Tag Archives: featured

Changing EEZs

PacificEEZ
Pacific Exclusive Economic Zones. David Butler/Globe staff, click on the chart to enlarge

An interesting discussion took place in the Boston Globe about how to deal with potential changes in the world’s Exclusive Economic Zones (EEZs) as rising sea levels change the shape of land areas, perhaps resulting in the complete disappearance of some sovereign nations.

One of the possibilities is that the EEZs may be frozen in their current configuration and become an asset of the population, even after the land becomes uninhabitable or disappears completely, and that this asset may be sold, traded, or leased away. We know territorial sovereignty can be sold, after all, the United States benefited from the Louisiana Purchase and Seward’s Folly (Alaska).

A Chinese corporation has been attempting to build a new port complex on “reclaimed” land in Sri Lanka. “Located next to the Colombo Port, the US$1.4 billion project will add about 233 hectares of reclaimed land to the capital and house luxury office buildings, apartment blocks, a golf course, a water sport area, medical facilities, education institutions, hotels, a theme park and marinas.” The project is on hold right now, but if it goes forward, the Chinese firm would be granted  20 hectares (49.4 acres) on an outright basis and 88 hectares (244.6 acres) on a 99-year lease.

This is not a transfer of sovereignty, and  Sri Lanka is not in any danger of disappearing, but it does indicate the scope of China’s interest in the area and, located right off the Southern tip of India, it is sure to feed into India’s fears of being surrounded by a Chinese “string of pearls.”

Potentially more serious is the decision of the government of the Maldives, “The law passed by the Parliament will now allow absolute foreign ownership of land in Maldives if the investment is above USD 1 billion. The caveat to the law is that 70% of the land has to be reclaimed from the sea.” 

The Maldives, with an average elevation of 1.6 meters,  is one of those island nations in danger of being adversely effected by rising sea levels. If anyone takes the Maldives up on their offer, it will probably be the Chinese, who have already shown a lot of interest in the Indian Ocean island nation, despite Maldivan assurances to India that no Chinese military base will be allowed on its land. Again this is not a transfer of sovereignty, but it may be a harbinger of things to come

Besides I really wanted everyone to see the chart of Pacific EEZs. A lot of that is U.S. EEZ.

This article can be found in its original form on Chuck Hill’s CG blog. Chuck retired from the Coast Guard after 22 years service. Assignments included four ships, Rescue Coordination Center New Orleans, CG HQ, Fleet Training Group San Diego, Naval War College, and Maritime Defense Zone Pacific/Pacific Area Ops/Readiness/Plans. Along the way he became the first Coast Guard officer to complete the Tactical Action Officer (TAO) course and also completed the Naval Control of Shipping course. He has had a life-long interest in naval ships and history.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

July Member Round-Up

Welcome to the July 2015 Member Round-Up. Our members have had a very productive month discussing three major security topics; the rise of China, the Iranian Nuclear Deal, and the fight against ISIS. A few of the articles are shared here for some light reading over your Labor Day Weekend. If you are a CIMSEC Member and want your own maritime security-related work included in this or upcoming round-ups be sure to contact our Director of Member Publicity at dmp@cimsec.org.

Henry Holst begins our round up discussing the PLA/N’s options for submarine activity in the Taiwan Strait. His article in USNI News states that the Taiwan situation remains the driving force behind the Chinese military buildup. Holst goes into depth discussing the capabilities of the Yuan Type-39A class SSK in a standoff between China and Taiwan/US forces. This article is a must read for all who are interested in the recent developments of the Chinese submarine service.

CIMSEC’s founder, Scott Cheney-Peters, meanwhile discussed the nuances of potential joint aerial patrols in the South China Sea with CSIS’ Asia Maritime Transparency Initiative (AMTI) and joined fellow CIMSECian Ankit Panda from The Diplomat for a podcast discussion of India’s evolving approach to maritime security in East Asia.   Also at AMTI, Ben Purser co-authored a piece on China’s airfield construction of Fiery Cross Reef. AMTI’s director, Dr. Mira Rapp-Hooper joined others testifying before a Congressional committee on America’s security role in the South China Sea.

Zachary Keck, of The National Interest, provides the next piece. July was an especially intense month for Mr. Keck, as he wrote 25 articles in July alone. Staying in East and Southeast Asia, Mr. Keck writes that just as China has done in the South China Sea, the PRC could build artificial islands nearer to India as well. His concern is due to a constitutional amendment in Maldives that was passed in late July. This amendment allows for foreign ownership of Maldives territory.  China has rebuffed these concerns and says that they are committed to supporting “the Maldives’ efforts to maintain its sovereignty, independence and territorial integrity.” This piece will be of interest for those that are keeping tabs on Chinese expansionist tendencies.

Moving on from the Chinese situation and the South China Sea, Shawn VanDiver takes us to the Iranian Plateau and the Persian Gulf to discuss the Iranian nuclear deal now before Congress. He penned two articles last month describing the advantages of the deal. His first article, in Task & Purpose, describes his support for the P5+1 Talks With Iran in Geneva, Switzerlanddeal as a 12 year veteran of the United States Navy. He describes his apprehension and the sense of foreboding transiting the Strait of Hormuz at the sights of a .50 caliber machine gun. The next day his second article on the Iran deal came out in the Huffington Post. This article was slightly different as he focuses more on the stated positions of the then current crop of GOP presidential contenders and Senators. He states that the deal is a new beginning. Well worth the read if you are at all hesitating on the importance of this crucial deal.

For the last mention in our member round up, Admiral James Stavridis spent time last month discussing the role of Turkey in the current fight against ISIS. As former Supreme Commander of NATO forces, Admiral Stavridis is uniquely qualified to render judgement on the role of a critical NATO member in the region, the only one directly affected by ISIS fighters. He was interviewed on ABC’s This Week with George Stephanopoulos.  In the same vein, he penned an article in Foreign Policy discussing the importance of NATO use of Incirlik Air Base in Turkey on the Mediterranean Coast.  This base is seen as critical to the effort against ISIS in Syria and Iraq.

CIMSECians were busy elsewhere too:

That is all for July. Stay tuned to CIMSEC for all your maritime security needs.

“A good Navy is not a provocation to war. It is the surest guaranty of peace.”

President Theodore Roosevelt, 2 December 1902

The views expressed above are those of the author’s.

The Language of Terror

By Joshua Tallis

Terrorist. 

Few words evoke such an instant impression of pure evil. Somehow criminal, fanatic, extremist, none of these are adequate to describe the depravity of terror.

Terrorism.

Few words produce such a sense of dread in the pit of your stomach.

Yet, for a word with so much power, it is also incredibly contentious.

On September 11, 2012, armed men descended on the United States’ consulate in Benghazi, Libya. Ambassador Christopher Stevens and Foreign Service Officer Sean Smith were both killed in the attack. And for the last three years, the media and Washington have been in a never-ending debate over one question: was this, or was this not, an act of terror?

What was the source of this confusion? And moreover, why does it matter?

It matters because terrorism is a special word. Those emotions you feel when I write ‘terrorist,’ or when pundits speculate whether a shooting or a missing airliner was the product of terrorism, makes for a word with significant baggage.

This baggage is powerful in the political arena. It means that politicians can access deep emotions with relatively simple rhetoric.

But this baggage wreaks havoc in the academic sphere. Georgetown’s Bruce Hoffman writes that terrorism is a uniquely pejorative word, which means our use of it in scholarship is laced with normative assumptions. In other words, bias. Terrorism is universally recognized as a bad word; no one wants to be called a terrorist. Our use of the term means we are making a moral judgment about the people involved, about their cause.

We are accustomed to using terrorism predominantly as a political weapon. I call someone a terrorist because I disagree with them— vehemently. And because of the baggage this word carries, I gain the moral high ground if I can convince others to call them a terrorist as well.

And much of this isn’t wrong. Terrorism is undoubtedly a pejorative word, and using it does rightfully impart a sense of morality. But simply leaving terrorism defined as something so obscure is not too helpful, most of all because it leaves the idea of terror so nebulous that it appears up for debate.

We’ve all heard the phrase, ‘one man’s terrorist is another man’s freedom fighter.’

I may disagree with this sentiment, and indeed I do, but when we limit our understanding of terrorism to its barest, good guy versus bad guy narrative, we invite a relativistic debate where there shouldn’t be one.

And in our daily lives, this is the definition of terrorism we most commonly encounter and employ. As Hoffman writes:

“Pick up a newspaper or turn on the television and—even within the same broadcast or on the same page—one can find such disparate acts as the bombing of a building, the assassination of a head of state, the massacre of civilians by a military unit, the poisoning of produce on supermarket shelves, or the deliberate contamination of over-the-counter medication in a drugstore, all described as incidents of terrorism. Indeed, virtually any especially abhorrent act of violence perceived as directed against society—whether it involves the activities of antigovernment dissidents or governments themselves, organized-crime syndicates, common criminals, rioting mobs, people engaged in militant protest, individual psychotics, or lone extortionists—is often labeled ‘terrorism.’” (Inside Terrorism 2006)

Clearly, we need to get a little more specific. So, where does anyone start when they need to look up a definition? If I’m being honest the answer is Google, but for dramatic effect let’s say the dictionary.

The Oxford English Dictionary defines terrorism as follows:

“Terrorism: A system of terror. 1. Government by intimidation as directed and carried out by the party in power in France during the revolution of 1789–94; the system of “Terror.” 2. gen. A policy intended to strike with terror those against whom it is adopted; the employment of methods of intimidation; the fact of terrorizing or condition of being terrorized.” (Inside Terrorism 2006)

What would that mean in practice? Well, let’s see.

On June 28, 1914, Austria’s Archduke Franz Ferdinand and his wife were shot and killed while visiting Sarajevo. Gavrilo Princip, their assailant, has been widely regarded as a terrorist for his role in precipitating the start of the First World War. But was this really an act of terrorism? Well, it doesn’t have much to do with the French revolution, but I think it’s fair to say this murder produced widespread terror. So by the dictionary definition of terrorism, I’d have to say the death of the Archduke fits the bill.

But somehow this leaves me unfulfilled. “A system of terror—” that’s pretty vague. The reference to eighteenth century France is historically accurate, but also not very helpful. And “the fact of terrorizing or condition of being terrorized” is like defining hunger as the act of being hungry—it doesn’t give us much new information. We need more.

In a seminar on terrorism I attended in 2014 organized by the European International Studies Association and Yale University, Tamar Meisels from Tel-Aviv University advanced a definition of terrorism I found particularly compelling. To Tamar, Terrorism is “the intentional random murder of defenseless non-combatants, with the intent of instilling fear of mortal danger amidst a civilian population as a strategy designed to advance political ends.” (http://www.ucl.ac.uk/~uctytho/MeiselsTheTroubleWithTerror.html)

Tamar is guided by Michael Walzer, whose 1977 book, Just and Unjust Wars, helped disentangle terrorism from other forms of revolutionary violence. Revolutionary violence, by its very nature, implies that the actors undertaking it are not state-actors, and seek to radically alter the status quo. Walzer divides such violence into three categories.

The first is guerilla warfare. Guerillas typically launch attacks against an opposing military, limiting strikes against civilians. With victory, guerilla tactics are often easily justified, especially if the cause is deemed moral, like national self-determination or anti-colonialism.

Walzer’s second category is political assassination. Assassinations are targeted, demonstrating some distinction between valid and invalid targets, however unseemly. The violence is not random.

What is left is terrorism, which by process of elimination must target innocent individuals randomly in the pursuit of some political agenda.

To make things even clearer, we can disassemble the principles of this definition into five characteristics:

  • Violence—Terrorism necessarily includes the use or threat of violence directed against a population.
  • Motivation—Terrorism is used to achieve a political objective. By political, we mean that terrorism is intended to produce some sort of change in the political regime, however unlikely that may be.
  • Victim—There is a lot of debate over who constitutes a victim of a terrorist attack. Here, victims are randomly targeted civilians, not directly related to a cause and unable to defend themselves.
  • Audience—Terrorism, without an audience, is just a crime. Terrorism is propaganda by the deed, and thus it must be witnessed. This is because, while the victims of an attack may be terrorized, they are not the intended audience. To achieve a political objective, terrorism must induce a government or powerbrokers to choose a certain course of action in line with the terrorist’s objectives.
  • Actor—Groups without the right to legitimately use violence. In traditional political science, we define state sovereignty as the monopoly over the legitimate use of force, according to sociologist Max Weber. In other words, only states hold the right to exercise violence lawfully in conventional political philosophy. Under this rubric, terrorism cannot be practiced by states. Now, as I’ve noted, terrorism is a contentious topic in academia, and among the hundreds of definitions of terror, there are those that would include notions of state terror, which is itself a robust area of study. Entertaining both modes of violence in the same category, however, widens the use of the word terrorism so much as to almost become cumbersome. In the interest of balancing simplicity with clarity, I prefer to keep state terror and non-state terrorism in two separate bins.

So, what does this mean in the real world?

Let’s apply these five principles—violence, motivation, victim, audience, and actor—to some examples and see what happens.

And let’s start with the murder of Archduke Franz Ferdinand.

Number one, the use of violence, is clearly fulfilled.

Princip also fits the bill for number five, the actor. As an affiliate of the Black Hand, a militant nationalist organization, Princip was acting without legal authority to employ violence.

The incident also clearly fits number two, motivation. As a movement for self-determination, the Black Hand included many Yugoslav nationalists. And it was this broad aim that brought Princip to violence.

Number four, the audience, also seems to fit. Nineteenth and early-twentieth century terrorists, mostly anarchists, popularized ‘the propaganda of the deed,’ the idea that dramatic incidents were necessary for spreading revolution. In this regard, any public act of political violence speaks to an audience and fulfills that criterion. More specifically, the death of the heir apparent of the Austro-Hungarian Empire was clearly designed to send a message about the consequences of their continued presence in the Balkans.

Yet, the killing of Archduke Franz Ferdinand fails to meet the benchmark for the third characteristic, the victim. Applying Walzer’s categories of revolutionary violence, Gavrilo Princip was an assassin, not a terrorist. His victim was not random or unrelated to the success of Princip’s cause. None of this is to validate Princip’s actions, neither is it to say that his actions did not stir considerable terror. But according to this conception of terrorism, the assassination of the Archduke doesn’t pass muster.

How about another case, during the Lebanese Civil War?

On October 23, 1983, 299 American and French soldiers were tragically killed when two truck bombs detonated at the U.S. barracks in Beirut. The death toll marked one of the deadliest attacks on American soldiers since World War II. The Islamic Jihad Organization took credit for the devastation, which eventually precipitate an American withdrawal from Lebanon in 1984. It is frequently regarded as one of the most significant acts of terror in the last half-century.

Is it?

As with our first case, this clearly fits the criterion for violence

This attack also fits number two, motivation. Islamic Jihad was a Shiite militia whose aim was the withdrawal of Western forces from Lebanon, a political objective.

Number four, audience, is also apparent. The soldiers targeted may have been the victims, but the message was certainly intended for Washington.

Things get a little murky with respect to the perpetrator. Iran’s fingerprints were all over this attack, and they likely provided some intelligence, training and resources to make it happen. Still, Islamic Jihad, a non-state actor, was the group that eventually carried out the bombing, so it is fair to say the attack fits this category despite a relationship with state-sponsorship.

As with the assassination of the Archduke, however, this attack also fails to meet the characteristic for victims laid out above. As soldiers stationed in a conflict zone, Marines do not fit the status of randomly targeted civilians. Again, this is emphatically not an excuse for the attack, but it is illustrative of how important it is to find more enhanced words to frame such non-state violence.

This case is particularly demonstrative, as a renowned terrorism scholar relayed to me. The scholar noted that our field is riddled not only with conflicting definitions of terrorism, but also inconsistencies within individual works. An author may define terrorism on page 10 of a book as I did above, but by page 50 he or she is already referring to the Barracks Bombing as an act of terror, even though it fails to meet all markers. Scholars of terrorism are just as susceptible to the baggage associated with the word as anyone else, and often times we fail to remain consistent in our own applications of the terminology.

You’ll probably find that, at least in some instances, this academic understanding of terrorism may not align perfectly with events we instinctively regard as such. I would consider that a good thing, cause for coming up with better terms for acts of political violence. But some may find that overly restrictive, and you wouldn’t be alone. There are myriad definitions out there. Find one that makes sense to you. What matters most is that you are consistent in your application of the definition. Without a shared understanding of what terrorism means, we cannot ensure we are all speaking the same language.

So, was the attack on the U.S. Consulate in Benghazi an act of terror? You tell me.

Joshua Tallis is a PhD candidate at the University of St Andrews’ Centre for the Study of Terrorism and Political Violence. He is a Research Specialist at CNA Corporation, a nonprofit research and analysis organization located in Arlington, VA. The views and opinions in this article are his own and do not necessarily represent the position of the University or CNA.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

Surviving the Fabled Thousand Missile Strike (Part Five)

Surviving the Fabled Thousand Missile Strike

CARN class jpeg

Sketch by Jan Musil. Hand drawn on quarter-inch graph paper. Each square equals twenty by twenty feet.

This article, the fifth of the series, examines how fitting lots of drones, of all types, and large numbers of railguns, aboard a CVLN and either one or two CARNs, can allow the U.S. Navy to confidently ride out the fabled thousand missile strike from the mainland of Eurasia. To do so let’s walk through a possible exercise involving Red, a Eurasian mainland power and Blue, essentially a typical Western Pacific carrier strike group. Read Part One, Part Two, Part Three, Part Four.

Red’s motivation might be ensuring that Blue cannot interfere with, or arrange for reinforcements to reverse, an offshore invasion. An alternative, somewhat more likely though, is that Red is intent on challenging one of Blue’s friends or allies and finds that it cannot achieve its objectives without removing Blue’s powerful naval forces from the area. When threats and warnings do not result in a satisfactory result, Red’s leader authorizes a massive missile strike on Blue’s carrier strike group at sea. This missile strike will be an attempted TOT (time-on-target) strike where all the missiles launched, regardless of distance to the carrier strike group or their speed, i.e. a combination of subsonic and hypersonic missiles, will arrive within a five minute window at the target location. The strike will primarily consist of land-based missiles, but some of Red’s numerous submarines will attempt to participate as well, for the purposes of this exercise it is assumed 29 missiles launched from three different submarines will arrive on target within the five minute TOT time period. Red’s commander has elected to hold his meaningful, though not massive, long-range aircraft striking power in reserve, hovering in a threatening position but not immediately participating. Thus a total of 1,029 missiles are launched.

This exercise assumes that Red can coordinate the command and control challenges involved in such a large undertaking. It also assumes that Red possesses adequate space based surveillance capabilities that real time targeting information down to the nearest kilometer, or better, is available on a timely basis to the relevant land, air and submarine commanders.

It should be emphasized here the importance of the compressed TOT portion of Red’s attack plan. Any incoming missiles, whether land or sub launched will be far easier for Blue to defend against if straggling in before or after the massed attack. This advantage of Blue’s is magnified by the presence of the railguns with their enormous magazine size and the ability to fire every five seconds.

It is assumed that Blue’s carrier strike group consists of:

1 CVN

1 CVLN

1 CG (Ticonderoga class)

1 CARN

4 DDG (Arleigh Burke)

4 FF (the new ASW frigate under development)

2 squadrons of F-18s

6 EA-18G Growlers

1 squadron of F35s

1 squadron of strike drones

15+ ISR drones

4 E-2D Hawkeyes

2 S-3 Vikings

6 refueling drones

15+ Fire Scouts

10+ Seahawks

75+ buoys with UUVs or a dipping sonar installed and a radar/infrared lure

Blue’s carrier strike group commander has taken full advantage of the ASW capabilities provided by all the Fire Scouts and buoys, spreading the strike group out over a thirty mile radius in a preplanned dispersal strategy. The commander has also been successful at maneuvering the strike group into a position where there are no Red submarines within at least 30 miles, and it is believed (or hoped) by Blue’s commander that the strike group is at least 50 miles from the nearest Red submarine.

Blue also possesses space based surveillance capabilities and is able to provide Blue’s carrier strike group a twenty minute warning of the incoming attack. Blue’s commander selects one of his preplanned spatial deployment plans, concentrating the majority of his surface assets in a compact zone with the CARN taking position and turning its broadside closest to the incoming missile strike, three of the four DDGs some distance behind it, then the CG and two of the frigates, then the CVLN and finally the CVN. One frigate is so far off on the periphery on ASW duty that it will fire chaff rounds repeatedly during the attack and hope the handful of aircraft overhead and many radar lures dropped in its vicinity will allow it to emerge unscathed. On the opposite side of the strike group one DDG and the fourth frigate will do the same, though with the added protection of the DDGs AAW missiles.

This dispersion plan means a large portion of the area where the strike group is located is simply empty ocean. The intent is to use the strike groups EEW and radar lures to effect and make thorough use of the fact that even a subsonic missile cannot maneuver quickly enough to search out targets if presented with enough empty ocean upon their initial arrival at the selected target location.

Blue’s commander has also chosen a specific plan for utilizing his air assets in a layered defense, intent on maximizing the effectiveness of the various weapon systems embarked. Let us follow the resolution of the attack, starting with the outermost layer, and work our way inwards as the strike progresses.

Cap Layer

2 E-2D Hawkeyes and 12 F-18 Super Hornets

Blue’s strike group commander has assigned these air assets to anti-aircraft duty, approximately 250 miles from the strike group’s location. Since Red’s long-range bombers are known to be airborne, but apparently are not immediately participating, the decision is taken for these Super Hornets to hold their fire, confident that the rest of the strike group can deal with the incoming missiles, and continue to guard against any enemy aircraft that might intrude later.

Shot Down/Eliminated/Missed/Decoyed This Layer: Zero

SD/E/M/D Cumulative: Zero           Of 1,029 incoming missiles

ISR Drones Layer

8 ISR Drones

These eight drones are individually scattered in an arc 150 miles out from the strike group’s location. They are there to provide accurate targeting information, primarily for the SM-2 and railgun equipped surface ships of the strike group. In particular the presence of this arc ensures timely targeting information so the railguns can effectively engage at their maximum range of 65 miles.

SD/E/M/D This Layer: Zero 

SD/E/M/D Cumulative: Zero           Of 1,029 incoming missiles

Railgun Layer

13 railguns (12 on the CARN and 1 on the CVLN)

With the targeting information provided initially by the ISR drones and later by the various aircraft and AAW radars of the strike group the railguns will steadily engage at their maximum rate of every five seconds. Since it is unlikely that any particular missile, even subsonic ones, will not close the remaining 65 miles to the strike group before a second shot can be taken this exercise assumes each railgun will only fire once at any given missile.

Each railgun can fire every seconds, 60 seconds/5 = 12 shots a minute. Therefore over a five minute time period each railgun will get off 5 x 12 = 60 carefully aimed shots. 13 railguns x 60 equals 780 opportunities to hit an incoming missile.

This exercise will assume a 50% success rate for the railguns. Therefore 390 incoming missiles are eliminated.

SD/E/M/D This Layer: 390  

SD/E/M/D Cumulative: 390           Of 1,029 incoming missiles

SM Family Missile Layer

420 surface ship launched SM-2 missiles and 2 E-2D Hawkeyes operating approximately fifty miles out from the strike group’s location.

The CG (100) and four DDGs (80 each) in the strike group are assumed to have 420 SM-2 missiles available to fire in their collective VLS cells.

This exercise will assume a 70% success rate for the missiles. Higher success rates can easily be argued for, though there will be some unavoidable overlap with the railguns resulting in double targeting by some missiles. 420 x .70 = 294. Therefore 294 incoming missiles are eliminated.

SD/E/M/D This Layer: 294  

SD/E/M/D Cumulative: 684           Of 1,029 incoming missiles

Air Wing Layer

12 F-35s, 12 Strike Drones, 12 F-18 Super Hornets, 6 EA18-G Growlers, and 2 S-3 Vikings carrying 4 air-to-air missiles each = 176 AAW missiles

Blue’s air commander has elected to concentrate the bulk of his air assets close to the strike group. This allows the air commander to attempt to concentrate this groups AAW missiles in defense of the three zones occupied by the surface ships below. This allows more of the incoming missiles that have survived to this point but appear to be targeted on empty ocean to be ignored.

This exercise will assume a 70% success rate for the AAW missiles. Again, higher success rates can easily be argued for, though given the tight time constraints on pilots decision making some double targeting will be unavoidable. 176 x .70 = 123.2 rounded down to 123. Therefore 123 incoming missiles are eliminated.

SD/E/M/D This Layer: 123   

SD/E/M/D Cumulative: 807           Of 1,029 incoming missiles

Eliminated Due to Malfunction Layer

If everything always worked perfectly the world would be a much happier place. But things inevitably go awry and the incoming missiles are not immune to this problem. This exercise assumes a standard 5% malfunction rate. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 858           Of 1,029 incoming missiles

Missed Due to Dispersal Layer

The high rate of speed of the incoming missiles will sharply limit their ability to effectively search for a target if they happen to encounter one of the areas of empty ocean Blue’s commander has contrived. This exercise assumes, rather arbitrarily, a 5% missed rate, but empty ocean will certainly greet some of Red’s missiles. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 909           Of 1,029 incoming missiles

Decoyed Layer

The strike groups EEW capabilities, including the Growlers, all the strike group helicopters, Fire Scouts and over 75 buoys with various types of lures aboard can be utilized to great effect. This exercise assumes, rather arbitrarily, a 5% decoyed rate. It is tempting to select a higher rate, but to be conservative the 5% rate is used. 1,029 x .05 = 51.45, rounded down to 51.

SD/E/M/D This Layer: 51     

SD/E/M/D Cumulative: 960           Of 1,029 incoming missiles

Internal Rolling-In-Frame Layer

The CARN has six rolling-in-frame close defense missile launchers installed on each side of the ship. As Red’s surviving missiles reach the LOS horizon, these missiles engage those missiles targeted on the primary layered group of surface ships, which includes the crucial CVN.

This exercise will assume a 70% success rate for these missiles. 48 x .7 = 33.6, rounded down to 33. Therefore 33 incoming missiles are eliminated.

SD/E/M/D This Layer: 33    

SD/E/M/D Cumulative: 993           Of 1,029 incoming missiles

Last Ditch Layer

At this point the last 36 missiles of the original 1,029 are assumed to acquire surface targets and close on them. At this point the targeted ships individual CIW and close range missile defense provide a last ditch defense layer.

To be consistent, this exercise will assume a 70% success rate for the CIW and close range defense missiles. 29 x .7 = 20.3, rounded down to 20. Therefore 20 incoming missiles are eliminated.

SD/E/M/D This Layer: 20    

SD/E/M/D Cumulative: 1,013           Of 1,029 incoming missiles

The hits the remaining 26 missiles inflict will do varying amounts of damage, with the highest variability being the size of the target. One hit can easily destroy one of the ASW frigates. Depending on where the hit occurs, damage to a DDG or the CG will merely damage some portion of its functionality but the combination of the damage and the resulting fires could easily incapacitate the ships fighting ability for quite some time. A hit or two on the CARN with its extensive armor are likely to incapacitate some of its weapon systems but not seriously impair the ships ability to fight. Obviously the more hits, the greater the collective damage. The CVLN and CVN, hopefully spared the worst by their placement at the far back of the layered spatial deployment chosen by Blue’s strike group commander, should be able to continue to function at close to normal capabilities, with the obvious proviso that any fires started do not prove difficult to bring under control.

So at the conclusion of the first round of the exercise, Red has achieved some significant, but not decisive damage with its massive 1,000 missile strike. So what does the Red Commander do next? If that is the sum of his assets, committing his modest long-range aircraft to anything other than continued harassing missions does not seem prudent. Blue’s obstructing carrier strike group has more or less survived and Red must now consider alternative means of achieving its objectives.

Unless Red, assumed to be a major East Asian land power, has utilized its substantial economic capability to construct a second wave of long-range missiles.

Red Force Commander

If so, then Red force commander, after a rapid but thorough review of the results of the first strike provided by his space-based reconnaissance assets decides to proceed with a pre-planned second strike. This time all of his available air assets will participate in the attack and Red Force commander does his best to coordinate another five minute time-on-target attack by hundreds of land based missiles and orders a much larger number of submarines to participate. Hopefully many of them will be able to evade Blue Forces SSNs and contribute at least some missiles from a multitude of different directions.

The intent here is to take advantage of the fact Blue Force will not have time to reload his ship borne missile tubes and in the intervening 30 minutes to an hour, only a few aircraft will have time to re-arm with AAW missiles. This will leave only the magazines of the railgun equipped ships with a significant amount of ammunition available for use.

Summation

At this point we will take leave of the exercise for with the results so far we are capable of making several conclusions.

1- Adding the various types of drones now available as well as the railgun, IN QUANTITY, to the fleet combined with appropriate doctrine adjustments, and flexible and carefully thought through battle plans means the fabled 1,000 missile strike can be survived by a typical carrier strike group.

2- This is particularly true of what most non-East Asian powers across the Eurasian landmass are likely to be able to field over the next few decades.

3- Adding a second CARN to the Western Pacific carrier strike group might well be a wise additional investment.

4- Several of the layers discussed above were deliberately provided with conservative success rates. The railgun itself may very well be able to operate, even at 65 miles, at much higher success rates. The ability to utilize our EEW and decoying assets could also provide significantly better results than estimated, as could the effects of dispersal.

5- Installing one or two railguns aboard the new CVNs as they are built looks to be an excellent idea. Consideration should also be given to installing one or two during refits, or during the refueling process, of our existing carrier assets.

In the next article we will discuss just why Congress and the American taxpayers should pay for all these additional UAVs, UUVs, Fire Scouts, buoys, railguns and the necessary ships to deploy them at sea.                                                                           

Jan Musil is a Vietnam era Navy veteran, disenchanted ex-corporate middle manager and long time entrepreneur currently working as an author of science fiction novels. He is also a long-standing student of navies in general, post-1930 ship construction thinking, design hopes versus actual results and fleet composition debates of the twentieth century.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)