Showing posts with label tactics. Show all posts
Showing posts with label tactics. Show all posts

2021-01-22

Combat Cloud

 Combat Cloud 

Introducing modern computing and communications technology for 

the multi-domain fighting edge


"The western Armed Forces are at the centre of an "information in war" revolution, where the speed of information and advance of technology and organisational design are merging to change the execution of military operations. The 21st century demands a new, more agile, and integrated operational framework for the employment of allied military power, and to shift away from the structure of segregated land, air, and sea warfare." 


Definitions

Original concept created by David A. Deptula (ret Gen USAF) defines combat cloud  as an operating paradigm where information, data management, connectivity, and command and control (C2) are core mission priorities. According to Deptula, Combat cloud:
  • Treats every platform as a sensor and an "effector," and require a C2 paradigm that enables automatic linking, seamless data transfer capabilities, while being reliable, secure, and jam-proof. 
  • Inverts the paradigm of combined arms warfare— making information the focal point, not operational domains. 
  • Represents an evolution where individually networked platforms—in any domain—transform into a "system of systems" enterprise, integrated by domain and mission-agnostic linkages.
USDOD 2016 approach is to extend their Joint Information Environment (JIE) to tactical edge and platforms with combat cloud which is "an overarching meshed network for data distribution and information sharing within a battlespace, where each authorised user, platform or node transparently contributes and receives essential information and can utilise it across the full range of military operations." 

European Future Combat Air System (FCAS) concept seeks information control in theatres of operations.  It "requires a significant transformation of our operational architectures to place data at the heart of the future combat cloud. Expertise in the end-to-end architectures of functional chains should ensure interoperability, resilience and digital security of all systems and the sharing of information between all military personnel." 

Cloud computing "is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e. g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." 

Fog/Edge computing "is a horizontal, physical or virtual resource paradigm that resides between smart end-devices and traditional Cloud or data centres. This paradigm supports vertically-isolated, latency-sensitive applications by providing ubiquitous, scalable, layered, federated, and distributed computing, storage, and network connectivity." 

New technology enables improved tactical effects

Evolution of commercial technology

Evolution of smartphone-based digital services, shortly:
  1. First smartphones integrated mobile phone and more computing performance. They were able to run applications on the phone and present information on-screen like calendar, notes, games, email, fax reader, etc. as in 1995 Nokia Communicator 9000 . These phones downloaded ringtones over a slow data connection.
  2. With better data transfer capabilities, smartphones were connected to the Internet with a higher speed network on 2.5 G mobile communications . This opened the mobile Internet and lead to specific smartphone applications to browse and utilise Internet services. Around 2000, the first sensor – camera – was integrated into a smartphone which made more than a terminal.
  3. Around 2007, the iPhone debuted and provided downloadable music services. Application store enabled users to download a wider variety of applications to their smartphones. Cloud-based social media applications like Facebook (2004), Twitter (2006) emerged and accelerated social content sharing.  
  4. Introduction of 4G mobile network, integration of sensors in smartphone (proximity, gravity, gyro, compass, barometer, fingerprint, camera, posture, etc.), more sophisticated cloud-based services and improved computer performance in smartphones have brought us to a realm where you go to a foreign country, speak to the phone your order, application in phone uses a cloud-based translator to convey your speech into the required language. Audio generator in phone speaks out your order in the local language.
  5. Introduction of smart (home, car, city) with 4G connectivity enables collecting a broad spectrum of sensor data fused with information from cloud databases. Your references by Facebook provide your phone screen or AR goggles a 3D presentation of information.
  6. Introduction of Internet of Things, Remote controlled devices, Autonomous devices, and 5G connectivity enable machines to exchange data, influence each other, learn from each other's (machine learning) and conduct complex functions semi-autonomic manner. All Things on Internet have sensors collecting information from their environment, 5G connectivity transfers the data with less than 50 ms delay, edge computers fuse and process data and feed it back to effector interfaces, AR/VR interfaces present events to human decision-makers within conceivable context, machine effectors take a predefined action.

In summary, advanced computer performance, robust and fast network connections, standard protocols, and interfaces, learning machines, and better user interfaces for humans promote new man-machine cooperation for private and public life. Military do adopt these technologies but with slower pace. The legacy Tactical Datalink (TDL 11, 16, or 22) anchors tactical communications at the level of first generation of smart phones enabling man-to-man communications over voice and message. With more remote and automated platforms, the battlefield needs advanced means for communications and computing.

Evolution of tactical military communications and computing

When studying the evolution of US DoD tactical data communications (TADIL), one can conclude that they have had challenges to migrate to newer technologies once the common interface has been established. For example, their intent to update or replace the legacy TADILs (L11 and L16) may look like the illustration in Figure:
  • US faces challenges in changing their existing TDL baseline quickly (challenges in JTRS program, freezing MADL). Thus, they adopt a strategy first to host many existing datalinks and their waveforms on the same HW platforms and achieve complex but sufficient interoperability. It may be the unmanned vehicles that have more flexible IP network applications over high-speed Mobile Access Networks.
  • Since Link 22 is compatible with L11 versions, it may become a parallel link. Still, it may be possible that the unmanned vessels and Intranet of Military Things will accelerate new IP MANET networks to bypass both (L11 and L22) old fashioned, TDMA based systems.
  • Seemingly US prefers the L16 based interoperability higher than other, more capacity providing TDL formats. They might have MIDS JTRS onboarded gradually delivering more waveforms in constrained space available in aircraft. New aircraft F-35 etc. may also open some existing constraints, but tactical interoperability may be preferred more than technical advantage. This may change only if RUS or CHI releases their ability to suppress L16 waveform and encryption.
  • However, an L16 network remains very complex to plan for each engagement and requires meticulous management by the Joint Data Link Management Cell. It is therefore not a Mobile Ad Hoc Network like our telephone networks, for example. Its bandwidth is also minimal and its latency high. The exchange capacities offered by these TDL messaging systems are also limited.  
  • Land forces have their WIN-T base station network in place. Next, they are planning to constellate LEO communications satellites to support the ground connectivity and connect soldiers to that trunk network with Handheld, Manpack and Small form fit (HMS) radios of JTRS family.
  • Modern US military networks and datalinks are an excellent example of sub-optimised systems designed for a particular task within a specific weapon system. Not a generic databus between a variety of sensor and shooter platforms. These stand-alone links include Link-16, Intra-Flight Data Link (IFDL), Tactical Targeting Network Technology (TTNT), Multifunction Advanced Data Link (MADL), and the Joint Aerial Layer Network (JALN) concept.  
  • From a technical viewpoint, TCP is not applicable in distorted channels of communications. Thus, a middleware-based Data Distribution Service may be discovered as a solution for future control and data transfer applications.  Furthermore, the data fusion requirements of fifth-generation aircraft (fusion warfare being the hallmark of the F-35) or the architectures being implemented step by step as of today by the US Navy (Cooperative Engagement Capability, then Naval Fire Control - Counter Air, then its extension to other missions) may accelerate the migration.  
Figure: One approach to US TADIL evolution

The Combat Cloud initiative and FCAS programme both provide strong need to lay off the constrained legacy connectivity and seek more man-machine teaming networks provided on ground, air, and space-based communications nodes.

Different approaches to combat cloud

Network Centric Warfare (NCW) or Network Enabled Capabilities (NEC)

Both US and NATO have been building network-centric or enabled warfare capabilities since the 1990s. The original idea was to break the platform centricity and connect sensors, decision-makers, and shooters to enable combined tactics. Therefore, the Combat Cloud concept reawakens the old principles but at a tactical level enabled with new technology.

The Network-Centric Warfare doctrine presented a fundamental shift in military culture, away from compartmentalised war machines and towards interconnected units operating cohesively. The tenets  of Network Centric Warfare were: 
  • A robustly networked force improves information sharing.
  • Information sharing enhances the quality of information and shared situational awareness.
  • Shared situational awareness enables collaboration and self-synchronisation and enhances sustainability and speed of command.
  • Speed of command, in turn, dramatically increases mission effectiveness.
The vision is much the same, and is an evolution of networking in US Armed Forces:
  • Global Information Grid (GIG) from the mid-1990's providing connectivity and computing for strategic and operational levels, 
  • 2014's Joint Information Environment was trying to introduce a single source of truth and present it on a standard pane of glass to all users:
- a 'single' or joint environment to all support operations. 
- to utilise modern cloud technologies
- supporting concepts of mobility (access anywhere, any place, any device).
  • 2020's JEDI initiative which seeks to consolidate all DoD computing on private Cloud and extend its services to soldiers from home garrison to abroad areas of operation, and 
  • 2030's Combat Cloud will connect combined sensors, effectors and decision-makers at a tactical edge with remarkably more computing power to make sense of the information flow.  

US DoD Combat Cloud

  • 2014 Gen(ret) David A Deptula's Combat Cloud "would integrate both manned and unmanned systems and utilise advances in stealth, precision weapons, and advanced command and control tools, ensuring that no single point of attack would cripple US combat operations. Such an effort would also present an opportunity to create modular, scalable combat capabilities, rather than force individual aircraft or other assets to take on more and more tasks." 
  • In 2016 the USAF published its vision for a future network of data distribution and information sharing known as the combat cloud. It defined it as "an overarching meshed network for data distribution and information sharing within a battlespace, where each authorised user, platform or node transparently contributes and receives essential information and can utilise it across the full range of military operations."   It should also be noted that recent news articles indicate that USAF is planning to increase funding for their Combat Cloud in FY 2021.
  • Rockwell Collins has developed the Ground Early Warning and Control System (GEWaCS)  utilising and modifying proven C2 systems.   The GEWaCS is comprised of hundreds of data processing engines connected by a virtualised network. The engines are hosted on Virtual Machines (VM) and are used to process, distribute, correlate, and store a cloud of a sensor, radar, and datalink tracks. Recently video tagging data has become available to the data link, enabling the display of sensor coverage in Link-16. Reaction times of days and hours are no longer viable – and this system allows for a commander to assign assets to a mission in real-time.

Other NATO countries

NATO's cloud-based operational network is called the Federated Mission Network (FMN) since 2015. The FMN is an evolution of the Afghanistan Mission Network. Furthermore, the European side of NATO is aiming to transform as follows:
  • NATO Supreme Allied Commander for Transformation: "It is a C4ISR [system] with the cloud ID and platforms that are either piloted or unpiloted…This is what we have to be able to build for the future, but we have to start it now." 
  • The Future Combat Air System (FCAS) is the critical project for French, German and Spanish air combat power from the 2040s onwards. In FCAS, the keyword is a 'system'. Because it will not be a manned aircraft or a drone, but a system of systems integrating, within a real cloud, sensors and effectors of various types and different generations."  
A NGF, future FCAS combat aircraft, a node of the Cloud at the extreme tactical edge, would thus comprise:  
  • Various applications designed for its different operational functions.
  • Automated analysis tools, possibly shared with other systems, implemented through its applications.
  • Common services also shared with other systems, operating transparently for the pilot.
  • Storage of large amounts of data.
  • Connection to the communication network with other platforms and units, a "self-forming & self-healing" MANET network.
Following the award of the Phase 1A Demonstrators contract for the Future Combat Air System (FCAS) earlier in the month, Airbus and Thales announced on 20 February that the two companies have agreed on co-development of the Air Combat Cloud (ACC) – a key enabler for the FCAS system of systems. 

France

Information control in theatres of operations requires "a significant transformation of our operational architectures to place data at the heart of the future combat cloud. Expertise in the end-to-end architectures of functional chains should ensure interoperability, resilience and digital security (cybersecurity) of all systems and the sharing of information between all military personnel."  The vision is illustrated in Figure.

Figure: View of combat air system by the French Air Force

General Breton, who heads the FCAS programme, explains that "an important aspect of innovation in FCAS will be networking: currently on the Rafale [in its present configuration] the pilot mainly uses own sensors and some information provided by the network". Thus, much of the data obtained by the aircraft is not shared, such as data from the Spectra system or the optronics sensor.  On FCAS [...] the transfer of data will be performed independently of the pilot, who will see the fused data. Nevertheless, he supervises the overall process. 

The French Air Force has also adopted an incremental approach to developing this Cloud, with milestones in 2025 and 2030, designed to prepare for the arrival of FCAS. This is the Connect@aero programme that goes hand in hand with the deployment of the F4 standard on the Rafale:
  • introduction of a higher-speed communication system and additional connectivity ramifications, including munitions
  • "detect enemy air defence systems with greater precision."
  • "collaboratively adapt the trajectories and manoeuvres" of effectors and their munitions, in a degraded positioning, navigation and timing (PNT) environment. 
France aims to implement a "global air combat system" within the next decade.  

Requirements for the connectivity of multi-domain combined weapons effect and joint tactical engagement

The communications and computing infrastructure for multi-domain combined weapons effect shall treat every platform as a sensor, as well as an "effector." It will require a C2 paradigm that enables automatic linking and seamless data transfer capabilities while being reliable, secure, and jam-proof. The new infrastructure shall destroy the boundaries of current domains and make promoting information on the focal point.  The following tactical requirements need to be addressed.

Sensors and Target Acquisition

  • Platforms that have longer-ranged weapons than their onboard sensors can acquire targets need hard quality target data from other platforms  
  • The future battlefield is multi-domain and requires multi-sensor integration. Strategic fires require multi-sensor, stealthy, long-endurance aircraft, "redundant and resilient" information networks, and "self-learning, self-protection capabilities."
  • New platforms like the F-22 and F-35 are information machines far above and beyond being killing assets.  
  • Multi-function assets and aircraft, capable of performing a strike, ISR, and other tasks, will steadily replace mission-specific assets. Target engagement based around the need to "destroy" a given aim point will give way to effects-focused engagement, driven by improving capabilities such as cyber warfare tools.   
  • As sensor fusion has evolved through artificial intelligence (AI) and other technologies, it has become possible to fuse what appears to be seemingly disparate data. These advanced fusion engines need data - which may be stove-piped in 5th generation fighter aircraft, advanced electronic warfare systems, or within video streaming systems. Benefitting from this information requires combining sensor data and creating IDs, intent, and patterns of attack. 

Command and Control

  • In an A2/AD warfare, a decision-maker can be in more places than before. The Recognised Operational Picture is available to everybody, enabling distributions of legacy command posts and cooperation beyond current line organisations. "We must prepare for an era of warfare requiring new levels of cross-domain collaboration, operational level command and control, and the dynamic integration of national, theatre, and tactical capabilities across the full range of military operations," 
  • Data, information, and ISR gathering and analysis will evolve as knowledge management becomes even more critical, as will predictive instead of reactive analysis.

Fires

  • Individual precision weapons will give way to "volumetric weapons," such as directed energy. 
  • Massed, non-stealthy strike packages of manned aircraft will evolve into more distributed force packages, with greater low observable (LO) characteristics, and more use of automated systems.   

Concept of operations for combat cloud in a generic Armed Forces

In a scenario where the adversary is launching a full force amphibious attack to the shores of a nation, Armed Forces, together with other national security agencies, must have the seamless use of information as illustrated in Figure. 

Nature of the conflict

The attack takes place in all dimensions parallelly and aims to utilise the strategic surprise as long as possible. The strike may include, for example:
  • Information operation trying to divide people from government officials, the cyber operation to shut down all government and local authorities web services, and electronic jamming to interfere TV and radio broadcastings.
  • The cyber-electronic operation aims to suppress authorities' decision-making and transactions of key financial institutes by launching earlier injected malicious software attacks within the systems and assassinating VIP authorities.
  • Kinetic amphibious attack to gain bridgeheads and foothold strategic targets like governmental offices, broadcasting stations, main transportation hubs, etc. The strike may include:
- Ballistic missile strikes against main command posts and government installations
- Suppression of coastal and air sensor systems by missiles or special forces
- Mining the flanks of the sea avenues for the incoming forces
- Blocking the junctions leading out from the garrisons and central depots
  • Besides the above, the adversary has infiltrated unidentified troops within the nation in preparation. The distributed cells aim to create chaos and terror as much as possible to overwhelm the authority's decision making and create confusion among the population.

Requirements for cooperation

  • As fixed sensor stations will be mostly destroyed, there is a need to use fused sensor information from space, air, mobile ground, and navy platforms to understand the main launch and bridgehead areas better.
  • Getting and sustaining a situational awareness among the chaotic situation requires a fusion of event data simultaneously from the information/cognitive, electromagnetic, cyber environment, space, air, maritime and land domains. 
  • The fused situational picture needs to be shared between all important tactical and operational decision-makers allowing the decision cooperation between different speciality agencies of each dimension.
  • Target acquisition becomes essential, for example, for Air Force assets which are the fastest deployable assets. The available sensors need to cooperate in creating targeting information for the incoming fighter-attackers.
  • As the theatre becomes rich in small tactical targets, the effect prioritisation becomes essential to focus on the most impacting adversary assets. Otherwise, the enemy tactics will quickly consume the operational ammunition and air assets dry up too fast.
  • Cost-efficient and continuous impact with combined weapons is essential in a distributed target scenario. Therefore, the defence needs to assign fire missions to best suitable arms without friction caused by organisational boundaries.
  • As tactical-level command and control are occupied in countering the ongoing attack, the operational level C2 should be seeing further and above the current situation. This requires cooperation over all the national defence actors in making sense of the enemy intent and their incoming second wave efforts.
Figure: A scenario of amphibious attack

The above scenario requires cooperation and therefore, interoperability between all domains and organisations. The basic idea for multi-domain collaboration is simple:
  • Collect all event data from available sensors and sources
  • Store it (so we can see the short and long term trends)
  • Make sense of it (with the help of analytics/machine learning/AI)
  • Pass it directly back to the decision-makers / soldiers who need the information.
  • Further analyse the data at the operational level, make sense of an operational situation, and prepare for the next phases.
The multi-domain interoperability requires data sharing, joint fusion, and sense-making at tactical and operational levels detailed in Table.
Table: Interoperability requirements in multi-domain operations

Concept of technology for combat cloud

Technical characters

The US DoD aspires that a distributed, self-forming, all-domain combat cloud that is self-healing and difficult to attack effectively significantly complicates an enemy's planning and will compel them to dedicate more resources toward defence and offence. In its ultimate manifestation, the combat cloud will be strategically dislocating to any military challenger. A mature combat cloud will provide superior conventional deterrence to a degree previously only achieved by nuclear deterrence and enable operational dominance in multiple domains. 
The above end state requires significant changes within the entire air defence systems and takes longer to transform. The human competencies will especially face significant transfer from current platform-based capabilities and behaviour towards more system-oriented qualifications that require different trust and cooperation between distributed actors. The following assessment does not address the human or organisational changes but explains the main technological features that enable the Combat Cloud capability in communications, computing and security.

Communications

Joint Aerial Layer Network (JALN) is augmentation and extension of tactical networks using a variety of communications capabilities that will support operations in challenging or degraded communications environments within a joint operations area (JOA). Its primary purpose is to connect/reconnect combatants, executing specific missions and tasks. 
The JALN will:
  • Integrate with space and surface layers
  • Increase communications access for the joint force at all levels
  • Enable on-the-move (OTM) and over-the-horizon (OTH) / beyond line of sight (BLOS) communications 
  • Provide modular, scalable, and flexible operational capabilities
  • Provide "mission persistent" connectivity as specified by the commander
 
Figure: Concept for Joint Aerial Layer Network

Computing

Computing is essential in processing big data within the digitalised air defence system. Computing is based on processors, storage, and software applications. They will have different life-cycles, which will challenge the current logistics and maintenance:
  • With doubling the computing performance every 18 months, the standard processor becomes exponentially better but chip design and production more complicated. Specialised processors become rarer as the performance of standard processors improves much faster. The features become more software-defined than before, even within sophisticated platforms like fighter-attacker. Countries with processor design and manufacturing abilities will constraint their distribution during crises.
  • Software-defined functions and features become more relevant, which means that systems are updated more frequently without changing the hardware. The whole length of the software supply chain will become a primary target for an attacker.  
Military computing may be distributed in the Joint Information Environment between platforms (fighter, sensor, soldier, tank) and global computing clouds: 
  1. Platform computing - autonomy will increase the volume of computing required onboard. Embedded sensors and weapons on each platform will increase. Swarming tactics with fleets of platforms will improve the firepower. Civilian terminology calls this edge computing or embedded computing. Maintenance and configuration of these computerised systems require different competencies from support personnel. Example: F-35
  2. Unit-based computing – all vehicles and platforms in a unit will onboard processors for their use and the use of the system. The system computing enhances information between the computing nodes and provides information services to soldiers and other machines. Civilian terminology refers to fog computing. For example, an infantry company becomes a cloud by itself and in connection to mission cloud. The company's computing nodes provide data storage and processing power to fuse sensor information and provide expert support for decision-makers even if it loses connections to mission cloud. Example: Finnish infantry company
  3. Mission computing – computing network for a mission is based on fixed military data centres within national borders and deployed nodes in the area of operation. This private military Cloud is the backbone for data management in all military operational actions. Example: NATO Federated Mission Network
  4. Hybrid computing – a computing network that combines onsite military data centres and public, global cloud service providers' infrastructure to a hybrid cloud infrastructure where military applications can support both military entities and their partners and vendors. Examples: US DoD JEDI hosting both NIPRNET and SIPRNET

Security and survivability

Communications security includes crypto security [i.e., encryption or decryption], transmission security, emission security [i.e., intercept and analysis of emanations from equipment], and physical security of COMSEC material.
Figure: Example of security applications on different OSI layers

The physical layer defines the physical connection between a computer and a network. Physical layer security is the cornerstone of all security controls. While security controls at other layers may fail without catastrophic results, the loss of physical security usually results in total exposure. In addition to physical security, transmission security is implemented on the physical layer. The physical layer implements, for example, frequency hopping (FH), spread Spectrum (SST), Automatic Power Control (APC)

The Datalink layer defines the protocol that computers must follow to access the network for transmitting and receiving messages.  The data link layer implements Authentication, Key management, Encryption.
  • Why is Data Link layer security not enough? The reason is that Data Link encryption will change hop-by-hop in the network. Each layer three device adds their own layer two header to the data packets when transferring them to the other hop. Therefore, sole encryption on the Data Link layer would not be a safe solution. To fill these security issues, we need to use different technologies like IP-Sec (at Network Layer) which dedicates a private tunnel between the sending and receiving machines.

The Network Layer defines how the small packets of data are routed and relayed between end systems on the same network or interconnected networks. At this layer, message routing, error detection, and control of node data traffic are managed. Network layer security controls have been used Frequently for securing communications, especially over shared networks such as the Internet because they can protect many applications at once without modifying them. The network layer implements confidentiality, authentication and data integrity, key management, encryption. IPsec is implemented at the network layer.

2020-08-04

MILITARY HISTORY OF TACTICS FOR JUNIOR OFFICERS V - Command and Control

This a fifth part in series of articles reflecting some ideas on history of military tactics. The series will consider the following viewpoints to tactical history:
  1. Introduction to military history at tactical level
  2. Generations of warfare
  3. Tactical tenets and principles through the history
  4. Winning wars amongst people with the people
  5. Tactical level Command and Control in military history
  6. Contemporary warfare
  7. Future of combat reflected from the history
The aim of this series is to analyse the history and reflect some lessons from it for the junior officers preparing for today's conflicts. 

5. Command and Control in Military History


5.1 Leadership examples

Successful military leaders in history have been varied in their personalities, competencies, and physical presence. 


Military leader

Personality

Competency

Presence

Achievements

Mao Zedong

1893 - 1976


Mao during Long March (1934-35) with his closest second in commands

Peasant by heart preferred simple life, disarmingly humorous, liked stories from history, and did not lose his sleep over the numerous Chinese losses.[1]

Compiled a revolutionary guerrilla warfare from Sun Tzu and other historical sources. Successfully established the Red Army, kept it together through harsh times, proliferated the ideology and eventually won his adversary. (Tse-tung, On Guerrilla warfare, Translated by Samuel B. Griffith, 2007)


During II Sino-Japanese war (1937 – 1945) his Red Army countered the Japanese manning and 1949 defeated the nationalist government forces who withdrew to Taiwan.

George S. Patton

1885 - 1945

Patton in Sicily 1943

Olympic level Pentathlon. Executed a philosophy of leading from the front. He used to inspire troops with attention-getting, vulgarity-ridden speeches.

His behaviour was met favourably by his troops, but much less so by a sharply divided Allied high command.

Sultan of Morocco in other hand expressed: “The lions in their dens tremble at his approach.”

Studied widely the writings of Guderian and Rommel, executed mass-exercises for armoured troops 1940. He improved the command cycle of his troops and improved their manoeuvrability. He was keen keeping the continuous engagement with enemy.

"Whenever you slow anything down, you waste human lives."

“No bastard ever won a war by dying for his country.

He won it by making the other poor dumb bastard die for his country.”

“An army is a team. It lives, eats, sleeps, fights as a team.

This individuality stuff is a bunch of bullshit.”[2]

Commanded the Western Task Force in North African Campaign, Commanded the 7th US Army in Sicily Campaign, and led 3rd Army in Normandy breakout offensive and Battle of the Bulge.

Edwin Rommel

1981 - 1944

Rommel with his staff 1942 near El Agheila

He found that taking initiative and not allowing the enemy forces to regroup led to victory.

He took advantage of sandstorms and the dark of night to conceal the movement of his forces.

He was aggressive and often directed battle from the front or piloted a reconnaissance aircraft over the lines to get a view of the situation.

Preferred self-destructive Spartan lifestyle that made life harder for his staff.

Improver of infiltration tactics (Rommel, 1979), armoured tactics and desert warfare (Rommel, The Rommel papers, Edited by Liddell-Hart, Basil, 1953).

"the Desert Fox"

"war without hate"

“He personally grabbed a light machine gun to fight off a French counterattack supported by tanks, and went into the water himself, encouraging the sappers and helping lash together the pontoons”

Rommel felt a commander should be physically more robust than the troops he led and should always show them an example.

Used heavy doses of Pervitin to keep up with the pace of war.

Decorated battalion commander in WW I, Commanded 7th Panzer Division in attack to France, and led the Deutsches Afrika Korps 1941 - 1943

Mustafa Kemal Ataturk

1881 - 1938

Ataturk with other officers in Gallipoli 1915 

He loved reading books, listening to music, dancing, horseback riding and swimming. In his free times, he read books about history.

"When I was a child, I was poor. When I received two pennies, I would give one penny of it to the book. If it was not so, I would not have done any of this."[3]

He was always at the front-line wheeling guns, sending his troops to battles which they had little chance of surviving.

Got nickname Kemal (perfection) because of his excellent conduct of studies in military academy.[4]

Wrote 9 books, the latest 1937 for high school math.

“The need for any person to be satisfied and happy to live is to work not for himself but for the future. An insightful man can only act this way.”[5]

He worked tirelessly in all assignments entrusted to him.

As a result, he served successfully in every chain of command, operation and defensive battle assigned to him.[6]

In the Battle of Gallipoli, he became the front-line commander after correctly anticipating where the Allies would attack and held his position until they retreated.

He rallied his troops and mounted a counteroffensive capturing two cities back from Russians.

Defended Ottoman interests in Palestinian against British forces and never suffered a defeat.

In Turkish war of independence 1919 – 1923, he stopped Greek invasion and defeated them.[7]

_________________________________________________________

Nevertheless, they have all mitigated the three leadership challenges in battlefield: fog of war, biased decision making, and friction of war.

Challenges for military leader

Definition

Examples/Lessons

Fog of war

[1]

The term Fog of War (Nebel des Krieges, Clausewitz) seeks to capture the uncertainty regarding one's own capability, adversary capability, and adversary intent during an engagement, operation, or campaign. Military forces try to reduce the fog of war through military intelligence and friendly force tracking systems.[2]

The term also applies to the experience of individual soldiers in battle: often cited is the pure confusion of direction, location, and perspective on a battlefield. Officers and soldiers become separated, orders become confused and subject to revision with poor communication. Sounds and vision are limited from the perspective of the individual and may not be easily resolved, resulting in a continuing uncertainty, a perceptual "fog".

"On the future battlefield, if you stay in one place longer than two or three hours, you will be dead”.[3]

 

AI in battlefield may increase the fog of war:

1.      New technologies tend to make life harder for individuals, even as they add capability.

2.      AI introduces new kinds of battlefield cognition.

3.      Combining AI, hypersonic weapons, and directed energy will accelerate decision-making to machine speeds.

4.      AI enables military deception of both a new quality and quantity.

The problem is that our brain fills the missing information

that is not available; it is like connecting the points in a

game, as if we were trying to find an image by completing

the outline. The human mind continuously tries to establish

patterns of rationality, identify similarities and reach

conclusions, even if it is based on fragments. (Caninas, 2007)

 

“Observers fear that top-ranking commanders far removed from the battle will horn in to make split-second decisions that should be made by those "smelling the gunpowder." Micromanagement is indeed an intangible modern drawback of real-time imagery capabilities, which certainly can add to today’s fog and friction.

 

Cyberwar tactics, technologies, and capabilities that transcend the traditional battlespace and into the global atmosphere also give a new meaning to “armed” conflict, creating an entirely new and uncharted dimension of fog and friction. The limits of our power and control in cyberspace, along with the ambiguities of the attackers and their objectives, further add to the uncertainties. [4]

Biased or slow decision making[5] [6]

Decision-making is the process of identifying and choosing alternatives based on the values, preferences, and beliefs of the decision-maker. Every decision-making process produces a final choice, which may or may not prompt action.

 

Highly cohesive groups with strongly connected members may inhibit the expression of (true) opinion; in such cases, group harmony and unanimity may be privileged over effective decision-making.

 

Group situations may reduce the motivation, level of effort and skills employed in problem-solving compared with those that an individual would deploy when working alone

 

Humans cannot process all information necessary to make informed decisions. Therefore, they rely on heuristics to “bound rationality”.[7]

 

Cognitive tunnel vision: In operational planning process, mission Analysis phase is first, and sets all hypotheses. Analysts and planners then bias themselves towards maintaining courses of action rather than re-evaluate analysis.

 

Human and Machine decision making in war: “When a human player withdrew forces to de-escalate, machines were likely to perceive a tactical advantage to be pursued; when a human player moved forces forward in an obvious (but not hostile) show of determination, machines tended to perceive an imminent threat and engaged.” (Hughes, 2020)

“Flying a fighter aircraft used to be an all-consuming task. As the aircraft became easier to fly, operating additional sensors (radar) and weapons (missiles) added to the cognitive load. As these sensor interfaces became more intuitive, systems became more complex (guided weapons, stealth and electronic attack). At each stage, expectations for individual performance increased even as technological improvements made previously difficult tasks more manageable.” (Hughes, 2020)

 

In Iraq 2004, the reality outpaced the decision making of US troops. “In the time it took us to move a plan from creation to approval, the battlefield for which the plan had been devised would have changed.” “We could not predict where the enemy would strike, and we could not respond fast enough when they did.” (McChrystal, Collins, Silverman, & Fussel, 2015)

Friction of war[8] [9]

Everything in war is very simple, but the simplest thing is difficult. The difficulties accumulate in the end and produce a kind of friction in all military action. (Clausewitz, 1984)

The troublesome friction is rooted in the struggle to agree on the nature of Cyber Warfare, who the key players are, and how we counter the threat.  The result is the inability to develop governing doctrine, policies, and laws on cyberwar.  Cyberwar is not just a government problem, as the threat extends to the corporate/private sector.[10]

During the Desert Storm operation: “Aircrews had to cope with equipment malfunctions, inadequate mission-planning materials, lapses in intelligence on both targets and enemy defenses, coordination problems between strike and support aircraft, target and time-on-target (TOT) changes after takeoff, unanticipated changes in prewar tactics, adverse weather, the traditional lack of timely bomb damage assessment (BDA), and, in many wings, minimal understanding of what higher headquarters was trying to accomplish from one day to the next.” [11]

_______________________________________________________

5.2 Recovery from Surprise

“Detect your adversary’s strengths and weaknesses, understand how to take him by surprise, know well the scale of his rhythm along with the rhythm of his space and time intervals, and take the initiative.”  (Musashi, 2012)

One may deceive an enemy in two ways:
1. Conceal one’s ability to trick the enemy into underestimating the real strength of the side like:
            a. Soviet Union concealed the dominant T-34 tank from the German Wehrmacht 
                until 1941
            b. Egyptian force surprised Israeli armoured troops with their SAGGER anti-tank 
                missiles 1973
            c. Taliban in Afghanistan had reconnaissance distributed among the local who 
                informed them about the preparations of the ISAF patrols. Therefore, the Taliban
                were able to plant booby-traps on route or prepared an ambush. (Hermez, 2017
2. Enhance one’s ability by selective exposure of equipment and competencies to create deterrence
            a. Reagan’s Strategic Defence Initiative or ‘Star Wars’ convinced Soviet Union leaders 
                1983 of a breach in Mutually Assured Destruction (MAD) by detecting and 
                destroying the incoming Soviet ballistic missiles before they hit their targets.
            b. China exposed DF-17 missile in National Day military parade 2019. The design of 
                the missile may indicate that it is hypersonically operated by scramjet and stealth. 
                (Xuanzun, 2020)

Sun Tzu says: “War is very complicated and confusing. The battle is chaotic.” (Gagliardi, 2005) 
Prepare yourself to recover from surprise with the following examples (Finkel, 2011):

Historical examples

Features of Flexibility

Surprise: During the II WW Germans deployed two-layer radar sensors to detect British bombers: A broad surveillance radar that detected incoming fleets and targeting radar that homed in the German fighters. In 1943, the British used chaff to conceal their bombers, which zeroed the effectiveness of German fighter defence.

Recovery: Germans reacted in three ways:

1.      Radar using frequencies that were able to penetrate through the chaff

 

2.      Change the mounting of the guns, so interceptors were able to attack bombers beneath

 

3.      Within three weeks Luftwaffe deployed day-light fighters above the cities and flying higher than enemy bombers were able to hit them when illuminated by anti-aircraft projectors.

 

 

 

 

Relatively long wave radar was installed in night-fighters gave them a view from 6 kilometres high. This was possible with close cooperation between Luftwaffe and war industry.

 

Being technically versatile, Germans attached 20 mm gun on top of their fighters and attacked bombers below, their blind spot.

Luftwaffe was able to plan and deploy a quick change in their air defence tactics because of their cognitive flexibility.

In 1973 war Egypt was using Soviet SAGGER anti-tank missiles massively in their defence formations. Based on their Six-Day War experience, IDF doctrine included tanks only formations and deep attacks penetrating the enemy formations. When Egypt fired 3-5 SAGGERs to each IDF tank, their crew was unable to understand what had hit them.

At the tactical level, IDF was able to react quickly because their junior officers had the initiative and the training of crew on the battlefield was continuous:

1.      Tank commanders learned the effective range of the missile and kept manoeuvring while inside their range.

2.      Within three days, the tank units learned to deploy observation patrols to identify anti-tank squads and warn tanks when they fire

3.      Infantry was combined with armoured troops, and they took out the anti-tank squads supported by artillery fire.

The Soviet Union invaded Afghanistan late 1979[1] with troops trained for high-intensive combat in large formations against European or Chinese forces[2]. They entered Afghanistan on a large scale (40.Army with > 100 000 soldiers) operation with divisions landing airborne troops, capturing strategic facilities, and mowing along main roads.[3] Mujahideen, on the other hand, deployed small fighting cells, avoided engaging the fighting forces but ambushed Red Army’s supply convoys and small outposts to gain a local tactical advantage.[4]

Red Army doctrine emphasised the operational level action creating flexibility at that level but left the tactical level with rigidity and predictability.[5] For example, an infantry soldier was not to fight further than 200 m from his vehicle. It took the Red Army more than five years to establish counter-guerrilla tactics and train their troops.[6] Mechanised troops remained in defence, and special infantry troops[7] with combined arms (Spetsnaz supported by Mi-24 and heavier troops as fire support) were deploying raids, blocks and searches, ambushes, and convoy escorts against Mujahideen tactics. Unfortunately, the Soviets were not able to change their centralised command culture, which inhibited the initiative and emphasised the detailed planning.

Around 2004, the special operations force in Iraq were engaged in the highest performing, centralised commanded operation in their history; they won all fights but were losing the war. General McChrystal[8] took over the command of JSOC 2003 and transformed the hierarchical, centrally commanded task force into a team of teams, mission command[9] organisation.[10]

It took four years from a Force Commander (McChrystal, Collins, Silverman, & Fussel, 2015) to break the tradition of 20 years of training and transfer his Task Force into initiative teams[11] that were learning, planning and executing their missions in relationship with the other teams.[12]

5.3 Failures of Command

“This difficulty of seeing things correctly, which is one of the greatest sources of friction in war, makes things appear quite different from what was expected.” (Clausewitz, 1984)

“In a war from which so much of human error had been eliminated by technological advances alone, human error was still the principal factor in determining the war’s outcome.”  (Strawson, 1971)

The commander should be aware of his own and troops biases in behaviour, decision making and morale. Observe the following examples from different failures of military leadership.

Failures

Possible reasons

Lessons

In late 2008[1], ten Lashkar-e-Taiba terrorists launched 12 coordinated attacks in Mumbai, killing over 190 and wounding more than 300 people.[2] In the aftermath, the Mumbai authorities seemed to react improvised and uncoordinated therefore being slow in their counteraction and causing more casualties.

a.      Lack of coordination of forces as the commissioner adopted a more tactical role in one of the scenes and was without a full awareness of the situation.

b.      Specialised units were distributed to each unit, so there was no focused effort.

c.      No de-briefing sessions were held to assess what went wrong.[3]

·        Unity of command is essential to create situational awareness unless one has an overarching battle management system

·        Human tends to micro-manage in stressful situations. This creates a crowd of commandership and confusion at a tactical level.

·        Hierarchical organisations may have difficulties to learn from their failures.

In 2003, the US-led coalition invaded Iraq without goals beyond ending Saddam’s support to terrorism and free the Iraqi people.[4] During the post-war occupation, the US made mistakes in disbanding Iraq Army, outlaw the local elections and denying the Ba’ath party. This opened insurgents access to population and gaining power-base. Coalition troops could control area only when physically present and they were too few to extend their presence beyond main streets and day-light.

a.      Without local authorities, people were at the mercy of insurgents since Coalition presence was only partial and authority deniable.

b.      Counterinsurgent is a visitor and working against the clock. There is no continuity for the local population to build their future, but the one that insurgent promotes. (Nagl, 2014)

·        The counterinsurgent has to defend everywhere, all the time, while the insurgent can choose his target and his time, always slipping away from the fight if the conditions are not favourable.

·        Insurgent is winning if he is not losing. The counterinsurgent is losing if he is not winning.

In 1968, Lt. Calley led his Platoon to the village of My Lai in Vietnam with a task to search Vietcong. They did not find any insurgents, but they engaged in raping, mutilating, and slaughtering all 347 occupants of the village.[5] This ended isolating the South Vietnamese people even further from their government and US troops.

a.      There has been a legacy of occupying force to kill civilians based on suspected support to insurgents.

b.      The morale of US troops in Vietnam was low, and they had to be rotated frequently to control the infection of low culture.

c.      Lt. Calley “a below-average, dull and inconspicuous boy” was commissioned in lack of better officer candidates. (Regan, 2017)

·        The violence of war makes people effected even more violent or indifferent to violence.

·        The morale of troops is profound when fighting takes place among people.

After the overrun of the US Embassy in Teheran 1979, US launched “Eagle Claw” [6]operation to rescue the hostages inspired by IDF attack in Entebbe.[7] The operation included the following phases:

a.      Assemble a force in Gulf unnoticed

b.      Infiltrate the force into Iran secretly

c.      Fly a thousand kilometres in enemy airspace undetected

d.      Land unnoticed near a city of three million people

e.      Locate and free the hostages spread into the city

f.       Escape through the streets of a hostile city

g.      Arrange the pickup by helicopters

h.      Fly back through the enemy airspace.

Meanwhile, not inflict any casualties among Iranian people.

a.      Political needs and constraints may have forced the military to will more than assess the success of the operation.

b.      A long series of tasks required for a successful mission would have required more parallel courses of action.

c.      Intelligence based on facts was bypassed with hopeful assumptions. (Regan, 2017)

·        War is so complex and chaotic that only the most straightforward plans may have success.

·        Use “what-if” during the planning and create parallel courses of action, so you are ready when the unexpected happens.

In the Falklands War of[8] 1982[9], the media required continuous information to keep up the spirit of the UK population. [10]Therefore, MoD provided a flow of press releases to media. One of these releases was drafted as“… two unexploded bombs on one warship have been successfully defused…” If this would have been published, the Argentinian Air Force may have learned that they were bombing with low-level attacks which did not give enough time for the fuses to arm themselves.[11]

a.      Need to manipulate the cognitive level of operation sometimes may harm the physical level and wise versa.[12]

b.      Strategic level needs may sometimes overtake the tactical essentials. (Regan, 2017)

·        Every combat is wielded at three levels: physical, information and cognitive. Action at one level may inhibit operations at another level.

·        One should monitor adversary’s home front and their media to gain impressions of their cognitive goals.

·        The motivation of soldiers and their families sometimes is essential to build and sustain the morale of fighting troops.

Montgomery desired to capture the whole show not only harmed the Anglo-American relations but also caused the costly and abortive Arnhem adventure during the Market Garden operation 1944.[13] Three airborne divisions were dropped into the Netherlands to seize key territory. Unfortunately, the ground forces were not able to reach them in time.[14]

a.      The leader’s personality and personal ambitions sometimes take over more rational decision making.

b.      Competition between colleagues and with superiors made otherwise cautious commander make daring plans. (Regan, 2017)

·        The human relationships are still one of the primary sources for mistakes since they may cause unrealistic endeavours or denial of the facts.