Category Archives: Future War

Where is war going?

21st Century Maritime Operations Under Cyber-Electromagnetic Opposition Part Three

The following article is part of our cross-posting series with Information Dissemination’s Jon Solomon.  It is republished here with the author’s permission.  You can read it in its original form here.

Read part one and part two of the series.

By Jon Solomon

Candidate Principle #4: A Network’s Operational Geometry Impacts its Defensibility

Networked warfare is popularly viewed as a fight within cyberspace’s ever-shifting topology. Networks, however, often must use transmission mechanisms beyond physical cables. For field-deployed military forces in particular, data packets must be broadcast as electromagnetic signals through the atmosphere and outer space, or as acoustic signals underwater, in order to connect with a network’s infrastructure. Whereas a belligerent might not be able to directly access or strike this infrastructure for a variety of reasons, intercepting and exploiting a signal as it traverses above or below water is an entirely different matter. The geometry of a transmitted signal’s propagation paths therefore is a critical factor in assessing a network’s defensibility.

The Jominian terms interior and exterior lines of operations respectively refer to whether a force occupies positions within a ‘circle’ such that its combat actions radiate outwards towards the adversary’s forces, or whether it is positioned outside the ‘circle’ such that its actions converge inwards towards the adversary.[i] Although these terms have traditionally applied solely within the physical domains of war, with some license they are also applicable to cyber-electromagnetic warfare. A force might be said to be operating on interior lines of networking if the platforms, remote sensors, data processing services, launched weapons, and communications relay assets comprising its battle networks are positioned solely within the force’s immediate operating area.
Interior+Lines+of+networking

While this area may extend from the seabed to earth orbit, and could easily have a surface footprint measuring in the hundreds of thousands of square miles, it would nonetheless be relatively localized within the scheme of the overall combat zone. If the force employs robustly-layered physical defenses, and especially if its networking lines through the air or water feature highly-directional line-of-sight communications systems where possible or LPI transmission techniques where appropriate, the adversary’s task of positioning assets such that they can reliably discover let alone exploit the force’s electromagnetic or acoustic communications pathways becomes quite difficult. The ideal force operating on interior lines of networking avoids use of space-based data relay assets with predictable orbits and instead relies primarily upon agile, unpredictably-located airborne relays.[ii] CEC and tactical C2 systems whose participants exclusively lie within a maneuvering force’s immediate operating area are examples of tools that enable interior lines of networking.

Conversely, a force might be said to be operating on exterior lines of networking if key resources comprising its battle networks are positioned well beyond its immediate operating area.

Ext+Lines+of+Networking-1

This can vastly simplify an adversary’s task of positioning cyber-electromagnetic exploitation assets. For example, the lines of communication linking a field-deployed force with distant entities often rely upon fixed or predictably-positioned relay assets with extremely wide surface footprints. Similarly, those that connect the force with rear-echelon entities generally require connections to fixed-location networking infrastructure on land or under the sea. Theater-level C2 systems, national or theater-level sensor systems, intelligence ‘reachback’ support systems, remotely-located data fusion systems, and rear echelon logistical services that directly tap into field-deployed assets’ systems in order to provide remote-monitoring/troubleshooting support are examples of resources available to a force operating on exterior lines of networking.

Clearly, no force can fully foreswear operating on exterior lines of networking in favor of operating solely on interior lines.[iii] A force’s tasks combined with its minimum needs for external support preclude this; some tactical-level tasks such as theater ballistic missile defense depend upon direct inputs from national/theater-level sensors and C2 systems. A force operating on interior lines of networking may also have less ‘battle information’ available to it, not to mention fewer processing resources available for digesting this information, than a force operating on exterior lines of networking.

Nevertheless, any added capabilities provided by operating on exterior lines of networking must be traded off against the increased cyber-electromagnetic risks inherent in doing so. There consequently must be an extremely compelling justification for each individual connection between a force and external resources, especially if a proposed connection touches critical combat system or ‘engineering plant’ systems. Any connections authorized with external resources must be subjected to a continuous, disciplined cyber-electromagnetic risk management process that dictates the allowable circumstances for the connection’s use and the methods that must be implemented to protect against its exploitation. This is not merely a concern about fending off ‘live penetration’ of a network, as an ill-considered connection might alternatively be used as a channel for routing a ‘kill signal’ to a preinstalled ‘logic bomb’ residing deep within some critical system, or for malware to automatically and covertly exfiltrate data to an adversary’s intelligence collectors. An external connection does not even need to be between a critical and a non-critical system to be dangerous; operational security depends greatly upon preventing sensitive information that contains or implies a unit or force’s geolocation, scheme of maneuver, and combat readiness from leaking out via networked logistical support services. Most notably, it must be understood that exterior lines of networking are more likely than interior lines to be disrupted or compromised when most needed while a force is operating under cyber-electromagnetic opposition. The timing and duration of a force’s use of exterior lines of networking accordingly should be strictly minimized, and it might often be more advantageous to pass up the capabilities provided by external connectivity in favor of increasing a force’s chances at avoiding detection or cyber-electromagnetic exploitation.

Candidate Principle #5: Network Degradation in Combat, While Certain, Can be Managed

The four previous candidate principles’ chief significance is that no network, and few sensor or communications systems, will be able to sustain peak operability within an opposed cyber-electromagnetic environment. Impacts may be lessened by employing network-enhanced vice network-dependent system architectures, carefully weighing a force’s connections with (or dependencies upon) external entities, and implementation of doctrinal, tactical, and technical cyber-electromagnetic counter-countermeasures. Network and system degradation will nonetheless be a reality, and there is no analytical justification for assuming peacetime degrees of situational awareness accuracy or force control surety will last long beyond a war’s outbreak.

There is a big difference, though, between degrading and destroying a network. The beauty of a decently-architected network is that lopping off certain key nodes may severely degrade its capabilities, but as long as some nodes survive—and especially if they can combine their individual capabilities constructively via surviving communications pathways as well as backup or ‘workaround’ processes—the network will retain some non-dismissible degree of functionality. Take Iraq’s nationwide integrated air defense system during the first Gulf War, for example. Although its C2 nodes absorbed devastating attacks, it was able to sustain some localized effectiveness in a few areas of the country up through the war’s end. What’s more, U.S. forces could never completely sever this network’s communications pathways; in some cases the Iraqis succeeded in reconstituting damaged nodes.[iv] Similarly, U.S. Department of Defense force interoperability assessments overseen by the Director of Operational Test and Evaluation during Fiscal Year 2013 indicated that operators were frequently able to develop ‘workarounds’ when their information systems and networks experienced disruptions, and that mission accomplishment ultimately did not suffer as a result. A price was paid, though, in “increased operator workloads, increased errors, and slowed mission performance.”[v]

This illustrates the idea that a system or network can degrade gracefully; that is, retain residual capabilities ‘good enough,’ if only under narrow conditions, to significantly affect an opponent’s operations and tactics. Certain hardware and software design attributes including architectural redundancy, physical and virtual partitioning of critical from non-critical functions (with far stricter scrutiny over supply chains and components performed for the former), and implementation of hardened and aggressively tested ‘safe modes’ systems can fail into to restore a minimum set of critical functions support graceful degradation. The same is true with inclusion of ‘war reserve’ functionality in systems, use of a constantly-shifting network topology, availability of ‘out-of-band’ pathways for communicating mission-critical data, and incorporation of robust jamming identification and suppression/cancellation capabilities. All of these system and network design features can help a force can fight-through cyber-electromagnetic attack. Personnel training (and standards enforcement) with respect to basic cyber-electromagnetic hygiene will also figure immensely in this regard. Rigorous training aimed at developing crews’ abilities to quickly recognize, evaluate, and then recover from attacks (including suspected network-exploitations by adversary intelligence collectors) will accordingly be vital. All the same, graceful degradation is not an absolute good, as an opponent will assuredly exploit the resultant ‘spottier’ situational awareness or C2 regardless of whether it is protracted or brief.

In the series finale, we assess the psychological effects of cyber-electromagnetic attacks and then conclude with a look at the candidate principles’ implications for maritime warfare.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at [email protected]. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

[i] “Joint Publication 5-0: Joint Operational Planning.” (Washington, D.C.: Joint Chiefs of Staff, 2011), III-27.

[ii] For an excellent technical discussion on the trade-offs between electronic protection/communications security on one side and data throughput/system expense on the other, see Cote, 31, 58-59. For a good technical summary of highly-directional line-of sight radio frequency communications systems, see Tom Schlosser. “Technical Report 1719: Potential for Navy Use of Microwave and Millimeter Line-of-Sight Communications.” (San Diego: Naval Command, Control and Ocean Surveillance Center, RDT&E Division, September 1996), accessed 10/15/14, www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA318338

[iii] Note the discussion on this issue in “Joint Operational Access Concept, Version 1.0.” (Washington, D.C.: Joint Chiefs of Staff, 17 January 2012), 36-37.

[iv] Michael R. Gordon and LGEN Bernard E. Trainor, USMC (Ret). The Generals’ War: The Inside Story of the Conflict in the Gulf. (Boston: Back Bay Books, 1995), 256–57.

[v] “FY13 Annual Report: Information Assurance (IA) and Interoperability (IOP),” 330, 332-333.

[vi] See 1. Jonathan F. Solomon. “Cyberdeterrence between Nation-States: Plausible Strategy or a Pipe Dream?” Strategic Studies Quarterly 5, No. 1 (Spring 2011), Part II (online version): 21-22, accessed 12/13/13, http://www.au.af.mil/au/ssq/2011/spring/solomon.pdf; 2. “FY12 Annual Report: Information Assurance (IA) and Interoperability (IOP),” 307-311; 3. “FY13 Annual Report: Information Assurance (IA) and Interoperability (IOP),” 330, 332-334.

Publication Release: Distributed Lethality 2016

Released: February 2016

The US Navy is investigating distributed lethality as a potentially game changing approach for the conduct of naval warfare. Exploration of the concept has progressed considerably since the previous CIMSEC distributed lethality week. The US Navy’s Distributed Lethality Task Force partnered with CIMSEC to co-launch the February 2016 Distributed Lethality topic week, and released a call for articles outlining specific lines of inquiry. Contributors included active and retired US naval officers representing various communities in the Fleet, as well as civilians with relevant experience. This compendium consists of the articles that featured during the topic week.

Authors:Distributed Lethality 2016 Cover Image
Jeff E. Kline, CAPT, USN, (ret) 
Matthew Hipple
LCDR Chuck Hall with
LCDR David T. Spalding
LCDR Chris O’Connor

Anthony Freedman with
Mark Rosen
Chris Rawley
LCDR Collin Fox

LCDR Josh Heivly
John Devlin
LCDR Christopher Moran with
LT Ryan Heilmann
Alan Cummings
ENS Daniel Stefanus

Editors:
Dmitry Filipoff
Matthew Merighi
John Stryker
Sally DeBoer

Download Here

Articles:
A Tactical Doctrine for Distributed Lethality by Jeff E. Kline, CAPT, USN, (ret)
Distributed Lethality: Old Opportunities for New Operations by Matthew Hipple
Enabling Distributed Lethality: The Role of Naval Cryptology by LCDR Chuck Hall and LCDR David T. Spalding
Distributed Leathernecks by LCDR Chris O’Connor

The Legal Implications of Arming MSC Ships by Anthony Freedman and Mark Rosen
Distributed Lethality, Non-Traditional Fleets, and the Law of War by Chris Rawley
Implementing Distributed Lethality within the Joint Operational Access Concept by LCDR Collin Fox

Enabling Distributed Lethality by LCDR Josh Heivly
Reconfiguring Air Cushioned Vehicles to Enhance Distributed Lethality by John Devlin
The Elephant in the Room: E2-D and Distributed Lethality by LCDR Christopher Moran and LT Ryan Heilmann

Distributed Lethality: China is Doing it Right by Alan Cummings
Unleashing Unit Lethality: Revising Operational & Promotion Paradigms by ENS Daniel Stefanus

Be sure to browse other compendiums in the publications tab, and feel free send compendium ideas to [email protected].

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

The Elephant in the Room: E-2D and Distributed Lethality

Distributed Lethality Topic Week

By LCDR Christopher Moran and LT Ryan Heilmann

Admirals Rowden, Gumataotao, and Fanta introduced the concept of distributed lethality over a year ago as a “means  to increase the offensive might of the surface force and employ ships in dispersed formations known as ‘hunter killer surface action groups.’”[i] The basic concept as outlined in the original article and further discussion has evolved into “the condition gained by increasing the offensive power and defensive hardening of individual warships and then employing them not only in traditional roles but also in different ways than have been the practice in the past few decades” according to Ryan Kelly.[ii] Discussion and interest grew around the country over the past year and with the formation of the Distributed Lethality Task Force. Many great minds have come together, primarily from the surface navy, to offer ideas and solutions. Furthermore, three key initiatives describe what needs to be harnessed within Distributed Lethality: To Deceive, Target, and Destroy.

One area of involvement that has been partially neglected in the distributed lethality discussion is aviation.  In an update to distributed lethality, Admiral Rowden states:

“Nothing we do in Distributed Lethality should be seen as taking away from our historic and necessary role in enabling naval power projection and helping protect CVN’s and ARG’s. We start from the proposition that HVU operations and defense is our main mission, and then work to create operational problems with more lethal and distributed surface forces from there. Our proposition is that the Surface Force can do more, and we are going to take the necessary time to study and analyze that proposition in order to get it right.”[iii]

The perceived assumption is that the surface navy is either supporting power projection by providing “HVU operations and defense” or operating independently from the air wing with more “lethal and distributed surface forces.” 

Dmitry Filipoff proposes a third option of a dispersed surface force that is supported by air wing assets:

“While distributed lethality deemphasizes carrier strike missions, the air wing will be a critical enabler for the distributed force. A distributed air wing can provide rapid response anti-submarine warfare capability and function as communications relays for maintaining a responsive decision cycle while the dispersed force operates under EMCON. The air wing’s screening and early warning functions will be indispensable for enabling commanders on the scene to exercise initiative and engage on their own terms.”[iv]

In this article we build upon the ideas of Mr. Filipoff, specifically focusing on the unique capabilities of the E-2D Advanced Hawkeye. Before proceeding further it might be helpful to offer some background information on the Hawkeye Community and its relevant areas of warfighting focus. 

The Hawkeye was developed primarily as a blue water airborne early warning platform capable of long range detection of both aircraft and ships. While detection is the primary organic capability, Hawkeye aircrew are well versed executing real time command and control over a wide range of mission sets, including anti-surface warfare (ASuW). Through application of the Composite Warfare Commander (CWC) concept, new air intercept controllers and mission commanders learn the basics of conducting  ASuW during the earliest stages of their training, which is then built upon throughout the work up cycle. At the same time, as an airborne C2 asset the Hawkeye is more than capable of bridging the gap (both literally through network relay and bridging, and figuratively through the ability to have one coordination entity) between warfare commanders.

E-2D Advanced Hawkeye flown by Test and Evaluation Squadron TWENTY demonstrating proof of concept of in flight refueling. Photo taken by Kelly Schindler (US Navy).
E-2D Advanced Hawkeye flown by Test and Evaluation Squadron TWO ZERO demonstrating proof of concept of in flight refueling. Photo taken by Kelly Schindler (US Navy).

That being said, no amount of training or warfighting culture is going to matter if processes are not in place to make use of that corporate knowledge. Enter the E-2D Advanced Hawkeye with the APY-9 radar and associated sensors and communications equipment. While specific ranges of the radar are classified, suffice to say that the APY-9 greatly increases the ability of a strike group (or individual cruiser or destroyer) to detect and classify contacts at range. Furthermore, the data link and communication suite enables the Hawkeye to connect widely dispersed forces through multiple networks and means of voice communication. The continuing development of integrated fires offers unique employment options.

Taking into account the systems as well as the aircrew operating the platform, the organic and currently fielded capabilities of the E-2D Advanced Hawkeye serving as the centralizing  C2 node, bring the persistent ISR (intelligence, surveillance, and reconnaissance), Command and Control, and strike group defense capabilities otherwise unavailable to the distributed fleet. 

The overall theme of this article seeks to speak to several of the “key issues” brought up in Mr. Kelly’s call for articles, but particularly:

How should the upcoming Adaptive Force Package be employed: including Tactical Situation (TACSIT) execution, organic and inorganic targeting, fielding of modified weapons, and improved integration with Amphibious Forces and Expeditionary Marine Corps units in support of sea control operations?

Command and Control

First and foremost, the E-2 Hawkeye is an airborne command and control platform, capable of providing both C2 technology as well as “man-in-the-loop” decision making, necessary for effective control of a dispersed and dynamic battlespace. The E-2 is equipped with various data link capabilities which allow for the sharing of not only track data but also raw sensor information.  Additionally, the communication suite in a Hawkeye includes V/UHF, HF, and SATCOM communications with various options for secure and anti-jam capabilities. The typical stationing altitude of a Hawkeye and the power output of the communication and data link equipment allows for a large range of operation ensuring a widely dispersed fleet can stay connected without the requirement for individual ships to maintain line of sight with each other. 

Furthermore, the highly trained crew of the Hawkeye is capable of assessing the situation and making decisions for various commanders – carrying out their intent across various warfighting domains. This allows for the efficient choice of targeting solutions for offensive and defensive scenarios across the battlespace. 

And finally, the warfighting experience of the crew allows for tailoring of information for specific recipients, ultimately cutting down the volume of information sent.  For example, what the air defense commander needs to know is not necessarily what the surface warfare commander needs to know, or what the OTC or JFMCC need to know. The Hawkeye crew has the experience to tailor the information specifically desired by various levels of the chain of command, thereby limiting the total amount of information being transmitted.  In an environment where uncontested usage of the electromagnetic spectrum is not guaranteed, knowing exactly what information to send and only sending that information becomes paramount in reducing our own electromagnetic footprint.

Intelligence, Surveillance, and Reconaissance

One of the biggest challenges facing friendly forces in an “over-the-horizon” war is positive identification of a contact at range. With inherent line of sight limitations there is currently very little organic capability in a Carrier Strike Group to determine what exactly a particular OTH contact is. In an area of high surface and/or air traffic, the ability to identify a contact becomes a great concern for self-defense, especially in a distributed fleet. Ultimately what is needed, and can be provided by the Hawkeye, is an ability to maintain a single persistent track with consolidated ISR from multiple assets.

The airborne E-2 detects and localizes a contact, and begins to evaluate the contact using available onboard sensors. Simultaneously, the Hawkeye crew begins to work with any and all available ISR assets (EP-3, EA-18G, FA-18, UAV, surface ships) to determine any additional information to help with identification. A track with consolidated ISR information is then “pushed” to the fleet via available data links and/or voice communication as required. When the on station E-2 is forced to leave station due to the end of mission time, the relieving E-2 conducts a positive turnover of all tracks of interest ensuring no change in reported data.  (Currently, station time is limited by fuel capacity, however in-flight refueling capability is currently in development for the E-2D which will significantly increase on station time). The result is a persistent, constantly communicated, consolidated “picture” of the area of interest. This picture is capable of being received by interested parties with very little, if any, electromagnetic emission.

Strike Group Defense

A dispersed and more offensive fleet creates some advantages for carrier strike group defense. For the threat, the left side of the kill chain becomes lengthened as it will be harder to find and track their intended targets. On the other hand if the threat is able to identify the high value unit they could face less resistance as the friendly layered air and missile defense will be reduced in strength. A reduced number of assets concentrated around the high value unit will inherently result in less overall defensive missiles, however technological advances and weapon system upgrades that have already reached initial operational capability, such as the SM-6 and E-2D, can reestablish a layered defense and reduce the number of assets required to defend the carrier strike group. Furthermore, these capabilities increase the defensive effectiveness of individual units spread throughout a distributed force. NIFC-CA is a tool that can be utilized for CSG defense and potentially establish a non-permissive environment for threat aircraft, but it is not the end-all solution. Cross community tactics must be developed to optimize weapons target pairing. Training and work-up cycles need to be significantly more integrated to exercise and reinforce new air and missile defense processes. The capabilities are in place (or will be soon) to defend a high value unit in a dispersed fleet; CVW aircrew and Surface Warfare Officers must remain flexible and innovative to most effectively employ the new capabilities available to them.

IMG_1747
An E-2d from VAW-125 launches off of the aircraft carrier USS THEODORE ROOSEVELT in support of Operation Inherent Resolve. Photo taken Ben Hayashi (US Navy).

Conclusion

The E-2D Advanced Hawkeye is uniquely equipped and positioned to facilitate the deception of dispersed forces, the targeting of the adversary and ultimately, the destruction of designated targets. This assistance and support can enable the surface force to indeed perform better with a more lethal positioning of forces distributed across the battlespace. The development of distributed lethality will include identifying current gaps in training and capability that can make our force more lethal. As we as a Naval force continue to develop innovative ways to counter adversaries, we would be wise to develop cross-domain warfighting tactics and increase the interoperability of our forces.   

LCDR Christopher Moran and LT Ryan Heilmann were both assigned to VAW-125, the first operational E-2D Advanced Hawkeye squadron. Their views do not necessarily represent the views of U.S. Department of Defense, the U.S. Navy, or any other agency. 

[i] Vice Admiral Thomas Rowden, Rear Admiral Peter Gumataotao, Rear Admiral Peter Fanta, ‘Distributed Lethality’, Proceedings Magazine – January 2015, vol. 141/1/1.343.

[ii] Kelly, Ryan. Distributed Lethality Task Force Launches CIMSEC Topic Week, Center for International Maritime Security (CIMSEC) website, 1 February 2016.  https://cimsec.org/21579-2/21579

[iii] Vice Admiral Thomas Rowden, ‘Distributed Lethality: An Update’, CIMSEC website, 12 March 2015, https://cimsec.org/distributed-lethality-an-update/15484

[iv] Filipoff, Dmitry, ‘Distributed Lethality and Concepts of Future War’, CIMSEC website, 4 January, 2016, https://cimsec.org/distributed-lethality-and-concepts-of-future-war/20831

Reconfiguring Air Cushioned Vehicles to Enhance Distributed Lethality

Distributed Lethality Topic Week

By John Devlin

With the continuing buildup of Chinese and Russian navies, as well as increasingly capable regional actors, the task of leveraging a 300 ship US Navy using distributed lethality (DL) as a force multiplier in response remains a formidable task. It is reminiscent of another period in our history when our scientists and engineers had to conjure a way to prolong a life sustaining air supply while constrained to only limited resources available to a stricken space craft. Most of us are familiar with the story of Apollo 13 astronauts using duct tape and plastic bags to adapt parts never intended to work together in order to return safely back to earth. Those scientists and engineers toiled feverishly with various configurations before agreeing on a workable course of action. The birth of distributed lethality is similarly constrained, but with a much larger mission and far-reaching consequences.

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

BRAVO ZULU to the tacticians and engineers who adapted the SM-6 surface-to-air missile (SAM) to a surface-to-surface missile (SSM) to rapidly extend the stand-off range for our surface action groups (SAG).  It is encouraging that these innovators were not dissuaded from their pursuit by the arguments against using an air warhead against a surface target or the $4M cost per unit or the command and control implications of shooting at a target so many miles over the horizon potentially dispersed among friendly vessels. This is an innovative first step to demonstrate the capability.  The necessary refinements will follow as the value of this new weapon becomes accepted and integrated into battle group tactics.

1223
Figure 1. Air Cushioned Vehicle easily maneuvers over a rocky beach.

Let’s examine the advantages of the SM-6 in the SSM mode and why this adaptation is a smart and innovative use of existing ships and munitions. The missile dimensions are the same as the SM-6 in the SAM mode which allows the use of existing launchers and platforms. Crews are in place. As mentioned previously, the stand-off range is substantially improved. The kill probably of a continuous rod or fragmentation warhead against hardened ship targets is unlikely; however, a soft kill of the target’s sensors and communications antennae, at least initially, is almost as good as sinking it. It will likely blind the enemy’s fire control systems. The allocation of missiles in the ship’s missile magazines for SSM versus SAM targets is an old discussion and is only appropriate when discussed relative to the expected opposing force. Another potential negative is the $4M cost of these missiles. But nonetheless, this is a step in the right direction and is in alignment with distributed lethality.

Where else can the US Navy apply this type of innovative thinking to further increase lethality? How do we out gun, out run, and out maneuver opposing forces using the current inventory of platforms, weapons systems, C2, and manning? Why not reconfigure the 1st generation Landing Craft Air Cushioned (LCAC) into shooting platforms? The VLS Hellfire missiles can be mounted in the cargo deck. Pedestal-mounted APKWS missiles could be similarly mounted. Chain guns such as the M61 Vulcan 20mm Cannon or the Mk38 25mm machinegun can all be mounted in the cargo deck for line-of-sight targeting. This craft has demonstrated 100 knots speeds.  Its ability to maneuver in shallow water, reef zones, shifting sand bars, riverine, and beach zones gives it the maneuverability of no other afloat vehicle. This tactical advantage of speed and maneuver cannot be matched. It travels at near-helicopter speeds, can carry 10 times the helicopter’s payload, with four times the on-station time. It could be configured with an AEGIS Ashore Missile Payload and positioned at many improved and unimproved sites.

Initially, targeting can be line-of-sight with over-the-horizon targeting when DL integration development progresses. We have seen enemy fighters using mosques and urban

Figure 2. Air Cushioned Vehicle maneuvers from an obscure beach.
Figure 2. Air Cushioned Vehicle maneuvers from an obscure beach.

areas to shield them from incoming fire. We can expect enemy maritime forces to use fishing, merchant vessels, and fleeing refugees as defensive shields. Engagement criteria, for at least the initial engagement skirmishes, will be line of sight positive identification via manned observation or remote observation. Clear Rules of Engagement (ROE) will need to be developed and practiced. Greater forward force autonomy should be anticipated to ensure engagement success.

The air cushioned vehicles will be positioned forward of the battle group in picket roles in archipelagic regions or in strategic straits such as the Strait of Hormuz where the shifting sandbars are not an obstacle to maneuvering for these vehicles. Their maneuverability will allow them to cut the escape routes of marauding high speed conventional craft who traverse narrow channels with impunity because they know the potential of grounding a chasing naval vessel is an unacceptable risk to the USN.  Submarine based threats and mined areas are also of limited concern for a vessel that has no draft. 

But these air cushioned vehicles are not suitable to plow through high seas. How can we get them to theater and provide operating support?  Platform Supply Vessels (PSV) have been performing this type of role in the off-shore oil industry for three decades. They have transported the heavy equipment and operating supplies that allow oil rigs to operate at sea for long periods. These vessels are designed to carry a tremendous volume of drill mud, fresh water, and fuel needed for use in off-shore oil drilling. The drill mud storage tanks can be used to ballast down the stern and allow self-propelled access to air cushioned vehicles. They are rugged vessels and are built to withstand the rigors of high seas.  In the

Figure 33. PSVs can carry Air Cushioned Vehicles to theater on this wide open deck.
Figure 33. PSVs can carry Air Cushioned Vehicles to theater on this wide open deck.

post-Deepwater Horizon off-shore oil industry, they have reduced the high insurance costs of hoteling crews on the rigs by providing hotel services on the PSVs. As a consequence of the shale oil revolution and low world oil prices, new PSVs are tied to their piers because operating them is no longer profitable. They are available for lease, purchase, or contracted services.

As the new LCAC 100 comes into service, the old LCACs are headed to the scrap pile.  Why not reconfigure them with modular weapons to give the US Navy a combatant craft that can out gun, out run, and out maneuver opposing forces?

John Devlin is Director of Navy Programs with ISPA Technology and a retired US Navy Captain.  He was a Tactical Action Officer (TAO) in carrier battle groups as a Surface Warfare Officer and has experience in littoral operations as a Special Operations Officer.

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]