Tag Archives: drones

Sea Control 92 – Autonomy

seacontrol2Weapon autonomy is a broad term around which swirls an incredible amount of debate. Paul Scharre, Michael Horowitz, and Adam Elkus join Sea Control to discuss the nature of autonomy, how to imagine its use in an operational environment, and how to think of the debate surrounding it.

DOWNLOAD: Sea Control 92 -Autonomy

Music: Sam LaGrone

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

Surviving the Fabled Thousand Missile Strike (Part Five)

Surviving the Fabled Thousand Missile Strike

CARN class jpeg

Sketch by Jan Musil. Hand drawn on quarter-inch graph paper. Each square equals twenty by twenty feet.

This article, the fifth of the series, examines how fitting lots of drones, of all types, and large numbers of railguns, aboard a CVLN and either one or two CARNs, can allow the U.S. Navy to confidently ride out the fabled thousand missile strike from the mainland of Eurasia. To do so let’s walk through a possible exercise involving Red, a Eurasian mainland power and Blue, essentially a typical Western Pacific carrier strike group. Read Part One, Part Two, Part Three, Part Four.

Red’s motivation might be ensuring that Blue cannot interfere with, or arrange for reinforcements to reverse, an offshore invasion. An alternative, somewhat more likely though, is that Red is intent on challenging one of Blue’s friends or allies and finds that it cannot achieve its objectives without removing Blue’s powerful naval forces from the area. When threats and warnings do not result in a satisfactory result, Red’s leader authorizes a massive missile strike on Blue’s carrier strike group at sea. This missile strike will be an attempted TOT (time-on-target) strike where all the missiles launched, regardless of distance to the carrier strike group or their speed, i.e. a combination of subsonic and hypersonic missiles, will arrive within a five minute window at the target location. The strike will primarily consist of land-based missiles, but some of Red’s numerous submarines will attempt to participate as well, for the purposes of this exercise it is assumed 29 missiles launched from three different submarines will arrive on target within the five minute TOT time period. Red’s commander has elected to hold his meaningful, though not massive, long-range aircraft striking power in reserve, hovering in a threatening position but not immediately participating. Thus a total of 1,029 missiles are launched.

This exercise assumes that Red can coordinate the command and control challenges involved in such a large undertaking. It also assumes that Red possesses adequate space based surveillance capabilities that real time targeting information down to the nearest kilometer, or better, is available on a timely basis to the relevant land, air and submarine commanders.

It should be emphasized here the importance of the compressed TOT portion of Red’s attack plan. Any incoming missiles, whether land or sub launched will be far easier for Blue to defend against if straggling in before or after the massed attack. This advantage of Blue’s is magnified by the presence of the railguns with their enormous magazine size and the ability to fire every five seconds.

It is assumed that Blue’s carrier strike group consists of:

1 CVN

1 CVLN

1 CG (Ticonderoga class)

1 CARN

4 DDG (Arleigh Burke)

4 FF (the new ASW frigate under development)

2 squadrons of F-18s

6 EA-18G Growlers

1 squadron of F35s

1 squadron of strike drones

15+ ISR drones

4 E-2D Hawkeyes

2 S-3 Vikings

6 refueling drones

15+ Fire Scouts

10+ Seahawks

75+ buoys with UUVs or a dipping sonar installed and a radar/infrared lure

Blue’s carrier strike group commander has taken full advantage of the ASW capabilities provided by all the Fire Scouts and buoys, spreading the strike group out over a thirty mile radius in a preplanned dispersal strategy. The commander has also been successful at maneuvering the strike group into a position where there are no Red submarines within at least 30 miles, and it is believed (or hoped) by Blue’s commander that the strike group is at least 50 miles from the nearest Red submarine.

Blue also possesses space based surveillance capabilities and is able to provide Blue’s carrier strike group a twenty minute warning of the incoming attack. Blue’s commander selects one of his preplanned spatial deployment plans, concentrating the majority of his surface assets in a compact zone with the CARN taking position and turning its broadside closest to the incoming missile strike, three of the four DDGs some distance behind it, then the CG and two of the frigates, then the CVLN and finally the CVN. One frigate is so far off on the periphery on ASW duty that it will fire chaff rounds repeatedly during the attack and hope the handful of aircraft overhead and many radar lures dropped in its vicinity will allow it to emerge unscathed. On the opposite side of the strike group one DDG and the fourth frigate will do the same, though with the added protection of the DDGs AAW missiles.

This dispersion plan means a large portion of the area where the strike group is located is simply empty ocean. The intent is to use the strike groups EEW and radar lures to effect and make thorough use of the fact that even a subsonic missile cannot maneuver quickly enough to search out targets if presented with enough empty ocean upon their initial arrival at the selected target location.

Blue’s commander has also chosen a specific plan for utilizing his air assets in a layered defense, intent on maximizing the effectiveness of the various weapon systems embarked. Let us follow the resolution of the attack, starting with the outermost layer, and work our way inwards as the strike progresses.

Cap Layer

2 E-2D Hawkeyes and 12 F-18 Super Hornets

Blue’s strike group commander has assigned these air assets to anti-aircraft duty, approximately 250 miles from the strike group’s location. Since Red’s long-range bombers are known to be airborne, but apparently are not immediately participating, the decision is taken for these Super Hornets to hold their fire, confident that the rest of the strike group can deal with the incoming missiles, and continue to guard against any enemy aircraft that might intrude later.

Shot Down/Eliminated/Missed/Decoyed This Layer: Zero

SD/E/M/D Cumulative: Zero           Of 1,029 incoming missiles

ISR Drones Layer

8 ISR Drones

These eight drones are individually scattered in an arc 150 miles out from the strike group’s location. They are there to provide accurate targeting information, primarily for the SM-2 and railgun equipped surface ships of the strike group. In particular the presence of this arc ensures timely targeting information so the railguns can effectively engage at their maximum range of 65 miles.

SD/E/M/D This Layer: Zero 

SD/E/M/D Cumulative: Zero           Of 1,029 incoming missiles

Railgun Layer

13 railguns (12 on the CARN and 1 on the CVLN)

With the targeting information provided initially by the ISR drones and later by the various aircraft and AAW radars of the strike group the railguns will steadily engage at their maximum rate of every five seconds. Since it is unlikely that any particular missile, even subsonic ones, will not close the remaining 65 miles to the strike group before a second shot can be taken this exercise assumes each railgun will only fire once at any given missile.

Each railgun can fire every seconds, 60 seconds/5 = 12 shots a minute. Therefore over a five minute time period each railgun will get off 5 x 12 = 60 carefully aimed shots. 13 railguns x 60 equals 780 opportunities to hit an incoming missile.

This exercise will assume a 50% success rate for the railguns. Therefore 390 incoming missiles are eliminated.

SD/E/M/D This Layer: 390  

SD/E/M/D Cumulative: 390           Of 1,029 incoming missiles

SM Family Missile Layer

420 surface ship launched SM-2 missiles and 2 E-2D Hawkeyes operating approximately fifty miles out from the strike group’s location.

The CG (100) and four DDGs (80 each) in the strike group are assumed to have 420 SM-2 missiles available to fire in their collective VLS cells.

This exercise will assume a 70% success rate for the missiles. Higher success rates can easily be argued for, though there will be some unavoidable overlap with the railguns resulting in double targeting by some missiles. 420 x .70 = 294. Therefore 294 incoming missiles are eliminated.

SD/E/M/D This Layer: 294  

SD/E/M/D Cumulative: 684           Of 1,029 incoming missiles

Air Wing Layer

12 F-35s, 12 Strike Drones, 12 F-18 Super Hornets, 6 EA18-G Growlers, and 2 S-3 Vikings carrying 4 air-to-air missiles each = 176 AAW missiles

Blue’s air commander has elected to concentrate the bulk of his air assets close to the strike group. This allows the air commander to attempt to concentrate this groups AAW missiles in defense of the three zones occupied by the surface ships below. This allows more of the incoming missiles that have survived to this point but appear to be targeted on empty ocean to be ignored.

This exercise will assume a 70% success rate for the AAW missiles. Again, higher success rates can easily be argued for, though given the tight time constraints on pilots decision making some double targeting will be unavoidable. 176 x .70 = 123.2 rounded down to 123. Therefore 123 incoming missiles are eliminated.

SD/E/M/D This Layer: 123   

SD/E/M/D Cumulative: 807           Of 1,029 incoming missiles

Eliminated Due to Malfunction Layer

If everything always worked perfectly the world would be a much happier place. But things inevitably go awry and the incoming missiles are not immune to this problem. This exercise assumes a standard 5% malfunction rate. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 858           Of 1,029 incoming missiles

Missed Due to Dispersal Layer

The high rate of speed of the incoming missiles will sharply limit their ability to effectively search for a target if they happen to encounter one of the areas of empty ocean Blue’s commander has contrived. This exercise assumes, rather arbitrarily, a 5% missed rate, but empty ocean will certainly greet some of Red’s missiles. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 909           Of 1,029 incoming missiles

Decoyed Layer

The strike groups EEW capabilities, including the Growlers, all the strike group helicopters, Fire Scouts and over 75 buoys with various types of lures aboard can be utilized to great effect. This exercise assumes, rather arbitrarily, a 5% decoyed rate. It is tempting to select a higher rate, but to be conservative the 5% rate is used. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 960           Of 1,029 incoming missiles

Internal Rolling-In-Frame Layer

The CARN has six rolling-in-frame close defense missile launchers installed on each side of the ship. As Red’s surviving missiles reach the LOS horizon, these missiles engage those missiles targeted on the primary layered group of surface ships, which includes the crucial CVN.

This exercise will assume a 70% success rate for these missiles. 48 x .7 = 33.6, rounded down to 33. Therefore 33 incoming missiles are eliminated.

SD/E/M/D This Layer: 33    

SD/E/M/D Cumulative: 993           Of 1,029 incoming missiles

Last Ditch Layer

At this point the last 36 missiles of the original 1,029 are assumed to acquire surface targets and close on them. At this point the targeted ships individual CIW and close range missile defense provide a last ditch defense layer.

To be consistent, this exercise will assume a 70% success rate for the CIW and close range defense missiles. 29 x .7 = 20.3, rounded down to 20. Therefore 20 incoming missiles are eliminated.

SD/E/M/D This Layer: 20    

SD/E/M/D Cumulative: 1,013           Of 1,029 incoming missiles

The hits the remaining 26 missiles inflict will do varying amounts of damage, with the highest variability being the size of the target. One hit can easily destroy one of the ASW frigates. Depending on where the hit occurs, damage to a DDG or the CG will merely damage some portion of its functionality but the combination of the damage and the resulting fires could easily incapacitate the ships fighting ability for quite some time. A hit or two on the CARN with its extensive armor are likely to incapacitate some of its weapon systems but not seriously impair the ships ability to fight. Obviously the more hits, the greater the collective damage. The CVLN and CVN, hopefully spared the worst by their placement at the far back of the layered spatial deployment chosen by Blue’s strike group commander, should be able to continue to function at close to normal capabilities, with the obvious proviso that any fires started do not prove difficult to bring under control.

So at the conclusion of the first round of the exercise, Red has achieved some significant, but not decisive damage with its massive 1,000 missile strike. So what does the Red Commander do next? If that is the sum of his assets, committing his modest long-range aircraft to anything other than continued harassing missions does not seem prudent. Blue’s obstructing carrier strike group has more or less survived and Red must now consider alternative means of achieving its objectives.

Unless Red, assumed to be a major East Asian land power, has utilized its substantial economic capability to construct a second wave of long-range missiles.

Red Force Commander

If so, then Red force commander, after a rapid but thorough review of the results of the first strike provided by his space-based reconnaissance assets decides to proceed with a pre-planned second strike. This time all of his available air assets will participate in the attack and Red Force commander does his best to coordinate another five minute time-on-target attack by hundreds of land based missiles and orders a much larger number of submarines to participate. Hopefully many of them will be able to evade Blue Forces SSNs and contribute at least some missiles from a multitude of different directions.

The intent here is to take advantage of the fact Blue Force will not have time to reload his ship borne missile tubes and in the intervening 30 minutes to an hour, only a few aircraft will have time to re-arm with AAW missiles. This will leave only the magazines of the railgun equipped ships with a significant amount of ammunition available for use.

Summation

At this point we will take leave of the exercise for with the results so far we are capable of making several conclusions.

1- Adding the various types of drones now available as well as the railgun, IN QUANTITY, to the fleet combined with appropriate doctrine adjustments, and flexible and carefully thought through battle plans means the fabled 1,000 missile strike can be survived by a typical carrier strike group.

2- This is particularly true of what most non-East Asian powers across the Eurasian landmass are likely to be able to field over the next few decades.

3- Adding a second CARN to the Western Pacific carrier strike group might well be a wise additional investment.

4- Several of the layers discussed above were deliberately provided with conservative success rates. The railgun itself may very well be able to operate, even at 65 miles, at much higher success rates. The ability to utilize our EEW and decoying assets could also provide significantly better results than estimated, as could the effects of dispersal.

5- Installing one or two railguns aboard the new CVNs as they are built looks to be an excellent idea. Consideration should also be given to installing one or two during refits, or during the refueling process, of our existing carrier assets.

In the next article we will discuss just why Congress and the American taxpayers should pay for all these additional UAVs, UUVs, Fire Scouts, buoys, railguns and the necessary ships to deploy them at sea.                                                                           

Jan Musil is a Vietnam era Navy veteran, disenchanted ex-corporate middle manager and long time entrepreneur currently working as an author of science fiction novels. He is also a long-standing student of navies in general, post-1930 ship construction thinking, design hopes versus actual results and fleet composition debates of the twentieth century.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

Operating in an Era of Persistent Unmanned Aerial Surveillance

By William Selby

In the year 2000, the United States military used Unmanned Aerial Systems (UASs) strictly for surveillance purposes and the global commercial UAS market was nascent. Today, the combination of countries exporting complex UAS technologies and an expanding commercial UAS market advances the spread of UAS technologies outside of U.S. government control. The propagation of this technology from both the commercial and military sectors will increase the risk of sophisticated UASs becoming available to any individual or group, regardless of their intent or financial resources. Current and future adversaries, including non-state actors, are likely to acquire and integrate UASs into their operations against U.S. forces. However, U.S. forces can reduce the advantages of abundant UAS capability by limiting the massing of resources and by conducting distributed operations with smaller maneuver elements.

Leveraging the Growth in the Commercial UAS Market

While armed UAS operations are only associated with the U.S., UK, and Israel, other countries with less restrictive export controls are independently developing their own armed UAS systems. Chinese companies continue to develop reconnaissance and armed UASs for export to emerging foreign markets. Earlier this year, social media reports identified a Chinese CH-3 after it crashed in Nigeria. Reports indicate China sold the system to the Nigerian government for use against Boko Haram. Other countries including Pakistan and Iran organically developed armed UAS capabilities, with claims of varying levels of credibility. In an effort to capitalize on the international UAS market and to build relationships with allies, the U.S. eased UAS export restrictions in early 2015 while announcing the sale of armed UASs to the Netherlands. Military UAS development is expected to be relatively limited, with less than 0.5 percent of expected future global defense spending slated to buying or developing military drones. For now, long range surveillance and attack UASs are likely to remain restricted to the few wealthy and technologically advanced countries that can afford the research costs, training, and logistical support associated with such systems. However, short range military or civilian UASs are likely to be acquired by non-state actors primarily for surveillance purposes.

Still captured from an ISIS documentary with footage shot from a UAS over the Iraqi city of Fallujah(nytimes.com)

Still captured from an ISIS documentary with footage shot from a UAS over the Iraqi city of Fallujah(nytimes.com)

Hamas, Hezbollah, Libyan militants, and ISIS are reportedly using commercial UASs to provide surveillance support for their military operations. Current models contain onboard GPS receivers for autonomous navigation and a video transmission or recording system that allows the operators to collect live video for a few thousand dollars or less. Small UASs, similar in size to the U.S. military’s Group 1 UASs, appeal to non-state actors for several reasons. Namely, they are inexpensive to acquire, can be easily purchased in the civilian market, and are simple to maintain. Some systems can be operated with very little assembly or training, which reduces the need for substantial technical knowledge and enables non-state actors to immediately integrate them into daily operations. These UASs are capable of targeting restricted areas as evidenced by the recent UAS activity near the White House, French nuclear power plants, and the Japanese Prime Minister’s roof. The small size and agility of these UASs allow them to evade traditional air defense systems yet specific counter UAS systems are beginning to show progress beyond the prototype phase.

Economic forecasters may dispute commercial UAS sales predictions, but most agree that this market is likely to see larger growth than the military market. Countries are currently attempting to attract emerging UAS businesses by developing UAS regulations that will integrate commercial UASs into their national airspace. The increase of hobby and commercial UAS use is likely to lead to significant investments in both hardware and software for these systems. Ultimately, this will result in a wider number of platforms with an increased number of capabilities available for purchase at a lower cost. Future systems are expected to come with obstacle avoidance systems, a wider variety of modular payloads, and extensive training support systems provided by a growing user community. Hybrid systems will address the payload, range, and endurance limitations of the current platforms by combining aspects of rotor and fixed wing aerial vehicles. The dual-use nature of these commercial systems will continue to be an issue. Google and Amazon are researching package delivery systems that can potentially be repurposed to carry hazardous materials. Thermal, infrared, and multispectral cameras used for precision agriculture can also provide non-state actors night-time surveillance and the ability to peer through limited camouflage. However, non-state actors will likely primarily use hobby and commercial grade platforms in an aerial surveillance role, since current payload limitations prevent the platforms from carrying a significant amount of hazardous material. 

Minimizing the Advantages of Non-State Actor’s UAS Surveillance

As these systems proliferate, even the most resource-limited adversaries are expected to have access to an aerial surveillance platform. Therefore, friendly operations must adapt in an environment of perceived ubiquitous surveillance. Despite the limited range and endurance of these small UASs, they are difficult to detect and track reliably. Therefore, one must assume the adversary is operating these systems if reporting indicates they possess them. Force protection measures and tactical level concepts of operations can be modified to limit the advantages of ever-present and multi-dimensional surveillance by the adversary. At the tactical level, utilizing smoke and terrain to mask movement and the use of camouflage nets or vegetation for concealment can be effective countermeasures. The principles of deception, stealth, and ambiguity will take on increasing importance as achieving any element of surprise will become far more difficult. 

The upcoming 3DR Solo UAS will feature autonomous flight and camera control with real time video streaming for $1,000 (3drobotics.com)
The upcoming 3DR Solo UAS will feature autonomous flight and camera control with real time video streaming for $1,000 (3drobotics.com)

At static locations such as forward operating bases or patrol bases, a high frequency of operations, including deception operations, can saturate the adversary’s intelligence collection and processing capabilities and disguise the intent of friendly movements. Additionally, massing strategic resources at static locations will incur increasing risk. In 2007 for example, insurgents used Google Earth imagery of British bases in Basra to improve the accuracy of mortar fire. The adversary will now have near real time geo-referenced video available which can be combined with GPS guided rockets, artillery, mortars and missiles to conduct rapid and accurate attacks. These attacks can be conducted with limited planning and resources, yet produce results similar to the 2012 attack at Camp Bastion which caused over $100 million in damages and resulted in the combat ineffectiveness of the AV-8B squadron.

In environments without the need for an enduring ground presence, distributed operations with smaller maneuver elements will reduce the chance of strategic losses while concurrently making it harder for the adversary to identify and track friendly forces. Interestingly, operational concepts developed by several of the services to assure access in the face of sophisticated anti-access/area denial threats can also minimalize the impact of the UAS surveillance capabilities of non-state actors. The Navy has the Distributed Lethality concept, the Air Force is testing the Rapid Raptor concept, and the Army’s is developing its Pacific Pathways concept. The Marine Corps is implementing its response, Expeditionary Force 21 (EF21), through several Special Purpose Marine Air Ground Task Forces.

The EF21 concept focuses on using high-speed aerial transport, such as the MV-22, to conduct dispersed operations with Company Landing Teams that are self-sufficient for up to a week.  In December 2013, 160 Marines flew over 3,400 miles in KC-130s and MV-22s from their base in Spain to Uganda in order to support the embassy evacuation in South Sudan, demonstrating the EF21 concept. Utilizing high speed and long-range transport allows friendly forces to stage outside of the adversary’s ground and aerial surveillance range. This prevents the adversary from observing any patterns that could allude to the mission of the friendly force and also limits exposure to UAS surveillance. Advances in digital communications, including VTCs and mesh-networks, can reduce the footprint of the command center making these smaller forces more flexible without reducing capabilities. The small size of these units also reduces their observable signatures and limits the ability of the adversary to target massed forces and resources.

Confronting the Approaching UAS Free-Rider Dilemma

Non-state actors capitalize on the ability to rapidly acquire and implement sophisticated technologies without having to invest directly in their development. These organizations did not pay to develop the Internet or reconnaissance satellites, yet they have Internet access to high-resolution images of the entire globe. It took years for the U.S. to develop the ability to live stream video from the Predator UAS but now anyone can purchase a hobby UAS that comes with the ability to live stream HD video to YouTube for immediate world-wide distribution. As the commercial market expands, so will the capabilities of these small UAS systems, democratizing UAS technology. Systems that cannot easily be imported, such as advanced communications relays, robust training pipelines, and sophisticated logistics infrastructure can now be automated and outsourced. This process will erode the air dominance that the U.S. enjoyed since WWII, now that commercial investments allow near peers to acquire key UAS technologies that approach U.S. UAS capabilities.

The next generation of advanced fighters may be the sophisticated unmanned vehicles envisioned by Navy Secretary Ray Maybus. However, other countries could choose a different route by sacrificing survivability for cheaper, smaller, and smarter UAS swarms that will directly benefit from commercial UAS investments. Regardless of the strategic direction military UASs take, commercial and hobby systems operating in an aerial surveillance role will remain an inexpensive force multiplier for non-state actors. Fortunately, the strategic concepts developed and implemented by the services to counter the proliferation of advanced anti-air and coastal defense systems can be leveraged to minimalize the impact of unmanned aerial surveillance by the adversary. Distributed operations limit the massing of resources vulnerable to UAS assisted targeting while long-range insertions of small maneuver elements reduces the exposure of friendly forces to UAS surveillance. Nation states and non-state actors will continue to benefit from technological advances without investing resources in their development, pushing U.S. forces to continually update operational concepts to limit the increasing capabilities of the adversary.

William Selby is a Marine officer who completed studies at the US Naval Academy and MIT researching robotics and unmanned systems. He previously served with 2nd Battalion, 9th Marines and is currently stationed in Washington, DC. Follow him @wilselby or www.wilselby.com 

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.
Select a Donation Option (USD)

Enter Donation Amount (USD)

Call for Articles: Future of Naval Aviation Week, Sep 14-18

Week Dates: 14-18 Sept 15
Articles Due: 9 Sept 15
Article Length: 500-1500 Words
Submit to: nextwar(at)cimsec(dot)org

Back in January, CAPT Jerry Hendrix (USN, Ret) and CDR Bryan McGrath (USN, Ret) had a stirring debate on the future of Aircraft Carriers. However, the debate quickly shifted from the carrier itself to the nature of the airwing it carried. Indeed, the carrier is nothing more than a host for the platforms provided by naval aviation – and only one of many ships that can carry aviation assets.

That discussion, driving into the world of the carrier air wing, was the inspiration for this week of discussion on naval aviation in general. From the maritime patrol aircraft deployed from the reclaimed Chinese reefs in the South China Sea, to US Army Apaches operating from amphibious assault ships, to 3-D printed drones flown off a Royal Navy offshore patrol vessel, to manned and unmanned ideas for the carrier air wing as carriers proliferate around the Pacific  -we want your ideas and observations on where global naval aviation will and can go next.

How will the littoral navies of the world change with new, lower-cost unmanned aviation assets? Are carriers armed with legions of long-range unmanned drones the future for global powers – will these technologies exponentially increase the importance of smaller carriers – or is unmanned technology a limited path that may be resisted (rightfully?) by pilots and their communities? Will surface fleets embrace the potential from easily produced drone swarms deployed from ships of the line… should they? What is the future of land-based naval aviation? What innovations will be ignored, what will be embraced, and what will the air assets of future fleets around the world look like? What will the institutions, the leadership, and C2 structures that support all these assets of their varied nations look like? The topic is purposefully broad to bring forward a myriad of topics and inspire future topic weeks on more specific subjects.

Contributions should be between 500 and 1500 words in length and submitted no later than 9 September 2015. Publication reviews will also be accepted. This project will be co-edited by LT Wick Hobson (USN) and, as always, Sally DeBoer from our editorial pool.

Matthew Hipple, President of CIMSEC, is a US Navy Surface Wafare Officer and graduate of Georgetown’s School of Foreign Service. He hosts the Sea Control podcast and regularly jumps the fence to write for USNI and War on the Rocks.