Tag Archives: EW

Deception and the Backfire Bomber: Part One

The following article is part of our cross-posting series with Information Dissemination’s Jon Solomon. It is republished here with the author’s permission. It can be read in its original form here.

By Jon Solomon

Last winter’s Naval War College Review contained a must-read article on the Soviet Navy’s doctrine from the 1980s for employing its TU-22M Backfire series of bombers against U.S. Navy carrier groups. In “Kamikazes: the Soviet Legacy,” former Soviet Navy officer Maksim Y. Tokarev reveals many details regarding Backfire capabilities and tactics that, to my knowledge at least, have not been previously disclosed within English-language open sources.

As part of my 2011 master’s thesis, I conducted a case study examination of how the U.S. Navy used Electronic Warfare (EW) and tactical deception to counter Soviet long-range maritime strike capabilities such as Backfire during the Cold War. I found that while a considerable amount of information is now publicly (though not necessarily widely) known about the two sides’ tactics, technologies, and real-world operational experiences from the late 1950s through mid-1970s, relatively few details regarding the competition’s late-1970s through early-1990s peak have been declassified by the U.S. or Russian governments. Tokarev’s article sheds a remarkable amount of light on the latter period from the Russian perspective. In doing so, he also underlines timeless maritime targeting challenges that technology can partially ameliorate but never fully eliminate. He additionally paints an intriguing picture of how an advanced attacker might use tactical deception in an attempt to score a lopsided win in a battle at sea. In my posts this week, I will point out the most fascinating of the new details provided by Tokarev and then examine their historical significance as well as contemporary implications.

What Kind of Reconnaissance Support did Backfire Need?

One of the key historical questions regarding Backfire involves the reconnaissance support the bombers’ crews needed to effectively employ their missiles. The earlier TU-16 Badger series of Soviet maritime bombers depended upon targeting cues provided by scout aircraft. These so-called ‘pathfinders’ penetrated an enemy’s battleforce ahead of a raid in order to locate and positively identify aircraft carriers or other high-priority target ships. This was necessary because a standoff bomber like Badger simply could not tell whether a large contact held by its onboard radar was an aircraft carrier, a surface combatant or other ship configured to simulate a carrier, an artificial decoy, or a large and perhaps neutral-flagged merchant vessel. Even if a surface contact of interest made ‘telltale’ radio frequency emissions, the vessel’s type could not be determined with high confidence because of the possibility that the emissions were deceptive. Visual-range verification of contacts’ types (if not identities) was consequently a prerequisite for the Badgers to be able to aim their missiles with confidence. Yet, because the Soviet pathfinder aircraft necessarily had to expose themselves to the entirety of a battle force’s layered defenses in order to do their jobs, they represented single-points-of-failure that could easily doom a raid if neutralized before they located, classified, and identified desired targets.

In the mid-1970s, the Soviets began launching Radar Ocean Reconnaissance and Electronic intelligence Ocean Reconnaissance Satellites (RORSAT and EORSAT) into low earth orbit. RORSAT and EORSAT were primarily intended to expand the maritime areas covered by the Soviet Ocean Surveillance System (SOSS), a networked ‘system of systems’ that fused data from a wide variety of remote sensors to locate, identify, track, and target U.S. Navy forces at sea. In theory, Soviet standoff bombers might not have needed the support of pathfinder scouts if SOSS operators were able to provide a raid with high confidence, targeting-quality tactical pictures derived from RORSAT, EORSAT, and perhaps other remote sensor sources.

Backfire made its Soviet Naval Air Force (SNAF) debut in 1976. Unlike the subsonic Badger, Backfire could make its final approach to its firing position—and then its subsequent escape attempt—at supersonic speed. The SNAF’s Backfire-C variant, which reached Initial Operational Capability in 1981, carried enough fuel to make an indirect approach against a targeted naval force operating well beyond 2000 nautical miles from the Soviet coast. Defending against a Backfire raid was therefore an order of magnitude more complicated than defending against a Badger raid. The tactical dilemma facing a U.S. Navy battleforce would have been further exacerbated—potentially decisively—if a Backfire raid received its targeting data directly from SOSS instead of from pathfinders. Some later Backfire-Cs were even equipped with a communication system that allowed them to download RORSATs’ and EORSATs’ tactical pictures as those satellites passed overhead.

From a purely technical perspective, though, it seemed quite unlikely Backfire could completely do away with reliance upon pathfinders or other visual-range scouts. As I detailed in my thesis, RORSAT suffered from the same contact classification challenges that inherently plague any radar. In fact, RORSAT’s shortcomings were even worse: its sensitivity was apparently so poor that it could only detect large ships, and even then not reliably when the area it was searching contained inclement weather. EORSAT was completely dependent upon ships complacently radiating telltale radiofrequency emissions, and as a result could not compensate for RORSAT. Lastly, as neither RORSAT nor EORSAT could report their data in ‘real time,’ their contact pictures generally suffered from tactically-significant lateness. Nevertheless, other than anecdotes from U.S. Navy veterans of the 1980s who directly observed SNAF operations when their carrier groups steamed into the “Bear’s Den,” and beyond some open source scholarly interpretations of Soviet doctrine dating to the early 1990s, until Tokarev there has been virtually no authoritatively-sourced evidence available to the public confirming or refuting Backfire’s dependence upon pathfinders.

On that note, Tokarev first relates that SNAF bomber forces:

“…always tried to use reconnaissance and targeting data provided by air assets, which was also most desired by their own command structure. Targeting data on the current position of the carrier sent by surface ships performing “direct tracking” (a ship, typically a destroyer or frigate, sailing within sight of the carrier formation to send targeting data to attack assets—what the Americans called a “tattletale”), were a secondary and less preferable source. No great trust was placed in reports from other sources (naval radio reconnaissance, satellites, etc.). Lieutenant General Sokerin, once an operational officer on the Northern Fleet NAF staff, always asked the fleet staff’s admirals just to assign him a target, not to define the time of the attack force’s departure; that could depend on many factors, such as the reliability of targeting data or the weather, that generate little attention in nonaviation naval staff work.”(Tokarev, Pg. 73)

He later amplifies this, noting that Backfire crews

“…had the targeting data that had been available at the moment of takeoff and kept the receivers of the targeting apparatus ready to get detailed targeting, either from the air reconnaissance by voice radio or from surface ships or submarines. The latter targeting came by high-frequency (HF) radio, a channel known as KTS Chayka (the Seagull short-message targeting communication system) that was usually filled with targeting data from the MRSC Uspekh (the Success maritime reconnaissance targeting system), built around the efforts of Tu-95RC reconnaissance planes. The Legenda (Legend) satellite targeting system receiver was turned on also, though not all planes had this device.” (Tokarev, Pg. 74)

These statements tell us two things. First, while Backfires could use direct satellite-based cueing, they relied heavily upon—and in fact placed greater trust in—targeting provided by scout aircraft. Second, a Backfire (or any Soviet maritime bomber) sortie depended upon raid planners being told approximately where a U.S. or NATO naval group was operating. If SOSS or any other surveillance or reconnaissance capabilities supporting this general cueing was disrupted or deceived, a raid might be dispatched to the wrong location, might be wasted against a decoy group, might be exposed to an ambush, might be held back until too late, or might never be launched at all.

We must keep in mind that launching a SNAF raid was no small undertaking. Per Tokarev, an entire air division—up to a hundred bombers—might be hurled against a single carrier’s battle group. Furthermore, doctrine called for the Soviet Northern and Pacific Fleets to be equipped with three air divisions each in order to counter multi-carrier battle groups. Tokarev also mentions that the bomber attrition rate for a single raid was expected to be as high as 50% regardless of whether or not the objective U.S. or NATO warships were successfully struck (Tokarev, Pg. 73, 78). With a finite number of bombers, missiles, and trained crews, it is reasonable to think Soviet commanders would have been somewhat hesitant to dispatch such irreplaceable forces into battle unless they had some degree of confidence in their situational picture’s accuracy; the operational-strategic penalties that would be incurred if they ‘got it wrong’ simply seem too high for this not to have been the case. Accordingly, it will be extremely interesting to someday learn the criteria that had to be satisfied for SNAF commanders to order a raid.  

In part two of the series, just how effective was U.S. Navy counter-targeting?

Jon Solomon is a Senior Systems and Technology Analyst at Systems Planning and Analysis, Inc. in Alexandria, VA. He can be reached at [email protected]. The views expressed herein are solely those of the author and are presented in his personal capacity on his own initiative. They do not reflect the official positions of Systems Planning and Analysis, Inc. and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency. These views have not been coordinated with, and are not offered in the interest of, Systems Planning and Analysis, Inc. or any of its customers.

Raid Breaker: Robert Work’s Soft Kill on Hard Costs

Winston Churchill noted that, “it is better to jaw-jaw than to war-war” – so too once the war-war has started, “it is better to buzz-buzz, then to bang-bang.” U.S. Deputy Secretary of Defense Robert Work’s desire for new electronic-warfare (EW) solutions AKA Raid Breaker, aimed at large missile salvos in particular, is necessary not only for the arena of physical war, but the internal war of budgets and force planning that enable such critical fights.

For the following argument I assume the effectiveness of soft-kill (EW) over hard-kill options. I also assume that ultimately shooting down a guided missile is more expensive than confusing it; as Secretary Work states,for relatively small investments, you get an extremely high potential payoff.

However, beyond the immediate cost/effectiveness argument, we are forced to spend more in other areas due to the increasing amount of space/weight/weapon systems we dedicate to missile defense on our surface ships. That dedication to defense pushes out offensive capabilities, which we must then buy in other areas. Some might argue that the “need” for the F-35 and its stealth capabilities were, in part, driven by destroyers whose long-range weapons weapons were almost wholly turned over to defense – requiring a carrier for offensive punch. That technological bias towards the defensive has become so extreme that it has required VADM Rowden’s new “Distributed Lethality” effort – a course change back into a realm that should be a natural instinct for the surface force: distributed operations and killing enemy ships.

Of course, the pricetag and weight of kinetic systems has also prevented the fleet from finding more cost-effective ways to increase the ship count – requiring DDG’s or, in the case of the original LCS plan, expanding smaller ships to take on additional responsibilities. With significant investments in defensive systems not requiring a vast VLS magazine, we could build smaller ships with bigger relative punches at a lesser cost. We could more aggressively pursue the Zumwaltian dream of the High-Low Mix: more ships for more effect for less money – every CNO and SECNAV’s dream.

Raid Breaker is a case of finding, and exploiting, competitive advantage. We have been using our best offensive capabilities – the kinetic weapons – for defense. We have let the best defensive options languish, and in so doing pushed expensive requirements into other areas where we must find our offensive edge. A firm dedication to electronic warfare for “soft-kill” options gives us our ships, and our procurement flexibility, back.

In the end, the excitement over Raid Breaker should not primarily involve its awesome war fighting impact if successful – but all the other ideas it will all the Navy to pursue. What makes Raid Breaker so beautiful is that the raid it breaks, in the long-term, is the one on our bottom line.

Matthew Hipple is a Naval Officer and Director of Online Content at CIMSEC. He also produces our Sea Control podcast, hosting the US edition.  

The Rise of the Social-State

As the clock struck midnight on December 31, 2000, at the start of a new millennium, there were approximately 360 million unique internet users. Just 1/1000th of the populations in the Middle East and Africa had access to the internet. Facebook was still but a twinkle in Mark Zuckerberg’s eye.

Thirteen years later, this has changed dramatically. At nearly 2.5 billion people, the internet is used by more than 1/3 of the world’s population. More than 15% of Africans now have access to the internet – the majority of them getting it through mobile data via cell phones – while a whopping 40% of Middle Easterners are now online. That represents a growth of over 3000% (that’s three thousand) in just over a decade.

At the same time, social media use has risen exponentially. If all the Facebook users in the world were assembled into one place, they would make up the third-largest country on Earth with over 1.1 billion citizens (behind only China and India). While not nearly as numerous, there are over 500 million users of 140-character Twitter, with over 10% of those people in a single country:  China.

A Different World

You forgot the "@" before Mubarak.
You forgot the “@” before Mubarak.

People are no longer left to rely on the state-sponsored dictation of events, or even a few media outlets reporting what they’ve seen. With Twitter, first-hand accounts and pictures can be passed quickly; with Facebook, users can share and collaborate on growing trends; on YouTube, we can see with our own eyes exactly what is happening in Syria, Egypt, or on the streets outside Washington, DC.

The most enduring reality of the past decade has been the rise of the global individual. In 2006, Time‘s “Person of the Year” was the individual (“You,” to be specific). In response to old, slow, unresponsive regimes in Tunisia, Libya, Egypt, and a host of other countries, leaders were either deposed in a violent way or forced to make significant concessions antithetical to the totalitarian norm.

Global individualism has led to a prioritization of individuals and ideologues over the traditional concept of “nation.” When you can “like” the Syrian Free Army on Facebook or “follow” al-Shabaab on Twitter from the comfort of your own home, it doesn’t matter that you live in the land known as “Pakistan” or “Egypt” or even “the United States of America.” Individuals across the globe are organizing themselves more now by ideas and preferences than by borders or nationality.

This notion is not new in religious lore. In Islam, the organization of Muslims everywhere is known as the “Caliphate.” Before it was a UN-recognized state, Israel was the name of the global community of Jewish people. Today, we might call all fans of the Dallas Cowboys a “Facebook group” and all the internet subscribers of Muqtada al-Sadr his “Twitter followers.” In the 21st century, the diaspora is connected via wi-fi.

The Decline of Nationalism

At a recent gathering of more than 150 American citizens with at least some level of college education, I asked the assembled crowd to identify the corporate logos of Starbucks, Shell, AT&T, McDonald’s, and Fed Ex. 100% of the crowd was able to correctly identify at least 4 of the logos, while around 90% were able to identify all 5.

Immediately afterward, I asked the same 150 people to identify the national flags of Syria, Egypt, Somalia, Libya, and Chad. Approximately 80% could identify 1 flag, 60% could identify 2 flags, 33% could identify 3 flags, 10% could identify 4 flags, and only 1 person (an African studies major in college) could identify all 5 flags.

In an effort to drive the point home, I flashed the flags of five U.S. states: New York, Alabama, Delaware, Indiana, and Massachusetts. If you can believe it, the percentages were actually worse; not a single person was able to correctly identify all five state flags (to be honest, if I hadn’t researched for the event, I doubt I would have been able to guess more than three or four either).

This erudite experiment, though anecdotal and far from scientific, points to a larger global trend:  the decline of nationalism, and the rise of global individualism.

The Ideological Basis of Armies

In light of the recent revolutions that comprised “the Arab Spring,” one must ask:  how are armies fielded? In our textbooks, we are taught that armies are the property of nation-states, who field them in defense of their borders or broader national interests.

But isn’t the original concept of the nation-state simply an ideal? At its basic level, an army is stood by people coming together to protect themselves from harm by a common enemy. It follows, then, that the armies of the 21st century will follow this natural law—that they are fielded to defend ideals—and with that comes a monumental shift in the global political paradigm: the rise of the social-state.

This is not a new idea. In his book Jihad Joe, J.M. Berger estimates that more than 1,400 American citizens have taken part in some form of militant jihad over the past 30 years. As our communication and connectivity brings us closer, our money and internet history drive our future more than the votes we drop in the ballot box.

Yet simple connectivity cannot supplant real action from Internet users. In “Tweeting Toward Freedom,” the Wilson Quarterly noted that, “More than a million people have joined a Facebook page of the Save Darfur Coalition, but few among them have taken any additional action to help those in Sudan.” The most effective ideologues in this century will be those who can turn words on a computer screen into reliable action from their followers.

The Social State

In a Small Wars Journal article, Richard Lindsey wrote, “There comes a point in any insurgency where it must move beyond the reach of social media, and tangible gains must be made on the ground – positions occupied, personalities deposed, systems replaced, logistics realized, and governments overthrown.” Yet if insurgents and individuals can defend themselves from governments while operating within that government’s borders, they have already made “tangible gains…on the ground.” The positions, personalities, systems, logistics, and governance are provided through wireless or ether connections and supported via the “social compact”—namely, some form of user agreement.

If I can get access to the internet, I can pledge to a cause, fund that cause, and become indoctrinated to that cause. We might call this process “assimilation.” My physical location is only important insomuch as I can carry out actions for that cause in my specific locale or travel to a nearby location to do the same. The “social-states” created by this reality are the future of the world, where citizens are arranged by borders of thought, ideology, and preference.

On its face, this may seem like a unique solution to so many conflicts throughout the world. However, the “borders” created by such a reality are much more fluid, volatile, and confusing, and they will drive our concept of conflict. In the book Warrior Politics, visionary author Robert Kaplan surmises that “the spread of information in the coming decades will lead not just to new social compacts, but to new divisions as people discover new and complex issues over which to disagree.”

Rather than access to weapons and land, the ability to control the electromagnetic spectrum and access to the internet will define future battlefields as the “strategic high ground.” Cyber strike and defense will be the most critical mission sets as friend and foe alike use this medium to achieve not only kinetic effects against their enemies–including CBRNE—but important non-kinetic effects as well, especially those encompassed in the concept of Anti-Access/Area Denial (A2AD).

Without respect for nation-state political borders, these effects will be felt indiscriminately by both supporters and opponents of the cause. Therefore, those who can develop the ability to discriminate their effects will find the most success and support.

The Tough Sell

A new global paradigm isn’t limited to the shores of Africa or the Middle East; it can be seen here in America. The government shutdown is a case study in the inability of governments to respond to large-scale discord in a way that maintains credibility – and in this century, credibility and confidence is currency. Those who cannot control the 24/7 opinion and social media reality will quickly cede their control to the growing social-state underneath.

Therefore, it will be in the best interests of major nations like the USA, China, Germany, United Kingdom, and France, among others, to counter these tendencies and find a way to “sell” the nation-state in a 21st century marked by individual power. More than Nazism, fascism, or communism, the synergistic effects of non-state actors, insurgents, and individuals through social media and collaboration will be the greatest existential threat to freedom as we know it—the kind of freedom nation-states enjoy—that the world has ever witnessed.

In his New York Times piece “The End of the Nation-State?” Parag Khanna reminds us that “[t]his isn’t to say that states have disappeared, or will. But they are becoming just one form of governance among many.” In an age where information and products consume our daily routines, nation-states are faced with a very tough sell, indeed. There are many questions that partisans, policy makers, and populations must answer: Is the nation-state worth fighting for, or is the social-state a better alternative? Are the two mutually exclusive? Is the paradigm shift inevitable?

We will shape the answers to these questions over the coming decades. In the meantime, the only certainty seems to be that we will be uncertain.

LT Roger L. Misso is a Naval Flight Officer (NFO) in the E-2C Hawkeye, recent MAWTS-1 WTI graduate, and former director of the Naval Academy Foreign Affairs Conference (NAFAC). The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.