Norman Friedman’s 2009 book Network Centric Warfare is one of the principal influences upon my thinking about 21st Century maritime combat. It is a seminal recounting of the evolution of modern maritime warfare systems, the ‘systems of systems’ they fit in to, and the doctrines developed for employing them. It also serves as a core reference for researchers seeking to discover the fine (declassified) technical and operational details of the Cold War competition between U.S. and Soviet maritime ‘battle networks.’
One of Friedman’s most
interesting observations in the book pertains to network-enabled attacks,
especially from ‘over-the-horizon.’ A ship targeted using remote surveillance
sensors, for example, might not realize it had been targeted until it detected
inbound weapons. Friedman notes that the multi-source Soviet Ocean Surveillance
System (SOSS) couldn’t enable true surprise attacks because Soviet anti-ship
missile doctrine was predicated on the use of ‘pathfinder’ and ‘tattletale’
scouts for visual confirmation and classification of targets. Detection of
these scouts by U.S. Navy or NATO battleforces (or theater/national
surveillance systems) would provide the defenders warning that Soviet anti-ship
missile platforms were nearby or that a raid was inbound. (Pg. 217-239)
In contrast, the U.S. Navy
of the late 1970s and early 1980s sought to use its Ocean Surveillance
Information System (OSIS) network of signals intelligence sensors and fusion
centers to provide targeting cues to Tomahawk Anti-Ship Missile (TASM)-armed
submarines via an effort dubbed Outlaw
Shark. Since its advent a decade earlier, OSIS had been used to detect,
classify, and develop “track histories” for Soviet ships in support of Navy
operational-level planning. The experimental Outlaw Shark targeting capability stemmed from using OSIS’s track
histories to dead-reckon Soviet ships’ geolocations at future times, then
transmitting those cues to patrolling submarines. Unlike SOSS, though, OSIS did
not use active surveillance or reconnaissance sensors to supplement its passive
ones. As a result, Outlaw Shark targeting
would have been unavailable if Soviet ships maintained disciplined Emissions
Control (EMCON). (Pg. 206-209)
In the event of
exploitable Soviet EMCON indiscipline, however, Friedman observes that Outlaw Shark targeting would in theory
have denied a Soviet surface force any warning of an impending U.S. anti-ship attack.
This is because the OSIS-TASM tandem’s lack of a scout meant that there would have
been no discernable U.S. Navy ‘behavior’ to tip Soviet ships off that they had
been targeted. Friedman concludes with the thought that even if a TASM attack
had landed no blows, it nevertheless might have disrupted a Soviet surface
force’s plans or driven it to take rash actions that could have been exploited offensively
or defensively by other U.S. or NATO forces. (Pg. 210)
The obvious limitations
of relying almost entirely upon non-real-time signals intelligence for
over-the-horizon targeting contributed greatly to the Navy shelving its TASM
ambitions during the early 1980s. The Navy’s own mid-to-late Cold War
countertargeting doctrine and tactics made great use of EMCON and deceptive
emissions against SOSS, so there was no fundamental reason why the Soviets
could not have returned the favor against OSIS. Moreover, TASM employment
depended upon a Soviet ship maintaining roughly the same course and speed it
was on at time of an OSIS-generated targeting cue. If the targeted Soviet ship
maneuvered such that it would not be within the TASM’s preset ‘search basket’
at the anticipated time, then the TASM would miss. Nor could Navy shooters have
been sure that the TASM would have locked on to a valid and desirable Soviet
ship vice a lesser Soviet ship, a Soviet decoy ship, or even a non-combatant
third-party’s ship.
Friedman’s point
remains, though: a network-enabled attack that results in a physical miss could
nevertheless theoretically produce significant tactically-exploitable
psychological effects. This concept has long been used to forestall attacks by
newly-detected nearby hostile submarines, even when the submarine’s precise
position is not known. An anti-submarine weapon launched towards the
submarine’s vicinity at minimum complicates the latter’s tactical situation and
potentially forces it into a reactive and defensive posture. This can buy time
for more effective anti-submarine measures including better-aimed attacks.
It therefore might be
reasonable to use some longer-ranged weapons to “shock” an opponent’s forces
along the lines Friedman outlines, even if the weapons’ hit probabilities are
not high, if it is deemed likely that the targeted forces will react in ways
that friendly forces armed with more plentiful and producible weapons could
exploit. For example, an opponent’s force might light off its air defense
radars upon detecting the attacker’s weapons’ own homing radars. Or perhaps the
opponent’s units might distinguish themselves from non-combatant
vehicles/aircraft/ships in the battlespace by virtue of their maneuvers once
they detect inbound weapons. Either reaction might provide the attacker with
definitive localization and classification of the opponent’s platforms, which
in turn could be used to provide more accurate targeting support for follow-on
attacks. Depending on the circumstances, expenditure of a few advanced weapons
to ‘flush’ an opponent’s forces in these ways might be well worth it even if
none hit.
But would doing so really
be the best use of such weapons in most cases? We must bear in mind the advanced
ordnance inventory management dilemma: higher-capability
(and especially longer-range) guided weapons expended during a conflict likely
will not be replaced in the attacker’s arsenal in a timely manner unless they
are readily and affordably wartime-producible. Nor will weapons launched from
surface ships’ or submarines’ launchers be quickly reloadable, as these
platforms will have to retire from the contested zone and expend several days
of transit time cycling through a rearward base for rearmament. The force-level
operational tempo effects of this cycle time will not be insignificant. A
compelling argument can be made that advanced weapons should be husbanded for attacks
in which higher-confidence targeting is available…unless of course the
responsible commander assesses that the situation at hand justifies firing
based on lower-confidence targeting.
There is another
option, however. Instead of expending irreplaceable advanced weapons, a
network-enabled attacker might instead use decoy weapons that simulate actual
weapons’ trajectories, behaviors, and emissions in order to psychologically jar
an opponent’s forces or otherwise entice them to react in exploitable ways.
This would be especially useful when the attacker‘s confidence in his targeting
picture is fairly low. SCATHE MEAN comes to mind in
this respect. This is probably more practical for aircraft and their deep
munitions inventories in aircraft carriers or at land bases. Still, it might be
worth exploring how a small number of decoy weapons sprinkled within a Surface
Action Group or amongst some submarines might trade operationally and
tactically against using those launcher spots for actual weapons.
As for the defender, there
are four
principal ways to immunize against (but not decisively counter) the use of actual or decoy weapons for network-enabled ‘shock
or disrupt’ attacks:
- Distribute multi-phenomenology sensors within a defense’s outer layers in order to detect and discriminate decoy platforms or weapons at the earliest opportunity. The sensors must be able to communicate with their operators using means that are highly resistant to detection and exploitation by the attacker.
- Institute routine, realistic, and robust training regimes that condition crews psychologically and tactically for sudden shocks such as inbound weapons “out of nowhere” or deception. This might also lead to development of tactics or operating concepts in which some or all of the defender’s units gain the ability to maintain restrictive emissions, maneuvering, and firing discipline even when an adversary’s inbound weapons are detected unless certain criteria are met.
- Field deep (and properly positioned) defensive ordnance inventories. Note that this ordnance does not just include guns and missiles, but also electronic warfare systems and techniques.
- Embrace tactical flexibility and seize the tactical initiative, or in other words take actions that make it far harder for an adversary to attack first. A force’s possession of preplanned branching actions that cover scenarios in which it is prematurely localized or detected by an adversary can help greatly in this regard.
Friedman’s observations
regarding the psychological angles of network-enabled targeting are subtle as they
require thinking about how the technological aspects of a tactical scenario
might interplay with its human aspects. We tend to fixate on the former and
overlook the latter. That’s an intellectual habit we’re going to need to break
if we’re going to restore the capacity and conditioning we possessed just a
quarter century ago for fighting a great power adversary’s networked forces.
The views expressed herein are solely those of the author
and are presented in his personal capacity. They do not reflect the official positions
of Systems Planning and Analysis, and to the author’s knowledge do not reflect
the policies or positions of the U.S. Department of Defense, any U.S. armed
service, or any other U.S. Government agency.