All posts by Dmitry Filipoff

Red Sea Topic Week Concludes on CIMSEC

By Dmitry Filipoff

For the past two weeks, CIMSEC featured analysis submitted in response to our call for articles on the crisis in the Red Sea. Authors assessed a wide variety of dimensions and offered lessons that can be learned from the crisis.

The Red Sea crisis continues as Houthi attacks threaten shipping and multinational forces seek to restore security. These attacks highlight the criticality of the global maritime commons and how the ability to threaten them is proliferating. Many actors are taking note of the political and operational dynamics of the crisis and are closely following U.S. actions in particular. Whether or not military operations can conclusively resolve the threat to this critical geography remains to be seen. 

Below are the articles and authors that featured during this special series. We thank them for their contributions.

Evaluating the Naval Response to the Red Sea Crisis,” by Colin Barnard

This analysis evaluates the naval response so far, from cooperating with merchant shipping, the cost effectiveness and vulnerabilities of using warships and missiles to counter drones, and the role of allies, to the potential implications for a future conflict with China and current efforts in defense innovation to prepare for it.

Panda Express: A Proposed Convoy Operation in the Red Sea,” by Clay Robinson

The idea is simple: vulnerable multinational commercial vessels would closely shadow Chinese ships as they transit safely past Houthi missile launchers in a convoy-type operation. The Houthis, knowing their targeting is lacking, would refrain from shooting lest they accidentally hit a Chinese ship and anger both Beijing and Tehran.

Naval Interoperability and NATO’s Naval Presence: Lessons from the Red Sea,” by CDR Augusto Conte, Spanish Navy, and Gonzalo Vázquez

If properly assessed and examined, all lessons drawn from naval actions in the Red Sea will provide valuable input on how to readapt NATO’s naval forces for a renewed era of great power competition and to better cope with the threats present in the Alliance’s maritime backyard.

Basing U.S. Ships in Nearby Waters to Counter Threats in the Red Sea,” by Michael D. Purzycki

The need for a U.S. naval presence in and around the Red Sea, combined with the uncertainty of America’s ability to regularly send vessels to that region, portends the basing of U.S. vessels in or around the Fifth Fleet area of responsibility. First, a willing host country must be found. 

The Strategic Abuse of Maritime Security in the Red Sea,” by Alexandru Cristian Hudișteanu

In practice, maritime security is usually viewed from the lens of what disturbs it, based on an insecurity perspective…Now we can consider maritime security from the perspective of who selectively grants it, under threat of force, and for self-serving ends.

China’s Calculated Inaction in the Red Sea Crisis,” by David Scott

These attacks have been ongoing since November and show little sign of abating. China has maintained a studied and deliberate distancing from the issue, whose strategic inaction rather than action has been noticeable.

Analyzing the German Frigate Hessen’s Near-Miss of a U.S. Drone in the Red Sea,” by COL Jörg Stenzel, German Army, and CDR Michael Posey, U.S. Navy 

In February 2024, a fortunate mishap prevented German Navy air defenders from shooting down an American MQ-9 Reaper in the Red Sea. The frigate misidentified the U.S. drone and fired two Standard Missile 2s at the target – which both subsequently missed. This near-miss incident in the Red Sea and reports about minimal ammunition stocks have triggered many controversial discussions about the German Navy’s capabilities and readiness.

The Coming of Age of Directed Energy Weapons and the Red Sea Crisis,” by Dr. Bonnie Johnson

The rise of unmanned threats, such as those in the Red Sea crisis, is helping push lasers and microwave devices over a final set of operationalization hurdles to deployment. 

Escalation Beneath the Waves: The Looming Threat of Houthi UUVs in the Red Sea,” by Commander Amila Prasanga, Sri Lankan Navy

The Houthis’ use of UUVs marks a significant escalation in the ongoing Red Sea crisis. These submersible drones, while not as sophisticated as military submarines, pose a significant challenge to naval operations designed primarily to counter surface and aerial threats. The emergence of the Houthi UUVs threat necessitates a comprehensive reassessment of the naval defense strategies and tactics being employed in the Red Sea.

Maritime Traffic Trends and Considerations in the Red Sea,” by Dirk Siebels

One important question is whether military operations have had an impact on merchant shipping through the Red Sea and what the outlook now is. Finding answers requires a detailed look at figures for maritime traffic.

The Crucial Role of Public/Private Partnerships in the Red Sea Crisis,” by Joseph F. Greco, Ph.D 

Some answers can be found in the success of Operation Atalanta, which has been ongoing since 2008. This operation, deployed by the European Union Naval Force as a proactive measure to address piracy on the Somali coast, demonstrated the undeniable effectiveness of public/private partnerships between naval forces and the commercial maritime industry.

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Content@cimsec.org.

Featured Image: The Red Sea as seen from space. (NASA photo)

Red Sea Topic Week Kicks Off on CIMSEC

By Dmitry Filipoff

For the next two weeks, CIMSEC will be featuring analysis submitted in response to our call for articles on the crisis in the Red Sea.

The Red Sea has become arguably the most hotly contested maritime region in the world. A vital maritime chokepoint is being fought over by a coalition of naval powers and a heavily armed Iranian proxy group, the Houthis. These events offer useful lessons on the exercise of naval power, as well as the crisis decision-making of militaries, commercial firms, and nation-states.

Below are the articles and authors that will feature during the topic week. This list will be updated further submissions as the topic week unfolds.

Evaluating the Naval Response to the Red Sea Crisis,” by Colin Barnard

Panda Express: A Proposed Convoy Operation in the Red Sea,” by Clay Robinson

Naval Interoperability and NATO’s Naval Presence: Lessons from the Red Sea,” by CDR Augusto Conte, Spanish Navy, and Gonzalo Vázquez

Basing U.S. Ships in Nearby Waters to Counter Threats in the Red Sea,” by Michael D. Purzycki

The Strategic Abuse of Maritime Security in the Red Sea,” by Alexandru Cristian Hudișteanu

China’s Calculated Inaction in the Red Sea Crisis,” by David Scott

Analyzing the German Frigate Hessen’s Near-Miss of a U.S. Drone in the Red Sea,” by COL Jörg Stenzel, German Army, and CDR Michael Posey, U.S. Navy 

The Coming of Age of Directed Energy Weapons and the Red Sea Crisis,” by Dr. Bonnie Johnson

Escalation Beneath the Waves: The Looming Threat of Houthi UUVs in the Red Sea,” by Commander Amila Prasanga, Sri Lankan Navy

Maritime Traffic Trends and Considerations in the Red Sea,” by Dirk Siebels

The Crucial Role of Public/Private Partnerships in the Red Sea Crisis,” by Joseph F. Greco, Ph.D 

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Content@cimsec.org.

Featured Image: The Red Sea as seen from space. (NASA photo)

Fighting in the Spectrum with Navy and Marine Corps Electronic Warfare Aircraft

By Dmitry Filipoff

Tom Wildenberg spoke with CIMSEC about his new book, Fighting in the Electromagnetic Spectrum U.S. Navy and Marine Corps Electronic Warfare Aircraft, Operations, and Equipment. In this book, Wilbenberg traces the development of naval airborne electronic warfare back through WWII, and captures the various innovations, tactics, and controversies of these unique platforms and capabilities. 

In this conversation, Wildenberg discusses the value of electronic warfare capability, deadly shootdown incidents involving electronic reconnaissance aircraft, and how the Joint Force came to rely so heavily on the Navy for airborne EW.

Electronic warfare is an especially complex and technical form of capability. Broadly speaking, how can we understand the value of EW capability and its various applications?

Electronic Warfare (EW) can be either active or passive. Passive EW involves signal intelligence (SIGINT), also known as communications intelligence (COMINT), and electronic intelligence (ELINT). The former allows one to listen in on the enemy’s communications, which can be an important intelligence asset. The latter is used to collect data on the performance characteristics of the enemy’s electronic devices, such as radar, and is also used to establish the enemy’s electronic order of battle.

There are two primary methods of active EW. Jamming is the one that most people are familiar with. It uses high-power electromagnetic energy to disrupt or blind the enemy’s radars, or to prevent the use of communication by filling his communication channels with noise. More sophisticated methods are used to spoof, capture, or insert false information into the enemy’s radars (search or fire control) or communication systems, disrupting their use or effectiveness.

Aerial electronic warfare missions tend to fall into two broad categories – tactical support to operational forces and national-level intelligence collection missions. How can we characterize these two mission areas, and how did they create tensions over limited EW assets?

Strategic SIGINT and ELINT missions are conducted under the auspices of the National Security Agency, which authorizes, plans, and funds these missions, which are conducted using aircraft and personnel from highly secret Air Force and Navy units that are specially established for this purpose. Since these highly secret missions are funded via the so-called “Black Budget,” their funds are separate from the operating forces that employ EW on the tactical level.

During past conflicts, such as the war in Vietnam, the limited distribution of intelligence gathered by the NSA caused conflicts with both the local and theater commanders who believed that withholding this information was detrimental to in-theater operations.

The Vietnam War and Operation Desert Storm both featured numerous U.S. aircraft battling complex integrated air defense systems. How did electronic warfare feature in these air campaigns? 

The United States military was unprepared when the North Vietnamese began fielding their Russian-supplied SA-2 anti-aircraft missiles. Quick responses by industry, Air Force, and Navy EW specialists enabled both services to field effective countermeasures and tactics that were generally effective in defeating the anti-aircraft missiles. However, the North Vietnamese were constantly developing methods to defeat the American countermeasures, requiring constant re-adjustment by American forces. To avoid these missiles, U.S. aircraft were required to fly at low altitudes during the approach and egress from their target areas, subjecting them to the danger of intense gunfire from hundreds of anti-aircraft weapons. The vast majority of U.S. aircraft losses in Vietnam were downed by these easily deployed weapons.

A reconnaissance photo of a SAM site in North Vietnam. (Official USAF photo released by DoD, August 16, 1965.)

One significant revolution in military affairs that emerged from the air war over Vietnam was the need to suppress enemy air defenses (SEAD) and the creation of units and tactics designed specifically for this purpose. This concept was used very effectively during Operation Desert Storm to virtually eliminate Iraq’s air defense system.

You note that virtually all electronic warfare aircraft in the U.S. military were a product of reconfigured airframe designs. You highlight the EA-6B Prowler as a possible exception. What was unique about this aircraft and how potent was its EW capability? 

The origins of the EA-6B Prowler can be traced to the Marine Corps requirement to replace its aging F3D-2Q Skynight for a carrier-capable aircraft filling the EW attack mission. The Marine Corps provided funding to modify one of the original A-6A Intruders for this purpose. The success of Grumman’s protype led to a production contract for 12 two-seat EA-6A carrier-based EW aircraft.

Towards the end of 1965, as the Marines were beginning to deploy the EA-6A, the Navy needed to replace its aging EKA-3Bs and issued a requirement for a carrier aircraft having a state-of-the art countermeasures suite to support tactical strike aircraft by denying the enemy (the North Vietnamese) the effective use of their defenses and radio communications. Grumman was already at work on an improved version of the EA-6A based around the ALQ-99 tactical jamming system then under development. Since the new ALQ-99 system could not be handled by one electronic countermeasures operator (ECMO), the crew was increased to four – a pilot and three ECMOs.

The EA-6B as originally delivered had an extremely comprehensive electronic warfare suite (internally mounted) that included four defensive jammers, three offensive tactical jammers (covering three radar bands), an integration receiver, and a surveillance system. In addition, the aircraft had seven external stores stations to hold a 300-gallon fuel tank, two more tactical jammers, and up to four weapons.

A U.S. Navy EA-6B Prowler is directed to the catapult on the flight deck of the aircraft carrier USS Nimitz (CVN 68) as the ship conducts flight operations in the Gulf of Oman on Aug. 28, 2013. (U.S. Navy photo by Petty Officer 3rd Class Raul Moreno)

Electronic intelligence missions can be risky, even if there is no outright conflict. What are some of the more notable close calls and shootdown incidents that happened in peacetime and how did they influence subsequent operations? 

During the first decade of the Cold War, the Joint Chiefs of Staff authorized the Special Electronic Search Project utilizing personnel from the Naval Security Group, who specialized in ELINT and cryptology, to conduct “ferret” missions around the Soviet Union and communist states. Theses missions were extremely hazardous for the Navy crews flying them. Between December 1950 and June 1959, 18 Navy planes were attacked. Six were shot down or forced to ditch, killing and wounding a number of Navy personnel.

In November 1968, the Navy began conducting scheduled ELINT missions off the coast of North Korea using piston engine EC-121Ms that had been derived from the Lockheed Constellation. On April 15, 1969, an EC-121M using the call sign Deep Sea 129 was flying on a routine mission over the northwest corner of the Sea of Japan when it was intercepted and shot down by two North Korean MiG-21s – despite the fact the Air Force radars in Korea had detected two North Korean MiGs flying toward the unarmed EC-121M. The U.S. Air Force Security Service listening post at Osan, South Korea, which was eavesdropping on North Korean voice and Morse air defense radio traffic, was also tracking the path of the EC-121M, as well as the intercept course of the North Korean fighters. The naval security group listening post at Kamiseya in Japan was also intercepting Soviet PVO radar tracking of the EC-121M. Both of these sources provided NSA with real-time information about the flight path of Deep Sea 129 and the MiGs attempting to intercept, but did not provide sufficient warning to Deep Sea 129’s crew.

In the weeks following the shootdown, the command-and-control aspect of the EC-121M incident was examined by two official executive office study groups. One was a CINCPAC board of evaluation, the other a JCS ad hoc fact-finding group. The consensus of these studies was the need to improve command and control communications during such missions and that protection for reconnaissance flights into sensitive areas required more coordination between the SIGINT community and the Air Force operational commands that had protective responsibility. A specific recommendation called for integrating SIGINT information with operational information at command-and-control centers where decisions could be made based on all-source information. A naval board of inquiry into the loss of the EC-121M was also convened. One of the recommendations made by this board was for the procurement of higher-performance aircraft to replace the obsolete EC-121M, leading to the development and procurement of the EP-3B ARIES.

Regardless of the danger faced by the crews flying electronic reconnaissance missions, they continued to be flown and were frequently harassed. On April 1, 2001, a Chinese F-8 on one of these harassing missions accidently struck an EP-3E ARIES flying off the coast of China, forcing the severely damaged aircraft to land on China’s Hainan Island. Although the crew used the short time before landing to destroy as much of the sensitive equipment as possible, what information obtained by the Chinese was never revealed. The crew was eventually released after the U.S. government delivered a letter “expressing sorrow,” but not apologizing for the incident.

USN EC-121, BuNo 135749, the aircraft involved in the incident. (U.S. Navy photo)

Despite EW’s importance, the Navy found itself in the position of being the sole provider of aerial electronic warfare capability to the joint force. How did this situation arise and how did it result in unconventional arrangements for these high-demand assets? 

In November 1994, recommendations made by the congressionally-mandated Commission on Roles and Missions of the Armed Forces, established to eliminate redundancy and waste in DOD, led to increased funding for the EA-6B Prowler and a cut in funding for the Air Force’s EF-111A. This effectively established the Prowler as the sole source of Joint Suppression of Enemy Air Defenses (JSEAD) support.

A number of factors contributed to the decision to retire the EF-111A in favor of the EA-6B. First and foremost was the issue of operating expenses. Although the EF-111s made up nine percent of the aircraft in the Air Force’s Tactical Air Command, they consumed 25 percent of the command’s maintenance budget. While both aircraft needed new ECM equipment to counter the next generation of SAM systems, the EA-6B’s ICAP-II weapons system had a better tactical jamming capability. The EA-6B’s four-man crew provided additional operational advantages over the EF-111A’s two-man crew. The EA-6B was also equipped to fire the AGM-88 HARM, which the EF-111A was not. Lastly, and not insignificantly, the Air Force was promoting a concept that stealth aircraft required no outside electronic warfare support to perform their mission.

April 24 1985 – A U.S. Air Force EF-111A Raven aircraft during Theater Force Employment Exercise IV. (Photo via U.S. National Archives)

After the EF-111As were retired, the EA-6B became the Joint Force’s only airborne tactical jamming platform. To support the JSEAD mission, the Navy created non-carrier based expeditionary squadrons that deployed to overseas bases to support U.S. land-based air assets.

A modern high-end conflict is expected to feature a heavily contested electromagnetic spectrum. What are some key lessons from the history of electronic warfare that can inform preparations for modern high-end combat? 

Although electronic warfare has played an important role in every major aerial campaign since World War II began, interest in its continued support and development has often waned during the peaceful interlude that inevitably follows such conflicts. This phenomenon can be attributed to a number of factors concerning the nature of electronic warfare. First is the secrecy surrounding its operations and equipment, which limits the dissemination of EW information to the public and within the military itself. Since the mission of such aircraft is to collect information or suppress enemy air defenses, it lacks the glamour associated with missions flown by attacking aircraft. This discrepancy is reflected in the attitude and elan of the pilots in the attack community who have great influence over what type of aircraft need to be procured or developed. In the past as budgets tightened, the leadership within the aviation community preferred to spend their limited resources on obtaining more fighter, bomber, or attack aircraft, only to discover during the next major conflict that it had to rely on a limited number of somewhat obsolete EW assets to support its mission objectives.

This attitude is no longer as prominent, as evidenced by the latest EW suites being developed for the F-35 and the newest versions of the F-18. The reasons for this are twofold. First is how air power in today’s military operations has to overcome the proliferation of sophisticated air defense systems and enemy fighters armed with air-to-air missiles, which can only be overcome via robust SEAD capability. This concept is well-understood within the aviation community and the upper echelons of the U.S. military. Second, are the extraordinary advances in software and digitization that have enabled the development of state-of the-art EW suites that are lighter and smaller than legacy systems. These new systems are also engineered for autonomous operation. Autonomous operation eliminates the need for additional crew members, and the size and weight reductions allow very sophisticated EW suites to be installed in the latest generation of single-seat fighters without affecting aircraft performance. Whether such systems eliminate the need for dedicated EW attack aircraft remains to be seen.

Thomas Wildenberg is an award-winning scholar with special interests in aviators, naval aviation, and technological innovation in the military. He is the author of a number of books on a variety on naval topics, as well as biographies of Joseph Mason Reeves, Billy Mitchell, and Charles Stark Draper.

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Content@cimsec.org.

Featured Image: A Marine Corps EA-6B Prowler departs after receiving fuel from a U.S. Air Force KC-135 Stratotanker. (Staff Sgt. Trevor T. McBride/Air Force Photo)

Call for Articles: Fleet-Level Warfare

Articles Due: June 10, 2024
Topic Week Dates: June 24-28, 2024

Article Length: 1,5000-3,000 Words
Submit to: Content@cimsec.org

By Dmitry Filipoff

Navies are preparing for more intense contingencies with the return of great power competition. Missions focused on power projection and reinforcing rules-based order at sea now have to compete with the major demands of high-end warfighting and deterrence.

Compared to the missions of previous decades, great power war at sea may involve much larger forces fighting across a broader maritime expanse. This scale of naval conflict is reflected in the concept of fleet-level warfare, where fleets become the principal unit of action for modern war at sea. As navies prepare for high-end naval warfighting, they may have to undergo substantial reorganization and retraining to fight as fleets, much like great power navies did in the interwar period and through both world wars.

What are the possible concepts of operation for gaining victory in fleet-level warfare? Does fleet-level warfare entail new force packages and force generation models? Is fleet warfare effectively captured through warfighting concepts such as Distributed Maritime Operations (DMO)? How can Maritime Operations Centers and fleet commanders be prepared to effectively command fleet-level warfare? Authors invited to submit analysis on these questions and more as we consider how to best prepare for and win in fleet-level warfare.

Send all submissions to Content@cimsec.org.

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Content@cimsec.org.

Featured Image: April 12, 2018 – PLA Navy warships steam in formation. (Li Gang/Xinhua via AP)