FORGOTTEN WATERS Minding the GIUK Gap a Tabletop Exercise
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Should the United States Develop and Employ Strategic Information Warfare Capabilities?
Should the United States develop and employ strategic information warfare capabilities? Information technologies have transformed U.S. and, indeed, international society. The ways we socialize, educate and inform ourselves, engage in business and practice our religions have been changed, and in many cases now rely, on digital information and communication. Can warfare—the defense and promotion of our national security and interests—be exempt under any circumstances from developing and employing the latest information strategies? Is this even a choice in the 21st century, much less a hard choice? Information warfare has been variously defined by different analysts but a standard general definition, as provided by the U.S. Air Force is “any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against the actions and exploiting our own information operations.” The goal of information war is now frequently described as “information dominance.” (1) Major General Kenneth Minihan, stated, “information dominance is not ‘my pile of information is bigger than yours’…It is a way of increasing our capabilities by using that information to make right decisions, (and) apply them faster than the enemy can. It is a way to alter the enemy’s entire perception of reality. It is a method of using all the information at our disposal to predict (and affect) what happens tomorrow before the enemy even jumps out of bed and thinks about what to do today.” (2) Pro: Information warfare is not a new concept that arose with the Internet. Information has always been a decisive factor in deciding the victory or defeat of one military force over another. -
Unlocking NATO's Amphibious Potential
November 2020 Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE J.D. WILLIAMS, GENE GERMANOVICH, STEPHEN WEBBER, GABRIELLE TARINI Unlocking NATO’s Amphibious Potential Lessons from the Past, Insights for the Future orth Atlantic Treaty Organization (NATO) members maintain amphibious capabilities that provide versatile and responsive forces for crisis response and national defense. These forces are routinely employed in maritime Nsecurity, noncombatant evacuation operations (NEO), counterterrorism, stability operations, and other missions. In addition to U.S. Marine Corps (USMC) and U.S. Navy forces, the Alliance’s amphibious forces include large ships and associated landing forces from five nations: France, Italy, the Netherlands, Spain, and the United Kingdom (UK). Each of these European allies—soon to be joined by Turkey—can conduct brigade-level operations, and smaller elements typically are held at high readiness for immediate response.1 These forces have been busy. Recent exercises and operations have spanned the littorals of West and North Africa, the Levant, the Gulf of Aden and Arabian Sea, the Caribbean, and the Pacific. Given NATO’s ongoing concerns over Russia’s military posture and malign behavior, allies with amphibious capabilities have also been exploring how these forces could contribute to deterrence or, if needed, be employed as part of a C O R P O R A T I O N combined and joint force in a conflict against a highly some respects, NATO’s ongoing efforts harken back to the capable nation-state. Since 2018, NATO’s headquarters Cold War, when NATO’s amphibious forces routinely exer- and various commands have undertaken initiatives and cised in the Mediterranean and North Atlantic as part of a convened working groups to advance the political intent broader strategy to deter Soviet aggression. -
Fellow Submarines by Jan Joel Andersson
32 2016 AL E X A ND E RZ E ML IA N ic H E NKO/AP/SIPA Fellow submarines by Jan Joel Andersson Ever since the occupation of Crimea in 2014, commercial, and military transport. Moreover, Russian military activity has increased in and the growing importance of secure maritime bor- around Europe. Russian air and land exercises have ders and the protection of vital undersea global also become more assertive and frequent compared communication cables make it both prudent and to previous years. Fighter jets of the Swedish and necessary for Europe to collectively manage, de- Finnish air forces, as well as NATO fighters pro- ter, and counter any undersea provocations. tecting the air space of the three Baltic republics of Countering enemy submarines is, however, very Estonia, Latvia and Lithuania are scrambled on a difficult, time consuming and costly as the best regular basis to intercept approaching Russian air- underwater defences are submarines themselves. craft. Similarly, the Russian navy has stepped up its operations and engages in naval exercises and Complex and competitive deployments of increasing scope and scale. Containing more parts than jet airliners and be- Perhaps most worryingly to Western observers is ing more complicated than surface vessels, sub- the increase in underwater activity in the Baltic marines can be compared to space ships in their Sea and North Atlantic: senior NATO naval com- complexity. There are only a handful of companies manders have confirmed that “Russian submarine in the world capable of designing advanced sub- activity is reaching levels unseen since the end of marines and the majority of them are European. -
Appendix A. Navy Activity Descriptions
Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 APPENDIX A Navy Activity Descriptions Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 This page intentionally left blank. Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 Draft Environmental Impact Statement/Overseas Environmental Impact Statement Atlantic Fleet Training and Testing TABLE OF CONTENTS A. NAVY ACTIVITY DESCRIPTIONS ................................................................................................ A-1 A.1 Description of Sonar, Munitions, Targets, and Other Systems Employed in Atlantic Fleet Training and Testing Events .................................................................. A-1 A.1.1 Sonar Systems and Other Acoustic Sources ......................................................... A-1 A.1.2 Munitions .............................................................................................................. A-7 A.1.3 Targets ................................................................................................................ A-11 A.1.4 Defensive Countermeasures ............................................................................... A-13 A.1.5 Mine Warfare Systems ........................................................................................ A-13 A.1.6 Military Expended Materials ............................................................................... A-16 A.2 Training Activities .................................................................................................. -
The Civil War and Early Submarine Warfare, 1863 Introduction
1 The Civil War and early submarine warfare, 1863 Introduction Civil War combat foreshadowed modern warfare with the introduction of the machine gun, repeater rifles, and trench warfare, and the use of trains to quickly move troops. However, one of the most celebrated tactical innovations of the war was the use of submarines by the Confederate Navy. An early example of this type of naval ingenuity was the CSS Pioneer developed by Horace Lawson Hunley, James McClintock, and Baxter Watson. The Confederates were forced to abandon the Pioneer during testing for fear of capture but she eventually found her way into Union hands, where the submersible was examined and sketched by Ensign David Stauffer of the USS Alexandria. Following the war, the Pioneer was scrapped for metal. Most accounts of actual Civil War submarine combat focus on the sinking of the USS Housatonic by the CSS H. L. Hunley in February 1864, but few mention an earlier but unsuccessful attack by a cigar-shaped vessel, the CSS David, in October 1863. This letter from Union sailor Lewis H. West is a rare eyewitness account of that incident, one of the earliest submarine attacks in naval history. On his first night on board the USS New Ironsides, West experienced the David’s attack. Stealthily cutting through Charleston Bay almost entirely submerged, the David crew attempted to explode a torpedo (what we now refer to as a mine) and in the process nearly destroyed their own vessel. According to West, the “nondescript craft” barely damaged the New Ironsides, and divers found “that not a plate or bolt is started.” The CSS David survived the explosion and the small-arms fire that raked the hull. -
The Importance of the War at Sea During WWI
The Importance of The War At Sea During WWI By: Taylor Pressdee, Anna Ward, Nathan Urquidi What Was the Impact of ‘The War at Sea’? ● Opened a new kind of warfare: Submarine Warfare ● Involved civilians as well as sailors and soldiers ● One of the major reasons that the United States joined the Allies ● Influenced major events during the war: Battle of Jutland, the naval blockade, submarine warfare and the sinking of the Lusitania Who Was Affected By The War at Sea? ● “Total War” ● War At Sea affected civilians as well as soldiers ● Ship Liners, and Coastal cities were in danger of attack ● Starvation was prevalent in specifically Germany because supply ships were being sunk Timeline May 31st 1916 September 1915 Battle of Jutland Germans stop using U-boats February 1st 1916 Germans begin using U-boats again May 7th 1916 Lusitania Sinks Battle of Jutland Battle of Jutland ● Fought on May 31st 1916 ● Only major battle fought at sea ● Fought by the Jutland Peninsula between England and Germany ● Two Admirals in charge of both fleets: Vice Admiral Reinhard Scheer (Left) and Admiral Sir John Jellicoe (Right) The Battle ● British forces intercepted a German message containing a plan to attack them on May 28th ● However, Admiral Scheer postponed the attack due to bad weather ○ Attempted to plan another attack down by the Jutland Peninsula, however Britain intercepted this plan as well ● Vice Admiral Jellicoe moved his fleet down to the Jutland Peninsula, awaiting the attack Aftermath of the Battle ● The British suffered losses, but not nearly -
A Retrospective on the So-Called Revolution in Military Affairs, 2000-2020
SECURITY, STRATEGY, AND ORDER A RETROSPECTIVE ON THE SO-CALLED REVOLUTION IN MILITARY AFFAIRS, 2000-2020 MICHAEL O’HANLON A RESTROSPECTIVE ON THE SO-CALLED REVOLUTION IN MILITARY AFFAIRS, 2000-2020 MICHAEL O’HANLON EXECUTIVE SUMMARY1 This paper revisits the debate that raged in American defense circles in the 1990s over whether a revolution in military affairs was imminent in the early parts of the 21st century. It also seeks to establish a benchmark, and reaffirm as well as refine a methodology, for forecasting future changes in military-related technologies by examining what has transpired in the first two decades of the 21st century. Taking this approach helps improve and validate the methodology that is employed in my forthcoming book, The Senkaku Paradox: Risking Great Power War Over Small Stakes (2019). A subsequent paper seeks to extrapolate a similar analysis out to 2040, gauging the potential for major breakthroughs in military technology and associated operational concepts over the next two decades. Such analysis is of critical importance for evaluating American and allied military and strategic options relevant to great-power war and deterrence in the years ahead. The paper’s category-by-category examination of military technology mirrors the approach that I employed in a book published in 2000, Technological Change and the Future of Warfare (though it really should have been entitled, The So-Called Revolution in Military Affairs, because I was largely challenging the then-popular notion that a military revolution of historic importance was afoot). Much of the research foundation of that book was the study of a list of 29 different types of technologies in an attempt to gauge which might undergo revolutionary change by 2020. -
2019 Draft DSCTC Report
DEFENCE AND SECURITY COMMITTEE (DSC) Sub-Committee on Transatlantic Defence and Security Cooperation (DSCTC) EVOLVING SECURITY IN THE NORTH ATLANTIC Draft Report by Nicholas SOAMES (United Kingdom) Rapporteur 077 DSCTC 19 E | Original: English | 23 April 2019 Until this document has been adopted by the Defence and Security Committee, it only represents the views of the Rapporteur. 077 DSCTC 19 E TABLE OF CONTENTS I. INTRODUCTION .................................................................................................................... 2 II. IMPORTANCE OF THE ATLANTIC ....................................................................................... 2 III. THE STRATEGIC IMPORTANCE OF THE GIUK-N GAP AND NEW RUSSIAN PRESENCE AND CAPABILITIES .............................................................................................................. 3 A. INCREASED RUSSIAN CAPABILITIES AND PRESENCE........................................... 3 B. RUSSIA IN THE NORTH ATLANTIC AND ARCTIC ..................................................... 4 C. THE NORTHERN FLEET AND RUSSIAN DEFENCE ARCHITECTURE IN THE ATLANTIC .................................................................................................................... 5 IV. NATO’S NORTH ATLANTIC PRESENCE AND NEW INITIATIVES ....................................... 5 A. NATO MARITIME COMMAND ...................................................................................... 6 B. ICELAND AND RENEWED NATO ANTI-SUBMARINE EFFORTS ............................... 7 V. INTERIM -
The Third Battle
NAVAL WAR COLLEGE NEWPORT PAPERS 16 The Third Battle Innovation in the U.S. Navy's Silent Cold War Struggle with Soviet Submarines N ES AV T A A L T W S A D R E C T I O N L L U E E G H E T R I VI IBU OR A S CT MARI VI Owen R. Cote, Jr. Associate Director, MIT Security Studies Program The Third Battle Innovation in the U.S. Navy’s Silent Cold War Struggle with Soviet Submarines Owen R. Cote, Jr. Associate Director, MIT Security Studies Program NAVAL WAR COLLEGE Newport, Rhode Island Naval War College The Newport Papers are extended research projects that the Newport, Rhode Island Editor, the Dean of Naval Warfare Studies, and the Center for Naval Warfare Studies President of the Naval War College consider of particular Newport Paper Number Sixteen interest to policy makers, scholars, and analysts. Candidates 2003 for publication are considered by an editorial board under the auspices of the Dean of Naval Warfare Studies. President, Naval War College Rear Admiral Rodney P. Rempt, U.S. Navy Published papers are those approved by the Editor of the Press, the Dean of Naval Warfare Studies, and the President Provost, Naval War College Professor James F. Giblin of the Naval War College. Dean of Naval Warfare Studies The views expressed in The Newport Papers are those of the Professor Alberto R. Coll authors and do not necessarily reflect the opinions of the Naval War College or the Department of the Navy. Naval War College Press Editor: Professor Catherine McArdle Kelleher Correspondence concerning The Newport Papers may be Managing Editor: Pelham G. -
Cyber Warfare
Downloaded by [University of Defence] at 23:51 30 May 2016 Cyber Warfare This book is a multidisciplinary analysis of cyber warfare, featuring contribu- tions by leading experts from a mixture of academic and professional backgrounds. Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations, with state- orchestrated (or apparently state- orchestrated) computer network attacks occur- ring in Estonia (2007), Georgia (2008) and Iran (2010). This method of waging warfare – given its potential to, for example, make planes fall from the sky or cause nuclear power plants to melt down – has the capacity to be as devastating as any conventional means of conducting armed conflict. Every state in the world now has a cyber- defence programme and over 120 states also have a cyber- attack programme. While the amount of literature on cyber warfare is growing within disciplines, our understanding of the subject has been limited by a lack of cross- disciplinary engagement. In response, this book, drawn from the fields of computer science, military strategy, international law, political science and military ethics, provides a critical overview of cyber warfare for those approaching the topic from what- ever angle. Chapters consider the emergence of the phenomena of cyber warfare in international affairs; what cyber- attacks are from a technological standpoint; the extent to which cyber- attacks can be attributed to state actors; the strategic value and danger posed by cyber conflict; the legal regulation of cyber- attacks, both as international uses of force and as part of an ongoing armed conflict, and the ethical implications of cyber warfare. -
Fixed Sonar Systems the History and Future of The
THE SUBMARINE REVIEW FIXED SONAR SYSTEMS THE HISTORY AND FUTURE OF THE UNDEWATER SILENT SENTINEL by LT John Howard, United States Navy Naval Postgraduate School, Monterey, California Undersea Warfare Department Executive Summary One of the most challenging aspects of Anti-Submarine War- fare (ASW) has been the detection and tracking of submerged contacts. One of the most successful means of achieving this goal was the Sound Surveillance System (SOSUS) developed by the United States Navy in the early 1950's. It was designed using breakthrough discoveries of the propagation paths of sound through water and intended to monitor the growing submarine threat of the Soviet Union. SOSUS provided cueing of transiting Soviet submarines to allow for optimal positioning of U.S. ASW forces for tracking and prosecution of these underwater threats. SOSUS took on an even greater national security role with the advent of submarine launched ballistic missiles, ensuring that U.S. forces were aware of these strategic liabilities in case hostilities were ever to erupt between the two superpowers. With the end of the Cold War, SOSUS has undergone a number of changes in its utilization, but is finding itself no less relevant as an asset against the growing number of modern quiet submarines proliferating around the world. Introduction For millennia, humans seeking to better defend themselves have set up observation posts along the ingress routes to their key strongholds. This could consist of something as simple as a person hidden in a tree, to extensive networks of towers communicating 1 APRIL 2011 THE SUBMARINE REVIEW with signal fires. -
Exploring Requirements for Effective Deterrence of Interstate Aggression
What Deters and Why Exploring Requirements for Effective Deterrence of Interstate Aggression Michael J. Mazarr, Arthur Chan, Alyssa Demus, Bryan Frederick, Alireza Nader, Stephanie Pezard, Julia A. Thompson, Elina Treyger C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RR2451 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0064-2 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Cover: Three ROK soldiers watching the border at Panmunjeom in the DMZ between North and South Korea/Henrik Ishihara via Wikimedia Commons (CC BY-SA 3.0) Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project enti- tled What Deters and Why: Lessons of Deterrence Theory and Practice for U.S.