MAY 2021
More than Half the Battle Information and Command in a New American Way of War
Chris Dougherty About the Author Acknowledgments Chris Dougherty is a Senior Fellow in I’d like to thank Will Mackenzie, Ed McGrady, and Becca the Defense Program at the Center for Wasser for being my partners in wargaming, providing a New American Security (CNAS). His support to this project, and helping to review this paper. research areas include defense strategy, I’d like to thank Molly Parrish for her tireless support of the strategic assessments, force planning, and defense program. I’d like to thank the CNAS interns who wargaming. have helped put on our wargames and served as note- takers. In particular, I’d like to thank Jessie Dietz and Ripley Prior to joining CNAS, Mr. Dougherty Hunter for their research assistance. I’d like to thank Alec served as Senior Advisor to the Deputy Assistant Secretary Barker, Peter Revay, and Group W for their modeling and of Defense for Strategy and Force Development at the simulation support. I’d like to thank Loren Schulman, Maura Department of Defense (DoD). During this time, he led a McCarthy, and Usha Sahay for providing much-needed handful of major initiatives including the development and feedback on the structure of the paper. I’d like to thank the writing of major sections of the 2018 National Defense following folks for reviewing the paper and providing their Strategy. thoughts, feedback, and edits: Elbridge Colby, Jon Solomon, Frank Hoffman, COL Buzz Phillips, Col Brian “Brutus” Stahl, About the Defense Program Maj Kevin “Klinger” Mendel, Jennifer McArdle, Tim Walton, Andrew Metrick, Jacob Cohn, Will Schlickenmaier, CAPT Over the past 10 years, CNAS has defined the future of Greg Malandrino, Adam Comfort, Scott Kendricks, Iskander U.S. defense strategy. Building on this legacy, the CNAS Rehman, CAPT Mike Martinez, MAJ Sarah P. White, Tom Defense team continues to develop high-level concepts Shugart, and Shawn Steene. I’d also like to thank many of and concrete recommendations to ensure U.S. military our wargaming “regulars” without whom this project would preeminence into the future and to reverse the erosion of not have been possible: Eric Coulter, Derreck Holian, Mark U.S. military advantages vis-a-vis China, and to a lesser Goolsbay, Col Dan Skuce, COL Sarah Albrycht, Scott Boston, extent Russia. Specific areas of study include concentrating Eric Heginbotham, Cristina Garafola, Mark Seip, Greg Grant, on great-power competition, developing a force structure Chris Rielage, Nina Kollars, Caitlyn Leong, Col Steven Sutey, and innovative operational concepts adapted for this Col Kaveri Crum, Col Paul Calhoun, Shane Bilsborough, more challenging era, and making hard choices to effect Maj Jason Buell, Ryan Boone, Michael Kofman, et al. My necessary change. sincerest apologies if I left anyone off of this list—the next post-wargame round is on me. Finally, I’d like to thank Jennie Matuschak for helping me get this over the line, and most of all Susanna Blume for her patience, direction, and leadership.
Dedication To Bernie, Susan, and Mary Jo: You always believed in me and you were always there for me. I miss you all dearly. TABLE OF CONTENTS
01 Executive Summary
03 Introduction 08 Seeing Red: Chinese and Russian Approaches to Information and Command
20 Operational Vignette: Eastern Latvia 2030 22 Achieving Degradation Dominance in the Techno-Cognitive Confrontation
35 Domain-Specific Concepts and Capabilities
40 Rēzekne Revisited: Eastern Latvia 2030
43 Conclusion
DEFENSE | MAY 2021 More than Half the Battle: Information and Command in a New American Way of War
Executive Summary to the 1970s and ’80s. Still, a myopic focus on technology misses the critical cognitive and organizational aspects of hina’s rise and Russia’s reemergence as serious the confrontation with China and Russia. The obsession military competitors to the United States during with regaining information dominance is perhaps even more C the last decade have changed the character of deleterious. Barring some wholly unforeseen event, the DoD warfare as profoundly as the U.S. victory in the Gulf is unlikely to regain its post–Cold War techno-cognitive War. Precision-guided munitions and other advanced dominance against China or Russia. They are too capable weapons systems likely will play an important role in this and too competent to allow this to happen, and the chaotic new era of warfare. However, to confer an advantage, character of modern warfare vitiates against the kind of these systems will require the ability to gather, transmit, lopsided information advantage U.S. forces enjoyed against process, understand, and act on information faster and Iraq in the Gulf War. with greater accuracy than an opponent. Advantage in The DoD needs to embrace, rather than fight against, peace and victory in war will demand a mixture of tech- the changes in the character of warfare and learn to thrive nical information systems and cognitive functions such within its chaos in ways that China and Russia may be as command decision-making. Every effort should be unable to match given their highly centralized and directive expended to attain an advantage by degrading adversary command-and-control structures. Instead of striving for systems and protecting friendly systems while disrupting information dominance, the DoD should seek “degrada- the enemy’s cognitive command processes and sustaining tion dominance” as a way of achieving an advantage in the one’s own. These imperatives create a “techno-cogni- techno-cognitive confrontation with China and Russia. This tive confrontation” that is continual and widespread, notion attacks their theory of victory by demonstrating the crossing delineations between peace and war. Within ability to operate effectively enough with degraded systems in this context, great-power warfare would be far more contested environments, while imposing proportional deg- chaotic, lethal, and contested than the conflicts of the radation on Chinese and Russian systems, thereby causing post–Cold War period. them to lose confidence in their ability to gain an insuperable China and Russia have developed distinct but similar advantage in the techno-cognitive confrontation. theories of victory in this new type of warfare focused on prevailing in the techno-cognitive confrontation. Achieving degradation dominance against China and Russia While their military strategies and concepts are complex comprises four mutually reinforcing lines of effort: and diverse, they share four critical attributes. First, 1. Force them into dilemmas about expanding or esca- they aim to keep conflicts local, limited, and there- lating a conflict by exploiting tensions between their fore relatively manageable, while obviating U.S. global limited-war strategies and their operational imperative military preponderance. Second, they use “peacetime” to attack information and command systems aggres- information operations to (ideally) achieve their objec- sively at the outset of a conflict by: tives without fighting or to create favorable conditions if conflict occurs. Third, they attack critical systems in » Focusing concept and capability development on space, cyberspace, and the electromagnetic spectrum, limiting the effectiveness of reversible and non-kinetic as well as physical network nodes, to achieve informa- attacks, particularly in space; tion degradation and command disruption, or ID/CD, » Adopting a more dispersed posture for information and against adversary systems and the cognitive processes command systems; they enable.1 Fourth, they increasingly are centralizing, » Working with allies and partners to increase multi- automating, and “intelligentizing” their command lateral cooperation in key information and command and control to enable rapid, coordinated actions mission areas that would be high priority targets for across multiple domains in the critical opening days of China and Russia; and a potential conflict. The Department of Defense 's (DoD) belated response » Forcing China or Russia into dilemmas about attacking to emerging Chinese and Russian concepts has been the U.S. homeland. overly technological and fixated on regaining the kind of 2. Level the playing field in the “peacetime” information information dominance that U.S. armed forces enjoyed environment by: from 1990 until very recently. The DoD certainly needs to » Gaining proper authorities for information operations develop new systems to replace its current information in key theaters and deconflicting with other govern- and command architecture, much of which dates back ment agencies;
1 @CNASDC
» Training, educating, and exercising the joint force 4. Organize and train for degraded and disrupted to deal with Chinese and Russian information multi-domain operations: confrontation; » Put the “combat” back in the Geographic Combatant » Serving as a “systems integrator” to leverage allied Commands by refocusing them on warfighting vice and partner expertise with Chinese and Russian military diplomacy; information operations; » Create standing, multi-domain units across multiple » Aligning information operations with military oper- echelons of command down to the tactical level; ations to increase trust with allies, partners, and key » Increase regular joint and multi-domain training and audiences abroad; and Combatant Commanders Exercise Engagement and » Avoiding civilian casualties to stymie Chinese and Training Transformation (CE2T2) funds; and Russian information operations aimed at degrading » Use live, virtual, and synthetic training to train real- coalition cohesion. istically in all domains. 3. Achieve degradation dominance in the techno-cog- Enacting these recommendations would mark a nitive confrontation in space, cyberspace, and the major change in the DoD’s mindset about the future of electromagnetic spectrum by: warfare and the role of information and command in » Enabling people and building trust across command competition and conflict. Letting go of notions of domi- echelons and organizations, as well as with critical nance to strive instead for operating effectively enough systems; while degraded is a difficult, but needed, paradigm shift » Adopting policies and demonstrating capabilities to given the challenges posed by China and Russia and the proportionally attack sensitive Chinese and Russian changing character of modern warfare. The alternative information and command systems; likely would be a ruinously expensive and fruitless search for symmetrical “overmatch.” » Training to fight with degraded information and Though daunting, the DoD has successfully embarked disrupted command; on similar paradigm-shifting reform efforts in the past. » Developing the ability to operate with “loose” The most relevant was the post-Vietnam initiative to decentralized peer-to-peer command, control, and address the persistent weakness of U.S. night-fighting communications structures in degraded, disrupted, capabilities. By becoming, arguably, the world’s most or contested environments; effective night-fighting force, the DoD presented adver- » Developing and deploying a “Rosetta Stone” com- saries with a vexing dilemma: fight during the day and munications architecture that enables resilient face the wrath of U.S. airpower and firepower, or fight at multi-path networks through translation, rather night at perhaps an even worse disadvantage. than interoperability; Achieving degradation dominance through these lines of effort would pose a similar dilemma to Chinese and » Employing mission command and other forms of Russian forces in the event of a crisis or conflict. They decentralized and delegated command philoso- would have to consider attacking U.S. information and phies, particularly when command systems are command capabilities, albeit with diminishing confidence disrupted; that such attacks would render U.S. forces incapable of » Accepting “good enough” targeting against low- responding. At the same time, their aggression would value targets in contested environments; risk escalating or expanding a conflict and open up their » Adopting rapid targeting processes for high-tempo, own information and command systems to proportional degraded operations in contested environments; U.S. responses. Alternatively, they could opt not to attack, or limit their attacks to reduce the risk of escalation, » Leveraging artificial intelligence, sophisticated but these approaches would leave U.S. information and automation, and bounded autonomy to reduce cog- command systems relatively unscathed. Either option nitive loads and accelerate decision-making; and would leave them with a less than satisfactory outcome, » Using military deception to foil adversary planning and maintaining that pessimistic assessment is key to and targeting, particularly automated, artificially deterring aggression; defending U.S. allies, partners, and intelligent, or other algorithmically enhanced vital interests; and upholding a free and open interna- systems. tional order in East Asia and eastern Europe.
2 DEFENSE | MAY 2021 More than Half the Battle: Information and Command in a New American Way of War
Introduction synchronize their operations. These methods are designed to operate effectively across “peacetime” fter roughly 40 years of advantage, if not outright geopolitical confrontation and military conflicts. More dominance, in the ability to use information to worryingly, they are investing in new technologies like A gain greater situational awareness and command artificial intelligence to leapfrog remaining U.S. technical forces more effectively than its adversaries, the DoD and cognitive advantages. is facing competitors that have developed the means The DoD’s response to this challenge has been slow and methods to level this playing field or shift it to their and hobbled by different understandings of the problem advantage. The emergence of China and reemergence and therefore divergent visions as to the solution. While of Russia as advanced military competitors—and partic- the DoD belatedly has begun to show progress in areas ularly their development of precision-strike weapons such as the Joint All-Domain Command and Control and advanced information systems—have changed the (JADC2) concept, these solutions are technical, when character of warfare. Some, such as the late Andrew many of the challenges China and Russia pose are cogni- Marshall, Barry Watts, and Andrew Krepinevich, have tive, psychological, and organizational.4 Moreover, there referred to this new era of warfare as a “mature pre- is a pernicious thread running through many DoD initia- cision-strike regime,” in which multiple advanced tives regarding information and command and control. militaries possess the requisite sensors, networks, and Namely that smart investments in the right system, precision-guided munitions to conduct precise long- “system-of-systems,” or “architecture” can enable the range attacks at scale.2 The character of modern warfare DoD to return to the level of information and command incorporates this regime, but also includes other related dominance or “overmatch” that U.S. armed forces have aspects such as the increasing salience of space and enjoyed over the last several decades.5 cyberspace as combat domains and the growing impor- tance of sub-conflict competition or “confrontation” in Warfare between modern great the information environment. powers is likely to be fast- The end result of these developments is that warfare between modern great powers is likely to be fast-paced, paced, chaotic, highly lethal, chaotic, highly lethal, and contested at long ranges in and contested at long ranges in every environment from under the sea to the far reaches every environment from under of geosynchronous earth orbit (GEO).3 Large-scale indus- trial platforms and processes will remain relevant, but the sea to the far reaches of inter-state military competition and conflict increasingly geosynchronous earth orbit. will center around “techno-cognitive confrontation” between opposing information systems and cognitive While investments in information and com- command processes. mand-and-control systems are critical and should remain To prevail in this new kind of warfare, China and one of the DoD’s top modernization priorities, the desire Russia have developed similar, albeit distinct, theories of for dominance underestimates the scale of the chal- victory that align their concepts, force structure, oper- lenges posed by China and Russia, and misunderstands ations, and command philosophies. They are pursuing the character of modern great-power warfare. For the concepts and capabilities to degrade the ability of U.S., foreseeable future, there is no going back to the level of allied, and partner forces to maintain situational aware- information and command superiority to which the U.S. ness, trust their information, and communicate, and to joint force has become accustomed. China and Russia disrupt their ability to exercise command and control. are simply too sophisticated and too capable for that to This shared “information degradation/command be a feasible objective in the scenarios that most worry disruption” or ID/CD approach, is designed to turn long- U.S. defense planners. Furthermore, the character of standing U.S. advantages in information and command future conflict with China or Russia would vitiate the into critical vulnerabilities. relative advantages in situational awareness and rapid To execute these concepts, they have developed decision-making that have been the hallmark of the their own ways of using information and commanding American way of war since at least 1990. their forces. They increasingly have centralized, auto- To explore the challenges of using information and mated, and routinized their information and command commanding forces in modern great-power conflict, processes to exert greater direct control and better the Defense Team at CNAS, during the last 18 months,
3 @CNASDC
conducted more than 10 wargames set in the 2030 time in the ability to command forces. Rather than bringing frame. Specifically, these games explored future inter- order to the chaos of modern conflict, the DoD needs to actions between U.S., Chinese, and Russian information accept that chaos is endemic and learn to operate within and command concepts in competition and conflict. it while forcing China and Russia to do the same in ways Three observations from these games were salient across that they may be structurally unable or disinclined to do. a variety of scenarios and assumptions. Instead of striving for information dominance or “over- First, conflict between great powers using modern match,” the DoD and the armed services should focus weaponry is shockingly fast and disturbingly destruc- on operating with degraded information and disrupted tive. For example, in more than eight wargames set in command systems while demonstrating the ability to the Indo-Pacific theater, covering campaigns lasting proportionally degrade adversary systems, to achieve from several days to several weeks, typical attrition what this paper calls “degradation dominance.” The exceeded the estimated combined U.S. and Japanese fundamental idea is to demonstrate the ability to operate ship and aircraft losses from the Battle of the Coral Sea effectively enough with degraded systems in contested and the Battle of Midway—two of the costliest air and environments—while imposing sufficient degradation on naval battles in World War II. The combat is also disori- Chinese and Russian systems—that they lose confidence entingly chaotic, regardless of whether information and in their ability to gain a decisive advantage in this con- command systems worked (in which case, long-range frontation through rapid or preemptive attacks. precision fires resulted in catastrophic attrition and The first aspect of degradation dominance thwarts destruction) or not (in which case, both sides scrambled revisionist, antagonistic, and aggressive Chinese and to understand what was happening, make decisions, and Russian policies by undermining and attacking Chinese communicate these decisions across their forces). and Russian limited war and “active defense” strategies Second, the side that could rapidly impose chaos while making U.S. and coalition responses more credible. on its opponent while maintaining sufficient under- Chinese and Russian approaches to fighting U.S.-led coa- standing and order to command its own forces gained litions have inherent tensions between their strategic aim an enormous advantage. This advantage accrued to the of limiting and controlling conflicts and the operational Chinese and Russian teams in nearly every scenario in imperative toward aggressively seizing the initiative which U.S. teams used current concepts. Most Chinese inherent in any effort to deter or defeat a U.S.-led coali- and Russian red teams had a relatively consistent “script” tion response launched from a global posture. Attacking of attacks that they would use to systematically conduct information and command systems at the outset of a ID/CD against U.S. forces. This script rapidly gave them conflict—or even preemptively—is at the core of Chinese an advantage in key aspects of the techno-cognitive con- and Russian military approach to deterring, delaying, frontation, such as the ability to target ships at long range or defeating U.S. military operations. At the same time, and coordinate attacks from multiple domains. China and Russia would prefer to limit and tailor these Third, once gained (or lost), this advantage had cas- attacks to avoid provoking a strong counter-coalition or cading effects that put the weaker side—usually the U.S. a broader global war with all the potential risks it would team—into untenable dilemmas or, worse, seemingly entail. U.S. information and command systems therefore unrecoverable positions. These games suggested that, should be designed, postured, and operated in such a without urgent changes to how the DoD is conceptual- way that attacking them risks escalating or expanding a izing and engaging in techno-cognitive confrontation, conflict while simultaneously making attacks on Chinese U.S. forces face a real risk of losing their situational and Russian systems more credible. This puts China and awareness, capacity to make decisions, ability to com- Russia into a dilemma: act aggressively and risk esca- municate reliably, and the initiative in plausible conflict lation, expansion, and more aggressive counterattacks scenarios. Once the fight for information and command on their systems, or restrain their actions and incur is lost, U.S. forces may not be able to recover, and military operational risks by allowing key U.S. information and defeat becomes likely. command systems to remain functional. Despite these dispiriting outcomes, the lessons learned The second aspect is to level or advantageously tilt the from these games and from computer modeling and sim- information playing field in key regions by acting as an ulation suggest that the DoD has a feasible path toward enabler and “systems integrator” for allied and partner an advantage in the techno-cognitive confrontation, efforts to push back on Chinese and Russian information provided it lets go of the idea of regaining information warfare. Given the breadth of Chinese and Russian infor- dominance and possessing an unassailable advantage mation operations, the DoD should focus its efforts on
4 DEFENSE | MAY 2021 More than Half the Battle: Information and Command in a New American Way of War
maintaining alliance and coalition cohesion, improving The idea of eschewing information dominance and local situational awareness, and gaining a public opinion accepting degradation represents a massive shift for the advantage versus China and Russia in key locations. DoD and the armed services, but it is not without precedent. This persistent competition—which China and Russia Following Vietnam, the DoD made a conscious decision call confrontation or struggle—is foundational. Unless that, after decades of poor performance in nighttime oper- the United States pushes back on Chinese and Russian ations, it would invest heavily in night-fighting capabilities, operations, it could lose the techno-cognitive confron- such as night vision, along with intensive training in order tation without a fight, or it could begin any conflict in to “own the night.” This decision brought about a profound such a deficit that victory becomes extremely unlikely. shift in U.S. and adversary military operations. After decades The third aspect is to achieve degradation dominance in which opponents sought to negate U.S. advantages in in the techno-cognitive confrontation centered on firepower by fighting at night, they now faced an unpleasant space, cyberspace, and the electromagnetic spectrum. dilemma: fight during the day and expose themselves to U.S. Gaining an advantage in these domains, in large part firepower, or fight at night at an arguably greater disadvan- by preemptively or rapidly deceiving, exploiting, tage against U.S. night-fighting abilities. degrading, or destroying adversary systems and the If the United States and its key allies and partners can cognitive processes that rely on them, is central to demonstrate the ability to operate effectively with degraded Chinese and Russian approaches to confronting or systems and to degrade adversary systems, they can pose a fighting the United States. Demonstrating the ability similar dilemma to China and Russia. They can choose to to operate effectively enough in the face of their efforts attack information and command systems and risk initi- to contest these domains and degrade U.S. information ating a larger, more aggressive conflict while opening up and command systems, coupled with a credible ability their own systems to attack and creating a degraded and to deceive, exploit, and degrade their information and contested information environment in which U.S., allied, command systems, could profoundly impact Chinese and partner forces are comfortable operating. Or they and Russian calculations of the correlation of forces in could exercise restraint and allow U.S., allied, and partner key theaters. The key to this is developing more flexible forces to leverage their full complement of information and and resilient “loose” information and command struc- command systems. Either choice would leave them with tures, in contrast to the rigid, stovepiped, hierarchical a less than satisfactory outcome and therefore a pessi- structures that predominate today. mistic assessment of their ability to rapidly establish an The fourth aspect of this concept is to change how advantageous correlation of forces in the critical opening the DoD and the armed services organize and train moments of a conflict. Maintaining that pessimistic assess- forces for combat to operate more flexibly under ID/CD ment through degradation dominance is a key component attacks. If the DoD believes that increasing joint integra- to deterring aggression; defending U.S. allies, partners, and tion or multi-domain operations are critical to success, vital interests; and upholding a free and open international it must change organizational structures to enable, order in East Asia and eastern Europe. rather than impede this shift by creating standing The body of this paper is organized into six parts. The forces—vice ad hoc task forces—in key theaters, built first section explains the methodology used to research around critical capabilities and sized on spans of control the topic, and the following section summarizes how that that are feasible using degraded systems in contested methodology led to a more holistic focus on “information environments. Unit and personnel rotation policies and command,” vice the more typical focus on command, should emphasize familiarity and the shared under- control, communications, computers, intelligence, surveil- standing that is vital in chaotic and contested combat lance, and reconnaissance (C4ISR). The second section operations when communications systems break down, briefly describes Chinese and Russian military strategies rather than flexibility for personnel managers. Training and concepts for confronting and combating the United should continually emphasize joint or multi-domain States, and presents a short fictional vignette explaining operations in contested environments using degraded how Russian concepts might play out in a scenario involving systems, leveraging live, virtual, and constructive or heightened military confrontation during a crisis in the synthetic training where needed. Given the reality that Baltic region. The paper then lays out the full joint concept U.S. armed forces will almost always fight as part of a for achieving degradation dominance and makes some addi- multinational coalition, these reforms cannot be limited tional domain- and service-specific recommendations. Next, to U.S. forces and operations, but must incorporate key the paper revisits the fictional Baltic vignette to demon- allies and partners from the outset. strate the concept in action before concluding.
5 @CNASDC
This project draws on more than a year’s worth of communications, computers, intelligence, surveil- unclassified research on conflict between the United lance, and reconnaissance—as part of a broader effort States and China or Russia. It is informed by more than to develop a new American way of war for 21st-century 10 adjudicated wargames covering a variety of conflict competition and conflict with China and Russia. The scenarios, although mostly focused on conflict over focus on C4ISR derived in part from the 2018 National Taiwan in Asia and the Baltic region in Europe. These Defense Strategy (NDS), which emphasizes the need to games used a variety of methods to represent the chal- build a more resilient C4ISR architecture.6 At their core, lenges of information and command. Moving to a virtual however, both the NDS and this project are dealing with format because of COVID-19 allowed the research team the same issue, which will persist into the next National to discretely control the information and communication Defense Strategy and beyond: The current American way capabilities of the teams. of war relies on a suite of C4ISR systems and practices The wargames fed directly into computer modeling that are obsolescing rapidly in the face of technolog- and simulation of critical aspects of a Russia-Baltic ical change and, more importantly, concerted Chinese scenario. In particular, the analysis focused on the ability and Russian efforts to exploit, disrupt, degrade, deny, of joint or “multi-domain” forces to cooperatively find or destroy them. and target adversary ground forces in a highly contested The wargames and modeling that informed this environment with degraded command, control, and project made clear that changes to C4ISR systems would communications capabilities. Conducting thousands of be necessary, but insufficient to maintain U.S. military “runs” of an agent-based, stochastic model allowed the advantages versus China and Russia in key theaters. In research team to add to the wargaming in two key ways. addition to making U.S. C4ISR systems more resilient First, it examined the insights and concepts from the and making greater investments in electronic warfare, game to determine whether key outcomes were outliers, cyber, and deception to better counter adversaries’ or sufficiently robust to merit further consideration by command-and-information systems, the DoD and the the DoD. Second, it allowed the research team to examine armed services must change the way they think about alternative concepts, control models, and communica- information and command; how they operate; and how tions architectures that could not be explored adequately they train, organize, and equip U.S. forces. Put another during a relatively limited number of games. way, when it comes to developing more resilient joint This project began as an attempt to develop information and command functions, the cognitive, con- new concepts in C4ISR—i.e., command, control, ceptual, and organizational challenges facing the DoD
These images from a CNAS wargame show a Russian red team’s plan for attacking U.S./ NATO information and command systems, along with the disposition of forces in a Baltic wargame. (CNAS)
6 DEFENSE | MAY 2021 More than Half the Battle: Information and Command in a New American Way of War
The Joint Tactical Information Distribution System (JTIDS) datalink system served U.S. and allied forces well for decades, but badly needs modernization. (Wikimedia Commons/DoD)
are greater than the engineering hurdles. Additionally, process of gathering, processing, deciding, and acting while this is ultimately a concept for combat operations, on information should be reconsidered. It tends to it is impossible to ignore China and Russia’s use of infor- pigeonhole thinking about information and command— mation to achieve their objectives without fighting or to which should be central to concept development and set advantageous conditions for combat. force design—into discussions about widgets, rather Sometimes nomenclature and terminology matter, as than missions, doctrine, organizational constructs, they can alter—even if subtly and implicitly—thinking and training. about a subject. Such is the case with the term C4ISR. Instead, this paper focuses on information and By combining functions whose only major connection command because more circumscribed frameworks like is their linkage through networks, C4ISR tends to focus C4ISR failed to capture the breadth and interconnected- discussions on the system of systems that comprises ness of the challenges facing the DoD in this space. The C4ISR, and elides the non-technical aspects of the paper defines information broadly to encompass activ- underlying functions, such as the cognitive exercise of ities that might traditionally be considered information command and control, new organizational constructs, operations as well as ISR. Likewise, the paper defines or non-technical methods for gathering and processing command broadly in the manner of Martin van Creveld’s information. This is not to say that all uses of the term Command in War—comprising command, control, are flawed, or that efforts to improve the resilience of communications (C3), and supporting processes.7 Where the DoD C4ISR architecture are misplaced. However, necessary, the paper delineates between the different the casual use of the term as shorthand for the military aspects of C3.
7 @CNASDC
Seeing Red: only limited means, since initiating a total war would Chinese and Russian Approaches carry a high risk of nuclear response. This is not to say that to Information and Command leaders always will behave rationally, but rather that this outcome is far more likely to be the result of miscalcula- tion and escalation within an extant conflict rather than his section of the paper describes how China and the adversary’s opening gambit. Russia think about information and command in Second, limiting or localizing a conflict to areas on T the context of military confrontation and conflict their immediate peripheries ensures that the war is more with the United States.8 China and Russia have different important to China or Russia than it is to the United States. national histories, present conditions, and future tra- This asymmetry of interest may deter the United States jectories.9 Their thinking about international relations, or its allies and partners from intervening or limit the size inter-state competition, and warfare are likewise distinct. and character of the intervention. With that said, Chinese and Russian armed forces share Third, a limited or local conflict would enable China many characteristics, patterns of thought, and (admit- or Russia to achieve a favorable correlation of forces by tedly translated) terminology regarding military strategy avoiding combat with the entirety of the U.S. joint force and future operations against the United States.10 This and a large U.S.-led coalition. China and Russia may section begins by discussing why China and Russia threaten or execute global operations as part of a limited would want to limit any conflict with the United States war strategy, but these actions would be intended to deter and how this desire introduces tensions into their a U.S. or coalition military response or, failing that, to delay military strategies. Next, it describes how China and or degrade the response such that China and Russia could Russia are using information operations to gain a “peace- achieve their objectives. time” advantage in the information environment. After that, this section discusses the ways in which China and Russia would use ID/CD approaches to prevail in the techno-cognitive confrontation in the event of war, with a particular focus on space, cyberspace, and the electromagnetic spectrum. Finally, the section concludes by summarizing recent Chinese and Russian com- mand-and-control reforms that speak to their theories about modern warfare.
Keep the Conflict Limited Within the 2030 timeframe of this paper, both China and Russia likely would prefer to avoid armed conflict with the United States or, if war were unavoidable, limit and localize the conflict.11 On the Western Front of World War I, France and Britain developed a concept called “bite and hold,” in which they seized limited objectives and deterred or halted German counterattacks through massive artillery barrages. China and Russia likely will follow similar patterns strategically and opera- tionally in the event of war, something Russian expert Michael Kofman of the Center for Naval Analyses has called “bite and attrite,” and Billy Fabian of CNAS has called “strategic bite and hold.” The following discus- sion will explain the logic behind China and Russia’s desire to limit conflicts, and the tensions this creates with their military strategies and concepts for fighting the United States. This map from a CNAS wargame shows the density of Russian threats in a Baltic scenario and the attrition to U.S. forces— First, nuclear-armed states can rationally go to war represented by the red cubes—shows the risks these defenses would with each other over less than absolute objectives using pose to U.S. operations in contested environments. (CNAS)
8 SOUTH KOREA DEFENSE | MAY 2021 More than Half the Battle: Information and Command in a New American Way of War
A
LIMITED WAR: EAST CHINA SEA
JAPAN A A
A M M CHINA A EAST CHINACHINA M M A SEA A
PAPACCIFICIFICIFICC OCEAOCEANN OKINOKINAAWAWA AA A A A A