Robotic Swarms in Offensive Maneuver

Total Page:16

File Type:pdf, Size:1020Kb

Robotic Swarms in Offensive Maneuver Amphibious assault ship USS America test-fires rolling airframe missile launcher to intercept remote- controlled drone during exercise to test ship’s defense capability (U.S. Navy/Demetrius Kennon) Swarm drones could easily take on the appearance of the U.S Navy’s Low-Cost Robotic Swarms in Unmanned Aerial Vehicle Swarming Technology (LOCUST),3 an inexpen- sive, fixed-wing platform that is individ- Offensive Maneuver ually tube-launched and autonomously joins a swarm once airborne. Alterna- By Jules Hurst tively, ground-based swarm combatants might resemble miniature tanks like the Estonian ADDER weaponized ground vehicle.4 For the purposes of this article, or many years, military scientists of horse archers of the Asian steppe though, assumptions need to be made. have contemplated the advent of against less flexible foes.2 Whatever the Future swarm combatants will likely be swarming tactics as an evolution source of inspiration, few authors move F severable into two broad categories: fire within maneuver warfare, and futurists beyond the abstract employment of support swarms and maneuver swarms. have contemplated the execution of the robotic swarms. To fully explore swarm Fire support swarm combatants will tactics by cooperative teams of semi- utility in fire and maneuver, swarms carry one-time-use warheads that are autonomous drones.1 These projections should be inserted into the tactical con- changed modularly to deal with a variety expound on strengths demonstrated cepts of today—chiefly, the five forms of targets (area, point, soft-skinned, by hive-minded organisms such as bees of offensive maneuver recognized under hardened, airborne, and others). These or ants, which work cooperatively to Army doctrine. kamikaze-styled drones could be airborne defeat larger invaders through non-hier- or ground-based. They might be capable archal communications. Other swarm Swarm Combatants of independently recognizing enemy theorists reference the deadly effective- Much of the reluctance to begin targets through image classification or ness of the ephemeral, loose formations theorizing about specific swarm tactics need assistance from human controllers. stems from the absence of a clear devel- They will likely be individually inexpen- opmental path in the technology. No sive compared to many modern weapons one knows what swarm combatants will Captain Jules “Jay” Hurst, USAR, previously of war, including the precision-guided served as the Operations Officer of the USSOCOM look like or what their capabilities will munitions they may replace. Fire support Analytic Innovation and Technology Unit and be, and many prototype pathways exist. Senior Intelligence Analyst of 1st Ranger Battalion. swarms probably will be initially deployed JFQ 87, 4th Quarter 2017 Hurst 105 Finally, robotic maneuver swarms may offer the best platform to execute reconnaissance pull tactics, a subset of Auftragstaktik or mission-type tactics.5 In recon pull, commanders order units to conduct reconnaissance along the length of the enemy front to determine where to mass forces for the battle’s decisive operation and attempt penetra- tions or envelopments. A swarm could be particularly effective at this because of its potential to collect big data in real time. Without pause, swarm combatants could relay situation reports faster than any squad leader on a radio. Every soldier may be a sensor, but each swarm com- batant will be a sensor platform with an infallible memory.6 A shot fired by or at a swarm combatant provides a data point Scan Eagle unmanned aerial vehicle designed to provide multiple surveillance, reconnaissance data, that, when aggregated, could help the and battlefield damage assessment missions launches from amphibious dock landing ship USS swarm (or human analysts and operators) Comstock, February 25, 2011 (U.S. Navy/Joseph M. Buliavac) determine the mass, density, and disposi- tion of enemy forces along its front. With by conventional field artillery and air as- orbit the battlefield like flocks of angry proper processing, this swarm data could sets, but in the future, semi-autonomous birds. provide commanders with a visualization systems specifically designed for this Maneuver swarms will likely be of enemy activity on the battlefield in real purpose may take this mission from them. more durable than their fire support time and improve their cognitive ability Something akin to a mini–mobile mortar, counterparts and exercise greater coop- to perceive a battlefield filled with tens of self-propelled howitzer, high-flying drone eration with human combatants on the thousands of robots, human beings, and aircraft, or a “truck with rockets” could battlefield. Unlike fire support swarms, vehicles. autonomously move forward with ma- maneuver swarms will be persistent and Imagine the power of thousands of neuvering elements to deploy responsive capable of multiple uses. A maneuver drones gathering combat data in real time fire support swarms. swarm might resemble a microcosm of and the rapidity with which weak points Theoretically, fire support swarm the combined arms forces that have made in the enemy line could be calculated combatants will be less expensive than up militaries since the mid-20th century. and exploited with a robotic coup d’oeil. precision-guided munitions, capable of They will reflect the synergistic mix of ca- Then imagine how quickly these same targeting without human intervention pabilities found there, but they may field drones could concentrate in an attack on through object recognition and able to air and ground assets in drastically dif- these points. The potential for a trained loiter overhead until needed by maneuver ferent ratios than are common in today’s swarm to observe, orient, decide, and act forces. Their largest advantage will be nu- Brigade Combat Teams. faster than human combatants in this sce- merical. Modern air defense systems are Robotic maneuver swarms lack the nario is frightening.7 When swarms face not designed to intercept large quantities biggest inhibitor of human combatants— one another, the speed of the swarm’s of small projectiles, and current missile fear. This apathy to casualties would coup d’oeil—determined by algorithmic systems would be overwhelmed if tasked prevent them from having their maneuver efficiency and processing power—may with intercepting a fire support swarm restricted by enemy fires, and their ability decide the outcome of battles, and if consisting of dozens of munitions. to field large numbers of swarm combat- robots ever become the military’s primary Maneuver swarm drones will resemble ants offers them a resilience against losing maneuver arm, a force’s mobile comput- modern air forces and armies on a mi- combat effectiveness unknown to human ing capabilities may be a key component croscale. Miniature quadcopters armed combatants. Maneuver swarms consisting in evaluating its overall combat power. with light machine guns might act as at- largely of aerial robots would also pos- tack aviation platforms, and scaled-down sess the ability to compress into a space The Role of the Air Force infantry fighting vehicles will imitate unimaginable by ground-based maneuver and Naval Aviation modern armor and mechanized infantry. units because of their ability to stack ve- Air Force and Navy assets will play criti- Flights of fixed-wing swarms will provide hicles in the air at different altitudes. cal roles in the delivery, sustainment, persistent autonomous air support as they and cyber protection of drone swarms 106 Joint Doctrine / Robotic Swarms in Offensive Maneuver JFQ 87, 4th Quarter 2017 on the land and in the sea and air, but article, maneuver swarms function under incapable of massing at a decisive point they will also have significant roles multi-Service control. with swiftness. Fire support swarms with in fielding and controlling maneuver Capability Assumptions. Autonomous straightforward attack missions may be swarms in land armies. Fixed-wing swarm technology only exists in nascent less reliant on intra-swarm communica- systems offer numerous advantages over stages, but to explore the use of swarms tions and should be less vulnerable to their rotary-wing counterparts in endur- in offensive forms of maneuver, we need electronic warfare. For this article, we as- ance, speed, and payload capacity due to make projections regarding their future sume that most future swarm combatants to efficiencies inherent in their aero- capabilities. will possess the means to communicate nautical design. Accordingly, fixed-wing Future swarm combatants will possess mid-battle, at least to the point where drones should make up a large portion sufficient artificial intelligence to oper- they will be able to intermittently com- of future maneuver and fire support ate semi-autonomously after receiving municate through burst communications swarms. Unless ceded to the Army, initial guidance from human operators. or while in close proximity to each other. these armed, robotic fixed-wing plat- Maneuver or fire support swarms should Both maneuver and fire support forms will be controlled by Air Force or be able to process tasks of the following swarms will be vulnerable to cyber attacks naval aviation, necessitating that both complexity without human control: by state and nonstate actors. The cyber Services further integrate their mission components of every Service will need command of these swarms directly with Attack all adult males within a 500-meter to make considerable effort to minimize land forces. radius
Recommended publications
  • (AFDD) 3-13, Information Operations
    Cover Sheet for Air Force Doctrine Document (AFDD) 3-13, Information Operations OPR: LeMay Center/DD 28 July 2011 AFDD numbering has changed to correspond with the joint doctrine publication numbering architecture (the AFDD titles remain unchanged until the doctrine is revised). Any AFDD citations within the documents will list the old AFDD numbers until the doctrine is revised. The changed numbers follow: OLD NEW TITLE AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign Internal Defense AFDD 2-4 changed to AFDD 4-0 Combat Support AFDD 2-4.1 changed to AFDD 3-10 Force Protection AFDD 2-4.2 changed to AFDD 4-02 Health Services AFDD 2-4.4 changed to AFDD 4-11 Bases, Infrastructure, and Facilities [Rescinded] AFDD 2-4.5 changed to AFDD 1-04 Legal Support AFDD 2-5 changed to AFDD 3-13 Information Operations AFDD 2-5.1 changed to AFDD 3-13.1 Electronic Warfare AFDD 2-5.3 changed to AFDD 3-61 Public Affairs Operations AFDD 2-6 changed to AFDD 3-17 Air Mobility Operations AFDD 2-7 changed to AFDD 3-05 Special Operations AFDD 2-8 changed to AFDD 6-0 Command and Control AFDD 2-9 changed to AFDD 2-0 ISR Operations AFDD 2-9.1 changed to AFDD 3-59 Weather Operations INFORMATION OPERATIONS Air Force Doctrine Document 3-13 11 January 2005 Incorporating Change 1, 28 July 2011 This document complements related discussion found in Joint Publication 3-13, Joint Doctrine for Information Operations.
    [Show full text]
  • Team 4: Influencing Insurgent SVBIED
    Team 4: Influencing Insurgent SVBIED Operations Using Traffic Control Points Enhanced with Unmanned Aerial System (UAS) Employment Strategies TEAM 4 MEMBERS The goal of the IDFW 15 effort was to determine the value of adding Unmanned Aerial Systems (UAS) to the Edward Teague aforementioned environment. Specifically, we looked to US Military Academy at West Point, US derive insights about semi-autonomous UAS with swarm Niki Goerger behaviors. Engineer Research and Development Center, US US Military Academy at West Point, US This extension can assist counterinsurgent forces in several ways. It will drive needs for UAS allocation and Brad Young Naval Post Graduate School, US development by identifying critical elements of semi- autonomous swarming behavior. In addition, it may Ng Chu Ngah highlight mission behavior that shows the most promise by Quek Kwang Ti Defence Science and Technology Agency, expanding the tasks and environment beyond this current Republic of Singapore set. Due to the complex nature of the problem, the current state of understanding in the field, and the exploratory nature INTRODUCTION of the research, insights vice specific answers are central in this research. Insurgents have effectively employed asymmetric tactics, such as the use of suicide bombers, as viable threats in urban PROBLEM STATEMENT environments. These threats are often devastating in their physical and emotional effects. They are hard to detect and This study addresses whether we can isolate factors needed have proven difficult to thwart or defeat. The U.S. Army has to identify effective semiautonomous UAS behaviors that recognized that improvised Explosive Devices (IEDs) pose a add value to the aforementioned SVBIED TCP study.
    [Show full text]
  • Drone Swarms As Networked Control Systems by Integration of Networking and Computing
    sensors Review Drone Swarms as Networked Control Systems by Integration of Networking and Computing Godwin Asaamoning 1,2,* , Paulo Mendes 3,4 , Denis Rosário 5 and Eduardo Cerqueira 5 1 COPELABS, Universidade Lusofóna, 1749-024 Lisbon, Portugal 2 Bolgatanga Technical University, Sumbrungu UB-0964-8505, Ghana 3 School of Communication, Architecture, Arts and Information Technologies, Universidade Lusofóna, 1749-024 Lisbon, Portugal; [email protected] 4 Airbus Central Research and Technology, Willy-Messerschmitt-Str 1, Taufkirchen, 82024 Munich, Germany 5 Computer Science Faculty, Federal University of Pará, Belém 66075-110, Brazil; [email protected] (D.R.); [email protected] (E.C.) * Correspondence: [email protected] Abstract: The study of multi-agent systems such as drone swarms has been intensified due to their cooperative behavior. Nonetheless, automating the control of a swarm is challenging as each drone operates under fluctuating wireless, networking and environment constraints. To tackle these challenges, we consider drone swarms as Networked Control Systems (NCS), where the control of the overall system is done enclosed within a wireless communication network. This is based on a tight interconnection between the networking and computational systems, aiming to efficiently support the basic control functionality, namely data collection and exchanging, decision-making, and the distribution of actuation commands. Based on a literature analysis, we do not find revision papers about design of drone swarms as NCS. In this review, we introduce an overview of how to develop self-organized drone swarms as NCS via the integration of a networking system and a Citation: Asaamoning, G.; Mendes, computational system. In this sense, we describe the properties of the proposed components of a P.; Rosário, D.; Cerqueira, E.
    [Show full text]
  • The Shadow of Napoleon Upon Lee at Gettysburg
    Papers of the 2017 Gettysburg National Military Park Seminar The Shadow of Napoleon upon Lee at Gettysburg Charles Teague Every general commanding an army hopes to win the next battle. Some will dream that they might accomplish a decisive victory, and in this Robert E. Lee was no different. By the late spring of 1863 he already had notable successes in battlefield trials. But now, over two years into a devastating war, he was looking to destroy the military force that would again oppose him, thereby assuring an end to the war to the benefit of the Confederate States of America. In the late spring of 1863 he embarked upon an audacious plan that necessitated a huge vulnerability: uncovering the capital city of Richmond. His speculation, which proved prescient, was that the Union army that lay between the two capitals would be directed to pursue and block him as he advanced north Robert E. Lee, 1865 (LOC) of the Potomac River. He would thereby draw it out of entrenched defensive positions held along the Rappahannock River and into the open, stretched out by marching. He expected that force to risk a battle against his Army of Northern Virginia, one that could bring a Federal defeat such that the cities of Philadelphia, Baltimore, or Washington might succumb, morale in the North to continue the war would plummet, and the South could achieve its true independence. One of Lee’s major generals would later explain that Lee told him in the march to battle of his goal to destroy the Union army.
    [Show full text]
  • Underground Power Records List 4 -2020.P[...]
    This is the last List that will be sent to all emails on our previous email distributor - we will build up a new one. So all friends who order for sure will be on the new distributor. All others please send a short message and we will add you too for sure. The list will be also on our website and we will announce ever new one on facebook. Our own new releases will be on the next List (Xmas or January)! Das ist die letzte Liste die an den alten email Verteiler geschickt wird - wir bauen einen Neuen auf. Alle Besteller werden automatisch in den neuen aufgenommen. Alle Anderen die den Newsletter erhalten möchten senden bitte eine kurze Bestätigung, dass Sie künftig auch wieder in den Verteiler aufgenommen werden wollen. Die Liste wird auch auf unserer Webseite veröffentlicht und immer auf facebook angekündigt. Unsere eigenen neuen Releases werden auf der nächsten Liste erscheinen (um Weihnachten oder im Januar) ! CD ADORNED GRAVES – Being towards a River (NEW*EPIC/THRASH METAL*TOURNIQUET*DELIVERANCE) - 14 GER Private Press 2020 – Brandnew Oldschool 80’s Epic / Thrash Metal with elements of Epic Doom / Death Metal from Germany ! For Fans of Vengeance Rising, Tourniquet, Deliverance, Believer, Martyr / Betrayal or Metallica and Slayer, but also Black Sabbath + Trouble ! Melodic Old School Epic Doom N Thrash Death Metal Einschlägen, der Einfachheit halber als „Thrash Metal“. ALCATRAZZ - Born Innocent (NEW*MELODIC METAL*G.BONNET*RAINBOW*MSG*TNT) - 15 Silver Lining Music 2020 - Brandnew limited CD Digipak Fantastic Melodic Metal / Hard Rock with Original Line up Graham Bonnet, Keyboarder Jimmy Waldo and Bassplayer Gary Shea – now together with Guitar Hero Joe Stump and some fantastic guest musicians: Chris Impellitteri, Bob Kulick, Nozumu Wakai, Steve Vai, Dario Mollo, Don Van Stavern or Jeff Waters For Fans of RAINBOW, TNT, EUROPE, DOKKEN, MICHAEL SCHENKER ANGEL WITCH – Screamin’ ‘n’ Bleedin’ (NEW*LIM.500*NWOBHM CLASSIC 1985) – 18 € N.W.O.B.H.M.
    [Show full text]
  • The Role of Intelligence in the Civil War Part II: Support to Military Operations Lecture Three: Lee Vs
    The Role of Intelligence in the Civil War Part II: Support to Military Operations Lecture Three: Lee vs. Hooker at Chancellorsville - Better Intelligence Doesn’t Guarantee Success Review: Last week, we noted that Gen. Burnside lasted less than 3 months, suffering defeat at Fredericksburg in Dec. 1862 and the “Mud March” in January. He was replaced January 26 by Gen. Joe Hooker, who immediately began making improvements in the army’s structure and supply. One of Hooker’s the key initiatives was the creation of the first professional intel organization - the BMI. What’s Next?: But, as winter began to give way to spring in 1863, the armies remained where they were at the end of the Battle of Fredericksburg the previous December – that is facing each other across the Rappahannock River. Both Lee and Hooker were considering offensive operations, when the weather improved. HOOKER PLANS TO MOVE AROUND LEE’S LEFT FLANK • The Army of Potomac was at peak strength – almost 140,000 men. In a late March letter to Hooker, Lincoln confirmed what he expected: “Our prime objective is the enemy’s army in from of us, and not with, or about, Richmond.” In the same letter, Lincoln applied the pressure, closing with : “YOU MUST ACT.” • Plan Objective: The Confederate Army, though only about half the size of the Union Army facing it, was in a very strong defensive position on Fredericksburg Heights with the river in front. To force Lee out into the open, Hooker would have to attack straight at him or go around to the right or left.
    [Show full text]
  • Measures of Effectiveness for the Information-Age Army
    Measures of Effectiveness for the Information-Age Army RICHARD DARILEK WALTER PERRY JEROME BRACKEN JOHN GORDON BRIAN NICHIPORUK R Arroyo Center The research described in this report was sponsored by the United States Army, Contract No. DASW01-96-C-0004. Library of Congress Cataloging-in-Publication Data Measures of effectiveness for the information-age Army/Richard Darilek ... [et al.]. p. cm “MR-1155-A.” Includes bibliographical references. ISBN 0-8330-2847-2 1. United States. Army. 2. Combat—Evaluation. 3. Combat—Data processing. 4. Information warfare—United States. I. Darilek, Richard E. UA25 .M43 2000 355.3'43—dc21 00-036615 RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND® is a registered trademark. RAND’s publications do not necessarily reflect the opinions or policies of its research sponsors. © Copyright 2001 RAND All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from RAND. Cover design by Tanya Maiboroda Cover illlustration courtesy of Raytheon Command, Control and Communication Systems Published 2001 by RAND 1700 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 RAND URL: http://www.rand.org/ To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Internet: [email protected] PREFACE This report presents the results of a project sponsored by the Direc- tor of Strategy, Plans, and Policy, Office of the Deputy Chief of Staff for Operations and Plans, Department of the Army Staff.
    [Show full text]
  • Drone Swarms
    Future Warfare Series No. 1020304060 DefendingAvoidingTheThe “WorriedAnthraxAre thePanic Drone American Vaccine Well”and Swarms Keeping Response Debate: Homeland the A WeaponsMedicalPorts Opento Review ofCBRN1993-2003 Massin a Events:forChemical Destruction? Commanders and BiologicalAnalysis Threat and Solu�onsEnvironment A Literature Review TanjaLieutenantRandallMajor M. Korpi Zach J.Richard ColonelLarsen aandry Kallenborn A.Christopherand Fred Hersack, Patrick P. Stone, USAF D.Hemmer EllisUSAF United States Air Force 60 Center for Strategic Deterrence Studies 30204010 Maxwell Air Force Base, Alabama Are Drone Swarms Weapons of Mass Destruction? by Zachary Kallenborn The Counterproliferation Papers Future Warfare Series No. 60 May 6, 2020 U.S. Air Force Center for Strategic Deterrence Studies Air University Maxwell Air Force Base, Alabama 36112 Table of Contents Chapter Page Disclaimer.…………………………………….…………..….……….………… ii Abstract…………………………………………………….….…………………iii Chapter 1. Introduction……………………………………….….……….………1 Chapter 2. Are Drone Swarms WMD?.………….………………………………9 Chapter 3. The Question of Autonomy…………………..………….….………15 Chapter 4. Drone Swarms in WMD Roles…………………………..…………….…19 Chapter 5. Conclusion……..…….…………...……...……...……...……...……27 i Disclaimer The views expressed in this academic research paper are those of the individual authors and do not reflect the official policy or position of the United States government, the Department of Defense, or Air University. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government. ii Abstract Public discussion has raised significant fears over armed drone swarms being used in a manner like weapons of mass destruction (WMDs). However, should they be considered WMDs? The first half of the article explores the question of comparing drone swarms to various conceptions of WMD. Overall, it finds that a subset of drone swarms, armed fully autonomous drone swarms (AFADS), are WMD.
    [Show full text]
  • December 1, 2018 1:00 Pm – 1:45 Pm Panel 6 Star Wars: What
    DECEMBER 1, 2018 1:00 PM – 1:45 PM PANEL 6 STAR WARS: WHAT DOES SDI TEACH US ABOUT TECHNOLOGY IN MILITARY COMPETITION? Panelists: • General Hawk Carlisle (USAF, Retired), President and CEO, National Defense Industrial Asscociation (NDIA) • Dr. Thomas Kennedy, Chairman and CEO, Raytheon • Senator Jon Kyl, U.S. Senate, Arizona Moderator: Ms. Morgan Brennan, CNBC Video: https://www.youtube.com/watch?v=a_IZcFxkIY&list=PLHNOi2zcxo7sBxM7HfhmB_tf6QXeqj 48K&index=9 Brennan: Well first I want to say thank you all for being here today, it's been an incredible forum so far. I just want to introduce our panelists. Star Wars: What Does SDI Teach Us About Tech and Military Competition? Brennan: Sitting next to me is Senator John Kyl, US Senator representing Arizona. Dr. Tom Kennedy, Chairman and CEO of Raytheon, and General Hawk Carlisle, 4-Star retired US Air force General, and now President and CEO of the National Defense Industrial Association. Brennan: So great to speak with all three of you today. Brennan: So, I think the first place to start is, what actually was SDI, the Strategic Defense Initiative, and how did it birth modern day missile defense, and the technology we're now talking about today? Brennan: So, Senator Kyl, I would love for you to just start with a little bit of background on this, given the fact that you have been a life-long advocate of nuclear defense, and your public service does date back to the Reagan years. Kyl: Thank you very much. Kyl: You can think about SDI as a roughly decade long effort, first begun by President Ronald Reagan, to create a new system.
    [Show full text]
  • Naval Flanking in Ground Warfare
    Naval Flanking in Ground Warfare Gideon Raz “The indirect [approach] is by far the most hopeful and economic form of strategy. ” B. H. Liddell Hart1 Israel’s Coastal Border The Mediterranean Sea, Israel’s only open border, also borders Israel’s enemies to the north and the Gaza Strip to the south, thereby linking it to enemy states. Thus, Israel’s control of this naval arena would enable it to project military strength from the sea, and afford it the capability to embark on landing operations of various types. “The shores of the State of Israel, the naval interface with each of our enemies, require us to expand our naval strength to the point of being able to land forces from the sea. David Ben-Gurion even said that we are bound to view the sea as Israel’s extended western territory.”2 The naval arena is the Achilles’ heel of Israel’s enemies and therefore also an opportunity for the IDF. The Operational Need Today the threat of high trajectory fire, based on the use of conventional weapons (missiles, rockets, mortar bombs) in massive quantities, tops the list of threats Israel confronts. It joins the classical, conventional threat that was based on the use of large military systems engaging in battles of ground maneuvers…The IDF must use the two major com- ponents of its capabilities, firepower and ground maneuver, in order to damage both the enemy’s military capabilities and its political or organizational infrastructure…An enemy seeking to avoid severe blows operates purposefully and cynically within civilian population centers.3 Rear Admiral (ret.) Gideon Raz, former Deputy Commander of the Israeli Navy Military and Strategic Affairs]7PMVNF]/P].BZ GIDEON RAZ | /"7"-'-"/,*/(*/(306/%8"3'"3& 46 Frontal assault has traditionally been the IDF’s main maneuver.
    [Show full text]
  • Fm 34-1 Intelligence and Electronic Warfare Operations
    /fa FM 34-1 INTELLIGENCE AND ELECTRONIC WARFARE OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. Pentagon Library (ANR-PL) ATTN: Military Documents Section Room 1A518, Pentagon Washington, DC 20310-6050 & J* % } *FM 34-1 FIELD MANUAL HEADQUARTERS No. 34-1 DEPARTMENT OF THE ARMY Washington, DC, 27 September 1994 INTELLIGENCE AND ELECTRONIC WARFARE OPERATIONS TABLE OF CONTENTS Page PREFACE iii INTRODUCTION v CHAPTER 1 - INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT TO MILITARY OPERATIONS 1-1 Mission of Army Intelligence 1-1 IEW in the Force Projection Army 1-1 Principles of Force Projection IEW 1-4 Intelligence Battlefield Operating System 1-11 Primary Features of the Intelligence BOS 1-11 Limitations of the Intelligence BOS 1-13 Training the Intelligence BOS 1-14 CHAPTER 2 - FUNDAMENTALS OF IEW OPERATIONS 2-1 Total Force Effort 2-1 Levels of Intelligence 2-2 Intelligence Disciplines and Functions 2-4 Characteristics of Effective Intelligence 2-7 Primary Intelligence Tasks 2-7 The Intelligence Cycle 2-15 Commander's Intelligence Requirements 2-17 Electronic Warfare 2-20 Electronic Warfare Components 2-20 CHAPTER 3 - FORCE PROJECTION OPERATIONS 3-1 Peacetime IEW Operations 3-1 IEW and the Stages of Force Projection 3-2 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. *This publication supersedes FM 34-1, 2 July 1987. V FM 34-1 Page CHAPTER 4 - COMBAT OPERATIONS 4-1 IEW Supports Commanders 4-1 Commander's Intelligence Team 4-2 Range
    [Show full text]
  • RICHMOND Battlefields UNITED STATES DEPARTMENT of the INTERIOR Stewart L
    RICHMOND Battlefields UNITED STATES DEPARTMENT OF THE INTERIOR Stewart L. Udall, Secretary NATIONAL PARK SERVICE Conrad L. Wirth, Director HISTORICAL HANDBOOK NUMBER THIRTY-THREE This publication is one of a series of handbooks describing the historical and archeological areas in the National Park System administered by the National Park Service of the United States Department of the Interior. It is printed by the Government Printing Office and may be purchased from the Superintendent of Documents, Washington 25, D.C. Price 25 cents. RICHMOND National Battlefield Park Virginia by Joseph P. Cullen NATIONAL PARK SERVICE HISTORICAL HANDBOOK SERIES NO. 33 Washington, D.C., 1961 The National Park System, of which Richmond National Battlefield Park is a unit, is dedicated to conserving the scenic, scientific, and historic heritage of the United States for the benefit and inspiration of its people. Contents Page Richmond 1 The Army of the Potomac 2 PART ONE THE PENINSULA CAMPAIGN, SUMMER 1862 On to Richmond 3 Up the Peninsula 4 Drewry's Bluff 5 Seven Pines (Fair Oaks) 6 Lee Takes Command 9 The Seven Days Begins 12 Beaver Dam Creek (Ellerson's Mill) 13 Gaines' Mill 16 Savage Station 18 Glendale (Frayser's Farm) 21 Malvern Hill 22 End of Campaign 24 The Years Between 27 PART TWO THE FINAL STRUGGLE FOR RICHMOND, 1864-65 Lincoln's New Commander 28 Cold Harbor 29 Fort Harrison 37 Richmond Falls 40 The Park 46 Administration 46 Richmond, 1858. From a contemporary sketch. HE AMERICAN CIVIL WAR was unique in many respects. One Tof the great turning points in American history, it was a national tragedy op international significance.
    [Show full text]