Sea Control 120 – Capitol Hill and National Defense

By Matthew Merighi

Capitol Hill is integral to the continued success of U.S. naval forces. Yet most people outside the Washington, D.C. area have experienced the intricacies of how that institution goes about resourcing the military.

Join Sea Control: North America for an interview with
Katie Burkhart, a former Navy Surface Warfare Officer Capitol_hillwho now works in the office of Senator John Thune (R-SD). During the
 discussion we examine the role of the Hill in the National Defense Authorization Act (NDAA), the effect of the legislative process on defense policy, and the contributions of veterans on the Hill in guiding that policy.

DOWNLOAD: Sea Control 120 – Capitol Hill and National Defense

For those interested in further resources: you can track the status of legislation, including the NDAA and defense appropriations bills, on www.Congress.gov. To continue learning about the legislative process, start with the Congressional Research Service (CRS) report “Introduction to the Legislative Process in the U.S. Congress” (link: https://www.fas.org/sgp/crs/misc/R42843.pdf).

This episode of Sea Control: North America was hosted and produced by Matthew Merighi, Executive Director of Blue Water Metrics and a researcher for the Maritime Studies Program at the Fletcher School of Law and Diplomacy.

The views express on the podcast do not reflect those of the United States Government, the office of Senator John Thune, or those of the United States Navy.

Learning to Innovate

By Philip Cullom

Last month, Roger Misso published an article on this site entitled What Happens to Naval Innovation Deferred? and this post addresses a number of the points raised in that submission.

First, I would like to thank LT Misso for caring enough about our Navy to convey his thoughts and recommendations through his writing. Further, I would like to commend him for having the courage to stake an opinion and share his viewpoint.

I strongly agree with him regarding several items in his post:

-Sailors are the Navy’s asymmetric advantage.

-There is a groundswell of positive disruptive thought that exists around the Navy among Navy Sailors and civilians who all want the Navy to sustain its primacy.

-It is important for leadership to exemplify the phrase “we’ve got your back”…innovators need top-cover from the highest levels.

LT Misso is correct that:

-We are disestablishing CNO’s Rapid Innovation Cell (CRIC).

-The CNO’s Strategic Studies Group (SSG) is coming to a close.

There are reasons for each of these actions but please rest assured that it is not a rejection of the innovative efforts going on across the Navy.

Innovation has gotten a lot of press globally in the private sector as well as in military circles, and for very good reason. Technology is changing faster than ever before. Product development cycles are shortening in virtually every business. Competitiveness is often seen as being a function of capturing this innovation.

One caution is that we must be wary of “innovation” becoming a trendy buzzword or perceived panacea for the future as we ride the wave of its popularity. That could make it go the way of other transformative movements such as the Revolution in Military Affairs, Total Quality Leadership, etc.

We must remember that at the heart of the change we seek is disruptive thinking that continuously improves the naval capabilities we deliver for the joint force and nation.

This can only be achieved with a fresh approach to learning and a fundamental culture change to the cycle by which we learn.

This is why at the forefront of the lines of effort discussed in “A Design for Maintaining Maritime Superiority” is the imperative for High Velocity Learning – as this is the real engine for sustainable innovation. The intent for High Velocity Learning is to have many idea factories for a growing cadre of innovators and disruptive thinkers. If captured by all levels of our Navy, particularly the grassroots level, the engine for innovation will be enduring. To that end, we are breathing life into the idea of High Velocity Learning. 

Here are but a few of the actions, both grassroots and leadership sponsored, that are occurring across the Navy:

  • USS Benfold (DDG 65) started an innovation grassroots movement called Project ATHENA. The Commanding Officer challenged his crew to solve Navy issues on the deckplate level through the concept that often the people closest to the problem are often the people closest to the solution. That grew into a San Diego-wide effort that is catching on in other homeports too.
  • In March 2016, OPNAV hosted an Innovation Jam – part Shark Tank, part TED Talk – partnering with SPAWAR, ONR and PACFLT’s Bridge and connecting with Project ATHENA and the Hatch to collect grassroots ideas from the Fleet. This has provided funding and engineering support for three Sailor invented ideas to be prototyped for ultimate evaluation for fleetwide applicability. Other Innovation Jams in other Fleet concentration areas are planned. 
  • Admiral Swift’s adoption of a process within PACFLT to harness High Velocity Learning called “The Bridge” will ensure that your good ideas will go from being a “thought on the Mess Decks/Chiefs Mess/Wardroom” to reality…with the time measured in weeks and months, not years. The Bridge is a PACFLT initiative launched to discover, explore, and cultivate solutions to Fleet-centric challenges, needs, and priorities and connect the sources and sponsors best suited to prototype, develop, and create policy for fleetwide adoption.
  • SECNAV recently released an ALNAV standing up the Naval Innovation Advisory Council (NIAC) to consider, develop, and accelerate innovative concepts for presentation to the SECNAV and other DON senior leaders, with recommendations to synchronize senior leadership, influence the flow of resources, streamline policy, and/or remove roadblocks that hinder innovation.
  • As a correction, we are not standing back up Deep Blue, but rather reconstituting a capability on the OPNAV staff, in N50, to elevate the stature of Navy strategy and better synchronize our efforts. This will concentrate Navy strategic thought inside the life lines of the OPNAV Staff.
  • Other evolving initiatives which will be used to quickly foster and transition innovative efforts include the Rapid Prototyping, Experimentation and Demonstration (RPED) initiative and the Maritime Accelerated Capabilities Office (MACO). These address the speed with which new warfighting capabilities are delivered to the Fleet to better match the urgency of need. Those will be spelled out in greater detail as this process continues to mature.

To be clear, we need every Sailor, active and reserve, to willingly jump in to High Velocity Learning – to be bold, to proffer fearless ideas, and to be willing to dare and drive the Navy forward. As CNO says, “if you are waiting for your High Velocity Learning kit to come in the mail, you are going to be sorely disappointed…because that’s not how this is going to work.” This effort requires us all to play an active role.

160621-N-YO707-178 Washington, D.C. (June 21, 2016) U.S. Navy Vice Adm. Philip Cullom, deputy CNO for fleet readiness and logistics, speaks with Prof. Neil Gershenfeld, second from right, director of MIT's Center for Bits and Atoms during the Capitol Hill Maker Faire in Washington, D.C., June 21, 2016. The Faire showcased robotics, drones, 3D printing and printed art. (U.S. Navy photo by Mass Communication Specialist 2nd Class Cyrus Roson/ Released)
Washington, D.C. (June 21, 2016) U.S. Navy Vice Adm. Philip Cullom, deputy CNO for fleet readiness and logistics, speaks with Prof. Neil Gershenfeld, second from right, director of MIT’s Center for Bits and Atoms during the Capitol Hill Maker Faire in Washington, D.C., June 21, 2016. The Faire showcased robotics, drones, 3D printing and printed art. (U.S. Navy photo by Mass Communication Specialist 2nd Class Cyrus Roson/ Released)

Navy leadership will have your back and provide appropriate forums to bring your ideas – whether they be products, policies or a different way of thinking – forward for us to experiment with or prototype and then assess its ability to become a best practice for the whole Navy.

Our goal is to capture the innovative spirit endemic to the way the Navy works. The Navy has been on the leading edge of innovation for centuries and it is my job to keep us on that cutting edge because, as Roger stated, our people are our talent and our “asymmetric advantage today” well into the future. We have come a long way from the days of sail and steam to all electric warships with integrated power systems that will support energy weapons like LaWS and the electromagnetic railgun. More examples of innovation can be found in our history in carrier aviation to the cutting edge work we are doing now in additive manufacturing, which has been developed through a grassroots effort.

Thank you again to Roger and the many others who continue to push ideas (and when appropriate, concerns) forward. This is an effort we all must play an active role in advancing.

This article has been updated with the status of Deep Blue, and provides additional details on ongoing efforts regarding innovative thinking inside the Navy staff.

Vice Admiral Philip Cullom is a career Surface Warfare Officer with more than thirty years of naval service. He currently serves as the Deputy Chief of Naval Operations for Fleet Readiness and Logistics where he serves as the uniformed point person for naval innovation and creativity for the OPNAV and Secretariat staffs.

Featured Image: SAN DIEGO (March 16, 2016) Lt. Cmdr. Allison Terray tries a virtual reality headset at the Innovation Jam hosted aboard Wasp-class amphibious assault ship USS Essex (LHD 2). U.S. Navy Photo by Mass Communication Specialist 2nd Class Molly A. Sonnier.

The Strategic Role of Tactical Maritime Aerostats in Ensuring Persistent Surveillance

By Matt McNiel

Increasing geopolitical tensions in the South China Sea have created a strategic impetus for the United States and its regional allies to reassess what, how, where, and when a real or perceived threat becomes imminent to strategic interests in this region of the world. Now more than ever, persistent situational awareness is critical. However, unlike traditional landlocked conflict zones, the South China Sea presents a unique challenge as ISR must be successful in multi-modal environments including air, land, and maritime environments.

Adding to that complexity is the presence of largely populated areas in multiple countries proximate to the conflict zone, making it difficult to select one tool or method to create an effective operational ‘big picture’ for decision makers. In recent media reports, it was widely reported that regional states such as the Philippines, Singapore, Vietnam, Taiwan, Japan, and Korea, are actively increasing their proactive vigilance. Wisely, they are also considering an all-of-the-above approach for their defenses for  ensuring full situational awareness with optimized intelligence, surveillance, and reconnaissance (ISR) for land, air, and sea domains.  

Even with modern advancements in ISR technologies, there is simply no one solution that can persistently provide all of the intelligence needed. However, one of the most effective, efficient, and fast-to-deploy solutions to help critical decision makers get the information they require is the lighter-than-air Tactical Maritime Aerostat. These battle-tested systems are loaded with the latest ISR technology that can be used to monitor and gather intelligence from a highly reliable platform hovering over strategic points and providing an “eye in the sky” for concerned governments.

TCOM 17M at San Diego Naval Base. (Image courtesy of TCOM LP)
TCOM 17M at San Diego Naval Base. (Image courtesy of TCOM LP)

Aerostat Attributes and Advantages

Aerostats offer persistent surveillance solutions that have unique advantages over traditional ground-based radar and onboard surveillance systems. For example, when naval vessels are moored or transiting port waters, they are subject to unique surveillance and security challenges. Threats such as small, fast moving boats are not easily detectable using traditional ship-mounted cameras or ground-based radar. Conversely, aerostat systems act as a “virtual fence” along coastlines, around vessels, or the port perimeter by providing continuous, real-time monitoring of activities from an aerial perspective. The system can detect threats at greater range and in the blind spots of traditional surface based sensors, providing security forces with more time to think, react, engage, and neutralize threats at a port.

Tactical Class Aerostat systems such as the 12M, 17M, 22M, and 28M are ideal for  maritime deployment, on land, or directly from a vessel at sea. These aerostats can be assembled and deployed in a very short period and manned by a minimal crew. This allows commanders to use the aerostat system in areas, or when escorting a High-Value Unit (HVU). The aerostat system can carry payloads including day/night EO/IR cameras, radars, communications relays, and electronic warfare packages. The aerostat can be deployed from the deck of a vessel or a static location such as a a dock or onshore mooring station. The larger size aerostat systems (22M, 28M) have greater capacity that allows the Operational Class systems to operate at higher altitudes for greater surveillance range while remaining aloft for up to two weeks at a time, ensuring round-the-clock persistent surveillance for highly trafficked areas and maritime borders.

A TCOM 22M payload. (Image courtesy of TCOM)
A TCOM 22M payload. (Image courtesy of TCOM LP)

As South China Sea claimants consider different monitoring options, aerostat systems offer several key competitive advantages over other platforms. The first is cost. Aerostat systems require comparably minimal maintenance, resulting in an exceptionally low hourly operational cost. This allows users to obtain highly accurate, real-time surveillance data, at a remarkably low total cost of ownership. Secondly, aerostat systems are capable of being on station for weeks at a time. This ensures that there are fewer lapses in coverage due to refueling or unexpected mechanical issues. Third and perhaps most importantly, aerostats payloads are easily reconfigurable allowing the platform to be retrofitted to accommodate the latest ISR technologies in ‘minutes’ compared to ‘months’ and without the need to re-qualify the airframe for safety of flight. For example, aerostat systems could function as a versatile platform for ISR payloads, including electro-optical/infrared cameras, radar, video, communications relays, and even cellular data and Wi-Fi. Operators can easily swap out a broad variety of actionable surveillance data and communications options to meet different missions using the aerostat system’s rapidly reconfigurable “Plug and Play” architecture. Aerostats are highly resilient and suited for harsh operating conditions. Due to the inert nature of Helium gas with which the aerostat is inflated, aerostat systems do not combust and are highly durable in flight. The proof is in the battlefield. For example, aerostat systems deployed in Iraq and Afghanistan during combat have been documented to remain aloft and functional even after being hit by direct gunfire. The low pressure within the aerostat hull allows the system to stay aloft even when punctured.

Aerostats systems have the payload size, weight and power capacity to support high-performance radars that can detect aircraft operating well beyond the coverage of ground-based radars. With an advanced maritime radar, a single sea surveillance system can track maritime targets at distances of 60 nautical miles and cover thousands of square miles for weeks at a time. In addition to the radar, the aerostat can simultaneously support passive surveillance payloads like COMINT, SIGINT, and ELINT, thermal imaging and optical sensors, as well as communications payloads at the lowest possible hourly cost for an airborne asset. The early detection and direct communications with air and sea assets afford the critical window of time to evaluate the situation, coordinate forces, and engage.

How does it work? Consider the scenario of a crowded port environment where many ships and small craft are transiting through highly congested waterways. A naval vessel enters a port but is limited to using surveillance equipment that looks outward from the deck level. There may also be ground-based equipment on shore. Together these systems are unable to see all the critical activity at the water level. A low, fast moving boat  quickly approaches a larger vessel undetected by traditional methods. This scenario occurred in 2000 with the terrorist attack on the USS Cole in Yemen. Aerostat system monitoring the entire port area from hundreds or thousands of feet above would provide early warning to the larger vessel, allowing for a timely reaction. The system could have provided actionable intelligence that allowed for a greater window of time for forces to intercept or engage. 

aerostat 3
Difference in coverage between aerostat based radar and coastal, ground-based radar. (Image courtesy of TCOM LP)

Operational Track Record

Aerostats provide a highly beneficial secondary function.  Any increase in effectiveness of supported troops is very quickly attributed to the aerostats and significantly modifies threat behaviors while the system is in flight. As this effect applies in the case of land applications, U.S. forces at Forward Operating Bases (FOBs) were often assaulted by lone insurgents, and improved explosive devices were placed just outside normal observation areas. Invariably, the deployment of aerostats to the FOBs saw an immediate increase in allied counterstrikes. Within a short amount of time, local leadership would find that enemy operations had relocated entirely or were curtailed exclusively to times when the aerostat was not flying.

Within the maritime domain, this same effect was found to be true for counter narcotics operations in the Caribbean Sea. Additionally, aerostats have proven highly effective at monitoring migrant vessels and providing cues to rescue operations when necessary.

Just like the best engineered automobiles or aircraft, aerostats are not perfect. They need to be tested and designed to meet specific field conditions and payloads. Additionally, operators must be well trained to to achieve maximum effectiveness. In contradiction to some, apparently uninformed media reports , history clearly shows that aerostats are highly reliable. Moreover, they have been and are still successfully used around the world in regional conflict zones such as the Middle East, Afghanistan, the Indian sub-continent, North America, and soon to be in Southeast Asia. With a proven track record of 45 years with millions of airborne hours of persistent surveillance in austere environments, aerostats are here to stay and are growing as innovators continue to find new uses for this reliable lighter-than-air platform. 

Conclusion

As government decision makers consider using a multi-mode surveillance approach, aerostats stand out in their potential to serve as eyes in the sky in the South China Sea and other maritime regions that have been immersed in perceived threats and real conflict. They are easy to deploy, operate in multiple environments, are efficient and technology-agnostic. Aerostat systems need little time to deploy and have lower maintenance requirements at a substantially lower hourly operational cost than conventional aircraft and drones. Moreover, aerostats offers a combination of wide viewing angles and high resolution for more precise identification of small objects as well as surveillance of larger areas. In short, aerostats enable true persistent, real-time tactical ISR at an affordable cost.

Matt McNiel is Vice President of TCOM, LP, a global ISR solutions provider of Lighter-Than-Air Persistent Surveillance Tethered Aerostat platforms for Air, Maritime and Land. He can be reached at Media@Tcomlp.com.

Featured Image courtesy of TCOM LP. 

Parrying the 21st Century First Salvo

The following article is part of our cross-posting partnership with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. Read it in its original form here.

By Jon Solomon

A first strike’s naval component is commonly referred to as the “first salvo.” A first salvo builds upon the maxim that the fleet attacking effectively first obtains a greater probability of victory in a given tactical action, with the understanding that superior maritime surveillance and reconnaissance is a prerequisite for being able to do so.[1] This situational awareness becomes far more complicated to achieve against a defender’s maneuvering naval forces, though, once the defender’s peacetime rules of engagement regarding what he can do to suppress or neutralize enemy wide-area sensors and their supporting data relay networks, interdict enemy scouts, and employ deception and concealment are relaxed following hostilities’ outbreak. Since an attacker has every reason to believe his maritime picture will never be as accurate and comprehensive at any later point in a conflict as it is during peacetime’s waning moments, and since naval warfare is inherently capital-intensive, the attacker’s best chance to maximally neutralize a defender’s higher campaign-value fleet assets is in a first salvo.[2] Accordingly, one of the defender’s most critical peacetime tasks is to mitigate the risk that any conceivable non-nuclear first salvo can attrite his naval forces below the minimum deemed necessary to prevent a potential adversary’s aggression from achieving some military-strategic fait accompli.

An aggressor’s maritime offensive, though, may not be aimed at seizing territory or resources, solidifying a blockade, or ‘violently adjusting’ a theater’s power balance. Coercing the defender or other international actors by creating a public perception that the defender is weak, that a geopolitical status quo is tenuous, or that rising tensions are becoming exceptionally dangerous may actually be more useful to an aggressor’s grand strategy. A first salvo in these cases might be an extremely limited, ‘one-time’ tactical action intended not to ignite a war or to pave the way for follow-on military operations, but rather to support subsequent diplomatic, economic, or propagandistic endeavors at the defender’s expense. An example of this would be the 2010 North Korean torpedoing of the South Korean corvette ROKS Cheonan.

Assuming an attacker can locate and target at least some of a defender’s in-theater naval forces as a crisis peaks, a contemporary first salvo may consist of minimal-warning saturation attacks using anti-ship missiles, torpedoes, or irregular ‘swarming’ small boats and aircraft. The attacker might also covertly lay minefields in shallow contested seas, inside maritime chokepoints, or near the defender’s naval bases and forward logistical support ports. These kinetic actions will likely be paired with cyber and electronic warfare attacks designed to conceal attacking forces’ movements, exacerbate the defender’s confusion and demoralization, and inflict physical damage as possible on the defender’s forces and Command, Control, and Communications (C3) network infrastructure. A first salvo will almost certainly be coordinated with a diplomatic and propaganda campaign that attempts to justify the attacker’s actions, assign blame to the defender for peace’s collapse, and blur what actually happened.

New systems and platforms can certainly be designed with capabilities that help mitigate the U.S. Navy’s first salvo vulnerability risks, but this offers only intermediate if not long-term solutions. Under the normal Department of Defense acquisition process, it generally takes a ten year minimum to mature a new system from prototype demonstration in a relevant environment to Initial Operational Capability (IOC). Transitioning emerging technologies from the applied research stage into an IOC system obviously takes even longer.[3] First salvo defense into the foreseeable future, therefore, will largely depend upon theater and tactical-level commanders’ successes in enhancing existing forces’ resiliency in the face of a surprise attack.

Resilient Doctrine and Plans

From a purely quantitative perspective and assuming flawless scouting, an attacker’s probability of neutralizing a certain number of defending units in a strike decreases as the defender’s number of kinetic and non-kinetic defensive layers, as well as degree of unit-level passive hardening, increase. These attributes drive up the number of weapons the attacker must employ against a given target in order to attain a desired probability of success. Scouting is never flawless and situational pictures can never be omniscient, though. The defender can capitalize on these realities by using deception and concealment where tactically viable to increase the probability that a ‘critical mass’ of his units will evade detection long enough to avoid being attacked before they can successfully execute their missions.[4]

In a first salvo scenario, however, the above attributes are critically affected by the defending force’s degree of mobilization. Defensive mobilization primarily relies upon timely detection and recognition of actionable intelligence, followed by political and theater-level military leaders’ rapid decisions to act upon those Indications and Warning (I&W). This sequence’s perfect execution rarely occurs in practice for a litany of political, operational, and psychological reasons. Even in the depths of a crisis in which war I&W are unmistakable, these factors may deter a defender from adequately increasing his forces’ readiness postures in a timely manner.[5]

Nevertheless, naval doctrine and standing operational plans can compensate for the mobilization problem if they are structured around an expectation that a given potential antagonist would seek to initiate a conventional war by unleashing a massive first salvo.[6] As exemplified by the Imperial Japanese Navy’s war-initiating raids on the Russian Pacific Fleet at Port Arthur in February 1904 and on the U.S. Pacific Fleet at Pearl Harbor in December 1941, the simplest first salvo in terms of targeting is against a defender’s fleet in port. Considering mobilization-on-warning’s reliability challenges, a defender can best balance deployed warships’ need for periodic pierside maintenance and crew relaxation time on one hand against reducing overall force vulnerability on the other by adopting a posture that prevents a ‘critical mass’ of his fleet from ever being in his principal forward bases simultaneously. Routine forward peacetime operations can be built around always having a minimum contingent either underway or visiting countries that it is assessed the potential aggressor would prefer not to risk adding as parties to a conflict. Units’ positioning and portcalls could be managed based on their ability to quickly ‘become unlocated’ through use of speed, maneuvering space, Emission Control (EMCON), and other concealment tactics in the event of a sudden crisis.[7]

The combination of geography and political objectives, though, can constrain the defender’s fleet’s ability to sustainably remain unlocated throughout a protracted crisis. As was the case with the U.S. 6th Fleet’s operations in the highly-confined Eastern Mediterranean during the October 1973 Yom Kippur War, forward forces often must occupy a relatively fixed operating area when supporting an ally or deterring an antagonist’s intervention or escalation. Should this area lie within a small or significantly physically-enclosed marginal sea close to the potential adversary’s homeland, and especially if accessing the area requires transiting one or more chokepoints, the potential adversary’s surveillance and reconnaissance/targeting problems become vastly less difficult.[8]

Under these circumstances, a defender can orient his frontline peacetime conventional deterrent and initial wartime resistance around naval forces and weapons that are relatively invulnerable to a first salvo, such as submarines and offensive as well as defensive minelaying. These efforts can also employ numerous relatively low campaign-value maritime forces such as highly mobile land-based surface-to-air and anti-ship missiles, tactical aircraft operating from dispersed austere forward land bases, and under some circumstances missile-armed small warships logistically supported from forward austere ports or rearward seabases. Frontline forces can be supported by tactical and logistical aircraft from rearward land bases located in-theater, aircraft carriers operating from ‘over the horizon,’ and homeland-based trans-oceanic aircraft; all of these hinge on the availability of sufficient airborne refueling aircraft. Large surface combatants operating from ‘over the horizon’ can similarly provide cued land-attack and anti-ship missile fire support, extended-range air defense support, and Ballistic Missile Defense support.

The use of higher campaign-value naval units operating from ‘over the horizon’ as opposed to in a frontline capacity is only partially due to the first salvo threat. Sustained resistance to an adversary’s offensive will be impossible if the defender cannot achieve localized ‘moving bubble’ sea control in areas beyond the immediate contested zone’s periphery in order to support reliable logistical sustainment of frontline forces, mass movement of reinforcements and materiel into—and within—the theater, and the protection of theater allies’ primary economic lines of communication. These sea control tasks would almost certainly drive carrier, amphibious, and major surface action groups’ positioning as a crisis escalates or immediately following a war’s outbreak. Needless to say, higher campaign-value naval forces postured this way would also be better able to take advantage of space and maneuver for pre-first salvo defense-in-depth, concealment, and perhaps even deception.[9] The further offshore these naval forces were operating from the adversary’s homeland, the greater the adversary’s challenges would be in executing an effective first salvo due to the difficulties of timely detection, confident identification, and continuous targeting-quality tracking of uncooperative warships within the expansive, dynamic open-ocean environment.[10]

There is a major caveat to the above observations, however. A capable and audacious adversary might perceive his political objectives to be so important, the conflict’s ‘inevitability’ of escalation so great, or the defender’s leaders and citizens so feckless that kinetic first salvo attacks on the defender’s homeland-based naval forces become operationally attractive despite the high escalation precedent they would set. The Pearl Harbor case is instructive: although the pre-Second World War U.S. Navy’s Orange Plans fully expected Japan would open any war against America with a devastatingly effective surprise attack against the U.S. Pacific Fleet’s Philippines-based forces, U.S. Navy planners and leaders actively discounted the possibility Japan would risk galvanizing American popular passions by also attacking sovereign U.S. territory.[11] A future adversary might similarly not be satisfied with isolating his first salvo to forward areas, or otherwise limiting its extension against U.S. Navy homeland-based forces to cyber or electronic attacks that offer a thin modicum of escalation control. Mines and standoff-range cruise missiles employed by trans-oceanic submarines or ‘commercial’ vessels against American homeports would be ideal methods for maximizing surprise, confusion, and operationally-significant damage in support of the adversary’s in-theater offensive. Attacks using irregular forces might also be an option. Any warships laid up per a tiered-readiness approach would be particularly lucrative targets, and as such would greatly detract from force resilience.[12] As it seems unlikely the doctrinal approaches that forward forces can use to mitigate first salvo vulnerability will be fiscally extensible to homeland-based forces, greater attention will need to be paid to concepts for dispersing the fleet among homeland civilian ports in the event of elevated tensions, not to mention direct homeport defense. 

Anticipating ‘Defense in the Dark’

The preceding examination of kinetic attacks should not overshadow the fact that cyber-electromagnetic warfare will form a major part of any future first salvo. While much of cyber-electromagnetic defense is a technology development and acquisition matter, doctrine and operational planning also play key roles.[13] For instance, force-level commanders must not base their plans and operating concepts on the flimsy assumption that their situational pictures and C3 capabilities will enjoy relatively unimpeded confidentiality, integrity, and availability early in a war. As a crisis worsens, it may actually be better to decrease campaign-critical forces’ relative reliance on external networking with higher echelon commands or rear echelon support activities rather than double down upon it.[14]

A force is most resilient against C3 attack when all echelons from the theater-level down to the unit-level adhere to decentralized doctrine rooted in commanders’ pre-promulgated intentions messages, pre-planned initial immediate responses to foreseeable tactical situations, avoidance of overly-synchronized operations, and overall command by negation. This not only supports greater Operational and Communications Security through reduced need for frequent detailed communications, but also allows greater lower-echelon initiative and adaptability within a highly dynamic tactical environment.

It is also extraordinarily difficult for an adversary to detect—let alone exploit—a localized tactical data and communications network connecting a forward force’s units via highly-directional line-of-sight pathways that make use of maneuvering assets (ideally organic to the force) as ‘middleman’ relays. In comparison, an adversary’s cyber-electromagnetic warfare opportunities are expanded when the defender employs networks that connect fielded forces with higher command echelons and rearward ‘distance support’ services via predictably-located or fixed infrastructure (e.g., satellites and their ground stations). Cyber-electromagnetic first salvo defense means doctrine and operational plans should neither center on the defender’s higher echelon commanders’ direct real-time tactical control over lower echelons, nor offer the enemy an opportunity to exploit any informational and logistical support provided by the defender’s rear echelon ‘reachback’ activities.

Combat Conditioning: The Key to First Salvo Survival

The common denominator needed to make doctrine, plans, and even networking approaches truly resilient, however, is combat-ready personnel. This depends upon on tactically, technologically, and psychologically conditioning crews for battle’s fog and friction. Indeed, a 1975 U.S. Navy war game underscored that a first salvo’s degree of devastation would likely stem more from crews’ shock or disbelief upon detection of actual inbound weapons than from shipboard combat systems’ performance limitations.[15] Any decision to take self-defense actions in a fringe-of-war, tactically ambiguous situation would need to overcome enormous psychological inertia.[16]  

The tactical expertise needed to make such high-stakes, compressed-timeline decisions largely stems from an individual’s experience-shaped intuition. In peacetime, this experience is gained from training frequency and realism.[17] At-sea training remains vital because shipboard tactical, navigational, and engineering activity coordination cannot be realistically simulated pierside. Many Murphy’s Law-invoking maritime environmental idiosyncrasies such as disruptive weather, unanticipated anomalous radio frequency propagation, and ambient acoustic complexity are also difficult to realistically simulate. Additionally, much like man overboard recovery maneuvers, shiphandling proficiency in quick-reaction, precision-dependent defensive maneuvers relies upon routine, impromptu drills underway.[18] It is true that budget-driven underway training reductions, inability to simulate certain scenarios at sea due to severe operational risk or complexity, and the need to safeguard certain tactics and capabilities from intelligence exposure provide strong rationales for pierside unit and group-level synthetic training as possible and appropriate. Nevertheless, challenges remain in coordinating frequent pierside synthetic training events, or otherwise funding and scheduling frequent watchteam visits to high-fidelity simulators located ashore.

As a result, fleetwide first salvo resilience’s core arguably rests upon the individual unit-level Commanding Officer’s (CO) personal prioritization of tactical training. Quality onboard training systems are worthless if the CO does not mandate their regular use, demand that drills feature adversary tactics derived from the latest disseminated intelligence, and insist that no two drill scripts ever be alike in order to push watchstanders to continuously grow their experience bases, hone their instinctive responses, and become conditioned to cope with the unexpected. The CO must also ensure drills periodically include simulated cyber and electronic attacks as well as tactical deceptions to condition watchteams for operating amidst degraded or adversary-manipulated situational awareness. Most importantly, the CO must directly participate in drill debriefs to guarantee shortcomings are comprehensively and constructively identified for follow-on individual or team training—as well as to signal the training’s importance.  

Relatedly, considering the countless deckplate as well as external demands competing for a CO’s focused attention, Navy senior leadership must unambiguously communicate to the fleet that tactical training is indeed a paramount priority. Part of this will come from the seriousness of oversight posed when higher echelons examine unit and group-level tactical readiness during routine command assessments and pre-deployment workup exercises. This must be balanced with promotion board guidance that unfailingly rewards COs whose commands consistently demonstrate exceptional tactical proficiency and mature tactical risk-taking. Should Navy senior leadership do otherwise, they would gravely risk cultivating operational-tactical ineffectuality similar to what occurred in the U.S. Navy submarine force during 1941-42. Also, just as Navy senior leaders’ restrictions on submarine approach tactics during the 1920s and 1930s shortchanged early-Second World War fleet operations, restrictions on contemporary cyber defense training during battleforce exercises—though reportedly decreasing—may endanger first salvo resiliency.[19] Higher echelons must ensure similar mistakes are not being repeated regarding training for other resiliency-critical tasks such as operations during prolonged EMCON, self-defense while under intense electronic attack, or defensive anti-submarine warfare.

The Battle for the First Salvo’s Narrative

A successfully resilient tactical defense, however, may not be sufficient strategically. As alluded earlier, defeating a first salvo also means defeating the attacker’s inevitable diplomatic-propaganda campaign. Attackers within range of their homeland cellular networks, or otherwise using satellite uplinks, can quickly post audiovisual content recorded and edited on smartphones or similar devices to websites such as YouTube. From there, propaganda specialists can work to push the material via social networks to critical audiences; it may not take more than a few hours to become ‘viral’ and make the jump to traditional global media outlets. The side that gets seemingly-credible evidence of what happened out first seizes the initiative, perhaps decisively, in the diplomatically and politically-critical battle for the international and domestic public narratives regarding culpability and justification.[20]

In a first salvo’s immediate aftermath, the defender must be able to quickly collect, process, and disseminate unimpeachable audiovisual evidence of its victimization without harming Operational Security. This would be no small feat, especially aboard a warship that is severely damaged or steeling itself for follow-on attacks.[21] Even harder is developing continuously updated, interagency-coordinated, ‘stock’ narrative outlines in advance of any operation that might expose units to direct first salvo risk, not to mention the doctrine and training necessary to swiftly get an initial narrative out into the global media. Contrary to current public affairs practice, in some scenarios this might require evidence processing and public dissemination by lower echelons to be followed thereafter with amplification and context by executive Navy and national leadership. This will be a vitally important area for exploration through war gaming and fleet experiments.

The Strategic Criticality of First Salvo Resiliency

With its force structure in decline due to political and fiscal pressures on the Federal budget, and with vital U.S. interests and commitments in increasingly unstable East and Southwest Asia making forward naval presence reductions in those theaters grand strategically undesirable, the U.S. Navy will soon have to cope with a larger fleet proportion being exposed to ever-increasing first salvo risks at any one time. Should an especially crippling single-theater first salvo result in loss of several strategically-significant units or a sizable overall number of warships and aircraft, and even if naval reinforcements surged from other theaters and the homeland helped ensure the ensuing conflict ended in American victory, the U.S. Navy would be hard-pressed to restore its prewar global forward presence levels and crisis surge capacity until its losses were made good. This would almost certainly have grand strategy-shattering consequences. 

American conventional deterrence credibility in increasingly contested maritime theaters will depend in large part on whether the U.S. Navy is able to use the approaches outlined here in ways that visibly improve its first salvo resiliency within the near-term.[22] The Navy’s greatest weapon for parrying a first salvo, after all, is convincing a potential adversary of the probable futility of attempting such an attack in the first place.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at jfsolo107@gmail.com. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

[1] CAPT Wayne P. Hughes Jr, USN (Ret). Fleet Tactics and Coastal Combat, 2nd ed. (Annapolis, MD: U.S. Naval Institute Press, 2000), 40-44. On an adversary’s difficulties in achieving effective wide-area surveillance and reconnaissance following his first salvo, see Jonathan F. Solomon. “Defending the Fleet from China’s Anti-Ship Ballistic Missile: Naval Deception’s Roles in Sea-Based Missile Defense.” (Master’s thesis, Georgetown University, 2011), 70-76, accessed 10/14/14, https://repository.library.georgetown.edu/bitstream/handle/10822/553587/solomonJonathan.pdf?sequence=1 

[2] For a definition of campaign-value, see Jonathan F. Solomon. “Maritime Deception and Concealment: Concepts for Defeating Wide-Area Oceanic Surveillance-Reconnaissance-Strike Networks.” Naval War College Review 66, No. 4 (Autumn 2013): 109.

[3] “Report on Technology Horizons: A Vision for Air Force Science & Technology During 2010-2030, Volume One.” (Washington D.C.: U.S. Air Force Chief Scientist, 15 May 2010), 7.

[4] Solomon, “Maritime Deception and Concealment,” 94-96, 99-103.

[5]For definitive explanation of and expansion upon this statement, see Richard K. Betts. Surprise Attack. (Washington, D.C.: The Brookings Institution, 1982), 87-141, 155-156. None of this means I&W collection and analysis efforts are pointless, but rather that strategy and operational plans must not wholly depend upon them.

[6] Ibid, 157, 311.

[7] However unintentionally, the U.S. Pacific Fleet’s aircraft carrier posture immediately prior to the Pearl Harbor raid met this criteria. Their survival was pivotal to U.S. maritime denial operations during the Pacific War’s first six months, especially at the battles of the Coral Sea and Midway. See “Pearl Harbor Attack, 7 December 1941 Carrier Locations.” U.S. Naval History and Heritage Command,  accessed 10/14/14, http://www.history.navy.mil/faqs/faq66-9.htm  

[8] Solomon, “Maritime Deception and Concealment,” 96-97.

[9] Ibid, 88-99.

[10] Robert C. Rubel. “Talking About Sea Control.” Naval War College Review 63, No. 4 (Autumn 2010): 45.

[11] Edward S. Miller. War Plan Orange: The U.S. Strategy to Defeat Japan, 1897-1945. (Annapolis, MD: U.S. Naval Institute Press, 1991), 25, 27, 29, 354.

[12] For an example of a fleet tiered readiness approach, see RADM Robert O. Wray, USN. “The Utility of a Three-Tiered Navy.” Naval Institute Proceedings139, No. 6, (June 2013): 42-47.

[13] For a discussion of technical countermeasures and acquisition approaches that enhance a military system or network’s cyber-resilience, see Jonathan F. Solomon. “Cyberdeterrence between Nation-States: Plausible Strategy or a Pipe Dream?” Strategic Studies Quarterly 5, No. 1 (Spring 2011), Part II (online version): 20-22, accessed 10/14/14,  http://www.au.af.mil/au/ssq/2011/spring/solomon.pdf. For overviews of electronic protection measures for radars, see CPT Aytug Denk, Turkish Air Force. “Detection and Jamming Low Probability of Intercept (LPI) Radars.” (Masters Thesis, U.S. Naval Postgraduate School, September 2006), 5-33; and Dave Adamy. “EW Against Modern Radars-Part 8: Side-lobe Cancellation and Blanking.” Journal of Electronic Defense 33, No. 6 (June 2010): 44-46.

[14] The operative phrase is relative reliance, as some forms of external networking will be necessary for integrating tactical capabilities and coordinating tactical actions across combat arms and services. See “Joint Operational Access Concept, Version 1.0.” (Washington, D.C.: U.S. Joint Chiefs of Staff, 17 January 2012), 36.

[15] Norman Friedman. Seapower and Space: From the Dawn of the Missile Age to Net-Centric Warfare. (Annapolis, MD: U.S. Naval Institute Press, 2000), 346.

[16] Barry D. Watts. “U.S. Combat Training, Operational Art, and Strategic Competence: Problems and Opportunities.” Washington, D.C., Center for Strategic and Budgetary Assessments, August 2008, 36. The same is true for authorizing activation of a combat system’s mode that performs fully autonomous defensive engagements.

[17] Ibid, 17-22, 27-29.

[18] For example, consider the precision maneuvering needed for deploying and then maintaining position within chaff clouds. See ADM Sandy Woodward, RN. One Hundred Days: The Memoirs of the Falklands Battle Group Commander. (Annapolis, MD: Naval Institute Press, 1997), 12.

[19] See 1. LCDR Brian McGuirk, USN. “Rekindling the Killer Instinct.” Naval Institute Proceedings 138, No. 6 (June 2012): 41, 43-44; 2. “FY12 Annual Report: Information Assurance (IA) and Interoperability (IOP).” (Washington, D.C.: Office of the Director, Operational Test and Evaluation (DOT&E), December 2012), 307-311; 3. “FY13 Annual Report: Information Assurance (IA) and Interoperability (IOP),” 330, 332-334.

[20] The 2010 Wikileaks “Collateral Murder” campaign is an archetypical example of how this might be done by an adversary following a first salvo. For a detailed critique of the Department of Defense’s public affairs response, see Matt Armstrong. “The True Fiasco Exposed by Wikileaks.” MountainRunner.us, 10 April 2010, accessed 10/14/14, http://mountainrunner.us/2010/04/wikileaks/.

[21] The 2010 ROKS Cheonan sinking exemplifies this point. There would have been no time for the Cheonan’s crew to directly perform this role before the ship was lost. This highlights the potential utility of a secure ‘black box’ tactical data recorder on a warship’s bridge can be quickly removed should a crew need to abandon ship.  For a summary of how the absence of such data in the sinking’s immediate aftermath affected South Korea’s narrative battle, see “ROKS Cheonan Sinking.” Wikipedia, 09 May 2013, accessed 10/14/14, http://en.wikipedia.org/wiki/ROKS_Cheonan_sinking

[22] Solomon, “Defending the Fleet,” 127-137.

Featured Image: Pacific Ocean (June 28, 2004) – Operations Specialist 2nd Class Andres Yanez, of Houston, Texas, stands watch in the combat information center (CIC) aboard guided missile cruiser USS Cowpens (CG 63). U.S. Navy photo by Photographer’s Mate 3rd Class Lowell Whitman (RELEASED)

Fostering the Discussion on Securing the Seas.