All posts by Guest Author

Kamikazes: The Legacy of Soviet Naval Aviation, Pt. 2

The following selections are derived from an article originally published in the Naval War College Review under the title, “Kamikazes: The Soviet Legacy.” Read it in its original form here.

Read Part One here.

By Maksim Y. Tokarev

As it was, the crews of the field-parked Backfires, in the best aviation tradition, had to accept the primary flight data during briefings in the regiments’ ready rooms. Of course, they had the preliminary plans and knew roughly the location of the incoming air-sea battle and the abilities of the enemy—the task force’s air defenses. In fact, the sorties were carefully planned, going in. But planning was very general for the way out. The following conversation in the ready room of the MRA ’s 183rd Air Regiment, Pacific Fleet NAF, which occurred in the mid-1980s, shows this very honestly. A young second lieutenant, a Backfire WSO fresh from the air college, asked the senior navigator of the regiment, an old major: “Sir, tell me why we have a detailed flight plan to the target over the vast ocean, but only a rough dot-and-dash line across Hokkaido Island on way back?” “Son,” answered the major calmly, “if your crew manages to get the plane back out of the sky over the carrier by any means, on half a wing broken by a Phoenix and a screaming prayer, no matter whether it’s somewhere over Hokkaido or directly through the moon, it’ll be the greatest possible thing in your entire life!” There may have been silent laughter from the shade of a kamikaze in the corner of the room at that moment.

The home fields of MRA units were usually no more than 300 kilometers from the nearest shoreline (usually much less). Each air regiment had at least two airstrips, each no less than 2,000 meters long, preferably concrete ones, and the Engineering Airfield Service could support three fully loaded sorties of the entire regiment in 36 hours. The efforts of shore maintenance were important, as all the missiles, routinely stored in ordnance installations, had to be quickly fueled and prepared for attachment to the planes before takeoff.

The takeoff of the regiment usually took about half an hour. While in the air, the planes established the cruise formation, maintaining strict radio silence. Each crew had the targeting data that had been available at the moment of takeoff and kept the receivers of the targeting apparatus ready to get detailed targeting, either from the air reconnaissance by voice radio or from surface ships or submarines. The latter targeting came by high-frequency (HF) radio, a channel known as KTS Chayka (the Seagull short-message targeting communication system) that was usually filled with targeting data from the MRSC Uspekh (the Success maritime reconnaissance targeting system), built around the efforts of Tu-95RC reconnaissance planes. The Legenda (Legend) satellite targeting system receiver was turned on also, though not all planes had this device. The Backfire’s own ECM equipment and radar-warning receivers had to be in service too. With two to four targeting channels on each plane, none of them radiating on electromagnetic wave bands, the crowd of the Backfires ran through the dark skies to the carrier task force.

Where Are Those Mad Russians?

Generally, detailed data concerning the U.S. air defense organization were not available to Soviet naval planners. What they knew was that F-4, and later F-14 planes could be directed from three kinds of control points: the Carrier Air Traffic Control Center on the carrier itself, an E-2 aloft, or the Air Defense Combat Center of one of the Aegis cruisers in formation. Eavesdropping on the fighter-direction VHF and ultra high-frequency radio circuits by reconnaissance vessels and planes gave Soviet analysts in 1973–74 roughly the same results as were subsequently noted by late Vice Admiral Arthur Cebrowski: “Exercise data indicated that sometimes a squadron of F-14s operating without a central air controller was more effective in intercepting and destroying attackers than what the algorithms said centralized control could provide.”

SNAF planners found that interceptor crews were quite dependent on the opinions of air controllers or FDOs, even in essence psychologically subordinate to them. So the task of the attackers could be boiled down to finding a way to fool those officers—either to overload their sensors or, to some degree, relax their sense of danger by posing what were to their minds easily recognizable decoys, which were in reality full, combat-ready strikes. By doing so the planners expected to slow the reactions of the whole air defense system, directly producing the “golden time” needed to launch the missiles. Contrary to widespread opinion, no considerable belief was placed in the ability of launched missiles to resist ECM efforts, but the solid and partially armored airframe of the Kh-22 could sustain a significant number of the 20mm shells of Close-In Weapon System (CIWS) guns. (Given the even more rigid airframe of the submarine-launched missiles of the Granit family —what NATO called the SS-N-19 Shipwreck—it would have been much better for the U.S. Navy to use a CIWS of at least 30mm caliber.)

1984 – A U.S. Navy Grumman F-14A Tomcat of Fighter Squadron VF-1 “Wolfpack” escorting two Soviet Tupolev Tu-16 aircraft (NATO reporting “Badger”). (Photo via Wikimedia Commons)

Things could become even worse for the carriers. In some plans, a whole VVS fighter air regiment of Su-15TM long-range interceptors would have escorted the MRA division, so that the F-14s over the task force might have been overwhelmed and crowded out by similar Soviet birds. Though the main targets for the Sukhois, which as pure interceptors were barely capable of dogfighting, were the E-2 Hawkeyes, it is possible that some F-14s could have become targets for their long-range air-to-air missiles with active radar seeker (such as R-33, similar to the AIM-54). Sure enough, no Sukhoi crews had been expected to return, mainly because of their relatively limited range and the fact that they, mostly unfamiliar with long flights over the high seas, depended on the bomber crews’ navigation skills.

Long before reaching the target, at a “split” position approximately 500 kilometers from the carrier task force, and if the target’s current position had been somehow roughly confirmed, the air division’s two regimental formations would divide into two or three parts each. The WSO of each plane adopted his own battle course and altitude and a flight plan for each of his missiles. As we have seen, the early versions of Kh-22 had to acquire the target while on the plane’s hardpoints, making this a terrible job very close to that of a World War II kamikaze, because between initial targeting of the carrier by the plane’s radar and missile launch the Backfire itself was no more than a supersonic target for AIM-54s.

The more Phoenixes that could be carried by a single interceptor, the more Backfires that could be smashed from the sky prior to the launch of their Kh-22s. So if the Backfires were the only real danger to U.S. carriers up to the fall of the USSR , it would have been much better for the U.S. Navy to use the F-111B [carrier-based interceptor], a realization of the TFX (Tactical Fighter Experimental) concept, than the F-14. A Tomcat could evidently carry the same six Phoenixes as an F-111B, but there were the data that the “Turkey” could not bring all six back to the carrier, owing to landing-weight limitations. Imagine a fully loaded Tomcat with six AIM-54s reaching its “bingo point” (limit of fuel endurance) while on barrier CAP station, with air refueling unavailable. The plane has to land on the carrier, and two of its six missiles have to be jettisoned. Given the alternating sorts of approaches by Backfire waves, reducing the overall number of long-range missiles by dropping them into the sea to land F-14s safely seems silly. Admiral Thomas Connolly’s claims in the 1960s that killed the F-111B in favor of the F-14 (“There isn’t enough power in all Christendom to make that airplane what we want!”) could quite possibly have cost the U.S. Navy a pair of carriers sunk.

A General Dynamics F-111B (BuNo 151970) in flight over Long Island, New York (USA), in 1965. (Photo via Wikimedia Commons)

The transition of the U.S. Navy from the F-14 to the F/A-18 made the anti-Backfire matter worse. Yes, the Hornet, at least the “legacy” (early) Hornet, is very pleasant to fly and easy to maintain, but from the point of view of range and payload it is a far cry from the F-111B. How could it be otherwise for a jet fighter that grew directly from the lightweight F-5? Flying and maintaining naval airplanes are not always just for fun; sometimes it takes long hours of hard work to achieve good results, and it had always been at least to some degree harder for naval flyers than for their shore-based air force brethren doing the same thing. Enjoying the Hornet’s flying qualities at the expense of the Phoenix’s long-range kill abilities is not a good tradeoff. Also, the Hornet (strike fighter) community evidently has generally replaced its old fighter ethos with something similar to the “light attack,” “earthmover” philosophy of the Vietnam-era A-4 (and later A-7) “day attack” squadrons; all the wars and battle operations since 1990 seem to prove it. It is really good for the present situation that the ethos of F/A-18 strike fighter pilots is not the self-confident bravado of the F-14 crews but comes out of more realistic views. Yet for the defense of carrier task forces, it was not clever to abandon the fast, heavy interceptor, able to launch long-range air-to-air missiles—at least to abandon it completely.

To fool the FDOs, the incoming Backfires had to be able to saturate the air with chaff. Moreover, knowing the position of the carrier task force is not the same as knowing the position of the carrier itself. There were at least two cases when in the center of the formation there was, instead of the carrier, a large fleet oiler or replenishment vessel with an enhanced radar signature (making it look as large on the Backfires’ radar screens as a carrier) and a radiating tactical air navigation system. The carrier itself, contrary to routine procedures, was steaming completely alone, not even trailing the formation.

To know for sure the carrier’s position, it was desirable to observe it visually. To do that, a special recce-attack group (razvedyvatel’no-udarnaya gruppa, RUG) could be detached from the MRA division formation. The RUG consisted of a pair of the Tu-16R reconnaissance Badgers and a squadron of Tu-22M Backfires. The former flew ahead of the latter and extremely low (not higher than 200 meters, for as long as 300–350 kilometers) to penetrate the radar screen field of the carrier task force, while the latter were as high as possible, launching several missiles from maximum range, even without proper targeting, just to catch the attention of AEW crews and barrier CAP fighters. Meanwhile, those two reconnaissance Badgers, presumably undetected, made the dash into the center of the task force formation and found the carrier visually, their only task to send its exact position to the entire division by radio. Of course, nobody in those Badgers’ crews (six or seven officers and men per plane) counted on returning; it was 100 percent a suicide job.

After the RUG sent the position of the carrier and was shattered to debris, the main attack group (UG, udarnaya gruppa) launched the main missile salvo. The UG consisted of a demonstration group, an ECM group armed with anti-radar missiles of the K-11 model, two to three strike groups, and a post-strike reconnaissance group. Different groups approached from different directions and at different altitudes, but the main salvo had to be made simultaneously by all of the strike groups’ planes. The prescribed time slot for the entire salvo was just one minute for best results, no more than two minutes for satisfactory ones. If the timing became wider in an exercise, the entire main attack was considered unsuccessful.

 An aerial view of the U.S. Navy Battle Group Echo underway in formation in the northern Arabian Sea on 1 November 1987. (Photo via U.S. National Archives)

Moreover, in plans, three to five planes in each regimental strike had to carry missiles with nuclear warheads. It was calculated that up to twelve hits by missiles with regular warheads would be needed to sink a carrier; by contrast, a single nuclear-armed missile hit could produce the same result. In any case, almost all Soviet anti-carrier submarine assets had nuclear-armed anti-carrier missiles and torpedoes on board for routine patrols.

Having launched their missiles, it was up to the crews, as has been noted above, to find their way back. Because of the possibility of heavy battle damage, it was reasonable to consider the use of intermediate airfields and strips for emergency or crash landings, mainly on the distant islands, even inhabited ones, in the Soviet or Warsaw Pact exclusive economic zones. The concept of using the Arctic ice fields for this purpose was adopted, by not only the MRA but the VVS (interceptors of the Su-15, Tu-128, and MiG-25/31 varieties) too. Though the concept of maintaining such temporary icing strips had been accepted, with the thought that planes could be refueled, rearmed, and even moderately repaired in such a setting, it was not a big feature of war plans. The VVS as a whole was eager to use captured airfields, particularly ones in northern Norway, but the MRA paid little attention to this possibility, because the complexity of aerodrome maintenance of its large planes, with their intricate weapons and systems, was considered unrealistic at hostile bases, which would quite possibly be severely damaged before or during their capture.

All in all, the expected loss rate was 50 percent of a full strike—meaning that the equivalent of an entire MRA air regiment could be lost in action to a carrier task force’s air defenses, independent of the strike’s outcome.

An Umi Yukaba for the Surface and Submarine Communities

Although the first massive missile strikes on carrier task forces had to be performed by SNAF/DA forces, there were at least two other kinds of missile carriers in the Soviet Navy. The first were guided-missile ships, mostly in the form of cruisers (CGs), those of Project 58 (the NATO Kynda class), Project 1144 (Kirov class), and Project 1164 (Slava class). Moreover, all the “aircraft-carrying cruisers” of Project 1143 (the Kiev class, generally thought of as aircraft carriers in the West) had the same anti-ship cruise missiles as the CGs of Project 1164. Also, the destroyers of Project 956 (Sovremenny class) could be used in this role, as well as all the ships (the NATO Kresta and Kara classes) armed with ASW missiles of the Type 85R/RU/RUS (Rastrub/Metel, or Socket/Snowstorm) family, which could be used in an anti-ship mode. The main form of employment of guided missile ships was the task force (operativnoye soedinenie, in Russian), as well as the above-noted direct-tracking ship or small tactical groups of ships with the same job (KNS or GKNS, respectively, in Russian).

The other anti-carrier missile carriers were nuclear-powered guided-missile submarines (SSGNs), in a vast number of projects and types, using either surface or submerged launch. The most deadly of these were the Project 949A boats (NATO Oscar IIs), with P-700 Granit missiles. (The SSGN Kursk, recently lost to uncertain causes, was one of them.) The operational organization for the submarine forces performing the anti-carrier mission was the PAD (protivo-avianosnaya divisiya, anticarrier division), which included the SSGNs, two for each target carrier, and nuclear-powered attack submarines for support. In sum, up to fifteen nuclear submarines would deploy into the deep oceans to attack carrier task forces. One PAD was ready to be formed from the submarine units of the Northern Fleet, and one, similarly, was ready to assemble in the Pacific Fleet.

1986 – An elevated port side view of the forward section of a Soviet Oscar-class nuclear-powered attack submarine. (Photo via U.S. National Archives)

A detailed description of the tactics and technologies of all those various assets is beyond the aim of this article, but one needs an idea of how it worked as a whole. The core of national anti-carrier doctrine was cooperative usage of all those reconnaissance and launch platforms. While they understood this fact, the staffs of the Soviet Navy had no definite order, manual, or handbook for planning anti-carrier actions except the “Tactical Guidance for Task Forces” (known as TR OS-79), issued in 1979 and devoted mainly to operational questions of surface actions, until 1993, when “Tactical Guidance for Joint Multitype Forces” entered staff service. The latter document was the first and ultimate guidance for the combined efforts of the MRA , surface task forces, and submerged PADs, stating as the overall goal the sinking of the designated target carriers at sea with a probability of 85 percent.

It is no secret that the officers of the surface community who served on the guided-missile ships counted on surviving a battle against a U.S. Navy carrier air wing for twenty or thirty minutes and no more. In reality, the abilities of the surface-to-air missiles (SAMs) installed on the ships were far less impressive than the fear they drew from U.S. experts. For example, the bow launcher of the Storm SAM on the Kresta– and Kara-class ASW destroyers shared a fire-control system with the Metel ASW missile. It would be quite possible for U.S. aircraft to drop a false sound target (imitating a submarine) ahead of the Soviet formation to be sure that the bow fire-control radars would be busy with the guidance of ASW missiles for a while. The bow SAM launchers of the destroyers of these classes would be useless all this time, allowing air attacks from ahead. Even “iron” bombs could mark the targets.

SSGNs were evidently considered in the West to be the safest asset of the Soviet Navy during an attack, but it was not the case. The problem was hiding in the radio communications required: two hours prior to the launch, all the submarines of the PAD were forced to hold periscope depth and lift their high frequency-radio and satellite communication antennas up into the air, just to get the detailed targeting data from reconnaissance assets directly (not via the staffs ashore or afloat); targeting via low- or very-low-frequency cable antennas took too much time and necessarily involved shore transmitting installations, which could be destroyed at any moment. There was little attention paid to buoy communication systems (because of the considerable time under Arctic ice usual for Soviet submarines). Thus the telescoping antennas in a row with the periscopes at the top of the conning tower were the submarine’s only communication means with the proper radio bandwidth. Having all ten or fifteen boats in a PAD at shallow depth long before the salvo was not the best way to keep them secure. Also, the salvo itself had to be carried out in close coordination with the surface fleet and MRA divisions.

However, the main problem was not the intricacy of coordination but targeting —that is, how to find the carrier task forces at sea and to maintain a solid, constant track of their current positions. Despite the existence of air reconnaissance systems such as Uspekh, satellite systems like Legenda, and other forms of intelligence and observation, the most reliable source of targeting of carriers at sea was the direct-tracking ship. Indeed, if you see a carrier in plain sight, the only problem to solve is how to radio reliably the reports and targeting data against the U.S. electronic countermeasures. Ironically, since the time lag of Soviet military communication systems compared to the NATO ones is quite clear, the old Morse wireless telegraph used by the Soviet ships was the long-established way to solve that problem. With properly trained operators, Morse keying is the only method able to resist active jamming in the HF band. For example, the Soviet diesel-electric, Whiskey-class submarine S-363, aground in the vicinity of the Swedish naval base at Karlskrona in 1981, managed to communicate with its staff solely by Morse, despite a Swedish ECM station in the line of sight. All the other radio channels were effectively jammed and suppressed. While obsolete, strictly speaking, and very limited in information flow, Morse wireless communication was long the most serviceable for the Soviet Navy, owing to its simplicity and reliability.

But the direct tracker was definitely no more than another kind of kamikaze. It was extremely clear that if a war started, these ships would be sent to the bottom immediately. Given that, the commanding officer of each had orders to behave like a rat caught in a corner: at the moment of war declaration or when specifically ordered, after sending the carrier’s position by radio, he would shell the carrier’s flight deck with gunfire, just to break up the takeoff of prepared strikes, fresh CAP patrols, or anything else. Being usually within the arming zone of his own anti-ship missiles and having no time to prepare a proper torpedo salvo, the “D-tracker’s” captain had to consider his ship’s guns and rocket-propelled depth charges to be the best possible ways to interfere with flight deck activity. He could even ram the carrier, and some trained their ship’s companies to do so; the image of a “near miss,” of the bow of a Soviet destroyer passing just clear of their own ship’s quarter is deeply impressed in the memory of some people who served on board U.S. aircraft carriers in those years.

Lieutenant Commander Tokarev joined the Soviet Navy in 1988, graduating from the Kaliningrad Naval College as a communications officer. In 1994 he transferred to the Russian Coast Guard. His last active-duty service was on the staff of the 4th Coast Guard Division, in the Baltic Sea. He was qualified as (in U.S. equivalents) a Surface Warfare Officer/Cutterman and a Naval Information Warfare/Cryptologic Security Officer. After retirement in 1998 he established several logistics companies, working in the transport and logistics areas in both Europe and the Commonwealth of Independent States.

Featured Image: March 3, 1986 – A left underside view of a Soviet Tu-22 Backfire aircraft in flight. (Photo via U.S. National Archives)

Rules of Engagement and Undersea Incursions: Reacting to Foreign Submarines in Territorial Waters

This article is part of a series that will explore the use and legal issues surrounding military zones employed during peace and war to control the entry, exit, and activities of forces operating in these zones. These works build on the previous Maritime Operational Zones Manual published by the Stockton Center for International Law predecessor’s, the International Law Department, of the U.S. Naval War College. A new Maritime Operational Zones Manual is forthcoming.

By LtCol Brent Stricker

“We have attacked, fired upon, and dropped depth charges on a submarine operating in defensive sea area.”–USS Ward (DD-139) December 7, 1941, Pearl Harbor, Hawaii.

Submerged foreign submarines in a nation’s territorial sea pose a unique situation that is inconsistent with the rule of innocent passage. Under certain circumstances, their concealed presence without the consent of the coastal state could be considered a threat to the territorial integrity or political independence of the coastal state. A modern submarine fulfills its peacetime mission and combat role while submerged. If the coastal state detects a submerged submarine in the territorial sea, it is faced with a dilemma on the appropriate measures that can be used to force the submarine to surface or leave the territorial sea. The recent sabotage of the Nord Stream pipeline and the vulnerability of the world’s vast subsea network of electricity and network cables highlights the danger posed by unknown submersibles.

Norway and Sweden have faced this problem for more than 50 years from suspected Soviet and later Russian submarines. Both countries have used warning shots in an attempt to signal the submerged contacts to surface or leave the area. Use of explosives in this manner, however, could be misinterpreted as an attack on the submarine. Balancing the protection of territorial sovereignty with avoiding escalation poses a predicament.

Innocent Passage

All ships, including warships, enjoy the right of innocent passage through the territorial seas of a coastal state without prior notification or consent. This rule was discussed in detail in the Corfu Channel case before becoming codified in the United Nations Convention on the Law of the Sea. The Corfu Channel is a narrow passage between Albania and the Greek island of Corfu. The United Kingdom’s Royal Navy was confronted by Albanian coastal artillery fire when transiting the channel in May 1946. In October 1946, two Royal Navy destroyers transited the channel while at action stations to be prepared to respond to coastal artillery fire or other threat posed by the Albanians. These destroyers struck naval mines laid in the channel. As a result, in November 1946, the Royal Navy conducted minesweeping operations to clear the channel.

The United Kingdom brought a case against Albania in the International Court of Justice seeking reparations for the loss of life and damages to its warships. The ICJ upheld the Royal Navy’s right of innocent passage through Albanian territorial waters, rejecting Albania’s arguments that the ships were not in innocent passage because they were sailing in formation and the sailors on board were at action stations. Rather, the Court found that sailing in formation and running at action stations were appropriate defensive measures. The Court found that the minesweeping operation was inconsistent with innocent passage and a violation of Albanian sovereignty, rejecting the British arguments that this was a measure of “self-protection.” Corfu Channel illustrates how innocent passage may include defensive measures. The case has long presented a conundrum because it determined that states are entitled to innocent passage, yet are restrained from taking defensive action, such as minesweeping, to exercise their right.  

Innocent passage is governed by the United Nations Convention on the Law of the Sea (UNCLOS). Norway and Sweden are signatories to UNCLOS, and the United States, while not a signatory, recognizes much of it as customary international law. UNCLOS codified the right of innocent passage in Articles 17-21. Innocent passage must “not be prejudicial to the peace, good order, or security of the coastal state.” A foreign vessel’s passage is not innocent if its actions constitute “any threat or use of force against the sovereignty, territorial integrity or political independence of the coastal State.” A special provision for submarines, Article 20, requires submarines engaged in innocent passage to “navigate on the surface and to show their flag.”

A coastal state that discovers an unknown submerged contact in its territorial sea is faced with a dilemma. Examples from Norway and Sweden of submerged contacts lingering in their territorial waters are inconsistent with the definitions of both passage and innocent passage. The coastal state, under Article 25 of UNCLOS, may “take the necessary steps in its territorial sea to prevent passage which is not innocent.” There is no agreement on exactly what steps are deemed necessary. Furthermore, these measures are limited when applied to sovereign immune warships. Thus, while an unknown submerged contact is not exercising innocent passage, it is unclear what measures a coastal state can apply to exercise its rights under Article 25. Articles 30 and 31 of UNCLOS allow a coastal state to require the submerged contact to leave its territorial sea and places liability for any damages on the flag state of the submerged contact. Armed force against an unknown submerged contact, however, may only be used in self-defense under Article 51 of the UN Charter. In most cases, use of force would not be justified simply because the submarine is submerged or refuses to surface and the mere presence of the submarine does is not tantamount to an “armed attack.” This determination is complicated when the submerged contact’s intensions cannot be ascertained.

Norway

Norway has been dealing with suspected intrusions by foreign submarines for more than 50 years. These contacts in Norwegian fjords are difficult to track due to the mixing of fresh water runoff and salt water in the fjords which can provide cover for submarines from sonar detection. Acoustic detection is complicated by the fjord’s subsurface structure, currents, and civilian surface traffic. For two weeks in November 1972, Norwegian vessels aided by Norwegian and British aircraft attempted to locate and force to the surface an unknown underwater contact, believed to be of Soviet or Warsaw Pact origin, in the Sogne Fjord using depth charges. Hand grenades and then depth charges were used to signal to the underwater contact to surface. Ultimately, the Ministry of Defense was given permission to sink the contact if it did not surface and identify itself.

For the Norwegians to use force against the unknown submerged contact, they would need to articulate how an otherwise benign submerged vessel posed an imminent threat that would justify the use of force in self-defense. Violating Article 21 of UNCLOS in and of itself does not constitute such a threat of imminent attack, even if the submarine is engaged in an intelligence or reconnaissance mission. Such a mission may be illegal under Norway’s domestic law, but it does not imply an illegal use of force, let alone an armed attack.

In limited situations, the location and duration of the unknown submarine in territorial waters could be considered as a threat, as noted in the radio transmission of the USS Ward when it engaged an unknown submarine in a defensive sea area. The Norwegians would be more concerned by the location of the unknown submersible if it were in such an area or in close proximity to another sensitive military exercise or base. The longer the submarine remained at depth, the greater potential one might consider it laying in wait to attack. Nonetheless, the Norwegians employed an escalating use of force in 1972 with attempts to signal with hand grenades and ultimately culminating with firing anti-submarine missiles at the suspected target. The Norwegians were ultimately unable to force the contact to the surface, identify it, or sink it.

Norwegian experiences with unknown submarine contacts continued over the decades. The official Norwegian policy on the use of force remained somewhat ambiguous. In 1983, Brigadier Asbjorn V. Lerheim stated on the use of force, “It is a tough decision, it is still peacetime, and you can’t really destroy a submarine . . . it is not an attack on Norwegian soil.” Norway seems to have adopted a set of measures to escalate the use of force against these intrusions. The first measure is to signal the submarine to surface. If the submarine complies, it would be taken under escort. If not, depth charges would be dropped within 300 meters from the submarine with a two-minute interval to indicate this was a signaling measure, not an attack. If this failed to surface the submarine, Norwegian captains were authorized to attack with depth charges, but torpedoes were prohibited in the attack because of the potential of catastrophic damage to the boat and loss of the entire crew. It is speculated that the anti-submarine missiles fired in 1972 used homing devices and proximity fuses and were not a real attempt to hit the submarine.

Suspected Soviet incursions into Norwegian territorial waters continued as late as 1990. Norwegian authorities received reports of suspected submarines in the summer of 1990 at Skipton, a Norwegian bay twenty-five miles from the Russian border. The area was put under surveillance when, in November 1990, a mini-submarine was observed briefly on the surface. The sea floor was examined and a series of tracks were found that indicated a submersible crawler had been deployed. Similar tracks were discovered elsewhere in Sweden and Norway near military installations. The Soviet Northern Fleet possessed such miniature submarines at the time. It was speculated that the miniature submarine was launched from a nearby mother ship to conduct a Spetsnaz training or reconnaissance mission.

As late as 2021, Norway was subjected to an undersea intrusion by unknown submersibles. The Norwegian Institute of Marine Research operates a network of undersea sensors in northern Norway to monitor the marine environment. It can also be used to monitor submarines in the area. These sensors are interconnected by a series of fiber optic cables. In April 2021, it was discovered that 2.5 miles of fiber optic cable had been cut and stolen. Several of the sensors had been tampered with and moved. The reason for the intrusion is speculative but includes the potential for reverse engineering.

Sweden

Like Norway, Sweden has been troubled by intrusions of foreign submarines in its territorial waters for a similar period of time. Unlike Norway, Sweden has actually caught one submarine on the surface in the infamous “Whiskey on the Rocks” incident in 1981. This incident noted increased intrusions throughout the 1980s that have continued as late as the 2010s. To date, the Whiskey is the only foreign submarine caught on the surface in Swedish territorial waters.

On October 27, 1981, a Soviet Whiskey class submarine, the U-137, was found grounded on a rock in Swedish territorial waters. The Whiskey was an early Cold War diesel electric submarine, not a nuclear-powered submarine. The Swedish Navy contacted the submarine’s captain, Captain Second Rank A. M. Gushchin, who claimed a navigational error. Captain Gushchin claimed he thought he was 20 miles off the Polish coast when the collision occurred. This claim is rather dubious considering the submarine had transited submerged through a “perilous series of narrow straits infested with rocks and islands” before the grounding. The submarine’s grounding within ten kilometers of the Swedish naval base at Karlskrona while a major naval exercise was being conducted was certainly not just a coincidence brought about by a navigational error. Upon inspection, Swedish officials found no problems with the boat’s navigational equipment and noted its logbook had been altered.

The boat remained grounded for eleven days while the Swedish authorities inspected the submarine and questioned the captain. The Soviet Union responded by sending a flotilla of warships that stayed just outside Swedish waters. The Swedish Prime Minister made a shocking announcement on November 5, 1981, that the submarine was suspected of carrying nuclear weapons. The Swedish government made demands to the Soviets before releasing the submarine. However, weather intervened and Sweden released the submarine before these demands were met. The submarine was exposed to gale force winds and was listing 17 degrees. Swedish authorities were concerned that the boat’s battery acid could spill and cause a fire or release chlorine gas that could kill the crew. Swedish authorities stopped the captain’s interrogation and boat inspection, refloated the boat, and the submarine left on November 6, 1981.

Following this incident, the Swedish government released the Submarine Defense Commission Report in 1983, which detailed the history of foreign submarines intruding into Swedish waters. Prior to the Whiskey incident, and even subsequently, critics had claimed these submarine scares were an excuse to increase the Navy’s budget. The report detailed how foreign submarines entered Swedish waters typically one to two times a year in the 1970s before a dramatic increase during the 1980s. These incursions were concentrated around naval facilities such as coastal defense points, ports, sensor networks, and minefields.

The Report and increased submarine intrusions led to a change in Swedish Rules of Engagement (ROE) applicable to submarine contacts. Prior rules prohibited a commander from firing on an unknown contact without authorization from the civilian leadership. The Swedish Navy was only allowed to make contact with the submarine to identify it and escort it out of Swedish waters. The new ROE allowed the submarine to be fired upon without warning. Initially, warning shots were to be used, either through the employment of depth charges or missiles. The ROE were intended to prevent the damage or destruction of the submarine, but the ROE made a distinction on the location and behavior of the contact. If the submarine was located in Sweden’s outer waters, these are waters beyond the internal archipelago to the 12-mile limit, it would be warned and escorted out. If the submarine was found in internal waters, these are waters of Sweden’s internal archipelago, and refused to leave or proceeded further, it could be treated as hostile and force designed to damage or destroy the submarine could be used.

The Swedish ROE may have contributed to their inability to force submarines to the surface. If they employed depth charges or other devices with an eye toward avoiding damaging the detected submarines, the submarines could simply ignore these attempts. There is evidence that the Swedish ASW may have damaged a submarine. In the summer of 1988, eight pieces of unknown foreign submarine rescue equipment were recovered in the Stockholm archipelago. Similar equipment had been recovered in the 1970s and 80s.

The Swedish Navy continued to deal with foreign submarines intruding into Swedish waters throughout the 1980s. The government stopped providing statistics on these incursions in 1987. Subsequent reports have been vague in their descriptions. This may be to avoid highlighting their inability to stop or deter these incursions.

There is evidence that these incursions did occur. The Swedish Navy noted that these incursions have become more sophisticated with the use of multiple submarines, miniature submarines, and divers. The evidence for these incursions comes from sightings, sonar, and magnetic detection from Swedish sensor networks. There has also been evidence of keel marks and track marks on the sea floor similar to the Norwegian miniature submarine event noted above.

The miniature submarines may have also allowed military forces to surreptitiously land on Swedish territory. Between 3 to 6 March 1984, Swedish forces fired at swimmers on the island of Almo. The island was searched and food caches were located. The Swedes have also noted attacks on their “submarine nets, break-ins ashore, to the disruption and destruction of underwater mine lines.” In one case, they were blamed for the theft of a naval mine. Most shockingly, in 1985 fisherman pulled a drowned swimmer up in their nets. The nets had been placed illegally near a naval mine. It is presumed the diver was scouting the mine when he became entangled and drowned. The fisherman did not recover the body and abandoned their nets. When Swedish authorities investigated, the body had been cut out of the net and removed by unknown persons.

Conclusion

This historic submarine incursions remain relevant today, particularly considering heightened tensions from the Russian invasion of Ukraine and the recent application of Finland and Sweden to join the North Atlantic Treaty Organization. Much like the Norwegian fjords, the Swedish archipelago would be an area for these submarines to operate. The reasons for the incursions remain relevant today for any NATO-Russian conflict whether it be to conduct reconnaissance or the insertion of Special Forces. If there is a repeat of one of these Cold War examples such as a stranded submarine like the Whiskey, or more concerning, NATO forces hunting a submarine contact, the consequences could be manifold. First, NATO forces chasing a submarine contact trying to force it to surface might be viewed as an attack on the submarine. The use of explosives to signal a submarine might accidentally damage it or injure the crew. These signals could be misinterpreted as an attack allowing or even requiring a submarine to respond in self-defense. Second, any hostilities in territorial waters directly implicates the collective self-defense clause of Article 5 of the North Atlantic Treaty.

The conduct of Russian submarine espionage in the territorial seas of its neighbors presents one of the greatest challenges to avoiding conflict in the Baltic Sea. These incidents reveal the gap between the law of the sea and the use of force in self-defense against an armed attack. The Nordic coastal states must walk a fine line between protecting their territorial integrity and avoiding escalation of an incident that might quickly spin out of control.

LtCol Brent Stricker, U.S. Marine Corps, serves as the Director for Expeditionary Operations and as a military professor of international law at the Stockton Center for International Law, U.S. Naval War College. The views presented are those of the author and do not necessarily reflect the policy or position of the U.S. Marine Corps, the U.S. Navy, the Naval War College, or the Department of Defense.

Featured Image: Russian Kilo-class submarine in the English Channel. (UK Ministry of Defence photo via Wikimedia Commons)

Leaning on the Big Switch in the Pacific: Why The United States Dominates Pacific Telecom Infrastructure

By Geoffrey L. Irving

Introduction

A combination of the United States’ nascent modern industrial policy, diplomacy, and aligned governmental and commercial interests have set the conditions for it to pull ahead in the race to control vital telecommunications infrastructure in the Pacific. The race to control telecommunications infrastructure is founded upon a number of small island nations and territories in the Pacific Ocean that last saw global attention during the island-hopping campaigns of the Second World War. This analysis will give particular focus to the nations and territories of Guam and the Solomon Islands and the effect that they have on subsea telecommunications infrastructure. Further, this analysis will review how competing American and Chinese telecommunication infrastructure strategies are affecting these Pacific Island nations and territories and how the convergence of the United States’ regulatory regimes, including “Team Telecom,” and commercial interests are dominating Pacific telecommunications.

The People’s Republic of China’s (hereinafter referred to as “China”) return to great power status is well-covered in national security circles and beyond. From construction of artificial islands in the South China Sea, to continued saber rattling directed at Taiwanese unification, to the infiltration of Chinese technology into the United States’ supply chains and defense industrial base, media and academic coverage of China’s return to global power often include dire warnings that the United States is unknowingly falling behind. However, there is one sector of Sino-American competition that currently bodes well for the United States and its allies, and deserves additional recognition and analysis; namely, the race to control international telecommunications infrastructure, and specifically the subsea fiber-optic cables that serve as the backbone of modern communication. 

Subsea communications infrastructure is the backbone of the modern way of life. More than 95 percent of international internet traffic flows across subsea fiber-optic cables.1 This data traffic includes all types of communications, from consumer phone calls, to streaming entertainment, financial transactions, or secure military or intelligence messaging.2 While high-profile satellite communications like those provided by SpaceX’s Starlink low earth orbit technology receive a lot publicity for their deployment in austere conditions, satellite data capabilities do not come close to matching the data capacity of fiber-optic cables.3

The concept of a subsea cable is relatively simple. Since the first subsea copper telegram cable was laid by the Atlantic Telegraph Company in 1858 between the North America and Ireland, cable technology has progressively matured with advances in materials science and information technology, although the operational concept has remained the same.4 A physical cable is spooled into the hull of a massive ship designed specifically for the task of laying and maintaining subsea cables.5 The ship then steams from one landing site across a body of water to another, laying cables and signal amplification units along the way. The cable, with its periodic amplifiers, sinks to the seafloor where it rests on top of seabed topography and uses relative obscurity and layers of armored sheathing to protect the delicate strands of glass fibers that carry light waves across thousands of miles.6 A tremendous level of complexity is required to execute this task; however, this simple explanation is meant to provide a basic understanding of the operations behind a subsea fiber-optic cable.

As the largest body of water in the world by far, the Pacific Ocean poses a particular challenge when laying subsea cables. Before the first Pacific subsea cable existed, reaching East Asia by electronic communication required either unreliable radio repeaters subject to the vagaries of weather and atmospheric conditions, or through a cable route that travelled across the Atlantic, through Cape Town, South Africa or Russia to a connecting cable to Japan or India.7 However, since the first Pacific cable was laid in 1903, cables across the Pacific have proliferated and now serve as the primary means to connect isolated Pacific Island Nations to the rest of the world.8 Additionally, in a bi-polar geopolitical environment internet connectivity and infrastructure is a key tool in drawing these nations towards alignment with the United States or China.9

Cable infrastructure is such an important piece of the geopolitical chessboard because its ownership and control can influence global data traffic and the contents of that traffic. Of particular note, as an overwhelming majority of financial transactions are negotiated, administered, and settled via electronic communications, if a party controls communications infrastructure, it can control the financial dealings of any client who relies on that infrastructure.10 For small Pacific Islands Countries, having a single cable connecting an island to the world wide web creates a single point of failure that can have extremely dire consequences if there is an unanticipated fault or break in the line – as there often are in subsea infrastructure.11 For example, in January 2022, an underwater volcanic eruption and landslide severed the only subsea cable connecting the island nation of Tonga to the outside world. As a result, it was nearly impossible to contact the island for a number of weeks.12 

China’s return to superpower status on the global stage has been accompanied by its audacious Belt and Road Initiative.13 This program funded massive infrastructure programs around the developing world to expand China’s diplomatic reach and to erode the international institutions of the post-Second World War international order. As a subset of the Belt and Road Initiative, China specifically focused on future technologies and set a goal to create a “Digital Silk Road” that would involve communication infrastructure projects driven by Chinese national champion state owned enterprises like Huawei and China Unicom.14 These projects were intended to include both the provision of 5G-capable network infrastructure for developing nations as well as subsea communications infrastructure to connect partner nations to China’s internet service providers. To this end, Huawei, an electronics hardware conglomerate, established Huawei Marine in 2009 to begin providing marine communications technology hardware and infrastructure services.15 Huawei Marine, as a newcomer to the maritime communications technology industry, had to compete with established Western companies like SubCom and Alcatel Submarine Networks to build and maintain subsea infrastructure.16

While the United States and its allies did not have the appetite to compete with China’s massive spending spree in the developing world, an alignment of government and commercial interests has led it and other western-aligned countries to dominate the communications landscape in the Pacific. As of this writing, no Chinese-owned or operated subsea cable is the sole provider for subsea communications to any Pacific Island.17 Further, networks generally reject any Huawei and other Chinese state-owned-enterprise communications and network hardware.18 This outcome bodes well for American interests in the Pacific, and the expanded provision of network capabilities to Pacific Island countries and territories will have beneficial economic impacts on local economies. In the following section, this paper will analyze case studies of Guam and the Solomon Islands as it relates to the competition of US and Chinese telecommunications providers and the expansion of Pacific telecommunications networks.

Case Study: Guam

Guam is a small Pacific Island that is the southernmost island in the Mariana Island chain and is the largest island in Micronesia.19 Guam has a rich history of indigenous culture and position in contemporary history as a strategic way point in the Pacific Ocean for competing navies. Guam was a protectorate of the United States Navy following the end of the Spanish-American war in 1898 and then received formal recognition as an unincorporated territory with self-rule in 1950.20 Guam is also home to a large American military presence and hosts a U.S. Naval Base, an Air Force Air Field, and a burgeoning Marine Corps Base. Because it is the United States’ westernmost territory, Guam is also a landing point for many trans-Pacific cables, earning it the moniker “The Big Switch in the Pacific.”

The first transpacific cable landed on Guam in 1904 by a private enterprise led by John Mackay. This cable functioned until 1950 when a fault removed it from service leaving decades of inconsistent telecommunications connectivity until the advent and proliferation of fiber-optic cables. Following the advent of fiber-optic cables, there was an explosion of telecommunication activity on Guam evident by the laying of sixteen cables between 1987 and 2022 – roughly one cable every two years.21 See Figure 1.

Cable System Name Year Status
TPC-3 1987 Retired
GPT 1990 Retired
PacRim West 1995 Retired
Mariana-Guam (MICS) 1997 Currently lit
GP 1999 Retired 2011
Australia-Japan 2001 Currently lit
China-US 2001 Retired 2016
Tata TGN Pacific 2002 Currently lit
Asia-America Gateway 2009 Currently lit
PPC-1 2009 Currently lit
HANTRU1 2010 Currently lit
Guam Okinawa Kyushu Incheon 2013 Currently lit
Atisa 2017 Currently lit
SEA-US 2017 Currently lit
Japan-Guam-Australia North 2020 Currently lit
Japan-Guam-Australia South 2020 Currently lit
Echo 2023 Planned, not lit
Apricot 2024 Planned, not lit
Bifrost 2024 Planned, not lit
Asia Connect Cable 1 (ACC-1) 2025 Planned, not lit

Figure 1: A historic list of telecommunication cables landing on Guam

Despite sixteen cables laid on Guam over the past three decades, Guam’s telecommunications market is relatively small. Guam’s population is around 170,000 people, roughly the same as a midsized American city like Springfield, Missouri.22 Despite this small market, three competing internet and communications service providers compete for market share on the island – Docomo, IT&E, and GTA. As of 2017, Guam had an internet penetration rate of eighty-one percent among its population.23 As a US territory that hosts a large military footprint, Guam’s telecommunications network is largely insulated from Chinese intrusion. Measures such as Federal government regulation, import controls, and the Federal Communications Commission (FCC) largely block Chinese or Chinese-funded companies from penetrating the Guamanian telecommunications sector.24

Further, as a result of Guam’s strategic position as a gateway to Asia and wider trends in the telecommunications sector, many large US technology companies are vying to invest in data centers in Guam.25 These data centers will serve as edge storage and computing nodes for internet service providers with retail and commercial customers in the Indo-Pacific theater. This next wave of telecommunications infrastructure poses an additional benefit to Guam’s local economy, as the influx of investment to stand up data centers that rely on consistent power generation and stable climate will likely create increased opportunities for job growth and a local telecommunications expertise.

Because of these reasons, Guam’s role as the “Big Switch in the Pacific” has been a driver of its local economy and will likely continue to yield dividends as the telecommunications industry matures and seeks improved and additional infrastructure projects. Additionally, as the United States focuses its national security posture on the Pacific theater, Guam will likely see increased military investment which has both positive and negative effects on local culture, but inarguably injects additional capital into the small island.

Case Study: The Solomon Islands

A study of the Solomon Islands’ telecommunications infrastructure and geopolitical position is an interesting counterpoint to Guam. Unlike Guam, the Solomon Islands is a sovereign nation state comprised of hundreds of islands off the East coast of Papua New Guinea and Northwest of Australia.26 The Solomon Islands have a population of approximately 700,000, but a gross domestic product of only $1.6 billion.27 Compared to Guam’s population of 170,000 and 2021 GDP of $5.8 billion, an apparent disparity exists as the Solomon Islands trails Guam’s development and productivity in terms of per capita GDP. Additionally, the Solomon Islands had an internet penetration rate of only 12% in 2017, and reportedly around 30% in 2022.28 While Guam serves as a switch for a growing inventory of subsea cables, the Solomon Islands is served by only one cable, the Coral Sea Cable (installed in 2020), which connects four of its major islands to New Guinea and Australia.29

To maintain a neutral position in the Sino-American competition for influence in the South Pacific, the Solomon Islands previously courted foreign investments and partnerships from the party willing to make them. The Coral Sea Cable reveals how the competition between China and US-aligned nations plays out over competition to build telecommunications infrastructure.

In 2018, the Solomon Islands government announced a partnership with China’s Huawei Technology Company to install a maritime fiber-optic cable that would link the islands to its two major neighbors: Papua New Guinea and Australia.30 This infrastructure project was long overdue, as high-speed internet was not available to an overwhelming majority of Solomon islanders. When the Solomon Islands announced the partnership with Huawei, US and Australian diplomats identified the risk that Huawei hardware and software could pose to Australia’s telecommunications network and began pushing the Solomon Islands to reconsider the partnership.31 Ultimately, the Australian government financed construction of the Coral Sea Cable by providing $92 million dollars in funding.32 Australia’s commitment, alongside diplomatic pressure from Japan and the United States, blocked Huawei from installing a new fiber-optic system connecting Pacific Island countries and further pushed the balance of power towards US-aligned nations in the Pacific telecommunications race. Unfortunately, these same pressures did not stop Papua New Guinea from completing its own domestic fiber-optic cable in partnership with Huawei Maritime Tech Co. in 2019.33

Although the Solomon Islands government ultimately partnered with Australia and the Australian firm Vocus to lay the Coral Sea Cable, the Solomon Island government has continued to court Chinese infrastructure investment. In 2019, the Solomon Islands formally ceased diplomatic relations with Taiwan, possibly to ensure future close diplomatic ties to the PRC. Then, in 2022, the Solomon Islands again announced a partnership with Huawei to build 161 mobile transmission towers financed by a $66 million loan from China’s Export Import Bank.34 The project has an expected completion date of November 2023, with the goal of installing most of the towers before Solomon Islands hosts the Pacific Games. Australia and other Pacific partners have again voiced opposition and concern about Huawei’s integration into the Solomon Islands’ local telecommunications infrastructure.35

The Solomon Islands’ diplomatic posturing between both Chinese and Australian/US-aligned investment gives it negotiating power to derive maximum investment from all sides. Its government cannot be criticized for attempting to upgrade the country’s telecommunications infrastructure to connect its population and drive GDP growth. However, negotiators should see the consistent playbook of courting Chinese investment and pressuring Australia and Pacific nations to step in with additional funding. While this means that Huawei and China are still in the race for dominance of Pacific telecommunications infrastructure, the Coral Sea Cable project shows that nations will choose US-aligned nations when given the opportunity. Therefore, it is up to the United States and its allies to create the opportunities to do so.

Undersea cables in the Pacific and proposed projects. (Reuters graphic)

The United States’ Pacific Policy Response

A broad decoupling of American and Chinese industries has been the theme of the early 2020s. For example, equity markets demanded audit transparency of Chinese firms listed in the United States and threatened to delist noncompliant companies.36 Further, the Foreign Investment Risk Review Modernization Act of 2018 strengthened the Committee on Foreign Investment in the United States (CFIUS) and gave the federal government broad power to mitigate or block adversarial investment or ownership in industries sensitive to The United States’ national security.37 With additional authorities, CFIUS has been increasingly aggressive and encouraged by members of Congress to investigate and block specific transactions. In CFIUS’ shadow however, there is a smaller interagency committee that receives less media coverage but is largely responsible for ensuring United States telecommunications resiliency and for winning the telecommunications competition in the South Pacific. That committee is the Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector (Team Telecom). This Committee’s name does not have a phonetic acronym and is referred to simply as “Team Telecom.” 

Team Telecom is an interagency committee chaired by the Department of Justice that includes the Departments of Defense and Homeland Security.38 Executive Order 13913 established Team Telecom in April 2020. The Committee provides the Federal Communications Commission (FCC) with recommendations on whether to issue licenses to companies applying to provide telecommunications services or otherwise connect to the domestic US telecommunications network.39 This scope includes licenses to provide cable-based international telecommunications transport services, licenses to provide satellite communications, and multiple other FCC licenses.

When the FCC receives an application for a new cable landing or for the transfer existing assets to a foreign purchaser, the FCC will refer the transaction to Team Telecom for review by the Departments of Justice, Homeland Security, and Defense to ensure that national security interests will not be affected or compromised by the foreign owner. If Team Telecom sees undue risk to domestic consumer data or to secured government data traffic traveling over a particular cable system, the members then recommend that the FCC deny the license or grant the license with specific conditions to mitigate the national security risk.40 In effect, this collaborative effort has succeeded in sealing out adversarial actors from the United States telecommunications sector, and shielded the United States telecommunications industry from Chinese competition and associated risks.

Because the United States controls strategic switching points in the Pacific, namely American Samoa, Guam, and Hawaii, Team Telecom’s rules regarding network hardware manufacturers and cyber security standards apply to any cable that lands in those territories. Because these territories are situated at geographically strategic points in the Pacific, Team Telecom’s rulings have become the de facto standard for the Pacific maritime telecommunications industry. While CFIUS is garnering headlines by protecting American technology and forcing adversary finance from core aspects of the United States’ domestic economy, Team Telecom operates quietly to both preserve the integrity of the United States’ domestic telecommunications network as well as set the conditions for US-aligned telecommunications companies to dominate network infrastructure across the Pacific Ocean.

The proliferation of Pacific subsea telecommunication cables is not a product of government policy alone. Rather, the information technology explosion of the past two decades and the demand for near-instant communication and connectivity to markets around the world created a huge demand for telecommunications capacity. The volume of cables landing on Guam in Figure 1 captures the frenetic pace of construction and expansion of bandwidth connecting North America to Asia. Furthermore, advances in materials science allowed fiber-optic cables to carry increasing volumes of data. The MICS cable, installed in 1997 that connects the Mariana Island chain, provides an estimated bandwidth capacity of 622 Megabytes per second, while Google’s Apricot cable is projected to have the capacity to run 190 Terabytes per second (190,000,000 Megabytes per second), or just over 300,000 times the throughput of the MICS cable.41 Despite exponential increases in data transport capabilities, infrastructure cables have continuously struggled to keep pace with industry demands for transport service. A trend away from consortia construction of fiber-optic lines in the telecommunications industry is one of the results of data transport demand so quickly outstripping supply.

In the early stages of large fiber-optic cable projects, international consortia of telecommunication infrastructure companies, government organizations, and occasionally research organizations primarily funded and planned new cable lines. In 2007, a consortium of 19 different parties funded the Asia American Gateway cable and laid 20,000 kilometers of fiber-optic cable from the United States, through Guam, to South Pacific nations like Singapore, Thailand, and the Philippines.42 The Australia-Japan cable, laid in 2009, was funded through a consortium of five telecommunications companies – Communications Global Network Services Ltd, NTT Ltd, Softbank Corp., Telstra, and MFC Globenet, Inc.43 This trend of consortium ownership was necessary to secure the required licenses and regulatory approvals to run and maintain new cables across multiple jurisdictions, as well as to diversify financial risk across a number of different owners. However, a new trend has emerged. Technology “hyperscalers” like Meta (formerly Facebook), Google, and Amazon are now unilaterally, or bilaterally, building and controlling their own cables.

Over the past few years, technology conglomerate hyperscalers announced projects that will install and operate their own series of subsea fiber-optic cables. These hyperscalers have been overwhelmingly American and are creating the next wave of telecommunications infrastructure that will be primarily influenced by US legislation and governmental policy. Hyperscalers are interested in building and owning their own infrastructure so that they get primary right of transport on the cable, instead of having to negotiate and pay for leases on competitor or legacy cables. Google and Meta plan to run two new cables, Echo and Bifrost, through Guam to diverse landing points in the Pacific.44 Additionally, Google plans to create the Apricot Cable to extend Google Cloud services to markets that complement Echo and Bifrost’s reach.45 These cables will have the net effect of increasing internet connectivity and lowering latency for large swaths of under-connected Pacific populations.46 The ancillary effect is that these hyperscalers are all primarily US corporations, subject to US regulation and therefore prohibited from contracting with or connecting to many Chinese telecommunications providers. While US technology champions are on a building spree, China’s technology champions and state-owned enterprises like HMN Technologies (formerly known as Huawei Maritime Networks) do not have plans to build any comparable trans-Pacific cables. With the United States’ alignment of commercial demand and governmental industrial policy, fiber-optic cables have and will continue to proliferate in the Pacific, creating net benefit to both isolated Pacific Island Countries and the United States.

Conclusion: The United States is Winning the Pacific Telecom Race

The United States is particularly well suited to win the contest to dictate and control operations, standards, and installation of new telecommunications infrastructure in the Pacific. As discussed, the United States’ control of key geographic islands like Hawaii and Guam gives it an upper hand when seeking to run transpacific fiber-optic cables. As “The Big Switch in the Pacific,” Guam is well situated as the landing point of choice for the next generation of transpacific cables that will effectively seal out Chinese telecom competitors from the Pacific subsea infrastructure market. The US Team Telecom’s oversight and regulation, in addition to associated federal industrial policies, has effectively increased critical telecommunications infrastructure resiliency and set a standard for new infrastructure projects in the Pacific. This beneficial status quo is reflected in the relationship between island nations such as the Solomon Islands and the United States and its allies. While Pacific Island Countries like the Solomon Islands will continue to entertain Chinese technology investment, case studies like the Coral Sea Cable show that these nations will elect Western infrastructure programs when given the opportunity. Finally, the geopolitical competition to connect the Pacific is a massive net benefit for Pacific Island Countries’ populations. Competitive and redundant communications infrastructure mean that the number of nations and islands that rely on single points of failure for their communications will diminish over time as future cable projects propagate. On a geopolitical note, the race to build and operate Pacific telecommunications infrastructure is a bright spot for the United States and a valuable case study in how governmental policy and commercial opportunity can interact to protect American interests and extend necessary and beneficial services to the global community.

Geoffrey Irving works with the Office of the Undersecretary of Defense, Acquisition and Sustainment to protect the Defense Industrial Base. Geoff previously served on active duty with the U.S. Marine Corps, and is currently a Major in the United States Marine Corps Reserve. Geoff is a graduate of Tsinghua University College of Law and writes about the national security implications of international economic competition. 

The views expressed in this paper are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

References

[1] 2013 Section 43.82 Circuit Status Data, FCC International Bureau Report, Federal Communications Committee (July 2015)

[2] Ibid.

[3] Micah Maidenberg, “Elon Musk’s SpaceX, Pentagon to Deepen Ties Despite Dispute on Starlink Funding in Ukraine,” Wall Street Journal, October 20, 2022, https://www.wsj.com/articles/elon-musks-spacex-pentagon-to-deepen-ties-despite-dispute-on-starlink-funding-in-ukraine-11666270801; Ibid.

[4] Allison Marsh “The First Transatlantic Telegraph Cable was a Bold Beautiful Failure” IEEE Spectrum, (October 31 2019), https://spectrum.ieee.org/the-first-transatlantic-telegraph-cable-was-a-bold-beautiful-failure

[5] Justin Sherman, “Cyber Defense Across the Ocean Floor: The Geopolitics of Submarine Cable Security” Atlantic Council Snowcroft Center for Strategy and Security, Cyber Statecraft Initiative (September 2021)

[6] Ibid.

[7] “Honolulu’s First Cable” Evening Bulletin, December 5, 1902.

[8] Bill Burns “Submarine Cable History” SubmarineCableSystems.com, 2012. https://www.submarinecablesystems.com/history

[9] Justin Sherman, “Cyber Defense Across the Ocean Floor: The Geopolitics of Submarine Cable Security” Atlantic Council Snowcroft Center for Strategy and Security, Cyber Statecraft Initiative (September 2021)

[10] Ibid.

[11] Amanda Watson, “The Limited Communication Cables for Pacific Island Countries,” Asia-Pacific Journal of Ocean Law and Policy, vol 7, 2022

[12] Ibid.

[13] U.S. Library of Congress, CRS, China’s 14th Five-Year Plan: A First Look, by Karen Sutter and Michael Sutherland, CRS Report IFI1684 (Washington, DC: Office of Congressional Information and Publishing, January 5, 2021).

[14] Ibid.

[15] Thomas Blaubach “Connecting Beijing’s Global Infrastructure: The PEACE Cable in the Middle East and North Africa,” MEI Policy Center (March 2022)

[16] “Submarine Fiber Cable Market Size to Grow by USD 3.86 Bn at a CAGR of 11.04%| Investments Source Segment is expected to witness lucrative growth,” Technavio Research (May 27, 2022): https://www.prnewswire.com/news-releases/submarine-fiber-cable-market-size-to-grow-by-usd-3-86-bn-at-a-cagr-of-11-04-investments-source-segment-is-expected-to-witness-lucrative-growth–technavio-301555740.html

[17] “HMN Tech,” Submarine Cable Map, TeleGeography, accessed November 13, 2022; https://www.submarinecablemap.com

[18] Amy Remeikis, “Australia supplants China to build undersea cable for Solomon Islands,” The Guardian, June 13, 2018

[19] “Guam,” The World Factbook, U.S. Central Intelligence Agency, accessed November 13, 2022

[20] Ibid.

[21] “Guam,” Submarine Cable Map, TeleGeography, accessed November 13, 2022; https://www.submarinecablemap.com

[22] “Population, total – Guam” Data, The World Bank, accessed November 13, 2022; https://data.worldbank.org/country/GU

[23] “Individuals using the Internet (% of population) – Guam” Data, The World Bank, accessed November 13, 2022; https://data.worldbank.org/country/GU

[24] Donald Trump, Executive Order 13913, “Establishing the Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector.” Federal Register 85, no. 19643 (April 4, 2022): https://www.federalregister.gov/documents/2020/04/08/2020-07530/establishing-the-committee-for-the-assessment-of-foreign-participation-in-the-united-states

[25] David Abecassis, Dio Teo, Goh Wei Jian, Michael Kende, Neil Gandal, “Economic Impact of Google’s APAC Network Infrastructure,” Anlysys Mason (September 2020)

[26] “Solomon Islands,” The World Factbook, U.S. Central Intelligence Agency, accessed November 13, 2022

[27] “Population, total – Solomon Islands” Data, The World Bank, accessed November 13, 2022; https://data.worldbank.org/country/solomon-islands

[28] “Individuals using the Internet (% of population) – Solomon Islands” Data, The World Bank, accessed November 13, 2022; https://data.worldbank.org/country/solomon-islands; Georgina Kekea, “Solomon Islands secures $100m China loan to build Huawei mobile towers in historic step,” The Guardian, (August 18, 2022)

[29] “Solomon Islands,” Submarine Cable Map, TeleGeography, accessed November 13, 2022; https://www.submarinecablemap.com

[30] Amy Remeikis, “Australia supplants China to build undersea cable for Solomon Islands,” The Guardian, June 13, 2018

[31] Colin Packham, “Ousting Huawei, Australia finishes laying undersea internet cable for Pacific allies,” Reuters, (August 27, 2019), https://www.reuters.com/article/us-australia-pacific-cable/ousting-huawei-australia-finishes-laying-undersea-internet-cable-for-pacific-allies-idUSKCN1VI08H

[32] Australian High Commission Papua New Guinea, “Coral Sea Cable System launched”. Accessed November 13, 2022; https://png.embassy.gov.au/pmsb/1148.html#:~:text=Construction%20of%20the%20cable%20system,Guinea%20and%20Solomon%20Islands%20governments.

[33] Corinne Reichert, “PNG sticks with Huawei for subsea cable: Report” ZD Net Magazine, November 26, 2018; https://www.zdnet.com/article/png-sticks-with-huawei-for-subsea-cable-report/

[34] Georgina Kekea, “Solomon Islands secures $100m China loan to build Huawei mobile towers in historic step,” The Guardian, (August 18, 2022)

[35] Ibid.

[36] Matthew P. Goodman, “Unpacking the PCAOB Deal on U.S.-Listed Chinese Companies,” Center for Strategic & International Studies, (September 28, 2022)

[37] Foreign Investment Risk Review Modernization Act of 2018, US Code 50 (2018), § 4565

[38] Donald Trump, Executive Order 13913, “Establishing the Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector.” Federal Register 85, no. 19643 (April 4, 2022): https://www.federalregister.gov/documents/2020/04/08/2020-07530/establishing-the-committee-for-the-assessment-of-foreign-participation-in-the-united-states

[39] Ibid.

[40] “The Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector – Frequently Asked Questions” National Security Division, United States Department of Justice, accessed November 13, 2022; https://www.justice.gov/nsd/committee-assessment-foreign-participation-united-states-telecommunications-services-sector

[41] Federal Communications Commission. “In the Matter of Micronesian Telecommunications Corporation, Application for a license to land and Operate a High Capacity Digital Submarine Cable System Extending Between the Commonwealth of the Northern Mariana Islands and Guam,” File No. S-C-L-92-003, February 3, 1993. https://transition.fcc.gov/ib/pd/pf/scl_doc/93-91.pdf; Nico Roehrich “Apricot subsea cable will boost internet capacity, speeds in the Asia-Pacific region” Engineering at Meta, August 15, 2021; https://engineering.fb.com/2021/08/15/connectivity/apricot-subsea-cable/

[42] “About Us’ Asia American Gateway, accessed November 13, 2022; https://asia-america-gateway.com/AboutUs.aspx

[43] “Staff & Shareholders” Australia Japan Cable, accessed November 13, 2022; https://ajcable.com/ajc-network/staff-shareholders/

[44] Bikash Koley, “This bears repeating: Introducing the Echo subsea cable,” Google Cloud Blog, March 29,2021, https://cloud.google.com/blog/products/infrastructure/introducing-the-echo-subsea-cable

[45] Ibid.

[46] Bikash Koley, “Announcing Apricot: a new subsea cable connecting Singapore to Japan,” Google Cloud Blog, August 16, 2021; https://cloud.google.com/blog/products/infrastructure/new-apricot-subsea-cable-brings-more-connectivity-to-asia

Featured Image: APRA HARBOR, Guam (March 5, 2016) An aerial view from above U.S. Naval Base Guam (NBG) shows Apra Harbor with several navy vessels in port. (U.S. Navy photo by Mass Communication Specialist 3rd Class Deven Ellis/Released)

Kamikazes: The Legacy of Soviet Naval Aviation, Pt. 1

The following selections are derived from an article originally published in the Naval War College Review under the title, “Kamikazes: The Soviet Legacy.” Read it in its original form here.

By Maksim Y. Tokarev

The Naval Air Force of the Soviet Navy: The Admirals’ Stepchild

Despite the fact that Russian military aviation was born within the navy, since 1922—when the Union of Soviet Socialist Republics, the USSR, was created— until today the Naval Air Force has been essentially the representative office of the Soviet/Russian Air Force (Voyenno-Vozdushnie Sily, or VVS ) in the navy realm. Russian naval aviation has not possessed two features that distinguish naval air forces from those of the army or “big” national air force counterparts:

  • A system of development, design, and purchase of aircraft and weapons
  • A system of education and training of flying personnel (from 1956 onward).

All such systems were and are still mostly in the hands of the air force (during World War II, an army air force, known as the VVS -RKKA).

Technically, the Soviet Naval Air Force (SNAF) was part of the navy. But in fact, SNAF fixed-wing planes, with a handful of exceptions—such as the vertical/ short-takeoff-and-landing (VSTOL ) light-attack Yak-38 and a small family of seaplanes of the Beriev Aircraft Company (the Be-6, Be-12, Be-200)—were, as they still are, ordered by and developed for the air force. All the huge long-range, heavy bombers, such as the Tu-16 (NATO Badger family), the Tu-95 (Bear), and the Tu-22 (Backfire), were developed under the orders and specifications of the Soviet Air Force’s bomber command, the DA (Dal’naya Aviatsiya, or Long-Range Aviation). Moreover, the DA’s heavy bomber units constituted an integral part of the anti-carrier doctrine, representing nearly a third of the forces that would be involved in strikes. Those units could temporarily fall under operational control of the SNAF. Two-thirds of the rest were organized as the MRA (Morskaya Raketonosnaya Aviatsiya, or Naval Guided-Missile Aviation), permanently under the operational and administrative control of the navy.

But this administrative interconnection did not remove the curtain between the navy’s philosophy and ethos and those of the VVS. Soviet naval aviators, all commissioned officers, held field rank instead of deck (naval) rank and were completely out of the chain of command of naval surface ships, units, and staffs, let alone submarines. Their areas of responsibility and service were almost exclusively aviation matters. Each of the four fleet staffs, typically headed by a full admiral (three stars) or a vice admiral (two stars), had a subordinate Staff of Naval Aviation of the X Fleet (where X would be Baltic, Northern, Black Sea, or Pacific), which commanded all the fleet’s air units. For each fleet’s commanding general of aviation, typically a major general or lieutenant general, to whom this staff reported, there was only one possible next career step within the navy: to become commanding general of Naval Aviation of the Soviet Navy in the Naval Main Staff in Moscow, as a colonel general.

Needless to say then, almost all naval aviators and naval air navigators (roughly similar to American naval flight officers) from the beginning of their careers kept their eyes the other way—toward an interservice transfer to the VVS, where they could reach much higher command assignments, as air marshals. Moreover, all of them had friends in the VVS, because the navy did not have its own system of pilot and navigator training courses, schools, or academies. All naval aviators, navigators, and aviation engineers were (and still are) graduates of VVS air military colleges or air military engineering colleges. So not only were they aware that they represented a marginal part of the annual alumni pool, having chosen the restricted SNAF path instead of the wide-open VVS, but their early military and flying experience, the four or five years spent in an air college, had filled them with VVS ethos and traditions instead of the navy’s. It is worth noting that, contrary to U.S. military aviation training practice, Soviet/Russian VVS air colleges inserted cadets into the flying pipeline roughly in the middle of the course, two years before graduation and commissioning. All Soviet military pilots could fly the modern military aircraft in almost all circumstances months before the little stars of a second lieutenant were on their shoulders. There are close parallels to British Royal Air Force (RAF ) practice and ethos, and to those of the World War II Luftwaffe as well…

…This semi-separation of the SNAF from the navy created, without doubt, neglect on the part of the “true” naval officer communities, surface and submarine. Given the rule that no naval aviator or navigator could attain flag rank in any of the fleet staffs and that the admirals and deck-grade officers of the Soviet Navy only occasionally flew on board naval aircraft, and then as passengers only, there was no serious trust in the SNAF in general or its anti-carrier role in particular. The SNAF, though its actions were coordinated with surface and submarine units in war plans and staff training, would attack on its own, whereas missile-firing surface units and submarines had to complement each other, depending on overall results.

The actual training of SNAF units had no significant connection with surface or submarine units below the level of “type” staffs of the fleet. Communications between SNAF aircraft aloft and guided-missile cruisers at sea or even with shore radio stations maintaining submarine circuits often failed because of mistakes in frequencies or call signs. So the “real” admirals’ common attitude toward the MRA was essentially the same as that toward shore-based missiles: order them to take off, heading for the current target position, and forget them. No wonder that the kamikaze spirit was often remembered in the ready rooms of MRA units ashore.

The Soviet Navy had itself experienced the real thing once, in 1945, in the last month of the war. While supporting an amphibious landing on the Kurile Islands, a small group of Soviet ships was attacked by several B5N2 Kate torpedo bombers from the Kurile-based Hokuto Kokutai, an outfit normally devoted to patrol and ASW over the surrounding sea. According to Japanese records, at the time of the attacks only five Kates from that unit were flyable, and four of them participated in kamikaze attacks against the Soviet amphibious assaults, armed with 200-kilogram depth charges or 60-kilogram general-purpose bombs. On 12 August two of these planes were shot down by AA fire from the minesweeper T-525 (a U.S.-built AM type), and one crashed directly into the small motor minesweeper KT-152 (a mobilized fishing boat), which immediately sank with all hands. This was the only successful kamikaze encounter in Soviet naval history.

Why Should We Attack the U.S. Carriers— and for God’s Sake, How?

Unable to create a symmetrical aircraft carrier fleet, for both economic and political reasons, the Soviet Navy had to create some system that could at least deter the U.S. Navy carrier task forces from conducting strikes against the naval, military, and civilian infrastructure and installations on the Kola and Kamchatka Peninsulas, Sakhalin Island, and the shoreline around the city of Vladivostok. The only reasonable way to do so was as old as carrier aviation doctrine itself: conduct the earliest possible strike to inflict such damage that the carrier will be unable to launch its air group, or at least the nuclear-armed bombers. There was also an important inclination to keep the SLOCs in Mediterranean under the threat of massive missile strikes. These plans, given the absence of a Soviet carrier fleet, definitely rode on the wings of land-based aviation. Riding also on the shoulders of air-minded military leaders, they reached out farther than the typical 500-mile combat radius of regular medium bombers, by means of something much more clever than the iron, unguided bombs that had been the main weapon of Soviet bombers for a long time.

The origins of guided anti-ship missiles in military aviation are German. Hs293 missiles and FX1400 guided bombs were successfully employed in 1943–44 by Luftwaffe bomber units; one of only five battleships sunk at sea solely by aviation, the Italian battleship Roma, was sunk by FX1400s dropped and guided by Do-217 crews of Kampfgeschwader (Bomber Squadron) 100. But those weapons, being radio controlled, could have been easily disabled by relatively simple ECM measures, such as jamming, had the ECM operator known the guidance frequency. A more promising method of guidance was active radar seekers, which made such weapons independent of the carrying platform after launch. The first air-to-surface missile with such guidance and targeting was created in Sweden in the early 1950s and entered service with the Swedish air force as the Rb04 family.

Regardless of whether it had the help of intelligence information, the Soviet weapons industry managed to develop its own device at roughly the same time, but using semiactive targeting. The first such missile, the KS-1 Kometa (Comet), started development in 1951 and entered service two years later. From the beginning, and in contrast to all other such systems, Soviet anti-ship missiles were designed to kill carriers and other big ships by hitting pairs. The warhead of the KS-1 contained more than 800 kilograms of explosive, and the missile generally resembled a little unmanned MiG-15 fighter plane. The old Japanese Okha concept had clearly been adopted entirely, with the exception of a sacrificial pilot.

KS-1 Kometa (Kennel) anti-ship missile mounted on a Tu-16KS (BADGER B) formerly of the Indonesian Air Force, on display at the Air Force Museum, Yogyakarta. (Photo via Wikimedia Commons)

It is worth noting that the nuclear strike/deterrent role was exclusive to U.S. aircraft carriers for less than a single year, from the first assembly of a nuclear bomb on board a carrier in December 1951 to the successful trial launch of a Regulus nuclear cruise missile from a submarine in 1952. The carriers’ shared (i.e., with submarines) nuclear role lasted up to 1964, when George Washington– class ballistic-missile submarines went on patrol on a regular basis.

From that time onward, as Adm. James Stockdale recalls, the primary role of the carrier air groups, even fighter squadrons, became the close support of land combat, as well as land interdiction. The beginning of the Vietnam War featured this mode of employment. SNAF staffs found that the main skills of the carriers’ attack squadrons (medium and light) changed twice. From 1964 to 1974, during the Vietnam War, it was mostly land targets that attack squadrons were intended to strike; from 1975 to the Desert Storm operation in 1990 the carrier attack community shifted its focus to readiness to engage Soviet surface fleets at sea, developing the Harpoon guided-missile family. During the first Iraq war the main effort switched again, to close air support and battlefield interdiction ashore. While it was not going to deal with the carrier attack planes directly, the SNAF was watching with interest the fluctuation in the U.S. Navy’s fleet air-defense inventory and tactics, driven by changes in the targets between the open sea and continental landscapes. It was important to find the difference between the typical CAP tactics at sea and barrier CAP duty offshore, calculating the average times that F-4 and F-14 interceptors remained on station between aerial refueling and rotation of patrols….

…The U.S. carrier task force had first been considered a real threat to Soviet shore targets in 1954, when intelligence confirmed the presence of nuclear weapons (both bombs and Regulus missiles) on board the carriers, as well as planes that could deliver them (AJ-1s and A3Ds). The first anti-carrier asset tested in the air at sea was of American origin—the Tu-4 heavy bomber, a detailed replica of the Boeing B-29 Superfortress. The missile-carrying model, the Tu-4KS, was introduced with the Black Sea Fleet Air Force in 1953. The plane was able to carry two KS missiles and was equipped with a K-1M targeting radar. Because of the need to guide the missile almost manually from the bomber, the aircraft had to penetrate the anti-air warfare killing zone of the task force to as close as 40 kilometers from the carrier or even less. The kamikaze-like fate was abruptly switched from the single pilot of an Okha to the entire crew of a Tu-4KS. Subsequent efforts to develop autonomous active-radar missiles (the K-10, K-16, KSR-2, and finally KSR -5) were more or less unsuccessful. Though the semiactive KS placed the carrying plane under serious threat, it was considerably more reliable than the active-radar missiles.

March 1, 1983 – A left underside view of a Soviet Badger G aircraft in-flight with an KSR-5 (AS-6 Kingfisher) missile attached to the left wing. (Photo via U.S. National Archives)

The next generation of planes was represented by the series known to NATO as the Badger (the Tu-16KS, Tu-16K-10/16, Tu-16KSR, with reconnaissance performed by the Tu-16R, or Badger E). This plane was not the best choice for the job, but it was the only model available at the beginning of the 1960s. The service story of the Badger family is beyond the scope of this article, but it is noteworthy that the overall development of anti-carrier strike doctrine grew on its wings. The first and foremost issue that had to be considered by SNAF staffs was the approach to the target, which involved not only the best possible tactics but the weapon’s abilities too. For a long time, prior to the adoption of antiradiation missiles, and given the torpedo-attack background of MRA units, there was a strong inclination toward low-level attack. Such a tactic comported with the characteristics of the missiles’ jet engines and the poor high-altitude (and low temperature) capabilities of their electronic equipment. The typical altitude for launch was as low as 2,000 meters; that altitude needed to accommodate the missile’s 400-600-meter drop after launch, which in turn was needed to achieve a proper start for its engine and systems. Although the SNAF experimented with high-altitude (up to 10,000 meters) and moderate altitude approaches—and until it had been confirmed that the carrier’s airborne early-warning (AEW) aircraft, the Grumman E-2 Hawkeye, could detect the sea-skimming bombers at twice the missile’s range—the low-level approach was considered the main tactic, at least for half the strike strength.

Flying the Backfire in Distant-Ocean Combat: A One-Way Ticket

The MRA ’s aircraft, such as the Tu-16 missile-launching aircraft and the Tu-95 reconnaissance and targeting aircraft, were relatively slow, and they were evidently not difficult targets for U.S. fighters. They were large targets for the AIM-7 Sparrows shot from F-4 Phantoms. The problem for the aircraft was detection by AEW assets. If E-2 (or U.S. Air Force E-3) crews did their job well, even surface ships, such as the numerous Oliver Hazard Perry–class guided-missile frigates, could contribute to shattering a Soviet air raid. Despite the supersonic speed of the KSR -5 missiles, it was not a big problem to catch the bombers before they reached the launch point….

….The picture changed with the Tu-22M, Tu-22M-2, and Tu-22M-3—the Backfire family—which could reach almost Mach 2…The bird has a crew of just four: pilot, copilot, and two navigators—the first shturman (the destination navigator) and second shturman (the weapons-system operator, or WSO). All of them are commissioned officers, males only, the crew commander (a pilot in the left seat, age twenty-six to thirty) being not less in rank than captain. All the seats eject upward, and the overall survivability of the plane in combat is increased, thanks not only to greater speed but also to chaff launchers, warning receivers, active ECM equipment, and a paired tail gun that is remotely controlled by the second navigator with the help of optical and radar targeting systems. This plane significantly improved the combat effectiveness of the MRA.

March 25, 1983 – A rear view of a Soviet Tu-22 Backfire aircraft in flight. (Photo via U.S. National Archives)

In theory and in occasional training, the plane could carry up to three Kh22MA (or the MA-1 and MA-2 versions) anti-ship missiles, one under the belly and two more under the wings. But in anticipated real battle conditions, seasoned crews always insisted on just one missile per plane (at belly position), as the wing mounts caused an enormous increase in drag and significantly reduced speed and range.

The Kh-22 missile is not a sea skimmer. Moreover, it was designed from the outset as a dual-targeted missile, able to strike radar-significant shore targets, and the latest version can also be employed as an antiradar missile. The first and most numerous model of this missile, the Kh-22MA, had to see the target with its own active radar seeker while still positioned under the bomber’s belly. But the speed, reliability, and power of its warhead are quite similar to those of the Soviet submarine-launched sea skimmers. The price for those capabilities is the usual one for a Soviet weapon—huge weight and dimensions. The Kh-22 is more than 11 meters long and weighs almost six tons, combat ready. The missile can travel at Mach 3 for 400 kilometers. Usually it contains more than a ton of an explosive, but it could carry a 20-200-kiloton nuclear warhead instead.

May 23 1984 – A Kh-22 (AS-4 Kitchen) anti-ship missile under a Tupolev Tu-22M Backfire bomber. (Photo via U.S. National Archives)

There is a pool of jokes within the Backfire community about the matter of who is more important in the Tu-22M’s cockpit, pilots or navigators. The backseaters (both the navigators’ compartments are behind the pilots’) often claim that in a real flight the “front men” are usually doing nothing between takeoff and landing, while the shturmans are working hard, maintaining communications, navigating, and targeting the weapon. In reality, the most important jobs are in the hands of the WSO, who runs the communication equipment and ECM sets as well.

The doctrine for direct attacks on the carrier task force (carrier battle group or carrier strike group) originally included one or two air regiments for each aircraft carrier—up to 70 Tu-16s. However, in the early 1980s a new, improved doctrine was developed to concentrate an entire MRA air division (two or three regiments) to attack the task force centered around one carrier. This time there would be a 100 Backfires and Badgers per carrier, between 70 and 80 of them carrying missiles. As the Northern Wedding and Team Spirit exercises usually involved up to three carrier battle groups, it was definitely necessary to have three combat-ready divisions both in northern Russia and on the Pacific coast of Siberia. But at the time, the MRA could provide only two-thirds of that strength—the 5th and 57th MR Air Divisions of the Northern Fleet and the 25th and 143rd MR Air Divisions of the Pacific Fleet. The rest of the divisions needed—that is, one for each region—were to be provided by the VVS DA. The two air force divisions had the same planes and roughly the same training, though according to memoirs of an experienced MRA flyer, Lieutenant General Victor Sokerin, during joint training DA crews were quite reluctant to fly as far out over the open ocean as the MRA crews did, not trusting enough in their own navigators’ skills, and tried to stay in the relative vicinity of the shore. Given the complexity of a coordinated strike at up to 2,000 miles from the home airfield, navigation and communication had become the most important problems to solve.

Being latent admirers of the VVS ethos, MRA officers and generals always tried to use reconnaissance and targeting data provided by air assets, which was also most desired by their own command structure. Targeting data on the current position of the carrier sent by surface ships performing “direct tracking” (a ship, typically a destroyer or frigate, sailing within sight of the carrier formation to send targeting data to attack assets—what the Americans called a “tattletale”), were a secondary and less preferable source. No great trust was placed in reports from other sources (naval radio reconnaissance, satellites, etc.). Lieutenant General Sokerin, once an operational officer on the Northern Fleet NAF staff, always asked the fleet staff ’s admirals just to assign him a target, not to define the time of the attack force’s departure; that could depend on many factors, such as the reliability of targeting data or the weather, that generate little attention in nonaviation naval staff work. The NAF staff had its own sources for improving the reconnaissance and targeting to help plan the sorties properly. Sokerin claims that “no Admirals grown as surface or submarine warriors can understand how military aviation works, either as whole or, needless to say, in details.”

Read Part Two.

Lieutenant Commander Tokarev joined the Soviet Navy in 1988, graduating from the Kaliningrad Naval College as a communications officer. In 1994 he transferred to the Russian Coast Guard. His last active-duty service was on the staff of the 4th Coast Guard Division, in the Baltic Sea. He was qualified as (in U.S. equivalents) a Surface Warfare Officer/Cutterman and a Naval Information Warfare/Cryptologic Security Officer. After retirement in 1998 he established several logistics companies, working in the transport and logistics areas in both Europe and the Commonwealth of Independent States.

Featured Image: A United Soviet Socialists Republic (Russian) TU-95 Bear bomber aircraft in flight over the Arctic Ocean, during a flight to Keflavik, Iceland in 1983. (U.S. Air Force Photo) (Released)