13 July 2015

What It Takes to Win: Succeeding in 21st Century Battle Network Competitions


"In many cases, disrupting, delaying, or harassing the enemy may be sufficient to achieve one’s most important military objectives."
Success in war is often measured by territory gained and enemies killed. These metrics, however, may not reflect what is really most useful in winning a conflict or military competition. In many cases, disrupting, delaying, or harassing the enemy may be sufficient to achieve one’s most important military objectives. In the short-term, the side using these approaches may be able to gain a temporary advantage toward a larger goal; in the long-term, these approaches may impose significant costs on an enemy in exchange for a relatively small investment.

For example, an air defense system can achieve the objective of reducing the number and intensity of air attacks by compelling the attacker to shift an increasing portion of its aerial effort to support missions such as jamming air defense radars or attacking air defense systems–even if the air defenses only infrequently shoot down enemy aircraft. Similarly, anti-submarine warfare forces can achieve their objective of protecting ships by disrupting enemy submarine operations and pushing them out of the fight rather than by sinking large numbers of them.


Reconsidering our metrics isn’t just about making war cheaper, easier, or less lethal. It is much more about about identifying what we’re really trying to achieve in each area of a military campaign and designing the “battle network” to pursue those objectives. This seems intuitive, but in the midst of conflict it often is not. In a new study from the Center for Strategic and Budgetary Assessments (CSBA), we found that American, allied, and opposing militaries often pursued destruction of the enemy even when it was platform, weapon, and time intensive and not completely necessary to achieve their overall goals. This didn't just increase the cost for each enemy killed, it also shifted effort and attention away from other approaches that would have aligned more closely with the force’s overall objectives. This may have prolonged conflicts and left belligerents less prepared for the next phase of the competition.

To arrive at these conclusions, we analyzed historical data for two long-running battle network competitions from World War I to the present. The first is the competition between submarines and anti-submarine warfare (ASW) battle networks and the second is the competition between air attack and air defenses. We chose these two competitions for several reasons. Most importantly, they are ongoing and are highly relevant to current and future U.S. military operations. Of almost equal significance is the degree to which the competitions are shaped by fundamental attributes of submarines and aircraft respectively. This makes it likely that many lessons from past conflicts will retain relevance well into the future. Finally, there was sufficient data available to assess them.

What is a Battle Network?

Electronic network communications play a large and increasingly important role in modern life and, in particular, modern military operations. Over the past two decades, the decreasing cost, increasing capability, and widespread availability of network communications have transformed the way many of us work, shop, maintain contact with friends and loved ones, as well as how, when, and where we access news and information. Widespread use of electronic communications, however, is well over a century old. Successful electrical telegraph systems emerged during the 1840s. Invention of the telephone followed in the 1870s, and by 1900 over 1.3 million telephones were in use in the United States. During the first decade of the twentieth century, radio, or “wireless telegraphy” as they were known at the time, was developed. By the beginning of World War I, the armies of the Great Powers used field telephone networks and radios to transmit information and orders to ground and naval forces.

The advent of radio communications enabled militaries to distribute target acquisition sensors, target localization sensors, command and control (C2) elements, weapons, and or weapon platforms around the battlefield. Dispersing these functions in a battle network across a large area has a number of potential advantages and can greatly increase their effectiveness. For example, networking allows weapon platforms to engage targets they cannot detect or track by leveraging the capabilities of distant sensor systems. Networking can also give commanders a broader view of the overall situation, as viewed from a number of disparate sensors, enhancing their ability to prioritize missions across a theater and better assess the effects of previous actions. Before radio, commanders, spotters, and weapons had to be close enough to communicate by human voice, bugle calls, and, if weather and lighting permitted, flag signals. Dispersal options were constrained by the limits of human hearing and eyesight.

The development of indirect artillery fire techniques late in the nineteenth century is a good illustration of the advantages of fielding a battle network. Although not thought of as a battle network at the time, over the course of World War I, artillery formations of the major powers rapidly developed all the characteristics of a battle network. They used forward observers on the ground and in tethered balloons (sensors) to find and identify targets, fire control centers to confirm and prioritize targets (C2), and dispersed field artillery batteries (weapons) to engage targets. By linking each element with field telephone lines, each side was able to locate and attack the opponent’s targets before they could move out of range.

Over the past several decades rapid advances in communications and computer network technologies reduced the cost and increased the benefits associated with networking military systems. This makes battle networks both more common and increasingly the central focus of competition and conflict between capable, competent adversaries. As the indirect artillery example above shows, however, battle networks and battle network competitions have existed for over a century. Examples of past networks include the Allied ASW struggle against German U-boats in the Battle of the Atlantic during World War II; the great aircraft carrier battles in the Pacific in 1942 and 1944 between the Japanese and U.S. navies; and the contest between U.S. airpower and the North Vietnamese integrated air defense systems during the Vietnam War. All of these competitions included significant use of electronic sensors, radio communication, network penetration (code breaking), and electronic warfare. These elements are repeated in modern networks, making insights gleaned from historical competitions relevant to contemporary ones.

What Does it Take to Win?

We analyzed metrics that one would assume were relevant to winning a conflict, such as the number of enemy platforms destroyed or enemy sailors and pilots killed. What we found was the metric that really mattered was how many friendly ships, aircraft or bombs survived and accomplished their mission, regardless of how many the enemy lost. For example, Allied shipping losses in World War II spiked at the beginning of the war and immediately after the United States entered the conflict; in both cases this was associated with a lack of convoy escorts and ASW forces. Both times, however, shipping losses decreased rapidly with the introduction of escorts while the number of Axis submarines sunk remained close to zero.

This is significant because the sophistication, organization, and cost of a network designed to find and destroy all opposing submarines would be quite different from one designed primarily to enable convoys of merchant ships to avoid enemy submarines. Depending on one’s strategic goals, the latter may be “good enough” and much less costly than the former. This kind of discipline, however, can be hard to implement in practice. In World War II the Allies wanted to exact revenge on the Axis powers for unrestricted submarine warfare and aggressively developed capabilities to find, target, and kill submarines. This effort and investment may have taken away from fielding capabilities needed for other aspects of the war.

A second, related finding is that it is often more cost-effective to force an adversary to delay operations, decrease operational tempo, or dedicate significant effort to defending itself rather than attempting to destroy the adversary force in pitched battle. This was the impact felt, for instance, by U.S. air forces in Operation Rolling Thunder during the Vietnam War. At the beginning of the operation American strike forces consisted of bombers with a few escort fighters to counter the persistent MiG threat over North Vietnam. The North Vietnamese Army then fielded (with Soviet help) the SA-2, one of the first radar-guided surface-to-air missile systems. While SA-2 missiles shot down U.S. aircraft less than 10 percent of the time they were used, American forces had to respect the threat and countered it with a growing array of aircraft for jamming radars and radios, by attacking SA-2s with radar-homing missiles, and by intercepting North Vietnamese fighters. By the end of Rolling Thunder three years later, about half the U.S. aircraft involved in each strike were performing these defensive missions instead of dropping bombs on enemy targets. We refer to this decrease in the proportion of the attacking force devoted to the main objective as “virtual attrition” to distinguish it from the “actual attrition” resulting from destruction of forces.

Communications are another area where destroying the enemy’s battle network may not be the most effective approach. In previous competitions exploiting communications was sometimes more useful than merely disrupting them, based in large part on the pace and tempo of operations. For example, submarine operations unfold over days or weeks, whereas air operations tend to be completed in a matter of hours. This makes it likely that adversary communications can be intercepted, decoded, analyzed, and the results transmitted to submarines or convoys in time for them to intercept or avoid the enemy, respectively. In contrast, air operations happen so quickly that the competitors able to disrupt, rather than exploit, enemy communications were more successful in previous conflicts. 

What About the Future?

Our analysis also revealed some interesting findings about the future of submarine vs. ASW and air strike vs. air defense competitions. In both cases, the pace of technology moves and countermoves accelerated during periods of conflict, particularly with regard to capabilities to find and target the battle network’s central platform (e.g., submarines or aircraft). These “hider-finder” competitions were exemplified by radar vs. electronic warfare in air operations and sonar vs. sound silencing in submarine warfare. Eventually these cycles reached a pace so rapid that one side was either unable to keep up or was able to force the competition into a new “competitive regime” by reducing or eliminating the physical phenomena used to detect and localize the central platform.

An example of this dynamic is America’s development of stealth aircraft technology in the closing years of the Cold War. After decades of radar competing against active electronic warfare in the air warfare hider-finder competition, stealth aircraft shifted the competition into a new regime with active radars confronting passive radar signature reduction techniques. Today, competitors to the U.S. military, such as China and Russia, are developing their own stealth aircraft while they and other potential U.S. adversaries develop new detection technologies designed to find stealth aircraft including infrared systems, multi-static and lower-frequency radars, and electro-optical sensors. As this hider-finder competition continues, the move-countermove cycle will continue until one side or the other shifts it to a new regime. One possible new regime would be for aircraft to use electronic warfare plus stealth to avoid detection.

Until the end of World War II the submarine vs. ASW competitive regime played out in the electromagnetic (EM) spectrum. This is because submarines through the mid-1940s were submersibles rather than true submarines. They spent the majority of their time on the surface and only submerged to covertly attack or to evade ASW forces. This made them susceptible to radar detection and communications exploitation, resulting in a competition between Allied radars and Axis radar warning receivers and code making and breaking by both sides. In 1945, however, Germany was prepared to shift to a new competitive regime by fielding a new class of submarines with snorkels that would make them much less susceptible to detection by radar. This, along with better warning receivers and less-detectable “burst” radio communications, would have taken the new submarine out of the EM spectrum and compelled the Allies to rely on still-immature sonar to find submarines. Luckily for them, the war ended before Germany was able to field the new submarine in significant numbers.

American ASW forces were similarly “saved by the bell” (to use Owen Cote’s great phrase) at the end of the Cold War. The passive sonar competitive regime in place since World War II was about to give way as Soviet submarines began to approach the sound silencing levels of all but the quietest U.S. boats. But the Berlin Wall fell before the Soviets could field a meaningful number of quiet submarines. The submarine-ASW competition remained in stasis until today due to the significant U.S. advantage in submarine silencing. As U.S. rivals improve the quieting of their undersea fleets, however, this competition will eventually shift to a new regime, one exemplified by perhaps low frequency active sonar, non-acoustic detection techniques, or some as yet unexploited technology or approach.

Concluding Thoughts:

At the turn of the last century the airplane and submarine emerged as significant military capabilities that promised to dramatically change the nature of military campaigns. Aircraft brought speed and greater visibility to the battle while submarines expanded the theater of conflict to the high seas well away from the front lines. Insights from the study of the century of competitions that ensued remain relevant today because of the enduring characteristics of submarines and aircraft and the physics involved in hiding or finding them. We should therefore focus our science and technology investments in identifying the next competitive regimes for each and beginning to develop advantages in them.

John Stillion and Bryan Clark are both Senior Fellows at the Center for Strategic and Budgetary Assessments (CSBA).

Editor’s Note: This article was inspired from the following report: “What it Takes to Win: Succeeding in 21st Century Battle Network Competitions” which is available here.

No comments: