Countering Chinese Expansion Through Mass Enlightenment

By James E. Fanell and Ryan D. Martinson

From Newport to New Delhi, a tremendous effort is currently underway to document and analyze China’s pursuit of maritime power. Led by experts in think tanks and academia, this enterprise has produced a rich body of scholarship in a very short period of time. However, even at its very best, this research is incomplete—for it rests on a gross ignorance of Chinese activities at sea.  

This ignorance cannot be faulted. The movements of Chinese naval, coast guard, and militia forces are generally kept secret, and the vast emptiness of the ocean means that much of what takes place there goes unseen. Observers can only be expected to seek answers from the data that is available.

The U.S. Navy exists to know the answers to these secrets, to track human behavior on, above, and below the sea. While military and civilian leaders will always remain its first patron, there is much that USN intelligence can and should do to provide the raw materials needed for open source researchers to more fully grasp the nature of China’s nautical ambitions. Doing so would not only improve the quality of scholarship and elevate the public debate, it would also go a long way to help frustrate China’s current—and, to date, unanswered—strategy of quiet expansion. Most importantly, sharing information about the movements and activities of Chinese forces could be done without compromising the secrecy of the sources and methods used to collect it.

The Constellations are Visible…

The basic story of China’s maritime aggrandizement is printed in black and white, no need to read tea leaves. There exists a public life in China, even if highly circumscribed. Chinese journalists are paid to write articles that satisfy the urges of an inquisitive and patriotic public. Chinese scholars spend careers trying to understand the intentions and capabilities of their own country—like academics elsewhere, they banter back and forth in defense of “truth,” and bruised egos. Government agencies release reports that catalog their achievements, outline key objectives, and mobilize their personnel for the new tasks at hand. The Chinese military, communicating through service publications, seeks to inculcate a collective consciousness of what it does and why it does it. All of these sources are open to the foreign observer.

The available information provides important clues about the nature and extent of Chinese activities at sea. This is true for all three of the sea services: the coast guard, the maritime militia, and the PLA Navy.  

The movements of the Chinese coast guard are particularly amenable to open source analysis. China does not operate a single maritime law enforcement agency analogous to the United States Coast Guard. It instead funds several different civilian agencies, each with a different mission. Prior to the creation of the China Coast Guard in 2013, the agencies most active along China’s maritime frontier were China Marine Surveillance (CMS) and Fisheries Law Enforcement (FLE). Both agencies released surprising amounts of information through official newspapers, annual reports and yearbooks, and other channels.

In this Sept. 23, 2015, photo, provided by Filipino fisherman Renato Etac, a Chinese Coast Guard boat sprays a water cannon at Filipino fishermen near Scarborough Shoal in the South China Sea. A landmark ruling on an arbitration case filed by the Philippines that seeks to strike down China's expansive territorial claims in the South China Sea will be a test for international law and world powers. China, which demands one-on-one talks to resolve the disputes, has boycotted the case and vowed to ignore the verdict, which will be handed down Tuesday, July 12, 2016, by the U.N. tribunal in The Hague. (Renato Etac via AP)
Sept. 23, 2015. A Chinese Coast Guard boat sprays a water cannon at Filipino fishermen near Scarborough Shoal in the South China Sea. (Renato Etac via AP)

These sources include significant quantitative data. For instance, it is possible to track the expansion of CMS presence in disputed waters that started in 2006. In that year, CMS began to regularize its sovereignty—or “rights protection”—patrols, first in the East China Sea, then in the Yellow Sea and South China Sea. Each year, the State Oceanic Administration (SOA) published data on these operations. In 2008, CMS conducted a total of 113 sovereignty patrols. These missions, which covered more than 212,000 nm, established CMS presence in all of the waters over which China claims jurisdiction. Four years later, in 2012, the service conducted 172 sovereignty patrols (>170,000 nm) just in the South China Sea alone.

Qualitative data also abounds. Before 2014, both CMS and FLE regularly invited Chinese journalists aboard ships operating in disputed areas. These civilian scribes chronicled China’s campaign to reclaim “lost” land and sea. While primarily designed to inspire and titillate Chinese audiences, their work provides excellent source materials for the foreign observer. For instance the eight-part Chinese television documentary that aired in late 2013 showed extensive footage of CMS and FLE ships operating in the South China Sea, including during hostile encounters with Indonesian and Vietnamese mariners.

Chinese sources also provide raw materials for understanding the activities of the second major instrument of Chinese sea power—the maritime militia. This force is comprised of civilians trained to serve military and other state functions. In peacetime, a segment of the militia, mostly fishermen, constitutes an important tool in Chinese maritime strategy. It sails to disputed waters to demonstrate Chinese sovereignty and justify the presence of the Chinese coast guard and navy. The militia also harasses foreign vessels, and helps protect China’s own.

18 June 2016: Newly-built fishing vessels for Sansha City moored at Yazhou Central Fishing Harbor. Note the exterior hull reinforcements and mast-mounted water cannons. (Hainan Government)
18 June 2016: Newly-built fishing vessels for Sansha City moored at Yazhou Central Fishing Harbor. Note the exterior hull reinforcements and mast-mounted water cannons. (Hainan Government)

China’s maritime militia is particularly active in the South China Sea. The Chinese press eagerly covers their activities in disputed waters, often revealing ship pennant numbers and the names of key militiamen. Websites owned by provincial, municipal, and county governments also highlight their local contributions to the “people’s war” at sea. Using such sources, Conor Kennedy and Andrew Erickson have tracked the militia’s activities at places such as Mischief Reef and Scarborough Shoal, and deciphered its role in pivotal events such as the 2009 assault on the USNS Impeccable.

The PLA Navy also releases information about where, when, and how it is operating. Air, surface, and undersea deployments are called “combat readiness patrols” (zhanbei xunluo). Service publications regularly report on these patrols—including, perhaps surprisingly, those conducted by China’s “silent service.” For instance, one October 2014 article in People’s Navy recounts a story of Song Shouju, a submarine skipper from the PLA Navy South Sea Fleet (SSF), whose diesel electric boat was prosecuted by a foreign maritime patrol aircraft and a surveillance vessel during one combat readiness patrol. According to Song, his boat was subjected to 80 hours of active sonar, placing him on the horns of a dilemma. If he surfaced, it would mean a mission failure and “put Chinese diplomacy in an awkward position” (suggesting the submarine was not operating where it should have been). But if he remained below, the boat would risk the consequences of depleting its battery. In the end, the captain decided to stay submerged until the threat had passed, which it ultimately did.1

The PLA Navy is particularly forthcoming about patrols taking place beyond the “first island chain.” These are regularly reported in the Chinese press, both in English and Chinese. In May 2016, for example, six vessels from the SSF—including three destroyers, two frigates, and an auxiliary—completed a 23-day training mission that took them through the South China, the Indian Ocean, and the western Pacific by means of the Sunda Strait, Lombok Strait, Makassar Strait, and the Bashi Channel. At least one Chinese journalist was onboard to cover the 8,000 nm voyage. Again, the available data is not limited to the movements of surface combatants. For instance, a January 2014 People’s Navy article revealed that since 2009, 10 submarines and 17 aircraft from the ESF had traversed the first island chain to conduct “far seas” operations.2 Sources like these have enabled foreign researchers such as Christopher Sharman to trace the connection between Chinese actions and its declared naval strategy.

Chinese missile destroyer Haikou (171) is seen while docking in Hong Kong on April 30, 2012. (Aaron Tam/AFP/Getty Images)
Chinese missile destroyer Haikou (171) is seen while docking in Hong Kong on April 30, 2012. (Aaron Tam/AFP/Getty Images)

To follow Chinese activities at sea, one need not rely on Chinese sources alone. Foreign governments also sometimes release data. Often this information is associated with a particular incident. For instance, in mid-2014, the Vietnamese press published numerous articles in English covering China’s provocative deployment of an advanced new drilling rig (HYSY-981) in disputed waters south of the Paracel Islands. More recently, Indonesia released useful information about its response to illegal Chinese fishing and coast guard activities taking place near Natuna Island.

For its part, Japan systematically issues data on Chinese presence in the waters adjacent to the Senkaku Islands. Graphical depictions of these data vividly show Chinese expansion over time, from the inaugural intrusion of two CMS vessels in December 2008 to the regular patrols that started in September 2012 and continue today. Indeed, the quality and consistency of this data has enabled foreign analysts to use quantitative methods to test theories about shifts in Chinese diplomacy.

…But Darkness Still Prevails

The information described above, while useful, nevertheless presents many problems. This is true even in the case of data on Chinese coast guard operations, which are easily the richest available to the open source researcher. A “rights protection” patrol can mean anything from a two-day sweep of the Gulf of Tonkin to a several-month mission to the southern reaches of the Spratly Archipelago. Thus, while the available data unmistakably capture the broad trends of Chinese expansion, they lack the fidelity needed for closer examination of deployment patterns. With the creation of the China Coast Guard, all this is now moot. The Chinese government no longer publishes such data, and Chinese journalists are now seldom allowed aboard ships sailing to disputed waters.

The problem is much worse in the case of the maritime militia. No Chinese agency or department systematically tracks and releases information on militia activities. Because only a portion of fishermen are members of the militia, fishing industry data is a poor proxy. Thus, there is no way to scientifically track the activities of irregular forces operating along China’s maritime frontier. We generally only learn about particular incidents, remaining largely ignorant of the context in which they take place.

Consistent data on PLA Navy activities in disputed and sensitive waters is simply not available. We do know that in recent years the service “normalized” (changtaihua) its presence in the Spratly Archipelago, but Chinese sources provide no definition of what that term means. Thus, while it is clear that the PLA Navy has augmented its surface ship patrols to these waters, we have no means to gauge the scale of that augmentation.3 In the East China Sea, Chinese sources do speak candidly about hostile encounters with the Japanese Maritime Self Defense Force. However, the open source researcher has few options for gauging the extent of PLA Navy presence east of the equidistant line.

There is a more fundamental problem that must be reckoned with: in most cases, the foreign observer often lacks the means to validate deployment data found in Chinese sources. Ultimately, one must take the word of the Chinese government, which naturally considers political factors—both internal and external—when issuing such content. Information released by other governments can be valuable, but foreign statesmen have their own motives. Sometimes they seek to downplay differences. For example, it is likely that for many years China and at least some Southeast Asian states had a tacit agreement not to publicize incidents at sea.

In sum, the available open source data can account for only a tiny fraction of what Chinese maritime forces are doing at sea. Moreover, the validity of information that is available must be seen as suspect. This is where naval intelligence can help.

Sharing the Spotlight

Naturally, U.S. naval intelligence professionals, particularly those in the Pacific, pay close attention to the comings and goings of Chinese maritime forces. To this end, they employ a wide variety of sources, from highly sensitive national technical means to visual sightings made by U.S. and allied forces at sea. They also optimize other resources of the U.S. intelligence community to support their mission requirements.4 Suffice it to say, the naval intelligence community is well aware of the disposition of China’s naval, coast guard, and militia forces.

The foundation of this effort is the Pacific Fleet Intelligence Federation (PFIF), established in September 2013 by then United States Pacific Fleet Commander, Admiral Cecil Haney. The PFIF “provides direction for the organization and collaboration of the Pacific Fleet’s intelligence and cryptologic resources to support the maritime Operational Intelligence (OPINTEL) mission” of “tracking adversary ships, submarines and aircraft at sea.” It represents a level of focus and systematization not seen since the Cold War.

The PFIF is a true collaborative enterprise, involving “coordination from Sailors across multiple organizations at various echelons, afloat and ashore, working in unison 24 hours a day, seven days a week providing the most precise maritime OPINTEL to our afloat forces.”5 Efforts are “federated” across nodes in Japan, Hawaii, San Diego, and Washington D.C.6 Relevant data collected by regional allies are also included. The result is the adversary Common Operational Picture (RED COP). Through RED COP, the PFIF provides Fleet Commanders and deployed forces precise geo-coordinate level intelligence regarding the location of maritime platforms across the Pacific Fleet area of responsibility. It also contains a detailed pedigree of the sources used to identify the location of an adversary unit.

How might the USN translate RED COP into information that is valuable to the public  yet does not risk sources and methods? The answer lies in the format of the transmitted product. While American forces require the detailed information contained in the RED COP, the U.S. public does not. Therefore, the USN could issue a standardized series of PowerPoint graphics that contain generic depictions of PRC maritime force disposition across the Indo-Pacific region, if not the rest of the world. Since the technology used today by PFIF watch-standers can automatically produce this type of graphic, this would involve no new burden for naval intelligence professionals.

Some may argue that placing an adversary unit in a location where there is no “plausible deniability” could expose a source or method of intelligence collection. Four factors eliminate this risk. First, the generic placement of an adversary platform on a PowerPoint graphic would, by definition, not contain the level of fidelity required to determine the source of the contact. Second, as mentioned above, nearly all locations of maritime forces at sea are derived from multiple sources. This fact further complicates the task of determining any one particular source. Third, generic graphics would be published monthly, or biweekly at the most. This would dramatically reduce the potential risk to sources and methods. Fourth, and most importantly, there may be times when the Fleet Director of Intelligence (or higher authority) may deem the location of a particular ship, submarine or aircraft to be too sensitive. In such instances, they can simply remove the platform(s) from the briefing graphics. This would provide a final, fail-safe check against revealing any sensitive intelligence collection sources or methods. Together, these four factors would eliminate the possibility of compromising sources and methods, even with sophisticated algorithms of “pattern analysis.”

Such an initiative would not be entirely without precedent. The Office of Naval Intelligence (ONI) already produces the “World Wide Threat to Shipping” and “Piracy Analysis Warning Weekly” reports, which provide graphic and textual laydowns of the global maritime domain as derived from unclassified sources. The recommendations outlined in this essay would represent an expansion of current efforts under the auspices of ONI, using the PFIF’s all-source data as the primary source.

Office of Naval Intelligence (U) HORN OF AFRICA/GULF OF GUINEA/ SOUTHEAST ASIA: Piracy Analysis and Warning Weekly (PAWW) Report for 6 - 12 October 2016
10 Day Piracy small boat operations weather forecast from Office of Naval Intelligence (U) HORN OF AFRICA/GULF OF GUINEA/SOUTHEAST ASIA: Piracy Analysis and Warning Weekly (PAWW) Report for 6 – 12 October 2016.

The Rewards of Mass Enlightenment

Releasing such data would immediately benefit efforts to understand Chinese maritime strategy. It would open up whole new swaths of scholarship. Chinese actions could be directly correlated to Chinese words. Incidents could be placed in their correct context. Theories about China’s pursuit and use of sea power could be proposed and tested with new levels of rigor.

Better open source analysis would also benefit the intelligence community itself. The strengths of academic scholarship—such as understanding strategic and organizational culture—could be applied to the same questions that preoccupy USN analysts, perhaps yielding fresh insights. Efforts to contextualize the activities of China’s maritime militia, for example, would be especially welcome, given its peculiar social, cultural, and political roots.

While scholarship is valuable in and of itself, the ultimate purpose of such an initiative would be to improve the ability of our democracy to respond to the China challenge. Elected officials, who ultimately decide policy, take cues from public discourse. Thus, if wise policies are to be crafted, the broader American public must be fully aware of the threat that China’s pursuit of maritime power poses to American interests. This is especially important given that any proper response would require the whole nation to bear costs and accept risks. Unlike Russia, China’s actions are carefully calibrated not to arouse a somnolent American public. This places a very high premium on information about the actions that China is taking.  

To be sure, information is not an antibiotic. Ingesting it in the right quantities at the right frequencies may not cure the disease. Indeed, there is already enough data in the public domain for Americans to see the key trends. Yet there remain some very smart people who cannot, or will not, recognize the perils we face. Even so, the correct antidote to intellectual biases is ever more information; as data accumulates, the naysayers must either alter their theories or risk self-marginalization.

Sharing facts about Chinese activities at sea is not just good for democracy, it is also smart diplomacy. At this point, merely shining the spotlight on Chinese maritime expansion is unlikely to persuade China to radically alter its strategy. The China of Xi Jinping is less moved by international criticism than the China of Hu Jintao or Jiang Zemin. However, releasing detailed data on Chinese activities at sea would likely have an impact on foreign publics, who will use it to draw more realistic conclusions about the implications of China’s rise. Moreover, making such information widely available would help counter spurious Chinese narratives of American actions as the root cause of instability in the Western Pacific. Both outcomes are in our national interest.

To adopt the approach advocated in this essay would require a political decision. On matters of national policy, naval intelligence professionals must yield to civilian leaders.7 In the end, then, this essay is for the politicians. And so is its last word: share with the scholars.

James E. Fanell is a retired U.S. Navy Captain whose last assignment was the Director of Intelligence and Information Operations for the U.S. Pacific Fleet and is currently a Fellow at the Geneva Centre for Security Policy.

Ryan D. Martinson is a researcher in the China Maritime Studies Institute at the U.S. Naval War College. The views expressed are those of the author and do not reflect the official policy or position of the U.S. Navy, Department of Defense or the U.S. Government.

1, 周卓群, 李克一 [Zhang Yuannong, Zhou Zhuoqun, and Li Keyi] 潜航深海磨利刃 [“Sailing Submerged in the Deep Ocean to Sharpen Our Blade”] 人民海 [People’s Navy], 8 October 2014, p. 3.

2.  [Gu Caohua]   中抓建,造深蓝铁 [“Seize on Construction While in Action, Mold a Blue Water Iron Fist”] 人民海 [People’s Navy] 8 January 2014, p. 3.

3. 李唐 [Li Tang] 海化巡覆盖万里海疆 [“Normalized Naval Patrols Cover the Maritime Frontier”] 人民海 [People’s Navy] 23 June 2014, p. 1

4. James E. Fanell, Remarks at USNI/AFCEA conference panel: “Chinese Navy: Operational Challenge or Potential Partner?”, San Diego, CA, 31 January 2013.

5. James E. Fanell, “The Birth of the Pacific Fleet Intelligence Federation”, Naval Intelligence Professionals Quarterly, October 2013.

6. Ibid. James E. Fanell, “The Birth of the Pacific Fleet Intelligence Federation”, Naval Intelligence Professionals Quarterly, October 2013.

7.The authority for conducting an effort such as this would require approval from the Director of National Intelligence and the various “Original Classification Authorities” as outlined in Executive Order 1352. “Executive Order 13526- Original Classification Authority”, The White House Office of the Press Secretary, 29 December 2009, https://www.whitehouse.gov/the-press-office/executive-order-original-classification-authority

Featured Image: A sailor of the Chinese People’s Liberation Army Navy aboard the aircraft carrier Liaoning. (REUTERS/XINHUA)

The Problem of Mission Command

This article originally published on The Bridge and is republished with permission. Read it in its original form here.

By L. Burton Brender   b

Mission command has some real problems. Of course, the concept sounds great, or at least General Patton seemed to think so: “Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.” As you might expect, the US Army Command and General Staff College supports this belief, devoting hours to discussing the logic of empowering junior leaders. However, to paraphrase a US Air Force B-1 bomber pilot from the 2015-2016 class, the military rarely practices this. This article attempts to answer why. It submits that there are serious risks inherent within the philosophy of mission command that cause many people to reject it, if not in word then in deed. Three of these risks are the fear of subordinates making mistakes, the discomfort of superiors feeling out of control, and the angst of leaders chancing their careers on others’ mistakes. These are real dilemmas that inhibit the practice of mission command and ones that we in the military community often choose not to discuss—but like all dilemmas, they are easier to fix when confronted.

Generalfeldmarschall Helmuth Karl Bernhard von Moltke
Generalfeldmarschall Helmuth Karl Bernhard von Moltke

The philosophy of mission command is the empowerment of subordinate leaders to creatively solve problems within a higher commander’s intent. This philosophy surfaced prominently in military writing with the 1890 Prussian concept of Auftragstaktik, or mission tactics. The benefits of an agile and autonomous force, according to German military theorist Helmuth von Moltke the Elder, include the ability “to act on the basis of [one’s] own view of [a] situation, [especially] at times when no orders can be given.”

United States Army Lieutenant Colonel Brian Steed, a military history professor at the United States Army Command and General Staff College, once outlined the costs of embracing mission command as he saw them. One, audacity risks stupidity. Military leaders must accept that empowering juniors makes them equally capable of great heights of genius and of striking failures. Two, loosening control risks chaos (or at least the appearance of such). Allowing others to take control means that they may do things differently than their superiors would have. Lastly, leading empowered subordinates means superiors may pay the price for their mistakes. Perhaps the greatest threat to the implementation of mission command is the fear that leaders who practice it will be called to account for the leeway they granted. However, as threatening as all of this may look, Steed stressed that it is only by accepting and managing these liabilities prudently that we can have leaders capable of serving in the complex and rapidly changing environments in which we fight.

AUDACITY RISKS STUPIDITY

Subordinate empowerment can go terribly wrong. One prominent example is the battle of Little Bighorn. In 1876, US Army Lieutenant Colonel Custer’s 7th Cavalry was part of a large operation pursuing Chief Sitting Bull’s native coalition. During his 19 years in the Army, Custer had built a reputation as a daring commander. At age 23, he was one of the youngest generals in the American Civil War, establishing himself as an extremely aggressive leader in such engagements as Hunterstown and East Cavalry Field in the Battle of Gettysburg. Though a willingness to think for himself had won him success during the Civil War; later, though, it cost his and his men’s lives in battle with the Sioux.

In late June 1876, Custer’s force was part of a brigade-sized element attempting to destroy Sitting Bull. Colonel John Gibbon, Custer’s brigade commander and direct superior, ordered Custer to use his cavalry regiment to drive the enemy into the bulk of his waiting brigade. As Custer approached the enemy’s camp, though, he believed that hostile scouts had already compromised his element of surprise. He reasoned that if he did not act immediately, the enemy would escape as it had so many times before.

The Custer Fight" by Charles Marion Russell. (Public Domain)
The Custer Fight” by Charles Marion Russell. (Public Domain)

Operating well removed from direct supervision, Custer acted upon his judgment. He disregarded his commander’s plan and ordered his regiment to attack what he thought was a weak-willed enemy. Unfortunately for the 7th Cavalry, though, instead of a frightened band of renegades, Custer encountered a stalwart force of thousands of natives who killed nearly everyone in his command.

The same same audacity that had served Custer so well in the past ended in his unit’s ruin on that midsummer day. Both Gibbon’s and Custer’s Auftragstaktik resulted in failure, which brings us to an unpleasant reality: the chance that plans can fail horribly is a real and indelible risk associated of mission command. However, equally bound up with the risk of failure is the possibility of great success.

download-4
General Matthew B. Ridgway

The power of mission command is that it enables military units to adapt quicker and act more boldly than organizations in which subordinates are afraid to make decisions on their own. One example of this comes from the Korean War. When General Matthew Ridgway assumed command of the 8th United States Army, following the death of General Walton Walker, General Douglas MacArthur told Ridgway that “[You should] do what you think best…the Eighth Army is yours.” Ridgway later commented, “[T]hat is the sort of order that puts heart into a soldier.” Ridgway would go on to fight the North Koreans and Chinese ardently and ingeniously until the 1953 armistice at the 38th parallel. Mission command enables leaders, like Ridgway, to be audacious and successful just as much as it risks failures like Custer’s. It allows people the latitude to come upon opportunities and seize them.

LOOSENING CONTROL RISKS THE APPEARANCE OF CHAOS

For superiors, mission command is about accepting a certain loss of control. Indeed, by necessity the philosophy embraces a measure of seeming disorganization. Once, the author of this article observed a cavalry squadron’s training mission against a simulated chemical bunker in Korea. In preparation for the event, one troop commander carefully rehearsed his operation, including a 3-D digital walk through of the facility with his squadron commander present. The troop commander’s rehearsed plan was to enter the U-shaped bunker from the right—but upon arriving on the objective late on the night of the attack, the plan no longer made sense. On the fly, he decided to enter from the left. Obviously, going left instead of right was a small deviation from what he had briefed to his boss, but from the outside his actions might have looked like bedlam. That subordinate commander went about solving his problem differently than he had briefed and perhaps even differently than his commander would have. Extemporaneous decision making like that can insert a degree of unease into the execution of a plan, particularly for those superiors who do not feel comfortable with improvisation.

Supervisors may genuinely feel nervous about how their subordinates are going to perform when they are left to themselves, and not without good reason. Superiors practicing mission command allow their subordinates considerable leeway. For relationships where trust has not yet developed, or when supervisors require direct control to feel safe, there can be serious discomfort with mission command’s seemingly laissez-faire processes.

Yet, the lessening of control is an essential element of mission command and of the creative problem solving process itself. On another occasion, the author observed several staff officers preparing a presentation for their commanding general’s training brief to his higher command. In a brainstorming session, the general presented his message to the staff. His verbal message was masterfully articulated; however, he wanted a slide to support his point and was not sure what he wanted it to look like. So, three operations officers from his staff broke apart and created three entirely different slides. When the officers submitted their products to the general, he was pleased with the variety his staff afforded him and even more pleased that one of slides met his needs.

Neither the general nor the officers’ direct supervisor had any direct input on the creative process, yet their team still came up with a winning solution. The trust the leadership placed in their subordinates to enter into the “chaos” of unsupervised creativity allowed the general to deliver his message to his commander in the desired way.

EMPOWERMENT RISKS PUNISHMENT

It is important to admit that mission command can be a risky business. Why? Because superiors stand to lose a lot if their organizations fail at a task. Military officers are proud of saying that leaders are responsible for everything that happens and does not happen in their unit. Indeed, they should be proud of it: it is a key component of leader accountability. However, Brian Steed asserts this responsibility has a definite effect on the application of mission command that leaders ought to acknowledge.

…THE THREAT OF A STALLED CAREER IS OFTEN STRONG ENOUGH TO PROMPT LEADERS TO FOREGO MISSION COMMAND…

To illustrate the career risks that failure carries, a recent conversation with an Armor branch manager revealed a sobering statistic. Officers that made Armor’s 2015 battalion command select list had an average of approximately four and a half of five evaluation reports rated as “most qualified” (the highest rating), and merely advancing to lieutenant colonel required a record nearly as good. He continued that to get anything less than a nearly perfect history of evaluations means risking one’s very military retirement (at least as an Armor officer). This has the effect, however unintentional, of making aspiring officers reluctant to give their subordinates enough power to get them into trouble.

Addressing this issue starts with the institutional Army. To again paraphrase that same branch manager, with whom Steed agrees, the current standard of what a promising field grade officer looks like on paper is not sustainable. There simply are not enough top blocks to go around. Armor, at least, will eventually have to recalibrate its definition of what good enough is…or not have enough officers selected for its commands.

And while that particular example is drawn from the author’s own Armor branch, one could find parallels in almost any hierarchical organization, military or otherwise. Increasingly difficult-to-meet standards within competitive organizations inadvertently encourage leaders to tolerate less risk. According to Steed, the threat of a stalled career is often strong enough to prompt leaders to forego mission command and ensure they never get a mediocre evaluation. At the very least, the institution must acknowledge this.

However, the responsibility to empower mission command is not just at the institutional level. While every leader is affected by the system in which he or she works, he or she should never minimize his or her own ability to effect change. While some subordinates do warrant management in depth (though such individuals should soon find themselves differently employed), most do not need such paternalism. It is incumbent upon leaders to adroitly assess their subordinates and extend the maximum degree of latitude prudent for the circumstances. Yes, frustrating retraining will be involved and yes, subordinates will make foolish mistakes. However, to play to those factors is to miss the brilliance and ingenuity that lies within our team members.

CONCLUSION

It is within our power, indeed, it is our responsibility as leaders, to make mission command a daily reality. The United States’ military missions are too complicated and its formations too geographically dispersed to expect success without it. But to practice mission command we must accept three things: audacity risks stupidity, less control involves the appearance of chaos, and leaders who empower others will always incur risk. But, as Lieutenant Colonel Steed might say: if we can know the difference between honest mistakes and incompetence, if we can find the courage to let subordinates operate independently, and if we can accept that we might be held personally responsible for mistakes we did not make, then we can also achieve the prudent audacity to win wars, the brilliance to solve complex problems, and the wisdom to better realize our most important resource: people.

Burton Brender is an officer at the National Training Center at Fort Irwin, California. He holds a master of military arts and sciences from the Command and General Staff College and has held a variety of staff and command positions within the armor field. The opinions expressed are his alone and do not reflect those of the U.S. Army, the Department of Defense, or the U.S. Government.

Header Image: Lt. Gen. George Patton with the signal corps, 11 July 1943, Sicily. (General George Patton Museum)

Members’ Roundup: September 2016

By Sam Cohen

Welcome to the September 2016 members’ roundup. Throughout the month, CIMSEC members examined several international maritime security issues, including the successful testing of Raytheon’s SM-6 surface-to-air-missile by a Ticonderoga-class Aegis cruiser, developments surrounding the Littoral Combat Ship (LCS) program, the rise of non-state actors in international maritime security affairs, continued hostility between China and regional nations relating to the South China Sea maritime disputes, and the worsening of security tensions between American and Russian air and naval forces patrolling the Black Sea. 

Dave Majumdar, for The National Interest, discusses the Raytheon SM-6 Standard surface-to-air missile test that recently set a new record for the longest-range over-the-horizon intercept in naval history. The interceptor, which also has a long-range anti-ship variant, is a central component of the U.S. Navy’s Naval Integrated Fire Control – Counter Air (NIFC-CA) battle network. He highlights that the missile is effective against cruise missiles, aircraft, ballistic missiles, and enemy surface combatants while its range is estimated to be as great as 250 nautical miles. He also explains that the SM-6 interceptor is a major reason for why the U.S. Navy is confident in its ability to operate in highly contested environments, including regions where near-peer competitor powers have employed anti-access/area-denial weapons, such as the Baltics or the Western Pacific.

Bryan McGrath, for Scout Warrior, provides several recommendations for how the U.S. Navy should methodically approach future fleet architecture and force structure planning. He explains that developing the fleet to meet the challenges of great power competition should be central to this approach, largely because the capabilities this requires will allow for other critical security demands to be met as a byproduct, including control over trade routes, combating non-state actors, and enforcing maritime security. He also suggests that the relationship between the Navy and the Marine Corps should be funded as an asymmetric advantage unique to American seapower capabilities, while Congress should increase the overall resource allocation the Navy receives in order to meet the rigors of growing great power dynamics and the increasingly complex, multi-domain operational objectives associated with those adversaries.  

Steven Wills, for U.S. Naval Institute News, provides a review of the changes made to the Littoral Combat Ship (LCS) program and explains that although the ships’ new training procedures, modularity, and operational organization may seem revolutionary, these new features simply reinforce the ship’s core missions. He explains that the majority of the LCS force will be forward deployed in support of operational commander tasking while personnel swaps will be undertaken to keep the ships forward deployed for longer periods of time. He also adds that mission modules will be exchanged between different LCSs to meet strategic operational requirements. Although the LCS has received significant opposition from both military and political officials, he notes that the large numbers of LCSs planned for forward deployment will meet the fleet’s specific demand for 52 small combatant vessels, and more generally, the need for increased warfighting capacity across the force. 

Paul Pryce, for The NATO Association of Canada, discusses the rise of non-state actors across the international maritime environment, highlighting the People’s Liberation Army Navy (PLAN) and the Chinese Coast Guard’s training and funding of fishing militias to support China’s territorial claims in the South China Sea. He explains that the advent of these actors and their practices represent an overall increase in hybrid warfare on the oceans, a development which is likely to undermine regional security across the highly contested waters in the Asia-Pacific. With non-state actors offering plausible deniability for the states that support their activities, he suggests that states should seek greater cooperation in the enforcement of international maritime law by launching frequent and functional joint patrols as a means of building mutual trust between countries. He explains that this trust will increase constructive dialogue towards resolving ongoing disputes and will mitigate the tensions non-state actors and militias can induce between nations. 

Members at CIMSEC were active elsewhere during the month of September:

At CIMSEC we encourage members to continue writing, either here on CIMSEC or through other means. You can assist us by emailing your works to dmp@cimsec.org.

Sam Cohen is currently studying Honors Specialization Political Science at Western University in Canada. His interests are in the fields of strategic studies, international law and defense policy.

Featured Image: A P-8A Poseidon flying alongside a Lockheed P-3 Orion, close to Naval Air Station Patuxent River, Maryland, 2010 (U.S. Navy photo by Liz Goettee)

Entering the Bear’s Lair: Russia’s A2/AD Bubble in the Baltic Sea

The following article originally featured on The National Interest and is republished with permission. Read it in its original form here

By Bret Perry

On the cold, cloudy afternoon of March 18th, 2018, the 22nd Marine Expeditionary Unit (MEU) and its Amphibious Readiness Group steamed through the Baltic Sea about 100 miles south of the Swedish island of Gotland, just west of Lithuania and Latvia. With its full squadron of three amphibious assault ships, including the USS Bataan Landing Helicopter Dock, and three Arleigh Burke-class destroyers, this impressive US military presence in the Baltic Sea was unprecedented. In response to unusual Russian military activity near Estonia, including the presence of ‘little green men’ in the border town of Narva, the new White House administration was determined to send a message to Moscow.

Two US Marine Corps F-35Bs, flown by call sign Yukon and his wingman Zeus, surged off the deck of the USS Bataan to conduct a combat air patrol (CAP) to reinforce the NATO presence in the area. Banking south, Yukon heard the NATO E-3 Sentry Airborne Early Warning and Control (AWACS) operator Showboat say through his thick Dutch accent, “Yukon, Showboat, you have a pop-up group of two Bogeys, Bullseye 207 degrees for 150 kilometers, 1,300 meters.”

“Copy, Showboat. Intercepting,” Yukon responded as he throttled his jet up to Mach 1.6. Another aggressive Russian flyby, he thought.

About four minutes later, Yukon and Zeus had positioned their aircraft about 250 feet behind the two Su-30SM Flanker-C bandits. But unlike previous intercepts of Russian fighter over Baltic Sea, the Su-30s were clearly armed with more than the typical, short range Archer (R-73) air-to-air missiles.

“Zeus, any idea what they’re carrying?” Yukon asked his wingman.

“Negative, but they’re not playing around today,” she responded.

“Copy. Take a closer look for me.”

“Roger,” Zeus responded. She slowly began to creep her aircraft closer to the Su-30 on the left.

“Showboat, Yukon, tally-ho on two Flanker-Cs. We think…” Yukon’s voice trailed off as he watched a disaster unfold in an instant.

As Zeus approached the bandits, one of the Su-30s tried to barrel-roll over her F-35B. But as Zeus held steady 100 feet from the Flankers, the Su-30 pilot misjudged the maneuver, and slammed the Russian jet into the right wing of Zeus’ F-35B. The wing snapped off, sending Zeus spinning, while the Su-30 pitched over into a nosedive.

“Eject! Eject! Eject!” Zeus yelled into the radio.

In response to the chaos, the remaining Su-30 banked right, and bugged out. When Yukon looked to his left, he felt relief and horror at what he saw.

He could see Zeus’ parachute. But… there was no sign of the Russian pilot.

Although the aforementioned vignette is fictional, it captures the increasingly worrisome military implications of Russia’s posture in Kaliningrad. The presence of Russian ground, naval, and air forces in Kaliningrad is not new, but Russia has essentially transformed the tiny area into a major “pop-up” Anti-Access/Area-Denial (A2/AD) zone from what had been a Cold War-era Soviet outpost. Despite traditionally being associated with the Asia-Pacific or even the Persian Gulf, Russia’s deployments in Kaliningrad reflect the potential for the emergence of localized A2/AD zones in Europe. Not only is A2/AD now a critical component in European security dynamics, but it is also a global phenomenon that has truly ‘broken out’ of the Pacific’s First Island Chain. With NATO’s eyes on the defense of its Baltic members and a growing view that Poland is NATO’s new center of gravity in the East, a Kaliningrad A2/AD zone projects advanced ground, naval, and air threats, creating significant security challenges.

visualizing_a2_ad_map_300dpi_beige_rgb1
Range rings of Russian missile systems in Kaliningrad. (Avascent)

Achieving Integrated Air and Missile Defense (IAMD) and air dominance is a critical component in countering A2/AD zones. Although Russia’s defense industry faces challenges with upgrading the state’s fighter fleet, both the Russian Aerospace Forces and Russian Naval Aviation possess formidable 4G and 4.5G tactical aircraft capable of executing advanced air-to-air combat and challenging NATO’s air dominance. In Kaliningrad, two Naval Aviation fighter regiments maintain several squadrons of Su-27 fighters and Su-24 bombers out of two separate air bases. As Russian Naval Aviation purchases at least 50 new Su-30SMs by 2020, the forward deployment of these units to Kaliningrad would significantly sharpen Russia’s sword in the Baltic airspace. Specifically, Kaliningrad’s position provides Russian forces with the ability to scramble their tactical aircraft within close proximity to NATO forces while under the protection of extensive Russian air-defense systems.

15 minutes later, Yukon continued circling, waiting for the other Su-30SM to return and hamper the USS Bataan’s search and rescue efforts. Suddenly, he heard Showboat shout over the radio.

“Unidentified track, Bullseye 163 degrees for 380 kilometers, 2,300 meters, hot!”

Yukon saw the new contact marked by Showboat on his Tactical Situation Display (TSD) located on the front left of his F-35B’s cockpit. It was tagged as unknown, but moving rapidly across the screen at 4,500 mph towards Showboat. Yukon’s gut told him something was wrong, so he quickly switched his APG-81 radar onto “active” mode.

In a second, the Active Electronically Scanned Array (AESA) radar on Yukon’s F-35B scanned the object and autonomously identified it as a Russian 40N6 missile. As the F-35B’s datalink automatically transferred its identification to Showboat’s AWACS and other forces in the area, he said, “Showboat, Yukon, Bullseye, 230 degrees for 340 kilometers, 5,000 meters, SAM launch! Break left! Break left!”  

But the 40N6 surface-to-air missile (SAM), flying at over 4,500 mph, was too fast.

Within 10 seconds, Yukon heard Showboat shout “Break…Mayday! Mayday! May…!” All what was left was static. On his TSD, the icon denoting Showboat’s AWACS was gone from his display.

Launched from an S-400 “Growler” SAM launcher near the small coastal town of Yantarny in Kaliningrad, the 40N6 missile is a long-range weapon with an active- and semi-active seeker designed to destroy high-value targets, such as AWACS, electronic warfare, and other special mission aircraft. In 2012, Russia began outfitting at least two battalions in Kaliningrad with its new S-400 SAM system. The S-400s joined Kaliningrad’s S-300 SAMs, also an important threat.

Moscow’s deployment of S-400 missiles to Kaliningrad was key in transforming the outpost into an effective A2/AD zone. With a maximum range of 250 miles (although the system most likely can only detect advanced stealth aircraft with much smaller radar cross-sections, such as the F-22, at closer ranges), Kaliningrad’s S-400s are capable of turning the airspace over much of the Baltic Sea, Latvia, Lithuania, and half of Poland (including the capital, Warsaw), into a no-fly zone at the flip of a switch. General Frank Gorenc, the commander of US Air Forces in Europe, explained that Moscow’s SAMs and other systems “creates areas that are very tough to get into.” Although an assortment of stealth aircraft, electronic warfare capabilities, and long-range strike weapons can neutralize the S-400, strikes in Kaliningrad carry strategic consequences due to the risk of Russian escalation, ultimately making the suppression of enemy air defenses a complex challenge.

Without Showboat, Yukon and the naval forces accompanying the 22nd MEU were in the dark without any early warning capability. Yukon’s F-35B acted as the eyes and ears of the fleet with its AESA radar. But as he was miles south of the MEU and the closest AWACS replacement was in Germany, the decision was made to have one of the escort destroyers turn on its radar’s “active” mode. This decision would give away the MEU’s precise location, but was necessary to establish a 360-degree view of the deteriorating situation.

The USS Truxtun powered on its SPY-1D radar and Mk 99 fire control system to restore awareness. Although the Truxtun could now detect targets over 100 miles away, Yukon’s F-35B continued to play a role with its powerful AESA radar.

But within a minute of firing up its radar, “Overlord,” Truxtun’s operations specialist announced “10 unidentified tracks, Bullseye 187 degrees for 280 kilometers, and closing fast.”

Yukon looked down on his TSD and saw the unidentified tracks appear near the top edge of the screen. They were moving quickly down the display at an angle towards the MEU, but not as fast as the S-400 missile’s earlier observed path. At the current pace, they would reach the fleet in about 410 seconds. Yukon banked his plane and burned towards the unknown contacts.

About a minute later, Yukon’s AESA radar picked up all ten of the contacts, identifying them as P-800 Oniks anti-ship cruise missiles. The F-35B’s computer immediately transmitted the data to the Truxtun and other NATO forces in the immediate area. Within less than a second, the Truxton’s AEGIS Combat System processed the threat information and autonomously launched 20 SM-2 SAMs towards the incoming Oniks missiles, targeting each Oniks with two SM-2s.

Yukon burned towards the Oniks missiles, prepared to intercept. But Overlord was wary of Yukon going “winchester,” or running out of missiles, especially if additional Russian aircraft emerged.

About 150 seconds later, the Truxton’s SM-2s reached the incoming Oniks missiles. Four of the missiles struck their targets, but debris from their impact knocked the Truxton’s remaining SAMs off course. Detecting its error, the Truxton’s AEGIS system automatically launched 12 new SM-2s towards the remaining Oniks missiles.

“Overlord” ordered Yukon to engage one of the Oniks even though they were nearly out of range. The nervousness in Overlord’s voice was unmistakable. Yukon acknowledged the command, responding with “Fox Three” as one of his AIM-120 Advanced Medium-Range Air-to-Air Missiles (AMRAAM) dropped out of the F-35B’s weapons bay, firing towards the Oniks.

90 seconds later, the Truxton’s second wave of SM-2s reached the remaining Oniks missiles. They knocked two Oniks missiles out of the sky, but four more remained. 10 seconds later, Yukon’s AMRAAM smashed into an Oniks, leaving three. The Truxton’s AEGIS Combat System immediately launched six of its RIM-162 Evolved SeaSparrow Missiles, which were tailored to counter supersonic maneuvering anti-ship missiles such as the Oniks.

Within 60 seconds, the RIM-162s found their targets. Two of the Oniks were hit, but a sudden last-minute maneuver by the last Russian missile kept it airborne.

10 seconds later, this final missile struck the Truxton’s bow at supersonic speeds, delivering a crippling blow to the American warship.

Responsible for launching the Oniks, the K-300P Bastion is one of the most advanced anti-ship cruise missile systems fielded. With a range of 186 miles, this system is capable of launching supersonic missiles that can fly as low as 15 feet and conduct evasive maneuvers to counter a target’s anti-missile defenses. Impressed by its capabilities, Russian and Indian engineers used the Bastion’s P-800 Oniks missiles to form the basis for the jointly-developed BrahMos, the world’s fastest anti-ship cruise missile in operation. Essentially, the Bastion not only lets its operators engage distant naval targets, but also allows them to launch advanced missiles capable of overwhelming sophisticated anti-air defenses systems.

Although Russia has not yet equipped its coastal missile regiment based in Kaliningrad with the advanced Bastion anti-ship missile system (the regiment in Kaliningrad is reportedly deployed with the less advanced SSC-1 ‘Sepal’ missiles), the aforementioned scenario is important as it still showcases how easily Russia can assemble the necessary elements in Kaliningrad to deny access to the Baltic Sea. Further, as Moscow already decided to deploy the Bastion to controversial areas, such as the Kuril Islands in the Pacific, and Crimea in the Black Sea, Kaliningrad forces could also soon be armed with the Bastion as Moscow continues to pursue A2/AD in Europe. Coastal missile forces aside, Kaliningrad’s three diesel-electric submarines, two destroyers, and assortment of smaller vessels provide Russian forces with enough maritime power to contest a NATO naval presence in the Baltic Sea. As commander of US Army Europe, Lieutenant General Ben Hodges, explained, Russia “could make it very difficult for any of us [US] to get up into the Baltic Sea if we needed to in a contingency.”

About 25 minutes later, Yukon was about 50 miles north of Kaliningrad, flying low. Miles behind him, five other F-35Bs had taken off from the Bataan and were en route to join him.

It was time to strike back.

But Yukon and his fellow Marine aviators would not be leading the strike. That was the job for the Polish Air Force.

Committed to NATO, Poland activated contingency plans to scramble a squadron of F-16s to conduct a Strike/CAP tasking soon after Showboat’s F-35B went down. In response to heavy usage, Poland had just upgraded its F-16s to be some of the most advanced aircraft of that type anywhere. Equipped with AESA radars, a next-gen datalink pod, and advanced strike munitions, the Polish F-16s would deliver the punch against Russian forces in Kaliningrad.

Specifically, the Polish F-16s were equipped with AGM-158 Joint Air-to-Surface Standoff Missiles (JASSM) that could strike targets as far as 230 miles away. The Polish squadron was split into two, flying “nap-of-the-earth” to avoid Kaliningrad’s Growler SAMs. In support were Bataan’s F-35Bs, which would engage any Russian air threats with their AMRAAM missiles and jam their sensors and communications with their electronic warfare systems. Since Yukon was closer to Kaliningrad, he would provide the Polish pilots with targeting information via a secure next-gen datalink that wouldn’t give away their positions, unlike legacy Link-16 systems. At this point, his AESA radar was switched to passive mode, allowing the stealthy F-35B to fly undetected towards Kaliningrad.

When Yukon was 45 miles from the shore, still unseen by Russian radar operators, he powered on his advanced Electro-Optical Targeting System (EOTS). Since the miniaturized EOTS sensor was built into the F-35’s nose, he didn’t have to worry about the sensor eroding his aircraft’s stealth profile. On the screen Yukon steered towards the target into a “bump-up” position.

Yukon’s display showed several Growler SAM’s in their “slanted-E” revetments. He was about to confirm the target when he noticed something else—a skinny object standing up.

It was an Iskander “Stone” transporter erector launcher (TEL) in firing position.

The Iskander, also referred to as the SS-26, is a modern short-range ballistic missile system capable of launching missiles with conventional high-explosive fragmentation warheads, fuel-air explosives, bunker buster, and electromagnetic pulse payloads. Additionally, the Iskander’s maximum range of 310 miles makes it a potent system. But the Iskander’s most lethal trait is its ability to launch nuclear warheads with as much power as 50,000 tons of TNT.

In 2015, Russia began rotating its newest Iskander-M systems in Kaliningrad in response to NATO’s renewed commitment to Eastern European defense. Moscow may permanently deploy the missiles to Kaliningrad by the end of the decade. Also troubling, some NATO partners believe that Moscow is secretly stockpiling tactical nuclear warheads in Kaliningrad for use atop the Iskanders. The Kaliningrad deployments were a surprise as Moscow previously used threats to position these missiles in Kaliningrad as a bargaining tool to reduce NATO’s European missile defense deployments. Even though the Iskander is just a tactical missile system, its deployment in Kaliningrad has strategic implications for NATO attempts to “deflate” an A2/AD bubble there. With or without nuclear warheads, Kaliningrad’s Iskanders have the ability to strike an array of key NATO positions in the Baltics. Morever, the confusion whether an Iskander system is armed with conventional or nuclear payloads by itself could foul NATO’s crisis decision making.

40 minutes later, Yukon was just a couple miles away from “Banker,” a Dutch KC-10 Extender aerial refueling tanker aircraft. The joint USMC-Polish retaliatory strike had been called off as pressure from several NATO partners and other states forced the US to step back and resolve the crisis diplomatically. The Russian propaganda machine was in full swing, asserting that its Kaliningrad forces acted entirely in self-defense. Russian Deputy Prime Minister Boris Vorshevsky claimed that Zeus deliberately crashed her F-35B into the Russian Su-30 and that Kaliningrad’s military commanders had no choice but to launch “a couple” Oniks missiles when the “trespassing” US forces turned on their fire control systems. Vorshevsky’s comments were retweeted and broadcasted around the world.

Waiting to refuel from the Dutch tanker, Yukon reflected on how close he’d come to attacking Russian forces. All he could think about was that he’d back up flying a CAP the next day and who knew what the Russians had in store tomorrow.

Again, this scenario is fictional and some liberties were taken for narrative purposes. As well, the reality of such a scenario unfolding would be even more complex, especially in the political domain. But the point that US forces will struggle to maneuver in new European A2/AD bubbles is unquestionable.

“Popping” Russia’s European A2/AD bubbles wherever they may be established is ultimately a tough challenge without easy answers for NATO. Purely surging an overwhelming amount of force into the bubble is simply not feasible due to resource constraints and the risk that Russia would respond with tactical nuclear weapons. However, by making its forces more survivable, the US and NATO allies can naturally degrade the potential effectiveness of Russia’s A2/AD zones and establish some credible level of conventional deterrence.

There are examples worth considering for inspiration, such as the US Navy’s Naval Integrated Fire Control-Counter Air (NIFC-CA) capability. NIFC-CA is a US Navy concept using an array of advanced data links to transform a carrier air wing and carrier battle group into a larger network of distributed ‘sensors’ and ”shooters.” Created to counter the air-breathing threat elements of Chinese A2/AD in the Asia-Pacific, NIFCA-CA is a redundant, “networked-enhanced” system capable of functioning even if a handful of sensors are neutralized or jammed. Essentially in NIFC-CA, every aircraft and destroyer is linked directly to each other to make the force more survivable.

A NIFC-CA-like capability scaled for the European theater is a crucial step for defeating Russia’s European A2/AD bubbles through neutralizing air-breathers and broadly enabling more effective air operations. Simply, NATO cannot expect to conduct SEAD, CAS, or other types of air operations to ‘pop’ Russia’s A2/AD bubble without removing the air-breather threats. Although critics rightfully point to Russia’s advanced EW capabilities (as demonstrated in the Ukrainian conflict) as a key challenge, this only reinforces the need for NATO to invest in a more networked, resilient force.

The “NATO Integrated Fire Control-Counter Air” concept must be service agonistic (e.g., not just a Navy concept, but inclusive of Air Force assets as well) as conflict in the European theater will not solely revolve around the carrier air wing; the appropriate air, naval, and relevant ground platforms should be incorporated. Furthermore, this integrated fire control concept must include the systems of non-US NATO members. In Europe, the US has partners—some of which are positioned within Russia’s emerging A2/AD bubbles—with platforms already in place that can provide immediate support. Challenges associated with information assurance, interoperability, and 5G-to-4.5G communications make developing a ‘common datalink’ a difficult task, but one that is crucial to maximize the effectiveness of NATO’s air assets.

Whether it is turning an American US Air Force F-15C/D, USMC F-35B, or Polish F-16 C/D into sensors and shooters networked directly with each other, a ‘NATO IFC-CA’ would diminish the potency of Russia’s A2/AD zones. But ultimately, Russia’s new way of operating in Europe requires the US and NATO to increase their investments in the appropriate capabilities, hone joint multinational operations through regional exercises, and most importantly, assess how their current strategy, doctrine, and tactics match up against this evolving threat.

Bret Perry is an analyst at Avascent, an aerospace and defense consulting firm. The opinions and views expressed in this article are those of the author alone and are presented in his personal capacity. They do not necessarily reflect those of any organization.

The author would like to thank August Cole, Dominik Kimla, Alex Chang, Steve Ganyard, Jacqueline Phan, and Cate Walsh for their advice and comments.

Featured Image: S-400 Triumf air defense systems from Russia (defencetalk.com)

Fostering the Discussion on Securing the Seas.