Wednesday, February 11, 2024

Outlining FA/XX


At last week’s Office of Naval Research expo in D.C., ADM Greenert made several statements about the proposed next-generation F/A-XX fighter that are getting a lot of play.
CNO Adm. Jonathan Greenert described options for the next Navy fighter - the F/A-XX - that would overwhelm or suppress enemy air defenses instead of outrunning or hiding from threats.
“You know that stealth maybe overrated,” Greenert said during a keynote at the Office of Naval Research Naval Future Force Science and Technology Expo.
“I don’t want to necessarily say that it’s over but let’s face it, if something moves fast through the air and disrupts molecules in the air and puts out heat - I don’t care how cool the engine can be - it’s going to be detectable.”
That also may mean developing new weapons for future threats.
“It has to have an ability to carry a payload such that it can deploy a spectrum of weapons. It has to be able to acquire access probably by suppressing enemy air defenses, Greenert said.
“Today it’s radar but it might be something more in the future.”
As for speed, he said the proliferation of high-speed anti-air weapons could lead the Navy to develop an aircraft that would not need to travel at a high speeds.
“I don’t think it’s going to be super-duper fast, because you can’t outrun missiles,” he said.
I’ve seen a few people interpreting his remarks on stealth to mean that F/A-XX will not be ‘low observable.’ Well, given that the officially defined bounds of ‘low observable’ aren’t exactly quantified for public consumption, I find it hard to prejudge how much Radar Cross Section and infrared signature suppression might be envisioned for the fighter. Suffice to say that it probably won’t be broadband ‘very low observable’ like the B-2 or its proposed LRS-B successor (which owes a lot to these bombers’ physical sizes in any event). On the other hand, it probably will have more signature suppression than ‘reduced observable’ legacy fighters.
Stealth is more than just platform shaping and coatings, though. It’s also about when, where, and how you use the platform. It includes activities by the platform or other supporting forces to suppress the adversary’s sensors using kinetic or non-kinetic means. In the latter regard, F/A-XX’s degree of ‘structural’ observability will probably be designed low enough to allow for considerable use of electronic countermeasures. F/A-XX’s overall observability will also depend on how it senses the battlespace and communicates with other forces. The ability to classify threats with high confidence at a significant standoff distance and then report findings to other friendly platforms via highly-directional communications pathways, and vice-versa, will be key. In turn, both the onboard and external sensor inputs will support onboard weapons employment. Payload over platforms, indeed.
F/A-XX’s other major attributes ought to be range and endurance with a reasonably large weapons loadout. As ID readers well know, I disagree with arguments that carrier-based aircraft must to be able to strike targets deep within an adversary’s territory—or even the innermost reaches of a maritime contested zone—during the first days of a major war in order for the carriers to have high value in the context of a protracted conflict.
That said, the greater F/A-XX’s tactical reach or on-station duration, the more Joint and Navy operational options that open up. This is about more than just strike missions—this is also about the outer layer screening of Surface Action Groups or carrier battleforces. This is about providing air support to frontline forces within a contested zone. This is about creating opportunities for offensive anti-air warfare. The ability to carry a sizable number of long-range air-to-air or air-to-surface missiles will be central.
It should be no surprise, then, that when I picture what I would want in F/A-XX, I think of several of the roles once performed by this aircraft: 

F-14D Tomcat at Udvar-Hazy Center of the National Air and Space Museum (author's photo)

Oh, and note the AAS-42 electro-optical/infrared system under the nose. Back in the day, a terrific sensor for standoff-range, silent visual classification of air contacts

(author's photo)


The views expressed herein are solely those of the author and are presented in his personal capacity. They do not reflect the official positions of Systems Planning and Analysis, and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency.

--Updated 2/11/15 10:53PM to correct typo in 3rd paragraph--

Saturday, February 7, 2024

Grandson of TASM?

U.S. Navy photo
Once upon a time in a galaxy far, far, away, the US Navy fielded a surface to surface missile that could target adversaries at extended ranges--and by that, I mean in excess of 200 miles.  This missile was known as the Tomahawk Anti-Ship Missile, or TASM.  A missile that was before its time (due to the immaturity of Navy ISR and off-board guidance capabilities), the plain truth was that it would have been difficult to employ with confidence in conflict because of the large area of uncertainty that would be created by the lengthy time of flight of the missile.  When the Wall fell, most of these missiles were re-purposed into land attack variants, and the long decline of the surface force's ability to meaningfully participate in the Offensive SUW mission began, a decline that SWO leadership now seeks to reverse in its concept of Distributed Lethality.

And now there is this report from the Naval Air Systems Command, of a test in which synthetic guidance technology was used to guide a Tomahawk to end-game against a moving surface target.  I cannot stress how important this step forward is in the effort to create problems for peer and near peer adversaries who currently enjoy a decided and growing ASuW advantage as the US Navy seeks to seize tactically and operationally relevant periods of sea control to enable power projection operations.  End-game uncertainty was created operational doubt in the minds of the US Navy that would have employed the TASM.  The ISR complex simply didn't support targeting precision at extended ranges, and the lack of an ability to provide target updates in flight meant the seeker in the TASM had a progressively larger area to search while in-flight, thereby lowering probability of hit as a function of range.

What we see in this test is important and exciting, as both of these problems appear to be on the way to being solved.  Clearly, the Navy's maritime ISR complex is on the upswing, with the introduction of the P-8, BAMS, and Fire Scout pointing the way to a clearer recognized surface picture.  Specific to this test though, a Tomahawk was able to make use of that picture and receive off-board guidance to increase hit probability on a moving surface target.

This is enormously good news for many reasons.  First, the Tomahawk is a proven weapon system, and it has a relatively small radar cross section to minimize its detection--it isn't invisible mind you, but it is a challenging target to track.  Second, it puts long range OASuW back squarely within the reach of every ship that can currently fire the TLAM--that means, VLS configured ships.  The gaping hole in our Fleet design created by the decision not to equip late model DDG's with OSuW mission capability could be addressed in a (relatively) low cost approach with minimal integration difficulty.

Now of course, such a system requires a networked approach to updating target position, and we all understand how lucrative such a network would be as a target for an adversary.  Consequently, we must also redouble efforts to create redundancy in the capability those networks provide.

This is the very definition of an opportunistic approach to increasing surface force lethality in a manner that creates real ISR and engagement difficulties for any adversary.   This is Distributed Lethality.

Friday, February 6, 2024

Omniscient, Impregnable Ocean Surveillance Systems?

Pretty much every time the topic of the aircraft carrier’s future combat viability comes up, or the general viability of surface fleet operations within a contested zone for that matter, we hear arguments that potential adversaries’ surveillance systems will assuredly turn the waters they monitor into graveyards for American and allied warships. Sensors are becoming too sensitive and ubiquitous, we’re told. Data fusion hardware and software are becoming so powerful that platforms—especially large ones—will soon no longer be able to hide amidst the ‘background noise,’ we’re warned. Efforts to disrupt an adversary’s situational picture will demand cyber-penetration of his surveillance/reconnaissance networks, we’re admonished. Perhaps the boldest claim, often made implicitly, is that the quality of the adversary’s situational picture will remain pristine as a conflict wears on. And so on. I may be paraphrasing these arguments, but I am not exaggerating what has sometimes been asserted.
Now, I fully agree that the challenge posed by advancing sensor, data fusion, and networking technologies is severe. The threat is real and growing; much effort in countermeasure development and procurement, doctrine and tactics development, and force-wide training will be necessary if we are to respond effectively. There are two serious common flaws in all of the above arguments, though.
First, they are essentially asserting that maritime surveillance/reconnaissance ‘systems of systems’ are virtually omniscient and impregnable. If that is indeed true, then I must commend our potential adversaries on developing the first flawless sensing, communications, and human decision-making systems in history. Somehow I doubt they’ve reached such a milestone.
Second, they attribute capabilities to potential adversaries’ surveillance systems, skills to those systems’ operators, and genius to those operators’ commanders without acknowledging that the very same capabilities, skills, and genius can be present on our side as well. Physics doesn’t pay attention to national flags. Nor does human psychology amidst war’s fog and friction.
Just because the technical, tactical, and operational difficulties of overcoming advanced wide-area surveillance systems—and the humans who use them—would be considerable most assuredly does NOT mean that it could not be done when needed. One of the constant themes in my writings has been to point out the things the U.S. Navy did during the Cold War against a then-state-of-the-art ocean surveillance system and a highly intelligent opponent. Again, while sensor, processor, and communications technologies have advanced, so have the technologies and techniques available for use as countermeasures. It’s part of the never-ending, iterative struggle between offense and defense, scouting and anti-scouting. This struggle is as old as war itself. Sometimes offense or the scout possesses the upper-hand, and at some point thereafter it is captured by the defense or the anti-scout. The switching of who holds the advantage can take place extraordinarily quickly; one should read Martin Bollinger’s excellent book on the WWII competition between German radio-controlled glide bomb developers and allied Electronic Warfare (EW) countermeasure developers, Warriors and Wizards, to see how this occurred in practice. Likewise, one should read Norman Friedman’s seminal explorations of the Cold War competition between Soviet maritime scouting and U.S. Navy anti-scouting. While it is true that these U.S. Navy capabilities were never tested in war against the Soviets, the very same is true about the Soviets' capabilities.
I fully agree that we mustn’t assume anything about our abilities at any given point in time to degrade any particular potential adversary’s surveillance/reconnaissance picture. I also recognize that there are likely to be some key doctrinal or decision-making process differences between how the Soviet Ocean Surveillance System operated and how our contemporary potential adversaries’ ocean surveillance systems operate. Nevertheless, I vehemently disagree with crediting our potential adversaries with abilities to track and target our forces seamlessly while outright denying us any possibilities for disrupting or degrading that coverage. After all, the underlying technologies, tactical principles, and physics/psychology-based exploitable vulnerabilities are largely available to both sides.
As for the assumption that we need to cyber-penetrate adversary networks if we are to handicap them, well, that neglects the many possibilities of messing with their situational pictures more directly. Restoration of our Cold War-era ability to conduct complex tasks, including protracted carrier air operations, under highly restrictive Emissions Control conditions. Conduct electronic or kinetic attacks as possible to disrupt, distract, or destroy their sensors and electromagnetic/acoustic data relay paths located on, under, or over the ocean. Use less-valuable platforms to simulate more valuable platforms. Saturate their picture with real contacts, of which only a few are the platforms requiring protection. Overwhelm them with multiple lines of operations, of which only one or two are ‘real’ and the others feints or demonstrations. Induce them to prematurely burn up their limited inventories of their longest-range weapon systems. Show them something they expect to see, and then exploit their reactions. Many combinations of these options can be tailored to meet a particular situation.
Yes, adversary systems can have strong counter-countermeasures. No system is perfect, however, and sometimes the best counter-surveillance and counter-targeting measures are more psychological than technological. It is terrific when we possess enough intelligence on the inner workings of some threat system to blind or deceive it through our clever countervailing use of technology. That said, blinding and deception can be accomplished with just as much impact by presenting the adversary with a misleading ‘picture’ consisting of actual platforms, emissions, and the like to distract him, confuse him, or perhaps even impel him to take actions we can exploit.
It needs to be appreciated that the ocean surveillance systems under discussion are a threat to any naval combatant, not just aircraft carriers. Even U.S. submarines will face an undersea equivalent—albeit with less area under effective surveillance—in the future. These systems must be suppressed, deceived, or attrited, whether temporarily or permanently, if naval operations within a given segment of a contested zone are to be conducted at a tolerable level of risk and with a tolerable allowance for damaged or lost platforms.
It follows that the sequence of operations in a campaign, and the overall design of that campaign, will matter immensely. Why does a carrier (or any other surface platform with medium to high campaign-value) have to ‘go downtown’ immediately at the start of a conflict? We certainly didn’t do that in the Second World War; our prewar plans eventually came to rule out such a high-risk “through-ticket” approach. Despite many assumptions then and now to the contrary, even the Maritime Strategy of the 1980s didn’t demand surface operations that far forward early in a Soviet-American war. If we want to telegraph to a contemporary potential adversary that any conflict would assuredly not be short, cheap, or low-risk, perhaps designing operating concepts that have a strong chance of ensuring conflict protraction would be best for strengthening our conventional deterrence credibility? The beauty of having many combat arms across our four services—not to mention those of our ‘frontline’ allies who would be inherent parties to many of the highest-danger future conflicts we face—is that it creates campaign design options. The successful use of precursor or parallel operations to pave the way for temporary localized U.S. scouting/anti-scouting superiority in a main operation or its successor operations is quite possible even in a major peer-level conflict.
The bottom line is that we have access to a much larger toolbox than many are willing to acknowledge. I am not arguing that deception and concealment are silver bullets that can assuredly shield our forces under all circumstances. Hardly so; like any of the other tools for gaining operational access, they could fail in action. I certainly wouldn’t build a strategy, campaign plan, or operating concept around an assumption that our deception and concealment efforts would be successful. However, when their intelligent use is balanced with imaginatively-structured operations rooted in calculated risk (including the design of branching actions that account for failed counter-surveillance), and with a LOT of training and discipline, a LOT of options and opportunities open up. In fact, some potential adversaries’ network-dependent architectures and C2 doctrine for performing maritime denial tasks are just as—if not more—vulnerable to what I’ve outlined than our force-level networking architectures and C2 doctrine are…or have to be. Operations on interior lines of networking combined with decentralized C2 doctrine that embraces command-by-negation are simply essential to us in that regard.
We learned to do counter-surveillance and counter-targeting extremely well during the Cold War. I don’t see why we can’t—with the requisite focus and investments—get back to that level. I believe that the debates over future naval force architecture and doctrine, not to mention theater strategy in general, need to better address these questions. Reasonable people can disagree with the arguments I've made, but I would welcome counterarguments that are rooted in theory, historical case studies, or empirical assessments of surveillance and countersurveillance technologies' inherent capabilities AND limitations. It's time to stop overlooking ‘the dark arts,’ or otherwise dismissing them out of hand. It's time to stop unquestioningly awarding our potential adversaries an invincible degree of surveillance dominance on paper.


The views expressed herein are solely those of the author and are presented in his personal capacity. They do not reflect the official positions of Systems Planning and Analysis, and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency.
 

Wednesday, February 4, 2024

The Coming (Invisible) War of the UUVs?

In my post earlier this week, I talked about how the neutralization or destruction of unmanned scouts during crises might not be terribly escalatory.
Following that post, a colleague pointed out to me some important and subtle differences between how anti-scouting unfolds at and above the surface versus how it unfolds underwater. The beauty of undersea operations is, of course, that their effects are almost always plausibly deniable. This is the case today with submarines, and is sure to be the case with underwater unmanned vehicles.
Nevertheless, while a submarine that fails to come home cannot be covered up, the same will not be true with respect to their future unmanned brethren. Indeed, the fact that unmanned underwater operations will generally not be publicly disclosed means that even if a country employing these vehicles realizes that one or more were lost due to hostile action during a crisis, it is extremely unlikely that its leaders would be willing to escalate outside the unmanned underwater realm. Nor would it be easy for the victim to make a strong (and publicly-releasable) case attributing the loss of an Unmanned Underwater Vehicle (UUV) to a hostile act by a specific actor.
Much like history’s many invisible peacetime ‘wars’ between countries’ intelligence agencies, it seems quite likely that there will be an continuous invisible peacetime conflict in which countries boldly employ UUVs within their opponents’ territorial seas. As detailed in works such as Blind Man’s Bluff, we saw a preview of this to some extent with respect to how special-purpose submarines were used during the Cold War. UUVs will only increase these kinds of operations’ breadth, audacity, and maybe even frequency. An even greater change will be the introduction of parallel efforts to neutralize, capture, or destroy opponents’ UUVs that enter one’s own seas. UUV proliferation might lead to the creation of ‘undersea defense identification zones’ and surveillance sensor networks that support them, with countries publicly asserting the right to interdict others’ UUVs that enter these zones. Ironically, the very creation of these networks will only encourage countries to use UUVs to map, probe, closely inspect, and even meddle with the networks’ sensor arrays and communications paths during peacetime.
All the same, countries could enforce—or trespass within—these zones with minimal escalatory risk. The greatest strategic risk would be the public and diplomatic embarrassment resulting from the capture and open display of a UUV whose nationality was clearly marked or otherwise unmistakable. Perhaps, then, the most critical defensive capability installed in a UUV will be its ability to recognize it has been discovered, break back out into international waters, and break contact with its hunters. It certainly won’t hurt to design unmarked UUVs with difficult-to-attribute technical origins for use in the most audacious of missions, either.

The views expressed herein are solely those of the author and are presented in his personal capacity. They do not reflect the official positions of Systems Planning and Analysis, and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency.

Monday, February 2, 2024

An Observation on Unmanned Systems and Escalation Management

One of the issues I looked at in my Naval War College Review article on maritime deception and concealment concerned an opponent’s use of unmanned scout vehicles to search for and target a defender’s platforms during a crisis. Any scout that is able to locate and then support classification of one of the defender’s individual units such as a warship (or perhaps one of the defender’s larger formations such as a naval battleforce) can hypothetically provide the opponent’s long-range strike systems with targeting-quality track data. Depending on the circumstances and the opponent’s political objectives, this targeting data might create further incentives on the margins for the opponent to execute a first strike/salvo attack.

Unmanned scouts are ideal for performing the prewar ‘tattletale’ role that until now could only be accomplished by manned platforms. These vehicles might allow the opponent to persistently cover a wider area or track a particular contact longer than might be possible if only manned scouts were used. They would obviously also avoid exposing manned scouts to interception by the defender. 

It is highly likely that U.S. rules of engagement during a crisis would preclude destroying an opponent’s manned scout in the absence of high confidence indications and warning that the opponent intended an imminent attack. U.S. use of non-kinetic means to ‘neutralize’ a manned scout would likely be limited as well. It is far less clear, though, that neutralizing or destroying an unmanned scout would carry similar escalation risks or otherwise set unacceptable escalatory precedents. Consider how Russia shot down several Georgian unmanned aerial scouts prior to the 2008 war, or how Iran shot at (and possibly also commandeered) U.S. unmanned aerial scouts over the past few years. Crisis circumstances matter, but it is worth noting that none of these cases resulted in anything more than diplomatic protests by the victims. These cases actually establish a decent international precedent regarding the legitimate bounds of a country’s response to the loss of its unmanned scouts. Granted, neither Russia nor Iran nor any other potential U.S. adversary would necessarily react along the lines of how Georgia or the U.S. did. Nevertheless, far less stigma (and international scorn) attaches to killing robots than manned platforms.  

Therefore, as I noted in my article:

A defender might declare exclusion areas during a crisis within which any detected unmanned system would be neutralized; enforcement of these areas might well not precipitate drastic escalation by the other side...A potential adversary could overcome this threat by placing unmanned systems under close manned escort, but that would undercut the rationale for using unmanned, vice manned, reconnaissance systems to increase search volume and on-station time per sortie. Also, it is not clear how a potential adversary could respond without disproportionate escalation if a defender neutralized the unmanned system by close-in jamming or other nonkinetic means. The point is worth study through war gaming. (Pg. 99, 115)

Depending upon how an unmanned scout was neutralized, the opponent might not even know within an actionable period of time whether an onboard malfunction or ‘external causes’ resulted in the loss of communications with the vehicle. This could support a U.S. ability to assert plausible deniability if need be. There would be a risk, however, that the opponent might conclude U.S. forces were operating in or near the area the scout was passing through when communications with it were lost. This might entice the opponent to focus its surveillance and reconnaissance resources on that area. All the same, if the U.S. had in fact declared a sufficiently broad exclusion area for the opponent’s unmanned vehicles, an overall U.S. deception and concealment plan might allow for disruption or even destruction of the opponent’s unmanned scouts near a specific location to create an impression that ‘something of value’ was nearby even when the actual U.S. or allied units being concealed were somewhere else entirely. Of course, nothing would prevent the opponent from pursuing similar ends via similar tactics.

I would submit that if war gaming and historical case study analysis find that the crisis stability risks of attacks against unmanned scouts would be tolerable, and if the resulting legitimization of equivalent attacks against U.S. unmanned systems would be acceptable, then it might be worthwhile for American diplomacy to advance unmanned scout neutralization (or destruction if the scout is outside the opponent’s internationally-recognized sovereign boundaries) as an international norm. This would not mean that the U.S. would automatically take such steps during a particular crisis—only that U.S. political and military leaders would reserve the option of taking them. If the opponent raised his forces’ combat readiness postures in response, that would be still be a preferable—and most likely more manageable—consequence than allowing the opponent to retain a high-confidence targeting picture that could decisively tilt him towards a decision to strike first.

The irony in all this is that it may incentivize potential adversaries to go 'back to the future.' If a potential adversary expects that U.S. forces will neutralize unmanned scouts without hesitation, then he may opt to return the brink-of-war tattletale role to manned scouts under the assumptions about U.S. rules of engagement during a crisis that I mentioned earlier. So the moral of the story may very well be: don't operate high campaign-value platforms in locations during crises where they would not be able to evade contact with the opponent's manned scouts for long. Instead, preserve those platforms in locations where the opponent cannot scout effectively, or contact with any manned scouts can be quickly and enduringly broken. And remember that whatever the opponent's prewar escalation dominance advantages of using manned scouts may be, those advantages evaporate once U.S. rules of engagement are relaxed upon the outbreak of open hostilities.

The views expressed herein are solely those of the author and are presented in his personal capacity. They do not reflect the official positions of Systems Planning and Analysis, and to the author’s knowledge do not reflect the policies or positions of the U.S. Department of Defense, any U.S. armed service, or any other U.S. Government agency.