Tag Archives: distributed lethality

Electronic Warfare’s Place in Distributed Lethality: Congressional Testimony

The following testimony published on Information Dissemination, and is shared with the author’s permission.

By Jon Solomon

Testimony before the House Armed Services Committee

Subcommittee on Seapower and Projection Forces

Prepared Statement of Jonathan F. Solomon

Senior Systems and Technology Analyst, Systems Planning and Analysis, Inc.

December 9th, 2015

The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

Thank you Chairman Forbes and Ranking Member Courtney and all the members of the Seapower and Projection Forces subcommittee for granting me the honor of testifying today and to submit this written statement for the record.

I am a former U.S. Navy Surface Warfare Officer (SWO), and served two Division Officer tours in destroyers while on active duty from 2000-2004. My two billets were perhaps the most tactically-intensive ones available to a junior SWO: Anti-Submarine Warfare Officer and AEGIS Fire Control Officer. As the young officer responsible for overseeing the maintenance and operation of my destroyers’ principal combat systems, I obtained an unparalleled foundational education in the tactics and technologies of modern naval warfare. In particular, I gained a fine appreciation for the difficulties of interpreting and then optimally acting upon the dynamic and often ambiguous “situational pictures” that were produced by the sensors I “owned.” I can attest to the fact that Clausewitz’s concepts of “fog” and “friction” remain alive and well in the 21st Century in spite of, and sometimes exacerbated by, our technological advancements.

My civilian job of the past eleven years at Systems Planning and Analysis, Inc. has been to provide programmatic and systems engineering support to various surface combat system acquisition programs within the portfolio of the Navy’s Program Executive Officer for Integrated Warfare Systems (PEO IWS). This work has provided me an opportunity to participate, however peripherally, in the development of some of the surface Navy’s future combat systems technologies. It has also enriched my understanding of the technical principles and considerations that affect combat systems performance; this is no small thing considering that I am not an engineer by education.

In recent years, and with the generous support and encouragement of Mr. Bryan McGrath, I’ve taken up a hobby of writing articles that connect my academic background in maritime strategy, naval history, naval technology, and deterrence theory with my professional experiences. One of my favorite topics concerns the challenges and opportunities surrounding the potential uses of electronic warfare in modern maritime operations. It’s a subject that I first encountered while on active duty, and later explored in great detail during my Masters thesis investigation of how advanced wide-area oceanic surveillance-reconnaissance-targeting systems were countered during the Cold War, and might be countered in the future.

Electronic warfare receives remarkably little attention in the ongoing debates over future operating concepts and the like. Granted, classification serves as a barrier with respect to specific capabilities and systems. But electronic warfare’s basic technical principles and effects are and have always been unclassified. I believe that much of the present unfamiliarity concerning electronic warfare stems from the fact that it’s been almost a quarter century since U.S. naval forces last had to be prepared to operate under conditions in which victory—not to mention survival—in battle hinged upon achieving temporary localized mastery of the electromagnetic spectrum over the adversary.

America’s chief strategic competitors intimately understand the importance of electronic warfare to fighting at sea. Soviet Cold War-era tactics for anti-ship attacks heavily leveraged what they termed “radio-electronic combat,” and there’s plenty of open source evidence available to suggest that this remains true in today’s Russian military as well.[i] The Chinese are no different with respect to how they conceive of fighting under “informatized conditions.”[ii] In a conflict against either of these two great powers, U.S. maritime forces’ sensors and communications pathways would assuredly be subjected to intense disruption, denial, and deception via jamming or other related tactics. Likewise, ill-disciplined electromagnetic transmissions by U.S. maritime forces in a combat zone might very well prove suicidal in that they could provide an adversary a bullseye for aiming its long-range weapons.

To their credit, the Navy’s seniormost leadership have gone to great lengths to stress the importance of electronic warfare in recent years, most notably in the new Maritime Strategy. They have even launched a new concept they call electromagnetic maneuver warfare, which appears geared towards exactly the kinds of capabilities I am about to outline. It is therefore quite likely that major elements of the U.S. Navy’s future surface warfare vision, Distributed Lethality, will take electronic warfare considerations into account. I would suggest that Distributed Lethality’s developers do so in three areas in particular: Command and Control (C2) doctrine, force-wide communications methods, and over-the-horizon targeting and counter-targeting measures.

First and foremost, Distributed Lethality’s C2 approach absolutely must be rooted in the doctrinal philosophy of “mission command.” Such doctrine entails a higher-echelon commander, whether he or she is the commander of a large maritime battleforce or the commander of a Surface Action Group (SAG) consisting of just a few warships, providing subordinate ship or group commanders with an outline of his or her intentions for how a mission is to be executed, then delegating extensive tactical decision-making authority to them to get the job done. This would be very different than the  Navy’s C2 culture of the past few decades in which higher-echelon commanders often strove to use a “common tactical picture” to exercise direct real-time control, sometimes from a considerable distance, over subordinate groups and ships. Such direct control will not be possible in contested areas in which communications using the electromagnetic spectrum are—unless concealed using some means—readily exploitable by an electronic warfare-savvy adversary. Perhaps the adversary might use noise or deceptive jamming, deceptive emissions, or decoy forces to confuse or manipulate the “common picture.” Or perhaps the adversary might attack the communications pathways directly with the aim of severing the voice and data connections between commanders and subordinates. An adept adversary might even use a unit or flagship’s insufficiently concealed radio frequency emissions to vector attacks. It should be clear, then, that the embrace of mission command doctrine by the Navy’s senior-most leadership on down to the deckplate level will be critical to U.S. Navy surface forces’ operational effectiveness if not survival in future high-end naval combat.

Let me now address the question of why a surface force must be able to retain some degree of voice and data communications even when operating deep within a contested zone. As I alluded earlier, I consider it highly counterproductive if not outright dangerous for a higher-echelon commander to attempt to exercise direct tactical control over subordinate assets in the field under opposed electromagnetic conditions. But that doesn’t mean that the subordinate assets should not share their sensor pictures with each other, or that those assets should not be able to spontaneously collaborate with each other as a battle unfolds, or that higher-echelon commanders should not be able to issue mission intentions and operational or tactical situation updates—or even exercise a veto over subordinates’ tactical decisions in extreme cases. A ship or an aircraft can, after all, only “see” on its own what is within the line of sight of its onboard sensors. If one ship or aircraft within some group detects a target of opportunity or an inbound threat, that information cannot be exploited to its fullest if the ship or aircraft in contact cannot pass what it knows to its partners in a timely manner with requisite details. In an age where large salvos of anti-ship missiles can cover hundreds—and in a few cases thousands—of miles in the tens of minutes, where actionable detections of “archers” and “arrows” can be extremely fleeting, and where only minutes may separate the moments in which each side first detects the other, the side that can best build and then act upon a tactical picture is, per legendary naval tactical theorist Wayne Hughes, the one most likely to fire first effectively and thus prevail.[iii]

This requires the use of varying forms of voice and data networking as tailored to specific tactical or operational C2purposes. A real-time tactical picture is often needed for coordinating defenses against an enemy attack. A very close to real-time tactical picture may be sufficient for coordinating attacks against adversary forces. Non-real time communications may be entirely adequate for a higher-echelon commander to convey mission guidance to subordinates.

But how to conceal these communications, or at least drastically lower the risk that they might be intercepted and exploited by an adversary? The most secure form of communications against electronic warfare is obviously human courier, and while this was used by the U.S. Navy on a number of occasions during the Cold War to promote security in the dissemination of multi-day operational and tactical plans, it is simply not practicable in the heat of an ongoing tactical engagement. Visible-band and infrared pathways present other options, as demonstrated by the varying forms of “flashing light” communications practiced over the centuries. For instance, a 21st Century flashing light that is based upon laser technologies would have the added advantage of being highly directional, as its power would be concentrated in a very narrow beam that an adversary would have to be very lucky to be in the right place at the right time to intercept. That said, visible-band and infrared systems’ effective ranges are fairly limited to begin with when used directly between ships, and even more so in inclement weather. This may be fine if a tactical situation allows for a SAG’s units to be operating in close proximity. However, if unit dispersal will often be the rule in contested zones in order to reduce the risk that an adversary’s discovery of one U.S. warship quickly results in detection of the rest of the SAG, then visible-band and infrared pathways can only offer partial solutions. A broader portfolio of communications options is consequently necessary.

It is commonly believed that the execution of strict Emissions Control (EMCON) in a combat zone in order to avoid detection (or pathway exploitation) by an adversary means that U.S. Navy warships would not be able to use any form of radiofrequency communications. This is not the case. Lower-frequency radios such as those that operate in the (awkwardly titled) High, Very High, and Ultra High Frequency (HF, VHF, and UHF) bands are very vulnerable because their transmission beams tend to be very wide. The wider a transmission beam, the greater the volume through which the beam will propagate, and in turn the greater the opportunity for an adversary’s signals intelligence collectors to be in the right place at the right time. In order to make lower-frequency radio communications highly-directional and thereby difficult for an adversary to intercept, a ship’s transmitting antennas would have to be far larger than is practical. At the Super High Frequency (SHF) band and above, though, transmission beamwidth using a practically-sized antenna becomes increasingly narrow and thus more difficult to intercept. This is why the Cold War-era U.S. Navy designed its Hawklink line-of-sight datalink connecting surface combatants and the SH-60B helicopter to use SHF; the latter could continually provide sonarbuoy, radar, or electronic support measures data to the former—and thereby serve as an anti-submarine “pouncer” or an anti-ship scout—with a relatively low risk of the signals being detected or exploited. In theory, the surface Navy might develop a portfolio of highly-directional line-of-sight communications systems that operate at SHF or Extremely High Frequency (EHF)/Millimeter-wave (MMW) bands in order to retain an all-weather voice and data communications capability even during strict EMCON. The Navy might also develop high-band communications packages that could be carried by manned or unmanned aircraft, and especially those that could be embarked aboard surface combatants, so that surface units could communicate securely over long-distances via these “middlemen.” Shipboard and airframe “real estate” for antennas is generally quite limited, though, so the tradeoff for establishing highly-directional communications may well be reduced overall communications “bandwidth” compared to what is possible when also using available communications systems that aren’t as directional. Nevertheless, this could be quite practicable in a doctrinal culture that embraces mission command and the spontaneous local tactical collaboration of ships and aircraft in a SAG.

High-directionality also means that a single antenna can only communicate with one other ship or aircraft at a time—and it must know where that partner is so that it can point its beam precisely. If a transmission is meant for receipt by other ships or aircraft, it must either be relayed via one or more “middleman” assets’ directional links to those units or it must be broadcast to them using less-directional pathways. Broadcast is perfectly acceptable as a one-way transmissions method if the broadcaster is either located in a relatively secure and defensible area or alternatively is relatively expendable.  An example of the former might be an airborne early warning aircraft protected by fighters or surface combatants broadcasting its radar picture to friendly forces (and performing as a local C2 post as well) using less-directional lower-frequency communications. An example of the latter might be Unmanned Aerial Systems (UAS) launchable by SAG ships to serve as communications broadcast nodes; a ship could uplink to the UAS using a highly-directional pathway and the UAS could then rebroadcast the data within a localized footprint. Higher-echelon commanders located in a battlespace’s rearward areas might also use broadcast to provide selected theater- and national-level sensor data, updated mission guidance, or other updated situational information to forward SAGs. By not responding to the broadcast, or by only responding to it via highly-directional pathways, receiving units in SAGs would gain important situational information while denying the adversary an easy means of locating them.

Low Probability of Intercept (LPI) radiofrequency communications techniques provide surface forces an additional tool that can be used at any frequency band, directional or not. By disguising waveforms to appear to be ambient radiofrequency noise or by using reduced transmission power levels and durations, an adversary’s signals intelligence apparatus might not be able to detect an LPI transmission even if it is positioned to do so. I would caution, though, that any given LPI “trick” might not have much operational longetivity. Signal processing technologies available on the global market may well reach a point, if they haven’t already, where a “trick” works only a handful of times—or maybe just once—and thereafter is recognized by an adversary. Many LPI techniques accordingly should be husbanded for use only when necessary in a crisis or wartime, and there should be a large enough “arsenal” of them to enable protracted campaigning.

Finally, I want to briefly discuss the importance of providing our surface force with an actionable over-the-horizon targeting picture while denying the same to adversaries. The U.S. Navy is clearly at a deficit relative to its competitors regarding anti-ship missile range. This is thankfully changing regardless of whether we’re talking about the Long-Range Anti-Ship Missile (LRASM), a Tomahawk-derived system, or other possible solutions.

It should be noted, though, that a weapon’s range on its own is not a sufficient measure of its utility. This is especially important when comparing our arsenal to those possessed by potential adversaries. A weapon cannot be evaluated outside the context of the surveillance and reconnaissance apparatus that supports its employment.

In one of my earlier published works, I set up the following example regarding effective first strike/salvo range at the opening of a conflict:

Optimal first-strike range is not necessarily the same as the maximum physical reach of the longest-ranged weapon system effective against a given target type (i.e., the combined range of the firing platform and the weapon it carries). Rather, it is defined by trade-offs in surveillance and reconnaissance effectiveness…This means that a potential adversary with a weapon system that can reach distance D from the homeland’s border but can achieve timely and high-confidence peacetime cueing or targeting only within a radius of 0.75D has an optimal first-strike range of 0.75D…This does not reduce the dangers faced by the defender at distance D but does offer more flexibility in using force-level doctrine, posture, plans, and capabilities to manage risks.[iv]

Effective striking range is reduced further once a war breaks out and the belligerents take off their gloves with respect to each others’ surveillance and reconnaissance systems. The qualities and quantities of a force’s sensors, and the architecture and counter-detectability of the data pathways the force uses to relay its sensors’ “pictures” to “consumers” matter just as much as the range of the force’s weapons.[v] Under intense electronic warfare opposition, they arguably matter even more.

For a “shooter” to optimally employ long-range anti-ship weaponry, it must know with an acceptable degree of confidence that it is shooting at a valid and desirable target. Advanced weapons inventories, after all, are finite. It can take considerable time for a warship to travel from a combat zone to a rearward area where it can rearm; this adds considerable complexities to a SAG maintaining a high combat operational tempo. Nor are many advanced weapons quickly producible, and in fact it is far from clear that the stockpiles of some of these weapons could be replenished within the timespan of anything other than a protracted war. This places a heavy premium on not wasting scarce weapons against low-value targets or empty waterspace. As a result, in most cases over-the-horizon targeting requires more than just the detection of some contact out at sea using long-range radar, sonar, or signals collection and direction-finding systems. It requires being able to classify the contact with some confidence: for example, whether it is a commercial tanker or an aircraft carrier, a fishing boat or a frigate, a destroyer or a decoy. An electronic warfare-savvy defender can do much to make an attacker’s job of contact classification extraordinarily difficult in the absence of visual-range confirmation of what the longer-range sensors are “seeing.”

A U.S. Navy SAG would therefore benefit greatly from being able to embark or otherwise access low observable unmanned systems that can serve as over-the-horizon scouts. These scouts could be used not only for reconnaissance, but also for contact confirmation. They could report their findings back to a SAG via the highly-directional pathways I discussed earlier, perhaps via “middlemen” if needed.

Likewise, a U.S. Navy SAG would need to be able to degrade or deceive an adversary’s surveillance and reconnaissance efforts. There are plenty of non-technological options: speed and maneuver, clever use of weather for concealment, dispersal, and deceptive feints or demonstrations by other forces that distract from a “main effort” SAG’s thrust. Technological options employed by a SAG might include EMCON and deceptive emissions against the adversary’s signals intelligence collectors, and noise or deceptive jamming against the adversary’s active sensors. During the Cold War, the U.S. Navy developed some very advanced (and anecdotally effective) shipboard deception systems to fulfill these tasks against Soviet sensors. Unmanned systems might be particularly attractive candidates for performing offboard deception tasks and for parrying an adversary’s own scouts as well.

If deception is to be successful, a SAG must possess a high-confidence understanding of—and be able to exercise agile control over—its emissions. It must also possess a comprehensive picture of the ambient electromagnetic environment in its area of operations, partly so that it can blend in as best as possible, and partly to uncover the adversary’s own transient LPI emissions. This will place a premium on being able to network and fuse inputs from widely-dispersed shipboard and offboard signals collection sensors. Some of these sensors will be “organic” to a SAG, and some may need to be “inorganically” provided by other Navy, Joint, or Allied forces. Some will be manned, and other will likely be unmanned. This will also place a premium on developing advanced signal processing and emissions correlation capabilities.

We can begin to see, then, the kinds of operational and tactical possibilities such capabilities and competencies might provide U.S. Navy SAGs. A SAG might employ various deception and concealment measures to penetrate into the outer or middle sections of a hotly contested zone, perform some operational task(s) of up to several days duration, and then retire. Other naval or Joint forces might be further used to conduct deception and concealment actions that distract the adversary’s surveillance-reconnaissance resources (and maybe decision-makers’ attentions) from the area in which the SAG is operating, or perhaps from the SAG’s actions themselves, during key periods. And still other naval, Joint, and Allied forces might conduct a wide-ranging campaign of physical and electromagnetic attacks to temporarily disrupt if not permanently roll back the adversary’s surveillance-reconnaissance apparatus. Such efforts hold the potential of enticing an adversary to waste difficult-to-replace advanced weapons against “phantoms,” or perhaps distracting or confusing him to such an extent that he attacks ineffectively or not at all.

The tools and tactics I’ve outlined most definitely will not serve as “silver bullets” that shield our forces from painful losses. And there will always be some degree of risk and uncertainty involved in the use of these measures; it will be up to our force commanders to decide when conditions seem right for their use in support of a particular thrust. These measures should consequently be viewed as force-multipliers that grant us much better odds of perforating an adversary’s oceanic surveillance and reconnaissance systems temporarily and locally if used smartly, and thus better odds of operational and strategic successes.

With that, I look forward to your questions and the discussion that will follow. Thank you.

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at jfsolo107@gmail.com. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

[i] For example, see the sources referenced in my post “Advanced Russian Electronic Warfare Capabilities.” Information Dissemination blog, 16 September 2015,http://www.informationdissemination.net/2015/09/advanced-russian-electronic-warfare.html

[ii] For examples, see 1. John Costello. “Chinese Views on the Information “Center of Gravity”: Space, Cyber and Electronic Warfare.” Jamestown Foundation China Brief, Vol. 15, No. 8, 16 April 2015,http://www.jamestown.org/programs/chinabrief/single/?tx_ttnews%5Btt_news%5D=43796&cHash=c0f286b0d4f15adfcf9817a93ae46363#.Vl4aL00o7cs; 2. “Annual Report to Congress: Military and Security Developments Involving the People’s Republic of China 2015.” (Washington, DC: Office of the Secretary of Defense, 07 April 2015), 33, 38.

[iii] CAPT Wayne P. Hughes Jr, USN (Ret). Fleet Tactics and Coastal Combat, 2nd ed. (Annapolis, MD: U.S. Naval Institute Press, 2000), 40-44.

[iv] Jonathan F. Solomon. “Maritime Deception and Concealment: Concepts for Defeating Wide-Area Oceanic Surveillance-Reconnaissance-Strike Networks.” Naval War College Review 66, No. 4 (Autumn 2013): 113-114.

[v] See my posts 1. “21st Century Maritime Operations Under Cyber-Electromagnetic Opposition, Part II.” Information Dissemination blog, 22 October 2014, http://www.informationdissemination.net/2014/10/21st-century-maritime-operations-under_22.html; and 2. “21st Century Maritime Operations Under Cyber-Electromagnetic Opposition, Part III.” Information Dissemination blog, 23 October 2014,http://www.informationdissemination.net/2014/10/21st-century-maritime-operations-under_23.html

Featured Image: Persian Gulf (Feb. 5, 2007) – Air Traffic Controller 1st Class Otto Delacruz identifies an air contact to Air Traffic Controller 1st Class Brent Watson standing watch in the ship’s helicopter direction center aboard USS Boxer (LHD 4). (U.S. Navy photo by Mass Communication Specialist Seaman Joshua Valcarcel)

Distributed Lethality Task Force Launches CIMSEC Topic Week

Week Dates: Aug. 29-Sep. 2, 2016
Articles Due: Aug. 26, 2016
Article Length: 800-1800 Words (with flexibility)
Submit to: Nextwar@cimsec.org

By William Burke

We want to hear your ideas! This call for articles solicits input on the topic of Distributed Lethality to help shape the future of Surface Force initiatives. 

Distributed Lethality is the condition gained by increasing the offensive power and defensive hardening of individual components of the surface force and then employing them in dispersed, offensive formations across a wide expanse of geography. Distributed Lethality leverages tactics, tools, talent, and training to enhance surface combat capability and promote the Navy’s principal role of controlling the sea in order to project national power through the core operational lines of effort of Deceive, Target and Destroy.

The most recent CIMSEC call for articles on Distributed Lethality yielded 12 submissions that formed a robust topic week in February, 2016. Moving forward, the Distributed Lethality Task Force (DLTF) continues its efforts to place a renewed emphasis on sea control. To support this journey, CIMSEC will hold a Distributed Lethality topic week during the week of 29 August through 2 September. Just as before, this series is intended to elicit innovative ideas to enhance the depth of understanding of the role of Distributed Lethality as both an operating concept and organizing principle in support of the Navy’s core missions.

The theme for this upcoming topic week is applying the Distributed Lethality concept to operational roles. Therefore, questions germane to the direction Distributed Lethality is headed and subjects that merit more thoughtful written discussion include: How are lines of effort in the Surface Navy aligned with fleet-wide initiatives and Combatant Commander needs? How can we effectively and innovatively deploy Surface Action Groups (SAG)? What platforms can compose an Adaptive Force Package and what missions could be performed?How can individual ships employ Distributed Lethality tactics while operating independently? How can assets other than surface ships be integrated into the Distributed Lethality construct? How could an “up-gunned” Expeditionary Strike Group be equipped and employed for distributed operations? How can we provide our ships accurate and timely targeting data? What weapon modernizations, combat systems initiatives, and future technology could improve Distributed Lethality? How can we operate distributed and agile logistics during conflict? How can we achieve assured command and control? What electromagnetic maneuver warfare enhancements can surface ships implement? How does cyber warfare fit into the Distributed Lethality construct?  

Submissions can be written on the above issues or may expand on other lines of inquiry relevant to Distributed Lethality. Submissions should be between 800 and 1800 words in length (with flexibility) and submitted no later than August 26 to the CIMSEC editorial team at Nextwar@cimsec.org.

Editor’s Note: This topic week has since concluded and writings submitted in response to this call for articles may be viewed here

William Burke is a Surface Warfare Officer in the United States Navy currently assigned to Commander, Naval Surface Forces Distributed Lethality Task Force.

Featured Image: The guided missile destroyer USS Curtis Wilbur (DDG 54) fires a RIM-66 Standard missile March 23, 2014, during a missile firing exercise as part of Multi-Sail 2014 in the Pacific Ocean near Guam. (FC2 Kristopher G. Horton, U.S. Navy)

Don’t Neglect the Human Factor in Littoral Combat

The following article originally appeared by The National Interest and is republished with the author’s permission. It may be read in its original form here

By James Holmes

A new article from Wayne Hughes is a treat for anyone in naval geekdom. Captain Hughes literally wrote the book on U.S. Navy fleet tactics and coastal combat; I still schlep around my dog-eared copy of Fleet Tactics from my midshipman days in the 1980s. It keeps good company with tracts from Clausewitz, Corbett and the boys.

But last month over at USNI Blog, Hughes and a brace of Naval Postgraduate School colleagues proposed the concept of “mesh networks.” It refers to a dispersed yet networked ships, planes, weapons, and sensors that are able to seize the initiative from regional adversaries, maneuver in both physical and cyberspace, and prevail in near-shore combat. The whole thing is worth a read.

It’s a compelling read in many respects. Hughes and his coauthors accentuate how complex and menacing offshore waters and skies can be. For instance, we tend to evaluate weapons in large part by their firing range. Outrange a foe and you acquire a significant tactical edge. Similar to boxing, in sea fights, the pugilist with greatest range can wallop his opponent before he has the chance to strike back. The perpetrator inflicts damage without absorbing any himself.

But range is mainly an asset for open-ocean battle. The open sea resembles a vast, featureless plain; weapons can reach their full potential there. Ships and planes can pound away from their maximum firing ranges. Littoral combat, by contrast, compacts the distances at which battle takes place. You have to get close to shore to strike inland, land troops, or blockade enemy harbors.

To continue the boxing analogy, it is similar to forcing boxers to fight in the clinch rather than dancing around the ring. The fight transpires within weapons range of an enemy who’s fighting on his own ground, with all of his manpower and armaments close to hand. Compressing the theater, then, attenuates any range advantage U.S. forces may enjoy, or nullifies it altogether.

And if that’s not bad enough, inshore combat constricts the time available to defend against incoming rounds. Dexterity is essential when forced to cope with myriad challenges. Scattering and moving sensors and “shooters” around the theater constitutes one way to confound foes—provided U.S. forces can still mass firepower at the decisive place on the map at the decisive time. Hence the concept of nimble, “networked” forces. Despite the concept’s virtues, it feels incomplete and abstract, possibly even otherworldly.

That’s because it slights the human dimension of sea combat—a hazardous thing to do when contemplating how to wage war, an intensely human enterprise. My advice is to look not to a U.S. Navy admiral but to a U.S. Air Force colonel for insight into how to prosecute littoral combat. Let’s keep the human in human competition—enriching mesh-network tactics.

The coauthors make the late Vice Admiral Arthur Cebrowski’s model of decision-making their own, using it to explore the potential of offshore networks. Cebrowski describes tactics as a three-phase cycle. Sensing represents the first phase. Combatants gather and exchange data about their surroundings. They next decide what arms and tactics to deploy within those surroundings. And then they act on the decision, with the aim of getting off the first effective shot. Sense, decide, act. It makes sense on the surface, but the trouble is that this approach is too mechanical. It makes little allowance for the messiness that is human interaction in a competitive environment.

Cebrowski implies that in combat you can plug data into an algorithm, churn out an answer, and do what the algorithm says. Colonel John Boyd, a fighter pilot and self-made strategist, interjects a fourth element into the decision cycle. The tactical surroundings, says Boyd, are constantly in flux. It’s not enough to collect information about the setting. It’s about orienting oneself to the setting before making a decision and acting.

For Boyd, then, the cycle goes observe, orient, decide, act—OODA. Fail to orient to the surroundings and you are disoriented, estranged from the reality around you. Losing touch with reality represents a dangerous situation at the best of times—but especially in combat. The victor, oftentimes, is the combatant best in tune with the situation. So orienting is important.

How do you do it? It’s a process of assimilating and analyzing new information that comes in from sensors and other sources. Sounds like Cebrowski’s decide function. But Boyd also maintains that past experience shapes how combatants adapt to their surroundings. So do cultural traditions. So does “genetic heritage.” Boyd even factors in the biological basis of human cognition.

The fighter pilot thus incorporates not-strictly-rational components of human decision-making into his paradigm for tactics and strategy, adding texture to the model. Thinkers from Machiavelli to Taleb warn that people are hardwired to think in linear terms, projecting the past into the future in a straight line. Past trends constitute the best guide to future events.

Yet straight-line thinking impedes efforts to cope with the opponent—a living, determined contestant with every incentive to deflect competition onto nonlinear, unpredictable pathways. Culture likewise channels efforts to process new data in certain directions. Bewilderment greets unfamiliar information all too often—further slowing down adaptation.

Nor is orientation some incidental or throwaway element of the decision cycle. Boyd portrays it as the one element to rule them all: “The second O, orientation—as the repository of our genetic heritage, cultural tradition, and previous experiences—is the most important part of the O-O-D-A loop since it shapes the way we observe, the way we decide, the way we act.”

There’s a corollary to Boyd’s decision-making taxonomy. Pit two antagonists against each other, both of which are struggling to observe, orient, decide, and act effectively. Orienting swiftly and accurately is a defensive endeavor. But if there’s an orient function whereby each antagonist tries to stay abreast of change, there must also be an offensive, disorient function to the OODA cycle.

And indeed, Boyd beseeches savvy contestants to spring “fast transients” on their adversaries, seizing control of the environment. Sudden, swift, radical maneuvers befuddle the adversary. Repeated maneuvers cut him off from the tactical or strategic environment altogether, making him easy pickings. Boyd famously defeated every mock adversary he encountered during air-combat training within forty seconds. He ascribed his unbeaten record to fast—unforeseeable—transients.

All models simplify; that’s true in all fields of inquiry. We assume perfect competition in economics, exaggerating economic actors’ rationality for the sake of simplicity. We assume laminar flow in fluid dynamics, disregarding turbulence within the fluid and between the fluid and the pipe wall. And we assume frictionless machinery to illustrate physics and engineering principles.

And this is all to the good—provided economists and physicists disregard only secondary factors for the sake of explaining fundamental concepts, and provided they take account of these factors when they devise economic policies, piping systems, and engines for real-world use. Disregarding a primary factor could invalidate the model altogether. Cebrowski takes the orient function—the most important function—out of the decision cycle. Doing so abstracts any model founded on his theory from reality.

As a legendary pugilist once said, any scheme for human competition and conflict that neglects interaction has dim prospects for success. I urge the Naval Postgraduate School team to reject Cebrowski’s paradigm, and eliminate that fallacy from their worthwhile project. Wargames premised on Boyd’s more realistic decision cycle will yield more meaningful insight into how coastal combat may unfold, and that will bolster U.S. Navy performance.

Naval warfare is an intensely human enterprise, rife with dark passions, chance, and uncertainty. It’s disorderly and erratic, operating by its own topsy-turvy logic. Not for nothing does John Boyd insist that people, ideas, and hardware—in that order—constitute the crucial determinants of victory and defeat. Prioritizing people represents the starting point for wisdom.

James Holmes is Professor of Strategy at the Naval War College and coauthor of Red Star over the Pacific. The views voiced here are his alone.

Featured Image: USS Fort Worth (LCS-3) enters Apra Harbor for a port visit on U.S. Naval Base Guam on Dec. 11, 2014. (U.S. Navy photo by Leah Eclavea)

Members’ Roundup: June 2016

By Sam Cohen

Welcome to the June 2016 members’ roundup. Throughout June, CIMSEC members examined several international maritime security issues, including increased competition in the undersea environment, the Taiwanese Navy’s pursuit of an enhanced air defense capability, Russia’s modernization of the Black Sea Fleet, developments in unmanned aerial vehicle (UAV) technology and carrier based operations, and finally, growing piracy threats off the coast of Libya. 

Beginning the roundup at the Bulletin of the Atomic Scientists, Bryan Clark discusses undersea cables and the future of submarine competition. Mr. Clark explains how at least 95% of voice and internet traffic in addition to more than $4 trillion per year in financial transactions travels through about 300 transoceanic fiber-optic cables along the seabed. Due to the likely economic and military impacts a cable break or sabotage would induce on international security and economic dynamics, the ability to threaten or protect undersea cables and their shore landings will become an increasingly important aspect of future conflict – with procurement of advanced submarine and unmanned underwater vehicle (UUV) technology being critical for  addressing this evolving threat. Mr. Clark highlights several of these technologies, including the rise of a new predominant sensing technology characterized by low-frequency active sonar, the use of undersea ‘battle networks’ and the deployment of fixed seabed-based sensors and outposts to augment UUV and submarine operations.

Harry Kazianis, for The National Interest, provides an analysis on the proliferation of anti-ship ballistic and cruise missiles around the globe and the implications the spread of these weapon systems will have on future U.S. aircraft carrier operations in peace and in conflict. Mr. Kazianis notes that the carrier has been at the forefront of every major U.S. combat operation since World War II, but the short ranges of current carrier based fighter aircraft relative to the longer ranges of certain anti-ship missiles – such as China’s DF-21D, or DF-26 ASBM – may limit the usefulness of the carrier as both an effective deterrent and a reliable platform for power projection in contested areas of operation. The article highlights additional variables affecting the relevance of the flattop in A2/AD environments, including the likelihood of successfully targeting a moving carrier at sea deploying an array of countermeasures.

Ankit Panda, for The Diplomatprovides an overview of a Chinese Naval vessel entering Japanese territorial waters and the incident’s reflection of growing tensions between the two countries. Mr. Panda explains that a Type 815 Dongdiao-class spy ship entered Japanese territorial waters on June 15, a move Beijing has not repeated since 2004, when a Chinese nuclear submarine entered Japan’s 12 nautical mile territorial sea near the Sakishima Islands. The article examines whether the Chinese spy ship was abiding by international law, particularly the provisions governing ‘innocent passage’ under the United Nations Convention on the Law of the Sea. Considering the Chinese vessel was a spy ship and sailed within Japanese waters for several hours, Mr. Panda explains that the Japanese Defense Ministry is investigating whether the PLAN vessel was operating in accordance with international law and if follow-up legal action should be taken.

Michal Thim and his colleague Liao Yen-fan, for Taiwan in Perspective, discuss the restructuring of the Taiwanese Navy, and the goal to acquire enhanced air defense capabilities for the fleet. The authors explain that modernization plans have identified interchangeable Aegis-like integrated combat systems (ACS) that pair powerful radars with advanced anti-air and anti-ship weapons as priority procurement targets. However, the recent breakdown in negotiations between Lockheed Martin and Taiwan’s National Chung-Shan Institute of Science and Technology (NCSIST) over the acquisition and technology transfer of the Mk.41 vertical launch system may limit the Navy’s ability to deploy ACS. They add that this breakdown and the resulting procurement limitations represent inherent challenges associated with Taiwan’s arms indigenization objectives.

To conclude the June members’ roundup, Sam LaGrone for U.S. Naval Institute News provides an overview of Russia’s first deployment of a new frigate to the Black Sea Fleet since the end of the Cold War. The Project 11356-class Admiral Grigorovich was sent to a Russian naval base in Crimea, which Mr. LaGrone explains is the first of many new surface ships the Russian Navy intends to base in the Black Sea. He adds that the delivery of the multi-mission surface combatant, capable of engaging submarine, air and surface threats, is part of a $2.43 billion Black Sea Fleet expansion program that will allow for increased power projection capabilities throughout the Fleet’s area of operation.

Members at CIMSEC were also active elsewhere during the month of June:

  • Bryan McGrath, for The War on the Rocks, explains how the lack of naval competition in the post-Cold War period has resulted in a U.S. fleet posture with limited offensive power. He explains how the Navy has prioritized a defensive mindset for too long, with survivability and defensive capabilities outcompeting offensive capabilities for platform space, budgetary resources and strategic inquiry. Mr. McGrath emphasizes that by adopting and implementing the distributed lethality concept across the fleet – that is increasing the unit-level lethality of virtually every ship in the Navy – U.S. naval forces will increase their capacity to successfully deter and challenge nations opposing U.S. interests and international law at sea.
  • Jerry Hendrix, for Defense One, advocates that the X-47B should be reinserted into carrier operations before the U.S. Navy begins to spend more time and fiscal resources on a new, expensive carrier-based UAV. Mr. Hendrix identifies that the Navy needs a long-range strike asset similar to the X-47B design, while it does not need a long-range surveillance platform – an asset the Navy seems to be leaning towards even though 68 unmanned MQ-4C Triton broad area maritime surveillance vehicles have recently been acquired. He also notes the possibility of evolving the X-47B into a joint strike-refueling platform, which would provide two useful, additional capabilities aboard the carrier that are more appropriate and necessary than a surveillance UAV.
  • Michael McDevitt, for The National Interest, discusses China’s ambitions as a maritime power by contextualizing the maritime environment from Beijing’s perspective. The article examines how China seeks to position itself in the maritime environment both regionally and globally, with the Coast Guard, PLA Navy, shipbuilding capacity, merchant fleet, distant-water fishing challenges, territorial disputes and both strategic and tactical level operations taken into consideration.
  • Paul Pryce, at Offiziere, provides an analysis on the current state of the Libyan Navy and the growing threat of piracy operations off of the country’s coastline. Mr. Pryce explains that the Navy’s one active ship, a Koni-class frigate, in addition to the lack of command and control governing the Navy – the same issue facing all Libyan security forces – is contributing to the refugee problem in the Mediterranean and the rising volume in piracy incidents throughout the region.
  • Robert Farley, for The National Interest, discusses Canada’s late 1950’s CF-105 Avro Arrow high-performance interceptor and the aircraft’s unsung potential as a dominating platform in early Cold War airspace, if only the program had not been cancelled due to shifts in Canadian technology, policy and security priorities. In a second article at The National Interest, Farley examines Russia’s Type 705 Lyra Cold War submarine that was regarded by the West as a profound threat to NATO’s undersea dominance.
  • Christian Davenport, for The Washington Post, highlights new technological advancements that may be transforming the way the pentagon outlines its defense strategy, particularly developments within the fields of robotics, drone swarms, and artificial intelligence. The article highlights emerging communication channels between the technology industry in Silicon Valley and the Pentagon, with Defense Secretary Ashton B. Carter recently meeting with executives at SpaceX and Google.
  • Kyle Mizokami, for Popular Mechanics, discusses the deployment of two U.S. carrier battle groups to the Philippine Sea to conduct exercises following the UN court ruling on China and its claims in the South China Sea. Mr. Mizokami explains that the carrier strike groups (CSGs) consist of two nuclear-powered aircraft carriers, two guided-missile cruisers, six guided-missile destroyers and likely two nuclear attack submarines – although their presence was not confirmed by the Navy. He adds that this is the first two-carrier exercise in the Western Pacific in two years.
  • Dave Majumdar, for The National Interest, examines the Russian submarine threat to NATO’s maritime forces and U.S. naval forces stationed throughout EuropeThe article explains how Russia has successfully incorporated highly agile, technologically advanced and lethal submarines into their overall A2/AD bubble strategy throughout European waters and the significant threat this poses to U.S. and allied undersea posture in the region.  

At CIMSEC we encourage members to continue writing, either here on CIMSEC or through other means. You can assist us by emailing your works to dmp@cimsec.org.

Sam Cohen is currently studying Honors Specialization Political Science at Western University in Canada. His interests are in the fields of strategic studies, international law and defense policy.

Featured Image: Naval vessels of Russia’s Black Sea Fleet (RT)