Category Archives: Tactical Concepts

What are the evolving ideals of tactics in maritime and naval affairs.

Tactical Information Warfare and Distributed Lethality

Distributed Lethality Topic Week

By Richard Mosier

Background

The U.S. Navy’s distributed lethality strategy is to deny sea control to adversaries claiming sovereignty over international waters through the use of small offensive Surface Action Groups (SAGs) that operate in areas covered by the adversary’s anti-access, sea denial sensor systems and supported by land based command and control, interior lines of communication, and defensive platforms and weapons. The Navy strategy is for these SAGs to transit to positions to attack enemy ISR, command and control, and defending forces; and deny them sea control. The success of distributed operations ultimately depends on Information Warfare (IW) operations to deny the enemy the data required to target and attack Surface Action Groups.

Anti-access, sea denial capabilities of near-peer nations present a high threat to surface navy operations. The use of multiple offensive SAGs complicates the enemy’s defense but only if these groups avoid detection, tracking, targeting, and attack. If they operate with active sensors, datalinks and voice and network communications transmitting, they reveal their location, track, classification/identification, and group composition. Moreover, these emissions provide a readily available source for targeting the SAG. If attacked, the resulting battle damage and depleted stock of defensive weapons would most likely require the group to withdraw.  

130131-N-HN991-919 PACIFIC OCEAN (Jan. 31, 2013) The Arleigh Burke-class guided-missile destroyers USS Stockdale (DDG 106) and USS William P. Lawrence (DDG 110) transit the western Pacific Ocean. The Nimitz Strike Group Surface Action Group is operating in the U.S. 7th Fleet area of responsibility. (U.S. Navy photo by Mass Communication Specialist 2nd Class David Hooper/Released)
PACIFIC OCEAN (Jan. 31, 2013) The Arleigh Burke-class guided-missile destroyers USS Stockdale (DDG 106) and USS William P. Lawrence (DDG 110) transit the western Pacific Ocean. The Nimitz Strike Group Surface Action Group is operating in the U.S. 7th Fleet area of responsibility. (U.S. Navy photo by Mass Communication Specialist 2nd Class David Hooper/Released)

For distributed lethality to succeed, SAGs have to avoid being engaged while in transit to the attack position, attack with the advantage of surprise, avoid attack while repositioning, and if attacked, effectively defend the force. If, as must be anticipated, some or all of the units in the SAG are located and the enemy begins defensive operations, the first objective is to avoid being targeted by possibly denying the attacking force the information required to attack. If these measures fail and a SAG is located and targeted by the enemy, the goal is to transition instantaneously to full active defense in a tactically advantageous manner. Destroying the aircraft, surface ships, submarines, or land based sites is preferable to defending against large numbers of fast moving incoming anti-ship weapons.

While emission control (EMCON) is essential to deny targeting, the ships in a SAG will have to communicate to coordinate movements, exchange information, and execute defensive and offensive activities. These datalinks and battle group communications will have to be carefully selected to minimize the probability of intercept by enemy ISR systems.

Implications for Surface Navy Information Warfare

When in EMCON, the SAG will be reliant on own-force passive sensors, organic airborne surveillance systems, and the full range of information from nonorganic Navy, joint, and national ISR systems. This information will enable the tactical commander to gain and maintain both information superiority and speed of command, defined by VADM Cebrowski as: “knowing more things which are relevant, knowing them faster and being able to convert that knowledge into execution faster than the adversary.”

SAG tactical situation awareness requires the capability to automatically correlate relevant active and passive information from organic and non-organic sensors with intelligence at all classifications and compartments for presentation to the commander. This automation is essential to the commander’s situational awareness and speed of command. Surface ships will have to integrate the capabilities to correlate information from the ship’s combat system with intelligence and information from off board sources. Speed of command is dramatically slowed and tactical advantage lost if the commander has to mentally integrate three separate sets of information with some only available in a separate physical space.

Knowing the relevant facts faster than the adversary drives a requirement that off board intelligence and information systems must meet a Key Performance Parameter for time latency, measured from time of sensing to receipt onboard ship. It also indicates the need for a similar metric for ship combat systems measured from time of information receipt on ship to presentation to the commander. Speed of command is the key to tactical success in distributed operations.

Even when exercising electromagnetic and acoustic EMCON to avoid detection, surface ships can be detected by radars, visually, and by electro-optical sensor systems. Assessing whether the SAG has been detected will depend on factors such as enemy sensor location and altitude, platform type, sensor types on the platform, and a detailed understanding of enemy sensor performance. Sensor performance estimates require not only detailed technical intelligence, but also the assessment of effects of atmospheric and acoustic conditions on enemy sensor performance at any time during the mission. This suggests that combat systems will have to incorporate new automated IW functionality that, among other things, integrates track information with technical intelligence and meteorologic/oceanographic data to assess whether the ship has been detected or not.

Conclusion

The effective planning and command of SAG IW activities requires line officers that are trained, have specialized in IW during their careers, and are ready to perform the IW functions required for success in distributed operations. That is, to achieve superior situation awareness and speed of command, influence enemy decisions, deny the enemy information superiority, disrupt enemy decision making, and protect and defend own force information and information systems from external or internal threats.

As the concept of distributed lethality matures and the Navy gains an appreciation of the necessity for and potential of IW at the tactical level, the Navy will have to adjust to more clearly define IW, describe the missions and functions of IW, establish a career path for Surface Warfare Officer (SWO) IW specialists, and equip surface combatants with the information warfare capabilities required for successful distributed operations.

Richard Mosier is a former naval aviator, intelligence analyst at ONI, OSD/DIA SES 4, and systems engineer specializing in Information Warfare. The views express herein are solely those of the author.

Featured Image:  The Arabian Gulf (Mar. 23, 2003) — The Tactical Operations Officer (TAO), along with Operations Specialists, stand watch in the Combat Direction Center (CDC) aboard the aircraft carrier USS Abraham Lincoln (CVN 72) monitoring all surface and aerial contacts in the operating area.  (U.S. Navy photo by Photographer’s Mate Airman Tiffany A. Aiken)

Deception and the Backfire Bomber: Part Two

The following article is part of our cross-posting partnership with Information Dissemination‘s Jon Solomon. It is republished here with the author’s permission. It can be read it in its original form here.

Read part one of this series here.

By Jon Solomon

Was U.S. Navy Tactical Deception Effective?

Since Backfire needed pathfinder support, the U.S. Navy’s key to disrupting if not decapitating a raid by the former was to defeat the latter. As part of my thesis research, I came across much circumstantial evidence that the U.S. Navy’s combination of strict Emission Control (EMCON) discipline, decentralized command and control doctrine, occasional use of lower campaign-value warships to simulate high campaign-value warships, and perhaps even occasional use of electronic jamming gave SOSS controllers and Soviet reconnaissance assets fits during real-world operations. Still, I did not come across any authoritative Russian perspectives on whether or how these U.S. Navy counter-targeting efforts affected Soviet doctrine, tactics, or confidence. That’s what makes the following comment from Tokarev so interesting:

“Moreover, knowing the position of the carrier task force is not the same as knowing the position of the carrier itself. There were at least two cases when in the center of the formation there was, instead of the carrier, a large fleet oiler or replenishment vessel with an enhanced radar signature (making it look as large on the Backfires’ radar screens as a carrier) and a radiating tactical air navigation system. The carrier itself, contrary to routine procedures, was steaming completely alone, not even trailing the formation. To know for sure the carrier’s position, it was desirable to observe it visually.”(Tokarev, Pg. 77)

He goes on to describe a special reconnaissance-attack group of sacrificial bombers that might be detached from an inbound raid to penetrate a naval formation and visually identify the primary targets. Only with positive target designations from these pathfinders, or perhaps from TU-95RT Bear-D reconnaissance aircraft preceding the raid, could Backfire crews have any confidence the single missile they each carried was aimed at a valid and valuable target (Tokarev, Pg. 72, 77). Even then, he observes that “Contrary to widespread opinion, no considerable belief was placed in the ability of launched missiles to resist ECM efforts” (Tokarev, Pg. 75), indicating recognition that the countertargeting battle hardly ended with missile launch.

The one exception to the above contact classification and identification problems would have been a war-opening first salvo attack, in which targeting-quality cues could have been provided to Backfires or other anti-ship missile-carrying assets by any tattletale ships following a carrier closely. While noting the tattletale tactic’s high potential efficacy, Tokarev makes clear it could only be used in peacetime and would never again be possible following hostilities’ outbreak:

“Despite the existence of air reconnaissance systems such as Uspekh, satellite systems like Legenda, and other forms of intelligence and observation, the most reliable source of targeting of carriers at sea was the direct-tracking ship. Indeed, if you see a carrier in plain sight, the only problem to solve is how to radio reliably the reports and targeting data against the U.S. electronic countermeasures. Ironically, since the time lag of Soviet military communication systems compared to the NATO ones is quite clear, the old Morse wireless telegraph used by the Soviet ships was the long-established way to solve that problem. With properly trained operators, Morse keying is the only method able to resist active jamming in the HF band… But the direct tracker was definitely no more than another kind of kamikaze. It was extremely clear that if a war started, these ships would be sent to the bottom immediately. Given that, the commanding officer of each had orders to behave like a rat caught in a corner: at the moment of war declaration or when specifically ordered, after sending the carrier’s position by radio, he would shell the carrier’s flight deck with gunfire, just to break up the takeoff of prepared strikes, fresh CAP patrols, or anything else.” (Tokarev, Pg. 80)

Preventing a tattletale from maintaining track on a carrier accordingly reduced the chances for successfully striking that carrier. Additionally, since not all carriers would be operating forward at the time of the first salvo, those withheld in areas tattletales could not readily access would be more or less immune from large-scale attacks. This would leave the Backfires overwhelmingly dependent upon pathfinders in any later raid attempt.

It should be obvious that EW (and its contemporary cousin, cyber warfare) or tactical deception capabilities on their own are not going to deter an adversary from embarking upon some form of conventional aggression. The adversary’s decision to seek war will always be politically-driven, and the possibility of aggression out of desperation vice opportunism cannot be discounted. To the extent that political and military leaders’ latent psychological perceptions of their forces’ strengths and weaknesses influence their war making calculus, though, efforts to erode an opponent’s confidence in his most doctrinally important military capabilities can induce him to raise his political threshold for resorting to war. Tokarev’s observations therefore imply that Soviet commanders understood the likely cost in their crews’ lives that would be necessary just to provide a raid a chance at success, and that complicating variables such as the U.S. Navy’s demonstrated counter-targeting competencies only made the whole endeavor seem more uncertain and costly. The impact upon general deterrence, while immeasurable in any real sense, obviously was not insignificant.

In part three of the series, an examination of the deception tactics that might have been employed by Backfire raids.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at jfsolo107@gmail.com. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

Assessing the Usefulness of the American Large-Deck Carrier

The following article is adapted from a recent Journal of Military and Strategic Studies publication entitled The combat utility of the U.S. fleet aircraft carrier in the post-war period

By Ben Ho Wan Beng

Introduction

Former U.S. president William Clinton once said that whenever a crisis breaks out, the first question that comes to everyone’s mind would be “Where is the nearest carrier?” In the half century after World War Two, Washington employed force in response to some 200 crises, and carriers were involved in two-thirds of them.[1] On the other hand, the U.S. Army and U.S. Air Force (USAF) were involved in 38 and 53 of these incidents respectively.[2]

This contrast came about because the large-deck carrier of the United States Navy (USN) offered a number of unique advantages over other combat platforms. Esteemed naval analyst Norman Polmar said: “(The) survival of the aircraft carrier… can be attributed to… territorial independence, flexibility of striking power, (and) mobility.”[3] These three attributes will be explored in this article.

Territorial independence

During times when defense spending is tight and when different branches of the American military vie for the budgetary pie, the aircraft carrier would often be subjected to criticism by other services, especially the Air Force. This is because the vessel is deemed to be a major competitor for scarce resources, owing to its high price tag and a perception that it is taking over some USAF roles. Nevertheless, even some of the harshest critics of the USN have begrudgingly alluded to some advantages unique to the carrier, the most important of which is arguably the territorial independence that allows it to conduct operations unconstrained by political limitations.

For instance, General Ronald Fogelman, the USAF Chief of Staff from 1994 to 1997 and who was known to be a fierce critic of USN expenditure, was cognisant of this attribute when he said: “Aircraft carriers give you the ability to sail into a littoral region and not have to worry about diplomatic clearance… The… crisis during Taiwan’s elections… was an ideal use of… carriers.”[4]

A U.S. carrier strike group, with its own logistical infrastructure and force-projection capabilities, makes an ideal tool for intervention. This is especially so in cases where American interests are not aligned with those of allies, and this could result in Washington not having access to air bases.[5] The carrier’s territorial independence would thus come in handy if local issues were to make it difficult for land-based airpower to be deployed.

csba-range-slide-iran
Illustrative range and persistence for a notional unmanned aircraft with 1500NM range, and last refueled approximately 250 nm from coastline. Image credit: Center for Strategic and Budgetary Assessments, September 2010

A related issue is that of friendly air bases being attacked. According to a RAND report, the U.S. has 28 major air bases on the geostrategically and economically critical Eurasian landmass.[6] Although land bases are closer to potential hotspots, they are also closer to likely adversaries and could be targeted more easily during a conflict, making them more vulnerable than carriers. As a USN officer maintained: “I can’t tell you where… our carriers are… but given a few moments of research at Base Ops, I can give you the coordinates of every Air Force runway… and hangar worldwide.”[7] The proliferation of missiles and their enabling systems such as satellites in the post-Cold War period has led to several nations gaining the capability to target U.S. bases.

Indeed, this threat has become more serious with the advent of more advanced weapon technologies in recent years. This is arguably why Washington is realigning forces from Okinawa to Guam and setting up a new Marine contingent in Australia – to hedge against American forces in north-east Asia being targeted by China’s A2/AD systems during a conflict.[8] There have been no studies that do not acknowledge the vulnerabilities of land bases to anti-access threats; furthermore, even the most optimistic of such reports.[9]

Equally troublesome for America in times of crisis is the refusal of nations to grant over-flight [10] and aircraft deployment rights – an issue which the carrier does not face. The denial of over-flight rights to land-based aircraft could complicate Washington’s strategy. During Operation El Dorado Canyon, France, Spain, and Portugal denied over-flight rights to U.S. aircraft; consequently, the USAF F-111 Aardvarks involved had to be refueled in mid-air several times, a problem not faced by the carriers involved in the same operation as the ships were situated contiguously in the battlespace.[11]

As for the constraint of needing political clearance before U.S. aircraft can operate from foreign bases, a 2013 study contended that: “The attitude of host countries… is difficult to predict, raising… uncertainties regarding the basing of aircraft. The United States can bring enormous pressure to bear on a host country to accept U.S. forces, but success… cannot be guaranteed.”[12]

Examples abound of allies being hesitant or unwilling to allow U.S. aircraft to operate from their territory. Even when Iraq was poised to invade Saudi Arabia after taking over Kuwait in August 1990, the House of Saud hesitated before it permitted coalition forces to be deployed on its soil.[13] Similarly, the USAF could not operate out of Saudi Arabia and Turkey for Operation Desert Strike[14], leading a USN official to comment that the air force had been “castrated.”[15] He then extolled the territorial independence of the carrier in this instance: “With an aircraft carrier, you get 4.5 acres of Americana with no diplomatic restrictions.”[16]

The phallic reference may sound exaggerated, but it was a fact that American land-based airpower was effectively emasculated when it could not operate out of its Middle Eastern bases for Desert Strike. All in all, American carriers have proved to be useful for their territorial independence. This characteristic – combined with their mobility – essentially allows them to act as “first responders” to any situation.

Mobility

Our ability to deliver… firepower and generate… high aircraft sortie rates can… impact on… a conflict… during the critical early period of a joint campaign, when… U.S.-based forces are just starting to arrive in theater. – Admiral Jay Johnson, U.S. Chief of Naval Operations from 1996 to 2000.[17]

Owing to their mobility, U.S. carriers are usually the first assets to be deployed to a hotspot. This attribute has made one analyst describe the USN, and for that matter its carriers, as “the… little Dutch boy… (who) can hold a finger in the dike until reinforcements – the U.S. Air Force, U.S. Army, and allied forces – are in place.”[18]

When the deployment order comes, a carrier group moving at even a moderate speed of 25 knots can cover a significant 600 nautical miles in 24 hours of continuous steaming. To illustrate, a U.S. carrier group near Guam moving at that speed would take just over two days to reach the vicinity of Taiwan in the event of a Taiwan Strait crisis.[19] Suffice it to say that it would reach there even sooner at a higher speed.

The mobility that enables a carrier to act as a first responder was manifested as early as the Korean War. From the invasion of South Korea by the North in June 1950 until the Inchon landings in September, American and British carriers provided the sole tactical aviation assets as the number of South Korean-based aircraft was small and the USAF platforms in Japan were too short-ranged to have significant loiter time over targets.

800px-Aircraft_carrier_at_underway_replenishment
USS DWIGHT D. EISENHOWER (CVN 69) with Carrier Air Wing SEVEN embarked (right) conduct an underway replenishment with USNS ARCTIC (T-AOE 8) (left). Image credit: MC2 Miguel Contreras, USN.

In a more recent conflict, during the 1990 Gulf crisis, Army General Norman Schwarzkopf said the Eisenhower and Independence battle groups were in range of Iraqi targets within 48 hours of the deployment order being given, adding that: “The Navy was the first military force to respond… and… was also the first airpower on the scene. Both of these deterred, indeed, I believe, stopped Iraq from marching into Saudi Arabia.”[20]

To get such a glowing assessment from a top officer in a rival service undoubtedly attests to the carrier’s unequalled utility in responding first to a crisis. In addition, the aforementioned carriers provided air cover for the deployment of equipment to Saudi Arabia since viable shore-based offensive airpower was available only three weeks after the crisis broke out.[21] Had Iraq invaded Saudi Arabia within this period, the two U.S. carriers on station would have been even more crucial as they were the only assets in theater that could take the fight to the enemy. 

Flexibility

Another inherent advantage offered by the carrier to U.S. theater commanders is that it can conduct a wide variety of operations because of the different types of aircraft embarked on it. To be sure, land bases can accommodate a wide range of aircraft as well, but they simply lack the unique attributes of territorial independence and mobility offered by the large-deck carrier as discussed earlier. The typical carrier air wing (CVW) today consists of 44 F/A-18 Hornet/Super Hornet fighters, five EA-18 Growler electronic warfare aircraft, four Hawkeye airborne early-warning platforms, and 19 MH-60 Seahawk helicopters.[22] Indeed, during its 50-year service from 1962 to 2012, USS Enterprise operated 43 types of aircraft.[23]

This ability to accommodate diverse aircraft enables the carrier to carry out a wide range of missions. This was evidenced during Operation Deliberate Force when carrier planes participated in the whole gamut of operations: close air support, search-and-rescue, and enforcement of the no-fly zone. Because the carrier is such a large platform, it can integrate assets from other services, even other nations, into its operations.

This is crucial with today’s emphasis on jointness between the American armed services, and interoperability between Washington and her allies. In the current combat environment characterized by fluidity, the capabilities needed in one region or situation may not be the same as another, and thus why the ease of modifying the CVW is useful. [24] To illustrate, during Operation Uphold Democracy[25], USS America and USS Eisenhower carried elements of the 160th Special Operations Aviation Regiment and the aviation component of the 10th Mountain Division, the ship’s organic air wings having being temporarily removed. 

Two F-35s on the deck of the USS Nimitz during the first carrier trials for the aircraft in November 2014. US Navy photo.
Two F-35s on the deck of the USS Nimitz during the first carrier trials for the aircraft in November 2014. US Navy photo.

Conclusion  

The carrier has proved to be an extremely useful platform for the U.S. National Command Authorities, but it must be noted that the deployments delineated above occurred where anti-access threats were at best marginal. In an anti-access/area-denial environment, would the carrier be given carte blanche to project its airpower? Would its survivability be seriously questioned by the submarine and other anti-ship systems? These are but some of the key questions shaping the debate over the utility of the aircraft carrier, and my full article addresses some of them.

Read the full publication here: The combat utility of the U.S. fleet aircraft carrier in the post-war period.

Ben Ho Wan Beng is a Senior Analyst with the Military Studies Programme at Singapore’s S. Rajaratnam School of International Studies, and he received his master’s degree in strategic studies from the same institution. Ben is a CIMSEC member and has published with the likes of The Diplomat, The National Interest, and Real Clear Defense.

Endnotes

[1] Jeffrey G. Barlow, “Answering the Call: Carriers in Crisis Response Since World War II,” Naval Aviation News, January-February 1997, fas.org/man/dod-101/sys/ship/docs/970100-jb.htm.

[2] Reuven Leopold, Sea-Based Aviation and the Next U.S. Aircraft Carrier Design: The CVX (Cambridge, Massachusetts: Center for International Studies, 1998), p. 4.

[3] Norman Polmar, Aircraft Carriers: A Graphic History of Carrier Aviation and Its Influence on World Events (New York: Doubleday, 1969), p. vii.

[4] Quoted in Leopold, Sea-Based Aviation, p. 5.

[5] Jacquelyn K. Davis, Aircraft Carriers and the Role of Naval Power in the Twenty-First Century (Cambridge, Massachusetts: Institute of Foreign Policy Analysis, 1993), p. 34.

[6] Michael J. Lostumbo, et al., Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits (Santa Monica, California: RAND Corporation, 2013), p. 20-30.

[7] Quoted in James Paulsen, “Is the Days of the Aircraft Carrier Over?” (Air Command and Staff College Research Report, 1998), p. 20.

[8] Cheryl Pellerin, “Work: Guam is “Strategic Hub to Asia-Pacific Rebalance,” DoD News, August 19, 2014, defense.gov/news/newsarticle.aspx?id=122961.

[9] Sam J. Tangredi, Anti-Access Warfare: Countering A2/AD Strategies (Annapolis: Naval Institute Press, 2013), p. 68.

[10] It must be noted that this point applies only to states contiguous to the sea where the carrier is deployed; overflight rights are still needed for aircraft seeking to reach countries situated landward of a coastal state.

[11] Leopold, Sea-Based Aviation, p. 4.

[12] Tangredi, Anti-Access Warfare, p. 49.

[13] Davis, Aircraft Carriers, p. 34.

[14] Operation Desert Strike was initiated by the United States in September 1996 in response to the Iraqi military offensive against the city of Irbil in Iraqi Kurdistan.

[15] Quoted in Bowie, The Anti-Access Threat, p. 3.

[16] Ibid.

[17] Angelyn Jewell, Carrier Firepower – Realising the Potential (Alexandra, Virginia: Center for Naval Analyses, 1999), p. 5.

[18] Ibid.

[19] According to the author’s calculation, at 25 knots, it would take some 52 hours to cover the     distance of about 1,300nm between Guam and the waters off eastern Taiwan, which is derived from Google Maps.

[20] Davis, Aircraft Carriers, p. 22.

[21] John Pay, “Full Circle: The U.S. Navy and its Carriers: 1974-1993,” in Seapower: Theory and     Practice, ed. Geoffrey Till (Portland: Frank Cass, 1994), p. 136.

[22] David Barno, Nora Bensahel and M. Thomas Davis, The Carrier Air Wing of the Future   (Washington, D.C.: Center for a New American Century), p. 8.

[23] Rebecca Maksel, “The Future of Aircraft Carriers,” Air & Space, January 15, 2015, airspacemag.com/daily-planet/future-aircraft-carriers-180953905.

[24] Lambeth, American Carrier Air Power, p.37.

[25] This was the 1994 intervention in Haiti to remove the military regime installed by the 1991 coup overthrew the elected President Jean-Bertrand Aristide.

Publication Release: Distributed Lethality 2016

Released: February 2016

The US Navy is investigating distributed lethality as a potentially game changing approach for the conduct of naval warfare. Exploration of the concept has progressed considerably since the previous CIMSEC distributed lethality week. The US Navy’s Distributed Lethality Task Force partnered with CIMSEC to co-launch the February 2016 Distributed Lethality topic week, and released a call for articles outlining specific lines of inquiry. Contributors included active and retired US naval officers representing various communities in the Fleet, as well as civilians with relevant experience. This compendium consists of the articles that featured during the topic week.

Authors:Distributed Lethality 2016 Cover Image
Jeff E. Kline, CAPT, USN, (ret) 
Matthew Hipple
LCDR Chuck Hall with
LCDR David T. Spalding
LCDR Chris O’Connor

Anthony Freedman with
Mark Rosen
Chris Rawley
LCDR Collin Fox

LCDR Josh Heivly
John Devlin
LCDR Christopher Moran with
LT Ryan Heilmann
Alan Cummings
ENS Daniel Stefanus

Editors:
Dmitry Filipoff
Matthew Merighi
John Stryker
Sally DeBoer

Download Here

Articles:
A Tactical Doctrine for Distributed Lethality by Jeff E. Kline, CAPT, USN, (ret)
Distributed Lethality: Old Opportunities for New Operations by Matthew Hipple
Enabling Distributed Lethality: The Role of Naval Cryptology by LCDR Chuck Hall and LCDR David T. Spalding
Distributed Leathernecks by LCDR Chris O’Connor

The Legal Implications of Arming MSC Ships by Anthony Freedman and Mark Rosen
Distributed Lethality, Non-Traditional Fleets, and the Law of War by Chris Rawley
Implementing Distributed Lethality within the Joint Operational Access Concept by LCDR Collin Fox

Enabling Distributed Lethality by LCDR Josh Heivly
Reconfiguring Air Cushioned Vehicles to Enhance Distributed Lethality by John Devlin
The Elephant in the Room: E2-D and Distributed Lethality by LCDR Christopher Moran and LT Ryan Heilmann

Distributed Lethality: China is Doing it Right by Alan Cummings
Unleashing Unit Lethality: Revising Operational & Promotion Paradigms by ENS Daniel Stefanus

Be sure to browse other compendiums in the publications tab, and feel free send compendium ideas to Publications@cimsec.org.

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]