Showing posts with label naval theory. Show all posts
Showing posts with label naval theory. Show all posts

Monday, December 22, 2024

Naval Forces and Conventional Deterrence

A colleague recently pointed me towards a 2009 CNA monograph by Michael Gerson and Daniel Whiteneck entitled “Deterrence and Influence: The Navy’s Role in Preventing War.” As you may recall, back in October I recommended Gerson’s 2009 Parameters article as an excellent introduction to conventional deterrence theory. Their monograph revisits that foundation in greater detail before moving on to detail the unique contributions that the Navy and Marine Corps can provide within an American conventional deterrent.

Gerson and Whiteneck first develop a list of conventional military capabilities and functions that could hypothetically be communicated in various ways to an opponent in order to affect his calculus (Pg. 60): 

  • Prompt denial/defeat
  • Prompt punishment
  • Expression/demonstration of U.S. commitments, interests, and resolve
  • Forcible entry
  • Project and sustain power without footprint
  • Mobility and reach within and between AORs
  • Flexibility/scalability for proportional response
  • Rapid response/reinforcement from CONUS
  • Regime removal
  • Active/passive defenses
  • Major combat operations

They then map the list to the armed services most readily suited to accomplish the requisite tasks (Pg. 61):

 

As the Venn diagram indicates, they conclude that the Navy-Marine Corps team’s unique contribution to deterrence is the ability to project and sustain power without a land-based footprint in the immediate area of interest:
Compared to air and land forces, maritime power has two inter-related characteristics that make it particularly useful to the modern conventional (as well as nuclear) deterrence mission:
• Maritime forces can project and sustain forward-deployed, combat-credible power in peacetime, crises, and war
• Maritime power is minimally intrusive; in other words, it does not require a footprint on land  
The fact that naval forces can “loiter” and be minimally intrusive is an important and unique contribution to deterrence. The Army can loiter, but it cannot be minimally intrusive; the Air Force can be minimally intrusive (although, because it still needs some land-based infrastructure, it is more intrusive than maritime forces), but it cannot loiter. Only naval forces can do both simultaneously.
These unique characteristics are likely to be especially useful for conventional deterrence. Given that an adversary is likely to pay close attention to the local balance of power, naval forces are important because they can rapidly respond to an emerging crisis by bringing U.S. combat power to places where none existed before, or by augmenting existing forces already in theater to further swing the local power balance in the United States’ favor. The ability to quickly deploy, and indefinitely sustain, power in a region helps ensure that an opponent cannot hope to wait out U.S. forces in the belief that at some point there will be a favorable “window of opportunity” for aggression. (Pg. 73-74)
I’d point out that these measures of ‘loitering’ and ‘intrusiveness’ are relative and very much circumstance-dependent. A relatively light ground force positioned in an isolated area might not be viewed by the host nation as terribly intrusive, but in a crisis or war that isolation might make the force’s logistical sustainment quite difficult if actively opposed by the adversary. An airbase providing aircraft coverage within an area of interest is not necessarily any more intrusive than a naval base within the same area supporting warship patrols nearby. On balance, though, naval forces can loiter longer and can operate with fewer dependencies on land facilities within or near the area of interest than ground or air forces.
Gerson and Whiteneck also observe how naval forces can uniquely factor into crisis management and escalation control:
In an acute crisis, the Navy can be the optimal mechanism to signal credible deterrence without also unnecessarily provoking the adversary. Naval forces can get close enough to the possible combat area to communicate credible threats of prompt denial and/or punishment, while at the same time not getting so close that the leadership fears an impending U.S. attack and decides to strike first.
This is also useful in Phase 2, as efforts to employ compellence and signal escalation dominance…run the risk of inadvertently triggering the actions that we hoped to prevent. Although this risk cannot be completely avoided in Phase 2, naval forces can, at least, sustain a visible presence in the theater to signal the threat of additional costs without having to be stationed too close to the immediate battlespace. (Pg. 74)
Note that the preceding observations pertain solely to the deterrence-relevant capabilities and functions unique to naval forces. The deterrence-relevant capabilities and functions naval forces share with other services are just as important to understand; Gerson and Whiteneck thoroughly examine these as well.
All in all, an outstanding reference for students of conventional deterrence and maritime strategy alike.


Thursday, May 31, 2024

Cyber Warfare...Brought To You By J.C. Wylie

Future thinking about cyber operations is often analogized to early airpower doctrine. Like the early airpower theorists, Gregory Rattray also points out that cyberwar theorists also make the mistake of assuming that cyber operations capabilities will be standalone strategic weapons. The cyber weapon, in other words, is not always going to get through. More likely is cyber warfare operations and tactics augmenting regular operations and tactics. In other words, the difference is between an unrealistic vision of cyberwar and a very much plausible conception of cyberwarfare.


Naval warfare and special operations theory may present a better prism for viewing how cyber operations will play out. In his seapower classic Military Strategy: A Theory of Power Control, Rear Admiral J.C. Wylie argued that the aim of strategy was to gain some measure of control over the adversary. There were essentially two styles of strategy: sequential and cumulative. Sequential strategy utilizes force in discrete, linear packages. An land army on campaign sweeping through a territory destroys an enemy state layer by layer, division by division. Cumulative forms of strategy, on the other hand, build gradual and nonlinear pressure on an opponent.

The classic example is the relationship between the land war in the European Theater of Operations and the Combined Bomber Offensive. By tying down precious German resources, the Bomber Offensive amplified the strategic effect of the land campaigns. Airpower advocates were, of course, wrong that a strategic airpower offensive would on its own negate the need for a land campaign. But the Bomber Offensive cannot simply dismissed as a failure merely because it did not live up to its planners' strategic expectations.  In naval warfare, the Pacific Theater of operations paired a sequential strategy of advance through fortified island networks with the cumulative destruction of the Japanese merchant fleet by submarines. To go even farther back in military history, Winfield Scott's Anaconda Plan, which exploited Union strength on the rivers and the oceans, amplified the strategic effect of land operations in the Western and Eastern theaters of operation.

So how does Wylie fit into cyber operations? Well, first let's take a look at what Kings' College professor Thomas Rid has written about the characteristics of cyber weapons:
Cyber-weapons span a wide spectrum. That spectrum, we argue, reaches from generic but low-potential tools to specific but high-potential weaponry. To illustrate this polarity, we use a didactically helpful comparison. Low-potential 'cyber-weapons' resemble paintball guns: they may be mistaken for real weapons, are easily and commercially available, used by many to 'play,' and getting hit is highly visible -- but at closer inspection these 'weapons' will lose some of their threatening character. High-potential cyber-weapons could be compared with sophisticated fire-and-forget weapon systems such as modern anti-radiation missiles: they require specific target intelligence that is programmed into the weapon system itself, major investments for R&D, significant lead-time, and they open up entirely new tactics but also novel limitations. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the debate's received wisdoms. Maximising the destructive potential of a cyber-weapon is likely to come with a double effect: it will significantly increase the resources, intelligence and time required to build and to deploy such weapons -- and more destructive potential will significantly decrease the number of targets, the risk of collateral damage and the coercive utility of cyber-weapons.
We also know that certain weapons are modular and customizable for multiple roles, the development and acquisition cycle (at least compared to certain air superiority platforms) is very agile, weapons utilize the target system itself as a means of inflicting coercive damage, and they are heavily customized to the target and difficult to utilize in a salvo capacity. Because of this, it is unlikely they can be utilized as a standalone strategic weapon.

DoD seems to realize this too. Take a look at this graf from an article on DARPA's Plan X: 
Cyberwarfare conjures images of smoking servers, downed electrical systems and exploding industrial plants, but military officials say cyberweapons are unlikely to be used on their own. Instead, they would support conventional attacks, by blinding an enemy to an impending airstrike, for example, or disabling a foe’s communications system during battle.
Yup, sounds cumulative. DoD's vision of cyber capabilities is explicitly based on the presumption that they amplify the capabilities of conventional attacks.

One vision of how cumulative strategy might be realized in a cyber context can be found in a distillation of cumulative strategy in the special operations community. James D. Kiras has argued in his work on special operations that the relationship between special operations forces and general purpose forces also demonstrates the intersection of cumulative and sequential strategy. Special operations forces use psychological and material attrition to raise cumulative costs of operating, enhancing the striking power of conventional forces. A group of commandos raising havoc in the enemy rear area disrupts the target's logistics and forces tactical dispersion, weakening the ability to win the fight in the forward edge of the battle area. Unlike the stereotype of attrition encountered in maneuver warfare literature, attrition can have nonlinear cumulative effects. The kind of damage inflicted by cumulative capabilities, be it naval forces, airpower, or special operations units, snowballs into a fearsome weapon.

Lukas Milevski has made the analogy that cyber operations have many of the same characteristics as special operations forces. High-risk special operations depend on significant amounts of target intelligence, surprise (the zero-day exploit), and are utilized against targets in which tailored and customizable means trump general purpose conventional power. Moreover, Milevski observes that utilizing an exploit against an important system also simultaneously ensures that the same vulnerability cannot be exploited readily again through exposure.  While Milevski is right to observe how the specialized nature of cyber operations generates a particular kind of cumulative pressure that augments sequential strategy, there is more to the Wyliean metaphor than simply special operations theory.

The routine conflation of intelligence exploitation systems with weapons is but one symptom of what NDU professor Sam Liles argues is a common confusion of information security (the protection of systems) and the optimization of networks with offensive warfare. Network-centric enhancement to make war or the ability to manage and provision a network, Liles observes, is not the same thing as waging war.  Liles also argues in another post that the real ream of cyberspace is the zone of command, control, coordination, data and cognition---a "seam" between the respective domains that US military doctrine (at times artificially) defines. Such a conception broadens not only our conception of cyberspace but also our idea of what our means of cyber operations may be. We aim to use the seam to achieve a measure of control over the adversary. Moreover, just as the purpose of operations on the sea is to effect events on land, cyber operations ultimately are a means of exploiting the seam cumulatively to amplify the conventional (sequential) campaign.

Finally, this paragraph also demonstrates once again that some of the better ideas about this subject were written fifteen years ago:
Another goal is the creation of a new, robust operating system capable of launching attacks and surviving counterattacks. Officials say this would be the cyberspace equivalent of an armored tank; they compare existing computer operating systems to sport-utility vehicles — well suited to peaceful highways but too vulnerable to work on battlefields. The architects of Plan X also hope to develop systems that could give commanders the ability to carry out speed-of-light attacks and counterattacks using preplanned scenarios that do not involve human operators manually typing in code — a process considered much too slow. Officials compare this to flying an airplane on autopilot along predetermined routes.
John Arquilla and David Ronfeldt originally conceived the role of cyber war not as a standalone strategic weapon but the integration of cyber tactics and operations into warfare as a whole. Hardened systems capable of surviving hits and giving back, at speeds faster than tactical operators can contemplate, as a means of amplifying conventional effects are well within the idea of warfare they predicted in their early works.

J.C. Wylie's works are, of course, an highly imperfect means of thinking about information power. But they offer a starting point as doctrine development, operational tests, and perhaps wartime employment further determine the American approach.