Category Archives: Tactical Concepts

What are the evolving ideals of tactics in maritime and naval affairs.

Trusting Autonomous Systems: It’s More Than Technology

By CDR Greg Smith

How will naval aviation employ unmanned aerial vehicles (UAVs) in the future? The answer is, of course, “it depends.” It depends on technology, on the economy and budgets, on whether we are at war or peace, and on leadership. It also depends on less interesting things like how squadrons and air wings are organized. Given the rapid advances in unmanned systems technology and the success of unmanned platforms like Predator and BAMS-D,[1] UAVs will certainly proliferate and significantly impact the future of naval aviation. If properly integrated, future manned-unmanned teams could deliver exponential increases in combat power, but integration of unmanned aircraft requires a level of trust in autonomous systems that does not yet exist in naval aviation. Building trust will require technical improvements that increase the “trustworthiness” of UAVs, but it will also require naval aviation to establish organizations that enhance trust in UAVs with the goal of fully integrating them into the fight. Indeed, organization will likely be the limiting factor with regard to the pace of integrating trusted UAVs. Therefore, naval aviation should consider the impact organization will have on the ability of aviators to trust UAVs and balance this among the competing requirements for introducing new unmanned platforms.

The Issue is Trust

Although naval aviators are perceived as natural risk-takers, they are trained to take no unnecessary risk and to mitigate risk throughout every evolution. Therefore, UAV integration will occur only when aviators trust UAVs to the same extent that they trust another aviator flying in close proximity as part of a strike package or during coordinated antisubmarine warfare sorties today. 

The proliferation and success of UAVs in the past decade belies the fact that aviators still do not trust them. The vast majority of unmanned aircraft continue to fly only scheduled sorties in pre-established air space in order to ensure separation from manned aircraft. In addition, naval aviators operate with an abundance of caution around UAVs. Aircrews are briefed on planned UAV routes and orbits prior to a mission and routinely deviate from airspace assignments or coordinate new air space in flight to ensure safe separation from UAVs. Being notified that an operator has lost communications with a nearby UAV (i.e. it is autonomously executing a pre-programmed reacquisition profile) assists manned aircraft, but it also raises the hair on the back of an aviator’s neck. In the terminal area it becomes necessary to fly closer to UAVs, which is accomplished safely with the assistance of ground air traffic controllers. Still, as with any congestion, the threat to manned aircraft increases, especially in expeditionary locations. After several, near mid-air collisions with UAVs in 2010, one task force commander grounded his manned aircraft at a remote operating location until he was assured that the local control tower and UAV operators, who were physically located half-way around the world, would improve procedural compliance. Anecdotes like these abound, demonstrating both the adaptability and skepticism of aviators flying near UAVs. After nearly a decade of sharing the sky with UAVs, most naval aviators no longer believe that UAVs are trying to kill them, but one should not confuse this sentiment with trusting the platform, technology, or operators. 

Building trust in autonomous systems should be a goal of those who will design the UAVs of the future as well as those who will employ them in the Fleet, because establishing trust in autonomous systems may be the tipping point that will unleash the revolutionary combat potential of UAVs. Naval aviation could fully integrate trusted UAVs into every mission area of every community. Unmanned tankers, wingmen (wingbots?), jammers, decoys, missile trucks, minesweepers, and communications relays could be launched from the decks of aircraft carriers, destroyers, support ships, from bases ashore, or from aircraft cargo bays, wing pylons and bomb bay stations in the coming decades, truly revolutionizing naval aviation. However, lack of trust is a critical obstacle which must be overcome before such a proliferation of UAVs can occur.

There are several technological improvements that can contribute to trust by enhancing situational awareness and the safety of both manned and unmanned platforms.  Improvements in see-and-avoid technology are needed to assist UAV operators when the UAV is flying in proximity of manned platforms. UAV command and control architectures and traffic collision avoidance systems (TCAS), as well as radars and data links, require improved reliability, security, and flexibility to ensure survivability in an anti-access environment or in the face of cyber or space attacks. Systems that provide manned platforms with increased situational awareness regarding the location of UAVs and the intended flight profile would also enhance trustworthiness. Today, the vast majority of naval aviation is not comfortable sharing an altitude block with a UAV in day, visual meteorological conditions (VMC), much less during war at sea in an anti-access environment. Technological improvements that make UAVs more trustworthy are necessary but not sufficient for establishing trust between an aviator and a machine. Sufficient trust will also require training, mission experience, and technical understanding of the system. 

Organization Matters

Given the technological enhancements described above, it is not a stretch to imagine a manned F-35 establishing a CAP station with a UAV wingman, or a P-8 crew employing UAVs or unmanned undersea vehicles (UUVs) to search for a submarine, or an E-2D using a UAV to extend the range of its radar or data link, or an EA-18G commanding a UAV to jam air defenses or deliver an electromagnetic pulse. There remain challenges to fielding these capabilities, but the technology will soon exist to safely integrate UAVs into these naval aviation missions and many more.  This level of integration raises numerous questions about UAV organizations and their personnel. 

Who would be responsible for the success, failure, and safety of the missions? Would each community operate UAVs that support its mission or would a UAV community operate all UAVs performing the full spectrum of naval aviation missions? How would a UAV operator develop the expertise to execute complex tactical tasks in close coordination with manned platforms? What tactical and technical training will be required to integrate UAVs in this manner? How are the skills of pilots and UAV operators similar? How are they different? What portions of the unmanned sorties are accomplished autonomously and which require a link with a UAV operator? From where will UAVs launch and recover? From where will they be controlled and who will control them?

The answers to these questions depend on how squadrons of the future will be organized to command, operate and maintain the UAVs. In turn, each organizational model significantly influences the amount of additional training, coordination, and experience required to achieve the trust necessary to fully integrate UAVs. Consider the issue of who controls the UAVs.  Some options include: control by the pilot of a manned aircraft themself; control by another aviator in the same aircraft or section; control by an aviator from the same naval aviation community outside the section; control by a UAV operator from a UAV community — aboard ship, ashore, or airborne; and fully autonomous operation.  The amount of trust required to execute complex missions in close proximity to UAVs is the same regardless of how the UAV is controlled, but the amount of trust inherent in each scenario varies greatly.   Decisions about these elements will significantly influence how quickly aviators will be able to trust, and therefore integrate, UAVs. As technology overcomes the challenges posed by the various capabilities implied above, organizational structures will determine how quickly UAVs can be integrated into the fight.

Beyond U-CLASS

Naval aviation’s plans for its next UAV, the Unmanned Carrier Launched Airborne Surveillance System (U-CLASS), will prudently focus on ensuring the safe introduction of a novel platform in a budget constrained environment. Yet, looking beyond U-CLASS, there is the potential for naval aviation to exponentially increase its combat effectiveness by integrating UAVs in every mission area. Technological innovation is necessary to make UAVs more trustworthy, but naval aviation should also understand how organization will facilitate or impede the integration of trusted UAVs. The optimal structure of future UAV units will maximize trust between manned and unmanned platforms and allow for innovation and growth in integration. 

Commander Smith is a Naval Flight Officer and the former Commanding Officer of VP-26.  These are his views and do not reflect the views of the United States Navy.

This article featured as a part of CIMSEC’s September 2015 topic week, The Future of Naval Aviation. You can access the topic week’s articles here

Enter the SCAGTF: Combined Distributed Maritime Ops

By Nicolas di Leonardo

SURFACE * CYBER * AIR * GROUND * TASK FORCE

 “…The supreme art of war is to subdue the enemy without fighting.” –Sun Tzu, The Art of War 

Six Phases of Warfare
Source: JP 3-0

In modern parlance, winning without fighting is accomplished in Phases 0 and 1 of a campaign.  China is seeking to achieve a Phase 0-1 victory in the Pacific through its acquisition / deployment of Anti-Access Area Denial (A2AD) weaponry and economic / military coercion of its peripheral neighbors. When the two are coupled, US operational and diplomatic freedom of maneuver becomes severely constrained, and decisive counter-strategy is required.

Historically, the US has attempted to counter each of China’s weapon systems / diplomatic moves individually without attacking its overall strategy.  When new Chinese weapons systems are deployed, new American countermeasures are fielded.  When China builds new islands where disputed sandbars and reefs once existed, the US flies freedom of navigation sorties overhead.  When individual South East Asian countries are coerced by China to abandon multilateral UNCLOS negotiations and sign bilateral agreements, the US reaffirms support of multilateralism.  The American strategy demonstrates

Source: InformationDissemination.net
Source: InformationDissemination.net

resolve and intent, but does little to shape the environment, and deter the near peer competitorIt plays like a precipitated withdraw and ceding of the South China Sea to China—a stunning admission that there is seemingly little that the US can do when faced with the Chinese dominated political-economic landscape on one hand and a potential naval – air war of attrition on the other. 

The potential Chinese A2AD environment is particularly daunting for the US Pacific Fleet.  Chinese forces could elect to deploy their anti-surface / land attack ballistic and cruise missiles to keep American carriers outside of the 9-Dash Line; disable reconnaissance satellites; jam communications necessary for secure / centralized command & control; threaten to overwhelm remaining forces with vast numbers of aircraft while using the majority of their ships and submarines to counter the US asymmetric advantage in undersea warfare. By asymmetrically threatening American Navy “kill chains”, and especially by holding its naval center of gravity—the CVNs—at risk, the Chinese can effectively turn the American critical strength into a critical vulnerability.  The US cannot afford to lose even one CVN and thus when confronted with the threat of a paralyzing strike against its Pacific CVNs followed by an attrition war, it is prudent to assume that the US would not risk the losses and would exit the battlespace. A potential de-facto Chinese victory in Phases 0-2 could thus be achieved without a decisive Mahanian sea battle–just a credible threat.

Solution sets to countering Chinese A2AD Phase O-2 victory are under development from multiple sources—US  Naval Surface Forces (Distributed Lethality); Marine Corps Combat Development Command (Distributed STOVL [F-35B] Operations); US Marine Corps Advanced Studies Program (Engagement Pull).  All have one thing in common: strategic distribution of mobile offensive power to hold China’s freedom of maneuver in the South China Sea at risk, and inhibit their sea control over key sea lines of communication (SLOC). These solution sets represent a significant evolution in the strategic thought surrounding the US pivot to the Pacific:  attacking China’s strategy vs countering its individual asymmetric capabilities.

In Distributed Maritime Operations: Back to the Future, Dr. Benjamin Jensen states that

“…integrating land and naval forces as a ‘fleet in being’ denying adversary sea control is at the core of the emerging distributed maritime operations paradigm.” 

The defining of the pieces parts and the organizational construct of this paradigm is at the heart of the matter.  General Al Gray, USMC (ret) and Lt. General George Flynn, USMC (ret) recently presented at the Potomac Institute their thoughts on Sea Control and Power Projection within the context of The Single Naval Battle.  In their vision, the forces would include:

To this list I would add tactical level cyber capabilities.

Forces engaged in these missions will likely operate in near proximity to each other and in joint / combined operations, as the American, Australian, New Zealand and British sea, air and land forces of Guadalcanal did.  They will be required to pose sufficient threat to Chinese forces without significant reinforcement due to anticipated Chinese A2AD.  The inter-complexity of their likely combined Sea, Cyber, Air, Ground operations dictates that their task force command and control should not be ad-hoc, but must be defined well in advance to allow for the emergence, experimentation and exercising of command knowledge, skills, abilities and tactics / doctrine. US and allied lack of exercising joint/ combined, multi-domain operations prior to Guadalcanal led to tactics and command and control (C2) doctrine being written in blood.  This lack of foresight should not be repeated.

A SCAGTF construct allows for the US to shape the environment with its allies, deter the [Chinese], and if necessary to seize the initiative, buying time for the massing of forces to dominate the battlespace.  The SCAGTF is one way to integrate the great ideas of our best strategists on distributed maritime operations into a single, flexible organizational structure that is capable of mobile, simultaneous combined / joint multi-domain operations in all phases of warfare.  Such a force could aid the US in reversing its Pacific fortunes, in reinforcing multilateral peace and security for the region, and ultimately in realizing Sun Tzu’s bloodless victory.

Nicolas di Leonardo is a graduate student of the US Naval War College.  The views expressed here are his own and do not necessarily reflect those of the War College or the United States Navy.

The Role of Swarm Intelligence for Distributed Lethality C2

This article was submitted by guest author Marjorie Greene for CIMSEC’s Distributed Lethality week.  Ms. Greene is a Research Analyst with CNA.  Views expressed are her own.

What will distributed lethality command and control look like?   This article introduces a self-organizing approach that addresses this question.   The increasing vulnerability of centralized command and control systems in network warfare suggests it may be time to take an entirely new approach that builds on the human capacity to interact locally and collectively with one another. Building on the concept of swarm intelligence, the approach suggests that information could be “shared” in a decentralized control system, much as insect colonies share information by constructing paths that represent the evolution of their collective knowledge.

This article builds on a self-organizing system that was developed for military analyses aimed at finding out “who talks to whom, about what, and how effectively” in a wide range of operational situations featuring the involvement of naval forces and commands. In an effort to describe the content of message traffic throughout the chain of command during a crisis, a technique was used to associate messages with each other through their formal references. “Reference-connected sets” were constructed that required no interpretation of the subject matter of the messages and, when further analyzed, were found to uniquely identify events during the crisis. For example, one set that was constructed from crisis-related message traffic found in files at three command headquarters contained 105 messages that dealt with preparation for landing airborne troops. Other sets of messages represented communications related to other events such as providing medical supplies and preparing evacuation lists. The technique therefore provided a “filter” of all messages during the crisis into events that could be analyzed – by computers or humans – without predetermined subject categories. It simply provided a way of quickly locating a message that had the information (as it was expressed in natural language) that was necessary to make a decision [1].

As the leaders of the Surface Navy continue to lay the intellectual groundwork for Distributed Lethality, this may be a good time to re-introduce the concept of creating “paths” to represent the “collective behavior” of decentralized self-organized systems” for control of hunter-killer surface action groups. Technologies could still be developed to centralize the control of multiple SAGs designed to counter adversaries in an A2/AD environment. But swarm intelligence techniques could also be used in which small surface combatants would each act locally on local information, with global control “emerging” from their collective dynamics. Such intelligence has been used in animal cultures to detect and respond to unanticipated environmental changes, including predator presence, resource challenges, and other adverse conditions without a centralized communication and control system. Perhaps a similar approach could be used for decentralized control of Distributed Lethality.

Swarm intelligence builds on behavioral models of animal cultures. For example, the ant routing algorithm tells us that when an ant forages for food, it lays pheromones on a trail from source to destination. When it arrives at its destination, it returns to its source following the same path it came from. If other ants have travelled along the same path, pheromone level is higher. Similarly, if other ants have not travelled along the path, the pheromone level is lower. If every ant tries to choose a trail that has higher pheromone concentration, eventually the pheromones accumulate when multiple ants use the same path and evaporate when no ant passes.

Just as an ant leaves a chemical trace of its movement along a path, an individual surface combatant could send messages to other surface ships that include traces of previous messages by means of “digital pheromones.” One way to do this would be through a simple rule that ensures that all surface ships are kept informed of all previous communications related to the same subject. This is a way to proactively create a reference-connected message set that relates to an event across all surface ships during an offense operation.

In his book, Cybernetics, Norbert Wiener discusses the ant routing algorithm and the concept of self-organizing systems. He does not explicitly define “self-organization” except to suggest it is a process which machines – and, by analogy, humans – learn by adapting to their environment. Now considered to be a fundamental characteristic of complex systems, self-organization refers to the emergence of higher-level properties and behaviors of a system that originate from the collective dynamics of that system’s components but are not found in nor are directly deducible from the lower-level properties of the system. Emergent properties are properties of the whole that are not possessed by any of the individual parts making up that whole. The parts act locally on local information and global order emerges without any need for external control.

The Office of Naval Research has recently demonstrated a new era in autonomy and unmanned systems for naval operations that has great promise for Distributed Lethality. The LOCUST (Low-Cost UAV Swarming Technology) program utilizes information-sharing

The Coyote UAV, developed by BAE, used by the LOCUST program
The Coyote UAV, developed by BAE, used by the LOCUST program

between UAVs to enable autonomous collaborative behavior in either defensive or offensive scenarios. In the opinion of this author, this program should be analyzed for its potential application to Distributed Lethality.

Professor Vannevar Bush at MIT was perhaps the first person to come up with a new way of thinking about constructing paths for information-sharing. He suggested that an individual’s personal information storage and selection system could be based on direct connections between documents instead of the usual connections between index terms and documents. These direct connections were to be stored in the form of trails through the literature. Then at any future time the individual himself or one of his friends could retrieve this trail from document to document without the necessity of describing each document with a set of descriptors or tracing it down through a classification tree [2].

The current response to the dilemmas associated with command and control in any distributed operation has led this author to embrace the concept of swarm intelligence. Rather than attempting to interpret the subject matter of information exchanged by entities in confronting an adversary, why not build control systems that simply track information “flows”? Such flows would define the subject matter contained in a naval message without having to classify the information at all.

Any discussion of command and control would be incomplete without including the concept of fuzzy sets, introduced by Professor Lotfi Zadeh at the University of California, Berkeley in 1965. The concept addresses the vagueness that is inherent in most natural language and provides a basis for a qualitative approach to the analysis of command and control in Distributed Lethality. It is currently used in a wide range of domains in which information is incomplete or imprecise and has been extended into many, largely mathematical, constructions and theorems treating inexactness, ambiguity, and uncertainty. This approach to the study of information systems has gained a significant following and now includes major research areas such as pattern recognition, data mining, machine learning algorithms, and visualization, which all build on the theoretical foundations established in information systems theory [3].

Ultimately, the information paths constructed for the control of Distributed Lethality will be a function of organizational relationships and the distribution of information between them. Since a message in a path cannot reference a previous message unless its originator is cognizant of the previous message, the paths in a “reference-connected set” of messages will often reflect the information flows within a Surface Action Group. When paths are joined with other paths, the resulting path often reflects communications across Surface Action Groups. It remains to be determined whether the Surface Navy can use these concepts as it continues to explore the intellectual groundwork for Distributed Lethality. Nevertheless, it is very tempting to speculate that swarm intelligence will play an important role in the future. The most important consideration is that this approach concentrates on the evolution of an event, rather than upon a description of the event. Even if a satisfactory classification scheme could be found for control of hunter-killer Surface Action Groups, the dynamic nature of their operations suggests that predetermined categories would not suffice to describe the complex developments inherent in evolving and potentially changing situations.

Many organizations have supported research and development designed to explore the full benefits of shared information in an environment in which users will be linked through interconnected communications networks. However, in the view of this author, the model of “trails of messages” should be explored again. “Network warfare” will force an increased emphasis on human collaborative networks. Dynamic command and control will be based on communications paths and direct connections between human commanders of distributed surface ships rather than upon technologies that mechanically or electronically select information from a central store. Such an approach would not only prepare for Distributed Lethality, but may improve command and control altogether.

Ms. Greene is a Research Analyst with CNA. Views expressed are her own. 

REFERENCES:

  1. Greene, , “A Reference-Connecting Technique for Automatic Information Classification and Retrieval”, OEG Research Contribution No. 77, Center for Naval Analyses, 1967
  2. Bush, V., “As We May Think”, Atlantic Monthly 176 (1):101-108, 1945
  3. Zadeh, L.,” Fuzzy sets”, Information Control 8, 338-353, 1965
CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

Airborne Over The Horizon Targeting Options to Enable Distributed Lethality

This article was submitted by guest author Michael Glynn for CIMSEC’s Distributed Lethality week. 

The Navy’s surface warfare community is committed to remedying its lack of anti-surface warfare (ASuW) punch with the concept of Distributed Lethality. “If it floats, it fights,” is the rallying cry.[1] Dispersed forces operating together pose challenges for an adversary, but also create targeting difficulties we must solve.

The detection range of shipboard sensors is limited by their height above the waterline and the curvature of the earth. Since it appears doubtful leaders would call on a ship to steam into visual range of adversaries, airborne assets are most likely to provide over the horizon (OTH) targeting.

In a January 2015 article in Proceedings, Vice Admiral Rowden, Rear Admiral Gumataotao, and Rear Admiral Fanta reference “persistent organic” air assets as key enablers of Distributed Lethality.[2] While a completely organic targeting solution offers opportunities in some scenarios, it has limits in high-end contingencies. In empowering the surface force, let us not ignore inorganic air assets. Distributed Lethality is far more effective with them.

TASM: A Cautionary Tale

During a January 2015 test, a Tomahawk Block IV test missile received in-flight updates from an aircraft and impacted its target, a mock cargo ship near the Channel Islands of California.[3] “This is potentially a game changing capability for not a lot of cost,” said Deputy Secretary of defense Bob Work. “It’s a 1000 mile anti-ship cruise missile.”[4]

But this test did not solve the fleet’s ASuW problem. Nor was it the first time the service had used Tomahawk in an anti-shipping role. To understand the difficulty of OTH targeting, we have to examine the final days of the Cold War.

In the late 1980’s, various ships and submarines carried the radar guided Tomahawk Anti-Ship Missile, or TASM. The TASM boasted a range of over 200 nm. But because TASM was subsonic, it took as long as 30 minutes to reach its target. In this time, a fast warship could steam as far as 15 miles from its initial location. Additionally, neutral shipping could inadvertently become the target of the seeker if the enemy vessel was not the closest to the missile when the radar activated.

Therefore, TASM could only reliably be used when there was no neutral shipping around, or in a massive conflict where collateral damage considerations were minimal. The Navy sought to remedy this by developing OTH targeting systems known as Outlaw Hunter and Outlaw Viking on the P-3 and S-3 aircraft. But with the demise of the Soviet Union, massive defense cuts and the evaporation of any blue water surface threat led to the retirement of TASM.

OTH targeting is not a new problem. To solve it, airborne platforms are critical. Let’s examine the organic and inorganic assets that can fill these roles. We will then discuss how inorganic assets offer the most promise.

Organic Assets: Benefits and Limitations

The surface force is equipped with rotary and fixed wing assets to enable OTH targeting. From a sensors standpoint, the MH-60R is most capable. Its inverse synthetic aperture radar (ISAR) can identify ships from long range, but it is limited in altitude and radar horizon. MQ-8 UAV’s offer increased endurance over manned assets. Their maximum altitudes are higher, but still constrain sensor range. The RQ-21 fixed wing UAV rounds out this group. It has solid endurance, but very limited speed.

The limited speed and altitude capabilities of these aircraft mean that the area they can search is small. Also, they must operate well within the weapons engagement zone of their targets to identify their prey. If these sensors platforms are radiating, a capable adversary will hunt them down or lure them into missile traps and destroy them in an effort to deny our forces a clear targeting picture.

Large Fixed Wing Assets: Increased Capability

While not organic to a surface action group, fixed wing aircraft bring speed, altitude, and persistence to the fight. P-8 and P-3 patrol aircraft offer standoff targeting and C5I capabilities. So too do the MQ-4 UAV and the E-8 JSTARS aircraft.

The carrier air wing brings blended detection and OTH targeting capabilities. The E-2 lacks ISAR identification capability, but does boast a passive electronic warfare (EW) suite and the ability to coordinate with the powerful EW system onboard EA-18G aircraft.  Additionally, the latest E-2 model can pass targeting quality data to surface ships to allow them to engage from the aircraft’s track, significantly increasing the ship’s effective missile envelope.

These platforms are expensive and limited in number, but their altitude capability and resulting sensor range allows them to standoff further from the enemy, radiating at will. Additionally, their high dash speed allows them to better escape targeting by enemy fighter aircraft. Their speed, persistence, sensor coverage, and survivability make them logical targeting platforms. They are far more capable and enable better effects than shipboard rotary assets and UAV’s.

Stand-in Stealthy Aircraft: The Ultimate Targeting Asset

The ultimate platform to provide targeting updates to long-range ASCM’s would be a stealthy UAV similar to the RQ-170.[5] Such an aircraft could receive cueing from other platforms, an onboard EW suite, or its own low probability of intercept (LPI) radar.[6] Able to stand in, it could provide visual identification, satisfying rules of engagement. It could provide target updates via a LPI datalink to inbound weapons. These technologies have their roots in the “Assault Breaker” initiative that led to the creation of the Tacit Blue test aircraft and the rise of modern stealth technology.[7],[8] Similar radars, datalinks, and low observable platforms have been proven and are flying today in various forms.[9]

Cost of a new platform is high, but their ability to get close and persist while unobserved is very useful and provides high confidence visual identification to commanders. Their survivability removes the need to provide airborne early warning (AEW) and high value airborne asset protection. Their stealth frees AEW aircraft and fighters to focus their energies elsewhere.

Conclusion

The concept of Distributed Lethality offers promise, but will be limited if its scope is confined to only utilizing capabilities resident in the surface fleet. It is best to pursue organic capabilities while also integrating inorganic assets when planning how the fleet will fight the conflicts of tomorrow. Let us pursue solutions that incorporate forces from many communities to best meet future warfare challenges.

Lieutenant Glynn is a Naval Aviator and a graduate of the University of Pennsylvania. He most recently served as a P-8 instructor pilot and mission commander with Patrol Squadron (VP) 16. He currently flies the T-45 with Training Squadron (VT) 21. He is a member of the CNO’s Rapid Innovation Cell. The views expressed in this article are entirely his own.  

Recommended photos illustrations:

[1] Sydney J. Freedberg Jr., “’If it Floats, it Fights’: Navy Seeks ‘Distributed Lethality’,” Breaking Defense, January 14, 2015, http://breakingdefense.com/2015/01/if-it-floats-it-fights-navy-seeks-distributed-lethality/.

[2] Thomas Rowden, Peter Gumataotao, Peter Fanta, “Distributed Lethality,” Proceedings Magazine, January 2015, Vol. 141, http://www.usni.org/magazines/proceedings/2015-01/distributed-lethality.

[3] “Tomahawk Hits Moving Target at Sea,” Raytheon Company, February 10, 2015, http://www.raytheon.com/news/feature/tomahawk_moving_target_sea.html.

[4] Sam LaGrone, “WEST: Bob Work Calls Navy’s Anti-Surface Tomahawk Test ‘Game Changing’,” USNI News, February 10, 2015, http://news.usni.org/2015/02/10/west-bob-work-calls-navys-anti-surface-tomahawk-test-game-changing.

[5] “RQ-170,” U.S. Air Force Fact File, December 10, 2009, http://www.af.mil/AboutUs/FactSheets/Display/tabid/224/Article/104547/rq-170-sentinel.aspx.

[6] Aytug Denk, “Detecting and Jamming Low Probability of Intercept (LPI) Radars,” Naval Post Graduate School, September 2006, http://dtic.mil/dtic/tr/fulltext/u2/a456960.pdf.

[7] Robert Tomes, “The Cold War Offset Strategy: Assault Breaker and the Beginning of the RSTA Revolution,” War on the Rocks, November 20, 2014, http://warontherocks.com/2014/11/the-cold-war-offset-strategy-assault-breaker-and-the-beginning-of-the-rsta-revolution/.

[8] “Northrop Tacit Blue,” National Museum of the U.S. Air Force, March 9, 2015, http://www.nationalmuseum.af.mil/factsheets/factsheet.asp?id=353.

[9] Kelley Sayler, “Talk Stealthy to Me,” War on the Rocks, December 4, 2014, http://warontherocks.com/2014/12/talk-stealthy-to-me/.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)