Deception and the Backfire Bomber: Part Two

The following article is part of our cross-posting partnership with Information Dissemination‘s Jon Solomon. It is republished here with the author’s permission. It can be read it in its original form here.

Read part one of this series here.

By Jon Solomon

Was U.S. Navy Tactical Deception Effective?

Since Backfire needed pathfinder support, the U.S. Navy’s key to disrupting if not decapitating a raid by the former was to defeat the latter. As part of my thesis research, I came across much circumstantial evidence that the U.S. Navy’s combination of strict Emission Control (EMCON) discipline, decentralized command and control doctrine, occasional use of lower campaign-value warships to simulate high campaign-value warships, and perhaps even occasional use of electronic jamming gave SOSS controllers and Soviet reconnaissance assets fits during real-world operations. Still, I did not come across any authoritative Russian perspectives on whether or how these U.S. Navy counter-targeting efforts affected Soviet doctrine, tactics, or confidence. That’s what makes the following comment from Tokarev so interesting:

“Moreover, knowing the position of the carrier task force is not the same as knowing the position of the carrier itself. There were at least two cases when in the center of the formation there was, instead of the carrier, a large fleet oiler or replenishment vessel with an enhanced radar signature (making it look as large on the Backfires’ radar screens as a carrier) and a radiating tactical air navigation system. The carrier itself, contrary to routine procedures, was steaming completely alone, not even trailing the formation. To know for sure the carrier’s position, it was desirable to observe it visually.”(Tokarev, Pg. 77)

He goes on to describe a special reconnaissance-attack group of sacrificial bombers that might be detached from an inbound raid to penetrate a naval formation and visually identify the primary targets. Only with positive target designations from these pathfinders, or perhaps from TU-95RT Bear-D reconnaissance aircraft preceding the raid, could Backfire crews have any confidence the single missile they each carried was aimed at a valid and valuable target (Tokarev, Pg. 72, 77). Even then, he observes that “Contrary to widespread opinion, no considerable belief was placed in the ability of launched missiles to resist ECM efforts” (Tokarev, Pg. 75), indicating recognition that the countertargeting battle hardly ended with missile launch.

The one exception to the above contact classification and identification problems would have been a war-opening first salvo attack, in which targeting-quality cues could have been provided to Backfires or other anti-ship missile-carrying assets by any tattletale ships following a carrier closely. While noting the tattletale tactic’s high potential efficacy, Tokarev makes clear it could only be used in peacetime and would never again be possible following hostilities’ outbreak:

“Despite the existence of air reconnaissance systems such as Uspekh, satellite systems like Legenda, and other forms of intelligence and observation, the most reliable source of targeting of carriers at sea was the direct-tracking ship. Indeed, if you see a carrier in plain sight, the only problem to solve is how to radio reliably the reports and targeting data against the U.S. electronic countermeasures. Ironically, since the time lag of Soviet military communication systems compared to the NATO ones is quite clear, the old Morse wireless telegraph used by the Soviet ships was the long-established way to solve that problem. With properly trained operators, Morse keying is the only method able to resist active jamming in the HF band… But the direct tracker was definitely no more than another kind of kamikaze. It was extremely clear that if a war started, these ships would be sent to the bottom immediately. Given that, the commanding officer of each had orders to behave like a rat caught in a corner: at the moment of war declaration or when specifically ordered, after sending the carrier’s position by radio, he would shell the carrier’s flight deck with gunfire, just to break up the takeoff of prepared strikes, fresh CAP patrols, or anything else.” (Tokarev, Pg. 80)

Preventing a tattletale from maintaining track on a carrier accordingly reduced the chances for successfully striking that carrier. Additionally, since not all carriers would be operating forward at the time of the first salvo, those withheld in areas tattletales could not readily access would be more or less immune from large-scale attacks. This would leave the Backfires overwhelmingly dependent upon pathfinders in any later raid attempt.

It should be obvious that EW (and its contemporary cousin, cyber warfare) or tactical deception capabilities on their own are not going to deter an adversary from embarking upon some form of conventional aggression. The adversary’s decision to seek war will always be politically-driven, and the possibility of aggression out of desperation vice opportunism cannot be discounted. To the extent that political and military leaders’ latent psychological perceptions of their forces’ strengths and weaknesses influence their war making calculus, though, efforts to erode an opponent’s confidence in his most doctrinally important military capabilities can induce him to raise his political threshold for resorting to war. Tokarev’s observations therefore imply that Soviet commanders understood the likely cost in their crews’ lives that would be necessary just to provide a raid a chance at success, and that complicating variables such as the U.S. Navy’s demonstrated counter-targeting competencies only made the whole endeavor seem more uncertain and costly. The impact upon general deterrence, while immeasurable in any real sense, obviously was not insignificant.

In part three of the series, an examination of the deception tactics that might have been employed by Backfire raids.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at jfsolo107@gmail.com. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

2 thoughts on “Deception and the Backfire Bomber: Part Two”

  1. Interesting read. So what should a modern task force commander do? During the Doolittle Raid, the US Navy had to launch the B25’s early because several Japanese fishing boats spotted the carriers. The US quickly sunk the fishing boats. Now lets fast forward the situation to the modern age. We already know that Chinese subsidy their long range fishing fleet and provide them with Navigation and radio equipment. So does them that every warship that gets spotted by a Chinese fishing boat has to sink them because each of those vessels could be a “tattletail” and in communication to PLAN HQ? Do we need to change ROE that when hostiles are imminent that all large Chinese fishing boats are boarded and searched or sunk if they refuse. Should we invest in jammers to prevent their communication? Interesting questions that should be wargamed and planned for.

  2. Naval Warfare Publication (NWP 3-13, dated Feb 2014, paragraph 2.4.1 states:

    “The primary focus of IO at the tactical level of war is to deny, degrade, deceive, disrupt, or destroy an adversary’s use of information directly related to conducting military operations.”

    (In the current US Navy lexicon, the terms Information Operations and Information Warfare are synonyms.)

    The Navy Information Warfare Community has been and remains overwhelmingly focused on Naval Intelligence, Naval Cryptology, and Meteorology and Oceanography (METOC), with little evidence that this community has recognized and and assumed leadership of Navy efforts to focus on information warfare at the tactical level. One might expect the Information Warfare community to lead efforts to explore information warfare concepts and capabilities in articles such as this, and in war games, fleet exercises, and in budget submissions.

    It is time to recognize that Information Warfare is one of the Navy predominant warfare domains with all of the complexities of warfare in other domains, all of which are supported by Naval Intelligence, Naval Cryptology and METOC.

Leave a Reply