Category Archives: Capability Analysis

Analyzing Specific Naval and Maritime Platforms

Trident: Industry, Scotland, and Long-Range Bomber and Land-Based Missile Alternatives

By Alex Calvo

Introduction

The third installment in our four-part series begins with Trident’s impact on British industry and the Scottish factor, very much in evidence in the run up to the 2014 referendum. We then move to examine British nuclear doctrine, asking ourselves whether a minimal posture is tenable, and looking in this connection at potential cyber and undersea unmanned threats to submarines, both of which have attracted public attention over the last few months. While in July this year the UK Parliament voted to renew the Trident fleet with the building of four new submarines, it is still interesting to discuss whether Trident’s cost may have been cut by reducing the number of boats. We then move to consider potential nuclear alternatives to the program, starting with long-range bombers and land-based missiles, leaving submarine and air-launched cruise missiles for the fourth and final installment in our series. Read Part One, Part Two

Trident and British Industry

Any decisions on defense have an industrial component, leading to an uneasy conundrum. On the one hand, the acquisition of assets should be at least primarily motivated by the needs and priorities laid down in defense planning. On the other, because of the sums involved and the strong link between military and civilian research and development, it is impossible to view defense procurement separately from industrial and scientific policy. Thus, while the decision on the continuity of Trident taken in July this year by the UK Parliament should ideally not rest on the interests of the industrial actors involved, we cannot simply dismiss them when analyzing it. In particular, when pondering both nuclear and non-nuclear alternatives to Trident, it is likely that British authorities examined the resulting net effect on British defense and dual-use industries as a whole and on those companies involved in Trident.

We could say something similar when it comes to jobs, which should not have been the primary consideration, but are likely to have featured in this political decision. Some estimates say up to 15,000 jobs may have been lost had Trident not been renewed, but the net impact both in terms of figures and human capital depends on the alternatives should Trident been discontinued. BASIC notes how Trident’s base “supports some 6,700 jobs, expected to rise to 8,200 by 2022,” adding that “the UK submarine industry accounts for 3% of employment in the UK’s scientific and defense industrial base,” and that a “replacement as currently planned could employ up to 26,000 people at some point in the process.” This could at least partly explain the huge majority of 355 in a 650-strong chamber that voted for the program’s renewal with more than half of opposition Labour MPs voting aye in direct contradiction with their leader’s stance, and this after PM Theresa May had publicly made it clear she was ready to press the nuclear button if necessary. Furthemore, while Labour leader Jeremy Corbyn was later reelected by an increased majority of 62 percent, his shadow defense minister, Clive Lewis, stated that his party would remain committed to an independent, sea-based, British nuclear deterrent.

The Scottish Factor: Trident and the Union

The SNP and, more widely, Scottish Nationalists, have traditionally been hostile to Trident for a number of reasons. Among them we may note the party’s weak commitment to security and defense, little regard for collective security, hostility to the notion of the UK as a major world power, and willingness to outsource key policy areas to the European Union. At the tactical level, as seen in the 2014 referendum campaign, opposing Trident may enable the Nationalist camp to attract voters not strongly for or even opposed to independence but who fiercely reject nuclear weapons. Some of these voters may see a non-nuclear independent Scotland as a lesser evil. Others in this category may have seen a vote for independence or a vote for the SNP in future elections as a tactical move to force an end to the British nuclear deterrent. The July 2016 parliamentary vote on Trident was yet another opportunity for the SNP to underline its opposition to Trident, made even more visible by the vote in favor of a majority of opposition Labour MPs. Its 54 members of parliament voted against, and the party warned it would prompt a further push for independence, although opinion polls suggest a majority of Scots favor retaining the deterrent.

In connection to this matter, in the run-up to the referendum, there was speculation that the UK may relocate Trident to Devonport (Plymouth), with a report by RUSI estimating the additional cost at £3.5bn. The report concluded that “while the technical and financial challenges presented by Scottish independence would influence this discussion, they would not be severe enough to dictate it.”

British Nuclear Doctrine: Is a Minimal Posture Tenable?

If the UK’s move to a minimal deterrence posture had been followed by other nuclear states, or at least by negotiations with that purpose in mind, the country may have gone down in the annals of history as a pioneer in the noble pursuit of nuclear disarmament. Although the concept, also referred to as “deterrence lite,” has been extensively discussed in academic and government fora, such a move does not appear likely right now. Rather the contrary, with just to mention a few examples including worsening relations between Washington and Moscow, Pakistan developing a sea-based deterrent, and Japan increasingly pondering the convenience of at the very least retaining a powerful “latent” capability on the face of a resurgent China.

The Pacific Egret docked in Tokai (Ibaraki Prefecture) in March 2016, waiting to depart to the US with a cargo of Japanese plutonium. Tokyo's large stockpiles are one of the reasons why the country is considered to be a 'latent nuclear power. (Kyodo)
The Pacific Egret docked in Tokai (Ibaraki Prefecture) in March 2016, waiting to depart to the U.S. with a cargo of Japanese plutonium. Tokyo’s large stockpiles are one of the reasons why the country is considered to be a ‘latent nuclear power. (Kyodo)

The UK is experiencing growing tensions with an established nuclear power, Russia, which shows no intention of relying on non-conventional weapons to a lesser extent in the near future. More precisely, Russian sources note how not until current military reforms reach a successful conclusion will the country be able to lessen her dependence on tactical nuclear weapons (seen as essential not only in a Euro-Atlantic context, but also in a Chinese one, although the latter is seldom publicly discussed). Even without taking into account other potential conflict scenarios, this provides a powerful incentive to retain Trident or some other form of nuclear deterrent, since otherwise the UK would not only be open to nuclear blackmail but the decision to forego the country’s nuclear status may be seen as a sign of weakness and lack of resolve.

Cyber and Undersea Unmanned Threats to the UK’s Minimal Posture

As already explained, the decision to build a sea-based deterrent rested on the assumption that it would be very difficult for a hostile power to detect and destroy submarines, thus ensuring a second-strike capability. This also allowed London to move to a minimal posture, with just one such submarine on patrol at any given time. Of course, it was noted that while “No sector of a superpower’s defense system is quite so invulnerable against a preemptive attack as its fleet of highly mobile, deep-diving, long-ranging missile-bearing submarines. These make possible a second-strike capability that acts as a forceful deterrent against aggression,” and, “this situation could become unbalanced through the development of effective techniques of strategic antisubmarine warfare (ASW).” In recent months, a public debate has emerged concerning two possible threats against British strategic nuclear submarines: cyber warfare and the advent of unmanned undersea systems (submarine drones).

In November 2015, Lord Browne of Ladyton, former British Defence Secretary from 2006 to 2008 and now vice-chair of pro-disarmament group Nuclear Threat Initiative, said: “The government … have an obligation to assure parliament that all of the systems of the nuclear deterrent have been assessed end-to-end against cyber attacks to understand possible weak spots and that those weak spots are protected against a high-tier cyber threat. If they are unable to do that then there is no guarantee that we will have a reliable deterrent or the prime minister will be able to use this system when he needs to reach for it.” Browne cited a January 2013 report by the Pentagon’s Defense Science Board to support his views. Just one week earlier, Chancellor George Osborne had announced an additional investment of £ 3.2 billion in cybersecurity over a five-year period, an amount coming “nowhere near the scale of the cyber-threat challenge” according to Browne.

Franklin Miller, a former U.S. defense official involved in nuclear policy between 1981 and 2001, refuted Browne’s arguments, saying that “If our nuclear command and control system depended upon the internet or went through the internet then the report by the defense science board would be quite an important warning. However, for those reasons it is a standalone system. It is air-gapped. It does not go through the internet.” Miller added that the 2013 report cited by Browne had been written in 2013 as a “shot across the bow” to members of the U.S. defense community thinking of having some elements of the next generation command and control system for the U.S. nuclear deterrent connected to the internet. He said “I am very comfortable saying that right now our command and control system is insulated from cyber-attack because it doesn’t go into any place that cyber would intrude.”

Concerning swarms of undersea drones, the concept is gaining traction as a possible threat to strategic submarines, even though the technology is still in its early stages. The U.S. Navy is already moving forward in this arena with plans to deploy unmanned underwater vehicles (UUVs) from Virginia-class attack submarines. In December 2015, Paul Ingram, BASIC’s chief executive, warned that progress in underwater drone technology threatened to make Trident submarines vulnerable, in line with other experts who have cautioned about “a revolution in underwater drones, as well as advances in sonar, satellite and other anti-submarine warfare systems” making “even totally silent submarines … likely to become detectable.” Ingram said that “There is a major transition taking place in the underwater battle space and it is far from clear how the new submarine will be able to evade detection from emerging sophisticated anti-submarine warfare capabilities.” Adding that this “raises serious questions about the wisdom of putting all your nuclear weapons on board a submarine,” Ingram called for a public debate on this impending vulnerability.

Despite much interest among major navies, underwater drones are being developed at a much slower pace than their aerial counterparts, an often cited reason being water’s much greater opacity to radio waves. According to Frank Herr, head of the Office of Naval Research’s ocean battlespace sensing department, “Underwater vehicles are much harder to do because of this inability for us to communicate robustly with the vehicles the way you can in the air. That means they are way behind in the development.” Chris Rawley, a surface warfare officer in the U.S. Navy Reserve, believes that “the premise that UUVs will make Tridents more detectable glosses over of the complexities of ASW. The physics of underwater sound propagation don’t change just because we take the man out of the loop. Unmanned systems can potentially put more persistent sensors in the water column, but I’d guess we’re at least two decades out from them making a significant impact on ASW.” Rawley discusses this in more detail in a 2015 interview with CIMSEC.

Could Trident’s Cost be Cut by Reducing the Number of Submarines?

In the run-up to the July 2016 parliamentary vote to renew Trident, some voices, including the Liberal Democrats (the Conservatives’ junior coalition partner in the previous administration) and Labour, the main opposition party, suggested or at least speculated on the possibility of reducing the cost of Trident by cutting down the number of boats from the current four. The Liberal Democrats, which open the section in their website on Trident with harsh words, calling it “out-dated and expensive. It is a relic of the Cold War and not up-to-date in 21st century Britain,” while arguing that “It would be extremely expensive and unnecessary to replace all four submarines, so we propose to replace some of the submarines instead. They would not be on constant patrol but could be deployed if the threat from a nuclear-armed country increased.” BASIC included the option of “irregular undisclosed patrolling patterns” in its 2015 “A Memo to the Next Prime Minister: Options Surrounding the Replacement of Trident,” estimating the potential yearly savings at up to 1 billion. Right now, as emphasized by the Royal Navy itself “One of the Navy’s four strategic submarines is always on patrol, ensuring a continuous at sea deterrent, 24/7/365, carrying the nation’s ultimate weapon somewhere in the Seven Seas.” It is very doubtful whether fewer than four submarines could achieve this objective. The need to keep four submarines has been emphasized by many observers, with for example Simon Michell writing for RUSI that “if the United Kingdom is to have a credible and assured nuclear deterrent based on the submarine-launched Trident missile, then four boats are required, not three.” Therefore, it is plausible, should the cost of Trident be considered to be excessive, to move to another kind of deterrent, for example air-based, rather than relying exclusively on a number of boats too small to ensure a consistent deterrent.

Having fewer than four nuclear boats may not only deliver smaller savings than straight arithmetic may suggest given factors such as economies of scale, but would result in gaps in the deterrent with no submarine patrolling at certain given times. This may be seen by a would-be aggressor as providing a window of opportunity. Furthermore, it could be destabilizing in many ways. For example, during a crisis at a time with no boats on patrol, the knowledge that one was soon to sail may be seen by the other side as providing an incentive to strike first. It may also be interpreted as a hostile move, a step in escalation designed to increase pressure. The Trident Alternatives Review, as an exercise in coalition politics, did not rule out this possibility, while failing to discuss in depth the possibility of a sudden unannounced nuclear attack, but nevertheless gave some clues as to why three boats, as opposed to four, would mean accepting a higher degree of risk that such an attack may take place. Where the Review was crystal clear was in explaining that “Over a 20 year period, a 3-boat fleet would risk multiple unplanned breaks in continuous covert patrolling as well as requiring regular planned breaks for maintenance and/or training. Experience to date with the Resolution-class and Vanguard-class SSBNs is that no such breaks have occurred or been required with a 4-boat fleet.” Thus, we can see how lacking the capacity for continuous patrols not only means the deterrent is not always available but also introduces a new factor in an adversary’s calculus during crisis, opening up different venues of speculation concerning the possible motivations for the start and end of deterrence patrols.

Nuclear Alternatives to Trident: Long-Range Bombers

The UK may remain a nuclear power while shifting to other vectors for the country’s warheads. This may result from different motivations, such as cost calculations, a changed perspective on submarine survivability, or the desire for greater strategic autonomy vis a vis the United States, among other few possibilities. Shifting to another delivery method would have a wide range of implications, not only in terms of range, survivability, domestic politics, credibility just to name a few, but for example, inter-service considerations. Trident underscores the Royal Navy’s status as the senior service, which any non-naval alternative would not support in the same way.

Air delivery systems may consist of either missiles launched by aircraft, or gravity bombs dropped by them. An air-dropped alternative to Trident was suggested last year by think-tank Centre Forum. In its report, this organization argues that a minimum nuclear deterrent should be able to destroy “ten or more … major urban areas” of a nuclear adversary (it should be noted that British nuclear doctrine does not provide any explicit assurance to non-nuclear weapons states) and that the UK should therefore be able of delivering 30 warheads.” It goes on to say that “This requires a considerably lower level of capability than” that provided by Trident, meaning that “the UK can achieve deterrence with a considerably less capable nuclear weapons system, saving money and contributing to long-term multilateral nuclear disarmament.” Based on this and other considerations, the report suggests that the UK “move to a free-fall nuclear capability based on Lockheed Martin F-35 Lightning II / Joint Strike Fighter (JSF) that the UK is currently procuring and the forthcoming U.S. B61 Mod 12 (B61-12) bombs that will arm NATO nuclear Dual-Capable Aircraft (DCA) from 2020.” It estimates the capital cost of “100 anglicised B61-12s” at “approximately £16.7bn,” a figure that would include a number of additions to current planned capabilities, among them enabling the Queen Elizabeth-class carriers to operate catapult-launched, arrested-landing aircraft (with a wider range than the vertical takeoff variant currently planned) and extra naval assets such as five attack submarines and four type 26 frigates. The text presents this alternative as a compromise bringing about costs savings while enhancing conventional capabilities, preserving the submarine industrial base, and “a concrete step down the nuclear ladder and towards future nuclear disarmament as the international situation allows in accordance with the UK’s nuclear Non-Proliferation Treaty obligations.”

Given the UK’s global role and the duty to protect British Overseas Territories, any nuclear alternative to Trident should have an equivalent range. This may be a challenge for nuclear bombers, less so for submarine-launched cruise missiles, and would not apply to land-based ICBMs (intercontinental ballistic missiles). The travails of strategic bombers when targets are far from bases were already illustrated in the Falklands War, where the strike against Port Stanley’s airport required the complex coordination of a very large number of aircraft operating from Asuncion Island. The Centre Forum document argues that a combination of existing overseas bases and “Air-to-Air Refueling (AAR) support from RAF Voyager KC2/KC3 tankers covers all of Africa, Europe, the Middle East and South America, along with the Indian subcontinent and most of former Soviet Central Asia.” Leaving aside the fact that this would not cover all existing nuclear weapons states, the sheer complexity of the necessary AAR operations to reach some corners of the world may put a dent on the deterrent’s credibility, tempting a would-be aggressor into thinking it may not ensure a British response. This was noted by a commentator, who wrote “Where the credibility gets shaky is in the delivery. A Voyager tanker can trail 4 fighter jets for 2800 miles in a transfer flight, but an actual strike mission, especially if a return to base is at least envisaged, is a whole different matter. Even bringing all 14 tankers in service (instead of just 8 + 1 transport only and 5 tankers “on demand” at 90 days notice) and fitting them with booms and receptacles so they can juggle fuel between themselves and work cooperatively, it remains dubious that it would be possible to trail a real strike package over the great distances likely to be involved. Particularly because, in order to deliver the strike with gravity-fall bombs with a stand-off reach of 40 kilometers in the very, very best case, you need a large attack squadron, knowing that many aircraft are likely not to make it to the target, even with the F-35’s stealth.”

Date:- 02 July 2011 WAD-11-0463 Background: Every year in July, RAF Waddington opens it's doors to the general public in staging the Royal Air Force's premier airshow event. In 2011, the undoubted stars of the show are the United States Air Force aerobatic display team 'The Thunderbirds'. Along with the welcome return of crowd favourites- the Vulcan and the Red Arrows, are the Battle of Britain Memorial flight and the classic B-17 bomber 'Sally B' from WW2. Image details: The Vulcan aircraft landing at Waddington. Photo By:- SAC Andy Stevens (RAF) For further information contact: Royal Air Force Waddington Media Communications Officer, RAF Waddington MCO Waddington Lincolnshire LN5 9NB Tel 01522 726804
The long-range nuclear bomber Avro Vulcan was employed in a conventional role in the 1982 Falklands War and later decommissioned. ( RAF photo by SAC Andy Stevens)

This text also questions whether it is realistic to expect the UK to sport 72 ready-to-strike nuclear bombers at any one time, as the Centre Forum defends when it states that “Using the 18 airfields shown in Figure 5 today, this would translate into 72 nuclear-armed F-35Cs and their accompanying Airbus Voyager KC2 / KC3 tankers safely airborne before a surprise attack could destroy them on the ground.” Furthermore, it argues that if that number was indeed available it would put such a dent on conventional capabilities as to make the whole exercise self-defeating. These unrealistic assumptions cast a shadow of doubt over the Centre Forum’s proposal, and prompt suspicions that it may have been designed, or at least have been liable to being employed, to underpin a tactical deal between those opposed to British national sovereignty and the country’s independent deterrent on the one hand, and those concerned about continued conventional defense cuts, on the other. By offering the acquisition of additional conventional assets as part of a package deal involving the replacement of Trident by a less able system, the former may have hoped to achieve the necessary political momentum against Trident, assembling a coalition with the latter and perhaps also other actors like the SNP. At a later stage, with Trident out of the way, the door would have been open to further conventional cuts degrading an already less than credible deterrent, thus achieving unilateral nuclear disarmament through the back door.   

Other disadvantages of a naval aircraft-based deterrent are, in the words of an undisclosed naval analyst, that “a ship is ALWAYS more vulnerable than a submarine” and a “plane can also be downed,” plus the fact that adding a further role to a carrier means an additional concentration of risk and incentives for the enemy to try to sink her. Operations by HMS Hermes and HMS Invincible off the Falklands, at a time when anti-access weapons were much more primitive (Argentine forces improvised a shore-launched Exocet missile, hitting HMS Glamorgan, but it was not available until very late in the war), illustrate the complications of sailing near a hostile shore, which would have been even greater had the British deterrent been based on those same two light carriers. At the end of the day, considering all these aspects, it is difficult not to see that moving from submarines to carrier-based planes would mean a significant downsizing of the British deterrent, with the corresponding negative impact on national security. In the words of another author, “A nuclear deterrent based on the B61-12 would be much less capable than Trident, this is definite. The key issue is not the power of the warhead, but the certainty that an enemy anywhere in the world can be reliably hit. Any possible existential enemy of the UK must be keenly aware that there is a credible deterrent which is unquestionably able to strike back and make him pay a price which cannot be possibly accepted.”

As noted later when discussing air-launched cruise missiles but equally applicable here, “The UK would be faced with the choice of having to keep nuclear-armed aircraft permanently in the air (where they would still be visible) or risk having the air base – and its neighbouring community – as the target for a nuclear strike by a potential adversary.”

Things may be different if a long-range bomber powered by Reaction Engines’ SABRE (Synthetic Air-Breathing Rocket Engine) is developed in the future, since such aircraft would be able to strike at any target without aerial refueling. It must be noted, though, that any such dual-capable (nuclear and conventional) bomber may prompt the same concerns over strategic instability which have pushed Washington to withdraw nuclear Tomahawk cruise missiles from service, which we discuss in this series’ final part.   

150317-N-MF696-071 INDIAN HEAD, Md. (March 17, 2015) Members of the Explosive Ordnance Disposal Technology Division team at Naval Surface Warfare Center, Indian Head prepare a Tomahawk missile for a functional ground test at the Large Motor Test Facility in Indian Head, Md. The event marks the 84th functional ground test the Division has conducted since the program began 25 years ago. (U.S. Navy photo by Monica McCoy/Released)
INDIAN HEAD, Md. (March 17, 2015) Members of the Explosive Ordnance Disposal Technology Division team at Naval Surface Warfare Center, Indian Head prepare a Tomahawk missile for a functional ground test at the Large Motor Test Facility in Indian Head, Md.  (U.S. Navy photo by Monica McCoy/Released)

Nuclear Alternatives to Trident: Land-Based Missiles

The deployment of land-based missiles involves at least two problems. First, they are considered to be the most vulnerable asset in the nuclear triad, given their fixed location. To overcome this vulnerability, an alternative may be to deploy missiles on either trucks or trains, ideally camouflaged as ordinary vehicles, but since this alternative has not featured in the debate on the replacement of Trident (in contrast with Russian work in this area) we shall not examine it in detail here.

Second, the construction of the necessary infrastructure may pose legal (land planning) and political complications. As noted in the 2015 RUSI conference on missile defense, it is precisely these legal and political difficulties involved in deploying certain land-based assets that make a naval missile shield the most realistic alternative for British plans on national BMD (ballistic missile defense). Additionally, as discussed when dealing with cruise missiles, developing a new vector would involve significant time and treasure.

In our next and final installment in this series, we will look at other possible alternatives to trident, including both air and submarine-launched cruise missiles. This will include an examination of their technical aspects, as well as wider economic and policy issues. In the case of submarine-launched nuclear missiles, this includes the risk of confusion with their conventional brethen. Last, we will examine a very different scenario, namely the UK as a Japanese-syle ‘latent’ nuclear power. Stay tuned!

Alex Calvo, a former guest professor at Nagoya University (Japan), focuses on security and defence policy, international law, and military history, in the Indian-Pacific Ocean Region. He tweets at Alex__Calvo and his papers can be found at https://nagoya-u.academia.edu/AlexCalvo Previous work on British nuclear policy includes A. Calvo and O. Olsen, “Defending the Falklands: A role for nuclear weapons?” Strife Blog, 29 July 2014.

Featured Image: The Trident nuclear submarine HMS Victorious is pictured near Faslane in Scotland. (UK Ministry of Defence)

Predicting the Proliferation of Cyber Weapons into Small States

This article originally featured at National Defense University’s Joint Force Quarterly and is republished with permission. Read it in its original form here.

By Daniel Hughes and Andrew M. Colarik

Recent analysis of cyber warfare has been dominated by works focused on the challenges and opportunities it presents to the conventional military dominance of the United States. This was aptly demonstrated by the 2015 assessment from the Director of National Intelligence, who named cyber threats as the number one strategic issue facing the United States.1 Conversely, questions regarding cyber weapons acquisition by small states have received little attention. While individually weak, small states are numerous. They comprise over half the membership of the United Nations and remain important to geopolitical considerations.2 Moreover, these states are facing progressively difficult security investment choices as the balance among global security, regional dominance, and national interests is constantly being assessed. An increasingly relevant factor in these choices is the escalating costs of military platforms and perceptions that cyber warfare may provide a cheap and effective offensive capability to exert strategic influence over geopolitical rivals.

This article takes the position that in cyber warfare the balance of power between offense and defense has yet to be determined. Moreover, the indirect and immaterial nature of cyber weapons ensures that they do not alter the fundamental principles of warfare and cannot win military conflicts unaided. Rather, cyber weapons are likely to be most effective when used as a force multiplier and not just as an infrastructure disruption capability. The consideration of cyber dependence—that is, the extent to which a state’s economy, military, and government rely on cyberspace—is also highly relevant to this discussion. Depending on infrastructure resiliency, a strategic technological advantage may become a significant disadvantage in times of conflict. The capacity to amplify conventional military capabilities, exploit vulnerabilities in national infrastructure, and control the cyber conflict space is thus an important aspect for any war-making doctrine. Integrating these capabilities into defense strategies is the driving force in the research and development of cyber weapons.

Located at Naval Computer and Telecommunications Area Master Station Pacific, Wahiawa, Hawaii, Mobile User Objective System is next-generation narrowband tactical satellite communications system intended to significantly improve ground communications for U.S. forces on the move, November 3, 2008 (U.S. Navy/John W. Ciccarelli, Jr.)
Located at Naval Computer and Telecommunications Area Master Station Pacific, Wahiawa, Hawaii, Mobile User Objective System is next-generation narrowband tactical satellite communications system intended to significantly improve ground communications for U.S. forces on the move, November 3, 2008 (U.S. Navy/John W. Ciccarelli, Jr.)

The Nature of Cyber Warfare

Cyber warfare is increasingly being recognized as the fifth domain of warfare. Its growing importance is suggested by its prominence in national strategy, military doctrine, and significant investments in relevant capabilities. Despite this, a conclusive definition of cyber warfare has yet to emerge.3 For our purposes, such a definition is not required as the critical features of cyber warfare can be summarized in three points. First, cyber warfare involves actions that achieve political or military effect. Second, it involves the use of cyberspace to deliver direct or cascading kinetic effects that have comparable results to traditional military capabilities. Third, it creates results that either cause or are a crucial component of a serious threat to a nation’s security or that are conducted in response to such a threat.4 More specifically, cyber weapons are defined as weaponized cyber warfare capabilities held by those with the expertise and resources required to deliver and deploy them. Thus, it is the intent to possess the skills required to develop and deploy cyber weapons that must be the focus of any national security strategy involving cyber warfare.

Notable theorists have judged that in cyber warfare, offense is dominant.5 Attacks can be launched instantaneously, and there is rapid growth in the number of networks and assets requiring protection. After all, cyberspace is a target-rich environment based on network structures that privilege accessibility over security. Considerable technical and legal difficulties make accurate attribution of cyber attacks, as well as precise and proportionate retaliation, a fraught process.6 There is also the low cost of creating cyber weapons—code is cheap—and any weapon released onto the Internet can be modified to create the basis of new offensive capabilities.7 All of this means that the battlespace is open, accessible, nearly anonymous, and with an entry cost that appears affordable to any nation-state.

Strategies that rely too heavily on offensive dominance in cyber warfare may, however, be premature. Cyber dependence—the extent to which an attacker depends on cyberspace for critical infrastructure—is crucial to the strategic advantages that cyber weapons can provide. Uncertainty rules as the dual-use nature of cyber weapons allows them to be captured, manipulated, and turned against their creators.8 Equally important is the practice of “escalation dominance.”9 As shown by as yet untested U.S. policy, retaliation for a cyber attack may be delivered by more destructive military capabilities.10 And while the speed of a cyber attack may be near instantaneous, preparation for sophisticated cyber attacks is considerable. The Stuxnet attack required the resources of a technologically sophisticated state to provide the expansive espionage, industrial testing, and clandestine delivery that were so vital to its success. The above demonstrates that the true cost of advanced cyber weapons lies not in their creation but in their targeting and deployment, both of which reduce their ability to be redeployed to face future, unforeseen threats.

Cyber weapons are further limited by their lack of physicality. As pieces of computer code, they generate military effect only by exploiting vulnerabilities created by reliance on cyberspace.11 They can attack vulnerable platforms and infrastructures by manipulating computer systems or act as a force multiplier to traditional military assets. This may lead to the disruption and control of the battlespace, as well as to the provision of additional intelligence when payloads are deployed. These effects, however, are always secondary—cyber weapons cannot directly affect the battlefield without a device to act through, nor can they occupy and control territory.

Ultimately, the debate regarding the balance of power in cyber warfare and the relative power of cyber weapons will likely be decided by empirical evidence relating to two factors. The first is the amount of damage caused by the compromise of cyber-dependent platforms. The second will be the extent to which major disruptions to infrastructure erode political willpower and are exploitable by conventional military capabilities. For the moment, however, it is safe to presume that conflicts will not be won in cyberspace alone and that this applies as much to small states as it does to major powers.

Uses of Cyber Weapons by Small States

To be worthy of investment, a cyber weapons arsenal must provide states with political or military advantage over—or at the very least, parity with—their adversaries. To judge whether a small state benefits sufficiently to justify their acquisition, we must understand how these capabilities can be used. A nonexhaustive list of potential cyber weapon uses includes warfighting, coercion, deterrence, and defense diplomacy. As cyber weapons are limited to secondary effects, they currently have restricted uses in warfighting. Their most prominent effect likely will be the disruption and/or manipulation of military command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) capabilities and the degradation of civilian support networks. Attacks on civilian infrastructure remain most feasible, and attacks on automated military platforms are possible.12 The effective use of cyber weapons as a coercive tool is constrained by the relative size and cyber dependence of an opponent and carries the risk of weapons acting in unforeseen ways. Both of these dependencies are shared when cyber weapons are used as a deterrent. This is due to the peculiar nature of the cyber domain, where both coercion and deterrence rely on the same aggressive forward reconnaissance of an adversary’s network. This results in the difference between coercion and deterrence being reduced to intent—something difficult to prove. The final potential use of cyber weapons is as a component of defense diplomacy strategy, which focuses on joint interstate military exercises as a means to dispel hostility, build trust, and develop armed forces.13 This could be expanded to encompass cyber exercises conducted by military cyber specialists. Defense diplomacy can act as a deterrent, but it is effective only if relevant military capabilities are both credible and demonstrable.14 The latter is problematic. Advanced cyber weapons are highly classified; caution must therefore be exercised when demonstrating capabilities so that “live” network penetrations are not divulged.

These four capabilities have crucial dependencies, all of which can limit their suitability for deployment in a conflict. First, the conflicting parties must have comparable military power. Disrupting an opponent’s C4ISR will be of little consequence if they still enjoy considerable conventional military superiority despite the successful deployment of cyber weapons. Second, as demonstrated by the principle of cyber dependence, one state’s disruption of another’s cyber infrastructure is effective only if they can defend their own cyber assets or possess the capability to act without these assets with minimal degradation in operational effectiveness. Third, states must have the resources and expertise required to deploy cyber weapons, which increase commensurate with their efficacy. Fourth, cyber weapons rely on aggressive forward reconnaissance into networks of potential adversaries; weapons should be positioned before conflict begins. This creates political and military risk if an opponent discovers and traces a dormant cyber weapon. Finally, all use of cyber weapons is complicated by their inherent unpredictability, which casts doubts over weapon precision and effect. Once unleashed, the course of cyber weapons may be difficult to predict and/or contain.15 Unforeseen results may undermine relationships or spread to neutral states that then take retaliatory action.16 Accordingly, weapon deployment must follow sound strategy against clearly identified adversaries to minimize unforeseen consequences.

MQ-1 Predator and MQ-9 Reaper assigned to 432nd Aircraft Maintenance Squadron provided intelligence, surveillance, and reconnaissance, especially during Operations Iraqi Freedom and Enduring Freedom (U.S. Air Force/Vernon Young, Jr.)
MQ-1 Predator and MQ-9 Reaper assigned to 432nd Aircraft Maintenance Squadron provided intelligence, surveillance, and reconnaissance, especially during Operations Iraqi Freedom and Enduring Freedom (U.S. Air Force/Vernon Young, Jr.)

A Predictive Framework

What is offered in this section is an analytical framework that may provide a customized evaluation of whether a particular small state should—or will—acquire cyber weapons. In essence, what is being provided is a baseline for a comparative, comprehensive study on a state-by-state basis. The framework itself yields its maximum value when numerous states have been analyzed. This enables potential proliferation patterns to emerge and a clearer picture of the threat landscape to present itself.

Figure. Cyber Weapon Acquisition Framework
The outline of the basic process for analysis is provided in the figure.

Each step is explained by a purpose statement and demonstrated through a case study. The subject of the case study is New Zealand, chosen due to its membership in the Five Eyes intelligence network and because it both self-identifies as and is widely perceived to be a small state.17 Ideally, each step of the framework would be completed by a group representing a variety of perspectives from military forces, government entities, and academic specialties. There is the potential for a much more detailed evaluation than that presented, which has been condensed for brevity.

When submerged, Los Angeles–class fast attack submarine USS Santa Fe is among world’s stealthiest platforms, capable of supporting missions including anti-submarine warfare, anti–surface ship warfare, strike, naval special warfare involving special operations forces, and intelligence, surveillance, and reconnaissance, August 8, 2013 (U.S. Navy/Sebastian McCormack)
When submerged, Los Angeles–class fast attack submarine USS Santa Fe is among world’s stealthiest platforms, capable of supporting missions including anti-submarine warfare, anti–surface ship warfare, strike, naval special warfare involving special operations forces, and intelligence, surveillance, and reconnaissance, August 8, 2013 (U.S. Navy/Sebastian McCormack)

Step One: Identify Foundational Small-State Characteristics. The purpose is to identify key characteristics of the small state within three categories: quantitative, behavioral, and identity.18 Quantitative refers to measures such as land area, population, and gross domestic product (GDP). Behavioral refers to qualitative metrics concerning the behavior of a state, both domestically and within the international system. Identity refers to qualitative metrics that focus on how a state perceives its own identity. This article proposes that metrics from each category can be freely used by suitably informed analysts to assign a size category to any particular state. This avoids the need for a final definition of a small state. Instead, definition and categorization are achieved through possession of a sufficient number of overlapping characteristics—some quantitative, some behavioral, and some identity based.19 Quantitatively, New Zealand has a small population (approximately 4.5 million), a small GDP (approximately $197 billion), and a small land area.20 It is geographically isolated, bordering no other countries. In the realm of behavior, New Zealand practices an institutionally focused multilateral foreign policy. It is a founding member of the United Nations and was elected to the Security Council for the 2015–2016 term after running on a platform of advocating for other small states. It participates in multiple alliances and takes a special interest in the security of the South Pacific.21 Regarding identity, New Zealand’s self-identity emphasizes the values of fairness, independence, nonaggression, cooperation, and acknowledgment of its status as a small state.22 Its security identity is driven by a lack of perceived threat that allows New Zealand to make security decisions based on principle rather than practicality.23 This was demonstrated by the banning of nuclear-armed and nuclear-powered ships within New Zealand waters, and its subsequent informal exclusion from aspects of the Australia, New Zealand, and United States Security Treaty. Despite reduced security, however, domestic opinion strongly supported the anti-nuclear policy that, along with support for nonproliferation and disarmament, has strengthened the pacifistic elements of New Zealand’s national identity.24

Step Two: Identify Resource Availability and Policy Alignment for Cyber Weapon Development, Deployment, and Exploitation. The purpose is to identify how the use of cyber weapons would align with current security and defense policies; whether the small state has the military capabilities to exploit vulnerabilities caused by cyber weapon deployment; and whether the small state has the intelligence and technical resources needed to target, develop, and deploy cyber weapons.

In key New Zealand defense documents, references to cyber primarily mention defense against cyber attacks, with only two references to the application of military force to cyberspace. There is no mention of cyber weapon acquisition. New Zealand’s defense policy has focused on military contributions to a secure New Zealand, a rules-based international order, and a sound global economy. Because the likelihood of direct threats against the country and its closest allies is low, there has been a focus on peacekeeping, disaster relief, affordability, and maritime patrol. New Zealand’s military is small (11,500 personnel, including reservists) with limited offensive capabilities and low funding (just 1.1 percent of GDP). Accordingly, the New Zealand military lacks the ability to exploit vulnerabilities caused by the successful use of cyber weapons.

New Zealand is a member of the Five Eyes intelligence network and thus can access more sophisticated intelligence than most small states. This can be used to increase its ability to target and deploy cyber weapons. It has a modern signals intelligence capability, housed by the civilian Government Communications Security Bureau, which also has responsibility for national cybersecurity. It most likely has the technical capability to adapt existing cyber weapons or develop new ones, particularly if aided by its allies. Due to fiscal constraints, however, any additional funding for cyber weapons will likely have to come from the existing defense budget and thus result in compromises to other capabilities.25

Step Three: Examine Small-State Cyber Dependence. The purpose is to examine the small state’s reliance on cyberspace for its military capabilities and critical infrastructure, as well as its relative cyber dependence when compared to potential geopolitical adversaries.

New Zealand has moderate to high cyber dependence, with increasing reliance on online services and platforms by the government, business sector, and civil society. This dependence will increase. For example, the acquisition of new C4ISR capabilities to increase military adoption of network-centric warfare principles would create new vulnerabilities.26New Zealand’s cyber dependence is further increased by limited cybersecurity expertise.27 It does not have obvious military opponents, so its relative level of cyber dependence is difficult to calculate.

Step Four: Analyze State Behavior Against Competing Security Models. The purpose is to analyze how state behavior aligns with each competing security model and how cyber weapon acquisition and use may support or detract from this behavior. Cyber weapon arsenals are used to advance political and military objectives. These objectives depend on a state’s behavior and identity, both of which are difficult to quantify. A degree of quantification is possible, however, through the use of conceptual security models. A synthesis of recent small- state security scholarship generates four models: the first focused on alliances, the second on international cooperation, and the third and fourth on identity, differentiated by competing focuses (collaboration and influence, and defensive autonomy).28 The alliance-focused model presents small states with persuasive reasons to acquire cyber weapons. This applies both to balancing behavior (that is, joining an alliance against a threatening state) and bandwagoning (that is, entering into an alliance with a threatening state).29 The additional military resources provided by an alliance present greater opportunities for the exploitation of vulnerabilities caused by cyber weapons. In the event that a cyber weapon unwittingly targets a powerful third party, a small state may be less likely to be subjected to blowback if it is shielded by a strong alliance. Furthermore, cyber weapons may be a reasonably cost-effective contribution to an alliance; a great power could even provide preferential procurement opportunities for a favored ally.

New Zealand maintains a close military alliance with Australia and is a member of the Five Power Defence Arrangements. It also has recently signed cybersecurity agreements with the North Atlantic Treaty Organization and United Kingdom.30 The alliances above have focused on security and mutual defense rather than offensive capabilities. New Zealand does, however, have a policy of complementing Australian defense capabilities.31 This could be achieved through the acquisition of cyber weapons, so long as it was closely coordinated and integrated with the Australian military. Thus this model assesses state behavioral alignment as medium/high and cyber weapon support as medium/high.

The international cooperation model assumes that small states can exert influence by strengthening international organizations, encouraging cooperative approaches to security, and creating laws and norms to constrain powerful states.32 Small states acting under this model will favor diplomatic and ideological methods of influence. As such, they are less likely to acquire cyber weapons. Instead, it is more likely that they will try to regulate cyber weapons in a manner similar to the restrictions on biological and chemical weapons or by leading efforts to explicitly incorporate them into the international laws of warfare.

New Zealand usually pursues a multilateral foreign policy approach and is a member of multiple international organizations. It has a long history of championing disarmament and arms control, which conflicts with the acquisition of new categories of offensive weapons. This model assesses state behavioral alignment as high and cyber weapon support as low.

Both of the identity focused models (collaboration and influence versus defensive autonomy) are centered on analysis of a small state’s “security identity.” This develops from perceptions of “past behavior and images and myths linked to it which have been internalized over long periods of time by the political elite and population of the state.”33 This identity can be based around a number of disparate factors such as ongoing security threats, perceptions of national character, and historical consciousness. A state’s security identity can lead it toward a preference for either of the identity focused security models mentioned above.Regarding collaboration and influence, New Zealand’s identity strikes a balance between practicality and principle. It strives to be a moral, fair-minded state that advances what it regards as important values, such as human rights and the rule of law.34 It still wishes, however, to work in a constructive manner that allows it to contribute practical solutions to difficult problems. The acquisition of cyber weapons is unlikely to advance this model. Thus this model assesses state behavioral alignment as medium and cyber weapon support as low.

Despite its multilateral behavior, New Zealand retains some defensive autonomy and takes pride in maintaining independent views on major issues.35 Its isolation and lack of major threats have allowed it to retain a measure of autonomy in its defense policy and to maintain a small military. Its independent and pacifistic nature suggests that cyber weapon acquisition could be controversial. Thus this model assesses state behavioral alignment as medium and cyber weapon support as low/medium.

Table 1. Cyber Weapon Cost-Benefit Risk Matrix for New Zealand

 

Warfighting

Coercion

Deterrence

Defense Diplomacy

Benefits

Ability to complement military capabilities of allies

Cost effective offensive capability

Limited coercive ability from cyber weapons

Limited deterrence from cyber weapons

Deterrence from demonstrating effective cyber weapons via defense diplomacy

Feasibility

Allies may provide favorable procurement opportunities

Appropriate technical and intelligence resources exist

Appropriate technical and intelligence resources exist

Appropriate technical and intelligence resources exist

Appropriate technical and intelligence resources exist

Risks

Procurement may result in reduced funding for other military capabilities

Domestic opposition to acquisition of new offensive weapons

Cyber weapon acquisition may reduce international reputation

Cyber weapons exploitation relies on allied forces

High level of cyber dependence increases vulnerability to retaliation

Domestic opposition to acquisition of new offensive weapons

Security identity not reconcilable with coercive military actions

Procurement may result in reduced funding for other military capabilities

Cyber weapon acquisition may reduce international reputation

High level of cyber dependence increases vulnerability to retaliation

Procurement may result in reduced funding for other military capabilities

Cyber weapon acquisition may reduce international reputation

High level of cyber dependence increases vulnerability to retaliation

Lack of identified threats reduces ability to target and develop deterrent cyber weapons

Procurement may result in reduced funding for other military capabilities

Cyber weapon acquisition may reduce international reputation

High level of cyber dependence reduces deterrent effect

Step Five: Analyze Benefits, Feasibility, and Risk for Each Category of Cyber Weapon Use. The purpose is to first identify the benefits, feasibility, and risk of acquiring cyber weapons based on each category of potential use, as shown in table 1. Next this information is analyzed against the degree to which cyber weapon use may support different security models, as shown in table 2. This results in a ranking of the benefits, feasibility, and risk of each combination of cyber weapon use and small-state security model. This is followed by an overall recommendation or prediction for cyber weapon acquisition under each security model and category of cyber weapon use.

Table 2. Cyber Weapon Acquisition Matrix for New Zealand

Security Model

BFR

Warfighting

Coercion

Deterrence

Defense Diplomacy

Overall

Alliances

Benefits

Medium

Low

Low

Medium

Medium

Feasibility

Medium

Medium

Medium

Medium

Medium

Risk

High

Very High

High

Low

High

Recommendation/Prediction

Further Investigation

No

No

Further Investigation

Further Investigation

International cooperation

Benefits

Low

Low

Low

Medium

Low

Feasibility

Medium

Medium

Medium

Medium

Medium

Risk

High

High

High

Low

High

Recommendation/Prediction

No

No

No

Further Investigation

No

Identity and norms: collaboration and influence

Benefits

Low

Low

Low

Medium

Low

Feasibility

Medium

Medium

Medium

Medium

Medium

Risk

High

High

High

Low

High

Recommendation/Prediction

No

No

No

Further Investigation

No

Identity and norms: defensive autonomy

Benefits

Low

Low

Low

Low

Low

Feasibility

Medium

Medium

Medium

Medium

Medium

Risk

High

High

High

Low

High

Recommendation/Prediction

No

No

No

No

No

Step Six: Recommend or Predict Cyber Weapon Acquisition Strategy. The purpose is to summarize key findings, to recommend whether a small state should acquire cyber weapons, and to predict the likelihood of such an acquisition. The key findings are that New Zealand is unlikely to gain significant benefits from the acquisition of cyber weapons. This is due to its limited military capabilities, multilateral foreign approach, extensive participation in international organizations, and pacifistic security identity. Factors that could change this evaluation and increase the benefits of cyber weapon acquisition would include an increased focus on military alliances, the emergence of more obvious threats to New Zealand or its close allies, or a changing security identity.

Therefore, the recommendation/prediction is that New Zealand should not acquire cyber weapons at this time and is unlikely to do so. The framework’s output has considerable utility as a decision support tool. When used by a small state as an input into a strategic decisionmaking process, its output can be incorporated into relevant defense capability and policy documents. If cyber weapon acquisition is recommended, its output could be further used to inform specific strategic, doctrinal, and planning documents. It also provides a basis for potential cyber weapon capabilities to be analyzed under a standard return-on-investment procurement model. This would involve a more detailed analysis of benefits, costs, and risks that would allow fit-for-purpose procurement decisions to be made in a fiscally and operationally prudent manner.

Alternatively, the framework, which is low cost and allows a variety of actors to determine the likelihood of cyber weapon acquisition by small states, could be used as a tool to develop predictive intelligence. Furthermore, when the framework is used on a sufficient number of small states, it could be used as a basis for making broader predictions regarding the proliferation of cyber weapons. This would be particularly effective over geographical areas with a large concentration of small states. For more powerful states, this might indicate opportunities for increased cyber warfare cooperation with geopolitical allies, perhaps even extending to arms sales or defense diplomacy. Conversely, the framework could provide nongovernmental organizations and academics with opportunities to trace cyber weapon proliferation and raise visibility of the phenomenon among international organizations, policymakers, and the general public. These outcomes provide significant benefits to the broad spectrum of actors seeking stability and influence within the international order.

Conclusion

The evolution of the various domains of warfare did not occur overnight. Learning from and leveraging the changing landscapes of war required continuous investigation, reflection, and formative activities to achieve parity, much less dominance, with rivals. Treating cyberspace as the fifth domain of warfare requires a greater understanding of the battlespace than currently exists. This goes well beyond the technological aspects and requires the integration of cyber capabilities and strategies into existing defense doctrines. The framework we have developed has the potential to help guide this process, from strategic decision to procurement and doctrinal and operational integration. Similarly, its predictive potential is significant—any ability to forecast cyber weapon acquisition on a state-by-state basis and thus monitor cyber weapon proliferation would be of substantial geopolitical benefit. We further propose that decisionmakers of large, powerful states must not ignore the strategic impact that small states could have in this domain. We also remind small states that their geopolitical rivals may deploy cyber weapons as a means to advance national interests in this sphere of influence. Therefore, it is our hope that, as a result of clarifying the potential conflict space, future policies might be developed to control the proliferation of cyber weapons. JFQ

Daniel Hughes is a Master’s Candidate with a professional background in Defense and Immigration. Andrew M. Colarik is a Senior Lecturer in the Centre for Defence and Security Studies, Massey University, New Zealand.

Notes

1 Senate Armed Services Committee, James R. Clapper, Statement for the Record, Worldwide Threat Assessment of the U.S. Intelligence Community, February 26, 2015, available at <www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf>.

2 United Nations News Centre, “Ban Praises Small State Contribution to Global Peace and Development,” 2015, available at <www.un.org/apps/news/story.asp?NewsID=43172#.Vp87nip96Uk>.

3 Paulo Shakarian, Jana Shakarian, and Andrew Ruef, Introduction to Cyber Warfare: A Multidisciplinary Approach(Waltham, MA: Syngress, 2013); Catherine A. Theohary and John W. Rollins, Cyber Warfare and Cyberterrorism: In Brief, R43955 (Washington, DC: Congressional Research Service, March 27, 2015), available at <www.fas.org/sgp/crs/natsec/R43955.pdf>.

4 Raymond C. Parks and David P. Duggan, “Principles of Cyber Warfare,” IEEE Security and Privacy Magazine 9, no. 5 (September/October 2011), 30; Andrew M. Colarik and Lech J. Janczewski, “Developing a Grand Strategy for Cyber War,” 7th International Conference on Information Assurance & Security, December 2011, 52; Shakarian, Shakarian, and Ruef.

5 Fred Schrier, On Cyber Warfare, Democratic Control of Armed Forces Working Paper No. 7 (Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2015), available at <www.dcaf.ch/content/download/67316/…/OnCyber warfare-Schreier.pdf>; John Arquilla, “Twenty Years of Cyberwar,” Journal of Military Ethics 12, no. 1 (April 17, 2013), 80–87.

6 Stephen W. Korns and Joshua E. Kastenberg, “Georgia’s Cyber Left Hook,” Parameters 38, no. 4 (Winter 2008–2009).

7 P.W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford: Oxford University Press, 2014).

8 Parks and Duggan, 30.

9 Thomas G. Mahnken, “Cyberwar and Cyber Warfare,” in America’s Cyber Future, ed. Kristin M. Lord and Travis Sharp (Washington, DC: Center for a New American Security, 2011), available at <www.cnas.org/sites/default/files/publications-pdf/CNAS_Cyber_Volume%20II_2.pdf>.

10 Department of Defense (DOD), The DOD Cyber Strategy (Washington, DC: DOD, April 2015), available at <www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf>.

11 Joel Carr, “The Misunderstood Acronym: Why Cyber Weapons Aren’t WMD,” Bulletin of the Atomic Scientists 69, no. 5 (2013), 32.

12 Sebastian Schutte, “Cooperation Beats Deterrence in Cyberwar,” Peace Economics, Peace Science, and Public Policy 18, no. 3 (November 2012), 1–11.

13 Defence Diplomacy, Ministry of Defence Policy Papers Paper No. 1 (London: Ministry of Defence, 1998), available at <http://webarchive.nationalarchives.gov.uk/20121026065214/http://www.mod.uk/NR/rdonlyres/BB03F0E7-1F85-4E7B-B7EB-4F0418152932/0/polpaper1_def_dip.pdf>.

14 Andrew T.H. Tan, “Punching Above Its Weight: Singapore’s Armed Forces and Its Contribution to Foreign Policy,” Defence Studies 11, no. 4 (2011), 672–697.

15 David C. Gompert and Martin Libicki, “Waging Cyber War the American Way,” Survival 57, no. 4 (2015), 7–28.

16 Joseph S. Nye, Jr., Cyber Power (Cambridge: Harvard Kennedy School, 2010), available at <http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf>.

17 Jim McLay, “New Zealand and the United Nations: Small State, Big Challenge,” August 27, 2013, available at <http://nzunsc.govt.nz/docs/Jim-McLay-speech-Small-State-Big%20Challenge-Aug-13.pdf>.

18 Joe Burton, “Small States and Cyber Security: The Case of New Zealand,” Political Science 65, no. 2 (2013), 216–238; Jean-Marc Rickli, “European Small States’ Military Policies After the Cold War: From Territorial to Niche Strategies,” Cambridge Review of International Affairs 21, no. 3 (2008), 307–325.

19 Ludwig Wittgenstein, Philosophical Investigations (Oxford: Basil Blackwell, 1958).

20 Statistics New Zealand, “Index of Key New Zealand Statistics,” available at <www.stats.govt.nz/browse_for_stats/snapshots-of-nz/index-key-statistics.aspx#>.

21 New Zealand Ministry of Foreign Affairs and Trade, “Foreign Relations,” March 2014, available at <http://mfat.govt.nz/Foreign-Relations/index.php>.

22 Ibid.

23 New Zealand Defence Force Doctrine, 3rd ed. (Wellington: Headquarters New Zealand Defence Force, June 2012), available at <www.nzdf.mil.nz/downloads/pdf/public-docs/2012/nzddp_d_3rd_ed.pdf>.

24 Andreas Reitzig, “In Defiance of Nuclear Deterrence: Anti-Nuclear New Zealand After Two Decades,” Medicine, Conflict, and Survival 22, no. 2 (2006), 132–144.

25 Defence White Paper 2010 (Wellington: Ministry of Defence, November 2010), available at <www.nzdf.mil.nz/downloads/pdf/public-docs/2010/defence_white_paper_2010.pdf>.

26 New Zealand Defence Force Doctrine.

27 Burton, 216–238.

28 Ibid.; Paul Sutton, “The Concept of Small States in the International Political Economy,” The Round Table 100, no. 413 (2011), 141–153.

29 Burton, 216–238.

30 Ibid.

31 Defence Capability Plan (Wellington: Ministry of Defence, June 2014), available at <www.nzdf.mil.nz/downloads/pdf/public-docs/2014/2014-defence-capability-plan.pdf>.

32 Ibid.

33 Rickli, 307–325.

34 McLay.

35 Ibid.

Featured Image: 13th annual Cyber Defense Exercise. (U.S. Army photo by Mike Strasser/USMA PAO)

Autonomous Warfare: An Operational Concept to Optimize Distributed Lethality

By LT Coleman Ward

Introduction

To better meet today’s force demands, [we must] explore alternate fleet designs, including kinetic and non-kinetic payloads and both manned and unmanned systems. This effort will include exploring new naval platforms and formations – again in a highly “informationalized” environment – to meet combatant commander needs.

– Admiral John Richardson in A Design for Maintaining Maritime Superiority

Today’s military operating environment is more complex than ever. While the principles of warfare have remained relatively unchanged throughout history, the development of advanced military capabilities and employment of unconventional styles of warfare increasingly challenge the way commanders are thinking about future conflict. Potential adversaries are further complicating the operating environment through various anti-access/area denial (A2/AD) mechanisms. While many countries are developing such capabilities, this article will focus primarily on the threat of the People’s Republic of China (PRC’s) maritime development. The PRC is rapidly improving its air, surface, and subsurface platform production as it continues its quest for exclusive control of untapped natural resources within the “nine-dash line” region.1 Additionally, the PRC is equipping these platforms with improved weapons that can reach further and cause more damage.2 As a result, the U.S. Navy will assume greater risk when operating in complex A2/AD environments such as the Western Pacific. To mitigate this risk, the U.S. Navy is developing innovative warfighting concepts that leverage technologies and assets available today. The incorporation of unmanned systems into maritime domain operations provides one example where the U.S. Navy is making significant progress. Another example is the inception of a new surface warfighting concept called Distributed Lethality.

In January 2015, Vice Admiral Thomas Rowden (Commander U.S. Naval Surface Forces) and other members of the surface warfare community’s higher leadership formally introduced the opening argument for how the Surface Navy plans to mitigate the A2/AD challenge in an article titled “Distributed Lethality.”3 In this inaugural piece, the authors argue, “Sea control is the necessary precondition for virtually everything else the Navy does, and its provision can no longer be assumed.”4 The “everything else” corresponds to promoting our national interests abroad, deterring aggression, and winning our nation’s wars.5 At its core, Distributed Lethality (DL) is about making a paradigm shift from a defensive mindset towards a more offensive one. To enable DL, the U.S. Navy will increase the destructive capability of its surface forces and employ them in a more distributed fashion across a given theater of operation. 

DL shows promise in executing the initiatives provided in the Chief of Naval Operations’ Design for Maintaining Maritime Superiority in the years to come.6 However, as the U.S. Navy continues to invest in promoting DL, there is a danger that improper fusion of this new operating construct with the foundational principles of war could lead to a suboptimal DL outcome.7 To optimize the combat potential inherent to DLin an A2/AD environment, the Navy must develop and apply the concept of “Autonomous Warfare.” Autonomous Warfare addresses both enabling decentralized, autonomous action at the tactical level through careful command and control (C2) selection at the operational level and further incorporating unmanned systems into the Navy’s maritime operating construct. A flexible C2 structure enabling autonomous action supported by squadrons of unmanned systems optimizes DL and ensures its forces will deliver the effects envisioned by this exciting new concept in the most challenging A2/AD environments. DL advocates put it best in saying that “we will have to become more comfortable with autonomous operations across vast distances.”8 This paper will first examine why DL is an appropriate strategy for countering A2/AD threats before developing the main argument for Autonomous Warfare. This paper concludes by examining how the combined effect of autonomous C2 and aggressive implementation of unmanned systems will achieve the desired results for Autonomous Warfare as it applies to DL, followed by a series of recommendations that will assist with implementing this new idea.

Why Distributed Lethality?

“Naval forces operate forward to shape the security environment, signal U.S. resolve, protect U.S. interests, and promote global prosperity by defending freedom of navigation in the maritime commons.”9 During war, one of the Navy’s principal functions is to gain and maintain sea control to facilitate air and ground operations ashore. An adversary’s ability to execute sea denial makes the endeavor of exercising sea control increasingly challenging.   A key driver behind DL is countering advances in A2/AD capability, a specific sea denial mechanism, which inhibits the Navy’s capacity to operate in a specific maritime area.10

A2/AD is a two-part apparatus. Anti-access attempts to preclude the entrance of naval forces into a particular theater of operation. For example, the threat and/or use of anti-ship cruise and ballistic missiles can hold surface vessels at risk from extended ranges.11 The PRC’s People’s Liberation Army Navy (PLAN) is one of the many navies that deploy various anti-ship cruise missiles (ASCMs), out of a global arsenal of over 100 varieties that can reach nearly 185 miles.12 Of its anti-ship ballistic missiles (ASBMs), the PRC’s renowned “carrier killer” (DF-21D), with a range of 1000 plus miles, is generating cause for concern from an anti-access perspective.13 Additionally, submarines operating undetected throughout a given area of operation (AO) can deter surface forces from entering that area without significant anti-submarine warfare (ASW) capability. On the other hand, area denial seeks to prevent an adversary’s ability to maneuver unimpeded once a vessel has gained access to an area.14 While employment of the aforementioned missiles poses a threat in a combined A2/AD capacity, the PRC’s shipbuilding trend is triggering additional alarms from an area denial perspective. A recent workshop facilitated by the Naval War College’s China Maritime Studies Institute (CMSI) highlighted that the PRC has surged its shipbuilding efforts more than ten times over from 2002 to 2012 and will likely become the “second largest Navy in the world by 2020” if production continues at this pace.15 Indeed, the PRC has generated and continues to produce significant capacity to practice A2/AD and maintains a formidable shipbuilding capability. These observations are just a few amongst a host of many that spark interest in shifting American surface forces toward a DL-focused mindset.

One might ask, “How does DL help mitigate these A2/AD concerns?” Ever since carrier operations proved their might in the Pacific theater during World War II, U.S. naval surface combatants have principally acted in defense of the aircraft carrier. Essentially, the surface force relies predominantly on the firepower wrought by the carrier air wing, while other surface ships remain relatively concentrated around the carrier and defend it against enemy threats from the air, surface, and sub-surface. A well-developed A2/AD operational concept married with a diverse and sophisticated array of systems is advantageous against this model for two reasons: that adversary could hold a limited number of high value units (the carriers) at risk with only a small number of ASBMs, while the imposing navy could only employ a fraction of its offensive capability due to a necessary focus on defensive measures. DL addresses both concerns by deploying progressively lethal “hunter-killer” surface action groups (SAGs – more recently referred to as Adaptive Force Packages) in a distributed fashion across an area of operation (AO). By doing so, the DL navy will provide a more challenging targeting problem while offering the commander additional offensive options.16 DL shifts the focus of the Navy’s offensive arsenal from its limited number of aircraft carriers to the surface navy as a whole.

Potential Shortcomings

DL addresses the challenges of operating in an A2/AD environment by dispersing offensively focused surface combatants across the theater. To be effective, however, the operational commander must assign an appropriate C2 structure for DL forces. The DL operating concept could rapidly dissolve through the development and implementation of complex command and control structures. Furthermore, inadequate use of unmanned systems presents an additional potential shortcoming to the effective application of DL. While the consequences of these shortcomings would not be cause for instantaneous failure, they could create adverse second and third order effects and result in deterioration of the DL concept.

Command and Control

Effective C2 is the cornerstone of the successful execution of any military operation. Service doctrine aids in establishing the proper balance between centralized and decentralized C2. The Naval Doctrine Publication 1 for Naval Warfare defines C2 as “the exercise of authority and direction by a properly designated commander over assigned and attached forces in the accomplishment of the mission.”17 Further, the Joint Publication for C2 and Joint Maritime Operations highlights that a clear understanding of commander’s intent should enable decentralized execution under the auspices of centralized planning.18 Instituting the appropriate C2 structure based on the mission at hand and composition of employed forces helps achieve maximum combat utility while minimizing the need to communicate. This is particularly important when the operational commander has cognizance over a large number of forces and/or when the enemy has degraded or denied the ability to communicate. As the absence of a notional C2 architecture for Adaptive Force Packages (AFPs) at the operational level represents a significant gap in the DL concept, this paper will provide a traditional Composite Warfare Commander (CWC) approach to commanding and controlling AFPs, followed by a potential solution through the lens of Autonomous Warfare.19 The intent is to show that thinking about AFPs as autonomous units will uncover innovative ways to assign C2 functions and responsibilities amongst DL forces.

Unmanned Systems

The proper employment of unmanned systems will prove equally critical in developing the design for Autonomous Warfare as it relates to DL.20 Increasing the offensive capability of smaller groups of warships is one of DL’s main functions (if not the main function). A key enabler to this is the ability to provide ISR-T in a manner that reduces risk to the organic vessels. The concern is that targeting requires the ability to detect, track, and classify enemy vehicles – which oftentimes requires emission of electronic signals that will alert the enemy. Unmanned systems have the ability to provide ISR-T while reducing the risk for organic vessels to reveal their location. Autonomous Warfare will leverage the use of unmanned systems in all three maritime domains (air, surface, and sub-surface). Anything less would unnecessarily limit the potential for delivering maximum offensive firepower while minimizing risk to the organic platforms. Furthermore, critics should note that the U.S. Navy’s adversaries are making similar advances in unmanned systems.21 The bottom line is that underutilization of unmanned systems will be detrimental to DL. The effectiveness of DL as an operational concept depends on the effective employment of unmanned systems.

Providing A Frame of Reference

The following hypothetical situation offers a frame of reference for the remainder of the Autonomous Warfare argument.22 The goal is to show that Autonomous Warfare will optimize DL employment in a scenario where multiple BLUE AFPs must operate in the same AO against multiple RED force SAGs and other RED forces.23

screenshot_12
Figure One: A notional scenario for DL24

The area depicted in Figure 1 represents the AO for the given scenario. Country GREY is an abandoned island and has an airfield that BLUE forces want to capture to facilitate follow-on operations against RED. The Joint Force Maritime Component Commander (JFMCC) receives the task of capturing the airfield. As such, he establishes two objectives for his forces: establish sea control on the eastern side of the island (indicated in yellow) to support an amphibious landing in preparation for seizing the airfield, and establish sea denial on the western side of the island (indicated in orange) to prevent RED from achieving the same.

BLUE’s Order of Battle (OOB) consists of one carrier strike group (CSG), one expeditionary strike group (ESG), and three AFPs. Each AFP is comprised of an ASW capable Littoral Combat Ship (LCS), a Flight III Arleigh Burke-class destroyer, and a Zumwalt-class destroyer. Together, each AFP is capable of the full range of offensive and defensive measures needed to defeat enemy targets in each of the three maritime domains.25 RED’s OOB consists of one CSG, three SAGs, and two diesel-electric submarines. RED has a more difficult targeting problem than if BLUE elected to concentrate its forces, since BLUE distributed them across the AO utilizing multiple AFPs capable of delivering offensive firepower in all three traditional warfare domains. How then should BLUE best establish its C2 structure? Will that C2 structure continue to function while operating under emissions control (EMCON) and in the event RED is able to degrade or deny BLUE communications? What roles should unmanned systems play in optimizing ISR-T while minimizing risk to the organic platforms? By developing and applying the concepts of Autonomous Warfare, BLUE will operate with a C2 construct that enables more autonomous action at the lower levels. Additionally, BLUE will leverage the use of unmanned systems, relieving the stress of ambiguity in a communications denied environment.

A Traditional Approach for Applying the CWC Concept to DL

One could argue that AFPs operating under the DL construct should follow a traditional CWC C2 structure, which provides a counter-argument for the Autonomous Warfare approach. The CWC concept attempts to achieve decentralized execution and is defensively oriented. The composite warfare commanders direct the various units of a task force on a warfare-specific basis.26 By delegating oversight of each warfare area to lower levels, the command structure avoids creating a choke point at the task force commander level (the CWC). This configuration is “structurally sound – if not brilliant” for its inherent capacity to simplify the offensive and defensive aspects of maritime warfare down to each warfare area.27 AFPs employed in the scenario described above would then operate under the cognizance of the different warfare commanders on a warfare-area basis. These AFPs are simply groups of disaggregated forces forming a distributed network that would otherwise maneuver as a concentrated assembly around the carrier.

Figure 2: Traditional CWC Operational C2 Structure for a DL Task Force
Figure 2: Traditional CWC Operational C2 Structure for a DL Task Force

Putting the given scenario into action and using the C2 structure depicted in Figure 2, to what degree are the APFs enabled to achieve the given objectives? BLUE AFPs are stationed as shown in Figure 1 and will attack any RED forces attempting to contest BLUE’s sea control in the yellow box. BLUE also has a continuously operating defensive combat air (DCA) patrol stationed west of the sea denial box to prevent any RED advancements towards island GREY. Just as BLUE forces get into position, RED attempts to form a blockade of the island by sending two SAGs, each escorted by a submarine, around the north and south ends of the island. The first indication of a RED attack comes from a synchronized ASCM salvo from unidentified targets (they were fired from RED’s submarines) followed by radar contact on the RED SAGs from BLUE UAVs providing ISR-T. BLUE’s distributed AFPs, fully enabled by commander’s intent, are capable of self-defense and defeating the RED forces.

Close coordination with the warfare commanders is not required. Each AFP commander understands that in order to maintain sea control to the east, he must dominate in the air, sub-surface, and on the surface. The CWC remains informed as the situation develops and the warfare commanders provide additional guidance for regrouping following the destruction of enemy threats. Thus, a traditional CWC approach to commanding and controlling AFPs provides the opportunity for centralized planning with decentralized execution with respect to DL. Further efforts to decouple the C2 of the AFPs from the task force as a whole could jeopardize unity of effort amidst a complex maritime contingency. AFPs should not be totally self-governing since “uncontrolled decentralized decision-making is just as likely to result in chaos on the battlefield” as no command and control at all.28

An Autonomous Warfare Approach for DL Command and Control

The traditional CWC approach for DL C2 works in this case only because the given scenario is relatively simple. Uncertainty and adversity (often times referred to as fog and friction) are problems that commanders will enduringly have to overcome in wartime. “A commander can no more know the position, condition, strength, and intentions of all enemy units than the scientist can pinpoint the exact location, speed, and direction of movement of subatomic particles.”29 The best he can do is generate an estimate of the situation based on the information available. In the previous scenario, RED’s COA was generic; BLUE should anticipate this type of COA to a degree, relative to RED’s overall plan of attack. Replaying the scenario with two slight yet profound modifications will show that we should not think of the traditional CWC C2 concept as a universal solution. An Autonomous Warfare approach will simplify managing the fog and friction of war from an operational C2 perspective and maximize AFP combat potential.

Assume the forces available and assigned objectives on each side are unchanged. In this case, RED brings to bear more of its A2/AD capabilities, including jamming BLUE’s communications network. Additionally, RED has sufficient ISR capabilities to determine the location and composition of BLUE’s AFPs. As a result, RED concentrates its forces to the north in an attempt to annihilate BLUE’s AFPs in series. The AFP to the north is now overwhelmingly outmatched. Similar to the previous scenario, BLUE’s first indication of a RED attack is a salvo of ASCMs fired from RED’s submarines. As a result, the LCS is damaged to the extent that it provides no warfare utility. Because communications are jammed, the remaining AFP forces cannot communicate with the CWC and his warfare commanders on the carrier to receive guidance on how to proceed. How does the affected AFP protect itself with the loss of its primary ASW platform? Does the traditional C2 structure allow the affected AFP to coordinate directly with the adjacent AFP for re-aggregation? Collectively, the remaining AFPs still offer the commander adequate capability to thwart the RED attack. This is not to say that Autonomous Warfare completely nullifies the principles of the CWC concept. Autonomous Warfare simply optimizes the principles behind the CWC concept for DL.30

The following is an analysis of how an Autonomous Warfare approach to C2 for AFPs optimizes the combat potential that DL offers – especially in an A2/AD environment. A notional Autonomous Warfare DL C2 structure is provided in Figure 3. Each AFP would have an assigned AFP commander and designated alternate. Tactical decision-making would occur at the AFP level. Communications requirements would be drastically reduced. The delegated C2 structure obviates the need for dislocated command and control – AFPs under the auspices of the CSG. Thus, the “search-to-kill decision cycle” is completely self-contained.31 This degree of autonomy avoids the particular disadvantages of centralized command indicated in the previous example. Autonomous Warfare enables the AFP commander to make best use of his available forces based on the tactical situation and in pursuit of the assigned objectives. Furthermore, Autonomous Warfare prioritizes local decision-making founded on training, trust, mission command, and initiative rather than top-down network-centric command and control.32

Figure 3: Autonomous Warfare C2 Structure for a DL Task Force.
Figure 3: Autonomous Warfare C2 Structure for a DL Task Force

There is an additional significant advantage to having a more autonomous C2 structure. Although the operational commander could assign each AFP a geographic area of responsibility, they could combine forces and disagreggate as necessary in the event of a loss or an encounter with concentrated enemy forces. In the second scenario above, two AFPs could coordinate directly with each other to counter the larger enemy compliment. They could avert the challenges and ambiguity of reaching back to the centralized commanders altogether as long as they maintained accountability for their assigned areas of responsibility. In the case where the LCS was eliminated, the AFP commanders should have the autonomy to adapt at the scene to accomplish the objective without seeking approval for a seemingly obvious response to adversity.

Another reason why a more flexible, autonomous C2 structure is imperative for DL forces is that there is no “one-size-fits-all” AFP.33 The operational commander may assign different combinations of platforms based on the assets available and the given objectives. The harsh reality of war is that ships sink. The doctrine in place must allow for rapid adaptation with minimal need to communicate to higher authority. The Current Tactical Orders and Doctrine for U.S. Pacific Fleet (PAC-10) during World War II captures this notion best: “The ultimate aim [of PAC-10 was] to obtain essential uniformity without unacceptable sacrifice of flexibility. It must be possible for forces composed of diverse types, and indoctrinated under different task force commanders, to join at sea on short notice for concerted action against the enemy without interchanging a mass of special instructions.”34

Optimizing DL with Unmanned Systems

The aggressive employment of unmanned systems is the second feature of Autonomous Warfare through which the U.S. Navy should optimize DL. “It is crucial that we have a strategic framework in which unmanned vehicles are not merely pieces of hardware or sensors sent off-board, but actual providers of information feeding a network that enhances situational awareness and facilitates precise force application.”35 While there are many applications for unmanned systems, Autonomous Warfare exploits the information gathering and dissemination aspects to increase the lethality of organic platforms. By enhancing the capacity to provide localized and stealthier ISR-T using unmanned systems, AFPs will assume less risk in doing the same and can focus more on delivering firepower.36 The examples provided below solidify this assertion.

Submarines provide a healthy balance of ISR and offensive capabilities to the operational commander. A submarine’s ability to remain undetected is its foundational characteristic that gives friendly forces the advantage while “complicating the calculus” for the enemy.37 There is a significant tradeoff between stealth and mission accomplishment that occurs when a submarine operates in close proximity to its adversaries or communicates information to off-hull entities. By making use of UUVs, AFPs can still rely on stealthy underwater ISR-T while allowing the organic submarine to focus on delivering ordinance. In the given scenario, a small fleet of UUVs could be stationed west of the island and provide advanced warning of the approaching enemy forces. If traditional manned submarines took on this responsibility, they would likely have to engage on their own as the risk of counter-detection might outweigh the benefits of communicating. AFPs themselves could remain stealthy and focus on efforts to defeat the enemy.

While UUVs provide additional support in the undersea domain, UAVs are potential force multipliers in the DL application for two additional reasons. A cadre of unmanned aircraft could provide valuable ISR-T and line-of-sight (LOS) communications to further enable AFP lethality.38 From an ISR-T perspective, AFPs could deploy UAVs to forward positions along an enemy threat axis to provide indications and warning (I&W) of an advancing enemy target or SAG. Their smaller payloads means they can stay on station longer than manned aircraft, and they eliminate the risk of loss to human life. Additionally, the benefits of providing LOS communications are numerous. LOS communication is particularly advantageous because it eliminates the need to transmit over-the-horizon, which becomes exceedingly risky from a counter-detection perspective as range increases.39 A UAV keeping station at some altitude above the surface could provide LOS communications capability among various vessels within the AFP that are not necessarily within LOS of each other. Further, a UAV at a high enough altitude may afford the opportunity for one AFP to communicate LOS with an adjacent one. The level of autonomy these AFPs can achieve, and therefore lethality, only improves as battlespace awareness becomes more prolific and communication techniques remain stealthy.

actuvdryrunbridge
Featured Image: The prototype of DARPA’s ACTUV, shown here on the day of its christening. (Photo: DARPA)

Just as UUVs and UAVs offer significant advantages to Autonomous Warfare, there is great value in the application for USVs in the surface domain. Take for instance the Defense Advanced Research Projects Agency’s (DARPA) anti-submarine warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV). This stunning new technology has the capability of tracking the quietest diesel-electric submarines for extended periods.40 If this type of vessel was available to provide forward deployed ASW capabilities in the second scenario described above, the likelihood of RED submarines attacking BLUE would have diminished. While this particular USV would operate primarily for ASW purposes, it is completely feasible that the designers could equip the ACTUV with radar capabilities to provide additional ISR against air and surface threats. USVs simply provide an additional opportunity for operational commanders to provide ISR-T to weapons-bearing platforms.

The Combined Effect

The true value intrinsic to Autonomous Warfare stems from the combined effect of an appropriate C2 structure for DL that enables autonomous action and the force multiplier effect the operational commander realizes from unmanned systems. Distributed Lethality has serious potential for raising the status of our surface force as a formidable contender to one of deterrence. In an age where leaders measure warfighting capacity in technological advantage, it is refreshing to see an emerging concept that applies innovative thinking to warfighting techniques with the Navy we have today. A more autonomous C2 structure at the operational level will afford DL forces the flexibility to rapidly deliver offensive measures as contingencies develop. “By integrating unmanned systems in all domains, the U.S. Navy will increase its capability and capacity,” especially with respect to DL.41

Recommendations

It will take both time and effort to achieve an optimized Distributed Lethality construct through Autonomous Warfare. The following recommendations will assist in making this vision a reality:

1. There is risk that by disconnecting the AFPs from the CSG from a C2 perspective, the CSG becomes more vulnerable and unnecessarily sacrifices situational awareness. The Surface Warfare Directorate) N96 and the Distributed Lethality Task Force should further evaluate the tradeoffs associated with implementing a more autonomous C2 structure to DL at the operational level. Additionally, this paper proposes an operational C2 structure for DL. The conclusions derived from this paper should support further development of tactical level C2 for DL.

2. While many of the unmanned systems mentioned above are currently operational or under development, there is limited analysis of how to employ them in a Distributed Lethality environment. OPNAV N99 (Unmanned Warfare Systems), working in conjunction N96 and the DL Task Force, should consider incorporating unmanned systems within the DL concept as outlined above.

3. The U.S. Navy should conduct wargames and real world exercises to both validate the strengths of Autonomous Warfare and identify areas for improvement. Wargames will help refine Autonomous Warfare from a developmental approach. Naval exercises have two benefits: realistic testing provides proof of concept with the same force that will go to war. They also provide the opportunity to practice and inculcate new concepts.

4. Doctrine should begin to foster a culture of Autonomous Warfare throughout the U.S. Navy. The battlefield is becoming more volatile, uncertain, complex, and ambiguous. The more we enable our highly trained and experienced officers to think and act autonomously, the greater combat potential the Navy will realize. Submarines, by nature, operate this way on a continuous basis. Other warfare communities will benefit from having the ability to operate in a more autonomous manner. As Autonomous Warfare represents a paradigm shift from a “connected force” towards a more autonomous one, the U.S. Navy must understand and embrace Autonomous Warfare before implementing it.

Conclusion

Distributed Lethality’s impending contribution to the joint force depends on its ability to maintain flexibility. An autonomous C2 structure allows for localized assessment and force employment, rapid adaptation in the face of adversity, and the ability to combine forces and re-aggregate as the situation dictates. Aggressive employment of autonomous vehicles only enhances these principles. Unmanned systems operating across the maritime domains will provide valuable ISR-T and facilitate localized decision-making, while minimizing risk to the organic platforms. By providing a means of stealthy communication among ships within an AFP or even between adjacent ones, Autonomous Warfare fosters an environment of secure information sharing. Less need to reach back to a command node means that DL forces can spend more time taking the fight to the enemy and less time managing a complicated communications network.

Maritime warfare is a complex process. Characterized by uncertainty and ambiguity, no weapon, platform, or operating concept will eliminate the fog and friction of war. Commanders must mitigate these challenges by setting the conditions necessary for their subordinate leaders to prosper. Commanders at the tactical level earn the trust of their superiors before taking command. We should not compromise that trust by establishing rigid command and control structures that ultimately inhibit the subordinate’s ability to perform as trained. Applying the autonomous approach to C2 for distributed lethality will enable AFPs to operate in accordance with commander’s intent and is in keeping with the initiative to promote Mission Command throughout the U.S. Navy.

LT Coleman Ward is a Submarine Officer who is currently a student at the Naval War College. The preceding is his original work, and should not be construed for the opinions of views of the Department of Defense, the United States Navy, or the Naval War College.

Featured Image: The prototype of DARPA’s ACTUV, shown here on the day of its christening. Image Courtesy DARPA.

1. Timothy Walton and Bryan McGrath, “China’s Surface Fleet Trajectory: Implications for the U.S. Navy,” in China Maritime Study No. 11: China’s Near Seas Combat Capabilities, ed. Peter Dutton, Andrew Erickson, and Ryan Martinson, (U.S. Naval War College: China Maritime Studies Institute, February 2014), 119-121, accessed May 5, 2016, https://www.usnwc.edu/Research—Gaming/China-Maritime-Studies-Institute/Publications/documents/Web-CMS11-(1)-(1).aspx.; Peng Guangqian, Major General, People’s Liberation Army (Ret.), “China’s Maritime Rights and Interests,” in China Maritime Study No. 7: Military Activities in the EEZ, ed. Peter Dutton, (U.S. Naval War College: China Maritime Studies Institute, December 2010), 15-17, accessed May 12, 2106, https://www.usnwc.edu/Research—Gaming/China-Maritime-Studies-Institute/Publications/documents/China-Maritime-Study-7_Military-Activities-in-the-.pdf.

2. Walton and McGrath, “China’s Surface Fleet Trajectory: Implications for the U.S. Navy,” 119-121.

3. Thomas Rowden, Peter Gumataotao, and Peter Fanta, “Distributed Lethality,” U.S. Naval Institute, Proceedings Magazine 141, no. 1 (January 2015): 343, accessed March 11, 2016, http://www.usni.org/magazines/proceedings/2015-01/distributed-lethality.

4. Rowden et. al. “Distributed Lethality.”

5. James Bradford, America, Sea Power, and the World (West Sussex, UK: John Wiley and Sons, 2016), 339.

6. John Richardson, Admiral, Chief of Naval Operations, A Design for Maintaining Maritime Superiority (Washington, D.C.: Government Printing Office, January 2016), 6.

7. Matthew Hipple, “Distributed Lethality: Old Opportunities for New Operations,” Center for International Maritime Security, last modified February 23, 2016, accessed May 12, 2016, https://cimsec.org/distributed-lethality-old-opportunities-for-new-operations/22292.

8. Thomas Rowden et. al., “Distributed Lethality.”

9. U.S. Navy, U.S. Marine Corps, U.S. Coast Guard, A Cooperative Strategy for 21st Century Seapower (Washington, D.C.: Headquarters U.S. Navy, Marine Corps, and Coast Guard, March 2015), 9.

10. Thomas Rowden et. al, Distributed Lethality.

11. United States Navy, Naval Operations Concept 2010 (NOC): Implementing the Maritime Strategy (Washington D.C.: Government Printing Office, 2010), 54-55.

12. United States General Accounting Office, Comprehensive Strategy Needed to Improve Ship Cruise Missile Defense, GAO/NSIAD-00-149 (Washington, DC: General Accounting Office, July 2000), p. 5, accessed April 14, 2016, http://www.gao.gov/assets/230/229270.pdf.

13. Andrew Erickson and David Yang, “Using the Land to Control the Sea?,” Naval War College Review 62, no. 4, (Autumn 2009), 54.

14. United States Navy, Naval Operations Concept 2010: Implementing the Maritime Strategy, 54-56.

15. Andrew S. Erickson, Personal summary of discussion at “China’s Naval Shipbuilding: Progress and Challenges,” conference held by China Maritime Studies Institute at U.S. Naval War College, Newport, RI, 19-20 May 2015, accessed April 25, 2016, http://www.andrewerickson.com/2015/11/chinas-naval-shipbuilding-progress-and-challenges-cmsi-conference-event-write-up-summary-of-discussion/.

16. Thomas Rowden et. al., “Distributed Lethality.”

17. United States Navy. Naval Doctrine Publication (NDP) 1: Naval Warfare (Government Printing Office: Washington, D.C. March 2010), 35.

18. This is also referred to as “Mission Command” or “Command by Negation;” U.S. Office of the Chairman, Joint Chiefs of Staff, Joint Publication (JP) 3-32, Command and Control for Joint Maritime Operations (Washington D.C.: CJCS, August 7, 2013), I-2.

19. The Naval War College’s Gravely Group recently conducted a series of three DL Workshops with representation from offices across the Navy and interagency. One of the key findings was that “AFP SAG C2 architecture requires further development in view of information degraded or denied environments.” This paper proposes a notional operational level C2 structure – tactical level C2 is addressed in the recommendations section; William Bundy and Walter Bonilla. Distributed Lethality Concept Development Workshops I – III Executive Report. (U.S. Naval War College: The Gravely Group, December 29, 2015), 9.

20. This paper considers three types of maritime unmanned systems currently employed or under development: Unmanned Aerial Vehicles (UAVs), Unmanned Underwater Vehicles (UUVs), and Unmanned Surface Vessels (USVs).

21. See the below article featuring a newly developed Chinese drone similar to the U.S.’s Predator drone currently employed for operations in the Middle East; Kyle Mizokami, “For the First Time, Chinese UAVs are Flying and Fighting in the Middle East,” Popular Mechanics, last modified December 22, 2015, accessed May 10, 2016, http://www.popularmechanics.com/military/weapons/news/a18677/chinese-drones-are-flying-and-fighting-in-the-middle-east/.

22. This scenario does not represent a universal application for DL.

23. The Rowden “Distributed Lethality”article provides its own “Hunter-Killer Hypothetical” situation while supporting its main argument. However, the scenario is basic and does not afford the opportunity to explore how AFP C2 and unmanned systems would function in a complex maritime contingency.

24. Google Maps, “South Atlantic Ocean” map (and various others), Google (2016), accessed April 14, 2016, https://www.google.com/maps/@-50.3504488,-53.6341245,2775046m/data=!3m1!1e3?hl=en.

25. This is the same AFP force composition suggested in the Rowden Distributed Lethality article “Hunter-Killer Hypothetical” situation; Thomas Rowden et. al., “Distributed Lethality.”

26. For a full explanation of the CWC concept and roles and responsibilities of CWC warfare commanders, see: United States Navy, Navy Warfare Publication (NWP) 3-56: Composite Warfare Doctrine (Washington, D.C.: Government Printing Office, September 2010).

27. Larry LeGree, “Will Judgement be a Casualty of NCW?,” U.S. Naval Institute, Proceedings Magazine 130, no. 10 (October 2004): 220, accessed April 14, 2016, http://www.usni.org/magazines/proceedings/2004-10/will-judgment-be-casualty-ncw.

28. CNO’s Strategic Studies Group (XXII), Coherent Adaptive Force: Ensuring Sea Supremacy for SEA POWER 21, January 2004.

29. Michael Palmer, Command at Sea (Cambridge: Harvard University Press, 2005), 319.

30. Jimmy Drennan, “Distributed Lethality’s C2 Sea Change,” Center for International Maritime Security, last modified July 10, 2015, accessed April 14, 2016, https://cimsec.org/?s=Distributed+lethality+c2+sea+change.

31. Jeffrey Kline, “A Tactical Doctrine for Distributed Lethality,” Center for International Maritime Security, last modified February 22, 2016, accessed March 17, 2016, https://cimsec.org/tactical-doctrine-distributed-lethality/22286.

32. Palmer, Command at Sea, 322.

33. Jeffrey Kline, “A Tactical Doctrine for Distributed Lethality.”

34. Commander-in-Chief, U.S. Pacific Fleet, Current Tactical Orders and Doctrine, U.S. Pacific Fleet (PAC10), U.S. Navy, Pacific Fleet, June 1943, pg. v, section 111.

35. Paul Siegrist, “An Undersea ‘Killer App’,” U.S. Naval Institute: Proceedings Magazine 138, no. 7, (July 2012): 313, accessed April 30, 2016, http://www.usni.org/magazines/proceedings/2012-07/undersea-killer-app.

36. Thomas Rowden et. al., “Distributed Lethality.”

37. Ibid.

38. Robert Rubel, “Pigeon Holes or Paradigm Shift: How the Navy Can Get the Most of its Unmanned Vehicles,” U.S. Naval Institute News, last modified February 5, 2013, https://news.usni.org/2012/07/25/pigeon-holes-or-paradigm-shift-how-navy-can-get-most-its-unmanned-vehicles.

39. Jonathan Soloman, “Maritime Deception and Concealment: Concepts for Defeating Wide-Area Oceanic Surveillance-Reconnaissance-Strike Networks,” Naval War College Review 66, no. 4 (Autumn 2013): 89.

40. Scott Littlefield, “Anti-Submarine Warfare (ASW) Continuous Trail Unmanned Vessel (ACTUV),” Defense Advanced Research Projects Agency, accessed April 30, 2016, http://www.darpa.mil/program/anti-submarine-warfare-continuous-trail-unmanned-vessel.

41. Robert Girrier, Rear Admiral, Director, Unmanned Warfare Systems (OPNAV N99), “Unmanned Warfare Systems,” Lecture at U.S. Naval War College, May 11, 2016.

Featured Image: PHILIPPINE SEA (Oct. 4, 2016) The forward-deployed Arleigh Burke-class guided-missile destroyer USS McCampbell (DDG 85) patrols the waters while in the Philippine Sea. McCampbell is on patrol with Carrier Strike Group Five (CSG 5) in the Philippine Sea supporting security and stability in the Indo-Asia-Pacific region. (U.S. Navy photo by Petty Officer 2nd Class Christian Senyk/Released)

Moving Forward: Evolution of the Maritime Operations Center

The following article originally featured on MOC Warfighter and is republished with permission. Read it in its original form here

By William Lawler, CAPT USN and Jonathan Will, CAPT USN (Ret.)

After WWII, the U.S. Navy’s ability to plan and execute at the operational level of war (OLW), which links tactical actions with strategic objectives, progressively diminished. Following 9/11, Navy senior leadership recognized this shortcoming and introduced a new concept, the Maritime Operations Center (MOC), to address it. In 2005, the CNO, VCNO and major fleet commanders committed to the reinvigoration of U.S. Navy operational-level execution by spreading the MOC concept throughout the fleet. This article traces the development of the MOC, recognizes that the Navy has markedly improved its ability to effectively plan and execute at the OLW, and makes recommendations for moving forward.

Why MOC?

The MOC concept was born out of difficulties experienced by the Navy in operational planning, command and control (C2), and Service interoperability when it took part in joint operations in Grenada (1983), Panama (1989), and Operation Desert Storm (1991). While the Navy made significant contributions to these operations as a force provider, it was generally perceived that Navy personnel lacked the expertise and capacity required to plan and command campaigns and major operations. In short, the Navy had lost its ability to plan and execute at the OLW.

After 9/11, ADM Clark and subsequent Chiefs of Naval Operations (CNOs) recognized the need to enhance the planning and C2 capabilities of Navy OLW staffs. The result was a CNO vision to establish networked commands with MOCs that would employ common doctrine, standardized processes, educated and trained personnel, and common C4I systems. These strengths would enable them to operate with diverse partners (joint, interagency, coalition, or combined) across the range of military operations. The MOC concept was first used in 2002 by the U.S. Second Fleet during Fleet Battle Experiment Juliet (FBE-J) in ExerciseMillennium Challenge 02, using a draft tactical memorandum (TACMEMO) as the basis. The MOC concept and TACMEMO were further developed the following year in FBE-K. Over the next few years, six additional fleets stood up as MOCs: Third, Fifth, Sixth, and Seventh Fleets, U.S. Fleet Forces, and Pacific Fleet.

The CNO directed USFF to establish a flag-level governing board to provide oversight, focus and recommendations for improving Navy ability at the OLW. The challenge was that planning and C2 concepts were understood only by a small number of naval officers. In response to CNO guidance and fleet commander requests, the Naval War College (NWC) took several steps to assist with implementing the CNO’s MOC vision to include instituting flag officer courses: a Joint Force Maritime Component Commander (JFMCC) Course in 2005 and a Combined Force Maritime Component Commander (CFMCC) Course in 2006. Also in 2006, in response to CNO guidance and a Secretary of Defense requirement that combatant commanders certify their joint headquarters and subordinate component commands, the NWC initiated the Assist and Assess Team (AAT) and the Maritime Staff Operators Course (MSOC). The AAT was to support fleet operational commanders and share lessons learned and effective practices, and MSOC was to educate officer and senior enlisted personnel en route MOC billets. In 2007, the President of the NWC formally established the College of Operational and Strategic Leadership (COSL), in part, to focus NWC efforts as an advocate for developing the Navy’s OLW expertise. Additionally during this time, NWC doubled the throughput of active duty planners at the Naval Operational Planners Course (later expanded to the Maritime Advanced Warfighting School) and lengthened the intermediate curriculum at the war college by four weeks to enable greater depth of study in Joint Military Operations.

During this time, the draft TACMEMOs that were used during earlier Fleet Battle Experiments as the foundation for the MOC construct and MOC processes developed further and became doctrinal publications: Joint Publication (JP) 3-32,Command and Control for Joint Maritime Operations (2006); Navy Warfare Publication (NWP) 5-01, Navy Planning (2007); NWP 3-32, Maritime Operations at the Operational Level of War (2008); and Navy Tactics, Techniques and Procedures (NTTP) 3-32.1, Maritime Operations Center (2008).

In 2008, the CNO formalized a requirement for Maritime Headquarters Training and Accreditation in OPNAVINST 3500.40, and U.S. Fleet Forces Command (USFF) established a team to support that effort. After an initial round of fleet “MOC accreditation” was completed by the end of 2009, the CNO eliminated the requirement for MOC accreditation, and in 2012 instituted an OLW education and training continuum in OPNAVINST 3500.40A. This instruction: (1) designated Commander, USFF as responsible for manning, training, and equipping all MOCs, (2) designated President, NWC as responsible for MOC education of flag officers, officers, and senior enlisted personnel, and (3) tasked USFF and NWC to collaborate to form a Navy MOC Training Team (MOC-TT) to support MOCs during operations and exercises and disseminate effective practices to facilitate mission accomplishment and advance commonality.

Since the introduction of the MOC concept, two additional fleets with MOCs were established: U.S. Fourth Fleet (C4F)/U.S. Naval Forces Southern Command in 2008, and U.S. Tenth Fleet (C10F)/U.S. Fleet Cyber Command in 2010. U.S. Second Fleet and its MOC were disestablished in 2011 as part of a Navy reorganization, being subsumed into U.S. Fleet Forces Command.

MOCs in Practice: Then and Now

Fleet staffs have evolved considerably under the MOC construct over the past six years. Out of necessity, they started with an internal focus on people, processes and organization, but now they have progressively matured their MOCs to include more habitual external linkages, while facing more complex challenges due to the changing environment.

MOCs from 2007-2009

Early efforts to implement the MOC concept focused on breaking down the “stove pipes” inherent in the existing Napoleonic “N-code” organizational structure of the fleets and replacing them with the more agile, efficient, and cross-functional MOC construct. Across the fleets there existed a wide range of roles and missions the MOCs had to support, from theater security cooperation, to crisis response, to defense support to civil authorizes, to supporting full-scale contingency operations. Fleet commanders thus aligned their MOC organizations and processes to support their respective combatant commander’s missions while taking into consideration the requirements unique to each geographic area of responsibility (AOR). Additionally, commanders shaped their MOCs to support event horizons and decision cycles specific to their fleet, and ensured that their MOCs would allow them to act as JFMCCs, Navy component commanders (NCCs) or joint task force (JTF) commanders.

During early MOC implementation, fleet staffs focused mainly on revamping their organizational structures and processes. While some fleets implemented change more rapidly than others, by 2009 established fleets had implemented joint-based boards, bureaus, centers, cells and working groups (B2C2WGs) either alongside or in lieu of traditional N-codes, and had established the initial functionality of the core activities of current operations (COPS), future operations (FOPS), and future plans center (FPC). Implementation of an assessment function varied widely across the fleets. Each fleet also established a battle rhythm designed to synchronize the activities of the staff and assist the commander’s decision cycle. However, some fleets were not synchronizing their B2C2WGs with those of higher headquarters (HHQ) unless operational necessity forced the linkage.

Early MOC information management/knowledge management (IM/KM) efforts primarily focused on establishing common collaborative tools for use in each AOR. For example, some fleets used Defense Connect On-Line (DCO) because their HHQ did, while others used video teleconferences and/or transitioned to voice over secure internet protocol (VOSIP) to conduct meetings with HHQ, components and subordinates. Additionally, early in the MOC development process fleet staffs appeared to place more emphasis on their internal KM efforts, sometimes at the expense of improving their ability to collaborate with their subordinates via tools like Collaboration at Sea (CAS) portals. Emphasis on establishing initial battle rhythms and B2C2WG applications was generally internal, limiting rapid integration with HHQ and peer components during crisis transition.

As MOCs were developing their organizational structures, internal processes, and IM/KM tools, there was also a strong effort to enhance planning capacity. The infusion of pre-assignment education for fleet staffs bolstered planning capability and enabled fleets to establish common procedures and introduce the concept of planning time horizons (far, mid, and near). However, fleets struggled with the ability to manage and synchronize multiple planning teams, often failing to fully include subordinate task forces in planning, and had difficulty proactively providing supporting plans that had been coordinated with peer components to HHQ.

While interaction between the MOCs was mostly limited to specific initiatives including maritime domain awareness (MDA), MOCs demonstrated the ability to collaborate during some routine operations (e.g., C5F counter-piracy operations), exercises, and the response to the Haiti earthquake (C4F with support from C2F and USFF). However, there was still significant room for improvement with respect to improving the ability of MOCs to synchronize and integrate their activities.

By 2009 there was widespread concurrence at the fleet commander level that the MOC construct yielded several benefits when compared to the traditional Napoleonic staff construct as depicted in Figure 1.

fireshot-capture-117-moc-warfighter-articl_-https___www-usnwc-edu_mocwarfighter_article_m-aspx

While the MOC concept was deemed to have several advantages over the traditional N-code organizational structure, observers noted that common problems existed across the fleets that needed to be addressed including forming and transitioning the staff, assessment, and IM/KM.

MOCs from 2010-2012

MOCs continued to evolve during this period with the addition of one new fleet staff, the functionally oriented C10F (cyberspace, space, cryptologic and information operations), while USFF and its MOC subsumed C2F. Years of experience implementing the MOC construct resulted in MOCs that were able to conduct crisis response planning and cross-AOR drills, support joint exercises, and plan and command real-world operations such as Operations Odyssey Dawn(C6F with support from C5F and C2F) and Tomadachi (CPF and C7F with support from C3F). As one fleet flag officer observed, “The global stressors for MOCs included simultaneous events that spanned multiple AORs and stressed OLW commanders in planning and responding to changing events and missions.” The diverse nature of fleet responses to these events evidenced the fact that MOCs had truly become tailorable, flexible, and scalable organizations while still maintaining a degree of commonality.

An important area of growth during this period was the enhancement of relationships among MOC principals, lead planners, and key action officers and their counterparts at HHQ, other components and fleets, and subordinate task forces. Historically, flag and general officers have made it a priority to establish working relationships with their counterparts. As the MOCs evolved, there was an increased recognition that efficiency and effectiveness could be enhanced if other key staff members established routine working relationships external to the MOC. As a result, fleet staffs became better postured to rapidly and accurately feed information into the commander’s decision making cycle and help their commanders manage the operations process (plan, prepare, execute, and assess).

The capacity and ability of fleet MOCs to utilize the Navy Planning Process also increased during this timeframe. Although many of the Marines assigned to Fleet MOCs still provide critical planning expertise, no longer is the fleet commander required to rely heavily on the Fleet Marine Officer to lead all critical planning. The Navy continues to produce capable planners resulting in more detailed plans and an improved alignment with HHQ and subordinate staffs. However, while staff planning capability has improved, certain negative trends warrant scrutiny. Many observers agree that MOCs need to generate more thorough maritime supporting plans to combatant commander plans, connect fleet planning more closely with subordinate task forces, and better leverage the use of supported-supporting relationships. This has been recognized by the fleets and is driving a requirement for more planning capacity. Additionally, fleets recognize the necessity to synchronize simultaneous planning efforts across the three event horizons to help better align and conserve manpower. Staffs better understand the need to build maritime products such as maritime supporting plans, OPGENs, OPTASKs, and DIMs that better support and complement joint products such as OPLANs, OPORDs, and FRAGORDs.

Although still not standardized, IM/KM tools and processes have become more common across the fleets. Much recent effort has focused on better nesting MOC battle rhythms with HHQ and subordinates. The result has been a greater ability to rapidly connect and synchronize with key external commands at the outset of a crisis.

Fleets are now building greater detail into their manpower documents, transitioning from a basic manning document with a pool of augmentees, to more specific fleet/joint manning documents that focus on distinct roles of the commander, missions, and forward command element considerations. Manning documents now identify the required rank and skill set for each billet, thus enhancing the staff’s ability to more rapidly and effectively gain additional capacity through reach-back and/or augmentation.

Addressing Common MOC Challenges

Although the Navy has made great strides in its ability to plan and execute at the OLW, observers routinely see four areas of improvement needed across the MOCs as seen in Figure 2.

fireshot-capture-118-moc-warfighter-articl_-https___www-usnwc-edu_mocwarfighter_article_m-aspx

Crisis transition, shifting within the MOC from routine to crisis operation mode, has always been challenging, but becomes even more difficult if staffs do not train in a realistic operational environment. Most MOC staffs have built basic transition plans based on applicable manpower documents, MOC processes, procedures and organization. However, the challenges of shifting MOC staff from routine operations and facilities is increasingly complex; fleet commanders are faced with supporting a wide range of joint and Service roles while the environment drives an increasing demand for reach-back support from other MOCs and supporting agencies. Continuing refinement of SOPs and doctrine, and practicing crisis transition in more robust environments that stress staff sustainment should pay big dividends. Unfortunately, exercises often do not allow OLW commanders to validate staff sustainment and production capability during crisis transition due to their short duration, lack of depth, or single-phase focus of the exercise.

Planning Capacity and Management

While planning capability has improved across the fleets, there is still not enough planning capacity because of ever-increasing requirements (e.g., maritime supporting plans) for planning expertise. Additionally, staffs continue to struggle with the requirement to manage multiple plans that span different time horizons (near, mid, and far). Staffs must continue to become more proactive and disciplined in assigning planning efforts to limited staff planning resources based on event horizons and continue to improve their internal transition processes from future plans to future operations to current operations. Too frequently staffs have reacted to events and not kept their planning horizons sufficiently stretched into the future.

Fires and Targeting Processes and Capabilities

At the outset of planning, fires must be designed to support the commander’s objectives, intent, and guidance, and should provide options designed to achieve lethal and non-lethal effects. During planning, fleet staffs must develop a fires concept from the JFMCC perspective and lobby for its integration into the overall joint concept. Crafting a well-defined concept of fires is especially vital during operations where the JFMCC is the supported commander and must take lead for the prioritization of joint fires.

A common mistake is to lump fires and targeting together as if they were the same thing. Fires is the use of weapons systems to create specific lethal or nonlethal effects on a target and is essentially an art. Targeting is a science – the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities. The ultimate purpose is to achieve an effect – a change to the physical or behavioral state of system that results from an action, set of actions, or another effect – that contributes to the commander’s objectives and end state.

Fires and targeting training at the OLW is often individually focused, and fires elements/cells frequently do not train together on the systems they will use during actual mission execution. This man-train-equip disconnect is exacerbated when MOCs transition from routine to crisis operations. At this time, fires activities normally shift from a maritime targeting focus to influencing the deliberate joint fires processes for maritime objectives which support the broader joint objectives. This requires the activation and augmentation of the naval and amphibious liaison element (NALE) at the air and space operations center (AOC). The NALE usually trains separately from the MOC and lacks established working relationships with MOC personnel, further limiting effective interaction between the NALE and the fires element/cell. Current exercises do not fill the gap between training and execution because they rarely stress the transition from target planning to fires execution to relevant combat assessment.

At the OLW, fires and targeting are often executed as if they were stand-alone operational functions or processes. As a result, staffs struggle with synchronizing all of the other operational functions (C2, movement and maneuver, protection, intelligence, and sustainment) of the command while at the same time delivering integrated fires in real-world operations.

Finally, across the fleets the established targeting processes remain largely reactive to the joint force air component commander (JFACC) air tasking order (ATO) cycle. There is usable doctrine for the joint targeting process, but no doctrine that truly integrates planning for kinetic and non-kinetic effects, including information operations and cyberspace operations. Moving forward, maritime components need to rely less on being a “force provider” to the JFACC ATO cycle, and should strive to work toward more common JFMCC targeting and fires processes that align with the JTF staff, while including wider integration of kinetic and non-kinetic effects.

Information Operations/Cyberspace Operations Integration

All MOCs would benefit from enhancing their ability to integrate information-related capabilities (IRCs), to include cyberspace operations, into planning, preparation and execution. Staffs would be well served to implement processes whereby IO working groups engage in every aspect of the Navy Planning Process, thinking through if, when, and how IRCs can be employed to accomplish the commander’s objectives as well as how the use of IRCs can be integrated into the concept of fires. Such integration will likely involve discussions concerning authorities, ROE, and C2, and require working with C10F supporting elements. Opportunities and challenges associated with information and cyberspace operations integration will have a significant impact on MOC development in the foreseeable future.

Conclusion

MOCs across the fleet have made substantial progress over the past six years, both in their internal processes and organization as well as their ability to support external requirements. However, the increasingly dynamic operational environment will continue to drive naval component and fleet commanders to aggressively pursue all opportunities to best support joint force commanders.

In the near term, maritime OLW commanders must consider new C2 constructs designed to enhance their ability to communicate vertically and horizontally and to accomplish the assigned mission. Moving forward, given anticipated fiscal constraints, MOCs will need to work together to address the common challenges outlined above and in so doing contribute to the next evolutionary phase in the Navy’s ability to plan, prepare, execute, and assess at the OLW.

Captain Lawler is the Deputy Director of Operational-Level Programs, and Professor. Will is the Deputy Director of the Assist and Assess Team, both of which are part of the College of Operational and Strategic Leadership at the Naval War College, Newport, RI.

Featured Image: YOKOSUKA, Japan (Oct. 3, 2016) Capt. Carroll Bannister, the U.S. 7th Fleet Maritime Operations Center, director, right, give a tour of the MOC to Adm. Tomohisa Takei, Chief of Maritime Staff, Japan Maritime Self-Defense Force and Vice Adm. Joseph Aucoin, commander, U.S. 7th Fleet. (Navy photo by Petty Officer 2nd Class Jason Kofonow/Released)