Exploiting US Advantages to Prevent Aggression

Total Page:16

File Type:pdf, Size:1020Kb

Exploiting US Advantages to Prevent Aggression C O R P O R A T I O N Smarter Power, Stronger Partners, Volume I Exploiting U.S. Advantages to Prevent Aggression Terrence K. Kelly, David C. Gompert, Duncan Long For more information on this publication, visit www.rand.org/t/RR1359 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9261-8 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Current U.S. global strategy depends on the capability to project offensive force to distant theaters. However, the proliferation of anti- access and area denial (A2AD) capabilities threatens to undermine this strategy of offensive force projection. The project reported on here— “Changes in Power, Strategy and Capabilities”—set out to examine the effects of trends in military capabilities among potential U.S. competi- tors and propose an alternative way for the United States (and particu- larly for the U.S. Army) to use force, if needed, around the world. This report is the first in a two-volume series. It examines the motivations, technology, and economics behind the adoption of A2AD capabilities; considers why A2AD is so difficult and costly to counter and whether the erosion of U.S. force-projection capabilities is inexo- rable; and assesses how long the United States has to respond or adjust to these changes. A companion report, Smarter Power, Stronger Part- ners, Vol. II: Trends in Force Projection Against Potential Adversaries,1 features a set of warfighting scenarios that support the general analysis presented here. Although the sponsor for this study was the U.S. Army, the authors also sought to inform a broader audience of policymakers who will need to understand and wrestle with the implications of the chang- ing global security context that will drive U.S. strategy. 1 Duncan Long, Terrence K. Kelly, and David C. Gompert, Smarter Power, Stronger Part- ners, Vol. II: Trends in Force Projection Against Potential Adversaries, Santa Monica, Calif.: RAND Corporation, RR-1359/1-A, in production. iii iv Smarter Power, Stronger Partners This research was sponsored by the U.S. Army Office of the Deputy Chief of Staff, G-8, Army Quadrennial Defense Review Office, and conducted within the RAND Arroyo Center’s Strategy, Doctrine, and Resources Program. RAND Arroyo Center, part of the RAND Corporation, is a federally funded research and development center sponsored by the United States Army. The Project Unique Identification Code (PUIC) for the project that produced this document is HQD136619. Contents Preface ............................................................................. iii Figures and Tables ............................................................... ix Summary .......................................................................... xi Acknowledgments ............................................................ xxxi Abbreviations ................................................................. xxxiii CHAPTER ONE Introduction ....................................................................... 1 Background ......................................................................... 2 Objectives and Approach .........................................................14 Definitions, Distinctions, and Scope ...........................................15 Organization of This Report .....................................................19 CHAPTER TWO Anti-Access and Area Denial Motivations, Requirements, and Capabilities ..................................................................21 Motivations ....................................................................... 22 Capabilities and Requirements Needed for Anti-Access and Area Denial ........................................................................ 28 Capabilities Needed to Field Anti-Access and Area Denial ................. 36 Combining Motivations and Capabilities ......................................37 Conclusions and Implications .................................................. 40 CHAPTER THREE China, Russia, and Iran ....................................................... 43 China: Motivations and Capability ............................................ 43 v vi Smarter Power, Stronger Partners Russia: Motivations and Capability ............................................ 46 Iran: Motivations and Capability ...............................................52 Assessments and Comparison ...................................................61 Conclusions and Implications ...................................................62 CHAPTER FOUR Force Projection Versus Anti-Access and Area Denial ....................65 Operational Factors ...............................................................67 Geographic Factors ...............................................................74 Technological Factors ............................................................ 77 Economic Factors ................................................................ 84 Conclusions: Integrating Operations, Geography, Technology, and Economics ................................................................... 96 CHAPTER FIVE How Anti-Access and Area Denial Competes with Force Projection: Summary Assessment of Scenarios and Implications ................................................................ 101 Scenario Development .......................................................... 101 Summary of the Scenarios ..................................................... 104 Implications of the Scenarios .................................................. 110 Conclusions ...................................................................... 114 CHAPTER SIX Alternative Counter–Anti-Access and Area Denial Strategies ........ 115 The Alternatives ................................................................. 116 Assessing the Alternatives ...................................................... 133 Conclusions ...................................................................... 134 CHAPTER SEVEN An Integrated U.S. Strategy to Project Power and Prevent Aggression .................................................................. 139 Key Ideas Informing an Integrated Strategy ................................. 141 Elements of an Integrated Strategy ............................................ 145 Enabling Capabilities for an Integrated Strategy ............................ 162 Assessing the Proposed Integrated Strategy .................................. 169 Contents vii Gray-Area Aggression ........................................................... 173 Conclusions ...................................................................... 178 CHAPTER EIGHT The Role of the U.S. Army in the Proposed Integrated Strategy ...... 179 The U.S. Army in Joint and Coalition Anti-Access and Area Denial Operations: How Conflicts Might Play Out ............................ 182 Improving the Survivability and Anti-Access and Area Denial Capacity of Land Forces with New Organizational, Doctrinal, and Technological Approaches ........................................... 211 Increasing Allied Defense Capabilities ....................................... 214 Conclusions and Implications ................................................. 216 CHAPTER NINE Findings and Recommendations ............................................ 219 Findings .......................................................................... 219 Recommendations .............................................................. 228 Further Research Required .................................................... 230 Bibliography .................................................................... 233 Figures and Tables Figures 1.1. U.S. Combat Aircraft and Battle-Force Ships, 1990–2014, with Illustrative Projection to 2025 ................................. 6 1.2. Chinese Missile Launchers and Submarines, 1990–2014, with Illustrative Projection to 2025 ................................. 7 2.1. Defensive and Offensive Motivations for Anti-Access and Area Denial .......................................................... 27 2.2. Danger Zones ........................................................33 2.3. Combining Motivations and Capabilities ........................39 4.1. Changes in Average Costs of U.S. Weapon Systems and Information-Technology Capabilities .............................89 4.2. Projected Gross Domestic Product
Recommended publications
  • MILITARY VEHICLES MILITARY VEHICLES Aitegrn N Al Approach
    anNTE I GRAL APPROACH MILITARY VEHICLES MILITARY VEHICLES AI N NTEGRal APPROACH A CASE IN POINT THE CV9035NL INFANTRY FIGHTING VEHICLE At TNO, we are well aware of the difficulties − Protection: mine protection qualification connected with the acquisition of advanced test for accurate assessment of the load military systems. By this we mean any on the human body in case of a mine system, like the next generation Infantry attack. Fighting Vehicles. For one thing, this will − Firepower: target definition, munitions require you to look ahead, sometimes for lethality analysis, munitions develop- the next three or more decades. Which is, ment, and firing doctrine determination TNO.NL of course, a complicated matter. TNO has in connection with the gun system At TNO Defence, Safety and A military vehicle is always a compromise. been acting as a strategic partner to the calibre. Security more than 1,000 scientific A few extra inches of armour will provide Netherlands MoD for many years now. This − Mobility: operational analysis of mobility TNO researchers, engineers, IT and more safety. But it also means more weight is one of the reasons why we are confident requirements to support tracked or TNO is an independent innovation organisa- and less mobility. The ideal military vehicle operations research specialists and that we will be able to help you solve any wheeled solutions. tion that connects people and knowledge should always be custom-made for its problem in connection with protection, − Command & Control: 10 years of in order to create the innovations that countless other experts daily work anticipated mission.
    [Show full text]
  • The Role of UN Peacekeeping in China's Expanding Strategic Interests
    UNITED STATES INSTITUTE OF PEACE www.usip.org SPECIAL REPORT 2301 Constitution Ave., NW • Washington, DC 20037 • 202.457.1700 • fax 202.429.6063 ABOUT THE REPORT Marc Lanteigne This Special Report assesses China’s evolving participation in international peacekeeping missions in the context of its rise as a major economic and military power. The report is based on data collection on Chinese foreign and security policy issues as well as fieldwork in China and Norway. Supported by the Asia The Role of UN Center at the United States Institute of Peace, the report is part of USIP’s broader effort to understand China’s engagement in the peace processes and internal conflicts of other nations. Peacekeeping in ABOUT THE AUTHOR Marc Lanteigne is a senior lecturer in security studies in the China’s Expanding Centre for Defence and Security Studies at Massey University in New Zealand. Previously, he was a senior research fellow at the Norwegian Institute of International Affairs, where he specialized in Chinese and Northeast Asian politics and foreign Strategic Interests policy, as well as Asia-Arctic relations, international political economy, and institution building. He has written on issues related to China’s regional and international relations as well as Summary economic security, the politics of trade, and energy issues. • Despite its growing status in the international system, including in the military sphere, China continues to be a strong supporter of United Nations peacekeeping operations (UNPKO), a stance commonly considered to be more the purview of medium powers. China is also a major contributor of peacekeeping personnel and support.
    [Show full text]
  • Issue 8, Volume 59, April 30 1985 Ckland University Students' Association EDITORIAL
    ngs duldoon 23-27 APR! 1 & 6 PM S2 & S4 Issue 8, Volume 59, April 30 1985 ckland University Students' Association EDITORIAL Craccum is edited by Pam Goode and Birgitta On Sunday, 21 April a woman was viciously raped in a manner whi imitated a rape scene screened on TVNZ the previous evening. And all 1 I Noble. The following people helped on this issue: week past, I have been subjected to the sensationalist accounts of first f Ian Grant, Andrew Jull, Karin Bos, Henry Knapp blaming the traffic officers (who would not allow the woman to 1 Harrison, Darius, Cornelius Stone, Dylan home, because of her blood alcohol level and would not drive her home) fori Horrocks, Robyn Hodge, Wallis, John Bates, occurence of the rape and then the PSA excusing the actions of the office Mark Allen & Janet Cole. alluding to the lack of staff. For their contributions thanks to: Bidge Smith, Whilst there is no doubt the traffic officers are partially to blame, thei Jonathan Blakeman, Colin Patterson, Adam Ross, reason for the rape has been ignored both by the press and in the statementi the various people concerned. Implicit in the argument surrounding | Kupe, Cornelius Stone. For photography thanks to Andrew Jull. culpability of the traffic officers is the assumption that the streets are nots And a special thank you to Janina Adamiak and J o at night for women, and therefore the woman concerned should not havel eft alone. But this assumption blames the victim, the woman for assertir Imrie. right to be wherever she wishes.
    [Show full text]
  • Limiting Terrorist Use of Advanced Conventional Weapons
    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Homeland Security Program View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Stealing theSword Limiting Terrorist Use of Advanced Conventional Weapons James Bonomo Giacomo Bergamo David R.
    [Show full text]
  • Artillery and Counterinsurgency: the Soviet Experience in Afghanistan
    WARNING! The views expressed in FMSO publications and reports are those of the authors and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Artillery and Counterinsurgency: The Soviet Experience in Afghanistan CALL Publicaction #98-17 by Mr. Lester W. Grau Foreign Military Studies Office, Fort Leavenworth, KS. This article first appeared in the May-June 1997 Field Artillery Journal The leverage that technology offers depends on the circumstances which shape combat such as the theater, the opponent and the objective. Guerrilla war, a test of national will and the ability to endure, negates many of the advantages of technology. The Russian Army, and its predecessor--the Soviet Army, fought the most-recent, large-scale counterinsurgencies pitting technologically-advanced mechanized forces against dedicated guerrillas. The Russians are publishing many of their lessons learned now. Although some of these have no direct application to the United States Army, others do and military professionals need to be aware of how other militaries attempt to solve contemporary problems. The Soviet Army invaded Afghanistan on Christmas Eve 1979 with TO&E divisions equipped and trained to fight conventional, maneuver warfare on rolling plains. They came to replace an ineffective communist leader, not to fight an insurgency. They planned to stabilize the situation, occupy garrisons and assist the Afghanistan government while the Afghan government forces fought the guerrilla resistance.1 Soon, however, "mission creep" set in and Soviet forces were locked in a counterinsurgency fight in rugged mountains and desert--a fight for which they were neither equipped nor trained.
    [Show full text]
  • The Navy's Changing Force Paradigm
    Naval War College Review Volume 62 Article 4 Number 2 Spring 2009 The aN vy’s Changing Force Paradigm Robert C. Rubel Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Rubel, Robert C. (2009) "The aN vy’s Changing Force Paradigm," Naval War College Review: Vol. 62 : No. 2 , Article 4. Available at: https://digital-commons.usnwc.edu/nwc-review/vol62/iss2/4 This Article is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Rubel: The Navy’s Changing Force Paradigm Professor Rubel is Dean of Naval Warfare Studies at the Naval War College. Before retiring from the U.S. Navy in the grade of captain, he was an aviator, participat- ing in operations connected with the 1973 Yom Kippur War, the 1980 Iranian hostage crisis, and DESERT SHIELD. He commanded Strike Fighter Squad- ron 131 and served as the inspector general of U.S. Southern Command. He attended the Spanish Naval War College and the U.S. Naval War College, where he served on the faculty and as chairman of the War Gam- ing Department, in the Center for Naval Warfare Stud- ies, before his present appointment. He has a BS degree from the University of Illinois, an MS in management from Salve Regina University in Newport, Rhode Is- land, and an MA in national security and strategic studies from the Naval War College (1986).
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • The Law of Submarine Warfare Today
    Jacobson 205 Chapter VIII The Law of Submarine Warfare Today by Jon L. Jacobson* Introduction he roles of military submarines have evolved throughout the twentieth T century. In wartime, these roles have included coastal defense, harassment of enemy fleets, and, especially in World War II, hunting and destroying the seaborne commerce that supported the enemy's war efforts. Today, two principal roles for u.s. submarines, at least in any future war with the Soviet Union, are probably as anti-submarine weapons (attack submarines) and as strategic weapons platforms (ballistic missile submarines). Other missions, however, could include coastal defense, attacks on the enemy's surface fleet, projection of force ashore, and commerce warfare.1 The laws of war have never been comfortable with the submarine's unique combination of stealth and vulnerability. As will be explained below, it is this peculiar mix of strength and weakness that can be blamed as the root cause of the legal dilemma, particularly as it relates to the submarine's role as a commerce raider. The legal responses to this twentieth-century weapons platform have ranged from early proposals for its abolition to justification of its use under the rules of reprisal to tolerance of it as an effective war machine with characteristics that regrettably require some adjustments in the traditional laws of war. The U.s. Navy's new Commander's Handbook on the Law of Naval Operations (NWP 9) includes references to the laws of naval warfare that specifically address the submarine weapons system and also rules that apply, or can apply, to submarines and their roles in wartime.
    [Show full text]
  • Air Base Defense Rethinking Army and Air Force Roles and Functions for More Information on This Publication, Visit
    C O R P O R A T I O N ALAN J. VICK, SEAN M. ZEIGLER, JULIA BRACKUP, JOHN SPEED MEYERS Air Base Defense Rethinking Army and Air Force Roles and Functions For more information on this publication, visit www.rand.org/t/RR4368 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0500-5 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The growing cruise and ballistic missile threat to U.S. Air Force bases in Europe has led Headquarters U.S.
    [Show full text]
  • Chinese Power Projection in Historical Perspective
    THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY JAPANESE ENERGY SECURITY AND CHANGING GLOBAL ENERGY MARKETS: AN ANALYSIS OF NORTHEAST ASIAN ENERGY COOPERATION AND JAPAN’S EVOLVING LEADERSHIP ROLE IN THE REGION IN HARM’S WAY? CHINESE POWER PROJECTION IN HISTORICAL PERSPECTIVE RICHARD J. STOLL PROFESSOR OF POLITICAL SCIENCE ASSOCIATE DIRECTOR JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY Prepared in conjunction with an energy study sponsored by The Center For International Political Economy and The James A. Baker III Institute for Public Policy Rice University – May 2000 In Harm’s Way? Chinese Power Projection in Historical Perspective Introduction China is clearly a major power, and has had a long series of years of significant economic growth, and while China's economy may slow its growth, there is every reason to believe that China will continue to enhance its position in Asia and throughout the world. Should this be a cause for concern? Should we view China at the turn of the 21st century as comparable to Germany at the turn of the 20th century – i.e., as a state growing more powerful that will seek to use its industrial might to build a significant ability to project power, and engage in conflictual behavior as part of a drive to achieve dominance? Or will China enhance its position, particularly in Asia, by becoming a source of stability in the region? There are a variety of ways to examine this question. I choose to cast my gaze back in time and study the historical record.
    [Show full text]
  • Hard Power in Cyberspace: CNA As a Political Means
    2016 8th International Conference on Cyber Conflict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or non-commercial Cyber Power purposes is granted providing that copies bear this notice and a full citation on the N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. 2016 © NATO CCD COE Publications, Tallinn Hard Power in Cyberspace: CNA as a Political Means Ragnhild Endresen Siedler Analysis Division Norwegian Defence Research Establishment Kjeller, Norway Abstract: This analysis is a contribution to the scholarly debate on how cyber power influences international relations. It answers the following question: In what ways can an actor apply CNA to dominate an opponent, and what may restrict him in this effort? It uses Schelling’s (2008) argument for dividing power into coercion and brute force, and thus the paper distinguishes between actions that inflict harm and those that impose limitations. Through this approach, it describes the difference between CNA as a means of pure destruction and CNA as a means of forcible accomplishment in order to elucidate different ways of using CNA. This analytical approach aims at generating insight into the nature of CNA threats, which in turn, facilitates development of appropriate responses. The paper argues that defensive cyber strategies and doctrines primarily should focus on CNA as a means of forcible accomplishment. However, it also discusses CNA in the form of coercive threats. It explores this type of power by assessing how the technological and organizational preconditions of CNA apply to severity of consequences and credibility.
    [Show full text]
  • Anti-Access/Area-Denial (A2/AD)
    C en t er f o R S t ra t egic and B udge t ary A ssessmen t S Outside-In Operating from Range to Defeat Iran’s Anti-Access and Area-Denial Threats BY MARK GUNZINGER With Chris Dougherty Outside-in: Operating frOm range tO defeat iran’s anti-access and area-denial threats BY MARK GUNZINGER With Chris Dougherty 2011 © 2011 Center for Strategic and Budgetary Assessments. All rights reserved. about the center for strategic and Budgetary assessments The Center for Strategic and Budgetary Assessments (CSBA) is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s goal is to enable policymakers to make informed decisions on matters of strategy, security policy and resource allocation. CSBA provides timely, impartial and insightful analyses to senior decision mak- ers in the executive and legislative branches, as well as to the media and the broader national security community. CSBA encourages thoughtful participation in the de- velopment of national security strategy and policy, and in the allocation of scarce human and capital resources. CSBA’s analysis and outreach focus on key questions related to existing and emerging threats to U.S. national security. Meeting these challenges will require transforming the national security establishment, and we are devoted to helping achieve this end. about the authors Mark Gunzinger is a Senior Fellow at the Center for Strategic and Budgetary Assessments. Mr. Gunzinger has served as the Deputy Assistant Secretary of Defense for Forces Transformation and Resources. He is the principal author or co-author of multi- ple Defense Planning Guidance directives, key strategic planning guidance documents that shape DoD force planning.
    [Show full text]