a brief examination of terms, concepts, and examples of these efforts and concludes by reviewing how the articles of this issue of the Journal of Advanced Military Studies contribute to our understanding of political warfare and propaganda.
{"title":"Political Warfare and Propaganda: An Introduction","authors":"J. Forest","doi":"10.21428/CB6AB371.21E5B7E6","DOIUrl":"https://doi.org/10.21428/CB6AB371.21E5B7E6","url":null,"abstract":"Abstract:The digital age has greatly expanded the terrain and opportunities for a range of foreign influence efforts. A growing number of countries have invested significantly in their capabilities to disseminate online propaganda and disinformation worldwide, while simultaneously establishing information dominance at home. This introductory essay provides a brief examination of terms, concepts, and examples of these efforts and concludes by reviewing how the articles of this issue of the Journal of Advanced Military Studies contribute to our understanding of political warfare and propaganda.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}