National Security Primer For AY21
National Security Primer For AY21
National Security Primer For AY21
STRATEGY PRIMER
Created by a team at
The National War College
National War College
National Defense University
The National War College at the National Defense University
in Washington, DC, is the premier Department of Defense joint
professional military education institution for national security
strategy. Its mission is to educate future leaders of the Armed Forces,
Department of State, and other civilian agencies for high-level policy,
command, and staff responsibilities by conducting a senior-level
course of study in the theory, development, and assessment of
national security strategy.
The 10-month curriculum emphasizes the joint and
interagency perspective. Reflecting this emphasis, 59 percent of the
student body is composed of equal representation from the land, sea,
and air Services (including the Marine Corps and Coast Guard). The
remaining 41 percent is drawn from the Department of State and
other Federal departments and agencies, as well as international
fellows from a number of countries. Graduates earn a master of
science in national security strategy.
The NWC commandant, a military officer of one-star rank,
occupies a nominative position that rotates among the Army, Navy,
and Air Force. As joint sponsor of the National War College, the
Department of State nominates a Foreign Service Officer with
Ambassadorial rank to serve as the commandant’s deputy and
international affairs adviser.
CONTENTS
PREFACE ......................................................................................................................... iii
CHAPTER I
OVERVIEW .................................................................................................................. 1
• Introduction to National Security Strategy
• What Is National Security Strategy?
• Relationship of the National Security Strategy to specific national security strategies
• The Role of the National Security Council (NSC) and the NSC Staff
• Introduction to Strategic Logic
CHAPTER II
ANALYZING THE STRATEGIC SITUATION .......................................................... 6
• General
• Assumptions are Pivotal
• The International and Domestic Contexts
• Interests, Threats, and Opportunities
• Personal and Cognitive Bias Awareness
CHAPTER III
DEFINING THE DESIRED ENDS............................................................................. 10
• The Role of National Interests in Defining Ends.
• Political Aim(s)
• Specific Objectives
CHAPTER IV
IDENTIFYING AND/OR DEVELOPING THE MEANS.......................................... 12
• The Means of National Security Strategy
• Elements of Power
• Institutions and Actors
• The Instruments of Power (DIME)
• Interrelationships among the Three Components of Means
• Employing Means/Developing Means
CHAPTER V
DESIGNING THE WAYS .......................................................................................... 21
• General
• Fundamental Strategic Approaches
• Modes of Action
• Matching Institutions/Actors with Instruments
• Orchestration
i
CHAPTER VI
ASSESSING THE COSTS, RISKS AND RESULTS ................................................. 25
• Iterative Assessment
• Evaluating Costs
• Identifying Risks
• Viability Assessments
• Red-Teaming
• Course Corrections
CHAPTER VII
CONCLUSION ............................................................................................................ 28
FIGURES .......................................................................................................................... 35
The NWC National Security Strategy Framework
National Security Strategy Model for Relating Ends, Ways, and Means
ii
PREFACE
1. Purpose
A National Security Strategy Primer provides students with a common point of reference for
material covered in the National War College curriculum. We use the Primer as a point of
departure for discussions about strategy, and as a principal tool for understanding and achieving
core course learning objectives. The Primer specifically addresses the concept of national
security strategy and an approach for developing it, one that should be studied closely. In
addition to using current joint and service-specific doctrine, extant procedures, and existing
policy guidance, A National Security Strategy Primer uses the literature on national security
strategy found in academia, the business sector, and elsewhere. While the Primer is geared
towards the National War College core curriculum, it can also serve as a useful tool for
interagency practitioners charged with designing or assessing national security strategies.
2. Scope
This Primer details the elements of strategic logic taught at The National War College and
focuses on national security strategy development. While the elements of strategic logic are
relevant and applicable to strategy-making in general, the focus herein is not specifically military
or resource strategies, but the broader concept of national security strategy.
3. Application
The guidance in this Primer should inform each student’s course of study at the National War
College. Developing coherent and effective strategy is difficult due to the complexity and
uncertainty inherent in any strategic challenge. 1 Unraveling the complexity and managing the
uncertainty requires an ability to think strategically about the problem at hand. Thinking
strategically entails applying strategic logic. A National Security Strategy Primer is an important
restatement of the principal aspects of strategic logic. Students should be mindful that other
useful approaches to strategy-making at the national security level exist. Some are covered
elsewhere in the curriculum, and are employed in various departments and agencies of the
executive branch. Where available, this Primer relies on definitions contained in JP 1-02,
Department of Defense Dictionary of Military and Associated Terms. Should a student see
material discrepancies between the Primer and other sources, s/he should bring them to the
attention of the Faculty Seminar Lead (FSL).
4. Note
A National Security Strategy Primer is neither official policy nor doctrine. It is the product of a
collaborative effort by members of the National War College faculty, staff and student body.
1
A wide variety of definitions for strategy exist. We are guided, throughout this Primer, by the definition of
strategy as “A prudent idea or set of ideas for employing the instruments of national power in a synchronized and
integrated fashion to achieve theater, national, and/or multinational objectives.” From: DOD Dictionary of Military
and Associated Terms, http://www.dtic.mil/doctrine/new_pubs/dictionary.pdf as of August 2017, p. 220.
iii
The Primer is one tool among many designed to assist students in mastering the National War
College curriculum.
ii
CHAPTER I
OVERVIEW
1. Introduction to National Security Strategy. The National War College (NWC) National
Security Strategy Primer provides information and guidance on the development of national
security strategy, which includes: 1) the National Security Strategy (NSS) signed by the
President of the United States setting out the overarching strategic direction for the country; and
2) focused national security strategies crafted to deal with specific security challenges. 2 The
publication is intended to assist students in better understanding the complex process of
designing the national security strategies from which all subsequent security planning should
flow. It provides an introduction to the elements of strategic logic that frame the development of
strategy at the highest levels of the national security apparatus. It can serve as a useful
framework outside of NWC, but is not intended to replace processes or procedures established at
other entities.
National security strategy is an iterative process, which begins with assessing a security
situation that affects national interests. From this starting point it defines achievable, desirable
“ends” that will preserve, protect or advance national interests. Those ends entail both the
political aim, or the desired condition the strategy intends to attain, and the specific objectives
that must be accomplished to achieve the political aim. From this perspective, national security
strategy bridges the gap from the current state of affairs or condition to the desired state of
affairs or condition, articulated via the “political aim.” The national security strategist identifies
what specific objectives, if achieved, will support the political aim, and also what “ways” (how
to proceed toward achieving the political aim) and “means” (tools, resources, and/or
capabilities) will be required to enact the strategy. Note that the term “ways” may be construed
broadly to refer to the fundamental strategic approach to be employed or, more narrowly, to how
the selected means will be used to achieve the political aim. Finally, throughout the strategy’s
development and implementation, the national security strategist must iteratively and
objectively assess its viability.
2
Many national strategies covering a wide range of issues are prepared within the U.S. Government. Examples are:
A National Strategy for Counterterrorism and A National Strategy for the Arctic Region (see:
https://obamawhitehouse.archives.gov/blog/2011/06/29/national-strategy-counterterrorism and:
https://obamawhitehouse.archives.gov/sites/default/files/docs/nat_arctic_strategy.pdf). Herein they are referred to
variously as associated, subsidiary, functional and regional strategies. In most cases they address in more detail
interests identified in the National Security Strategy (NSS) and while not subordinate in a strict sense, they generally
are consistent with direction provided in the NSS.
1
3. Relationship of the National Security Strategy to specific national security strategies. In
1986, the Goldwater-Nichols Defense Department Reorganization Act put in place a more
deliberate, structured, and formalized approach to developing an overarching national security
strategy. The Act directs the President to submit an annual report on the national security
strategy of the United States to Congress. That report must set forth the national security strategy
of the United States; detail the country’s vital worldwide national security interests, goals, and
objectives; and outline the proposed short- and long-term uses of national power. President
Ronald Reagan submitted the first of these reports, titled National Security Strategy of the United
States in 1987. 3
Strategists who help develop the NSS must understand its pivotal role in the creation of
subsidiary strategies and plans. They should help prepare the NSS with enough wisdom, insight
and judgment to assist strategists and planners across the executive branch tasked with
developing strategies and plans to resolve specific security challenges. As the Army War
College’s Harry R. Yarger emphasized,
Associated regional and functional strategies must be in support of national interests and
consistent with the broad outline of the National Security Strategy and applicable derivative
strategies. Those charged with developing these subsidiary strategies must be mindful of the
overarching strategic concepts laid out in the NSS. Alternatively, when tasked with developing a
strategy, the strategist could start with a clean sheet of paper, work through the elements of
strategic logic, and assess whether the strategy produced aligns with the overarching strategic
concepts provided by the NSS. If not, the strategist should then be prepared to reevaluate the
strategy, or make the case for a strategy that diverges from the NSS.
The relationship between the overarching National Security Strategy and associated functional
and regional strategies is illustrated in the following two examples.
During the forty-plus years of the Cold War, the United States pursued a national
security strategy of containment. Its scope and scale were enormous, driving
global U.S. policy for decades and absorbing tremendous amounts of time, money
and effort. The overarching strategy of containment served as the guiding
3
The White House released the most recent National Security Strategy of the United States on December 18th, 2017.
All 17 National Security Strategies of the United States are archived at http://nssarchive.us/.
4
Harry R. Yarger, “Towards A Theory of Strategy: Art Lykke and the Army War College Strategy Model,” in U.S.
Army War College Guide to National Security Issues, Volume I: Theory of War and Strategy, 3d ed. (Carlisle, PA:
U.S. Army War College, 2008), p. 45.
2
framework for subsidiary strategies aimed at addressing specific regional and
functional security challenges. Thus strategies such as the Marshall Plan for the
reconstruction of Europe, the American wars in Korea and Vietnam, and the U.S.
space program were guided by the overarching containment strategy.
4. The Role of the National Security Council (NSC) and the NSC Staff. The National
Security Council (NSC) is the President’s principal forum for considering and coordinating
national security and foreign policy matters with his senior national security advisors and cabinet
officials. The NSC staff, headed by the National Security Adviser, serves as the President’s
national security and foreign policy staff within the White House. Typically, the NSC is
responsible for developing the overarching National Security Strategy. Specific regional and
functional strategies, however, often originate in particular executive departments, agencies or
services. At some point, proposed strategies will make their way into the NSC’s interagency
review and coordination process, and will go before the NSC itself for final review and approval.
Their genesis, however, and their early drafts will likely be the work of a single strategist or
small team working within a component of one of the executive departments, agencies, or
services. That reality reinforces the need for a cadre of professionals across the national security
establishment capable of developing national security strategies. Students should be mindful that
one of the criteria often used to assess their NWC papers is whether the product is of sufficient
quality for review by the NSC Staff without revision.
5
The 17 National Security Strategies of the United States are accessible at http://nssarchive.us. The site also
includes links to subordinate strategies (i.e., the National Defense Strategy and National Military Strategy). The site
is maintained by the Taylor Group, a national security consulting firm unaffiliated with the U.S. Government or any
foreign government.
3
Applying this logic demands the highest levels of critical thinking, insight, and judgment, as well
as the courage to act on that judgment. Each of the elements of strategic logic entails numerous
questions that should be addressed to produce an effective strategy. Unfortunately, the strategist
can find definitive answers to only some of those questions. For the rest, the strategist must rely
on assumptions. In developing strategies, unknown factors often outnumber those that are
known. Thus, the strategist always operates in an atmosphere of widespread uncertainty and
ambiguity. Carl von Clausewitz, the early nineteenth century Prussian general and military
theorist who features prominently in the NWC curriculum, spoke to the qualities the strategist
needs to operate in this atmosphere when he opined on military genius:
While listing the elements of strategic logic makes that logic appear linear, developing strategy
actually is a much more complex, multi-dimensional, iterative, and often imprecise process. One
useful way to visualize the interrelationships of the elements of strategic logic is shown in the
accompanying diagram. It depicts the strategic situation as a cloud, because like a cloud, it is
amorphous, ever-shifting, and considerably opaque. Comprising that cloud are considerations
such as the problem’s parameters, international and domestic conditions that bear on the
problem, one’s national interests and political aims, threats to those interests and aims (or
opportunities for advancing them), constraints on one’s freedom of action, the most critical
assumptions about the dynamics of the problem confronted, and any other factors important to
the strategic situation that surrounds the problem being addressed. It is essential to maintain
intellectual agility while applying the steps of strategic logic.
6
von Clausewitz, Carl, On War (Princeton University Press, Princeton, New Jersey, 1976) p. 102
4
The key to developing a strategy for dealing with a problem lies in devising an ends-ways-
means-costs/risks relationship that accommodates the strategic situation and will produce the
overall outcome desired. The ends are the political aim(s) sought and their specific objectives,
the means are the resources, power and capabilities available or able to be developed, and the
ways are how means will be used to achieve the ends. Costs are the price one has to pay—
financially and otherwise—to execute one’s strategy, and risks are developments that could go
wrong and work to one’s disadvantage. To emphasize, the diagram portrays the ends-ways-
means-costs/risks as circular rather than linear. The circular relationship stresses the need to
consider each element in relation to all the others. The strategist must consider the ends with
reference to the available means, possible ways, and likely risks and costs. This principle also
applies to each of the other elements of the ends-ways-means-costs/risks formulation. Finally,
the circular relationship indicates that there is no end to the process; the strategist must
continually go back and iteratively reassess the strategy across its execution.
5
CHAPTER II
ANALYZING THE STRATEGIC SITUATION
1. General. Every security challenge occurs within a broader strategic context. Analyzing that
context and the situation, in general, is the first step in applying strategic logic. For the NSS, the
strategic situation encompasses the most important conditions and dynamics that bear on current
and future U.S. security across the globe. For an associated regional or functional strategy, the
strategist must assess how widely to cast the analytical net. As with the NSS, the goal is to
capture the most important conditions and dynamics that bear on the challenge being addressed.
Critically, the strategist must be discerning with the available information. Too much peripheral
information can obscure rather than clarify the strategic situation. As importantly, the strategist
must assess the information’s ramifications for possible strategic approaches. As ever, the
strategist must answer both the “what” and the “so what” questions.
2. Assumptions are Pivotal. Assumptions, which are suppositions taken as true in the absence
of proof, are essential in the analysis of the situation. Despite today’s information-rich
environment, there are significant limits on what anyone can know about any particular strategic
situation. Consequently, strategists must address uncertainties with assumptions. Strategies are
necessarily built on assumptions about opponent capabilities, the dynamics of the international
situation, and the most important aspects of one’s domestic situation. Assumptions also help
define one’s own interests, what threatens them, and how. Assumptions about an opponent’s
interests and intentions are equally important, as are assumptions about the cause and effect of
potential actions, the role of time, and the likely outcomes, costs and risks of those actions. In
short, assumptions enable and shape the development of any successful national security
strategy. Made purposefully, deliberatively, and with appropriate caution, they can promote
strategic success. Made unwittingly or with inadequate reflection, they can undermine the entire
strategic process. Perhaps the most dangerous assumptions are the ones made unwittingly when
one fails to question what one seemingly knows to be true. Assumptions surface throughout the
development of a strategy, but the strategist should identify explicitly and separately those
assumptions most essential to a strategy’s success, along with their implications and some
explicit characterization of the strategist’s level of confidence in each of those key assumptions.
Assumptions should be identified and assessed throughout the strategic logic process.
3. The International and Domestic Contexts. The strategic logic process begins with an
assessment of the international and domestic contexts or strategic environment.
• International Context. Elements in the international context powerfully shape both the
situation at hand and possible approaches to dealing with it. The strategist must identify
the most important regional and global conditions and dynamics that bear on the nature
of the situation at hand and the range of potential strategic responses.
• Domestic Context. A state’s own domestic context can either enhance or inhibit the
ability to develop a strategy for a particular challenge. Thus, the strategist must identify
domestic political, economic, bureaucratic, social/cultural, and technological factors that
are likely to help or hinder both the strategy-making effort, and its viability once
executed. Particularly important is the strategist’s judgment of how robust a strategic
6
effort the nation’s economy can support, and at what point the national will might falter
in the face of a costly and protracted strategic effort.
• Constraints. Constraints are tangible and intangible factors that limit strategic freedom
of action. Insufficient means, whether in the form of diminished elements of power or
weak institutions and actors, are often difficult to overcome. The element of time
potentially poses a constraint on action. Also, policy, legal and normative boundaries can
present constraints, whether imposed from within the state or externally. Explicitly
stating the most important constraints on freedom of action helps ensure the strategist
takes each into account fully when designing the strategic approach.
4. Interests, Threats and Opportunities. National interests are best understood as fundamental
and enduring needs or wants the pursuit of which promote a state’s well-being and guide its
actions. National interests can be categorized broadly as: security, prosperity, and principles (or
values). For the sake of clarity, interests should not be viewed as finite achievable ends, but
instead as enduring, unachievable guides. For example, a state may determine its security is not
immediately at risk and thus place emphasis on the pursuit of other interests. Such was the
situation in the U.S. following the collapse of the Soviet Union. This does not mean that security
is no longer an interest or that is has been “achieved” but instead that, based on the current
conditions, pursuit of additional security may not be as important as needs/wants associated with
other interests. When context changes, security may again take primacy.
Often condition statements are used to articulate a state of affairs that is understood to be in the
national interest. For example, a condition statement representative of U.S. interests may be
written as “A United States that is secure, at peace, stable, and prosperous in a world that
respects the rule of law and international norms of behavior.” Condition statements may be
written very broadly like the one above, or more narrowly associated with a specific situation or
event. Whether written as a condition statement or described as a pure interest, strategists must
define precisely and concisely the interest(s) the nation has at stake in the challenge to be
addressed by a national security strategy. Moreover, when dealing with a specific challenge the
strategist should, to the maximum degree possible, refine the interests at stake to those of the
highest priority. This emphasis will keep the strategy tightly focused on what matters most for
the nation.
• Valuing Interests. Having defined the nation’s interests in a particular situation, the
strategist must assess the value of those interests. That evaluation helps determine the
level of energy, effort, and resources to expend in preserving, protecting, or advancing
the interests at stake. There is no generally accepted valuation scale for interests, but the
7
following three-level scale works well. “Vital” interests are ones that a state will use
force or risk war to protect. While survival of the state is certainly a vital interest, there
may be other vital interests at stake even when the survival of the state is not threatened.
That said, given the significant implications connoted by “vital interests,” the strategist
should be very careful in using the term “vital” or in accepting others’ use of the term to
describe interests. An “important” or “major” interest is one that would see the state
weakened if it did not take action to protect or preserve that interest. Finally, a
“peripheral” interest is one that is desirable but is valued less in terms of costs or risks.
Whatever valuation scheme a strategist uses, the definitions of the various levels are
necessarily imprecise and a matter of judgment. As valuation of an interest can change
over time, regularly reassessing the value of interests is essential. Moreover, it is difficult
to value interests in the abstract; thus valuing interests may only become meaningful in a
specific context in which those interests are threatened or in which one has an
opportunity to advance them. Finally, political leaders have in the past and will continue
to differ in their judgments over the valuation of interests (or in their judgements about
threats to those interests). Such differences will almost certainly manifest themselves
during the change from one presidential administration to the next and in multinational
and interagency strategy-making.
• Opportunities. National security strategists should recognize when the strategic situation
affords an opportunity to advance a national interest. Having defined the national
interests at stake in a particular security challenge, the strategist may not see a threat to
those interests. Instead, the situation may present an opportunity to advance the interests
at stake. It is important, however, not to confuse opportunities with the advantages that
derive from dealing successfully with a threat. If a situation presents threats, it likely
doesn’t present opportunities associated with those threats, e.g., opportunities should not
be thought of as the flip-side of threats, the desired state of affairs after successfully
dealing with the threats, or the asymmetric advantages one enjoys for addressing the
threats. Like threats, however, opportunities exist in relation to national interests, and the
strategist should be no less rigorous in defining and distilling opportunities in a concise,
8
coherent strategy. After all, national security strategies for cooperating with one’s allies
and trading partners are usually opportunity-based strategies rather than threat-based.
5. Personal and Cognitive Bias Awareness. Human beings naturally bring with them certain
worldviews that inevitably shape their perceptions. Worldviews are neither inherently good nor
bad. They develop over time, and are shaped by countless factors, to include one’s education,
experiences, values and cultural mores. Worldviews are shaped by assumptions, and since they
inevitably affect one’s ideas and attitudes about strategic-level problems and solutions, they
introduce considerable bias into the strategy development process. Another source of bias is the
fact that strategists tend to agree with people who agree with them, and to over-scrutinize or
dismiss those who do not. The need for social acceptance can lead to in-group bias, just as their
preference for the status quo can inordinately affect their perceptions of change. Past negative
experiences tend to outweigh lessons from positive ones, and people tend to believe that other
people and cultures think like they do. Given the stakes at hand, national security strategists
should be cognizant of such biases, particularly as they apply to themselves.
9
CHAPTER III
DEFINING THE DESIRED ENDS
1. The Role of National Interests in Defining Ends. National interests should be the primary
driver of ends when addressing a security challenge. They also provide the benchmark against
which to assess threats to the nation, or opportunities for advancing the nation’s well-being. Yet
national interests are generally too broad and amorphous to provide a concrete goal for a specific
national security strategy. Strategies that set national interests as their goal run the risk of lacking
a clear aim and thus diffusing effort.
2. Political Aim(s). A security challenge constitutes an external situation that a nation finds
either troubling or promising. The purpose of national security strategy is to reshape the
challenging circumstance into a state of affairs that is either less troubling or more promising.
That desired end-state, or outcome, is the political aim of a national security strategy, and it
provides a well-defined focus for developing the strategy. 7 Identifying the national interest(s) at
stake in a particular strategic challenge clarifies why dealing with that challenge is important.
The political aim defines the outcome the strategist believes will preserve, protect, and/or
advance the national interest(s) at stake. A political aim should be clear, coherent, and
achievable.
In establishing the political aim, the strategist must consider costs, risks, and constraints that
could make that aim less viable. Indeed, in crafting a statement of the political aim for a strategy,
a strategist must remain mindful of outcomes or conditions that must be avoided. If such
outcomes or conditions do exist, they should also be and explicitly articulated in the strategy.
The strategist must also ensure the political aim—the desired outcome—attenuates, if not fully
eliminates, the threat to interests. Where an opportunity to advance interests presents itself, the
strategist must ensure the political aim exploits it.
3. Specific Objectives. Having identified the outcome the strategy aims to achieve—the
political aim—the strategist now has to specify how to reach that goal. To do this, the strategist
develops specific objectives that, when accomplished in combination, will achieve the desired
political aim.
7
In discussing the relationship between war, policy and politics, Clausewitz identifies political aim (translated, at
times, as political object) as the national-level objective. For instance, he says, “The political object is the goal, war
is the means of reaching it, and means can never be considered in isolation from their purpose. “ (Carl von
Clausewitz, Carl, On War (Princeton University Press, Princeton, New Jersey, 1976), edited and translated by
Michael Howard and Peter Paret. p. 87). The conception of political aim used herein follows Clausewitz’s general
logic though we refer to all means available to a nation, not just war.
10
Coherence in a strategy results from a tight linkage between the national interests at stake, the
political aim pursued to secure those interests, and the specific objectives that address threats or
opportunities to achieve the political aim, thereby protecting or furthering national interests.
The most important characteristics of a sound objective are precision and brevity. It must clearly
describe what needs to be accomplished, and it must do so with no wasted verbiage. Ambiguous
objectives fail to provide sufficient focus for the strategy, and verbose objectives open the door
to misperceptions and diversions of effort. There is no standard for how many objectives a
strategist should formulate for a particular security challenge. The nature of both the challenge
and the political aim will shape that. As a general rule, fewer and broader—while still precise—
objectives will help keep the strategy focused on the desired political aim and will address the
most important threats and/or opportunities.
11
CHAPTER IV
IDENTIFYING AND/OR DEVELOPING THE MEANS
1. The Means of National Security Strategy. The third element in strategic logic is
identification of means needed to achieve objectives and produce the desired political aim. In
short, means are the capabilities and resources one can bring to bear in the effort to produce
the desired political aim. Sometimes adequate means are available; other times they must be
developed. There are three components to the means in national security strategy: elements of
power, institutions/actors, and the instruments of power.
Although listing elements makes them appear distinct, they are overlapping and interdependent
and must be considered in relation to one another. They defy simple definition, and their
importance is always relative to a given strategic situation. In general, a state’s natural resources,
geography, economy, infrastructure, and industrial base are traditionally recognized as
“foundational” elements of power—those that are critical for supporting other strategic actions.
Human capital encompasses demographics, which can include population size, birth rates,
immigration trends, and levels of education. Governance refers to matters such as political
structure, effectiveness, and might include the population’s mood, its view of what the nation’s
aims and objectives ought to be, and what sacrifices it is willing to make to achieve them. A
nation’s level of research, development, and technology encompasses a state’s capability to
innovate. Like national will, culture is a particularly broad concept that is difficult to measure but
can play an important role in the state’s ability to build and project power. Culture may also
shape a nation’s international reputation, which reflects the perceptions of foreign institutions,
actors, and individuals. 9
Strategists should evaluate whether their strategies, when implemented, will add to or detract
from their nation’s elements of power. States should avoid embarking on a strategic course of
action if it will ultimately diminish national power rather than preserve or supplement it.
3. Institutions and Actors. National security strategists often look to selected government
institutions and actors, such as the Department of State or Defense, to achieve objectives and
8
“Elements of Power” may also be described as “correlates of power.”
9
Though not included in the chart, in the modern environment, data may also be considered an element of power.
12
produce outcomes that are tied to a strategy’s political aim. Depending
on the situation, however, other institutions and actors may be
appropriate. The accompanying list illustrates a range of public, private,
domestic, international, and other organizations and actors that may
contribute to a strategy’s success through formal, semi-formal, or
informal relationships.
None of the above institutions or actors hold a monopoly on particular instruments of power.
While it is helpful to recognize institutional capabilities, resources, and missions, it can be
counterproductive for strategists to bind any institution or actor too tightly to a specific
instrument. For example, the U.S. Department of Defense is the institution most closely tied to
the U.S. military instrument of power, and most of its capabilities and missions are associated
with the application of the military instrument. However, The DoD can and does also wield the
diplomatic instrument, the information instrument, and at times the economic instrument. The
strategist that assumes the DoD is synonymous with the military instrument is assuming away a
range of capabilities that could be crucial to achieving the desired ends.
4. The Instruments of Power (DIME). Actors and institutions pursue objectives by wielding
four primary instruments—diplomatic, informational, military and economic (DIME)—to project
power; each instrument comprises a set of fundamental capabilities, which are noted in the
accompanying figure. 10 The strategists’ challenge is to determine what combination of those
10
The DIME model is one of several approaches to capturing the instruments of power. DIME is used in both U.S.
Joint Doctrine and the doctrine of various other countries. Another common acronym is DIMEFIL, which
represents the instruments of power as Diplomatic, Informational, Military, Economic, Financial, Intelligence, and
Law Enforcement. Consistent with U.S. Doctrine, the Primer incorporates “FIL” within DIME.
13
capabilities is best suited to deal with the situation at hand; this effort requires understanding the
utility of each instrument: what are its capabilities and limitations given a particular situation,
what are the best concepts and methods for how to use it, and what are its costs and risks.
A wide variety of institutions and actors can conduct diplomacy. The Department of State
is the principal institution for conducting diplomacy on behalf of the United States, but it
14
is not the only actor. For example, the President and the White House staff engage with
the offices of heads of state in other countries to collect and convey information about
strategic intent. Similarly, Department of Defense officials meet with foreign
counterparts to discuss military cooperation but also to defuse tensions, build
relationships, and negotiate agreements. Treasury, Commerce, and Trade representatives
pursue economic objectives via diplomatic means when they engage foreign officials to
secure commercial deals, reach agreement on trade or imposing sanctions, or coordinate
decisions of International Financial Institutions (IFIs). And the Intelligence Community
engages domestic and foreign counterparts in a variety of information-sharing initiatives
to build relationships in addition to addressing shared security concerns. Parallel
organizations in other states conduct similar diplomatic activities.
‒ Perceive involves accurately understanding the world as it is, it has two aspects; first
the collection, processing, integration, analyzing, and interpretation of available
information. The impact of the first aspect of perceiving the world is exemplified in
former British Prime Minister Winston Churchill attribution of the Allied victory in
World War II to the Ultra Program, which deciphered German encryption and
allowed the Allies to read German war plans prior to execution. This first aspect,
centered around, but not limited to, the intelligence community, is more institutional
than instrumental. In other words it relates to the creation, maintenance, or enabling
of power rather than the direct wielding of power. The second aspect of perception
relates to external recognition of a state’s ability to accurately understand the world.
The perception that an adversary has a robust ability to identify and understand
creates a powerful constraint that can, itself be wielded to influence target behavior.
15
including trust in the sender, relation of the sender to the message, preconceptions of
the audience, culture, language, method of transmission, capability and durability of
transmission systems.
• The Military Instrument. The military instrument of power entails applying, threatening
to apply, or enabling other parties to apply or threaten to apply force in furtherance of
political aims. The use of the military instrument in war is potentially the most dangerous
action a state can undertake; strategists and leaders should apply it only with a clear
understanding and assessment of its nature, capabilities, limitations, and costs/risks.
Though there are no universally accepted definitions of the aspects of the military
instrument, the concepts of "Force,” “Threat of Force,” and “Force Enabling” capture its
essence and provide an appropriate framework for such assessment.
16
may include overt, clandestine, and covert activities; small-unit actions; single
targeted strikes; employment of proxies; the use of destructive cyber power; or any
other activity in which violence is applied to achieve political aims and their
associated specific objectives.
17
capability/capacity in a specific sector, as budget support, as humanitarian support,
and to develop goodwill or ties to support a longer term relationship or induce short-
term actions; it can be either directed (i.e. “with strings attached”) or undirected.
Relative to private capital flows, private philanthropy, and diaspora remittances, state
to state assistance has become a smaller and smaller proportion of assistance to poor
nations in the past 50 years. However, assistance is still a relevant and potentially
useful category of the economic instrument power
‒ Trade of goods and services has the potential to increase the wealth and prosperity of
trading partners. Limits or restrictions on trade (including sanctions and tariffs) harm
or threaten to harm an adversary’s economy. Conversely, trade agreements or reduced
tariffs can be inducements for certain desirable foreign policy outcomes. Although
trade is normally considered mutually beneficial, a state must carefully consider the
potential harm to its own economic prosperity when considering trade restrictions as
an instrument of state policy. A state may also want to consider the role of private
and state owned enterprises in the projection of state power and the potential direct
and indirect influences such enterprises may have.
‒ Finance and access to capital markets is required for modern businesses to undertake
investments to increase productive capacity, and also for modern governments to
provide expected services (e.g., infrastructure, health, welfare, education) to their
citizens. Financial lending, investment, and capital flows are necessary for the
macroeconomic stability of states and the entire global economy. Restricting or
impeding access to finance and banking systems or manipulating investments can
achieve political aims or objectives, but like trade restrictions, a state must carefully
consider the potential harm to its own and its allies/partners’ economic prosperity
(and reputation as an impartial financial entity) when considering using financial
tools to wield the economic instrument.
Strategists should consider the nature of their own state’s economy and that of their
allies/partners’ as well as that of the target state or entity. The more that a state’s
economic activity is privately controlled (by proportion) and the more it relies on free-
market forces to generate economic prosperity, the less direct ability it has to shape its
own trade and financial activities to suit particular strategic purposes. In such situations,
the less confident strategists should be that trade, financial, or aid actions will be able to
produce a particular strategic effect on a target country.
18
therefore sustains the state’s power; if one or
more elements is significantly diminished—
whether through strategic inattention, adversary
action, or the pursuit of strategies that are too
costly—relative decline could ensue. The
relationship between the elements and the
institutions/instruments is important, but so too is
the direct relationship between institutions and the
instruments. It is the fundamental capabilities of
the instruments, employed by appropriate
institutions and actors, and brought to bear in
appropriate combinations, that produce effects to
resolve security challenges and achieve desired
political aims. Put more simply, institutions and
actors wield the instruments in pursuit of the
state’s political aims. Thus, for example, it is not
armed forces that produce effects; instead, the use
of force, threat of force or enabling of force
produces effects. Similarly, it is not diplomats that
produce effects; instead, it is the use of
representation, negotiation, or implementation
that produce effects. In other words it is the
activity not the actor that produces effect.
Strategies designed to respond to specific security challenges frequently require considering how
to implement them within the bounds of existing means. Occasionally, however, the challenge
may be of sufficient magnitude and with a sufficiently long anticipated timeline that a strategy
can both employ the means at hand and include an effort to develop new means. For example,
America’s ultimate political aim in the Pacific during World War II was Japan’s unconditional
surrender. In the months immediately after Pearl Harbor, U.S. strategy focused on employing
existing means to blunt further Japanese advances. That effort bought time for the United States
to mobilize and innovate, which eventually created vastly increased and significantly more
advanced military capabilities. Together, mobilization and the development of advanced
technology enabled the United States to create the military means needed to achieve its political
aim. Similarly, as part of the U.S. strategy for dealing with the Soviet Union during the Cold
War, President John F. Kennedy established the goal of a manned mission to the Moon. That
effort spawned a national space program that enhanced America’s elements of power. As a result
of the space program, the United States strengthened its geography (occupying key points in
19
space), R & D and technology, human capital, international reputation, and national culture.
These newly developed means were crucial to the long-term strategy of the U.S. to defeat the
Soviet Union.
20
CHAPTER V
DESIGNING THE WAYS
1. General. Designing the ways to achieve the political aim and its specific objectives is the
fourth element in strategic logic. Whereas “identifying the means” focuses on with what,
“designing ways” addresses how. In deciding how to use the selected means (elements,
institutions/actors, and instruments) to achieve the political aim and its specific objectives, the
national security strategist must answer—and continuously revisit—the following four
fundamental questions. First, what fundamental strategic approach(s) is most suitable? Second,
within that fundamental strategic approach, which modes of action seems most promising (e.g.,
direct vs. indirect, or sequential vs. cumulative)? Third, given the answers to the first two
questions, which instruments and institutions are best suited to help secure the political aim, and
what institutions should wield them in that endeavor? Finally, how will the strategist orchestrate
the selected instruments to achieve the desired ends?
• Observe is the least active strategic approach and is often appropriate when threats to
interests are minimal, international partners independently address an issue sufficiently,
or when assessed costs and risks of greater action outweigh potential benefits.
• Accommodate means acceding to others’ interests/aims with the belief that acceding will
limit or prevent additional competition or conflict. Though this approach has certain
negative connotations it may be the most appropriate if the level of interest at stake does
not support the risks/costs of a more confrontational approach. Depending on the
21
situation, accommodation can take multiple forms, including appeasement, adaptation,
abrogation, retraction, abandonment, etc.
• Persuade generally entails trying to convince another actor through force of argument.
Persuasion is primarily viable where the parties’ interests align or significantly overlap;
its utility is otherwise limited. Successful persuasion generally creates ideological
agreement and thus can lead to a stronger partnership than more aggressive actions.
• Subdue seeks to remove all choice from the target; this is in contrast to even the most
forceful act of coercion, which still leaves the choice to be or not be coerced with the
targeted actor. Subdue is generally heavy on force and may include occupation, forceful
regime change, and destruction or severe degradation of the target's capacity to employ
force or defend itself.
• Eradicate seeks the absolute elimination of the target state or actor, many or all of its key
leaders and believers, as well as the ideology guiding it.
22
3. Modes of Action. In addition to choosing a fundamental
strategic approach, the strategist should consider which mode(s)
of action will best accomplish the chosen strategy. The modes of
action shown in the box to the right are not a checklist, but a few
examples of choices about various methods a strategist could
utilize to build a strategy. Although the choices may seem
binary, different objectives within the same strategy may
simultaneously employ multiple modes of action (e.g., using
both overt and covert force). The modes of action listed are not
all-encompassing, strategists need to consider a wide range of
potential modes as part of their “ways” development. They also need to consider whether a
particular mode fits the strategic situation, will achieve the political aim and its specific
objectives, and can do so with the available means at acceptable levels of risk and cost.
Orchestration defines how institutions wield the instruments of power through distinctive actions
and approaches in a logical, coherent strategy for accomplishing political aims. Effective
orchestration depends on several factors. Because strategy normally includes several specific
objectives intended to accomplish the political aim, and because actions taken in support of any
particular objective could undermine attainment of other objectives, each objective must be
prioritized in terms of its importance. Moreover, given that resources are finite, prioritization is
essential to ensure the most important objectives get the resources needed for their attainment. In
addition, strategies often benefit from the clear identification of a lead instrument, with the rest
of the instruments operating in support. The strategist must take care not to let the actions of
supporting instruments undermine the main line of effort. The strategist should also sequence
objectives, specifying whether one objective needs to be attained before another objective can be
pursued. On occasion some objectives can be achieved in parallel: that is, simultaneously. Also
23
vital is the need to coordinate the instruments to ensure they are not working at cross-purposes.
To ensure limited means are appropriately apportioned to achieve the desired effects, strategists
must properly balance resources between objectives and instruments. Achieving objectives
often requires the integration of multiple instruments in a “whole-of-government” approach.
Such integration may be exceedingly difficult but can make the difference between success and
failure.
As a strategy unfolds, instruments and institutions interact with each other. Many of those
interactions are intentional and positive, part of the strategic design. Some interactions, though,
are unintentional and potentially negative. Consequently, strategists have to work to assure that
interactions among the instruments and institutions produce positive synergistic effects. As an
example, when U.S. strategists formulated the plan for providing relief to Southeast Asian
nations after the 2004 Tsunami, they assessed that the effort would also send constructive
messages about America to the local population. In turn, they anticipated that those positive
messages would undermine a degree of support from local populations for Al Qaeda’s
Indonesian affiliate, Jemaah Islamiyah. Similarly, strategists have to shape their strategic designs
to prevent unanticipated interactions from producing negative effects. For example, using force
can often lead to collateral destruction and casualties, which may in turn incite resistance among
an adversary’s population. Such concerns mandate extensive consideration and may well limit
actions.
24
CHAPTER VI
ASSESSING THE COSTS/RISKS AND RESULTS
1. Iterative Assessment. Assessing the costs and risks stemming from a strategy is the fifth
fundamental element of strategic logic. As with the first element—analyzing the strategic
situation—assessing costs and risks must permeate the process of developing national security
strategy. Neither analyzing the strategic situation nor assessing risks and costs should be pursued
linearly iteratively and with regular frequency.
2. Evaluating Costs. Costs represent the outlay of resources and other assets needed to achieve
a political aim. They include, the funding required to acquire, build, enable, protect, convert,
achieve, or maintain something of strategic value, whether tangible or intangible. Costs also can
include people killed and injured, infrastructure damaged or destroyed, diminished capital,
accumulated debt, weakening of the economy, or tarnished reputation and diminished influence.
They can be transactional, political, temporal, or stem from forfeited opportunities.
While the strategist can calculate some costs with specificity, others must be based on
assumptions. Nevertheless, whether based on hard data or estimates and judgments, strategists
must provide a definitive statement of likely costs for the decision-maker. Only in this way can
the strategist make it possible for the decision-maker to weigh the hoped-for benefits from a
particular strategy against the expected costs. Proposed strategies for which the likely costs
exceed the value of the hoped-for benefits ought to be rethought. This process reinforces the
criticality of having defined precisely: 1) the interests the state has at stake in the problem; 2) the
value of those interests; 3) threats to those interests; and 4) the seriousness of those threats. The
essential question in the cost-benefit analysis of any strategy is whether it protects/advances the
state’s interests at an acceptable cost. Ultimately, many national strategy debates revolve around
value tradeoffs—for instance, lives vs. economic harm—that are difficult, if not impossible, to
resolve definitively. Strategists ought to consider at least three categories of costs—resources
(lives, money, equipment, time), political costs, and opportunity costs. In addition, strategists
would do well to consider the costs of inaction.
3. Identifying Risks. Strategists must consider risks as they design strategies. In general, risk
entails the probability and severity of loss linked to hazards. With respect to strategy, risks are
elements that could go wrong. As the general definition states, the severity of a risk is
determined by both the likelihood of its occurrence and the magnitude of damage that would
ensue if the risk became manifest. Thus, a state that employs force against an adversary that
possesses nuclear weapons runs the risk that the enemy will retaliate with a nuclear strike. The
magnitude of the ensuing damage would be huge, but if there is little or no likelihood that the
other state would respond with a nuclear strike, then the severity of the risk might well be
deemed acceptable.
There is no magic formula for calculating risk. Risks emerge as the strategist brings insightful,
objective analysis and judgment to bear on what research and intelligence has revealed about the
nature and dynamics of the problem. Despite the strategist’s best efforts, however, both the
likelihood and severity of any identified risks will remain only probabilities. Therefore, it is
25
critical that the strategist develops a scheme for valuing both the likelihood and the severity of
risks and uses that scheme to characterize each of risks considered by decision-makers.
Strategists must assess both risks to the strategy and risks from the strategy. Risks to the
strategy are things that could cause it to fail, and they arise particularly from assumptions that
prove invalid in whole or in part. Risks from the strategy are additional threats, costs, or
otherwise undesired consequences caused by the strategy’s implementation. When the United
States invaded Iraq in 2003 with the political aim of changing the Iraqi regime, a risk to the
strategy was that popular resistance within Iraq to the U.S. invasion would coalesce into an
effective insurgency. At the same time, a clear risk from the U.S. strategy was that the
weakening of Iraq that would almost certainly occur as a result of the U.S. invasion would open
the door for Iran to establish a much stronger position in the region. In the end, U.S. decision-
makers judged their political aim to be of sufficient value to warrant accepting both of those
risks.
5. Red Teaming. Throughout the strategic logic process, but particularly during the assessment
phase, use of a red team to think critically about the problem, the major assumptions, and other
key elements of the proposed strategy from the target’s perspective is essential. The discussion
in Joint Pub 5-0 on the use of red-teaming in joint planning offers a helpful guide on how similar
red team efforts could sharpen strategic logic and improve the strategy-making process. 12
6. Course Corrections. Once a state or other party launches a strategy, it must conduct frequent
iterative assessments of that strategy’s progress. No strategy is infallible. Strategies are, after all,
12
See Joint Pub 5-0 Joint Planning, 16 Jun 2017, APPENDIX K: RED TEAMS, pp. K-1 thru K-7.
26
built upon a foundation of assumptions, and some—maybe many—of those assumptions will
prove flawed to some degree. Additionally, the strategic situation could change in ways that
invalidate initially sound assumptions. As assumptions prove incorrect or are invalidated, the
strategist must adjust the strategy’s ends, means, and/or ways to accommodate the new reality.
Some of the most powerful assumptions are unconscious judgments about how the adversary
will react to the various aspects of the strategy. Adversaries, however, act in line with their own
logic, and analyses of the situation, which may lead them to respond in unexpected ways,
including ways that seem at odds with their interests. Moreover, adversaries are not passive
targets of a strategy, but active participants. As such they can be expected to do all they can to
frustrate or prevent an opposing plan’s success, and to maximize their own gains.
As the strategic situation changes, the strategist must revisit the analysis to ensure the strategy
continues to rest on a comprehensive and timely understanding of the most important conditions
and dynamics shaping the unfolding situation. Significant changes should force the strategist to
adjust the strategy’s ends, means, and/or ways to accommodate new realities. As a strategy
proceeds, the strategist should constantly assess the prospects of achieving the political aim. If
those prospects are not increasing—or worse, are decreasing—then alternative courses of action
should be explored. This requirement might entail defining a new political aim, bringing new or
additional means to bear, formulating a new strategic approach, or abandoning the effort
altogether. Changing one’s ends, means and/or ways can be difficult.
Scaling back one’s aims is especially challenging once force has been used. As history teaches
us, loss of life makes it exceedingly difficult to moderate or change the political aim, lest
sacrifices be perceived as in vain.
That said, the principal consideration for assessing whether a strategy may need to be reassessed
is whether it is achieving the desired political aim at an acceptable cost. If strategists and
political and military leaders determine the costs to be “sunk”; that is, they cannot be recovered
because the political aim cannot be achieved, it is time—however painful it may be—to change
the political aim, and, accordingly, the strategy that supports it.
27
CHAPTER VII
CONCLUSION
The modern strategic environment poses significant challenges, challenges that are evolving at
considerable speed. The collapse of the Soviet Union changed the strategic environment from
one dominated by bipolar considerations to one transitioning to multi-polar challenges.
Globalization powered by rapid advances in information technology and processes has reshaped
the dynamics of international relations. Long-suppressed ethnic, religious, and even personal
conflicts have spawned an increase in intra- and interstate violence. Terrorism, civil wars,
secession and irredentism threaten to fracture existing states and break down regional order.
The world has witnessed a revival of nationalism, populism, and nativism that further threatens
to undermine the post-World War II international order. Most recently, revisionist great powers
have risen and begun challenging the existing order and U.S. preeminence. Simultaneously, the
character of war/conflict is quickly changing with rapid technological and social upheavals.
The time when U.S. strategists could fall back on the Cold War's overarching strategic concept
of containment is long past. Strategic thinking must adjust to the evolving strategic
environment. Each strategic challenge is unique. Each demands thorough, comprehensive, and
insightful analysis of the situation. Each demands definition of a realistic political aim and
specific objectives, grounded in an objective assessment of one’s interests, resources, and
capabilities, as well as those of one’s adversaries and allies. Each requires the crafting of a
creative, coherent strategic approach that takes into account all of the possible ways the
adversary might try to counteract and/or frustrate one’s strategy.
The best “insurance” for strategic success is to think strategically—to diligently and
systematically work through the five fundamentals of strategic logic. Strategists should ensure
that each judgment and decision made to resolve the questions inherent in each of the elements
of strategic logic builds upon and fits with all those made previously, leaving no gaps in the
logic. As importantly, strategists must not “pre-judge” the outcome, decide on a preferred
strategic approach at the outset, and then manipulate the logic to justify that approach.
Strategists must let an objective application of strategic logic reveal the best strategic approach
to adopt.
Good strategists never forget that strategy is—at a minimum—a “two-player” game. Every
strategy has to work against a thinking, proactive adversary who always has a vote in how
events unfold. His or her aim—his or her job—is to find ways to neutralize an opponent’s
strengths and frustrate that opponent’s strategic approach. Even a significant power differential
in one’s own favor does not guarantee success. Time and again, superior powers have learned
that skilled, determined, and creative adversaries can find ways to minimize their opponent’s
superior capabilities and create leverage of their own that creates a more level playing field.
Finally, strategists must consider what kinds of outcomes are reasonable—and achievable—
given the advantage and leverage they are able to create. To reach for more than that—no matter
how seemingly desirable—is strategically foolish and generally ends up costing far more than
whatever benefits—if any—are gained. The best safeguard against strategic folly is a cadre of
well-educated, trained, and experienced professionals and leaders who rigorously apply the
28
elements of strategic logic. This is perhaps the most important lesson students can take
from their experience at the National War College.
29
Common Primer Terms of Reference
National Security The art and science of developing, applying, and coordinating the
Strategy instruments of national power (diplomatic, informational, military
and economic) to achieve ends that protect or advance national
interests.
The National Security A document mandated by the 1986 Goldwater-Nichols Defense
Strategy of the United Department Reorganization Act. The NSS outlines the broad
States (The NSS) national security strategy of the United States.
The National Security The National Security Council (NSC) is the President’s principal
Council (NSC) and the forum for considering and coordinating national security and
NSC Staff foreign policy matters with his/her senior national security advisors
and cabinet officials. The NSC staff, headed by the National Security
Adviser, serves as the President’s national security and foreign
policy staff within the White House.
Strategic Logic The logic needed to develop and orchestrate national security
strategy Strategic Logic entails applying the five following
fundamental elements:
• Analyzing the strategic SITUATION (the context and
assumptions about that context)
• Identifying INTERESTS at stake in the situation
• Defining the desired ENDS (the outcomes sought), to include
first defining the overarching political aim, and then the
subordinate objectives required to achieve it
• Identifying and/or developing the MEANS (resources and
capabilities) needed to achieve the desired ends
• Designing the WAYS to use the means to achieve the desired
ends
• Assessing the RISKS/COSTS associated with the strategic
design, as well as tests of coherence and the “—ilities” tests
30
Context Any factor(s), internationally, regionally, or domestically that affect
the development or implementation of a national security strategy.
Context can include: political matters; historic events; cultural,
religious, ethnic, or tribal factors; societal norms and structures—
almost anything that could influence the strategist’s work.
National Interests The fundamental, enduring values of a state. National interests are
subject to various interpretations. The strategist must define
precisely and concisely the interest(s) the nation has at stake in the
challenge addressed. For purposes of this document, National
Interests are not a specific or achievable end state. They are
aspirational, and thus distinct from political aims, which are
tangible conditions.
Condition A current or desired state of affairs.
Threats to National A strategic situation that endangers one or more national interests.
Interest(s) Threats occur only in relation to interests, and should be defined in
a concise, coherent manner.
Opportunity to A favorable set of circumstances extant in the strategic context that
Advance National may allow for the advancement of one or more interests;
Interest(s) opportunities exist independently of the successful resolution of a
threat to an interest. The strategist should not confuse opportunities
with advantages derived from successfully dealing with a threat.
Constraint Tangible and intangible factors that limit strategic freedom of
action. Constraints include insufficient means or political
restrictions on the means available. Legal, political, and normative
considerations can also constrain strategy.
Political Aim The desired end-state of a national security strategy. The political
aim defines the outcome the strategist believes will preserve, protect,
and/or advance the national interest(s) at stake. Because the
political aim is a distinct and achievable goal, it is best defined
using nouns and adjectives—for example, “a stable, secure Iraq.”
The strategist must ensure that the overarching political aim—the
desired outcome—preserves or advances interests.
Specific Objectives The specific achievements that, when accomplished and combined,
create the end-state envisioned in the political aim. Specific
objectives typically consist of verbs and adverbs, to wit: “Deter
Russian aggression” or “Halt Serb ethnic cleansing.” Important
attributes of a sound subordinate objective are precision and
brevity, devoid of any mention of ways or means.
Ends An overarching, generic term that encompasses political aims and
their subordinate objectives.
Means Generally, resources and capabilities that either exist or need to be
developed to achieve desired Ends. There are three inter-related
components of the means in national security strategy: the elements
of power, such as resources, human capital, and industry, which
sustain national power; institutions/actors, such as the President,
Congress, the UN, etc., that wield the instruments of power; and the
31
instruments of power themselves—diplomacy, information, military,
and economic.
Elements of Power The tangible and intangible factors from which the power of a state
or non-state actor is built and sustained. While there is no definitive
list of the elements of power, they include inter alia: natural
resources, geography, human capital, economy, industry,
R&D/technology, infrastructure, governance, national will, and
international reputation. To have enduring viable strategic options,
states/actors must sustain, conserve, or build the elements of power.
Institutions and Actors The organizations, structures, and individuals that national security
strategists rely on to secure a strategy’s political aim. Government
agencies and their personnel generally design and implement most
strategies; however, other non-government institutions and actors
may be better suited for certain tasks.
The Instruments of The instruments of power include diplomacy, information, the
Power (DIME). military, and economics (DIME). Each instrument possesses a
unique nature/essence, and distinct capabilities and limitations.
Ways How the strategist achieves the political aim and subordinate
objectives. Though “means” focus on questions of taking action
“with what,” national “ways” address the question of “how” those
means are used.
Fundamental A continuum of strategic approaches for applying instruments of
Strategic Approaches power to achieve a desired political end. The spectrum spans
everything from taking no action to eradicating an opponent.
• Observe: Monitoring without otherwise acting.
• Accommodate: Acquiescence to a rival’s demands/wishes.
• Enable: Creating, supporting or otherwise bolstering the
capabilities of other international actors.
• Shape: Taking action to adjust the strategic environment to
make it more favorable or conducive for future action.
• Persuade: Convincing another actor through the force of
argument.
• Induce: Promising or providing something positive to achieve
a desired response from other international actors.
• Coerce: Taking or threatening negative actions to affect
another international actor’s behavior. Deterrence is a
form of coercion that threatens negative consequences for
an opponent should they attempt to change the status quo.
Compellence is another form of coercion that threatens
negative consequences for an opponent should they attempt
to maintain the status quo.
• Subdue: Using force to make another actor voluntarily or
involuntarily capitulate.
• Eradicate: Destruction of another international actor, to
include its government, ideology, economy, military, etc.
32
Modes of Action A set of binary strategic options regarding how the instruments of
power are used to achieve the desired subordinate
objective/political aim. Strategists should consider a wide range of
potential modes to implement a strategic concept. They should
consider whether a particular mode fits a strategic situation, will
achieve the political aim and its subordinate objectives, and can do
so with available means at acceptable levels of cost and risk.
Examples of modes of actions are: direct—indirect; unilateral—
multilateral; sequential—parallel; action—message; offensive—
defensive; active—passive; overt—covert, etc.
Orchestration A logical, coherent strategic plan for accomplishing political goals
using the instruments of power. Strategic plans prioritize objectives,
sequence actions, coordinate instruments to ensure they are not
working at cross-purposes and balance limited resources between
instruments and objectives. Orchestration often requires the
integration of multiple instruments (e.g. in a “whole-of-
government” approach).
Assessment Assessment consists of evaluating a strategy’s national and
international costs and risks.
• Costs: The price, financial or otherwise, one has to pay to
implement a strategy. Costs can include: deaths, resources,
expenses, penalties, prestige, and/or missed opportunities.
• Risks: Aspects of a strategic design that could go wrong or
work to the strategy’s disadvantage. Risks often relate to the
divergence between assumptions of an opponent’s or third
party likely reactions to a strategy and their actual reactions
to that strategy.
Assessing a strategy’s internal viability involves determining
whether it is suitable, feasible, desirable, acceptable, and
sustainable (i.e. the “—ilities tests”). Multiple failures in the “—
ilities tests” may indicate that the strategic design is flawed.
• Suitability addresses whether the strategy serves national
interests and is consistent with other national-level
strategies, policies, and goals.
• Feasibility examines whether political aims are realistically
achievable and whether sufficient means and time are
available or attainable to achieve the political aim.
• Desirability assures that the strategic plan matches the desired
political aim, and the expected benefits of implementation
outweigh the anticipated costs.
• Acceptability determines if the strategy is consistent with the
state’s values, the national mood, domestic concerns
(political or otherwise), and partners’ interests.
• Sustainability considers whether resources and popular
support can endure long enough to attain the political aim,
33
even in the face of potential changes in the strategic
environment.
Viability The overall assessment produced by the –ilities test.
34
THE NWC NATIONAL SECURITY STRATEGY FRAMEWORK
A. POLITICAL AIM(S)
* Stated and implied political aims—define desired end-state/success. What does success look like?
* What are likely constraints—governmental, domestic, international, media-driven, etc.?
B. SPECIFIC OBJECTIVES
* Specify fundamental strategic approach(es) – state how the instruments blend together. Are the associated
objectives pursued sequentially or simultaneously?
* Consider Modes of Action.
* Identify institutions/agencies that will direct the various instruments of power.
* Most likely constraints? Does the strategic approach account for them?
Red Teaming
* Assumptions about allies’, neutrals’, target’s political aims, underlying rationale, and specific objectives.
* Identify target’s instruments of power needed to attain ends—Is one or more likely to be dominant?
* Assumptions about the capabilities/limits of target’s instruments.
* What are the target’s most likely and most dangerous courses of action? Does our strategy negate them?
35
National Security Strategy Model for Relating Ends, Ways, and Means
36
Bibliography with NDU Library Links
Art, Robert J. and Kelly M. Greenhill. The use of Force: Military Power and International Politics
Lanham, MD: Rowman & Littlefield, 2015; Eighth edition, 2015.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.717049&site=eds-live&scope=site.
Art, Robert J. and Kenneth Neal Waltz. The use of Force: Military Power and International Politics
Lanham, MD: Rowman & Littlefield Publishers, 2009; 7th ed, 2009.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.302881&site=eds-live&scope=site.
Blainey, Geoffrey. The Causes of War New York: Free Press, 1988, 3rd ed., 1st American ed, 1988.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.79525&site=eds-live&scope=site.
Brands, Hal. What Good is Grand Strategy? : Power and Purpose in American Statecraft from Harry
S. Truman to George W. Bush New York, New York: Cornell University Press, 2014.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.707738&site=eds-live&scope=site;
https://nduezproxy.idm.oclc.org/login?url=http://site.ebrary.com/lib/nationaldefense/Doc?id=1083
1262.
Cerami, Joseph R. and James F. Holcomb. U.S. Army War College Guide to Strategy Carlisle
Barracks, PA] : Strategic Studies Institute, U.S. Army War College, 2001.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.195172&site=eds-live&scope=site.
Clausewitz, Carl von, Michael Eliot Howard, Peter Paret, and Bernard Brodie. On War Princeton, NJ:
Princeton University Press, 1976.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.84664&site=eds-live&scope=site.
Collins, John M. Grand Strategy: Principles and Practices Annapolis, MD: Naval Institute Press,
1973.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.86180&site=eds-live&scope=site.
37
———. Military Strategy: Principles, Practices and Historical Perspectives Washington, DC:
Brassey's; 1st ed, 2002.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.203394&site=eds-live&scope=site.
Deibel, Terry L. Foreign Affairs Strategy: Logic for American Statecraft New York: Cambridge
University Press, 2007.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.253453&site=eds-live&scope=site.
Earle, Edward Mead, Gordon Alexander Craig, and Felix Gilbert. Makers of Modern Strategy:
Military Thought from Machiavelli to Hitler Princeton NJ: Princeton University Press, 1943.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.110420&site=eds-live&scope=site.
Evans, Graham and Jeffrey Newnham. The Penguin Dictionary of International Relations London:
Penguin Books, 1998.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.181584&site=eds-live&scope=site.
Freedman, Lawrence. Strategy: A History New York: Oxford University Press, 2013.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.557373&site=eds-live&scope=site.
Gaddis, John L. On Grand Strategy New York, NY: Penguin Press, 2018.
George, Roger Z. and James B. Bruce. Analyzing Intelligence. Origins, Obstacles, and Innovations
Washington DC: Georgetown University, 2008.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.596702&site=eds-live&scope=site;
https://nduezproxy.idm.oclc.org/login?url=http://site.ebrary.com/lib/nationaldefense/Doc?id=1023
6724.
Gilpin, Robert and Jean M. Gilpin. Global Political Economy: Understanding the International
Economic Order Princeton, NJ: Princeton University Press, 2001.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.200031&site=eds-live&scope=site.
Gow, James. War and War Crimes: The Military, Legitimacy, and Success in Armed Conflict New
York: Columbia University Press, 2013.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.715131&site=eds-live&scope=site.
Gray, Colin S. Modern Strategy New York: Oxford University Press, 1999.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.187595&site=eds-live&scope=site.
38
Howard, Michael. "The Forgotten Dimensions of Strategy." Foreign Affairs no. 5 (1979): 975.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=edsjsr&AN=edsjsr.10.2307.20040266&site=eds-live&scope=site.
Kahneman, Daniel. Thinking, Fast and Slow New York: Farrar, Straus and Giroux, 1st ed, 2011.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.509718&site=eds-live&scope=site.
Kennan, George Frost, Giles D. Harlow, and George C. Maerz. Measures Short of War: The George F.
Kennan Lectures at the National War College, 1946-47 Washington, DC: National Defense
University Press: sold by Supt. of Docs., U.S. G.P.O., 1991.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.97303&site=eds-live&scope=site;
https://digitalndulibrary.ndu.edu/u?/ndupress,36789.
Liddell Hart, Basil Henry, Sir. Strategy New York, NY: New American Library, 1974; 2nd rev. ed,
1974.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.143847&site=eds-live&scope=site.
Lykke, Arthur F. "Defining Military Strategy." Military Review 77, no. 1 (Jan, 1997): 182.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=mth&AN=9707081700&site=eds-live&scope=site.
Martel, William C. Grand Strategy in Theory and Practice: The Need for an Effective American
Foreign Policy New York, NY: Cambridge University Press, 2015.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.711620&site=eds-live&scope=site.
Morgenthau, Hans Joachim. Politics among Nations: The Struggle for Power and Peace New York:
Knopf; distributed by Random House; 5th ed. rev. and reset, 1972.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.103624&site=eds-live&scope=site.
Murray, Williamson, MacGregor Knox, and Alvin H. Bernstein. The Making of Strategy: Rulers,
States, and War Cambridge, England; New York: Cambridge University Press, 1994; 1st pbk. ed,
1996.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.704722&site=eds-live&scope=site.
Nye, Joseph S. The Future of Power New York: Public Affairs, c2011; 1st ed, 2011.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.681338&site=eds-live&scope=site;
https://nduezproxy.idm.oclc.org/login?url=http://site.ebrary.com/lib/nationaldefense/Doc?id=1044
0281.
39
Organski, A. F. K. and Jacek Kugler. The War Ledger Chicago: University of Chicago Press, 1980.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.76773&site=eds-live&scope=site.
Paret, Peter, Gordon Alexander Craig, and Felix Gilbert. Makers of Modern Strategy: From
Machiavelli to the Nuclear Age Princeton, N.J. : Princeton University Press, 1986.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.77401&site=eds-live&scope=site.
Rosecrance, Richard N. and Arthur A. Stein. The Domestic Bases of Grand Strategy Ithaca: Cornell
University Press, 1993.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.122943&site=eds-live&scope=site.
Rumelt, Richard P. Good Strategy, Bad Strategy: The Difference and Why it Matters New York:
Crown Business; 1st ed, 2011.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.553071&site=eds-live&scope=site; http://lib.myilibrary.com/?id=435988.
Schelling, Thomas C. Arms and Influence New Haven: Yale University Press, 2008.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.672104&site=eds-live&scope=site;
https://nduezproxy.idm.oclc.org/login?url=http://site.ebrary.com/lib/nationaldefense/Doc?id=1076
7077.
Treverton, Gregory F. and Edward Sylvester Ellis. Measuring National Power Santa Monica, CA:
RAND, 2005.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.230312&site=eds-live&scope=site;
http://www.rand.org/pubs/conf_proceedings/2005/RAND_CF215.pdf.
Worley, D. R. Orchestrating the Instruments of Power: A Critical Examination of the U.S. National
Security System Herndon, Virginia: Potomac Books, 2015.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.749092&site=eds-live&scope=site;
https://nduezproxy.idm.oclc.org/login?url=http://site.ebrary.com/lib/nationaldefense/Doc?id=1106
6811.
Wright, Thomas J. All Measures Short of War: The Contest for the Twenty-First Century and the
Future of American Power New Haven: Yale University Press, 2017.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.760739&site=eds-live&scope=site.
Yarger, Harry R. "Chapter 8: Toward a Theory of Strategy: Art Lykke and the Army War College
Strategy Model," 107-113: Strategic Studies Institute of the U.S. Army War College, 2006.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=tsh&AN=25803737&site=eds-live&scope=site.
40
Zarate, Juan Carlos. Treasury's War: The Unleashing of a New Era of Financial Warfare New York:
Public Affairs, First Edition, 2013.
https://nduezproxy.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db
=cat04199a&AN=ndu.556724&site=eds-live&scope=site.
41
42
43