Category Archives: Strategic Outlook

Predictions and forecasting.

Beans, Bullets, and Benzene: A Proposal for Distributing Logistics

Distributed Lethality Topic Week

By Elee Wakim

The days of majestic leviathans harnessing the power of the elements for propulsion to cruise the world’s navigable waters are long past. What has evolved are voracious beasts which tear across the world with little concern for all but the largest of wind and wave. The appetite of the engines that propel these vessels can only be satiated by a routine supply of petroleum. The United States Navy has established a global logistics network to feed this hunger, the backbone of which is a fleet of tankers, manned by the merchant mariners of the Military Sealift Command (MSC). Hand in hand with the ability to refuel the Navy’s ships is the ability to send fresh food, replacement parts, and ammunition to surface assets without the need to have them return to domestic ports and safe havens. This steady stream of supplies allows the United States to project power around the world. Given the importance of our MSC fleet, they will likely be a priority target in the opening stages of a conflict against a near-peer adversary. Given their vulnerability, these vessels will be faced with the prospect of withdrawing from the area of responsibility (AOR) or being sunk. Whatever the outcome, the cruisers, destroyers, and littoral combat ships at the tip of the spear will retain the requirement of contesting the battlefield until sufficient forces arrive in theater to relieve them. How then to supply these vessels and ensure they have what they need to do what is demanded of them? This paper seeks to address this concern and provide a possible solution to the disruption of our supply chain in the Western Pacific.

Distributing Logistics

One possible solution harkens back to the late 19th century, when nations desiring to project naval power around the world were confronted with a need for coaling stations to support their relatively short legged ships. The 21st century Navy, borrowing from this concept, could build a series of logistics hubs throughout the Western Pacific. These miniature logistics hubs could be built in small inlets, coves, and atolls – anywhere with sufficient draft to support our surface assets. They would function as temporary sanctuaries where thirsty ships could quickly gas up and resupply before turning around and returning to the fight. The infrastructure required to support this concept need not be excessive. A small tug, a fuel barge, and the personnel to man them would be the extent of the investment.

Depending on the potential threat (largely driven by its proximity of an adversary’s weapons systems, or lack thereof), the Navy could expand beyond the aforementioned bare necessities to provide additional support to its vessels. A runway could be constructed to allow for replacement ordnance or repair teams to be flown in.  To complement this, cranes could be prepositioned to support reloading of expended VLS cells. Any combination of support equipment could be staged to support rapid augmentation via air during wartime. Indeed, if we were feeling particularly ambitious, we could use these locations to facilitate the forward repair of battle damage, using vessels like the USNS Frank Cable (AS-40) with their extensive machine shops to establish floating forward repair facilities.

101230-N-8423B-015 POLARIS POINT, Guam (Dec. 30, 2010) The submarine tender USS Frank Cable (AS 40) tends the Virginia-class attack submarine USS Hawaii (SSN 776). Hawaii is the first Virginia-class attack submarine to be moored outboard of a submarine tender. Frank Cable conducts maintenance and support of submarines and surface vessels deployed in the U.S. 7th Fleet area of responsibility. (U.S. Navy photo by Mass Communication Specialist 2nd Class Catherine Bland)
POLARIS POINT, Guam (Dec. 30, 2010) The submarine tender USS Frank Cable (AS 40) tends the Virginia-class attack submarine USS Hawaii (SSN 776). Hawaii is the first Virginia-class attack submarine to be moored outboard of a submarine tender. (U.S. Navy photo by Mass Communication Specialist 2nd Class Catherine Bland)

There are several advantages that such outposts offer our frontline commanders.  First and foremost is that, in a scenario where our logistics ships are driven off, sunk, or otherwise unavailable, the captains fighting their ships would have multiple locations to replenish and get back into the fight. This would facilitate greater time on station which is crucial to maintaining their ability to shape the conflict, contest the battle space, and disrupt an adversary’s plan.

Secondly, these dispersed outposts would allow for fixed locations to refuel. In a degraded C2 environment, this is no small consideration when the ship in question may not have the ability to locate, communicate with, or sufficient endurance to reach surviving oilers. By dispersing potential resupply locations across a greater expanse, we inherently complicate potential adversaries ISR and force distribution calculations. No longer could it be assumed that naval vessels will be taking the most direct route to or from Guam, Japan, Singapore, or the Philippines. Instead, the foe must now picket additional lines of approach and disperse limited assets.

It is a very different tactical problem to protect widely dispersed oilers with a handful of assets than those steaming in company with a strike group. If our logistics ships are to survive in an increasingly lethal anti-access/area-denial (A2AD) environment, they will require an escort to provide sensor and kinetic coverage, primarily from hostile airborne and subsurface threats. This coverage will necessarily be supplied by large surface combatants. This coverage would likely require a one to one matchup between these – the shepherds – and their quarry. Freeing them of the need to ride herd on our logistics (at least until they initially transit out of the theater) will make them available for other tasking.

Considerations and Challenges

There are a host of questions to consider, one of which is the sustainability of these stations. Operating upon the high seas takes a heavy toll upon equipment, which requires a great deal of maintenance to remain operational. These outposts would require personnel to ensure the airfields are capable of supporting aircraft, the cranes of swinging VLS cells, and the pumps of pushing fuel. Exact expenditure and allocation of personnel would need to be worked out on a case by case basis. The current U.S. Army facilities on Kwajalein in the Marshall Islands provide a possible blueprint for use elsewhere. The island possesses a harbor, tug, fuel barge, and runway, which do not require burdensome manning. Additional requirements would necessarily be subject to further study.

(Kwajalein Range Services)
Kwajalein atoll in the Marshall Islands. (Kwajalein Range Services)

Another question which merits consideration is the diplomatic expenditures necessary to enable the placement of these logistics hubs. Should the United States construct these facilities on the territory of regional partners or should it seek to, like the People’s Republic of China, improve upon maritime features scattered throughout the Pacific? Both lines of approach have inherent hurdles. Establishing them on the territory of another nation will require a greater initial investment of political capital and defining legal framework to permit their existence. Building upon unclaimed maritime features risks a charge of hypocrisy against the United States relative to its stance on the Spratly Islands, though this could largely be mitigated through a decision to forego claiming a surrounding exclusive economic zone. Ultimately, some combination of the two may ultimately prove desirable.

A third matter that should be addressed is that of targeting by long range weapons of an adversary. The proposed logistics hubs, like their seaborne counterparts, would be prime targets in the opening hours of a conflict while, unlike their counterparts, they would be unable to dodge. How then to prevent them from being anything other than a target or a drain of resources? There are two potential paths to their salvation. The first draws from the Russian concept of maskirovka, or military deception. Given the pervasiveness of satellite imagery, it will be difficult to actually hide the locations, making it necessary to convince an adversary that they serve a different purpose. They will be far less likely to waste precious missiles on a naval construction battalion facility or medical facility than a place to replenish a warship. The other path, for those facilities which would be emplaced on foreign territory, would be the protection afforded by the sovereignty of that nation. Potential adversaries may not want to draw unnecessary third parties (such as the Philippines or Japan) into a conflict with the United States by lobbing missiles at their territory, especially if the third parties are not obligated to join the United States.

Conclusion

George Patton once quipped, “fixed fortifications are monuments to man’s stupidity.”  This paper does not advocate turning these proposed positions into heavily manned bastions. Rather, their physical security would be derived from geographic remoteness and light covering forces such as Patriot batteries and Naval Expeditionary Combat Command detachments. This paper also does not seek to posit that our MSC fleet lacks utility; indeed, it is quite the opposite. Those ships are the defining variable in determining not only whether we can emerge victorious from a prolonged conflict, but whether we can simultaneously support our global commitments.

This paper offers an alternative means to supply our fleet in the opening stages of a conflict against a near-peer adversary who is capable of tracking and targeting our logistic ships at great distances. If we have sufficient forces in theater to meet mission obligations and protect our logistics ships, then there is no harm in having built up such a capability.  If, however, our opponent has denied these vessels the ability to safely operate where they are most needed, then such a low-cost investment may prove decisive in allowing our ships to hold the enemy at risk. Let us not forget that if she runs out of gas, no amount of advanced sensors or weapons will prevent a ship from being anything more than a target.

LTJG Elee Wakim is a Surface Warfare Officer in the United States Navy.  He is currently stationed in Singapore with the Maritime Staff Element of Destroyer Squadron SEVEN.  The views expressed here are his own and do not represent those of the United States Department of Defense or any other organization.

Featured Image: EAST CHINA SEA (July 30, 2016) The forward-deployed Arleigh Burke-class guided-missile destroyer USS Barry (DDG 52) conducts an underway-replenishment with the Military Sealift Command (MSC) fleet replenishment oiler Joshua Humphreys (T-AO 188). (U.S. Navy photo by Mass Communication Specialist 2nd Class Kevin V. Cunningham/Released)

Unmanned Systems: A New Era for the U.S. Navy?

By Marjorie Greene

The U.S. Navy’s Unmanned Systems Directorate, or N99, was formally stood up this past September with the focused mission of quickly assessing emerging technologies and applying them to unmanned platforms. The Director of Unmanned Warfare Systems is Rear Adm. Robert Girrier, who was recently interviewed by Scout Warrior, and outlined a new, evolving Navy Drone Strategy.

The idea is to capitalize upon the accelerating speed of computer processing and rapid improvements in the development of autonomy-increasing algorithms; this will allow unmanned systems to quickly operate with an improved level of autonomy, function together as part of an integrated network, and more quickly perform a wider range of functions without needing every individual task controlled by humans. “We aim to harness these technologies. In the next five years or so we are going to try to move from human operated systems to ones that are less dependent on people. Technology is going to enable increased autonomy,” Admiral Girrier told Scout Warrior.

Forward, into Autonomy

Although aerial drones have taken off a lot faster than their maritime and ground-based equivalent, there are some signs that the use of naval drones – especially underwater – is about to take a leap forward. As recently as February this year, U.S. Defense Secretary Ash Carter announced that the Pentagon plans to spend $600 million over the next five years on the development of unmanned underwater systems. DARPA (the Defense Advanced Research Projects Agency) recently announced that the Navy’s newest risk taker is an “unmanned ship that can cross the Pacific.”

DARPA’s initial launch and testing of Sea Hunter. (Video: DARPA via YouTube)

Called the Sea Hunter, the vessel is a demonstrator version of an unmanned ship that will run autonomously for 60 – 80 days at a time. Known officially as the Anti-Submarine Warfare Continuous Trail Unmanned Vessel (ACTUV), the program started in 2010, when the defense innovations lab decided to look at what could be done with a large unmanned surface vessel and came up with submarine tracking and trailing. “It is really a mixture of manned-unmanned fleet,” said program manager Scott Littlefield. The big challenge was not related to programming the ship for missions. Rather, it was more basic – making an automated vessel at sea capable of driving safely. DARPA had to be certain the ship would not only avoid a collision on the open seas, but obey protocol for doing so.

As further evidence of the Navy’s progress toward computer-driven drones, the Navy and General Dynamics Electric Boat are testing a prototype of a system called the Universal Launch and Recovery Module that would allow the launch and recovery of unmanned underwater vehicles from the missile tube of a submarine. The Navy is also working with platforms designed to collect oceanographic and hydrographic information and is operating a small, hand-launched drone called “Puma” to provide over-the-horizon surveillance for surface platforms.

Both DARPA and the Office of Naval Research also continue to create more sophisticated Unmanned Aircraft Systems. DARPA recently awarded Phase 2 system integration contracts for its CODE (Collaborative Operations in Denied Environment) program to help the U.S. military’s unmanned aircraft systems (UAS) conduct dynamic, long-distance engagements against highly mobile ground and maritime targets in denied or contested electromagnetic airspace, all while reducing required communication bandwidth and cognitive burden on human supervisors.

An artist's rendition of DARPA's CODE concept, designed to enable operations in a electromagnetically contested environment. Illustration: DARPA
An artist’s rendition of DARPA’s CODE concept, designed to enable operations in a electromagnetically contested environment. (DARPA)

CODE’s main objective is to develop and demonstrate the value of collective autonomy, in which UAS could perform sophisticated tasks, both individually and in teams under the supervision of a single human mission commander. The ONR LOCUST Program allows UAVs (Unmanned Aerial Vehicles) to stay in formation with little human control. At a recent demonstration, a single human controller was able to operate up to 32 UAVs.

The Networked Machine…

The principle by which individual UAVs are able to stay in formation with little human control is based on a concept called “swarm intelligence,” which refers to the collective behavior of decentralized, self-organized systems, as introduced by Norbert Wiener in his book, Cybernetics. Building on behavioral models of animal cultures such as the synchronous flocking of birds, he postulated that “self-organization” is a process by which machines – and, by analogy, humans – learn by adapting to their environment.

The flock behavior, or murmuration, of starlings is an excellent demonstration of self-organization. (Video: BBC via YouTube)

Self-organization refers to the emergence of higher-level properties and behaviors of a system that originate from the collective dynamics of that system’s components but are not found in nor are directly deducible from the lower-level properties of the system. Emergent properties are properties of the whole that are not possessed by any of the individual parts making up that whole. The parts act locally on local information and global order emerges without any need for external control. In short, the whole is truly greater than the sum of its parts.

There is also a relatively new concept called “artificial swarm intelligence,” in which there have been attempts to develop human swarms using the internet to achieve a collective, synchronous wisdom that outperforms individual members of the swarm. Still in its infancy, the concept offers another approach to the increasing vulnerability of centralized command and control systems.

Perhaps more importantly, the concept may also allay increasing concerns about the potential dangers of artificial intelligence without a human in the loop. A team of Naval Postgraduate researchers are currently exploring a concept of “network optional warfare” and proposing technologies to create a “mesh network” for independent SAG tactical operations with designated command and control.

…And The Connected Human

Adm. Girrier was quick to point out that the strategy – aimed primarily at enabling submarines, surface ships, and some land-based operations to take advantage of fast-emerging computer technologies — was by no means intended to replace humans. Rather, it aims to leverage human perception and cognitive ability to operate multiple drones while functioning in a command and control capacity. In the opinion of this author, a major issue to be resolved in optimizing humans and machines working together is the obstacle of “information overload” for the human.

Rear Admiral Girrier, Director of N99, delivers a presentation on the future of naval unmanned systems at the Center for Strategic and International Studies.
Rear Admiral Robert P. Girrier, Director of N99, delivers a presentation on the future of naval unmanned systems at the Center for Strategic and International Studies, January 29, 2016. See the presentation here. (CSIS)

Captain Wayne P. Hughes Jr, U.S. Navy (Ret.), a professor in the Department of Operations Research at the Naval Postgraduate School, has already noted the important trend in “scouting” (or ISR) effectiveness. In his opinion, processing information has become a greater challenge than collecting it. Thus, the emphasis must be shifted from the gathering and delivery of information to the fusion and interpretation of information. According to CAPT Hughes, “the current trend is a shift of emphasis from the means of scouting…to the fusion and interpretation of massive amounts of information into an essence on which commanders may decide and act.”

Leaders of the Surface Navy continue to lay the intellectual groundwork for Distributed Lethality – defined as a tactical shift to re-organize and re-equip the surface fleet by grouping ships into small Surface Action Groups (SAGs) and increasing their complement of anti-ship weapons. This may be an opportune time to introduce the concept of swarm intelligence for decentralized command and control. Technologies could still be developed to centralize the control of multiple SAGs designed to counter adversaries in an A2/AD environment. But swarm intelligence technologies could also be used in which small surface combatants would each act locally on local information, with systemic order “emerging” from their collective dynamics.

Conclusion

Yes, technology is going to enable increased autonomy, as noted by Adm. Girrier in his interview with Scout Warrior. But as he said, it will be critical to keep the human in the loop and to focus on optimizing how humans and machines can better work together. While noting that decisions about the use of lethal force with unmanned systems will, according to Pentagon doctrine, be made by human beings in a command and control capacity, we must be assured that global order will continue to emerge with humans in control.

Marjorie Greene is a Research Analyst with the Center for Naval Analyses. She has more than 25 years’ management experience in both government and commercial organizations and has recently specialized in finding S&T solutions for the U. S. Marine Corps. She earned a B.S. in mathematics from Creighton University, an M.A. in mathematics from the University of Nebraska, and completed her Ph.D. course work in Operations Research from The Johns Hopkins University. The views expressed here are her own.

Featured Image: An MQ-8B Fire Scout UAS is tested off the Coast Guard Cutter Bertholf near Los Angeles, Dec. 5 2014. The Coast Guard Research and Development Center has been testing UAS platforms consistently for the last three years. (U.S. Coast Guard)

Deception and the Backfire Bomber: Part Three

The following article is part of our cross-posting partnership with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. It can be read it in its original form here.

Read part one and part two of this series. 

By Jon Solomon

The Great Equalizer: Backfire Raiders’ Own Use of Deception

The key to improving a Soviet maritime bomber raid’s odds of success appears to have been its own use of EW and tactical deception. Tokarev observes that SNAF doctrine developers closely monitored U.S. Navy carriers’ Combat Air Patrol (CAP) tactics and operational patterns, with particular interest on patrol cycle durations and aerial refueling periods, to identify possible windows of vulnerability that could be exploited in a large-scale attack (Tokarev, Pg. 69). He further observes that SNAF doctrine developers concluded U.S. Navy CAP crews were “quite dependent” upon direction by tactical controllers embarked in area air defense-capable surface combatants or E-2 Hawkeye Airborne Early Warning (AEW) aircraft. This meant

“…the task of the attackers could be boiled down to finding a way to fool those officers—either to overload their sensors or, to some degree, relax their sense of danger by posing what were to their minds easily recognizable decoys, which were in reality full, combat-ready strikes. By doing so the planners expected to slow the reactions of the whole air-defense system, directly producing the “golden time” needed to launch the missiles.” (Tokarev, Pg 75)

In practice, this entailed extensive use of chaff to clutter and confuse the E-2s’ and surface combatants’ radar pictures, not to mention to create ‘corridors’ for shielding inbound raiders from radar detection. This probably also involved using elements of the sacrificial reconnaissance-attack group mentioned earlier to draw attention away from the other penetrating pathfinders. Most interestingly, Tokarev mentions that the raid’s main attack group included a “demonstration group.” When combined with his statement that only seventy to eighty of the bombers in an air division-strength raid would be carrying missiles, this suggests some of the bombers might have been specifically intended to attract their opponent’s attention and then withdraw from contact—the very definition of a deceptive demonstration (Tokarev, Pg 73, 77). As a Backfire raid would be conducted from perhaps two or three attack axes, a demonstration group could hypothetically cause a significant portion of available CAP resources—not to mention the carrier group’s overall tactical attention—to be focused towards one sector while the main attack would actually come from other sectors. Any missiles launched by the CAP against the demonstration group (or the reconnaissance-attack group for that matter) would obviously no longer be available when the main attack group arrived on scene. In this way, enough of the main group might survive long enough to actually launch their missiles, and maybe longer still to escape homeward.

The reconnaissance-attack and demonstration groups might also have been used to induce the carrier group to break out of restrictive EMCON and thereby help clarify the situational picture for the rest of the bombers. Enticing warships to light off their air search radars—and for the pre-Aegis combatants, missile-directing radars—would have provided some high confidence indications of which contacts were surface combatants and which were not. A similar effect might result if the Soviet tactics resulted in U.S. and NATO warships ceasing radio-silence as the carrier group oriented itself to defend against the perceived inbound threat. Still, as the carrier and any carrier-simulating decoy ships present might refrain from radiating telltale radars or engaging in telltale radio communications even under these conditions, the raid’s deceptions would not necessarily help pinpoint the carrier. They would, though, reduce the number of contacts requiring direct visual identification by pathfinders—perhaps dramatically. They would also likely help the raid’s air defense suppression group designate targets for jamming or anti-radar missile attack.

None of this should be surprising to those who have read Tom Clancy’s Red Storm Rising. The novel’s famous first battle at sea begins with a Badger group lobbing target drones towards a NATO carrier task force from far outside the latter’s AEW radar coverage. Equipped with ‘radar blip enhancers’ that allow them to simulate bombers, the drones present themselves using a formation and flight profile that easily convinces the task force’s air defenses they are facing an actual raid. The resultant ruse fools the task force’s F-14 fighters into wasting their AIM-54 Phoenix long-range air-to-air missiles against these decoys, essentially denuding the task force of its outer defensive layer. This is readily exploited by a Backfire group approaching from a different axis, with disastrous consequences for the task force’s warships.

Nor should any of this be surprising to students of the first Gulf War. While U.S. Air Force F-117’s were rightly heralded as having penetrated all the way to Baghdad with impunity on Operation Desert Storm’s opening night, their ease in doing so was paved by a joint U.S. Air Force and Navy deception titled SCATHE MEAN. In this little-known mission that closely emulated Clancy’s fictional scenario, the two services launched BQM-74 target drones and ADM-141 Tactical Air Launched Decoys to distract Iraqi Very High Frequency surveillance radar operators from detecting the inbound F-117s, seduce the Iraqis into expending precious Surface to Air Missiles against the bait, and induce these SAM sites into exposing their search and fire control radars to U.S. anti-radar missile attacks.

In Part Four, the ingredients for countering such deceptions.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at jfsolo107@gmail.com. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

Call for Articles: The Future of Undersea Competition Topic Week

By Sally DeBoer

Week Dates: May 30 – June 3, 2016
Articles Due: May 29, 2016
Article Length: 800-1800 Words (with flexibility)
Submit to: Nextwar@cimsec.org

During the last week of May/first week of June (30 May – 3 Jun) CIMSEC will launch a topic week focusing on the future of undersea competition.

For the last several decades, the United States has enjoyed relatively unchallenged supremacy in the undersea domain. Is it reasonable to expect this trend to continue into the middle of this century? As numerous near-peer competitors, notably Russia and China,  continue to invest heavily in their undersea forces, it seems likely that this dominance will be challenged. Even nations with smaller armed forces are embracing submersibles. With an eye to the ever-increasing tensions in the South China Sea, Thailand stated its intentions to acquire two to three submarines as part of its 2016 defense budget. Vietnam purchased six Russian-built Kilo submarines in 2009, while India, which already had an established submarine force, retains a decade-long lease on an Akula I, also from the Russian Federation.  Indeed, London-based Straetgic Defense Intelligence (DSI) reported that Asia leads the world in in defense spending, with submarine spending near the top of that list; the current Asian submarine market is worth just over 7 billion dollars, but is projected to rise to nearly 11 billion dollars by 2025. How will the United States cope with this competition, which is not limited to Asia alone?

In addition to sheer numbers, the technology of undersea warfare has also accelerated at a rapid pace. The introduction of commercial off the shelf technologies has revolutionized ASW sensors, making them more available (given adequate processing power) and more effective. As CIMSEC has addressed in previous topic weeks, unmanned undersea systems (UUVs and AUVSs) stand to revolutionize undersea warfare and the exploitation of the underwater domain as it is currently understood. On February 18th of this year, The US Navy delivered to Congress a comprehensive report on the future of its Autonomous Undersea Vehicle program through 2025. Hardly alone in their unmanned ambitions, the US will face competition from Russia, who is developing an unmanned system dubbed ‘Kanyon,’ intended to provide submarine (reportedly nuclear) strike capabilities. From mine-sweeping, to strike, to ocean surveillance and beyond, unmanned undersea systems will only add to an increasingly crowded, capable, and competitive undersea environment. How will the United States deal with these challenges, and how will the undersea environment and undersea competition shape tomorrow’s conflicts?

Sally DeBoer is the Publication and Book Review Coordinator for CIMSEC.  She can be reached at books@cimsec.org.

Featured image shows the USS Providence in Manama, Bahrain. It is provided courtesy of the photographer.