Tag Archives: EMCON

Distributed Lethality and Concepts of Future War

By Dmitry Filipoff


One must be ready to change his line sharply and suddenly, with no concern for the prejudices and memories of what was yesterday. To rest upon formula is a slumber that, prolonged, means death.”-Admiral Hyman G. Rickover.1

Distributed lethality is a concept that was officially launched a year ago by Navy leadership to explore how dispersing forces would enhance warfighting. Traditionally, dispersion has been a cardinal sin in the highly decisive nature of naval warfare, but new threats and capabilities may have changed this principle that has long guided the employment of warships. This analysis aims to show how distributed lethality can offer versatile means for achieving political and military objectives in an era of lean budgets and evolving threats.

Warfighting Characteristics

“More ships with more firepower acting more independently will increase the planning complexity and resourcing of our potential challengers.”-Vice Adm. Tom Rowden, Commander U.S. Naval Surface Forces.2

Navy leaders assert that distributed lethality will “add battlespace complexity3 and “complicate the calculus” of an adversary. How will dispersed surface action groups (SAG) accomplish this compared to traditional carrier strike groups (CSG), and how will dispersion affect operations in the electromagnetic (EM) domain?

Distributed lethality attacks left on the kill chain, meaning it intends to influence the earlier phases of the process by which targets are located, identified, targeted, engaged, and effects are assessed. Aside from increasing search volume, dispersion challenges intelligence, surveillance, and reconnaissance (ISR) through modularity. In a CSG centric navy, the detection of a large surface combatant increases the probability of learning the disposition of other warships, including valuable capital ships, and of knowing the operational unit they are arrayed in. The modularity offered by dispersed SAGs exacerbates the ISR challenge by reducing the certainty of what kinds of forces may be acting in concert with a potential contact, and what their capabilities and missions are. This will complicate prioritization of ISR and firepower, and increase the probability of expending precision guided munitions (PGM) due to forced error.4

However, distributed lethality will induce friction on the dispersed force. It is presumed that naval forces will employ emissions control (EMCON) techniques to frustrate the adversary in the EM domain. But EMCON exacerbates the challenges inherent to coordinating a dispersed force. Prior Navy experimentation discovered these challenges. Operations Haystack and Uptide revealed that dispersed operations under EMCON dramatically increase carrier survivability against submarines and land based bombers but at the expense of lengthened decision cycles.5 Under electromagnetic opposition, the degradation of confidence in the networking of a distributed force is easier because of additional variables to be accounted for and that can be influenced by enemy action. Aggregated forces can also more easily employ alternative means of communication compared to distributed forces.

Lengthened decision cycles for dispersed forces causes handicaps and presents dilemmas. Operations whose success is contingent upon careful coordination are less likely to succeed. The ability to mass capability on short notice amidst determined opposition is impaired. Planners must consider the extent that a SAG may be tied down by enemy action and its own tasking, and the resulting  impact on total force flexibility. Operations must have built in flexibility and consider myriad contingencies. Scenarios where SAGs may be called upon to support one another will pose a challenge given how the Navy’s offensive firepower may soon outstick its defensive firepower. These realities will place a premium on inclusive planning and the Navy’s command by negation tradition.

Dispersion will complicate the enemy’s ISR at the expense of reducing one’s own C2 agility. It is important to note that C2 is not just further left in the kill chain than ISR and targeting, but threads the entire process together. These realities may make distributed lethality inflexible under certain circumstances, and result in a higher echelon commander’s intent being articulated in broader terms and with more modest aims. Vice Adm. Ted N. Branch, Deputy Chief of Naval Operations for Information Dominance, pointedly reminded that “the assured C2 pillar touches almost everything we do.”6 The nature of modern conventional warfare has made the EM domain the battleground for superior decision making, and distributed lethality affects the kill chain of all parties.

Distributed Lethality versus Anti-Access/Area Denial 

As they seek greater influence, we confront states that seek to compromise freedom of the seas, where conflict and coercion are increasingly common.Chief of Naval Operations Adm. John. M Richardson.7

The Anti-Access/Area Denial (A2/AD) environment is the threat environment dominating the thinking of senior Navy leaders. What advantages does distributed lethality offer in meeting the A2/AD challenge?

Combating an A2/AD adversary could involve operations spanning multiple areas including blue water sea control, power projection into the littoral and across land. While the CSG is a formidable asset against the warships of a near peer adversary, a salvo competition between a CSG and A2/AD forces, especially land based forces, would be suicidal. The A2/AD model is attrition based. Its predominant advantage over expeditionary forces is the logistical sustainment of PGM, ensuring victory in a salvo competition if accurate targeting is sustained. By denying commons, A2/AD reduces freedom of maneuver and raises the probability of attrition based operations, forcing expeditionary forces into the A2/AD’s strength.

Distributed lethality counters A2/AD’s attrition model through maneuver warfare’s intent to probe for weakness and influence psychology. Dispersion facilitates multiple points of entry into theater, allowing for more sea control and maneuver. This in turn strains the anti-access mission and forces the adversary into executing area denial simultaneously. Distributed forces can probe more areas of the A2/AD envelope to gain intelligence on the opponent’s ISR capabilities and discover the true extent of their maritime domain awareness (MDA), setting the stage for follow on operations. Complicating ISR and targeting offsets logistical superiority by injecting uncertainty.

Platforms and Capabilities

“The Navy must be able to access any domain – and possess the mix of kinetic and non-kinetic weapons necessary to prevail today and tomorrow.”-Rear Adm. Mathias W. Winter, Chief of Naval Research.8

Distributed lethality will benefit from the numerous capabilities the Navy is developing to maintain its edge. The concept seeks to employ platforms in different ways, and promote versatility to make the most of limited resources. How could the Navy employ its warships differently and which capabilities should be prioritized?

In a 2014 CIMSEC article Admiral Tom Rowden, then director of Surface Warfare Directorate OPNAV N96, articulated a concept of dispersed lethality and asserted a distributed force will not be dependent on the air wing.9  While distributed lethality deemphasizes carrier strike missions, the air wing will be a critical enabler for the distributed force. A distributed air wing can provide rapid response anti-submarine warfare capability and function as communications relays for maintaining a responsive decision cycle while the dispersed force operates under EMCON. The air wing’s screening and early warning functions will be indispensable for enabling commanders on the scene to exercise initiative and engage on their own terms. The air wing will refocus from the right side to the left on the kill chain. 

Much has been made of a recent memo issued by Secretary of Defense Ash Carter to Secretary of the Navy Ray Mabus on the Navy’s programs. The most significant directives include cutting procurement of the littoral combat ship (LCS) from 52 hulls to 40, and procuring 31 additional F-35C aircraft.10 It is important to note that distributed lethality was born from a wargame at the Naval War College where a LCS equipped with a long range surface to surface missile “added stress and complexity to the red force commander, who had to spend precious ISR resources trying to find these upgunned ships.”11 If aircraft and fast frigates/LCS are mutually exclusive investments in the near term, the Navy should explore whether it needs more shooters in the form of additional warships or air wing enablers performing the aforementioned missions.

USS Fort Worth. Rolls-Royce Photo.
USS Fort Worth. (Rolls-Royce Photo)

A payload that has been wisely distributed across the Navy’s warships is the AN/SLQ-32 electronic warfare (EW) system. The Block III increment of the Surface Electronic Warfare Improvement Program (SEWIP)  will provide common electronic attack capability to surface combatants.12 Not only does the CSG focus large surface combatants on the defensive application of anti-air warfare (AAW), it does the same for EW. A distributed force equipped with an offensive EW capability could cause great disruption to an adversary’s ISR picture, reinforcing distributed lethality’s intent to attack left on the kill chain. As a part of a proposed acquisition fastlane, Chief of Naval Operations Adm. John Richardson has singled out EW capabilities as “candidates for this kind of rapid acquisition, rapid prototyping13 which will benefit distributed lethality enormously.  

Distributed lethality aims to add more firepower to the fleet, potentially even equipping logistics vessels with missiles as a part of the maxim “if it floats, it fights” issued by OPNAV N96 chief Rear Adm. Peter Fanta.14 However, the Navy should reexamine prioritizing anti-surface warfare (ASuW) capability and consider focusing on land attack. While putting modern anti-ship missiles on more surface combatants would reinvigorate the Navy’s ASuW capability, enhanced power projection across land holds greater deterrence value. The Navy’s land attack proficiency is well honed and proven through recent experience. Thankfully the versatility of the tomahawk missile can enhance both mission sets, but presents the technical challenge of installing vertical launch cells on ships that may have little space and weight to spare.

Arguably no set of capabilities stand to enhance distributed lethality more so than Cooperative Engagement Capability (CEC) and Naval Integrated Fire Control-Counter Air (NIFC-CA). These capabilities allow one platform’s sensors to provide a targeting solution to another platform’s weapons. This will multiply the lethality of a distributed force across vast areas of influence by allowing for the massing of payloads but not platforms. Distributed forces will be able to mitigate risk by mixing and matching whatever combination of sensors and shooters best fits an engagement while ensuring survivability.

Strategic Merit

“…it’s primarily about changing our ways and means right now and the operational concepts we use to achieve our objectives…”- Deputy Secretary of Defense Robert O. Work.15

An operational concept’s warfighting advantages are linked to its deterrence value. How does distributed lethality contribute to deterrence, and what options does it provide policymakers confronting crisis?

Distributed lethality enhances deterrence by influencing psychology through more than just kinetic means. It aims to degrade an adversary’s confidence in their weapons rather than through the threat of overwhelming force, a threat that is not as credible against an A2/AD adversary. Dispersion better allows for demonstrations within the EM domain, which may prove a less escalatory form of conveying resolve than deploying a CSG to a hotspot. The enormous creativity allowed by electromagnetic maritime deception allows for a more nuanced and flexible escalatory dynamic. Demonstration options range from temporarily confusing sensors to simulating strikes against strategic forces with impunity as the Navy did in NORPAC 82.16 Not only does threatening the destruction of networks constitute escalation, it attacks the channels by which deception conveys deterrence.17 During crisis, distributed lethality’s modularity allows for more options in terms of what and how many assets are committed to posturing, giving policymakers a more flexible means for adjusting the “temperature.” Distributed lethality not only has more to offer for maneuver in the military sense, but also politically.

As the threat environment evolves, reassessing the CSG’s deterrence value should occur in tandem with reevaluating its warfighting applications. Captain Robert C. Rubel (ret.) makes the excellent point that “If a lucrative target loaded with potent geopolitical symbolism is on scene, with more on the way, it could precipitate a dangerous “window-of-opportunity” mindset in the opposing government.”18 Sending a CSG to a hotspot could “catalyze as deter” and threaten nightmarish devastation or monumental loss of face as carriers are hurriedly withdrawn for the sake of preservation at the outbreak of war. During the initial phases of conflict, failing to deceive ISR through nonkinetic means could quickly escalate into attempting their physical destruction, up to and including strikes on mainland installations, which is more likely if a carrier’s survival is at stake.

Distributing forces will lower a first strike’s potential for success, which is especially important for deterring an adversary employing A2/AD. Jon Solomon points out an adversary’s maritime domain awareness “will never be as accurate and comprehensive at any later point in a conflict as it is during peacetime’s waning moments.”19 A patrolling, dispersed force would provide a more complex targeting picture, and would reveal more indicators and warning of an impending attack across a larger geographical area. These advantages would be realized by having forward deployed forces already operating in a dispersed manner at Phase 0, or otherwise face the uncomfortable process of transitioning into a dispersed force in the midst of crisis or at the onset of conflict.

Final Thoughts

“It will be orange and it may look kind of odd put together and won’t have the nice slick red/gray paint and it won’t be totally tested and it might fail, but we’ve got to get it out there and see what we can do with that.”-Chief of Naval Operations Adm. Jon Greenert.20

There are additional lines of inquiry that must be explored in order to flesh out distributed lethality. For example, what does it entail for amphibious forces? These forces are more likely to face the littoral arena, and their objectives are set upon fixed geography which limits their freedom of maneuver. The history of naval warfare has shown time and time again that key naval engagements precipitated in relation to developments and objectives on land. Scenarios commonly envisioned today such as a Taiwan contingency or a defense of the Strait of Hormuz demand that the Navy examine distributed lethality in a fixed geographical context. The concept will also challenge the ability to wage coalition warfare, as the careful planning and execution demanded by dispersed operations under EMCON will require ample cooperation and true interoperability.

Nonetheless, distributed lethality offers numerous benefits. It will make the most of what the Navy has today, while maximizing the value of investments that will achieve fruition both in the short and long term. It provides means for confronting the A2/AD challenge, and fulfills Air-Sea Battle’s intent to ensure U.S. forces can “assure access, maintain freedom of action, conduct a show of force, or conduct limited strikes.”21 Ultimately, it provides political and military leadership more flexibility to maneuver within crisis and conflict. The Navy must call upon its rich history of innovation and experimentation to turn distributed lethality into a credible warfighting construct that will deter foes, reassure allies, and make the greatest Navy the world has yet seen greater still. 

Dmitry Filipoff is CIMSEC’s Director of Online Content. He can be contacted at Nextwar@cimsec.org.

[1] Admiral Hyman G. Rickover. US Naval Postgraduate School address (16 March 1954). 

[2] Vice Adm. Tom Rowden. “Distributed Lethality: The Beginning of the Beginning,” Navy Live (January 20, 2015).

[3] Vice Adm. Thomas Rowden et. al. “Distributed Lethality,” U.S. Naval Institute Proceedings (January 2015).

[4] Solomon, Jon. “Guided Munitions Inventory Management, Producibility, and their Effects on Strategy (Part 1 of 2),” Information Dissemination (November 3, 2014).

[5] Angevine, Robert G. “Hiding in Plain Sight: The U.S. Navy and Dispersed Operations Under EMCON, 1956-1972,” Naval War College Review (Spring 2011).

[6] Vice Adm. Ted N. Branch. “A New Era in Naval Warfare,” U.S. Naval Institute Proceedings (July 2014).

[7] Chief of Naval Operations  Adm. John M. Richardson. “The Growing Importance of the Maritime,”10th Regional Seapower Symposium, Venice, Italy (October 22, 2015).

[8] The Fiscal Year 2016 Budget Request United States House of Representatives, 114th Cong. Statement of Rear Admiral Mathias W. Winter, United States Navy Chief of Naval Research. House Armed Services Subcommittee on Emerging Threats and Capabilities (March 26, 2015).

[9] Rear Adm. Thomas S. Rowden. “Surface Warfare: Taking the Offensive,” Center for International Maritime Security (June 14, 2014).

[10] U.S. Navy. “Surface Electronic Warfare Improvement Program (SEWIP),” United States Navy Fact File (November 15, 2013).

[11] Freedberg Jr., Sydney J. “CNO Richardson Urges Fast-Track For Cyber, EW & Drones,” Breaking Defense (December 7, 2015).

[12] Secretary of Defense Ash Carter. “Memorandum for Secretary of the Navy,” United States Department of Defense (December 14, 2015).

[13] Eckstein, Megan. “Navy Studying Implications of Distributed Lethality in Wargames Series,”U.S. Naval Institute News (July 9, 2015).

[14] Freedberg Jr., Sydney J. “ ‘If it Floats, It Fights’: Navy Seeks ‘Distributed Lethality’,” Breaking Defense (January 14, 2015).

[15] Deputy Secretary of Defense Robert O’Work.  The Third U.S. Offset Strategy and its Implications for Partners and Allies, Center for a New American Security, Washington D.C. (January 28, 2015).

[16] Pico, Andy. “How to Hide a Task Force,” Navweaps ( June 2, 1999).

[17] Solomon, Jonathan F. “Maritime Deception and Concealment Concepts for Defeating Wide-Area Oceanic Surveillance Reconnaissance-Strike Networks,” Naval War College Review (Autumn 2013).

[18] Capt. Robert C. Rubel (ret.), “Cede No Water: Strategy, Littorals, and Flotillas” U.S. Naval Institute Proceedings (September 2013).

[19] Solomon, Jon. “Parrying the 21st Century First Salvo,” Information Dissemination (October 16, 2014).

[20] Chief of Naval Operations Adm. Jonathan Greenert. Speech given at Naval Future Force Science and Technology Expo, (February 4, 2015).

[21] Air-Sea Battle: Service Collaboration to Address Anti-Access and Area Denial Challenges, United States Department of Defense (May 2013).

From Epipole to Cyber War

Walls and Counter-Walls
Walls and Counter-Walls

From The Jaws of Victory

In the Peloponnesian War, the 414 BC final battle of Epipole showed the pitfalls of an over-reliance on communications and single circuits. During this last battle of the Athenian siege of Syracuse, the Syracusans countered the attempt of Athens to wall in the city by building a counter-wall in the projected path of Athen’s efforts. The Syracusans had gained a critical blocking position, and Athenian General Demosthenes concocted a plan to dislodge the defenders. The Athenian forces stalled during the daytime battles outside the counter-wall, when their enemies could easily observe and rally against them, so General Demosthenes planned t strike the counter-wall at night. The well-organized nighttime Athenian attack completely overwhelmed and nearly destroyed the first Syracusan garrison. As the alarm sounded, the Athenians rushed forward without allowing themselves time to re-organize and re-identify. When the first real resistance was met, the ensuing disaster captured by Thucydides is worth citing in full:

IFF degrades to, "is this person stabbing me in the face?"
Primative IFF:  “is this person stabbing me in the face?”

“Although there was a bright moon they saw each other only as men do by moonlight, that is to say, they could distinguish the form of the body, but could not tell for certain whether it was a friend or an enemy. Both had great numbers of heavy infantry moving about in a small space. Some of the Athenians were already defeated, while others were coming up yet unconquered for their first attack. A large part also of the rest of their forces either had only just got up, or were still ascending, so that they did not know which way to march. Owing to the rout that had taken place all in front was now in confusion, and the noise made it difficult to distinguish anything. The victorious Syracusans and allies were cheering each other on with loud cries, by night the only possible means of communication, and meanwhile receiving all who came against them; while the Athenians were seeking for one another, taking all in front of them for enemies, even although they might be some of their now flying friends; and by constantly asking for the watchword, which was their only means of recognition, not only caused great confusion among themselves by asking all at once, but also made it known to the enemy, whose own they did not so readily discover, as the Syracusans were victorious and not scattered, and thus less easily mistaken. The result was that if the Athenians fell in with a party of the enemy that was weaker than they, it escaped them through knowing their watchword; while if they themselves failed to answer they were put to the sword. But what hurt them as much, or indeed more than anything else, was the singing of the paean, from the perplexity which it caused by being nearly the same on either side; the Argives and Corcyraeans and any other Dorian peoples in the army, struck terror into the Athenians whenever they raised their paean, no less than did the enemy.”

In Sicily, the simple task of a man not stabbing his own ally in the face with a sword was hard enough with only primordial Identification Friend or Foe (IFF) and comms. In today’s high-speed remote-control warfare and vulnerable high-tech comms, in which seconds can mean life-or-death, the potential to accidentally destroy a friend, miss an enemy, or become isolated is even greater. When the enemy knows the “watch-words,” this potential becomes a certainty as paranoia and confusion set in.
The Offense Challenge


The defender often has the simpler fight. As illustrated in the excerpt and so aptly explained by the indomitable Chesty Puller, “So they’ve got us surrounded, good! Now we can fire in any direction, those bastards won’t get away this time!” The U.S. Navy, in its typical role as the expeditionary power, will almost always have that offense-disadvantage. It has yet to fight an enemy that can attack the precious network of communications that creates such an unspeakable force multiplier in the field. When the network is attacked, the swarm of American ships, missiles, and aircraft itself becomes a liability, as were the Athenians who cut apart their own brothers ahead of them.
Protecting Less with More
The solution to the communication weakness is to stay ahead of the offense-defense struggle through aggressive capital investment and streamlined lines of communication. As with the use of setting AEGIS doctrine to auto-respond to anti-ship missile (ASM) threats, cyber-warfare is far too fast for human operators. Our virtual-defense infrastructure may be significant, but it is slow, human, and defending far too many unnecessary and redundant communications. A response is a smarter investment in cyber-defense capital and a more disciplined use of our vital communications networks.

"We got the info via e-mail? Good! Bill, request a message. Susanne, request it be added to three status and SITREP messages. I'll request voice reports on two different circuits. I'll also need 6 of you to chat them every 3 minutes from your individual accounts. After that, we'll send a powerpoint for them to update. Also, one of you be sure to forget this is high-side information and constantly ping them until they cave and email it from Gmail. Get to it, people!"
“We got the info via e-mail? Good! Bill, request a message. Susanne, request it be added to three status and SITREP messages. I’ll request voice reports on two different circuits. I’ll also need 6 of you to chat them every 3 minutes from your individual accounts. After that, we’ll send a powerpoint for them to update. Also, one of you be sure to forget this is high-side information and constantly ping them until they cave and email it from Gmail. Get to it, people!”

Streamlining comes from bringing all communications under control, or more accurately bringing under control those using them. We are the Athenians screaming our watch-word at one another because no one bothered to re-organize before charging in. It boils down to paying attention and staying calm; what we have is seventeen sources pinging a ship for the same information that is held in 8 PowerPoint trackers, 2 messages, at least one call over the voice circuits, and 30 emails with at least half the lazy people asking for the information in the CC line. The sheer bandwidth of material that needs protection and monitoring could be decreased with a “ctrl-f” search of email and message traffic. It also leaves a veritable treasure-trove of information lying around in hundreds of different locations, making it easier to steal or detect. Better training – not only in proper communications procedures/methods, but basic computer literacy, – could solve this problem.

Unfortunately, people are not as good at defending us from cyber attack as John McClane might have you think.
Unfortunately, no matter what Hollywood would have you believe, most cyber attacks can’t be defeated by John McClane.

The speed of cyber-attacks only allows the “labor” side of the equation to be reactive; capital investment would concentrate more money in autonomous and innovative defensive programs: 10th Fleet’s AEGIS. Proactive patrol and detection can be done with greater advances in adaptive self-modifying programs and programs that can learn or understand context.  Recent developments in computing systems point to more organic systems that can”live” in the systems they defend. Biological processors and organic computing allow for hardware that thinks and learns independently, potentially giving defensive networks the added advantage of an instinct and suspicion. The development of mutable indium antimonide magnetic processors mean that the circuit hardware of a device may now be as mutable as the software running it. Imagine the vast new horizons in the OODA loop of defensive cyber systems  with hubs sporting the defensive animal instinct and the ability to re-wire their own hardware. The image painted is dramatic and far-off, but modest investment and staged introduction would serve as a better model than the dangerous possibility of a “human wave” mode of thinking. With better fluid cyber-defense systems guarding more disciplined communicators, the U.S. Navy can guard its forces against Epipolaes.

Matt Hipple is a surface warfare officer in the U.S. Navy. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.