Category Archives: Future Tech

What is coming down the pipe in naval and maritime technology?

Back to the Future: Routine Experimentation with Prototypes

By John Hanley

Broad agreement exists that the Department of Defense’s, and thus the Navy’s, acquisition system is bound like Gulliver by Lilliputian processes, resulting in an inability to adapt. This inflexibility threatens to increase the risks to operating forces as they face a growing number of adaptive adversaries, ranging from China and Russia, North Korea and Iran, to the Islamic State, Al Qaeda, and others.1 Well-intended legislation and increasing reliance upon computer modeling to inform the selection of future platforms and systems are major contributors to the current situation. Greater reliance on experimenting with prototypes at sea could provide a large improvement.2

Introduction

Congress passed the Goldwater-Nichols legislation in 1986 to promote joint operations and provide more civilian control by creating an Undersecretary of Defense for Acquisition and reducing the role of the Chief of Naval Operations (CNO) and other Service Chiefs in acquisition decisions. This legislation added joint duty requirements to the already-packed career paths for line officers, even as it added new educational and experience requirements for acquisition professionals.3 The Defense Acquisition Workforce Improvement Act in 1990 further created mandatory requirements for a more professional acquisition force. Line and acquisition professionals “had completely different chains of command and, consequently, were situated in different performance evaluation and promotion structures.”4 Having little appreciation for an increasingly complex acquisition process, line officers had trouble articulating their needs to an acquisition workforce that was itself increasingly isolated from the operational environment.

Though the Packard Commission that informed Goldwater-Nichols legislation called for more prototyping to gain experience with new platforms and systems before making major investments, the Department of Defense (DoD) and the Navy increasingly turned to computer-based combat and campaign simulations as a cheaper and more flexible way to inform acquisition decisions.5 This had the effects of further separating the experience of fleet operators from Navy acquisition, and removed an important source of data for ensuring computer-based simulations were accurate.6

In their book Switch: How to Change Things When Change Is Hard, Chip and Dan Heath highlight the value of bright spots; examples of projects that work well to make a case for needed change.7 This article suggests some bright spots, and continuing challenges, in acquiring capabilities the Navy needs to adapt to rapidly emerging security opportunities and challenges.

A Virtuous Prototype Cycle

As a junior officer, I was privileged to be assigned to the USS Guitarro (SSN 665) in San Diego in 1973. The Guitarro played a major role in developing tactics for prototype combat systems deployed to the Pacific submarine fleet, in particular the new Submarine Towed Array Sensor System (STASS) along with its BQR-20 series digital sonar displays. In the mid-1970s, Guitarro also installed the first digital submarine combat system (BQQ-5 sonar and Mk-117 fire control system) and participated in the development of submarine-launched Harpoon and Tomahawk cruise missiles.8

Following my service on the Guitarro, I became an operations analyst supporting several programs. The Naval Electronics Systems Command (PME-108) was sponsoring the Coordination in Direct Support (CIDS) program developing technology and techniques for communicating with submarines to operate in direct support of carrier battle groups, and the Over-the-Horizon Targeting (OTH-T) program was developing technology and techniques for targeting ships with Harpoon and Tomahawk missiles at ranges beyond the line of sight. These programs integrated their efforts with the Tactical Development and Evaluation Program sponsored by the OP-953 on the Navy staff. My next job involved working with the Chief of Naval Operations Strategic Studies Group where I witnessed the speed with which a small team of intelligence specialists, engineers using the latest technology, and Navy leadership could deliver cutting edge capabilities to the fleet very rapidly.

My experience in these programs taught the value of providing prototypes to the fleet early. Working with prototypes allowed us to develop tactics and techniques that the system developers never considered, and highlighted operational limitations and misperceptions of those developing the systems. Fleet analysis data contributed directly into operations analysis, computer simulations, and war games. The experience also demonstrated the limitations of tightly-coupled integrated systems as opposed to systems with modules that could adapt and change easily. As my career continued, I observed revisions to the DoD acquisition system that diminished the role of prototyping and extended times to demonstrate new capabilities to the fleet, usually exceeding cost estimates and requiring modifications as operators discovered what they could, and could not do.

Sonar Towed Arrays and Digital Displays

STASS was a long, linear array of hydrophones deployed behind the submarine on a cable. This kept the array’s sensors away from the towing submarine’s radiated noise, significantly improving the signal-to-noise ratio needed to detect faint signals. It could detect contacts behind the submarine that were screened from the hull-mounted sensors in the bow. Its length provided a larger aperture to detect lower frequencies at longer ranges. This sonar system made submarines more effective.

However, the new system had its challenges. Initially, a sonar operator could monitor only one of the array’s 16 beams at a time, by listening and/or monitoring the BQR-20’s digital display.9 The display would provide a waterfall of illumination if a signal was detected on that beam. Low frequencies required several minutes of integration time to process signals from the ambient noise. Thus it could take more than an hour to search though all of the beams. The submarine also had to travel at slow speed to prevent the noise from water flowing over the hydrophones from masking signals from other vessels. Even with the slower speeds, the longer detection ranges provided the new sonar system significantly increased the search rate in deep ocean areas.

The principal tactic for estimating a targets range using passive sonar was developed by Lieutenant John Ekelund in 1956.10 Ekelund’s approach significantly improved upon target motion analysis techniques that involved only plotting bearings to a target over time. His method involved calculating the rate of change of the relative bearing of the contact as the host submarine maneuvered on two courses. The time to do the calculation affected the accuracy of the estimate. Slow maneuvering with the STASS was frustrating.

Our sister ship, USS Drum (SSN 677), was the first ship in the Pacific fleet to receive the new STASS. To reduce the time maneuver to a new course, Drum tried a tactic of speeding up through the turn, then slowing to reduce the flow noise. Unfortunately, the sub slowed faster than the array, resulting in the array’s cable wrapping around the horizontal stabilizer on the sub.

Guitarro then had its opportunity to develop tactics for employing the STASS. Our efforts focused on three areas: maneuvering the ship, sonar search procedures, and plotting contacts. I had the lead on plotting. Current practice used a “compressed” time-bearing plot along with “strip” plots. The time bearing plot provided bearing rates needed to compute Ekelund ranges. Speed strips marked with various speeds were manually aligned across bearings to a contact’s for estimating its range, course, and speed. Given the time required to generate contact bearings with the STASS, we developed an “expanded” time-bearing plot.

A big innovation occurred when Dr. Ted Molligen (a ship rider from Analysis and Technology, Inc.) noted that the array’s beams were cones and the sea bottom was a plane. The intersection of a cone and a plane is a hyperbola. Therefore, when the contact’s signal bounced off the bottom, which occurred frequently in the Pacific, we were dealing with lines of bearing along a hyperbola. Within a day, we manufactured templates of hyperbolas out of plexiglass for strip plotting using bottom bounce signals. Without measuring bearing rates, the intersection of two hyperbolas provided a contact’s estimated position quickly after our maneuver.

Another unanticipated effect was the ability to observe the contact’s Doppler signal shift in near-real time. Thus we could observe not only the contact’s bearing change during maneuvers, but also whether it was opening or closing us. Reconstructed plots of our target clearing its baffles (simulating “crazy Ivans”) during exercises showed our depiction of the target’s motion to be very accurate.

The next breakthrough occurred when we received the BQR-22 a couple of months later. The BQR-22 could process two beams simultaneously. We discovered that, with some regularity, we would receive both direct path and bottom bounce signals from the contact. The different signals would arrive on different beams because of their paths through the water. The intersection of a direct path line of bearing with a bottom bounce hyperbola produced an estimate of the target’s range without having to maneuver. Exercise reconstruction showed our estimates to be within a few percent of the target’s range.

Under the leadership of our superb Executive Officer, Lieutenant Commander Dan Bacon, we documented the tactics we had developed for maneuvering the sub, conducting the sonar searches, and plotting in a tactical memo and submitted it to Commander, Submarine Forces Pacific. He replaced our cover with his, and distributed it as a Tactical Memorandum to the fleet.

Within a year, we received the BQR-23 that processed four beams simultaneously. We then deployed with this sonar system, and other prototype sensors and processors, for operations in the western Pacific. Deploying with prototype equipment was routine in the submarine force.

During World War II U.S. submarines could attack only surfaced enemy submarines.11 In 1949, the submarine force created Submarine Development Group 2 and tasked it with antisubmarine warfare (ASW) as part of an effort to preserve the submarine force structure during demobilization. Within twenty years, the U.S. submarine force went from having essentially no ASW capability to becoming the dominant ASW force in the world. Following their motto of “Science, Technology, Tactics”, the Group employed a program of designing, conducting, and reconstructing exercises to develop tactics for prototype systems, and reconstructing submarine performance during operations using extensive data collected during patrols.12 Using the Group’s methodology, we were able to exploit the STASS and the BQR-20 series digital displays and document proven tactics for the fleet that significantly improved the U.S. advantage over Soviet submarine forces within an 18 month period.

In contrast, installing the first submarine digital combat system in the shipyard demonstrated challenges that occur when developing systems without prototyping. The system had no feature for entering bearings directly from the periscope. Apparently, the engineers thought that all approach and attack would use sonar only. We also were told that adding hyperbolic ranging to the software in the central computer complex, which serviced the sonar and fire control system, would take at least a decade. Stand-alone computers came to support search planning and target motion analysis since the integrated system was incapable of rapid change.

Coordination in Direct Support

Admiral Rickover had pushed through the development of the Los Angeles-class submarines by arguing that their higher speed would allow them to screen a carrier battle group.13 The major problems were communicating with submarines to keep them on station as the battle group maneuvered, to direct them to prosecute contacts detected by other battle group platforms, and to prevent other battle group ASW forces from attacking them. Also, based on the way that the U.S. targeted German U-boat radio transmissions during World War II, our silent service routinely disabled its radio transmitters while on patrol to prevent detection. Standard submarine communications involved the submarine getting an antenna to the surface for broadcasts that were repeated for eight hours on a two-hour cycle. The submarine restricted its speed to a few knots when at communications depth, both to prevent anyone seeing the wake of the periscope and to keep its floating wire antenna on the surface. Thus the submarine could best communicate at scheduled intervals, and could not transit at battle group speeds while communicating.

Rear Admiral Guy H.B. Shaffer took the methods he had used commanding Submarine Development Group 2 with him to the Naval Electronic Systems Commands program office PME-108.14 He established the Coordination in Direct Support (CIDS) program to develop means to communicate with submarines providing direct support to carrier battle groups.

The Submarine Analysis Notebook provided the methodology and data required for assessing submarine ASW performance. The first step in the CIDS program was to develop a Fleet Exercise Analysis Guide that provided a conceptual battle group ASW process and performance metrics.15 PME-108 then worked with the Tactical Development and Evaluation (TAC D&E) Program and the numbered fleets to schedule participation in their exercises, and invited the Navy laboratories to provide prototype communications systems for submarine communications. The prototypes included everything in the electromagnetic spectrum from blue-green lasers to Extremely Low Frequency (ELF) radios and a variety of acoustic communication methods.16 For each exercise a team would work with relevant commands to design the exercise and develop data collection plans. The team would then ride key ships in the exercise providing advice on accomplishing exercise training and tactical development objectives, and overseeing the data collection. Following the exercise, the team would reconstruct and analyze the event in full, including documenting the timelines for each ASW interaction and every ASW communication over every communications path.

This approach allowed prototypes to be evaluated not just as stand-alone systems, but demonstrated their value both in enhancing communications as part of a suite of systems operating simultaneously and in accomplishing the mission of protecting the carrier from submarines attacking with torpedoes and cruise missiles.

Occasionally a laboratory would offer a prototype that was operationally unsuitable. One such system was a shaped buoy weighing several thousand pounds to be towed behind a submarine at depth and speed to push an antenna to the surface. Had the buoy hit a surface vessel, or submarine at shallower depth, it would have had the impact of a torpedo without the explosion.

Documenting every step of the communications path demonstrated the delays created by communications controlled by the submarine operating authority ashore. This led the submarine force to provide Submarine Element Coordinators (SEC) at sea with the battle group. The exercises explored many operational schemes with these SECs adjusting submarine broadcast schedules and using ELF or acoustic “bell-ringers” to call the submarine to communications depth for higher data rate communications.

After 10 fleet exercises conducted over a three-year period involving all the numbered fleets, the CIDS program demonstrated that the tactical concept for using submarines as an outer screen moving with the carrier battle group was infeasible. This led to alternative schemes for employing submarines supporting task groups. The communications data proved valuable and was incorporated in the Navy’s Warfare Environment Simulator which allowed teams playing task group platforms on different terminals to receive information with realistic time delays.17 Over time, this became the Navy Simulation System, but lost its original purpose of focusing on command and control issues using fleet data.

Over-the-Horizon Targeting

Shortly after the command and control fleet exercises, the Navy began deploying Harpoon and was getting ready to deploy Tomahawk missiles to the fleet. So RADM Shaffer established an Over-the-Horizon Targeting (OTH-T) program within PME-108. The approach followed the CIDS program; developing a fleet exercise analysis guide, designing exercises to incorporate prototype systems and tactics, collecting data, and conducting analyses. The Mediterranean, with its high shipping density and many islands, provided the most challenging environment for OTH-T.

The exercises were again successful in demonstrating that the technology and tactics were insufficient to support the proposed concepts for anti-ship Tomahawk use. This and the abundance of targets ashore were major factors in emphasizing land attack versus anti-ship versions of the Tomahawk missile.

Advanced Technology Panel

By the late 1970s, Navy efforts to develop special intelligence sources provided deep penetration of Soviet Navy thinking and practices.18 The CNO repurposed the Navy’s Advanced Technology Panel (ATP), created in the 1970s, to become the main customer for this highly restricted intelligence.19 The ATP was a small group of the senior admirals on his staff, his top ‘thinkers’, who were cleared primarily to review special programs, but did a lot more.20 Working closely with the Navy laboratories, the leadership could deliver counters to what the Soviets were deploying within months to a year or two of having firm intelligence on their systems.

CNO Admiral Tom Hayward, on the advice of then Under Secretary of the Navy Robert Murray, formed a Strategic Studies Group of six promising Navy officers selected personally by him and two Marines at the Naval War College in 1981. Murray characterized the SSG as changing captains of ships into captains of war, employing terms that Winston Churchill used when he said that he needed more of those in World War I.

That fall, the ATP led by Vice CNO Admiral Bill Small was looking for ways to game using new, sensitive intelligence. In January 1982, the SSG was asked to develop concepts employing the new intelligence. The SSG held an extensive war game in April 1982. Admiral Small brought the ATP to Newport for two days at the conclusion of the game to review the results. The concepts used in the game became the foundations for the 1980s Maritime Strategy and rapidly changing war plans. The ATP was able to focus special programs on providing capabilities tailored to executing the new war plans.21

Two Different Paths: Nuclear Submarines and Distributed Surface Combat Power

Prototyping should not be restricted only to the payloads on vessels. In 1951, then Captain Hyman G. Rickover received authorization to build nuclear powered submarines. USS Nautilus (SSN 571) was commissioned in 1954 with a pressurized water reactor. The Navy then commissioned:

  • The USS Seawolf (SSN 575) with a liquid metal cooled reactor in 1957. This design presented too many risks and was quickly replaced.
  • The USS Triton (SSRN 586) in 1959, a large radar picket submarine with two reactors.
  • The USS Tullibee (SSN 597) in 1960, a very small, quiet submarine with a small reactor.
  • The USS Jack (SSN 605) in 1967 with direct drive and counter-rotating shafts and propellers.

These submarines, along with the small classes of SSNs built between the prototypes, explored the design space, adapted design features, and informed the building the following classes of nuclear submarines.22 The large capacity of the USS Hallibut (SSGN 587), designed to shoot Regulus nuclear cruise missiles, allowed it to adapt to different missions over its service life.

In 1996, the CNO Strategic Studies Group briefed its concepts for dispersed and distributed surface power to the CNO.23 The Group had in mind fast, stealthy ships of several hundred tons capable of mounting modular payloads for different missions. They anticipated that the Navy would explore the design space with prototypes, as it did with nuclear submarines. Instead, DoD acquisition processes led to the Littoral Combatant Ship. Rather than using a range of small and large prototypes using differing propulsion concepts, the Navy ended up with two much larger ship classes that have had many early difficulties.

Conclusion

The DoD acquisition system has come to believe that we must precisely predict the threat decades into the future, optimize designs by spending many million dollars on computer analysis, and then commit billions of dollars for procurement, without any of the experience and operator feedback provided by prototypes. This developmental approach incurs major cost, schedule, and performance risks because the future remains stubbornly uncertain – just as it always has been.

A better alternative is to prototype operational systems and platforms rapidly, providing agility to adapt to emerging threats and take advantage of emerging technology. Programming, budgeting, and contracting processes present major hurdles. Though routine acquisition procedures do not support such agility, Other Transaction Authority and similar processes authorized by Congress should be employed to their maximum extent. However, to do so effectively will require reinvigorating experimenting with prototypes in fleet exercises in ways similar to Submarine Development Group 2, the CIDS and OTH-T programs, and early nuclear submarine force development.

Captain John T. Hanley, Jr., USNR (Ret.) began his career in nuclear submarines in 1972. He served with the CNO Strategic Studies Group for 17 years as an analyst and Program/Deputy Director. From there in 1998 he went on to serve as Special Assistant to Commander-in-Chief U.S. Forces Pacific, at the Institute for Defense Analyses, and in several senior positions in the Office of the Secretary of Defense working on force transformation, acquisition concepts, and strategy. He received A.B. and M.S. degrees in Engineering Science from Dartmouth College and his Ph.D. in Operations Research and Management Sciences from Yale. He wishes that his Surface Warfare Officer son was benefiting from concepts proposed for naval warfare innovation decades ago. The opinions expressed here are the author’s own, and do not reflect the positions of the Department of Defense, the US Navy, or his institution.

Endnotes

  1. For example see Barber, Arthur H. “For War Winning Innovation, Fix the Process.” Naval Institute Proceedings, October 2016 and National Academy of Sciences-Engineering-Medicine. “The Role of Experimentation Campaigns in the Air Force Innovation Lifecycle.” Washington DC: National Academies Press, 2016.
  2. This type of experimentation involves trying out concepts and technology at sea, and learning from the results. Attempts by the former Joint Forces Command to restrict the concept of experimentation to hypotheses without control cases were inappropriate, misused, and misguided.
  3. U.S. Code Title 10 Chapter 87.
  4. Charles Nemfakos, Irv Blickstein, et. al. The Perfect Storm: The Goldwater-Nichols Act and Its Effect on Navy Acquisition. Santa Monica: RAND, 2010.
  5. David Packard, President’s Blue Ribbon Commission Defense Management, A Quest for Excellence: Final Report to the President, Washington, D.C., June 30, 1986.
  6. John T. Hanley, Jr. “Changing the DoD’s Analysis Paradigm: The Science of Wargaming and Combat/Campaign Simulation.” Naval War College Review, Winter 2017.
  7. Chip Heath, Dan Heath. Switch: How to Change Things when Change is Hard. (New York: Broadway Books, 2010).
  8. The first installation of the BQQ-5 and Mk-117 was not called a prototype at the time. However, the submarine museum adjacent to Sub Base New London now characterizes it as a prototype.
  9. A story on the waterfront was that the BQR -20 resulted from a sonar Chief in San Diego who observed a mechanic using a digital processor when diagnosing his car engine. He obtained a device and connected it into his sub’s system, demonstrating an ability to see distinct frequencies.
  10. Ekelund’s story is a classic example of junior officer innovation. See http://www.public.navy.mil/subfor/underseawarfaremagazine/issues/archives/issue_15/ekelund.html .
  11. Captain Gene Porter, USN (Retired) informed me of an action on Action of 9 February 1945 where the Royal Navy submarine HMS Venturer sank the U-boat U-864 in the North Sea off the Norwegian coast. This action is the first and so far only incident of its kind in history where one submarine has intentionally sunk another submarine in combat while both were fully submerged.
  12. For a comprehensive account see “Submarine Warfare and Tactical Development: A Look – Past, Present, and Future: Proceedings of the Submarine Development Group TWO & Submarine Development Squadron TWELVE 50th Anniversary Symposium 1949-1999,” U.S. Naval Submarine Base Groton, Connecticut: Submarine Development Squadron TWELVE, 1999.
  13. The Los Angeles or 688 class had twice the shaft horsepower of the proceeding 637 class, and cost about twice as much. It originally sacrificed under ice and electronic surveillance capabilities to keep the costs down. The submarine force was under the gun from Secretary of Defense MacNamara’s Systems Analysis Office to demonstrate that the benefits of about 20% more speed were worth the cost. In fact, since both classes had the same sonars and weapons, the tactical speeds for detecting targets attack ranges were the same, and the 637 could conduct under ice and electronic surveillance missions. Captain Gene Porter, USN (Retired) provided oversight from OSD’s Systems Analysis Office. Studies demonstrated that the extra 688 speed was most useful in evading enemy torpedoes, but not worth twice the cost of the submarine.
  14. Submarine Development Group 2 became Submarine Development Squadron 12 in the mid-1970s. The Naval Electronics Systems Command is now the Space and Naval Warfare Systems Command (SPAWAR).
  15. The author contributed to writing the CIDS Fleet Exercise Analysis Guide and wrote the OTH-T Fleet Exercise Analysis Guide.
  16. ELF frequencies are 3-30 Hertz, corresponding to wave lengths 10,000 to 100,000 kilometers. The data rate is a few characters per minute. ELF energy penetrates seawater to a greater depth than higher frequencies, allowing the submarine to remain at depth and receive communications. The prototype ELF transmitter was on the order of 100 miles long, located in upper Michigan and required the submarine to tow a long antenna. The program used a bull under the transmitter to monitor any biological effects.
  17. The author also used this data in 1982 to model and analyze the first Chief of Naval Operations Strategic Studies Group Combined Arms ASW concept for rapidly gaining forward sea control and attacking Soviet submarines in their bastions. This work resulted in quickly changing U.S. naval war plans. Over their careers, Admiral William A. Owens expanded the original SSG concept into his Systems-of-Systems ideas and Vice Admiral Arthur Cebrowski into his Net Centric Warfare concepts. John T. Hanley, Jr. “Creating the 1980s Maritime Strategy and Implications for Today.” Naval War College Review, 2014: 11-30 provides more details.
  18. Christopher Ford and David Rosenberg, The Admirals’ Advantage: U.S. Navy Operational Intelligence in World War II and the Cold War (Annapolis; MD: Naval Institute Press, 2005), p. 84.
  19. John B. Hattendorf, The Evolution of the U.S. Navy’s Maritime Strategy, 1977–1986, Newport Paper 19 (Newport, R.I.: Naval War College Press, 2004), pp. 32-33.
  20. Admiral William N. Small, U.S. Navy (Retired), “Oral History.” Interviewed by David F. Winkler, Naval Historical Foundation, 1997, p. 56.
  21. Ibid. Hanley 2014 and Petrucelli, Joe. 2021. “John Hanley on Convening the Strategic Studies Group and Assessing War Plans.” CIMSEC. March 23. Accessed April 26, 2021. https://cimsec.org/john-hanley-on-convening-the-strategic-studies-group-and-assessing-war-plans/.
  22. The principal argument against such prototypes is the cost of maintaining one-off designs. Space in this article does not permit an exploration of how technologies such as 3D printing could change this calculus.
  23. The author was Deputy Director of the CNO Strategic Studies Group at this time.

Featured Image: Navy Petty Officer 2nd Class Shawn Halliwell monitors a waterfall display on his sonar system during a battle drill aboard the strategic missile submarine USS Maryland, Feb. 16, 2009. (DoD Photo).

For America and Japan, Peace and Security Through Technology, Pt. 2

By Capt. Tuan N. Pham, USN

Part one of this two-part series calls for a bilateral technology roadmap to field and sustain a lethal, resilient, and rapidly adapting technology-enabled Joint Force (Multi-Domain Defense Force) that can seamlessly conduct high-end maritime operations in the Indo-Pacific.

Part two underscores the imperatives to do so, and provides geostrategic context by framing the growing technology competition within the region through the lens of Great Power Competition (GPC) in the 21st century. China, Russia, America, and Japan are intertwined in GPC, with all four nations fully committed to national security innovation for competitive advantages.

China – Seeking Global Technological Dominance (Technological Revisionism)

China has embarked on a whole-of-nation effort to achieve civil-military development and integration of emerging technologies, seeking to become a Science and Technology (S&T) superpower with a strong economy, a powerful military, and a harmonious society – able to fight and win global conflicts across every domain of strategic competition (economic, political, ideological, and military). Using national tools – government, industry, and academia – to promote domestic technological innovation and access foreign technology, Beijing hopes to leapfrog the United States and the other industrialized nations in technological prowess en route to global preeminence and the Chinese Dream of national rejuvenation. China invests heavily in advanced dual-use technologies, hoping that they will improve the People’s Liberation Army’s (PLA) capabilities and increase its capacities to achieve battlefield dominance across contested and interconnected warfighting domains.

The Military-Civil Fusion (MCF) strategy’s ultimate goal is the “gradual build-up of China’s unified military-civil system of strategies and strategic capabilities.” The strategy is not an addition to China’s other national strategic priorities, but rather a “supporting strategy whose parts integrate into China’s system of national strategies to form a broad national strategic system” that advances the Chinese Communist Party’s (CCP) overarching security and development goals and realizes its strategic aspirations (Chinese Dream). General Secretary of the CCP Xi Jinping described the MCF strategy as a “major policy decision designed to balance security and development, and is a major measure in response to complex security threats and a means of gaining strategic advantages.”

As the name suggests, the strategy seeks to synchronize and integrate civil and military operations, activities, and investments. The civil aspects encompass the economic and social systems that relate to national security as well as the contested domains and competitive technologies such as maritime, space, cyberspace, autonomy, and artificial intelligence (AI) that are intricately linked to the development and sustainment of “New Type Combat Capabilities.” The military aspects cover every aspect of national security to include the PLA and enabling national defense technologies and infrastructures. The MCF strategy gives the PLA unfettered access into civil entities developing and acquiring advanced technologies, to include state-owned and private firms, universities, and research programs such as the Thousand Talents Program. All in all, the strategy’s core goals are the optimization of national resource allocation, generation of combat readiness, and manifestation of economic prosperity.

The drive for technological dominance is not a new policy. The fixation with advanced technology dates back to the founding of the country and the founder Mao Zedong. Mao envisioned the “socialist world’s overwhelming superiority in S&T and came to see technological strength as central to economic, ideological, and geopolitical power for China” – a view that CCP leaders still hold today. Xi characterized the national pursuit of technology as “ganchao” (catch up and surpass). The strategic objective is one of the CCP’s most defining and enduring goals, and provides an essential policy framework to understand “China’s ambition to become a technological superpower, bringing together the legacies of Marxism, Maoism, and the relentless drive toward modernization [realization of the Chinese Dream] by the CCP.”    

Xi embraced “ganchao” and made it his own. In January of 2013, shortly after assuming power, Xi laid out his vision for China’s future through the lens of national rejuvenation and reinvigorated national efforts to “catch up and surpass,” reinforcing the legacy linkage of technological advancements to the ideology and identity of the CCP. Four years later, at the 19th National Congress of the CCP, Xi reaffirmed the strategic roadmap for the Chinese Dream. Xi moved China forward from Mao’s revolutionary legacy and Deng’s iconic policy dictum – “observe calmly, secure our position, cope with affairs calmly, hide our capacities and bide our time, be good at maintaining a low profile, and never claim leadership” – and heralded a new era in Chinese national development. To Xi, technological innovation, by all means, is necessary to surpass the West, and technological dominance is the path to realize global preeminence by 2049.             

Beijing’s Made in China 2025 and Internet Plus policies are two key components of China’s strategic plan to achieve technological dominance by the end of the decade and global preeminence by 2049. The former aims to push the economy towards higher value-added manufacturing and services through digital technology and automation. It is a blueprint to upgrade the manufacturing capabilities of Chinese industries into a more technology-intensive dynamo. The latter aims to capitalize on China’s massive online consumer market by building up the country’s domestic mobile Internet, cloud computing, big data, and Internet of Things (IoT) sectors. It is a roadmap to integrate information technology with the key industries of manufacturing, commerce, banking, and agriculture. Both policies have been characterized as an innovation mercantilism that leverages the power of the state to “alter competitive dynamics in global markets from industries core to economic competitiveness.” 

In the maritime domain, Xi called for accelerating innovation in marine technologies to increase capacity and improve naval development capability, fostering the development of domestic marine industries in support of both PLA modernization and reform efforts and national civilian projects like the Made in China 2025 and Digital Belt and Road Initiative. He promoted marine connectivity and practical collaboration to develop “blue partnerships” among like-minded maritime nations under the One Belt and One Road framework at last year’s China Marine Economy Expo.

Russia – Rebuilding Technology Base for National Greatness (Technological Revanchism)

In 2017, Russian President Vladimir Putin presciently declared that “whoever becomes the leader in this sphere [explicitly AI and implicitly technology at large] will become the ruler of the world.” The bold statement summarizes the purpose and intent behind the 2017 Strategy for the Development of an Information Society for 2017–2030, one of Putin’s key policy initiatives to restore Russia to its former glory. The strategy prioritizes areas deemed essential for the successful development of Russian information and communication technologies, specifically:

  • New generation of electronic networks
  • Processing of large volumes of data
  • AI
  • Electronic identification and authentication
  • Cloud computing
  • Post-industrial Internet
  • Robotics
  • Biotechnologies Information security

The strategy also devotes considerable attention to “ideological concerns, including the prioritization of Russian traditional spiritual and cultural values, popularization of Russian culture and science abroad, and proliferation of steady cultural and educational contacts with Russian compatriots living abroad.” The intent relates to the “Russian World” concept that aims to propagate Russian soft power abroad.

The 2017 Strategy for the Development of an Information Society supplements and complements the greater 2015 National Security Strategy (NSS) that codifies Russia’s strategic interests and national priorities. The strategic document identifies Russian national interests as “strengthening the country’s defense, ensuring political and social stability, raising the living standard, preserving and developing culture, improving the economy, and enhancing Russia’s status as a leading world power.” The strategy reflects a Russia more confident in its ability to defend its sovereignty, resist Western pressure and influence, and realize its great power aspirations.

The Russian military remains essential to Putin’s ambitious and expansive strategic plan to restore Russia to its former Soviet greatness. The incremental modernization of Russia’s military depends on the future viability and sustainability of the Russian defense industry. Moscow funds or subsidizes its defense industry primarily through four state-supported investment approaches that provide insights into current defense priorities and future defense developments: “In certain areas, the Kremlin invested significant resources in recapitalizing key defense corporations indicating its prioritization of the systems they produce and the technologies they develop. In other areas, Russia engaged in enduring support of critical defense corporations demonstrating its long-term commitment to key technologies. Another approach reflects the incorporation of its defense corporations into state-owned enterprises. The last approach is speculative investment in dual-use technologies through means such as venture capital.”

America – Maintaining Global Technology Leadership (Technological Superiority)

The 2017 NSS charges the National Security Enterprise to promote American prosperity by leading in research, technology, invention, and innovation to sustain and expand competitive advantages in today’s strategic environment of GPC. The tasked priority actions include understanding worldwide S&T trends, attracting and retaining inventors and innovators, leveraging private capital and expertise to build and innovate, and rapidly fielding inventions and innovations. The NSS also charges the Department of Defense (DOD) to preserve the peace through strength by renewing military capabilities to retain military overmatch for competitive advantages. Overmatch strengthens diplomacy and shapes the international environment to protect and advance U.S. national interests. To maintain military overmatch, the United States must restore the ability to build innovative defense capabilities, force readiness for major conflict and strategic competition, and size of the force so that it is capable of operating at a sufficient scale and for a duration to win across a range of contingencies and interconnected domains. Lastly, the NSS calls on key allies and partners to modernize, acquire the necessary joint warfighting capabilities, improve force readiness, expand the size of their forces, and affirm the political will to compete and win.     

Within the DOD, the 2018 National Defense Strategy, 2018 National Military Strategy, and Defense Planning Guidance collectively highlight the need for competitive technological innovation in national security to sustain and expand the U.S. military competitive advantages, and direct greater partnerships between the DOD and commercial enterprises to out-innovate global competitors. Nowhere is the need for commercial technological innovation more compelling than in the DOD. The 2019 Digital Modernization Strategy states that “technological innovation is a key element of future readiness and essential to preserving and expanding U.S. military competitive advantage in the face of near-peer competition and asymmetric threats.” The strategy calls for the ability, flexibility, and agility to innovatively and rapidly field technology-enabled warfighting capability to the warfighter faster than potential adversaries. The guiding principles for DOD’s acquisition of commercial technology capabilities underscore that “preserving and expanding our military advantage depends on our ability to deliver technology faster than our adversaries and the agility of our enterprise to adapt our way of fighting to the potential advantages of innovative technology.”   

Within the Department of Navy, Chief of Naval Operations Admiral Michael Gilday emphasizes the role of allies and partners in enforcing international maritime norms and operating together as a technology-enabled Joint Force. He declared his intention to bring key U.S. allies and partners along with the U.S. Navy (USN) as it moves into high-end maritime operations at last year’s 12th Regional Sea Power Symposium. He told his contemporaries from more than 30 foreign navies that “today, the very nature of our operating environment requires shared common values and a collective approach to maritime security…and that makes steady, enduring Navy-to-Navy relationships more important than ever”. He concluded his remarks by addressing the fluid technological environment and how emerging disruptive technologies affect the character of naval operations and warfare (warfighting). He underscored tactical cloud computing, AI, and machine learning as technological drivers of change for the USN and by extension allied and partnered navies. 

Admiral Gilday expounded on these points when he promulgated his initial guidance to the Fleet a few months later. The directive, in the form of a fragmentary order (FRAGO), simplified, prioritized, and built on the foundation of “A Design for Maintaining Maritime Superiority 2.0” issued by his predecessor. The FRAGO directs dedicated efforts across three critical areas – warfighting, warfighters, and the future Navy – and focuses on building alliances and partnerships to broaden and strengthen global maritime awareness, access, capabilities, and capacities. 

The FRAGO aligns well with the Secretary of Navy’s (SECNAV) guidance to mitigate the unpredictability of the future by building and maintaining a “robust constellation of partners and allies to work with us to solve common security challenges which are beyond our ability to predict, or defeat alone.” The SECNAV underscored two key initiatives. First, cooperative international agreements jointly produce, procure, and sustain naval armaments to reduce U.S. and partner costs, improve bilateral interoperability, and forge closer ties between U.S. and partner nation operating forces and acquisition and logistics communities. Second, S&T and data exchange agreements facilitate Research and Development (R&D) and information exchanges with allied or friendly nations, and marshal the technological capabilities of the United States and our key allies and partners to accelerate R&D and fielding of equipment for the common defense.  

The FRAGO also aligns well with the newly released Tri-Service Maritime Strategy (Advantage at Sea, Prevailing with All-Domain Naval Power). The joint strategy focuses on China and Russia and guides the Naval Service (USN, U.S. Marine Corps, and U.S. Coast Guard) for the next decade to prevail across the continuum of competition. The strategy has two main components. First, it articulates the employment of integrated all-domain naval power across the competition continuum. Second, it guides the development of an integrated all-domain naval force.

Japan – Advancing Toward Society 5.0 (Technological Evolution)

Japan takes a broader societal perspective of the Fourth Industrial Revolution (4IR). In 2017, Japanese Prime Minister Shinzo Abe unveiled Society 5.0, a future society that leverages technology in the key pillars of infrastructure, finance technology, healthcare, logistics, and AI to achieve economic advancement and solve societal problems. The super-smart society (Society 5.0) is the fifth step in the evolution of human development. It follows the information society (Society 4.0), industrial society (Society 3.0), agricultural society (Society 2.0), and hunting and gathering society (Society 1.0). The vision is to liberate people from routine tasks and to meet the needs of every person while not surrendering all control to technology. Society 5.0 boldly creates a social contract and economic model by fully integrating the technological innovations of the 4IR throughout every facet of Japanese society. The dual-use nature of these developing civil technologies also has national security applications and implications. 

Like in the United States, GPC influences Japan’s national security perspectives as outlined in its NSS. The NSS shapes Japanese defense priorities through the lens of enduring regional threats like China, North Korea, and Russia; emerging contested and interconnected domains of space, cyberspace, and the electromagnetic spectrum (EMS); the U.S.-Japan Alliance; and the Free and Open Indo-Pacific. Within the Ministry of Defense (MOD), the National Defense Planning Guidelines for FY2019 and Beyond, Mid-Term Defense Program FY2019-2023, and 2019 R&D Vision call for the development of a Multi-Domain Defense Force (Joint Force) that can conduct seamless and integrated cross-domain operations to preserve the security, prosperity, and independence of Japan. These operations fuse the new domains of space, cyberspace, and the EMS with the traditional domains of maritime, air, and land. The challenge for the MOD is how best to leverage the pervasive technological innovation happenings in the government, private industry, and academia within Japan and collaborate with the U.S. DOD on technological innovation.

Japan Maritime Self-Defense Force (JMSDF), in coordination with the other services, continues to make prudent targeted investments to develop a Multi-Domain Defense Force, strengthen the U.S.-Japan Alliance, take better care of its personnel, and hedge for the future. The FY2019,  FY2020, and FY2021 defense budgets (JMSDF allocation) focus on building capabilities and increasing capacities in command, control, communications, computers, ISR, and targeting (C4ISRT), information warfare, cyberspace network operations and defense, space warfare, undersea warfare, and ballistic missile defense. The JMSDF also makes investments in four enabling organizational areas. Firstly, enhance function in all phases through continuous enhancement of necessary capabilities. Secondly, better develop concepts necessary for defending the country by utilizing the JMSDF capabilities to their full potential. Thirdly, further strengthen cooperation through deepening relationships with other navies with the U.S.-Japan Alliance as its core, and through making full use of joint and comprehensive relationships with various partners. Lastly, improve personnel programs, the foundation of the JMSDF, both in quality and in quantity.

Technology Competition

GPC is alive and well in the Indo-Pacific, particularly in the contested technology domain. Russia, China, America, and Japan are entangled in a competitive technology race for economic prosperity and national security. Although allied Washington and Tokyo are fully committed to national security technological innovation as evidenced by their respective national defense strategies and mutual pursuit of a technology-enabled Joint Force (Multi-Domain Defense Force), the broader DOD (USN) and MOD (JMSDF) must better leverage emerging technologies and developing concomitant warfare concepts (doctrines) to adapt to the new way of fighting. Otherwise, the United States and Japan risk ceding the technology domain and consequently military superiority in the Indo-Pacific to revisionist China and revanchist Russia.

CAPT Pham is a maritime strategist, strategic planner, naval researcher, and China Hand with 20 years of experience in the Indo-Pacific. He completed a research paper with the Office of Naval Research (ONR) at the U.S. Naval War College (USNWC) in 2020. The articles are derived from the aforesaid paper. The views expressed here are personal and do not reflect the positions of the U.S. Government, USN, ONR or USNWC.

Featured Image: SAN DIEGO (Feb. 23, 2017) Cmdr. Mark Stefanik, commanding officer of the littoral combat ship USS Montgomery (LCS 8), discusses the ship’s engineering capabilities with Japan Maritime Self Defense Force Director of Ships and Weapons Division, Capt. Shinichi Imayoshi. (U.S. Navy photo by Fire Controlman 1st Class Nathaniel J. Wells/Released)

For America and Japan, Peace and Security Through Technology, Pt. 1

By Capt. Tuan N. Pham, USN

This is part one of a two-part series on the urgent need for a bilateral technology roadmap to field and sustain a lethal, resilient, and rapidly adapting technology-enabled Joint Force that can seamlessly conduct high-end maritime operations in the Indo-Pacific…a fitting legacy for former Japanese Prime Minister Shinzo Abe and his successor Yoshihide Suga, staunch champions of the enduring U.S.-Japan Alliance. 

In today’s strategic environment of Great Power Competition (GPC), global powers actively vie for preeminence. The growing competition is particularly acute in the technology domain, as evidenced by the ongoing technology race amongst the world powers. The global powers invest heavily in Fourth Industrial Revolution technologies to build national power, global influence, and international prestige and to prepare for uncertain economic and security futures. 

The United States and Japan are fully committed to national security technological innovation. The 2018 U.S. National Defense Strategy (NDS) and 2020 Defense of Japan (DOJ) White Paper call for the harnessing, investing, and protecting of their respective technology bases for competitive advantages. Both nations share the strategic imperative and urgency to develop and sustain a technology-enabled Joint Force (otherwise known in Japan as the Multi-Domain Defense Force) that can conduct synchronized, distributed, and integrated operations across the interconnected and contested battlespaces in furtherance of the alliance’s shared national interests. The changing character of warfare has made warfighting a transregional, multi-domain, and multi-functional activity. The U.S. Navy (USN) and Japan Maritime Self-Defense Force (JMSDF) must, therefore, better leverage emerging maritime technologies and developing concomitant naval warfare concepts and doctrines to adapt to the new way of fighting. Otherwise, the allied navies risk ceding the technology domain and consequently maritime superiority in the Indo-Pacific to the competing navies of revisionist China and revanchist Russia – People’s Liberation Army Navy and Russian Federation Navy, respectively.

How China and Russia View Technological Competition

For General Secretary of the Chinese Communist Party (CCP) Xi Jinping, technological advancement is not only a means to economic, political, and military power and influence for the CCP; it is also the “Long March” (or way) toward regional hegemony and ultimately global preeminence and an ideological end to itself: the Chinese Dream of national rejuvenation. The Chinese Dream offers hope for and validation of China as a great rising power after decades of political, economic, and social struggles. The commitment to advanced technologies reflects Beijing’s longing for past imperial glory (Middle Kingdom), its wishful guarantee against another century of humiliation (19th-century colonialism), and steadfast ambition to surpass the United States and Europe (21st century of Asia preeminence). To that end, China endeavors to become a global leader in every sector and domain and dominate emerging “game-changing” technologies like artificial intelligence (AI), autonomy, and blockchain in accordance with its Made in China 2025 and Internet Plus policy initiatives. To Xi, technological innovation, by all means, is necessary to surpass the West, and technological dominance is the path to realize global preeminence by 2049 – the essence of the Chinese Dream.

Russian President Vladimir Putin likewise understands and appreciates the disruptive potential of technology as he tries to restore Russia to its former greatness. In 2017, he presciently declared that “whoever becomes the leader in this sphere [explicitly AI and implicitly technology at large] will become the ruler of the world.” The bold statement summarizes well the purpose and intent behind the 2017 Strategy for the Development of an Information Society for 2017–2030, one of Putin’s key policy initiatives to rebuild Russia to its past Soviet glory. The technology strategy supplements and complements the greater 2015 National Security Strategy which reflects a Russia more confident in its ability to defend its sovereignty, resist Western pressure and influence, and realize its great power aspirations. 

Bilateral Technology Roadmap

The Department of Defense (DOD) technological advantage depends on a healthy and secure national security innovation base that includes both traditional and non-traditional partners. (2018 U.S. NDS)    

Japan will enhance priority defense capability areas as early as possible – strengthening capabilities necessary for cross-domain operations and core elements of defense capability by reinforcing the human resource base, technology base, and defense industrial base. (2020 DOJ White Paper)

The U.S. NDS and DOJ White Paper call for harnessing, investing, and protecting their respective national security innovation and technology bases to better respond to the growing challenges to the rules-based liberal international order (LIO) by illiberal powers like China and Russia. Washington and Tokyo both want to develop innovative technological approaches, make targeted and sustained technological investments, and execute disciplined fielding of critical warfighting capabilities to the Joint Force (Multi-Domain Defense Force ) – a force that can protect national and allied interests, advance the bilateral military-to-military relationship, strengthen the strategic alliance, promote the Free and Open Indo-Pacific, and uphold the LIO. 

Now is the opportune time to build a bilateral technology roadmap to field and sustain a lethal, resilient, and adaptable Joint Force, enabled by technology, that can seamlessly conduct high-end maritime operations in the Indo-Pacific – a predominantly maritime fight in a maritime domain. To do otherwise is a missed opportunity to strengthen the enduring U.S.-Japan alliance, increase the stabilizing regional security, and reinforce the weakening LIO that has provided global security and prosperity for over 70 years.

The technology roadmap should leverage extant USN and JMSDF technology strategies and plans to identify and prioritize joint projects for collaboration across the respective governments, private industries, and academia. By doing so, the allied stakeholders can identify current, proposed, and potential collaborative projects. Stakeholders must assess the cultural, institutional, organizational, and legal challenges of each country to determine how best to promote and incentivize bilateral collaboration. They must also expand the framework to all the joint services, and eventually extend the framework to other key allies and partners in the region and beyond.

Proposed Roadmap Framework

Purpose and Scope: In alignment with the defense strategies of the United States and Japan, the roadmap should examine the strategic environment in the innovative technology domain through the lens of GPC. This roadmap should:

  • Characterize the current state, development, and employment of disruptive technologies across the USN and JMSDF.
  • Envision the future integration of these emerging maritime technologies and developing concomitant naval concepts (doctrines) into the Joint Force.
  • Identify the barriers to realizing that joint future.
  • Outline the proposed actions to overcome those barriers.
  • Leverage the pervasive technological innovations happening in government, private industry, and academia within the United States and Japan.
  • Inform the actions of stakeholders who possess limited resources (human capital, money, and knowledge), incongruent cultures, and sometimes conflicting priorities to effectively and efficiently accelerate the development, fielding, and integration of joint warfighting capabilities in a fiscally constrained budgetary environment across the current U.S. Future Years Defense Program and Japan Mid-Term Defense Program.

Vision and Goals. The USN and JMSDF should contribute to the development and sustainment of a technology-enabled Joint Force. In the near term, both allied navies should develop a bilateral technology roadmap to deliver joint warfighting capabilities and increase joint warfighting capacities to the Multi-Domain Defense Force. In the long-term, each allied navy should modify its respective Doctrine, Organization, Training, Material Solutions, Leadership and Education, Personnel, Facilities, and Policies (DOTMLPF-P) to provide the infrastructure and systems required to support the development, fielding, integration, and sustainment of these new joint warfighting capabilities and capacities. 

The broader U.S. DOD and Japan Ministry of Defense (MOD) should also modernize their respective defense infrastructures (to include ecosystems of technical professionals, research facilities, and partnerships) to better support cutting-edge Science and Technology (S&T), realize the technology-enabled Joint Force, and maintain technological superiority over a rising China and resurging Russia, which are also making rapid technological advancements and incorporating them into their respective modernized forces. Long-term strategic success requires focused investment in four fundamental S&T areas – fundamental research, technical workforce, defense laboratories, and partnerships with the private sector and key allies and partners.

Objectives: The USN and JMSDF should consider broad and interlocked objectives to realize the aforesaid vision and goals. These include:

  • Define and prioritize emerging maritime technologies and developing concomitant naval concepts (doctrines) to maintain warfighting superiority.
  • Be technically and fiscally capable of fielding and sustaining maritime technologies at will.
  • Be interoperable and cyberspace-secure, and have adequate infrastructure and logistics support in both nations.
  • Be consistent with the programmatic principles of affordability, interoperability, agility, and resiliency.
  • Leverage emerging accelerated acquisition processes to enable the rapid development, demonstration, and fielding of maritime technologies.
  • Develop policies to allow the implementation of new bilateral warfighting capabilities and advance mutual naval interests.
  • Promote joint warfighter’s trust in these new maritime technologies.
  • Build on the Navy-to-Navy technology exchange and collaboration to extend to the other services and expand to other key allies and partners as and when appropriate.

This concludes part one of a two-part series that calls for a bilateral technology roadmap to field and sustain a lethal, resilient, and rapidly adapting technology-enabled Joint Force that can seamlessly conduct high-end maritime operations in the Indo-Pacific. Part two underscores the imperatives to do so and describes the ongoing technology competition within the region through the lens of GPC in the 21st century.    

CAPT Pham is a maritime strategist, strategic planner, naval researcher, and China Hand with 20 years of experience in the Indo-Pacific. He completed a research paper with the Office of Naval Research (ONR) at the U.S. Naval War College (USNWC) in 2020. The articles are derived from the aforesaid paper. The views expressed here are personal and do not reflect the positions of the U.S. Government, USN, ONR or USNWC.

Featured photo: RADM Winter and RADM Saito discuss Science and Technology partnerships between the U.S. and Japan, aboard Japanese JS Izumo (DDH-183). Photo credit: Office of Naval Research, released. https://twitter.com/usnavyresearch/status/743474786643251201

Software-Defined Tactics and Great Power Competition

By LT Sean Lavelle, USN

There are two components to military competency: understanding and proficiency. To execute a task, like driving a ship, one must first understand the fundamentals and theory—the rules of navigation, how the weather impacts performance, how a ship’s various controls impact its movement. Understanding is stable and military personnel forget the fundamentals slowly. Learning those fundamentals, though, does not eliminate the need to practice. Failing to practice tasks like maneuvering the ship in congested waters or evaluating potential contacts of interest will quickly degrade operational proficiency.

In the coming decades, human understanding of warfighting concepts will still be paramount to battlefield success. Realistic initial training and high-end force-on-force exercises will be critical to building that understanding. However, warfighters cross-trained as software developers will make it far easier to retain proficiency without as much rote, expensive practice. Their parent units will train them to make basic applications, and they will use these skills to translate their hard-won combat understanding into a permanent proficiency available to anyone with the most recent software update.

These applications, called software-defined tactics, will alert tacticians to risk and opportunity on the battlefield, ensuring they can consistently hit the enemy’s weak points while minimizing their own vulnerabilities. They will speed force-wide learning by orders of magnitude, create uniformly high-performing units, and increase scalability of conventional forces.

Vignette

Imagine an F-35 section leader commanding two F-35 fighters tasked to patrol near enemy airspace and kill any enemy aircraft who approach. As the F-35s establish a combat air patrol in the assigned area, the jet’s sensors indicate there are two flights of adversary aircraft approaching the formation, one from off the nose to the north and the other off the right wing, from the east. Each of these flights consists of four bandits that are individually overmatched by the advanced F-35s. Safety is to the south.

These F-35s have enough missiles within the section to reliably kill four enemies, but are facing eight. Since the northern group of bandits are a bit closer, the section leader decides to move north and kill them. The section’s volley of missiles all achieve solid hits, and there are now four fewer enemy aircraft to threaten the larger campaign.

Now out of missiles, the section turns south to head back home. That’s when the section leader realizes the mistake. As the F-35s flowed northward, they traveled farther away from safety while the eastern group of bandits continued to close on the F-35s, cutting off their path home. 

The only options at this point are to try to travel around the bandits or go through them. A path around them would run the fighters out of fuel, so the flight leader goes straight for the four enemy aircraft, hoping that the bandits will have seen their friends shot down and run away in fear.

The gambit fails, however, and the remaining enemy aircraft close with the F-35s and shoot them down. What should have been an easy victory ended in a tactical stalemate, and in a war where the enemy can build their simple aircraft faster than America can build complex F-35s, the 2:1 exchange ratio is in their favor strategically.

This could have gone differently.

Persistent and Available Tactical Lessons 

Somebody in the F-35 fleet had likely made a mistake similar to this example during a training evolution long before the fateful dogfight. They might have even taken a few days out of their schedule to write a thoughtful lessons-learned paper about it. This writing is critically important. It communicates to other pilots the fundamental knowledge required to succeed in combat. However, success in combat demands not just understanding, but proficiency as well. An infantryman who has not fired a rifle in a few years likely still understands how to shoot, but their lack of practice means they will struggle at first.

Under a software-defined tactics regime, in addition to writing a paper, the pilot could have written software that would have alerted future pilots about the impending danger. While those pilots would still need to understand the risk, ever-watching software would alert them to risks in real-time so that a lack of recent practice would not be fatal. A quick software update to the F-35 fleet would have dramatically and permanently reduced the odds of anyone ever making that mistake again.

The program would not have had to be complex. It could have run securely, receiving data from the underlying mission system without transmitting data back to the aircraft’s mission computers. This one-way data pipe would have eliminated the potential for ad-hoc software to accidentally hamper the safety of the aircraft.

The F-35’s mission computer in our example already had eight hostile tracks displayed. The F-35’s computer also knew how many missiles it had loaded in its weapons bay. If that data were pushed to a software-defined tactics application, the coder-pilot could have written a program that executed the following steps:

  1. Determine how many targets can be attacked, given the missiles onboard.
  2. If there are enough missiles to attack them all, recommend attacking them all. If there are more hostile tracks than missiles (or a predefined missile-to-target ratio), run the following logic to determine which targets to prioritize.
  3. Determine all the possible ordered combinations of targets. There are 1,680 combinations in the original example—a small number for a computer.
  4. For each combination, simulate the engagement and determine if an untargeted aircraft could cut off the escape towards home. Store the margin of safety distance.
  5. If a cutoff is effective in a given iteration, reject that combination of targets and test the next one.
  6. Recommend the combination of targets to the flight commander with the widest clear path home. Alert the flight commander if there is no course of action with a clear path home.

This small program would have instantly told the pilot to engage the eastern targets, and that engaging the targets to the north would have allowed the eastern targets to cut off the F-35s’ route to safety. Following this recommendation would have allowed the F-35s to maintain a 4:0 kill ratio and live to fight another day.

A simple version of this program could have been written by two people in a single day—16 man-hours—if they had the right tools. Completing tactical testing in a simulator and ensuring the software’s reliability would take another 40-80 man-hours. 

Alternatively, writing a compelling paper about the situation would take a bit less time: around 20-40 hours. However, a force of 1,000 pilots spending 30 minutes each to read the paper would require 500 man-hours. Totaling these numbers, results in 96 man-hours on the high-end for software-defined tactics versus 520 man-hours on the low-end for writing and reading. While both are necessary, writing software is much more efficient than writing papers.

To truly train the force not to make this mistake without software-defined tactics, every pilot would need to spend around five hours—a typical brief, simulator, and debrief length—in training events that stressed the scenario. That yields an additional 10,000 man-hours, given one student and one instructor for each training event. At that point, all of the training effort might reduce instances of the mistake by about 75%.

To maintain that level of performance, aircrew would need to practice this scenario once every six months in simulators. That is 10,000 hours every six months. Over five years, you’d need to spend more than 100,000 man-hours to maintain proficiency in this skill across the force.

Software-defined tactics applications do not need ongoing practice to maintain currency. They do need to be updated periodically to account for tactical changes and to improve them, though. Budgeting 100 man-hours per year is reasonable for an application of this size. That is 500 man-hours over five years.

Pen-and paper updates require 100,000 man-hours for a 75% reduction in a mistake. Software-driven updates require 596 man-hours for a nearly 100% reduction. It is not close. 

When a software developer accidentally creates a bug, they code a test that will alert them if anyone else ever makes that same mistake in the future. In this way, a whole development team learns and gets more reliable with every mistake they make. Software-defined tactics offer that same power to military units.

Software Defined Tactics in Action

While the F-35 example is hypothetical, software-defined tactics are not. The Navy’s P-8 community has been leveraging a software-defined tactics platform for the last four years to great effect. The P-8 is a naval aircraft primarily designed to hunt enemy submarines. Localization—the process by which a submarine-hunting asset goes from initial detection to accurate estimate of the target’s position, course, and speed—is among the most challenging parts of prosecuting adversary submarines.

On the P-8, the tactical coordinator decides on and implements the tactics the P-8 will use to localize a submarine. It takes about 18 months of time in their first squadron to qualify as a tactical coordinator and demonstrate reliable proficiency in this task. These months include thousands of hours of study, hundreds of hours in the aircraft and simulator, and dozens of hours defending their knowledge in front of more experienced tacticians.

When examining the data the P-8 community collects, there is a clear and massive disparity in performance between inexperienced and experienced personnel. There is another massive disparity between those experienced tacticians who have been selected to be instructors because of demonstrated talent and those who have not. In other words, there are both experience and innate talent factors with large impacts on performance in submarine localization.

The community’s software-defined tactics platform has made it so that a junior tactician (inexperienced and possibly untalented) with 6-months of time in platform performs exactly as well as an instructor (experienced and talented) with 18-months in platform. It does this largely by reducing tactician mistakes—alerting them to the opportunities the tactical situation presents and dissuading them from enacting poor tactical responses.

This makes the P-8 force extremely scalable in wartime. In World War II, America beat Japan because it was able to quickly and continually train high-quality personnel. It took nine months to train a basic fighter pilot in 1942. It takes two or three years to go from initial flight training until arriving at a fleet squadron in 2021. Reducing time to train with software-defined tactics will restore that rapid scalability to America’s modern forces.

The P-8 community has had similar results for many tactical scenarios. It does this, today, with very little integration into the P-8s mission system. Soon, its user-built applications will be integrated with a one-way data pipe from the aircraft’s mission system that will enable the full software-defined tactics paradigm. A team called the Software Support Activity at the Naval Air Systems Command will manage the security of this system and provide infrastructure support. Another team consisting of P-8 operators at the Maritime Patrol and Reconnaissance Weapons School will develop applications based on warfighter needs. 

Technical Implementation

Implementing this paradigm across the US military will yield a highly capable force that can learn at speeds orders of magnitude faster than its adversaries. Making the required technical changes will be inexpensive.

On the P-8, implementing a secure computing environment with one-way data flow was always part of the acquisition plan. That should be the case for all future platform acquisitions. All it requires is an open operating system and a small amount of computing resources reserved for software-defined tactics applications.

Converting legacy platforms will be slightly more difficult. If a platform has no containerized computing environment, it is possible to add one, though. The Air Force recently deployed Kubernetes—a framework that allows for securely containerized applications to be inserted in computing environments—on a U-2. Feeding mission-system data to this environment and allowing operators to build applications with it will enable software-defined tactics.

If it is possible to securely implement this on the U-2, which was built in 1955, any platform in the U.S. arsenal can be modified to accept software-defined tactics applications.

Human Implementation

From a technical standpoint, implementing this paradigm is trivial. From the human perspective, it is a bit harder. However, investing in operational forces’ technical capabilities without the corresponding human capabilities will result in a force that operates in the way industry believes it should, rather than the way warfighters know it should. A tight feedback loop between the battlefield reality and the algorithms that help dominate that battlefield is essential. Multi-year development cycles will not keep up.

As a first step, communities should work to identify the personnel they already have in their ranks with some ability to develop software. About a quarter of Naval Academy graduates enter the service each year with majors that require programming competency. These officers are a largely untapped resource.

The next step is to provide these individuals with training and tools to make software. An 80-hour, two-week course customized to the individual’s talent level is generally enough to get a new contributor to a productive level on the P-8’s team. A single application pays for this investment many times over. Tools available on the military’s unclassified and secret networks like DI2E and the Navy’s Black Pearl enable good practices for small-scale software development.

Finally, this cadre of tactician-programmers should be detailed to warfare development centers and weapons schools during their non-operational tours. Writing code and staying current with bleeding-edge tactical issues should be their primary job once there. Given the significant contribution this group will make to readiness, this duty should be rewarded at promotion boards to maintain technical competence in senior ranks.

A shortcut to doing this could be to rely on contractors to develop software-defined tactics. To maximize the odds of success, organizations should ensure that these contractors 1) are co-located with experienced operators, 2) are led by a tactician with software-development experience, 3) can deploy software quickly, 4) have at least a few tactically-current, uniformed team members, and 5) are funded operationally vice project-based so they can switch projects quickly as warfighters identify new problems. 

The Stakes

Great power competition is here. China’s economy is now larger than America’s on a purchasing parity basis. America no longer has the manufacturing capacity advantage that led to victory in World War II, nor the ability to train highly-specialized warfighters rapidly. To maintain America’s military dominance in the 21st century, it must leverage the incredible talent already resident in its armed forces.

When somebody in an autocratic society makes a mistake, they hide that mistake since punishment can be severe. The natural openness that comes from living in a democratic society means that American military personnel are able to talk about mistakes they have made, reason about how to stop them from happening again, and then implement solutions. The U.S. military must give its people the tools required to implement better, faster, and more permanent solutions. 

Software-defined tactics will yield a lasting advantage for American military forces by leveraging the comparative advantages of western societies: openness and a focus on investing in human capital. There is no time to waste.

LT Sean Lavelle is an active-duty naval flight officer who instructs tactics in the MQ-4C and P-8A. He leads the iLoc Software Development Team at the Maritime Patrol and Reconnaissance Weapons School and holds degrees from the U.S. Naval Academy and Johns Hopkins University. The views stated here are his own and are not reflective of the official position of the U.S. Navy or Department of Defense.

Featured image: A P-8A Poseidon conducts flyovers above the Enterprise Carrier Strike Group during exercise Bold Alligator 2012. (U.S. Navy photo by Mass Communication Specialist 3rd Class Daniel J. Meshel/Released)