Category Archives: Capability Analysis

Analyzing Specific Naval and Maritime Platforms

Don’t Neglect the Human Factor in Littoral Combat

The following article originally appeared by The National Interest and is republished with the author’s permission. It may be read in its original form here

By James Holmes

A new article from Wayne Hughes is a treat for anyone in naval geekdom. Captain Hughes literally wrote the book on U.S. Navy fleet tactics and coastal combat; I still schlep around my dog-eared copy of Fleet Tactics from my midshipman days in the 1980s. It keeps good company with tracts from Clausewitz, Corbett and the boys.

But last month over at USNI Blog, Hughes and a brace of Naval Postgraduate School colleagues proposed the concept of “mesh networks.” It refers to a dispersed yet networked ships, planes, weapons, and sensors that are able to seize the initiative from regional adversaries, maneuver in both physical and cyberspace, and prevail in near-shore combat. The whole thing is worth a read.

It’s a compelling read in many respects. Hughes and his coauthors accentuate how complex and menacing offshore waters and skies can be. For instance, we tend to evaluate weapons in large part by their firing range. Outrange a foe and you acquire a significant tactical edge. Similar to boxing, in sea fights, the pugilist with greatest range can wallop his opponent before he has the chance to strike back. The perpetrator inflicts damage without absorbing any himself.

But range is mainly an asset for open-ocean battle. The open sea resembles a vast, featureless plain; weapons can reach their full potential there. Ships and planes can pound away from their maximum firing ranges. Littoral combat, by contrast, compacts the distances at which battle takes place. You have to get close to shore to strike inland, land troops, or blockade enemy harbors.

To continue the boxing analogy, it is similar to forcing boxers to fight in the clinch rather than dancing around the ring. The fight transpires within weapons range of an enemy who’s fighting on his own ground, with all of his manpower and armaments close to hand. Compressing the theater, then, attenuates any range advantage U.S. forces may enjoy, or nullifies it altogether.

And if that’s not bad enough, inshore combat constricts the time available to defend against incoming rounds. Dexterity is essential when forced to cope with myriad challenges. Scattering and moving sensors and “shooters” around the theater constitutes one way to confound foes—provided U.S. forces can still mass firepower at the decisive place on the map at the decisive time. Hence the concept of nimble, “networked” forces. Despite the concept’s virtues, it feels incomplete and abstract, possibly even otherworldly.

That’s because it slights the human dimension of sea combat—a hazardous thing to do when contemplating how to wage war, an intensely human enterprise. My advice is to look not to a U.S. Navy admiral but to a U.S. Air Force colonel for insight into how to prosecute littoral combat. Let’s keep the human in human competition—enriching mesh-network tactics.

The coauthors make the late Vice Admiral Arthur Cebrowski’s model of decision-making their own, using it to explore the potential of offshore networks. Cebrowski describes tactics as a three-phase cycle. Sensing represents the first phase. Combatants gather and exchange data about their surroundings. They next decide what arms and tactics to deploy within those surroundings. And then they act on the decision, with the aim of getting off the first effective shot. Sense, decide, act. It makes sense on the surface, but the trouble is that this approach is too mechanical. It makes little allowance for the messiness that is human interaction in a competitive environment.

Cebrowski implies that in combat you can plug data into an algorithm, churn out an answer, and do what the algorithm says. Colonel John Boyd, a fighter pilot and self-made strategist, interjects a fourth element into the decision cycle. The tactical surroundings, says Boyd, are constantly in flux. It’s not enough to collect information about the setting. It’s about orienting oneself to the setting before making a decision and acting.

For Boyd, then, the cycle goes observe, orient, decide, act—OODA. Fail to orient to the surroundings and you are disoriented, estranged from the reality around you. Losing touch with reality represents a dangerous situation at the best of times—but especially in combat. The victor, oftentimes, is the combatant best in tune with the situation. So orienting is important.

How do you do it? It’s a process of assimilating and analyzing new information that comes in from sensors and other sources. Sounds like Cebrowski’s decide function. But Boyd also maintains that past experience shapes how combatants adapt to their surroundings. So do cultural traditions. So does “genetic heritage.” Boyd even factors in the biological basis of human cognition.

The fighter pilot thus incorporates not-strictly-rational components of human decision-making into his paradigm for tactics and strategy, adding texture to the model. Thinkers from Machiavelli to Taleb warn that people are hardwired to think in linear terms, projecting the past into the future in a straight line. Past trends constitute the best guide to future events.

Yet straight-line thinking impedes efforts to cope with the opponent—a living, determined contestant with every incentive to deflect competition onto nonlinear, unpredictable pathways. Culture likewise channels efforts to process new data in certain directions. Bewilderment greets unfamiliar information all too often—further slowing down adaptation.

Nor is orientation some incidental or throwaway element of the decision cycle. Boyd portrays it as the one element to rule them all: “The second O, orientation—as the repository of our genetic heritage, cultural tradition, and previous experiences—is the most important part of the O-O-D-A loop since it shapes the way we observe, the way we decide, the way we act.”

There’s a corollary to Boyd’s decision-making taxonomy. Pit two antagonists against each other, both of which are struggling to observe, orient, decide, and act effectively. Orienting swiftly and accurately is a defensive endeavor. But if there’s an orient function whereby each antagonist tries to stay abreast of change, there must also be an offensive, disorient function to the OODA cycle.

And indeed, Boyd beseeches savvy contestants to spring “fast transients” on their adversaries, seizing control of the environment. Sudden, swift, radical maneuvers befuddle the adversary. Repeated maneuvers cut him off from the tactical or strategic environment altogether, making him easy pickings. Boyd famously defeated every mock adversary he encountered during air-combat training within forty seconds. He ascribed his unbeaten record to fast—unforeseeable—transients.

All models simplify; that’s true in all fields of inquiry. We assume perfect competition in economics, exaggerating economic actors’ rationality for the sake of simplicity. We assume laminar flow in fluid dynamics, disregarding turbulence within the fluid and between the fluid and the pipe wall. And we assume frictionless machinery to illustrate physics and engineering principles.

And this is all to the good—provided economists and physicists disregard only secondary factors for the sake of explaining fundamental concepts, and provided they take account of these factors when they devise economic policies, piping systems, and engines for real-world use. Disregarding a primary factor could invalidate the model altogether. Cebrowski takes the orient function—the most important function—out of the decision cycle. Doing so abstracts any model founded on his theory from reality.

As a legendary pugilist once said, any scheme for human competition and conflict that neglects interaction has dim prospects for success. I urge the Naval Postgraduate School team to reject Cebrowski’s paradigm, and eliminate that fallacy from their worthwhile project. Wargames premised on Boyd’s more realistic decision cycle will yield more meaningful insight into how coastal combat may unfold, and that will bolster U.S. Navy performance.

Naval warfare is an intensely human enterprise, rife with dark passions, chance, and uncertainty. It’s disorderly and erratic, operating by its own topsy-turvy logic. Not for nothing does John Boyd insist that people, ideas, and hardware—in that order—constitute the crucial determinants of victory and defeat. Prioritizing people represents the starting point for wisdom.

James Holmes is Professor of Strategy at the Naval War College and coauthor of Red Star over the Pacific. The views voiced here are his alone.

Featured Image: USS Fort Worth (LCS-3) enters Apra Harbor for a port visit on U.S. Naval Base Guam on Dec. 11, 2014. (U.S. Navy photo by Leah Eclavea)

The Strategic Role of Tactical Maritime Aerostats in Ensuring Persistent Surveillance

By Matt McNiel

Increasing geopolitical tensions in the South China Sea have created a strategic impetus for the United States and its regional allies to reassess what, how, where, and when a real or perceived threat becomes imminent to strategic interests in this region of the world. Now more than ever, persistent situational awareness is critical. However, unlike traditional landlocked conflict zones, the South China Sea presents a unique challenge as ISR must be successful in multi-modal environments including air, land, and maritime environments.

Adding to that complexity is the presence of largely populated areas in multiple countries proximate to the conflict zone, making it difficult to select one tool or method to create an effective operational ‘big picture’ for decision makers. In recent media reports, it was widely reported that regional states such as the Philippines, Singapore, Vietnam, Taiwan, Japan, and Korea, are actively increasing their proactive vigilance. Wisely, they are also considering an all-of-the-above approach for their defenses for  ensuring full situational awareness with optimized intelligence, surveillance, and reconnaissance (ISR) for land, air, and sea domains.  

Even with modern advancements in ISR technologies, there is simply no one solution that can persistently provide all of the intelligence needed. However, one of the most effective, efficient, and fast-to-deploy solutions to help critical decision makers get the information they require is the lighter-than-air Tactical Maritime Aerostat. These battle-tested systems are loaded with the latest ISR technology that can be used to monitor and gather intelligence from a highly reliable platform hovering over strategic points and providing an “eye in the sky” for concerned governments.

TCOM 17M at San Diego Naval Base. (Image courtesy of TCOM LP)
TCOM 17M at San Diego Naval Base. (Image courtesy of TCOM LP)

Aerostat Attributes and Advantages

Aerostats offer persistent surveillance solutions that have unique advantages over traditional ground-based radar and onboard surveillance systems. For example, when naval vessels are moored or transiting port waters, they are subject to unique surveillance and security challenges. Threats such as small, fast moving boats are not easily detectable using traditional ship-mounted cameras or ground-based radar. Conversely, aerostat systems act as a “virtual fence” along coastlines, around vessels, or the port perimeter by providing continuous, real-time monitoring of activities from an aerial perspective. The system can detect threats at greater range and in the blind spots of traditional surface based sensors, providing security forces with more time to think, react, engage, and neutralize threats at a port.

Tactical Class Aerostat systems such as the 12M, 17M, 22M, and 28M are ideal for  maritime deployment, on land, or directly from a vessel at sea. These aerostats can be assembled and deployed in a very short period and manned by a minimal crew. This allows commanders to use the aerostat system in areas, or when escorting a High-Value Unit (HVU). The aerostat system can carry payloads including day/night EO/IR cameras, radars, communications relays, and electronic warfare packages. The aerostat can be deployed from the deck of a vessel or a static location such as a a dock or onshore mooring station. The larger size aerostat systems (22M, 28M) have greater capacity that allows the Operational Class systems to operate at higher altitudes for greater surveillance range while remaining aloft for up to two weeks at a time, ensuring round-the-clock persistent surveillance for highly trafficked areas and maritime borders.

A TCOM 22M payload. (Image courtesy of TCOM)
A TCOM 22M payload. (Image courtesy of TCOM LP)

As South China Sea claimants consider different monitoring options, aerostat systems offer several key competitive advantages over other platforms. The first is cost. Aerostat systems require comparably minimal maintenance, resulting in an exceptionally low hourly operational cost. This allows users to obtain highly accurate, real-time surveillance data, at a remarkably low total cost of ownership. Secondly, aerostat systems are capable of being on station for weeks at a time. This ensures that there are fewer lapses in coverage due to refueling or unexpected mechanical issues. Third and perhaps most importantly, aerostats payloads are easily reconfigurable allowing the platform to be retrofitted to accommodate the latest ISR technologies in ‘minutes’ compared to ‘months’ and without the need to re-qualify the airframe for safety of flight. For example, aerostat systems could function as a versatile platform for ISR payloads, including electro-optical/infrared cameras, radar, video, communications relays, and even cellular data and Wi-Fi. Operators can easily swap out a broad variety of actionable surveillance data and communications options to meet different missions using the aerostat system’s rapidly reconfigurable “Plug and Play” architecture. Aerostats are highly resilient and suited for harsh operating conditions. Due to the inert nature of Helium gas with which the aerostat is inflated, aerostat systems do not combust and are highly durable in flight. The proof is in the battlefield. For example, aerostat systems deployed in Iraq and Afghanistan during combat have been documented to remain aloft and functional even after being hit by direct gunfire. The low pressure within the aerostat hull allows the system to stay aloft even when punctured.

Aerostats systems have the payload size, weight and power capacity to support high-performance radars that can detect aircraft operating well beyond the coverage of ground-based radars. With an advanced maritime radar, a single sea surveillance system can track maritime targets at distances of 60 nautical miles and cover thousands of square miles for weeks at a time. In addition to the radar, the aerostat can simultaneously support passive surveillance payloads like COMINT, SIGINT, and ELINT, thermal imaging and optical sensors, as well as communications payloads at the lowest possible hourly cost for an airborne asset. The early detection and direct communications with air and sea assets afford the critical window of time to evaluate the situation, coordinate forces, and engage.

How does it work? Consider the scenario of a crowded port environment where many ships and small craft are transiting through highly congested waterways. A naval vessel enters a port but is limited to using surveillance equipment that looks outward from the deck level. There may also be ground-based equipment on shore. Together these systems are unable to see all the critical activity at the water level. A low, fast moving boat  quickly approaches a larger vessel undetected by traditional methods. This scenario occurred in 2000 with the terrorist attack on the USS Cole in Yemen. Aerostat system monitoring the entire port area from hundreds or thousands of feet above would provide early warning to the larger vessel, allowing for a timely reaction. The system could have provided actionable intelligence that allowed for a greater window of time for forces to intercept or engage. 

aerostat 3
Difference in coverage between aerostat based radar and coastal, ground-based radar. (Image courtesy of TCOM LP)

Operational Track Record

Aerostats provide a highly beneficial secondary function.  Any increase in effectiveness of supported troops is very quickly attributed to the aerostats and significantly modifies threat behaviors while the system is in flight. As this effect applies in the case of land applications, U.S. forces at Forward Operating Bases (FOBs) were often assaulted by lone insurgents, and improved explosive devices were placed just outside normal observation areas. Invariably, the deployment of aerostats to the FOBs saw an immediate increase in allied counterstrikes. Within a short amount of time, local leadership would find that enemy operations had relocated entirely or were curtailed exclusively to times when the aerostat was not flying.

Within the maritime domain, this same effect was found to be true for counter narcotics operations in the Caribbean Sea. Additionally, aerostats have proven highly effective at monitoring migrant vessels and providing cues to rescue operations when necessary.

Just like the best engineered automobiles or aircraft, aerostats are not perfect. They need to be tested and designed to meet specific field conditions and payloads. Additionally, operators must be well trained to to achieve maximum effectiveness. In contradiction to some, apparently uninformed media reports , history clearly shows that aerostats are highly reliable. Moreover, they have been and are still successfully used around the world in regional conflict zones such as the Middle East, Afghanistan, the Indian sub-continent, North America, and soon to be in Southeast Asia. With a proven track record of 45 years with millions of airborne hours of persistent surveillance in austere environments, aerostats are here to stay and are growing as innovators continue to find new uses for this reliable lighter-than-air platform. 

Conclusion

As government decision makers consider using a multi-mode surveillance approach, aerostats stand out in their potential to serve as eyes in the sky in the South China Sea and other maritime regions that have been immersed in perceived threats and real conflict. They are easy to deploy, operate in multiple environments, are efficient and technology-agnostic. Aerostat systems need little time to deploy and have lower maintenance requirements at a substantially lower hourly operational cost than conventional aircraft and drones. Moreover, aerostats offers a combination of wide viewing angles and high resolution for more precise identification of small objects as well as surveillance of larger areas. In short, aerostats enable true persistent, real-time tactical ISR at an affordable cost.

Matt McNiel is Vice President of TCOM, LP, a global ISR solutions provider of Lighter-Than-Air Persistent Surveillance Tethered Aerostat platforms for Air, Maritime and Land. He can be reached at [email protected].

Featured Image courtesy of TCOM LP. 

Parrying the 21st Century First Salvo

The following article is part of our cross-posting partnership with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. Read it in its original form here.

By Jon Solomon

A first strike’s naval component is commonly referred to as the “first salvo.” A first salvo builds upon the maxim that the fleet attacking effectively first obtains a greater probability of victory in a given tactical action, with the understanding that superior maritime surveillance and reconnaissance is a prerequisite for being able to do so.[1] This situational awareness becomes far more complicated to achieve against a defender’s maneuvering naval forces, though, once the defender’s peacetime rules of engagement regarding what he can do to suppress or neutralize enemy wide-area sensors and their supporting data relay networks, interdict enemy scouts, and employ deception and concealment are relaxed following hostilities’ outbreak. Since an attacker has every reason to believe his maritime picture will never be as accurate and comprehensive at any later point in a conflict as it is during peacetime’s waning moments, and since naval warfare is inherently capital-intensive, the attacker’s best chance to maximally neutralize a defender’s higher campaign-value fleet assets is in a first salvo.[2] Accordingly, one of the defender’s most critical peacetime tasks is to mitigate the risk that any conceivable non-nuclear first salvo can attrite his naval forces below the minimum deemed necessary to prevent a potential adversary’s aggression from achieving some military-strategic fait accompli.

An aggressor’s maritime offensive, though, may not be aimed at seizing territory or resources, solidifying a blockade, or ‘violently adjusting’ a theater’s power balance. Coercing the defender or other international actors by creating a public perception that the defender is weak, that a geopolitical status quo is tenuous, or that rising tensions are becoming exceptionally dangerous may actually be more useful to an aggressor’s grand strategy. A first salvo in these cases might be an extremely limited, ‘one-time’ tactical action intended not to ignite a war or to pave the way for follow-on military operations, but rather to support subsequent diplomatic, economic, or propagandistic endeavors at the defender’s expense. An example of this would be the 2010 North Korean torpedoing of the South Korean corvette ROKS Cheonan.

Assuming an attacker can locate and target at least some of a defender’s in-theater naval forces as a crisis peaks, a contemporary first salvo may consist of minimal-warning saturation attacks using anti-ship missiles, torpedoes, or irregular ‘swarming’ small boats and aircraft. The attacker might also covertly lay minefields in shallow contested seas, inside maritime chokepoints, or near the defender’s naval bases and forward logistical support ports. These kinetic actions will likely be paired with cyber and electronic warfare attacks designed to conceal attacking forces’ movements, exacerbate the defender’s confusion and demoralization, and inflict physical damage as possible on the defender’s forces and Command, Control, and Communications (C3) network infrastructure. A first salvo will almost certainly be coordinated with a diplomatic and propaganda campaign that attempts to justify the attacker’s actions, assign blame to the defender for peace’s collapse, and blur what actually happened.

New systems and platforms can certainly be designed with capabilities that help mitigate the U.S. Navy’s first salvo vulnerability risks, but this offers only intermediate if not long-term solutions. Under the normal Department of Defense acquisition process, it generally takes a ten year minimum to mature a new system from prototype demonstration in a relevant environment to Initial Operational Capability (IOC). Transitioning emerging technologies from the applied research stage into an IOC system obviously takes even longer.[3] First salvo defense into the foreseeable future, therefore, will largely depend upon theater and tactical-level commanders’ successes in enhancing existing forces’ resiliency in the face of a surprise attack.

Resilient Doctrine and Plans

From a purely quantitative perspective and assuming flawless scouting, an attacker’s probability of neutralizing a certain number of defending units in a strike decreases as the defender’s number of kinetic and non-kinetic defensive layers, as well as degree of unit-level passive hardening, increase. These attributes drive up the number of weapons the attacker must employ against a given target in order to attain a desired probability of success. Scouting is never flawless and situational pictures can never be omniscient, though. The defender can capitalize on these realities by using deception and concealment where tactically viable to increase the probability that a ‘critical mass’ of his units will evade detection long enough to avoid being attacked before they can successfully execute their missions.[4]

In a first salvo scenario, however, the above attributes are critically affected by the defending force’s degree of mobilization. Defensive mobilization primarily relies upon timely detection and recognition of actionable intelligence, followed by political and theater-level military leaders’ rapid decisions to act upon those Indications and Warning (I&W). This sequence’s perfect execution rarely occurs in practice for a litany of political, operational, and psychological reasons. Even in the depths of a crisis in which war I&W are unmistakable, these factors may deter a defender from adequately increasing his forces’ readiness postures in a timely manner.[5]

Nevertheless, naval doctrine and standing operational plans can compensate for the mobilization problem if they are structured around an expectation that a given potential antagonist would seek to initiate a conventional war by unleashing a massive first salvo.[6] As exemplified by the Imperial Japanese Navy’s war-initiating raids on the Russian Pacific Fleet at Port Arthur in February 1904 and on the U.S. Pacific Fleet at Pearl Harbor in December 1941, the simplest first salvo in terms of targeting is against a defender’s fleet in port. Considering mobilization-on-warning’s reliability challenges, a defender can best balance deployed warships’ need for periodic pierside maintenance and crew relaxation time on one hand against reducing overall force vulnerability on the other by adopting a posture that prevents a ‘critical mass’ of his fleet from ever being in his principal forward bases simultaneously. Routine forward peacetime operations can be built around always having a minimum contingent either underway or visiting countries that it is assessed the potential aggressor would prefer not to risk adding as parties to a conflict. Units’ positioning and portcalls could be managed based on their ability to quickly ‘become unlocated’ through use of speed, maneuvering space, Emission Control (EMCON), and other concealment tactics in the event of a sudden crisis.[7]

The combination of geography and political objectives, though, can constrain the defender’s fleet’s ability to sustainably remain unlocated throughout a protracted crisis. As was the case with the U.S. 6th Fleet’s operations in the highly-confined Eastern Mediterranean during the October 1973 Yom Kippur War, forward forces often must occupy a relatively fixed operating area when supporting an ally or deterring an antagonist’s intervention or escalation. Should this area lie within a small or significantly physically-enclosed marginal sea close to the potential adversary’s homeland, and especially if accessing the area requires transiting one or more chokepoints, the potential adversary’s surveillance and reconnaissance/targeting problems become vastly less difficult.[8]

Under these circumstances, a defender can orient his frontline peacetime conventional deterrent and initial wartime resistance around naval forces and weapons that are relatively invulnerable to a first salvo, such as submarines and offensive as well as defensive minelaying. These efforts can also employ numerous relatively low campaign-value maritime forces such as highly mobile land-based surface-to-air and anti-ship missiles, tactical aircraft operating from dispersed austere forward land bases, and under some circumstances missile-armed small warships logistically supported from forward austere ports or rearward seabases. Frontline forces can be supported by tactical and logistical aircraft from rearward land bases located in-theater, aircraft carriers operating from ‘over the horizon,’ and homeland-based trans-oceanic aircraft; all of these hinge on the availability of sufficient airborne refueling aircraft. Large surface combatants operating from ‘over the horizon’ can similarly provide cued land-attack and anti-ship missile fire support, extended-range air defense support, and Ballistic Missile Defense support.

The use of higher campaign-value naval units operating from ‘over the horizon’ as opposed to in a frontline capacity is only partially due to the first salvo threat. Sustained resistance to an adversary’s offensive will be impossible if the defender cannot achieve localized ‘moving bubble’ sea control in areas beyond the immediate contested zone’s periphery in order to support reliable logistical sustainment of frontline forces, mass movement of reinforcements and materiel into—and within—the theater, and the protection of theater allies’ primary economic lines of communication. These sea control tasks would almost certainly drive carrier, amphibious, and major surface action groups’ positioning as a crisis escalates or immediately following a war’s outbreak. Needless to say, higher campaign-value naval forces postured this way would also be better able to take advantage of space and maneuver for pre-first salvo defense-in-depth, concealment, and perhaps even deception.[9] The further offshore these naval forces were operating from the adversary’s homeland, the greater the adversary’s challenges would be in executing an effective first salvo due to the difficulties of timely detection, confident identification, and continuous targeting-quality tracking of uncooperative warships within the expansive, dynamic open-ocean environment.[10]

There is a major caveat to the above observations, however. A capable and audacious adversary might perceive his political objectives to be so important, the conflict’s ‘inevitability’ of escalation so great, or the defender’s leaders and citizens so feckless that kinetic first salvo attacks on the defender’s homeland-based naval forces become operationally attractive despite the high escalation precedent they would set. The Pearl Harbor case is instructive: although the pre-Second World War U.S. Navy’s Orange Plans fully expected Japan would open any war against America with a devastatingly effective surprise attack against the U.S. Pacific Fleet’s Philippines-based forces, U.S. Navy planners and leaders actively discounted the possibility Japan would risk galvanizing American popular passions by also attacking sovereign U.S. territory.[11] A future adversary might similarly not be satisfied with isolating his first salvo to forward areas, or otherwise limiting its extension against U.S. Navy homeland-based forces to cyber or electronic attacks that offer a thin modicum of escalation control. Mines and standoff-range cruise missiles employed by trans-oceanic submarines or ‘commercial’ vessels against American homeports would be ideal methods for maximizing surprise, confusion, and operationally-significant damage in support of the adversary’s in-theater offensive. Attacks using irregular forces might also be an option. Any warships laid up per a tiered-readiness approach would be particularly lucrative targets, and as such would greatly detract from force resilience.[12] As it seems unlikely the doctrinal approaches that forward forces can use to mitigate first salvo vulnerability will be fiscally extensible to homeland-based forces, greater attention will need to be paid to concepts for dispersing the fleet among homeland civilian ports in the event of elevated tensions, not to mention direct homeport defense. 

Anticipating ‘Defense in the Dark’

The preceding examination of kinetic attacks should not overshadow the fact that cyber-electromagnetic warfare will form a major part of any future first salvo. While much of cyber-electromagnetic defense is a technology development and acquisition matter, doctrine and operational planning also play key roles.[13] For instance, force-level commanders must not base their plans and operating concepts on the flimsy assumption that their situational pictures and C3 capabilities will enjoy relatively unimpeded confidentiality, integrity, and availability early in a war. As a crisis worsens, it may actually be better to decrease campaign-critical forces’ relative reliance on external networking with higher echelon commands or rear echelon support activities rather than double down upon it.[14]

A force is most resilient against C3 attack when all echelons from the theater-level down to the unit-level adhere to decentralized doctrine rooted in commanders’ pre-promulgated intentions messages, pre-planned initial immediate responses to foreseeable tactical situations, avoidance of overly-synchronized operations, and overall command by negation. This not only supports greater Operational and Communications Security through reduced need for frequent detailed communications, but also allows greater lower-echelon initiative and adaptability within a highly dynamic tactical environment.

It is also extraordinarily difficult for an adversary to detect—let alone exploit—a localized tactical data and communications network connecting a forward force’s units via highly-directional line-of-sight pathways that make use of maneuvering assets (ideally organic to the force) as ‘middleman’ relays. In comparison, an adversary’s cyber-electromagnetic warfare opportunities are expanded when the defender employs networks that connect fielded forces with higher command echelons and rearward ‘distance support’ services via predictably-located or fixed infrastructure (e.g., satellites and their ground stations). Cyber-electromagnetic first salvo defense means doctrine and operational plans should neither center on the defender’s higher echelon commanders’ direct real-time tactical control over lower echelons, nor offer the enemy an opportunity to exploit any informational and logistical support provided by the defender’s rear echelon ‘reachback’ activities.

Combat Conditioning: The Key to First Salvo Survival

The common denominator needed to make doctrine, plans, and even networking approaches truly resilient, however, is combat-ready personnel. This depends upon on tactically, technologically, and psychologically conditioning crews for battle’s fog and friction. Indeed, a 1975 U.S. Navy war game underscored that a first salvo’s degree of devastation would likely stem more from crews’ shock or disbelief upon detection of actual inbound weapons than from shipboard combat systems’ performance limitations.[15] Any decision to take self-defense actions in a fringe-of-war, tactically ambiguous situation would need to overcome enormous psychological inertia.[16]  

The tactical expertise needed to make such high-stakes, compressed-timeline decisions largely stems from an individual’s experience-shaped intuition. In peacetime, this experience is gained from training frequency and realism.[17] At-sea training remains vital because shipboard tactical, navigational, and engineering activity coordination cannot be realistically simulated pierside. Many Murphy’s Law-invoking maritime environmental idiosyncrasies such as disruptive weather, unanticipated anomalous radio frequency propagation, and ambient acoustic complexity are also difficult to realistically simulate. Additionally, much like man overboard recovery maneuvers, shiphandling proficiency in quick-reaction, precision-dependent defensive maneuvers relies upon routine, impromptu drills underway.[18] It is true that budget-driven underway training reductions, inability to simulate certain scenarios at sea due to severe operational risk or complexity, and the need to safeguard certain tactics and capabilities from intelligence exposure provide strong rationales for pierside unit and group-level synthetic training as possible and appropriate. Nevertheless, challenges remain in coordinating frequent pierside synthetic training events, or otherwise funding and scheduling frequent watchteam visits to high-fidelity simulators located ashore.

As a result, fleetwide first salvo resilience’s core arguably rests upon the individual unit-level Commanding Officer’s (CO) personal prioritization of tactical training. Quality onboard training systems are worthless if the CO does not mandate their regular use, demand that drills feature adversary tactics derived from the latest disseminated intelligence, and insist that no two drill scripts ever be alike in order to push watchstanders to continuously grow their experience bases, hone their instinctive responses, and become conditioned to cope with the unexpected. The CO must also ensure drills periodically include simulated cyber and electronic attacks as well as tactical deceptions to condition watchteams for operating amidst degraded or adversary-manipulated situational awareness. Most importantly, the CO must directly participate in drill debriefs to guarantee shortcomings are comprehensively and constructively identified for follow-on individual or team training—as well as to signal the training’s importance.  

Relatedly, considering the countless deckplate as well as external demands competing for a CO’s focused attention, Navy senior leadership must unambiguously communicate to the fleet that tactical training is indeed a paramount priority. Part of this will come from the seriousness of oversight posed when higher echelons examine unit and group-level tactical readiness during routine command assessments and pre-deployment workup exercises. This must be balanced with promotion board guidance that unfailingly rewards COs whose commands consistently demonstrate exceptional tactical proficiency and mature tactical risk-taking. Should Navy senior leadership do otherwise, they would gravely risk cultivating operational-tactical ineffectuality similar to what occurred in the U.S. Navy submarine force during 1941-42. Also, just as Navy senior leaders’ restrictions on submarine approach tactics during the 1920s and 1930s shortchanged early-Second World War fleet operations, restrictions on contemporary cyber defense training during battleforce exercises—though reportedly decreasing—may endanger first salvo resiliency.[19] Higher echelons must ensure similar mistakes are not being repeated regarding training for other resiliency-critical tasks such as operations during prolonged EMCON, self-defense while under intense electronic attack, or defensive anti-submarine warfare.

The Battle for the First Salvo’s Narrative

A successfully resilient tactical defense, however, may not be sufficient strategically. As alluded earlier, defeating a first salvo also means defeating the attacker’s inevitable diplomatic-propaganda campaign. Attackers within range of their homeland cellular networks, or otherwise using satellite uplinks, can quickly post audiovisual content recorded and edited on smartphones or similar devices to websites such as YouTube. From there, propaganda specialists can work to push the material via social networks to critical audiences; it may not take more than a few hours to become ‘viral’ and make the jump to traditional global media outlets. The side that gets seemingly-credible evidence of what happened out first seizes the initiative, perhaps decisively, in the diplomatically and politically-critical battle for the international and domestic public narratives regarding culpability and justification.[20]

In a first salvo’s immediate aftermath, the defender must be able to quickly collect, process, and disseminate unimpeachable audiovisual evidence of its victimization without harming Operational Security. This would be no small feat, especially aboard a warship that is severely damaged or steeling itself for follow-on attacks.[21] Even harder is developing continuously updated, interagency-coordinated, ‘stock’ narrative outlines in advance of any operation that might expose units to direct first salvo risk, not to mention the doctrine and training necessary to swiftly get an initial narrative out into the global media. Contrary to current public affairs practice, in some scenarios this might require evidence processing and public dissemination by lower echelons to be followed thereafter with amplification and context by executive Navy and national leadership. This will be a vitally important area for exploration through war gaming and fleet experiments.

The Strategic Criticality of First Salvo Resiliency

With its force structure in decline due to political and fiscal pressures on the Federal budget, and with vital U.S. interests and commitments in increasingly unstable East and Southwest Asia making forward naval presence reductions in those theaters grand strategically undesirable, the U.S. Navy will soon have to cope with a larger fleet proportion being exposed to ever-increasing first salvo risks at any one time. Should an especially crippling single-theater first salvo result in loss of several strategically-significant units or a sizable overall number of warships and aircraft, and even if naval reinforcements surged from other theaters and the homeland helped ensure the ensuing conflict ended in American victory, the U.S. Navy would be hard-pressed to restore its prewar global forward presence levels and crisis surge capacity until its losses were made good. This would almost certainly have grand strategy-shattering consequences. 

American conventional deterrence credibility in increasingly contested maritime theaters will depend in large part on whether the U.S. Navy is able to use the approaches outlined here in ways that visibly improve its first salvo resiliency within the near-term.[22] The Navy’s greatest weapon for parrying a first salvo, after all, is convincing a potential adversary of the probable futility of attempting such an attack in the first place.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at [email protected]. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

[1] CAPT Wayne P. Hughes Jr, USN (Ret). Fleet Tactics and Coastal Combat, 2nd ed. (Annapolis, MD: U.S. Naval Institute Press, 2000), 40-44. On an adversary’s difficulties in achieving effective wide-area surveillance and reconnaissance following his first salvo, see Jonathan F. Solomon. “Defending the Fleet from China’s Anti-Ship Ballistic Missile: Naval Deception’s Roles in Sea-Based Missile Defense.” (Master’s thesis, Georgetown University, 2011), 70-76, accessed 10/14/14, https://repository.library.georgetown.edu/bitstream/handle/10822/553587/solomonJonathan.pdf?sequence=1 

[2] For a definition of campaign-value, see Jonathan F. Solomon. “Maritime Deception and Concealment: Concepts for Defeating Wide-Area Oceanic Surveillance-Reconnaissance-Strike Networks.” Naval War College Review 66, No. 4 (Autumn 2013): 109.

[3] “Report on Technology Horizons: A Vision for Air Force Science & Technology During 2010-2030, Volume One.” (Washington D.C.: U.S. Air Force Chief Scientist, 15 May 2010), 7.

[4] Solomon, “Maritime Deception and Concealment,” 94-96, 99-103.

[5]For definitive explanation of and expansion upon this statement, see Richard K. Betts. Surprise Attack. (Washington, D.C.: The Brookings Institution, 1982), 87-141, 155-156. None of this means I&W collection and analysis efforts are pointless, but rather that strategy and operational plans must not wholly depend upon them.

[6] Ibid, 157, 311.

[7] However unintentionally, the U.S. Pacific Fleet’s aircraft carrier posture immediately prior to the Pearl Harbor raid met this criteria. Their survival was pivotal to U.S. maritime denial operations during the Pacific War’s first six months, especially at the battles of the Coral Sea and Midway. See “Pearl Harbor Attack, 7 December 1941 Carrier Locations.” U.S. Naval History and Heritage Command,  accessed 10/14/14, http://www.history.navy.mil/faqs/faq66-9.htm  

[8] Solomon, “Maritime Deception and Concealment,” 96-97.

[9] Ibid, 88-99.

[10] Robert C. Rubel. “Talking About Sea Control.” Naval War College Review 63, No. 4 (Autumn 2010): 45.

[11] Edward S. Miller. War Plan Orange: The U.S. Strategy to Defeat Japan, 1897-1945. (Annapolis, MD: U.S. Naval Institute Press, 1991), 25, 27, 29, 354.

[12] For an example of a fleet tiered readiness approach, see RADM Robert O. Wray, USN. “The Utility of a Three-Tiered Navy.” Naval Institute Proceedings139, No. 6, (June 2013): 42-47.

[13] For a discussion of technical countermeasures and acquisition approaches that enhance a military system or network’s cyber-resilience, see Jonathan F. Solomon. “Cyberdeterrence between Nation-States: Plausible Strategy or a Pipe Dream?” Strategic Studies Quarterly 5, No. 1 (Spring 2011), Part II (online version): 20-22, accessed 10/14/14,  http://www.au.af.mil/au/ssq/2011/spring/solomon.pdf. For overviews of electronic protection measures for radars, see CPT Aytug Denk, Turkish Air Force. “Detection and Jamming Low Probability of Intercept (LPI) Radars.” (Masters Thesis, U.S. Naval Postgraduate School, September 2006), 5-33; and Dave Adamy. “EW Against Modern Radars-Part 8: Side-lobe Cancellation and Blanking.” Journal of Electronic Defense 33, No. 6 (June 2010): 44-46.

[14] The operative phrase is relative reliance, as some forms of external networking will be necessary for integrating tactical capabilities and coordinating tactical actions across combat arms and services. See “Joint Operational Access Concept, Version 1.0.” (Washington, D.C.: U.S. Joint Chiefs of Staff, 17 January 2012), 36.

[15] Norman Friedman. Seapower and Space: From the Dawn of the Missile Age to Net-Centric Warfare. (Annapolis, MD: U.S. Naval Institute Press, 2000), 346.

[16] Barry D. Watts. “U.S. Combat Training, Operational Art, and Strategic Competence: Problems and Opportunities.” Washington, D.C., Center for Strategic and Budgetary Assessments, August 2008, 36. The same is true for authorizing activation of a combat system’s mode that performs fully autonomous defensive engagements.

[17] Ibid, 17-22, 27-29.

[18] For example, consider the precision maneuvering needed for deploying and then maintaining position within chaff clouds. See ADM Sandy Woodward, RN. One Hundred Days: The Memoirs of the Falklands Battle Group Commander. (Annapolis, MD: Naval Institute Press, 1997), 12.

[19] See 1. LCDR Brian McGuirk, USN. “Rekindling the Killer Instinct.” Naval Institute Proceedings 138, No. 6 (June 2012): 41, 43-44; 2. “FY12 Annual Report: Information Assurance (IA) and Interoperability (IOP).” (Washington, D.C.: Office of the Director, Operational Test and Evaluation (DOT&E), December 2012), 307-311; 3. “FY13 Annual Report: Information Assurance (IA) and Interoperability (IOP),” 330, 332-334.

[20] The 2010 Wikileaks “Collateral Murder” campaign is an archetypical example of how this might be done by an adversary following a first salvo. For a detailed critique of the Department of Defense’s public affairs response, see Matt Armstrong. “The True Fiasco Exposed by Wikileaks.” MountainRunner.us, 10 April 2010, accessed 10/14/14, http://mountainrunner.us/2010/04/wikileaks/.

[21] The 2010 ROKS Cheonan sinking exemplifies this point. There would have been no time for the Cheonan’s crew to directly perform this role before the ship was lost. This highlights the potential utility of a secure ‘black box’ tactical data recorder on a warship’s bridge can be quickly removed should a crew need to abandon ship.  For a summary of how the absence of such data in the sinking’s immediate aftermath affected South Korea’s narrative battle, see “ROKS Cheonan Sinking.” Wikipedia, 09 May 2013, accessed 10/14/14, http://en.wikipedia.org/wiki/ROKS_Cheonan_sinking

[22] Solomon, “Defending the Fleet,” 127-137.

Featured Image: Pacific Ocean (June 28, 2004) – Operations Specialist 2nd Class Andres Yanez, of Houston, Texas, stands watch in the combat information center (CIC) aboard guided missile cruiser USS Cowpens (CG 63). U.S. Navy photo by Photographer’s Mate 3rd Class Lowell Whitman (RELEASED)

Deception and the Backfire Bomber: Part Four

The following article is part of our cross-posting partnership with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. Read it in its original form here.

Read part one, part two, and part three of this series. 

By Jon Solomon

Ingredients of Counter-Deception

How could a U.S. Navy battle force then—or now—avoid defeats at the hands of a highly capable adversary’s deceptions? The first necessary ingredient is distributing multi-phenomenology sensors in a defense’s outer layers. Continuing with the battleforce air defense example, many F-14s were equipped during the 1980s with the AN/AXX-1 Television Camera System (TCS), which enabled daytime visual classification of air contacts from a distance. The Navy’s F-14D inventory later received the AN/AAS-42 Infrared Search and Track system to provide a nighttime standoff-range classification capability that complemented AN/AXX-1. Cued by an AEW aircraft or an Aegis surface combatant, F-14s equipped with these sensors could silently examine bomber-sized radar contacts from 40-60 miles away as meteorologically possible. As it would be virtually impossible for a targeted aircraft to know it was being remotely observed unless it was supported by AEW of its own, and as the targeted aircraft’s only means for visually obscuring itself was to take advantage of weather phenomena as available, F-14s used in this outer layer visual identification role could help determine whether inbound radar contacts were decoys or actual aircraft. If the latter, the sensors could also help the F-14 crews determine whether the foe was carrying ordnance on external hardpoints. This information could then be used by a carrier group’s Air Warfare Commander to decide where and how to employ available CAP resources.

It follows that future U.S. Navy outer layer air defenses would benefit greatly from having aircraft equipped with these kinds of sensors distributed to cover likely threat axes at extended ranges from a battle force’s warships. Such aircraft could report their findings to their tactical controllers using highly-directional line-of-sight communications pathways in order to prevent disclosure of the battle force’s location and disposition. Given that the future air threat will not only include maritime bombers but also strike fighters and small unmanned aircraft, it would be enormously useful if each manned aircraft performing the outer layer visual identification role could also control multiple unmanned aircraft in order to extend their collective sensing reach as well as covered volume. This way, the outer layer would be able to investigate widely-dispersed aircraft approaching on multiple axes well before the latter’s sensors and weapons could be employed against the battle force. The same physics that would allow the U.S. Navy to disrupt or exploit an adversary’s multi-phenomenology maritime surveillance and reconnaissance sensors could be wielded by the adversary against a U.S. Navy battleforce’s outer layer sensors, however, so the side that found a way to scout effectively first would likely be the one to attack effectively first.

A purely sensor-centric solution, though, is not enough. Recall Tokarev’s comment about making actual attack groups seem to be “easily recognizable decoys.” This could be implemented in many ways, one of which might be to launch readily-discriminated decoys towards a defended battle force from one axis while vectoring a demonstration group to approach from another axis. Upon identifying the decoys, a defender might orient the bulk of his available fighters to confront the demonstration group. This would be a fatal mistake, though, if the main attack group was actually approaching on the first axis from some distance behind the decoys. If there was enough spatial and temporal separation between the two axes, and if fighter resources were firmly committed towards the demonstration group at the time it became apparent that the actual attack would come from the first axis, it might not be possible for the fighters to do much about it. An attacker might alternatively use advanced EW technologies to make the main attack group appear to be decoys, especially when meteorological conditions prevented the CAP’s effective use of electro-optical or infrared sensors.

This leads to the second necessary ingredient: conditioning crews psychologically and tactically for the possibility of deception. During peacetime, tactical competence is often viewed as a ‘checklist’ skill set in that crews are expected to quickly execute various immediate actions by rote when they encounter certain tactical stimuli. There’s something to be said for standardized immediate actions, as some simply must be performed instinctively if a unit or group is to avoid taking a hit. Examples of this include setting General Quarters, adjusting a combat system’s configuration and authorized automaticity, launching alert aircraft, making quick situation reports to other units or higher command echelons, and employing evasive maneuvers or certain EW countermeasures. Yet, some discretion may be necessary lest a unit salvo too many defensive missiles against decoys or be enticed to prematurely reveal its location to an attacker. The line separating a fatal delay to act from a delayed yet effective action varies from circumstance to circumstance. A human’s ability to avoid the former is an art built upon his or her deep foundational understanding of naval science and the conditioning effects of regular, intense training. Only through routine exposure to the chaos of combat through training, and only when that training includes the simulated adversary’s use of deception, can crews gradually mentally harden themselves against the disorienting ambiguity or shock that would result from an actual adversary’s use of deception. Likewise, only from experience gained through realistic training can these crews develop tactics that help them and other friendly forces reduce their likelihoods of succumbing to deception, or otherwise increase the possibilities that even if they initially are deceived they can quickly mitigate the effects.

It follows that our third ingredient is possessing deep defensive ordnance inventories. A battle force needs to have enough ordnance available—and properly positioned—so that it can fall for a deception and still have some chance at recovering. It is important to point out this ordnance does not just include guns and missiles, but also EW systems and techniques. During the Cold War, a battle force’s defensive reserves consisted of alert fighters waiting on carrier decks to augment the CAP as well as surface combatants’ own interceptor missiles and EW systems. These might be augmented in the future by high-energy lasers used as warship point defense weapon systems, though it is too early to say whether their main ‘kill’ mechanism would be causing an inbound threat’s structural failure or neutralizing its terminal homing sensors. If effective, lasers would be particularly useful for defense against unmanned aircraft swarms or perhaps anti-ship missile types that trade away advanced capabilities for sheer numbers. Regardless of its available defensive ordnance reserves, a battle force’s ability to receive defensive support from other battle forces or even land-based Joint or Combined forces can also be quite helpful.

The final ingredients for countering an adversary’s deception efforts are embracing tactical flexibility and seizing the tactical initiative. Using Tokarev’s observations as an example, this can be as simple as constantly changing CAP and AEW cycle duration, refueling periods, station positions, and tactical behaviors. A would-be deceiver needs to understand his target’s doctrine and tactics in order to create a ‘story’ that meshes with the latter’s predispositions while exploiting available vulnerabilities. By increasing the prospective deceiver’s uncertainty regarding what kinds of story elements are necessary to achieve the desired effects, or where vulnerabilities lie that are likely to be available at the time of the planned tactical action, it becomes less likely that a deception attempt will be ‘complete’ enough to work as intended. A more aggressive defensive measure might be to use offensive counter-air sweeps well ahead of a battle force to locate and neutralize the adversary’s scouts and inbound raiders, much as what was envisioned by the U.S. Navy’s 1980s Outer Air Battle concept. The method offering the greatest potential payoff, and not coincidentally the hardest to orchestrate, would be to entice the adversary to waste precious ordnance against a decoy group or expose his raiders to ambush by friendly fighters. All of these concepts force the adversary to react, with the latter two stealing the tactical initiative—and the first effective blow in a battle—from the adversary.

In the series finale, we will address some concluding thoughts. 

Read the series finale here.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at [email protected]. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.