Andrew F. Krepinevich - The Origins of Victory - How Disruptive Military Innovation Determines The Fates of Great Powers-Yale University Press (2023)
Andrew F. Krepinevich - The Origins of Victory - How Disruptive Military Innovation Determines The Fates of Great Powers-Yale University Press (2023)
A N D R E W F.
KREPINEVICH, JR.
10 9 8 7 6 5 4 3 2 1
For Julia
My One and Only
With regard to estimating military power there seem to
be only problems and very few, well-accepted adequate
methods of making such estimates. There are conceptual
problems in defining appropriate measures of military
power, and many practical problems in carrying out even
those partial formulations that seem appropriate. Indeed
there are so many problems and difficulties that I can
touch on only a few of them.
—andrew w. marshall
Contents
Acknowledgments ix
List of Abbreviations xiii
part i
Introduction 3
1. Come the Revolution 7
2. The Shape of Things to Come 21
3. The Mature Precision-Warfare Regime 43
4. Disruptive Technologies: Catching the Wave 85
5. W(h)ither Deterrence? 141
part ii
Introduction 163
6. Fisher’s Scheme 166
7. Out of the Trenches 254
8. Twilight of the Battle Line 296
9. From Mass to Precision 342
10. Echoes of History 400
11. Where Do We Stand? 429
Notes 445
Index 521
This page intentionally left blank
Acknowledgments
ix
x Acknowledgments
xiii
xiv Abbreviations
T
here is a disruptive shift under way in the character of
warfare, sometimes referred to as a military revolution. Simi-
lar revolutions have occurred before, but rapid advances in a
wide range of technologies over the past two centuries have
increased their frequency. As the term suggests, militaries that identify
and exploit these periods of disruptive change realize quantum leaps in ef-
fectiveness that can result in a major shift in the balance of power, with all
its attendant consequences for the security and prosperity of their nations.
The most recent military revolution, the Precision-Warfare Revolu-
tion, finds battle networks directing and coordinating extended-range
scouting and strike forces—functioning together in what Russian military
theorists call a “reconnaissance-strike complex.” This revolution was intro-
duced in nascent form by the U.S. military in the First Gulf War. Following
the collapse of the Soviet Union, for roughly two decades the Americans
stood alone in their ability to wage precision warfare. Now, however, the
precision-warfare regime is reaching its mature stage. Other military pow-
ers, China especially, have acquired most of the capabilities that enabled the
U.S. military’s dominance. For the Americans, it’s a whole new ballgame.
In at least one respect, the new era of great-power rivalry finds the
U.S. military at a disadvantage, as it has spent the better part of three de-
cades perfecting ways of waging war against minor powers such as Iraq
and terrorist groups such as al-Qaeda. Meanwhile, the Chinese and Rus-
sian militaries have invested that time figuring out how to wage war
against the U.S. military. In particular, they have focused on defeating
the U.S. military’s ability to project power. This has primarily taken the
3
4 Part 1
A Military-Technical Revolution?
Soviet thinking about a coming military revolution attracted the atten-
tion of Andrew Marshall, one of the United States’ leading defense strat-
egists. Known by many in defense circles as “Yoda” owing to his stoic
character, sphinxlike demeanor, and legendary ability to spot key trends
in the military competition, Marshall headed the Pentagon’s innocuously
named Office of Net Assessment, reporting directly to the secretary of
defense. In December 1990, shortly before the onset of the First Gulf
War, Marshall decided the time was right to undertake an appraisal of
Russian views on a coming transformation in warfare and assigned me
the task of producing the assessment.8
Marshall noted that neither we nor the Soviets had fought a major
conventional war since the Korean conflict, nearly forty years earlier.
Therefore, the coming war with Iraq, whose military was equipped pri-
marily with Russian weaponry, might provide clues as to whether the Rus-
sians’ ideas about a “military-technical revolution” were correct. He
instructed me to focus the assessment on four questions: First, did we
agree with the Russians that a major change in war’s character was in
progress? Second, if we concurred that the Russians were on to some-
thing, what could we say about warfare’s new defining characteristics?
Third, if we concluded the Russians were right, how could we best posi-
tion ourselves to compete effectively? Finally, if, however, we thought the
Russians were wrong, how could we encourage them to pursue their
flawed ideas to their ultimate dead end, while also hedging against the
possibility that we would prove mistaken? Marshall said that an assessment
with answers to these questions would be of interest to the Pentagon’s
12 Part 1
incorrect. If an object is moving at a speed of less than 100 miles per sec-
ond, then the mass is constant to within one part in a million. As
Feynman notes, “For ordinary speeds we can certainly forget it [the true
law] and use the simple constant-mass law as a good approximation. But
for high speeds we are wrong, and the higher the speed, the more wrong
we are.” Finally, Feynman notes that even though “approximate laws”
work for nearly all everyday sorts of problems, “philosophically we are com-
pletely wrong.”17 He states the problem in general terms: “Each piece, or
part, of the whole of nature is always merely an approximation to the
complete truth, or the complete truth so far as we know it. In fact, every-
thing we know is only some kind of approximation, because we know we
do not know all the laws as yet. Therefore, things must be learned only to
be unlearned again or, more likely, to be corrected.”18
To arrive at a “true law” that holds in defining military revolutions
one would have to have complete information on every case of disruptive
military innovation, while acknowledging that at some point further re-
search might identify a way in which an “outlier” case may be made to fit
the general definition.19
The business profession in free-market economies encounters simi-
lar problems when it comes to defining a discontinuous, or disruptive,
shift in the competitive environment. For example, in the mid-1990s, Jo-
seph Bower and Clayton Christensen presented a pathbreaking study ad-
dressing the challenge corporate decision-makers face in attempting to
effect disruptive innovation. They wrote, “One of the most consistent
patterns in business is the failure of leading companies to stay at the top
of their industries when technologies or markets change.”20 Bower and
Christensen did not provide a comprehensive definition (let alone a the-
ory) for what constitutes “disruptive change” but defined “sustaining”
and “disruptive” technologies. Sustaining technologies, they posited,
“tend to maintain a rate of improvement; that is, they give customers
something more or better in the attributes they already value.” “Disrup-
tive” technologies “introduce a very different package of attributes from
the one mainstream customers historically value.”21
In The Innovator’s Dilemma, Christensen maintained these descrip-
tions of sustaining and disruptive technologies.22 These do not, however,
represent a comprehensive, unified theory or definition of what consti-
tutes disruptive versus sustaining change in the corporate sector. Yet
Christensen’s ideas and the case studies he employed proved of great
value to many corporate and government leaders. Similar policy-relevant
16 Part 1
work has been done in the general field of sustaining and disruptive mili-
tary innovation, despite the absence of a comprehensive theory.23
The concept of a “military revolution” was introduced by Michael
Roberts in 1955 in a lecture at Queens College. Roberts focused his at-
tention on Europe between 1560 and 1660, noting that the size of armies
during this period increased by an order of magnitude. Rogers had the
advantage of limiting his focus to describing only the events of that time
as a “military revolution” and thus did not need to bother himself with a
definition that would describe all such phenomena. He did, however,
argue that “major revolutions in military techniques . . . [include] the
coming of the mounted warrior, and of the sword” in ancient times, as
well as “the triumph of the heavy cavalryman, consolidated by the adop-
tion of the stirrup” in the sixth century A.D., along with “the scientific
revolution in warfare in our own day.”24
The so-called Artillery Revolution of the late fifteenth century also
achieved order-of-magnitude improvements in military effectiveness, at
least in one aspect. According to one observer, “great towns, which once
would have held out for a year against all foes but hunger, now fell
within a month.”25 Rogers’s thesis produced a spirited debate that contin-
ues over what constitutes a military revolution, including whether the
period he referenced was “revolutionary” at all. Geoffrey Parker, for ex-
ample, focuses on the period 1500 to 1750 in arguing that “the key to
Westerners’ [the Europeans’] success in creating the first truly global
empires . . . depended upon precisely those improvements in the ability
to wage war which have been termed ‘the military revolution.’ ”26
Jeremy Black also contested Roberts’s argument, declaring that the
period from 1660 through the Napoleonic Wars was considerably more
important with regard to the transformation of warfare.27 In critiquing
Roberts’s perspective, Parker conceded that the task of providing a com-
prehensive definition of what constitutes a military revolution remains to
be accomplished, while nevertheless asserting that during the course of
the three centuries addressed in his book, “a major transformation in Eu-
ropean military and naval power had taken place, a transformation so
profound that it must surely rank as a ‘revolution.’ ”28
Given the challenges found in both the hard and soft sciences in ar-
riving at comprehensive theories and definitions, or laws, that support
them, it appears the best we can do is to present a definition or descrip-
tion of what constitutes a military revolution, hoping that it will be
improved on over time. This book’s primary purpose, however, is to
Come the Revolution 17
United States but lacked the means. Major powers such as Britain, France,
Germany, and Japan had the means but lacked a compelling motive for
challenging U.S. military dominance. Thus, the threats to the United
States’ security were comparatively modest, emanating primarily from
minor powers like Iran, Iraq, and North Korea and insurgent and terrorist
groups. Of course, Washington could not ignore the potential danger
posed by the nuclear arsenals of China and (especially) Russia, but these
powers had yet to openly challenge the U.S.-led international order.
Absent a serious challenge to its dominant position, the U.S. military
saw no compelling need to anticipate and adapt to the challenges it
would confront in a mature precision-warfare regime. Moreover, the de-
clining U.S. defense budgets—the “peace dividend”—that followed the
Soviet Union’s collapse in late 1991 and the corresponding drawdown of
the U.S. military found Pentagon leaders preoccupied with moving to a
smaller force, which they argued must be given priority before attempt-
ing any major innovations. U.S. political leaders, hoping to frame a
world order rooted in collective security rather than balance-of-power
politics, offered few incentives for the military to innovate.
The Balkan War of 1998 confirmed the views of many U.S. military
leaders who argued, “If it isn’t broken, why fix it?” The war revealed that
the Europeans, far from attempting to keep up with their U.S. ally, were
falling further behind. Among other capabilities, the Americans provided
their NATO allies with precision-guided munitions, aerial refueling, and
scouting support. Meanwhile, Russia, still working its way out of the eco-
nomic wreckage wrought by seventy years of communist rule, fielded a
military that was a pale shadow of its Cold War self. China, smarting
from the U.S. Navy’s show of force off its shores during the 1996 ten-
sions over Taiwan, was only beginning to show signs of becoming a
major military power.
Although the post–Cold War period of U.S. military dominance ex-
tended far beyond historical norms, it would not last forever. Things
began to change in the early 2000s. Following the terrorist attacks in
New York and Washington, D.C., in September 2001, the U.S. military
focused on waging war against radical Islamist extremist groups and,
after the invasions of Afghanistan and Iraq, countering insurgent move-
ments as well.
Moreover, many of the U.S. military’s high-technology systems touted
by their service advocates as revolutionary or “transformational”—such
as the Army’s Future Combat System, the Air Force’s airborne laser, the
Come the Revolution 19
God is not on the side of the big battalions, but on the side of
those who shoot best.
—voltaire
21
22 Part 1
Since the dawn of the industrial age, we’ve seen great advances in
military capabilities, including increases in the speed and range of sys-
tems and communications, in scouting and counter-scouting capabilities,
in protective armor, and in massed and precision fires. The world has
also witnessed a remarkable growth in the domains in which warfare is
waged. This chapter examines these phenomena with emphasis on four
periods of disruptive military change since the mid-nineteenth century:
the Railroad, Rifle, and Telegraph Revolution, the Fisher Revolution in
the maritime domain, the Interwar (Mechanization, Aviation, and Radar)
Revolution, and the Precision-Warfare Revolution. The objective is to
identify trends to help strip away some of the uncertainty regarding
where militaries should place their “big bets” when it comes to investing
to develop new sources of competitive advantage.
To begin, some defining of terms is in order. By “armor,” I mean a
metallic sheathing or protective covering, especially metal plates, used on
warships, combat vehicles, airplanes, and fortifications that provides
physical protection against fires. Weapons’ fires are broken down into
three categories: range, accuracy, and volume. A weapon’s “accuracy” is
its circular error probable (CEP). Think of a circle whose target is at its
center. A CEP is the radius of a circle within which half of a missile’s
projectiles are expected to fall. A weapon with a CEP of 500 feet will find
half of those weapons landing within 500 feet of the target and the other
half landing farther away. A weapon has range, defined in terms of dis-
tance, such as in miles or kilometers. Finally, fires can also be assessed in
terms of their volume—the kinetic capacity to destroy or neutralize
human or material targets—that they can produce in a given period of
time. In this study, the term “firepower” is used interchangeably with
volume fires. “Speed” is simply distance traveled in a unit of time, such as
miles per hour. By “scouting,” I mean the use of intelligence, surveil-
lance, and reconnaissance (ISR) to ascertain knowledge of the enemy.
“Counter-scouting” refers to the actions taken to defeat scouting.
could generate volume fires at a much high level than ever before. That
being said, troops attempting to advance across that deadly space be-
tween the trenches in World War I suffered the same failures that Union
troops had in assaulting the Confederate trenches at Petersburg—before
the great gains in firepower.
As Sir Michael Howard observed, “Long before 1914, then, it was
accepted by all the states of Europe that the military effectiveness on
which they relied to preserve their relative power and status depended
. . . on a combination of the manpower of the population and a strategi-
cally appropriate railway network.”16 Simply put, the railroads enabled
the concentration of large armies that, lacking in tactical mobility, con-
tinued to seek an advantage where technology permitted—in firepower
and in extending the range of fires. Thus, by the time of the Great War,
it was generally agreed that “the attack could succeed only by developing
a greater intensity of fire than the defence.”17
Still, the war offered glimpses of what was to come. In the electro-
magnetic domain, the telegraph had been supplemented by wireless
(radio) communications, but it had yet to mature.18 Primitive tanks ap-
peared, enabling troops to vacate their trenches and cross no-man’s-land
with a modest enhancement in speed and armor protection. Aircraft
could scout over vast areas relative to horse cavalry and proved valuable
in adjusting artillery fires. It was a combination of these nascent capabili-
ties, with their emphasis on speed and range, that, when combined with
innovative German tactics that appeared late in the war, would displace
the Railroad, Rifle, and Telegraph Revolution and dramatically alter
war’s character.
What mattered most for militaries looking to exploit the Railroad,
Rifle, and Telegraph Revolution’s potential? Napoleon declared in his
time, “Le feu est tout” (Fire[power] is everything).19 With this revolu-
tion, however, the massing of firepower was dependent on the dramatic
increase in the speed of communications and movement of large forces,
which were enabled by the telegraph and railroad, respectively. Without
the railroad, armies would have been much smaller. Without the railroad
and telegraph, elements of these smaller armies would have had more
difficulty concentrating at the right place and time to mass their fires.
Once on the battlefield, armies equipped with rifles and then repeat-
ing rifles enjoyed a major boost in their effective range, accuracy, and
firepower. What mattered most? Would generals have preferred accu-
rate, ranged fires over sheer firepower? The carnage inflicted by troops
28 Part 1
1860s achieved a fourfold increase. By the Great War, the Royal Navy’s
“super-dreadnought” battleships stood at 20,000 tons.22 Early French
and British ironclads were covered with wrought-iron armor several
inches thick. By the mid-1860s, armor increased to nine inches and then
to twenty-four inches—a thickness never surpassed—in the British iron-
clad Inflexible, launched in 1876.23 By the late 1880s, the first steel battle-
ship, Royal Sovereign, was built with eighteen-inch armor. The thickness
of armor plate continued to decline, in part because of advances by firms
like Krupp, which, by the late 1890s, was manufacturing steel armor with
roughly three times the strength of that used in Inflexible.24 Advances in
armor, however, were more than matched by progress in the penetrating
power of shells.
By the early twentieth century, the pace of technological advances
had slowed to the point where capital ships could be designed with the
expectation that they could serve for decades. (Indeed, a substantial num-
ber of battleships and battle cruisers built just before and during the
Great War saw service in World War II.)
4,000 yards. Less than a year later, the German Navy’s G-type torpedo
was running at 6,560 yards at thirty-six knots. The range of British tor-
pedoes doubled from 6,000 yards in 1905 to 12,000 yards in 1909.31
A submarine armed with torpedoes could not compete with a dread-
nought’s firepower. The torpedo’s charge was generally only a few hun-
dred pounds, a small fraction of the weight of a dreadnought’s broadside.
Moreover, a submarine had a much smaller magazine of weapons than a
major surface warship did. The torpedo’s advantage stemmed from the
fact that existing armored warships were far more vulnerable to damage
below the waterline than from a shell fired against a ship’s superstruc-
ture. It was generally accepted that “one shot getting home from a tor-
pedo tube is worth thirty from a gun.”32 Thus, as with surface warships,
the submarine’s emphasis was less on volume fires than ranged and accu-
rate fires. The result was to drive surface warships to emphasize ranged
fires, not greater armor or firepower, in order to stay outside enemy tor-
pedo range.
Even with rifled guns, accuracy diminished as the range of fires in-
creased. This led to increasing emphasis on gunnery to retain as much
accuracy as possible. The British Navy stood at the forefront of these ef-
forts. Beginning in 1898, gunnery exercises were conducted at ranges
from 3,000 to 6,000 yards. By 1904, the British were convinced that ef-
fective gunnery at 8,000 yards was possible.33 They implemented a “di-
rector firing” sighting process, in which big guns of uniform caliber were
placed in parallel alignment, then aimed and fired electronically by a fire
control officer. By 1908, British capital ships were hitting moving targets
exceeding 8,000 yards, a “phenomenal increase in accuracy” when mea-
sured against the abysmal state of gunnery that existed a decade before.34
Nevertheless, as naval engagements during World War I revealed, accu-
rate long-range gunnery remained elusive. Major improvements had to
await the advent of wireless-equipped aircraft spotting, which was not in-
tegrated into the world’s major fleets until after the war.
As with forces operating on land, those in the maritime domain ben-
efited from war’s expansion into the electromagnetic domain. With cable
telegraphy, navies could transmit and receive information to overseas
naval bases within minutes, as long as these bases were linked through a
network.35 The late nineteenth century also saw the introduction of
wireless communication. Unlike the telegraph, “wireless” did not require
cables or wires, only a transmitter and receiver. Enhancements in the
Royal Navy’s global early warning system were made possible by the
32 Part 1
deep into the enemy’s defenses.”38 When it came to armor, the Germans
implicitly accepted the views of their military theorist General von Ei-
mannsberger, who concluded, “The battle between the shell and armor
was lost by armor a long time ago.”39 Early German tanks—Panzers I
through IV—maxed out at twenty-five tons with a seventy-five-millimeter
cannon, but all save the primitive Panzer I had speeds of twenty-five miles
per hour or greater. Later German tanks, the Panther and Tiger, added
armor and firepower—but not at the expense of their speed and range. In-
deed, early in the war, French tanks were in many respects better than
their German counterparts—but very few enjoyed an advantage in range
and speed.
Rather than employing the volume fires that characterized warfare
on the Western Front during the Great War, German mechanized forces
relied on aircraft and motorized artillery to provide supporting fires. To
direct and coordinate their highly mobile forces, the Germans placed ra-
dios in their tanks and aircraft, which they also used for scouting. Al-
though volume fires and armor enhancements were hardly neglected,
when measured against the mature stage of the preceding military revo-
lution in the Great War, the armies that followed the German lead
placed a premium on speed and range relative to firepower and armor.
The revolution in war at sea during the interwar period witnessed
the eclipse of the battleship as the capital ship, displaced by the aircraft
carrier. Relative to the battleship, the carrier emphasized speed, range,
and scouting, while sacrificing firepower and armor. The U.S. Navy’s
carriers even eschewed armor-plated decks in favor of wood and kept
their gun armament to a minimum, in part to maximize their aircraft
complement but also to maximize the carrier’s speed. Although a carrier
air wing had nothing comparable to a modern battleship’s firepower, its
aircraft could greatly outrange the battleship’s guns and could operate at
speeds an order of magnitude greater than the dreadnoughts.40 To suc-
ceed, these aircraft only needed to carry bombs far enough and heavy
enough to sink a battleship, which is what happened in the decade lead-
ing up to the United States’ entry into World War II.41 Thus, only a year
following the carrier-dominated fleet actions at Coral Sea and Midway,
the Americans ceased building battleships.
With respect to scouting, as engagement ranges grew, scouting be-
came more important for the simple reason that the greater the distance
from which an attack could be launched, the more area needed to be
searched to locate the enemy. The aircraft’s speed of attack also meant
The Shape of Things to Come 35
that to maintain sufficient attack warning time, the enemy would need to
be identified at much greater range than was the case with battleship-
centered fleets.
The story on land was generally similar in the air domain. Land-
based aircraft, with their relatively small payloads, could not hope to
match the volume fires of land- and sea-based artillery. Rather, similar to
submarines, aircraft sacrificed armor to enhance their speed and range
and to boost their modest payloads. And as was the case with submarines,
the emphasis on the scouting/counter-scouting competition was strong,
especially in the electromagnetic domain. Both Germany and Great Brit-
ain developed sophisticated, integrated air defense systems (IADS), in-
cluding radar networks, anti-aircraft guns, and interceptor aircraft, all
linked to command centers. New forms of electronic jamming along
with offsetting measures (electronic countermeasures; ECM) and “offsets
to the offsets” (electronic counter-countermeasures; ECCM) were em-
ployed to gain a scouting advantage.
Efforts were made to enhance the accuracy of so-called strategic at-
tacks, but the results were disappointing. In tests, the U.S. Norden bomb-
sight demonstrated a CEP of seventy-five feet. Under combat conditions,
however, it ballooned sixteen-fold, to 1,200 feet.42 As with long-range
naval gunnery accuracy in the Great War, accurate horizontal “strategic”
bombing in World War II remained an aspiration, not a reality. Things
were more encouraging with regard to battlefield operations, where dive-
bombing greatly enhanced air-attack accuracy, as revealed by the impres-
sive performance of German Stuka aircraft and U.S. carrier planes like the
Dauntless. A hint of what was to come was provided by Japan’s kamikazes,
manned guided bombs whose pilots sacrificed themselves to maneuver
their payload to its target. After making their first appearance in the fall of
1944, roughly 2,800 kamikazes sank 34 U.S. Navy ships, damaging 368
others and killing nearly 5,000 American sailors. Despite being detected
by U.S. radar and confronting swarms of fighter-interceptors and a wall of
anti-aircraft fire, one in seven kamikazes hit a ship, and more than 8 per-
cent of these hits resulted in the ship’s sinking.43
Toward the war’s end, Germany introduced ballistic missiles—the
V2s—armed with a modest payload of roughly 1,500 pounds and capable
of covering 200 miles at speeds above 3,500 miles per hour. The missile’s
sheer speed made interception impossible. The Germans fired more than
3,000 V-2s during the war.44 The dawn of the missile age continued the
general trend toward speed and range relative to firepower and armor.
36 Part 1
principal nuclear powers have taken steps to reduce the yield of their nu-
clear weapons and employ innovative designs with an eye toward possi-
bly eliminating the unofficial taboo against their use. The U.S. nuclear
arsenal, for example, saw its firepower shrink by roughly 75 percent be-
tween its peak at roughly 20,000 million tons (megatons) of TNT
around 1960 and the Cold War’s end, due in no small measure to in-
creases in U.S. ballistic missile accuracy. Today it stands at less than 3,000
megatons.50 The number of U.S. and Russian “high-yield” weapons
(those over four and a half megatons) fell from peaks at roughly 2,000
and 800 to around 0 and 50, respectively, in 2000.51
In summary, the Nuclear Revolution represents a fundamental break
from the military revolutions that have occurred since the Industrial
Revolution, providing militaries with almost unlimited firepower. Yet nu-
clear-armed states have established a long tradition of nonuse, even when
at war with enemies lacking these weapons. It cannot, however, be as-
sumed that this tradition will hold. Thus, although the competition for
military advantage has continued unabated since 1945, it does so under a
nuclear shadow.
When laser-guided “smart” bombs were developed in the late 1960s, they
reduced CEPs to under ten feet.53 Combined with stealth aircraft linked
to a nascent battle network during the First Gulf War, precision-guided
munitions yielded over an order of magnitude boost in military effective-
ness. As Brigadier General Buster C. Glosson, the U.S. military’s director
of air campaign plans during the First Gulf War, noted, “One need only
look back to our raids on Schweinfurt, Germany, in World War II to see
how dramatically precision weapons have enhanced our capabilities. . . .
Two raids of 300 B-17 bombers could not achieve with 3,000 bombs what
two F-117s can do with only four.”54 Aircraft loss rates also decreased
dramatically. In a shift almost as dramatic as that from battleships to air-
craft carriers during World War II, after the First Gulf War the U.S. mil
itary’s combat-aircraft designs prioritized stealth with an eye to sustaining
its advantage in the scouting competition. It also prioritized augmenting
the quantity and quality of its PGMs, emphasizing accurate fires over vol-
ume fires.
The Precision-Warfare Revolution also led to efforts to boost the
U.S. military’s speed of action by enhancing its battle networks’ ability to
compress the engagement sequence, the time between which a target is
first identified and when it is engaged. During the First Gulf War, it took
roughly three days to create the Air Tasking Order (ATO), which, gener-
ally speaking, converts information regarding enemy targets into air-
strike orders for U.S. air forces. Eight years later, during the Air Force’s
participation in Operation Allied Force against Serbian forces in Yugo-
slavia, the average time between identifying a target and engaging it was
compressed to between three and four hours. Four years later, during the
Second Gulf War, the U.S. Air Force established a Time-Sensitive Tar-
geting Cell (TSTC), which succeeded in executing some attacks in less
than half an hour from the time the target was spotted.55 Soon drones,
which had earlier been used primarily for scouting purposes, were
armed, thereby fusing the “reconnaissance” and “strike” elements and
compressing the engagement sequence further still.56
The growing emphasis on range and compressing the engagement
sequence also manifested itself through beyond visual range (BVR) air-
to-air combat engagements. In the mid-1960s, an aircraft’s gun range was
roughly 500 meters, while scouting was accomplished by the pilot, whose
eyes provided an effective range of about two nautical miles at roughly
two degrees wide. Air-to-air missiles (AAMs) offered the possibility of en-
gaging targets beyond visual range—if they could be identified.57 With
40 Part 1
the emergence of the U.S. military’s nascent battle network, every coali-
tion air-combat victory in the First Gulf War was achieved with air-to-air
missiles.58 Guns, which accounted for roughly two-thirds of kills in air-
to-air engagements during the late 1960s, dropped to less than 5 percent
of the total between 1990 and 2002. BVR AAMs, on the other hand, reg-
istered no kills in the 1960s but more than half of the air-to-air combat
kills between 1990 and 2002.59 In brief, the Precision-Warfare Revolution
found the United States’ air forces emphasizing accurate, ranged fires. As
in other war-fighting domains, with increased engagement range came a
need to scout over a greater area and to defeat enemy scouting through
stealth and other forms of electronic deception and suppression.
The First Gulf War also revealed the continued decline of armor’s
value in land warfare. Just as battleships had succumbed to air attack, the
First Gulf War confirmed armor’s vulnerability in the absence of effec-
tive air cover. Prior to the onset of ground-combat operations, the U.S.
Air Force used precision-guided munitions to destroy hundreds of Iraqi
armored vehicles.60
Recent efforts to enhance protection by increasing armor have
proved costly and ineffective, even against irregular forces. During the
wars in Afghanistan and Iraq, the U.S. military spent more than $47 bil-
lion to deploy mine-resistant, ambush-protected (MRAP) heavily ar-
mored vehicles to protect its troops from improvised explosive devices
(IEDs)—roadside bombs that can be manufactured at a small fraction of
an MRAP’s cost. The MRAPs’ effectiveness remains a matter of debate.61
In recent years, the U.S. Army, generally considered the world’s pre-
mier land force, has reduced its emphasis on heavily armored forces. Its
current tank, the Abrams, was first fielded more than thirty years ago. In
2019, the Army’s chief of staff, General Mark Milley, indicated that
armor would not be a significant priority in the next tank, unless he
could identify a “holy grail of technologies,” declaring, “If we can dis-
cover a material that is significantly lighter in weight that gives you the
same armor protection, that would be a real significant breakthrough.”62
The U.S. Marine Corps has gone even further, deciding to eliminate its
tank battalions and cut its cannon artillery units by nearly 80 percent in
favor of increasing its extended-range and precision fires, advanced
scouting capabilities, and battle networks.63
In retrospect, the last decades of the twentieth century witnessed the
general trend away from volume fires and armor and toward enhancing the
speed and range of systems, weapons, and networks, as well as accurate,
The Shape of Things to Come 41
ranged fires. The scouting competition has intensified with the U.S. mili-
tary’s fielding of a battle network, made up of, among other things, satel-
lites for precision navigation and timing, and airborne early warning and
command, control, and communications systems.
Are we likely to see these trends continue? To what extent do they point
the way to informing the characteristics of new and disruptive forms of
military competition? Chapters 3 and 4 strongly suggest that these trends
are reflected in the maturing precision-warfare regime and in the technol-
ogies that are driving an emerging, overlapping military revolution.
chapter three
The Mature Precision-Warfare
Regime
You go into the Battle to hit the other fellow in the eye first so that
he can’t see you. Yes! you hit him first, you hit him hard and you
keep on hitting. That’s your safety! You don’t get hit back!
—richard e. simpkin
43
44 Part 1
Anti-Access/Area-Denial
Now that the Precision-Warfare Revolution is reaching its mature stage,
with U.S. military rivals like China and Russia having reduced the gap,
it’s possible to provide a more detailed description of its salient charac-
teristics. The competition, however, is highly dynamic, from both a geo-
political and a military-technical perspective. Thus, the best that can be
offered here is a few frames of a moving picture.
The U.S. military’s striking performance in both Gulf wars, in the
Balkan War of 1999, and in Afghanistan in 2001 made it tempting to
view “precision” warfare as heavily favoring the offense. But these wars
were fought by the world’s sole superpower against minor-power militar-
ies and nonstate entities. Moreover, the U.S. military’s approach to pro-
jecting power against these enemies remained based on a century-old
approach whose effectiveness is coming under ever greater challenge. In
it, forces are initially sent, not directly against the enemy, but to a rela-
tively secure forward location where combat power can be built up prior
to initiating large-scale offensive operations. In World War I, the focal
46 Part 1
point of this effort was France; in World War II, it was Britain in Europe
and Australia in the Pacific. The Cold War saw U.S. forces pre-deployed
to distant bases rimming the Eurasian heartland, prepared to defend
forward immediately in the event of war. During the Korean War, U.S.
bases in Japan were effectively sanctuaries from attack, as were its bases
in places like Guam and Thailand during the Vietnam War. Iraq avoided
attacking U.S. forces even as they built up in the Middle East before
both Gulf wars. This happy state of affairs, however, is unlikely to
endure.
The U.S. military’s dominance in precision warfare could not but
impress the world’s militaries, especially those of the two revisionist great
powers, China and Russia. They have been working out how to counter
this approach to power projection for more than a quarter century and
are achieving impressive results. The U.S. military, meanwhile, has had
an equally long period of time to develop the “bad habits” associated
with operating in what it calls “permissive environments”—those where
enemies lack the means to seriously contest U.S. scouting, network, and
strike operations.
In particular, the growing ability of China’s PLA to scout over wide
areas and strike over long distances with high accuracy is at the core of
its “counter-intervention” strategy. Its purpose is to defeat the U.S. mili-
tary’s approach to projecting and sustaining military power along its pre-
ferred, traditional lines. In China’s and Russia’s efforts to catch up to the
Americans, they initially fielded a defensive form of reconnaissance-
strike complex popularly known as an anti-access/area-denial (A2/AD)
complex. This was anticipated in the initial MTR assessment, which
noted, “Of course, integrating information systems with extended-range
PGMs will also be employed for defensive purposes; for example, in stra-
tegic or theater defense architectures.”5 The follow-on assessment
pointed out that as these A2/AD complexes arose, key U.S. military sys-
tems and facilities would become increasingly vulnerable to attack: “As
this military revolution matures . . . forward bases—those huge, sprawl-
ing complexes that bring to mind such places as Malta, Singapore, Subic
Bay, Clark Air Base, and Dharan—will become liabilities, not precious
assets. . . . Rather than acting as a source of assurance to friends and allies
in the region, these bases will be a source of anxiety. . . . Forward-
deployed naval forces may be able to offset the future liabilities of for-
ward bases, but only partially and probably not for very long, as currently
configured.”6 To date, China’s PLA has fielded the most sophisticated
The Mature Precision-Warfare Regime 47
A2/AD complex. It is designed to deter and, if need be, defeat U.S. mili-
tary intervention in a Chinese-initiated war in the Western Pacific.
China’s “Warfares”
Broadly speaking, the PLA’s vision of modern warfare is seen as a contest
between competing “operational systems.” This is similar to Russian de-
scriptions of reconnaissance-strike complexes and American views on
precision warfare. China’s operational system comprises five subsystems:
the information-confrontation and reconnaissance-intelligence (“reconnais-
sance” or “scouting”) systems; the command and integrated support (or
“battle network”) systems; and the firepower-strike (“strike”) systems.
Within this context, the PLA sees the military competition centering on
deconstructing the enemy’s reconnaissance-strike complexes—what the
Chinese call “systems destruction warfare.”7
A consistent PLA theme is the importance of achieving surprise, en-
abled by deception and speed of action. It is no wonder, therefore, that
the PLA prioritizes gaining an advantage in the air, cyber, electromag-
netic, and space, or “speed,” domains.8 Its 2013 Science of Military Strategy
concludes, “The informatization of war means has provided an unprece-
dented possibility to pick up the operational pace and shorten the war
progress. High speed and fast pace in the time dimension can effectively
compress the enemy’s defense space.”9
In 2015, the PLA introduced the concept of “Winning Informatized
Local Wars,” further stressing the importance of seizing control in the cy-
berspace, space, and electromagnetic domains. The Chinese are investing
accordingly, prioritizing scouting networks, including counter-scouting ca-
pabilities within the context of what they call “informationalized warfare.”10
The PLA believes that controlling the “intangible” domains in which
cyber and electronic warfare (EW) capabilities operate is essential to success
in war. Thus, informationalized warfare emphasizes various forms of elec-
tronic attack, including employing anti-radiation and electromagnetic weap-
ons, as well as jamming and deception, all supported by kinetic strikes, while
defending against similar attacks by the enemy.11 Given the importance the
PLA attaches to the competition in the intangible domains, it comes as no
surprise that winning the space/counter-space competition is also accorded
priority. The 2013 Science of Military Strategy anticipates that future wars will
begin in space and cyberspace, arguing that “seizing command of space and
network dominance will become crucial for obtaining comprehensive supe-
48 Part 1
Civil Fusion (MCF) Development Strategy. The MCF effort covers all
three elements of China’s RSC, exploiting AI to field autonomous com-
mand-and-control (C2) systems to enhance and accelerate ISR data
analysis and fusion to achieve an advantage in the reconnaissance and bat-
tle network competitions, thereby boosting its strike element’s effective-
ness. The CCP began implementing MCF in 2015, emphasizing
leveraging dual-use technologies to enhance PLA efforts in developing
new, innovative operational concepts that boost the speed at which war
is waged.16 Intelligentized warfare is rooted in the PLA’s assessment that
war is transitioning from “system confrontation” to “algorithm confronta-
tion.” Thus, a key competition will emerge centered on establishing
and exploiting an “algorithmic advantage.” Toward this end, the PLA is
developing autonomous unmanned systems in the air, land, sea surface,
and undersea domains capable of fusing its RSC’s scouting and strike
functions.17
The defensive “shield” provided by China’s A2/AD complex can also
be augmented to support Beijing’s hegemonic objectives. Ideally, from
the CCP’s perspective, over time the Western Pacific military balance
would shift so decisively in its favor that Beijing could prevail without
fighting, as countries along China’s periphery lying under the PLA’s A2/
AD shadow would see resistance as futile. Simply put, the Chinese would
much prefer to “Finlandize” the Western Pacific than risk a war to con-
quer it.18 This strategy conforms to the teachings of China’s great mili-
tary theorist Sun-Tzu, who declared that the mark of a great general was
not to win a hundred battles but to win without fighting.
With the rise of the PLA’s A2/AD complex, the U.S. military finds
itself needing to transform its approach to projecting power. Success will
likely require positioning a substantial portion of U.S. forces beyond the
range of China’s thickest A2/AD counter-intervention forces, at least
early in a conflict. The option of deploying forces outside a rival’s A2/AD
complex may be unique to the United States, given its status as an insular
global power. Other advanced militaries located in close proximity to
one another, such as Japan in relation to China, may have no choice but
to position their forces within easy range of the enemy’s main recce-
strike forces. Yet even in the United States’ case, the hefty premium in-
volved in operating from extended range suggests that the U.S. military
will need to find ways to position a major part of its forces forward.
These forces will probably have to rely on some combination of harden-
ing, mobility, and various forms of physical and electronic deception to
50 Part 1
counter enemy scouting and strike operations, along with active counter-
scouting and counter-strike defenses to keep their losses at acceptable
levels. Moreover, given the range at which attacks can be launched and
the speed at which they can be executed, acquiring effective early warn-
ing of an attack may find scouting forces having to search over an ex-
panded area, since a search area increases as the square of the range over
which the attack can be initiated.
A Twenty-First-Century No-Man’s-Land?
What might define the mature precision-warfare regime’s general geo-
graphic contours? Generally speaking, operations can be viewed as oc-
curring in one of three broad areas that are not dissimilar from
traditional zones of conflict, save for their scope and depth. Up until the
twentieth century, these zones generally included a “contested area”
where fleets or armies met and “rear areas,” which were safe havens from
the threat of any significant organized enemy violence.
Beginning with World War II, however, the introduction of aircraft
capable of carrying substantial payloads over long distances left those
rear areas that lacked robust air defenses highly vulnerable to large-scale
attacks. In a contemporary general war between great military powers,
each side’s rear area is defined as being under the friendly force’s princi-
pal A2/AD umbrella and outside that of its rival.
The existence of a rear area assumes, of course, that at least one of
the competing military powers is quite distant from the other and out of
range of most of its adversary’s scouting and strike forces. The United
States provides a case in point. Its geographic position gives it a large
rear area, as even its littorals and continental shelf are (with the excep-
tion of Alaska) remote from its great-power rivals, China and Russia.
The same condition does not hold with respect to the other major mili-
tary powers. As noted, significant portions of China and a large part of
Japan would be within range of a substantial portion of each side’s scout-
ing and strike forces. A similar condition would exist between China and
India and between China and Russia. These overlapping A2/AD com-
plexes could form a kind of twenty-first-century “no-man’s-land” where,
at least in the opening stages of a conflict, both sides will find it relatively
(and perhaps prohibitively) costly to engage in offensive operations.
Unlike the Great War’s no-man’s-land on the Western Front, how-
ever, a contemporary no-man’s-land could be measured not in thousands
The Mature Precision-Warfare Regime 51
especially if they are able to operate in complex terrain, such as cities and
mountainous jungles, when supported by remote fires, could create
“holes” in the enemy’s A2/AD fabric, facilitating offensive maneuver.20
A “New Normal”?
Great-power militaries tasked with projecting power have a strong in-
centive to create a “new normal” where offensive maneuver becomes
possible, even if not to the extent enjoyed by the U.S. military in recent
decades. For starters, aside from the Americans, both the Chinese and
Russians, given their revisionist aims, show a keen interest in projecting
power, particularly in areas bordering their homelands.
What remains to be determined is whether the Precision-Warfare
Revolution’s maturing represents a new normal in the military competi-
tion, as described above. By “new normal,” I mean a regime whose defin-
ing characteristics will endure for an extended period—a couple of
decades or so. If so, the military competition, from a U.S. perspective,
would make projecting power along its “traditional” lines a highly—and
probably prohibitively—costly proposition. In situations where A2/AD
complexes overlap, this may compel militaries, at least early in a conflict,
to emphasize operations in the relatively new competitive domains of
space, cyberspace, and the seabed, where the offense seems likely to hold
an advantage, and perhaps in the air domain as well.21 Here it may be
possible to make significant gains at acceptable cost. Moreover, if, as
Chinese military theorists believe, winning the competition in the space,
cyberspace, and electromagnetic domains is the key to winning the
scouting competition, it may enable the winner to restore offensive ma-
neuver in the “traditional” land and maritime domains.
The balance of this chapter explores how militaries might succeed
in opening up no-man’s-land for offensive operations in the mature pre-
cision-warfare regime. Here it’s important to remember that the situa-
tion as just described is as it exists in peacetime, or at the point prior to
the major powers going to war. Once the war begins, there may be
opportunities to employ existing or emerging forces and capabilities
through innovative war-fighting (or operational) concepts to enable
effective offensive operations.
What might these opportunities be? How can they be exploited? How
might militaries restore freedom of offensive maneuver when engaged in
a contest of dueling reconnaissance-strike complexes? Four general ap-
The Mature Precision-Warfare Regime 53
proaches are presented. They are not exhaustive; nor are they mutually ex-
clusive. Indeed, they are all but certain to be pursued in some combination.
Two focus on neutralizing core elements of the reconnaissance-strike
complex—specifically, the enemy’s relatively limited arsenal of extended-
range scouting and strike assets—as a means of expanding the set of prom-
ising offensive options. As there is nothing to prevent a military from
attempting to suppress the enemy’s extended-range scouting and strike
forces simultaneously, one should expect that priority would be accorded to
targeting enemy systems that combine the scouting and strike functions,
such as armed scout drones. A third option involves horizontal escalation,
whereby a military conducts operations outside the main theater of war in
another where it enjoys a competitive advantage. Finally, a military may
simply attempt to wage offensive war through attrition, suffering dispro-
portionate losses to prevail over the defense.
Breaking an enemy’s hold over no-man’s-land requires suppressing
its recce-strike complex. Thus, the struggle will center on the scouting/
counter-scouting (or “scouting”), network/counter-network (or “net-
work”), and strike/counter-strike (or “strike”) competitions. How might
a military prevail in these competitions? The answer is far from obvious.
Although cyber strikes will almost certainly play a significant and per-
haps a major role in the struggle to gain the upper hand in this duel be-
tween rival reconnaissance-strike complexes, it appears highly unlikely
that any military would bet the house on a cyber offensive, by itself,
proving decisive.
If initially positioning scouting and strike forces within range of the
enemy’s thickest A2/AD defenses is a risky proposition, then most would
need to be based in the friendly forces’ rear area, beyond the enemy’s main
A2/AD forces. Assuming that access to space assets will be problematic—
an issue we’ll tackle presently—then extended-range terrestrial-based
forces may shoulder much of the burden for scouting the far reaches of
no-man’s-land.
The kinds of forces that appear the most capable of operating in rel-
ative safety in a terrestrial no-man’s-land, such as stealthy long-range
manned and unmanned aircraft, mobile ballistic and cruise missile
launchers, submarines, unmanned submersibles, and Special Operations
Forces, are those that emphasize speed, mobility, stealth, or some combi-
nation thereof—characteristics designed to counter the enemy’s scouting
efforts. They are also relatively expensive and, therefore, available only in
relatively modest numbers.
54 Part 1
Fixed Targets
Assuming that friendly forces gain a scouting advantage, where should
they concentrate their efforts? Scouting forces might disperse initially to
locate the enemy’s main forces. If successful, the scouts could be massed
to support strike forces through the “engagement sequence”—from
when the target is first identified all the way through to BDA operations
following an attack.
The Mature Precision-Warfare Regime 59
Mobile Targets
Locating and maintaining a track on mobile targets presents a more dif-
ficult problem for scouts, owing to the need to provide a “motion pic-
ture” stream of data of the object rather than the occasional “snapshot”
needed for a fixed target. The U.S. military has found identifying and
tracking mobile targets through the engagement sequence difficult, even
at relatively short ranges and in the absence of sophisticated enemy
counter-scouting efforts, as was the case during operations in Afghani-
stan, the Balkans, and Iraq.
In the Precision-Warfare Revolution’s mature stage, scouting forces
may have to transit from distant bases outside the enemy’s main A2/AD
complex, increasing their exposure to counter-scouting forces and reduc-
ing the time available to scout their assigned area. Under these condi-
tions, especially when scouting forces are tasked with providing
persistent coverage of mobile targets, friendly strike forces will need to
engage them as promptly as possible, lest the scouting force loses its
track. In military parlance, the objective here is to compress the “sensor-
to-shooter” time frame (also referred to as the “kill chain” and “engage-
ment sequence”): the time that elapses between when the scouting force
identifies the target and when the strike force engages it. Under these
conditions, militaries will probably move toward greater reliance on the
“unblinking eye” of space-based scouting systems (if they can survive
enemy efforts to neutralize them) and stealthy terrestrial-based drones,
as manned systems attempting to perform this mission would run a high
risk of incurring excessive pilot fatigue.36
The engagement sequence can be further compressed if strike forces
are loitering in the area when a target is identified, assuming they can com-
municate with the scouting force. The sequence can be reduced even fur-
ther if the scouting and strike elements—the “sensor” and “shooter”—are
fused, as is the case with U.S. Predator armed drones, or if high-speed mu-
nitions are employed in the attack, such as by aircraft firing missiles at the
target rather than flying to it and dropping gravity bombs.
In many situations, transmitting the order to engage requires main-
taining data links from the sensor-shooter system back to a command
The Mature Precision-Warfare Regime 61
center that can evaluate the scouting data and transmit the “weapons re-
lease” order. As will be discussed presently, advances in artificial intelli-
gence that enable militaries to field a combined arms force of
autonomous reconnaissance-strike systems could significantly reduce the
engagement sequence. Such a force could greatly reduce or even elimi-
nate the need to maintain data links to the command authority, greatly
reducing stress on the battle network.
It is possible for scouting forces to produce a “mission kill” even if
they cannot facilitate a successful engagement. This can be done, for ex-
ample, by compelling a mobile target to keep on the move, lest it be
identified, tracked, and engaged. If, for example, enemy mobile missile
launchers must be moved frequently to avoid detection, then they have
less time to set up and fire. Applied against a squadron of missiles, this
could significantly reduce the squadron’s rate of fire. It may also preclude
the squadron from launching its attacks in salvos—all its missiles at
once—thereby reducing its chances of overwhelming friendly missile
defenses.
Summary
In summary, the scouting/counter-scouting competition—the battle at
the “front end” of a military’s recce-strike complex—will play an impor-
tant and possibly dominant role in a general war in a mature precision-
warfare regime.
The rise of enemy A2/AD complexes may find an increasing per-
centage of scouting force elements basing at great distances from their
search areas. Moreover, the extended ranges over which modern strike
operations can be launched, and the speed at which they can be prose-
cuted, suggests that scouting forces will be tasked with searching a far
greater area than they ever have before. This may lead to heavy reliance
on space-based scouting forces. Given the key role space-based systems
play as part of a battle network, and advanced militaries’ ability to neu-
tralize them, space control and denial operations are likely to be a key
focus of belligerent activity at the onset of war. Simply put, the next
great-power war will be the first “space war.”
The growth of A2/AD defenses, the likely need to scout at extended
ranges and over broad areas for extended periods of time, and concerns
over battle networks’ robustness will make completing the engagement
sequence successfully a challenging task. Consequently, compressing the
62 Part 1
Gaining an Advantage
Of course, friendly forces would probably not gain an advantage by de-
pleting the enemy’s long-range strike forces at the expense of exhausting
their own. How might this be avoided? In the case where one belligerent
enjoys a substantial quantitative advantage in long-range strike opera-
tions over its enemy, direct trade-offs may be acceptable. In cases where
two great powers are at war, however, assuming such an advantage could
be risky. If the two sides’ extended-range systems were in rough balance,
attacks on enemy systems would likely suffer losses from the enemy’s ac-
tive and passives defenses. Assigning part of the strike force to defeat the
defender’s active air and missile defenses would shift the exchange rate
even further in the defender’s favor. Given these circumstances, military
planners might explore other possibilities, such as taking the risk of posi-
tioning forces forward and initiating war through a preemptive strike.
That being said, depending on how the belligerents’ forces are struc-
tured, the attacker may enjoy an asymmetric trade-off advantage. A clas-
sic example is found in the U.S.-Soviet nuclear competition, where one
nuclear weapon employed against a strategic bomber air base could de-
stroy dozens of aircraft—and dozens of nuclear weapons. In a somewhat
similar vein, during World War II, U.S. and Japanese long-range naval
aviation forces squared off against each other during the Battle of Mid-
way. Thanks in large part to superior scouting, aircraft from a smaller
American naval force sank four Japanese carriers, at the loss of only one
U.S. flattop. Thus, for example, it may prove attractive for China’s PLA
Rocket Force (PLARF) to fire missiles to take out a U.S. air base or air-
craft carrier if, in so doing, a far greater number of U.S. long-range
scouting and strike aircraft are destroyed.
There are indirect ways to deplete an enemy’s extended-range strike
forces. As mentioned in the discussion on scouting, one involves decep-
tion. Decoys, for example, have long been a part of war and have been
employed to great effect. If successful, a decoy will draw attention and
even an attack on itself instead of on the target whose characteristics the
decoy is designed to mimic. Simply put, deception operations can find an
enemy wasting considerable scouting and strike assets, diverting the for-
mer from actual targets while luring the latter into attacking false targets.
64 Part 1
air and missile defenses on intercepting strikes only at those bases, while
ignoring strikes on the others.40
Geography can also play an important role in situations where two
rivals are in close proximity with each other and one enjoys strategic
depth while the other does not, as is the case with respect to China and
Japan, respectively. In this case, China can use relatively short-range
scouting and strike forces to cover most, if not all, of Japan, while the
Japanese would require a much greater number of long-range scouting
and strike systems to achieve the same coverage of China. This suggests
that the PLA would enjoy a major advantage through its ability to target
Japanese Self-Defense Force long-range strike forces with shorter (and
probably cheaper) strike systems.
Summary
In summary, depleting an enemy’s extended-range strike forces can cre-
ate the conditions that enable friendly offensive maneuver. As with ef-
forts to win the scouting competition, this freedom of maneuver can be
part of a campaign that progressively rolls back the enemy’s A2/AD com-
plex. Such a campaign would be familiar to students of past conflicts,
such as the Pacific Theater of Operations during World War II. Under
certain conditions, such as when an attacker can employ one munition
to take out multiple enemy munitions or before the enemy can “flush”
mobile strike systems from their bases at the onset of war, the side
that strikes first is likely to enjoy a significant, and perhaps decisive,
advantage.
Horizontal Escalation
Horizontal escalation, or shifting the conflict’s focus to a different geo-
graphic region, offers another prospective means of compelling the
enemy to risk and expend its long-range scouting and strike forces. This
approach may prove attractive if the cost of operating in no-man’s-land
in the principal contested region proves prohibitive and the enemy’s A2/
AD complex too formidable to overcome through direct action. Under
such conditions, militaries might conduct offensive operations in areas
where they have local superiority and where friendly A2/AD defenses
can hold enemy forces at bay. The goal is to fight under conditions
where friendly forces can rely primarily on short-range scouting and
66 Part 1
Economic Warfare
If a general war were to extend over a protracted period, say, several years
or so, economic warfare in the form of blockade may prove an effective
means of horizontal escalation. As will be elaborated on presently, ad-
vances in submarine and torpedo technology around the turn of the twen-
tieth century enabled Germany to threaten British close blockade forces
with mines and nocturnal attacks from torpedo boats and submarines—a
kind of Victorian-era A2/AD complex that created a maritime no-man’s-
land in littoral waters. When war came, the British were compelled to
adopt a distant blockade along the English Channel and in the North Sea
between Scotland and Norway.
When confronted by advanced enemy A2/AD defenses, friendly
forces could wage economic warfare by imposing a distant maritime
blockade to avoid incurring heavy and possibly unsustainable losses. For
scouting, modern distant blockade forces would probably rely on satel-
lites (assuming space has not been “emptied”) and on long-endurance
drones operating from austere bases, similar to what the U.S. Marine
The Mature Precision-Warfare Regime 67
New Domains
Warfare in a mature precision-warfare regime in which belligerents pos-
sess formidable A2/AD complexes that overlap to form a no-man’s-land is
also apt to find militaries looking to engage in offensive maneuver by
shifting the competition into relatively new warfare domains—such as
space, cyberspace, and the seabed—where the offense currently appears to
have the upper hand. Indeed, success here, particularly in space and cyber-
space, could significantly and perhaps even fatally compromise the enemy’s
scouting forces and battle network, thereby opening the way for offensive
maneuver in no-man’s-land. Shifting the fight into these domains, while
avoiding direct kinetic attacks on a rival great power’s homeland, may also
reduce the risk of the war escalating to nuclear Armageddon.45
Prompt Attrition
Although attrition strategies have succeeded, they should be avoided if
possible, as they tend to be resource intensive with respect to casualties
and material resources. A military should pursue attrition only if it enjoys
a clear advantage in combat power, feels it must take prompt action at all
hazards, and has no other options for securing its objectives.
Enduring disproportionately high casualties and equipment losses is
always an option for overcoming the enemy—if one is willing and capa-
ble of paying the butcher’s bill. This was the case with the Chinese offen-
sive against U.S. forces at the Chosin Reservoir during the Korean War
and in the Red Army’s conquest of Berlin in 1945, where attacking forces
suffered enormous losses but succeeded in accomplishing their objec-
tives.46 Another example of pursuing prompt attrition to obtain freedom
of maneuver is found in the Royal Navy’s willingness, at times, to run the
gauntlet of German and Italian air and naval forces to reinforce Britain’s
key island base at Malta in the central Mediterranean Sea during World
War II. In the Tet Offensive, North Vietnam leveraged its advantage in
manpower and U.S. aversion to casualties to attack American forces in
South Vietnam. Communist forces suffered heavy losses but succeeded
in breaking the U.S. political leadership’s will to achieve its objectives.47
Still another example is the Luftwaffe’s willingness to sustain far greater
losses in both aircraft and pilots than the Royal Air Force in the Battle of
Britain. Given the prospective payoff—creating the conditions for a suc-
cessful German invasion and conquest of Great Britain—the cost was
The Mature Precision-Warfare Regime 69
A Complex Combination
The preceding sections provide a preliminary exposition on how militar-
ies might restore the ability to conduct effective offensive campaigns at
an acceptable cost when confronting advanced A2/AD reconnaissance-
strike complexes. The discussion is illustrative, not comprehensive. A re-
ductionist approach was used, reducing a complex set of interlocking
competitions into some of its constituent piece-parts. What we are far
70 Part 1
SPOT
In the Cold War’s final years, one of my duties while serving as the secre-
tary of defense’s military assistant for special projects was as editor in
chief of Soviet Military Power. This document, a forerunner to today’s an-
nual report on China’s military developments, was designed to inform
the U.S. public and the citizens of its allies on the state of Soviet military
forces and key trends in the military balance.
One year while my colleagues and I were preparing the report, an
intelligence community representative suggested we purchase satellite
photos from the French satellite SPOT (Satellite Pour l’Observation
de la Terre), owned by the commercial firm Spot Image. The satellite,
providing photos with ten-meter resolution, had only recently been
The Mature Precision-Warfare Regime 71
Over sixty years later, the weaponization of space for the purpose of
establishing control of that domain and influencing the struggle for con-
trol of others has yet to occur. It is also not clear that dominating space
would, as Kennedy asserted, enable a country to control the world. Nev-
ertheless, both men correctly foresaw space’s enormous potential to alter
war’s character, and with it the military balance of power. The succeeding
three decades witnessed both Cold War superpowers militarizing—but
not weaponizing—space. Following the Soviet Union’s collapse in 1991,
the United States had no major rival in this domain. Today, however, it
can no longer make that claim. Neither do its satellites enjoy sanctuary
from attack. And, as Caspar Weinberger discovered, states long ago lost
their monopoly over what transpires in this domain.
sector’s advance into space has been enabled in large measure by steeply
declining launch-to-orbit costs, for which it—not governments—is prin-
cipally responsible.
Since Sputnik went into orbit in October 1957, satellites have been
expensive to build and costly to launch. This changed with advances in
technology and as the commercial sector embraced a “smaller-is-better”
view with regard to satellites. In 1999, researchers from the Technical
University of Berlin launched a tiny satellite—TUBSAT—weighing
roughly 100 pounds and measuring around a foot on each side. At the
time, TUBSAT was seen as a novelty. Less than fifteen years later, how-
ever, Orbital Sciences, a U.S. company, launched a rocket carrying
twenty-nine small satellites to low-Earth orbit (LEO). Shortly thereafter,
Kosmotras, a Russian joint venture, boosted thirty-two “SmallSats” into a
similar orbit.54 Many of these small satellites are built to a standard for-
mat and are referred to as “CubeSats.” CubeSats are employed in multi-
ples, each measuring roughly four inches on each side and weighing less
than three pounds. By 2020, more than 1,100 CubeSats had been placed
in orbit.
That year also saw a U.S. firm, SpaceX, producing an unprecedented
120 satellites a month and boosting 143 commercial and government
satellites into orbit on a single mission, shattering the record of 104 set
by India in 2017—this at a time when there were only around 3,000 ac-
tive satellites in orbit. In other words, this single launch increased the
satellite population by 5 percent. In February 2021, SpaceX launched 60
Starlink satellites on a single Falcon 9 rocket as part of its plan to create
an initial constellation of 1,440 satellites providing internet service, with
the ultimate goal of creating a global high-speed internet network in-
cluding some 12,000 satellites.55
SpaceX is but one example, albeit a prominent one, of the commer-
cial sector’s surge into space. In recent years, the number of private firms
operating satellites—many of them CubeSat clusters—has expanded sig-
nificantly, performing a growing range of functions. Most of these func-
tions are commercial in nature, but some have clear military applications.
Some carry small yet powerful lasers capable of beaming data to ground
stations at very high data rates. Still others rely on short-wavelength in-
frared imaging to peer through clouds or on synthetic aperture radars
(SARs) to obtain images at night.56
Government and commercial satellites are producing enormous
amounts of data, to the point where the then-director of the National
74 Part 1
while SpaceX alone had 65 percent.62 For the United States, the rise of
private-sector firms like Elon Musk’s SpaceX and Jeff Bezos’s Blue Origin
may provide it with a latent “space arsenal of democracy” in the event of
war, with a significant potential to support military operations.
Although the Chinese stated that this action was a space maintenance
mission, the robot’s ability to grab satellites is not limited to those be-
longing to China.64
Like China, Russia continues to develop ASAT forces. In 2008, a
Russian spacecraft moved between two commercial communications sat-
ellites operated by Intelsat, later positioning itself near another satellite.
It requires little imagination to realize that, were these Russian satellites
armed, they could function as ASAT “grenades.” More recently, in July
2020, the Russians released a projectile from an orbiting satellite that
could be used to strike spacecraft. Three months earlier, it tested a di-
rect-ascent anti-satellite missile, continuing its efforts to field multiple
means of attacking space systems.65
Satellites are also at risk from jamming and cyber attacks. As far back
as 1998, there were allegations that Russian hackers had taken control of
a U.S.-German satellite and pointed it at the sun, destroying its sen-
sors.66 In 2005, China began incorporating cyber attacks into its military
exercises, primarily in preemptive attacks on enemy networks. In 2008,
anonymous hackers seized control of Terra, a civilian imaging satellite in
low-Earth orbit, where military reconnaissance craft reside. Fortunately,
the hackers refrained from any further mischief.67 A decade later, the cy-
ber-security firm Symantec warned that a China-based cyber-espionage
group known as Thrip was targeting satellite, telecom, and defense com-
panies in the United States, possibly looking for ways to intercept or
alter satellite communications, including inserting malware to infect
computers linked to the satellites.68
There have been attempts to disrupt GPS signals. During a demon-
stration in 2012, U.S. Department of Homeland Security officials ob-
served one of their drones being hijacked off its intended route by a
hacker inserting false GPS coordinates into its software. There are re-
ports that Russian forces have similarly “spoofed” drone signals over
Syria and the Black Sea.69 In 2018, Finland’s GPS signal was intention-
ally disrupted during NATO field exercises in Scandinavia, with Russia
the suspected source of attack. Around that time, pilots operating in
Norway’s airspace also experienced a loss of their GPS signals.70 After as-
sessing these trends, the U.S. Defense Department concluded, “The
global threat of electronic warfare (EW) attacks against space systems
will expand in the coming years in both number and types of weapons.
Development will very likely focus on jamming capabilities against dedi-
cated military satellite communications, Synthetic Aperture Radar (SAR)
The Mature Precision-Warfare Regime 77
such as the U.S. military’s kinetic intercept of one of its own satellites in
2007. The U.S. Defense Department has also experimented with several
laser systems that could eventually lead to its fielding a laser ASAT sys-
tem.76
A potential “game-changing” U.S. capability about which little is
known is the X-37B space plane. The Air Force has at least two X-37Bs,
each about thirty feet long and ten feet high, with a wingspan of roughly
fifteen feet and a payload bay about the size of a standard pickup-truck
bed. Like the space shuttle, the X-37B is launched vertically and lands on
a runway. The X-37B’s initial mission occurred in April 2010, lasting 224
days. A recent mission ran nearly 800 days. The X-37B’s tenth anniver-
sary was marked by its sixth launch to orbit in May 2020.77
The Air Force has kept the X-37B’s purpose and missions, as well as
most of its payloads, classified. The veil of secrecy was pulled back slightly
by former Air Force secretary Heather Wilson, who declared that the
space plane can perform maneuvers in space that would drive potential ad-
versaries “nuts.” From this highly ambiguous statement, experts speculate
that the X-37B may be capable of changing its orbit, making it difficult for
rivals to predict the spacecraft’s location.78 Assuming that this is the case,
the X-37B could present a difficult target for enemy ASAT forces. For ex-
ample, assume that the Chinese military locates the X-37B in space and is
seeking to intercept it. In theory, the X-37B’s controllers could shift its
orbit. Following such a maneuver, the Chinese would find the X-37B fail-
ing to appear at the predicted time and location, compelling them to
renew their scouting efforts from scratch.79
Presuming that the X-37B is performing as experts speculate, then as
its development continues, the character of the military competition in
space could change dramatically. In fact, China is working to field its
own reusable space plane. In September 2020, the Chinese successfully
boosted an experimental craft into orbit and returned it to Earth, where
it landed horizontally. Another successful launch occurred ten months
later. A second space plane, Tengyun, is being developed and is designed
to take off and land horizontally. The Chinese claim that their space
plane program’s purpose is to reduce launch costs. Given that the U.S.
space shuttle’s cost to orbit was well over an order of magnitude greater
than SpaceX’s current price, the Chinese assertion seems disingenuous. A
more plausible explanation is that China, as in nearly every area of the
military-technical competition, is seeking to match, and eventually sur-
pass, its U.S. rival in space.80
The Mature Precision-Warfare Regime 79
Space War
Today war in space appears to favor the offense, and by a clear margin.
There are several ways in which an attacker can destroy or neutralize a sat-
ellite or satellite architecture. Thanks to motion pictures such as the Star
Wars and Star Trek series, popular images of war in space tend to emphasize
kinetic weapons, such as “photon torpedoes,” generating kinetic effects—
with everything from space fighters to “Death Stars” blowing up, complete
with the explosive “sounds” that would never occur in the vacuum of space.
Yet kinetic and directed-energy anti-satellite weapons do exist.
There are “hit-to-kill” ASAT missiles that work by striking the target
satellite directly. These missiles are most effective against satellites in
low-Earth orbit, where many imaging satellites are located. Attacking
satellites at mid-Earth orbit (MEO) or in geosynchronous orbit (GEO)
is more demanding, requiring larger, more sophisticated missiles. Al-
though a sophisticated military satellite can use thrusters in attempting
to move out of a kinetic interceptor’s path, it could expend a large
amount of its fuel doing so.81 If this maneuver forced the satellite into an
unfavorable orbit where it lacked the fuel to return to its intended sta-
tion, the attacker may still claim a “mission” kill.
One major barrier to the use of kinetic ASAT weapons is the “space
junk” that may be created in the wake of a successful attack. Compare
China’s ASAT test in 2007 and the U.S. satellite intercept the following
year. These events yielded strikingly different environmental results. Al-
though both intercepts were against disabled satellites in LEO, the Chi-
nese intercept occurred at an altitude greater than 500 miles, while the
U.S. intercept happened at roughly 150 miles. The difference in altitude
found the debris produced by the U.S. test burning up in the atmosphere
relatively quickly. The Chinese test was a disaster, creating more than
150,000 pieces of space junk—roughly 15 percent of all the space debris
now in orbit—while ground controllers around the globe scrambled to
move dozens of spacecraft out of harm’s way.82
China’s space junk is global, indiscriminate, and irreversible. It’s
global because the debris spreads naturally over time into other satellite
orbits. It’s indiscriminate because it affects all satellites, not just those be-
longing to China. Its effects are irreversible because there is, as yet, no
practical way to remove space junk. Over time, the growing debris cre-
ated by space junk colliding with satellites or pieces of debris striking
one another risks increasing to the point that everything in that orbit is
80 Part 1
Summary
Spacecraft have become central to the functioning of advanced militar-
ies’ reconnaissance-strike complexes. This, as well as satellites’ economic
value and the apparent challenges associated with establishing effective
defenses, will likely make them highly attractive targets in a general war.
The potential advantage accruing to the side that takes out its rival’s
space-based forces, combined with the speed at which this might be ac-
complished, suggests that belligerents may have strong incentives to
strike first.
Whereas belligerents may be self-deterred from employing kinetic
ASAT strikes, there are other methods to neutralize enemy space-based
systems, including directed-energy systems like laser ASATs, that appear
to be both effective and discriminate. Counter-space operations may be a
game in which even nonstate entities can play, especially when it comes
to jamming and cyber attacks.
Although the competition in space appears to favor the offense, new
developments, such as the proliferation of CubeSat constellations, the
ability to maneuver small satellites, and the emergence of space planes
like the X-37B, may help level the playing field toward the defense. In
any event, it is all but certain that in a mature precision-warfare regime,
a war between two advanced military powers will witness the first war in
space.
Europe. In every case, the buildup of these forces overseas occurred with
minimal, if any, enemy interference. This happy state of affairs no longer
exists in the Western Pacific and perhaps not in Eastern Europe. China
(especially) and Russia are increasing dramatically the price the U.S. mil-
itary must pay to project power in these regions, as well as to defend
American military and economic assets in the relatively new war-fighting
domains of space, cyberspace, and the seabed.
A key issue with respect to the maturing precision-warfare regime
characterized by dueling reconnaissance-strike complexes is whether it
represents a “new normal” or whether ways might be found to enable of-
fensive power-projection operations at an acceptable cost. Several point-
of-departure approaches for prevailing in this “duel” were presented to
stimulate efforts at developing operational concepts designed to restore a
military’s ability to maneuver offensively at the operational level of war.
Although suppressing the enemy’s scouting force and depleting its
extended-range strike forces were described separately, it’s clear that the
greatest effect will be achieved by employing these operations in combi-
nation, in particular by fusing scouting and strike functions in “sensor-
shooter” systems.
If a new general war cannot be averted, its opening phase may be its
most crucial. Owing to the apparent advantage enjoyed by the offense in
the space (and probably cyberspace) domains, the speed of attack enabled
by systems like laser ASATs and speed-of-light cyber strikes, and the ad-
vantages that will accrue to the side that gains the upper hand in fractur-
ing its enemy’s reconnaissance-strike complex, the incentives for
adopting a preemptive war posture are likely to increase significantly. As
the 1992 MTR assessment concluded:
There is only one thing I can tell you about war, and almost one
only, and it is this: no war ever shows the characteristics that
were expected; it is always different.
—dwight eisenhower
—isaac deutscher
85
86 Part 1
I pointed out that the MTR assessment had focused almost exclu-
sively on the effects triggered by the IT revolution and Defense Secre-
tary Harold Brown’s Offset Strategy. Now I was confronting a cluster of
military-related technologies, some of which could, by themselves, dra-
matically shift the character of warfare. Complicating matters further,
these technologies were advancing at a steady and, in some cases, rapid
pace. Further complicating matters were their interrelationships. In
some cases, these technologies’ potential to act as “game changers” in the
military competition depended on progress with other emerging tech-
nologies: breakthroughs in additive manufacturing could prove critical
for the success of hypersonic missiles; advances in quantum computing
and AI could make a big difference in synthetic biology; and so on. Thus,
the order in which these various technologies matured could, I said,
greatly affect how the emerging revolution plays out: if solid-state lasers,
rail gun, and powder gun technology matured before hypersonics, then
fleet missile defense could gain the advantage. If hypersonics arrive first,
it might become impossible to mount an effective defense of the fleet. All
this, I told Baker, was making for a really tough go.
In the finest traditions of the office that he now leads, Baker simply
looked at me and said, “Well, I guess you’ll just have to think harder,
won’t you?”
Indeed.
For thousands of years, new technologies have provided militaries
with more effective means of waging war. Technology’s ability to confer
advantage on the battlefield has never been more evident than during the
industrial age, when advances enabled innovation and, at times, military
revolutions. Today military-related technologies are progressing at a fast
pace and on a broad front. They encompass increased computational
power—including the prospect of quantum computing—facilitating big-
data analytics, machine learning, and, through them, advances in artificial
intelligence. Impressive progress is also being made in additive manufac-
turing, robotics, directed energy, and hypersonic propulsion. Defense
planners ignore at their peril the stunning progress in the biosciences,
especially in gene editing made possible by CRISPR-Cas9.
Which emerging technologies will mature when expected and as ex-
pected? Which will find their true potential being realized much later
than anticipated? Which game-changing technologies will simply fail to
emerge? Finally, what technologies will alter the character of warfare in
ways that were wholly unanticipated, even by their originators?
Disruptive Technologies 87
Artificial Intelligence
The Information Revolution that began in the mid-twentieth century
continues, thanks to advances in high-speed data processing; the growing
availability of large data sets drawing increasingly on raw material pro-
vided from the emerging internet of things (IoT); the use of big-data an-
alytics; advances in machine learning techniques; and rapidly expanding
private- and public-sector investment.2 All of this has led to impressive
increases in artificial intelligence performance, with its biggest boosters
promising, “You ain’t seen nothing yet!”
Before proceeding further, some defining of terms is in order. Artifi-
cial intelligence refers to leveraging digital technology to create systems
that are capable of performing tasks commonly thought to require human
intelligence. Machine learning is viewed as a subfield of AI and centers
on digital systems that improve their performance on a given task over
time through experience.3 The National Institute of Standards and Tech-
nology (NIST) describes big data simply as “the deluge of data in today’s
88 Part 1
Military Implications
AI has the potential to make significant, and perhaps profound, contribu-
tions to the effective functioning of reconnaissance-strike complexes.
This is due, in part, to the rapid growth in sensor technology that sup-
ports intelligence, surveillance, and reconnaissance efforts. Modern sen-
sors produce an enormous amount of raw data, outstripping the ability of
military and intelligence organizations to process and analyze it.
Some unattended ground sensors and undersea systems use onboard,
autonomous processing to reduce the torrent of data being fed back to
users, significantly reducing communications bandwidth requirements
and the burden on human analysts. Expanding the amount of data that
can be analyzed while reducing the time needed for analysis is especially
important in the mature precision-warfare regime described in Chapter 3,
which emphasizes compressed engagement cycles.
Using AI, a sensor platform could also adjust its collection and analytic
focus in real time, without waiting for instructions, thereby eliminating ex-
traneous data. For example, for a drone with a human “in the loop,” en-
crypted data must be transmitted to and fro between it and the operator.
But battle-network data links will be targeted by the enemy. To the extent
AI can lower data transmission requirements, it reduces the stress on a
reconnaissance-strike complex’s battle network and scouting forces.
AI is beginning to make its way into efforts to improve the scouting
ability of advanced military organizations. For example, the U.S. mili-
tary’s Project Maven is seeking to address the growing challenge of ana-
lyzing the incoming avalanche of data fast enough and effectively enough
to maximize its value. To enhance the U.S. military’s ability to strike
time-sensitive targets, the project has been looking at turning drone sur-
veillance footage into useful intelligence through machine learning more
quickly than can be accomplished by human analysts. One general in-
volved with the effort was so impressed that he recommended that “the
Department of Defense should never buy another weapons system . . .
without artificial intelligence baked into it.”13
The scouting competition involves actions taken to identify what the
enemy is up to, while denying the enemy similar information regarding
Disruptive Technologies 91
miss. According to the NRO, “Sentient aims to help analysts ‘connect the
dots’ in a large volume of data.”16
Sentient’s success depends, in large measure, on the quantity and
quality of the data with which it is provided. With this in mind, the NRO
has contracted with private firms to provide data that can be fed to Sen-
tient. One firm, Maxar, provides high-resolution satellite imagery. An-
other, Planet, operates a CubeSat constellation that images all the Earth’s
land each day. A third firm, BlackSky, “hoovers up” data from twenty-five
satellites, more than 40,000 news sources, some 100 million mobile de-
vices, roughly 70,000 ships and planes, eight social networks, and about
5,000 environmental sensors. BlackSky provides this data as raw material
for big-data analytics to refine for machine learning to aid the NRO in
focusing its satellites more effectively, while alerting human analysts to
key patterns and insights.17
The need for AI support is especially acute in situations where the
engagement sequence is highly compressed and must be sustained. Those
of a certain age may recall an early video game called Space Invaders, in
which the player was tasked with “shooting” down hostile aliens de-
scending down the screen from the “sky.” As the game progressed, the
aliens descended more rapidly, eventually overwhelming all but the most
skilled players. The problem is similar to those who are tasked with de-
fending against cyber and missile attacks. Such situations threaten to
overwhelm the decision and reaction abilities of even highly capable,
well-trained humans. In situations like these, the challenge involves not
only reacting promptly and effectively to an attack but sustaining that re-
action for as long as the attack persists, which could extend over minutes,
hours, or (in the case of cyber) even weeks.
Looking to the future, the “space invaders” may appear in new forms,
such as drone swarms (as they do in many of today’s action films), hyper-
sonic missiles, or cyber payloads. For example, consider an aircraft carrier
under attack by large numbers of ballistic and hypersonic cruise missiles.
Defending effectively against such an attack depends on rapidly process-
ing and analyzing large volumes of data, using the results to prioritize tar-
gets, identifying engagement options, and selecting the appropriate one.18
The speed at which this must occur and the time over which it might
have to be sustained will probably overwhelm a human’s ability to manage
the carrier’s defense effectively. Advances in machine learning may enable
effective autonomous behavior in such circumstances. Recent years have
seen dramatic improvements in signal-processing applications, which can
Disruptive Technologies 93
AI-Enabled Swarms
On the night of January 5–6, 2018, unknown assailants mounted an attack
with thirteen armed aerial drones against the Russian airbase at Hmeimim
and the neighboring naval base at Tartus, both in Syria.21 The Russians de-
feated the attack using a combination of anti-aircraft defenses and elec-
tronic warfare. On September 14, 2019, more than twenty explosive-laden
drones launched by Iran or one of its proxies struck Saudi Arabia’s oil
facilities at Abqaiq, the world’s largest crude-oil-stabilization facility. The
drones knocked out some 5.7 million barrels a day of oil production, or
roughly 5 percent of the world’s total.22
Although these attacks were coordinated, it appears unlikely that the
drones were controlled by a single, AI-based swarming algorithm.23
Swarming attacks may appear amorphous; however, as defined here,
they are deliberately structured and coordinated, capable of being
executed from multiple directions.24 Over time, advances in AI may
enable highly coordinated attacks by hundreds or even thousands of
autonomous systems, something that would be infeasible for human
controllers.25
What will happen when defenders are confronted by a much larger
drone attack employing sophisticated AI-based control? The question
may have been fanciful a few years ago. It seems far less so now.26 In early
2019, Iran conducted an exercise called “Way to Jerusalem,” comprising
fifty drones that Tehran asserted operated in a coordinated manner to
strike predetermined targets in an area extending over 500 miles.27
The world’s leading militaries are looking to leverage AI to enable their
drones to operate in swarms. In January 2017, the U.S. Navy tested a swarm
of 103 drones launched from three F/A-18 aircraft. The drones communi-
cated with each other independent of human control and demonstrated
94 Part 1
Although minor powers and nonstate groups may find it too costly
or too technically challenging to develop the AI that can transform
drones into swarms, the barriers to acquiring it may not be unsurmount-
able. New commercial AI algorithms are sometimes copied and spread in
a matter of weeks.41 As is often the case with commercial software, some
may be adopted for military use. And even though it’s reasonable to as-
sume that the algorithms that drive AI military systems will be carefully
protected, the history of cyber espionage suggests that determined pene-
tration efforts by an advanced cyber power, or even a criminal group, can
succeed. Thus, it’s not unreasonable to posit that sophisticated AI-driven
systems may become widely available. In fact, the growth in drone capa-
bility and sales is complemented by the increasing availability of autono-
mous navigation and control systems and small, high-quality cameras
capable of being placed aboard these drones. Efforts like Buzz, an open-
source programming language specifically designed for understanding
and predicting swarm behavior, may speed the development of swarming
for less advanced militaries and even nonstate groups.42
These trends suggest that relatively primitive drone swarm attacks
could be employed even by nonstate groups like Hezbollah. Swarm at-
tacks could, for example, disrupt operations at a U.S. Marine Corps air-
craft forward arming and refueling point (FARP). The FARP’s fuel and
munitions stores, along with communications antennas and other “soft”
targets, could be attractive targets for drones with relatively small explo-
sive payloads. Rather than attempting precision targeting, a swarm of
hundreds of small fixed- or rotor-wing UAVs could overwhelm the
FARP’s defenses, either by presenting more targets than the defenders
could engage simultaneously or by exhausting their counter-swarm
weapon magazines. That being said, depending on the defending sys-
tems’ AI, it may prove possible to defeat the attacking swarm with a
counter-swarm, roughly similar to what the Israelis have been able to do
with Iron Dome against Palestinian rocket attacks. In this example, the
Marine unit defending the FARP would launch its own swarm, featuring
drones with superior agility relative to the attacking swarm, intercepting
the attacking drones before they can put the FARP out of action.43
Other swarm operations could employ simple quadcopter drones
armed with small payloads and sensors to detect enemy communications
in their vicinity. Once detected, the quadcopter drone could fly to the
communications emitter and self-detonate. Assuming modest defenses,
which should be able to detect a simple drone quadcopter, the attack may
98 Part 1
may be possible even for groups with only basic knowledge of cyber op-
erations. In theory, one would simply put a turnkey AI system to work.
As the cost of replicating AI software is negligible, the barriers to prolif-
erating APTs could be greatly reduced.50
Today mounting cyber attacks typically requires choosing between
the frequency and scale of attacks, on the one hand, and their effective-
ness on the other. This is the case with “phishing” and “spear phishing.”
Phishing attacks involve sending out general messages to a large number
of recipients. They are used despite their very low success rates simply
because of the huge number of targets being attacked. Nearly everyone
has received an email message directed to a general audience that en-
courages them to click on an icon or web address that will download
malware onto their computer or to reveal personal or proprietary infor-
mation. Most recipients simply delete the email. A small percentage,
however, do not.
Spear phishing, on the other hand, is a kind of “designer” phishing
that involves tailoring email messages to specific groups or individuals.
The objective is to convince the recipient that the email is from an indi-
vidual or organization that they know and trust, such as a friend, co-
worker, or employer. For example, in 2019, hackers infiltrated Redbanc,
an interbank network connecting Chile’s ATM system. To do so, they
faked a lengthy hiring process, complete with rounds of video interviews,
to dupe a single employee into downloading and running their malware.
The time, effort, and skill devoted to spear phishing is rewarded by the
significantly greater probability of success relative to simple phishing. It
also makes spear phishing relatively expensive. If, however, a significant
portion of the work involved can be automated with AI, it might be pos-
sible to undertake spear-phishing attacks more effectively and on a larger
scale.51
Logistics
Combining AI and additive manufacturing could revolutionize military
logistics, with regard to both moving supplies and reducing inventory
stockpiles. The commercial sector is leading the way in showing what is
possible. The U.S. railway industry, for example, is creating a network of
internet-linked railcar wheel and track sensors and speed indicators,
along with visual and acoustic sensors embedded in brakes, rails,
switches, and hand-held tablets. The network has been generating large
quantities of data on train movement around the country. This data,
when fed through big-data-analytics-enabled machine learning, is en-
hancing AI’s ability to aid in managing rail traffic.59 Data on the location
of trains and track conditions across the country is analyzed and used to
adjust the routing of thousands of trains in real time. In tests, the system
was able to route roughly 8,000 trains operating in twenty-three states in
the face of multiple track outages without requiring a single train to
stop.60 Similar improvements in military logistics flows seem possible, at
least in peacetime and in secure rear areas in war.
Another commercial business, Amazon, shows how advances in big-
data analytics and machine learning, especially when combined with ro-
botics, can enhance logistics. Amazon is well known for creating models
of its consumers’ purchasing behavior by examining their orders, product
searches, wish lists, and returns to predict what a customer might buy
next. The large-scale positioning of warehouse inventories on the basis
of anticipated demand has dramatically boosted efficiency.61 Demand by
military units for supplies in chaotic wartime situations is likely to be far
more difficult to model using Amazon’s approach; however, it may be
possible for military organizations in peacetime to enhance logistics effi-
ciency by adopting some of the firm’s best practices.
Amazon also uses AI to direct robots moving items in its warehouses.
The firm is exploring how delivery trucks might employ additive manu-
facturing (3D printing) to print customers’ products while on the way to
make deliveries, thereby reducing storage and transportation costs while
compressing delivery times.62 The implications for military logistics are
clear.
Disruptive Technologies 103
AI Barriers
Despite the remarkable advances being made with AI, autonomous sys-
tems have exhibited superior performance in only a relatively small per-
centage of tasks that humans are capable of completing. There is also no
consensus regarding how rapidly AI will advance.65 Several variables
could act as accelerators or brakes on AI’s progress and humans’ willing-
ness to embrace it. Having extolled AI’s potential, let’s now turn to the
barriers to its implementation.
Recall that an AI system independently identifies alternative courses
of action on the basis of its knowledge and understanding of the world,
itself, its objective, and the context in which the decision is being made.
Consequently, autonomous systems must respond to situations that are
not preprogrammed or anticipated, as their purpose is to function effec-
tively across a wide range of prospective situations that cannot all be pre-
determined. Obviously, the actions that the AI system takes also cannot
be pretested. Therefore, the possibility of being surprised—for better or
worse—by the AI system’s actions is ever present. The more complex the
situations that autonomous systems are tasked with addressing, the less
likely it is that their human masters will be able to predict their actions
or even control them.66
104 Part 1
The risks are hardly trivial. Although AI can sort through masses of
data faster than armies of human analysts and find patterns that no unaided
human mind would identify, it can also make mistakes that no human brain
would fall for, a phenomenon known as “artificial stupidity.”67 The problem
is inherent in the way AI is created. It’s not the product of line-by-line pro-
gramming; rather, the favored method involves feeding it huge quantities
of data refined through big-data analytics. The data is used to enable ma-
chine learning through trial and error and experience. This method, how-
ever, makes it very difficult for the AI’s creators to understand how it is
learning or the linkages between an AI system’s decision and those factors
that led it to make such a decision. Consider, for instance, the use of AI to
enable driverless cars. As most of us know, when human-driven cars are
waiting at a stop light, drivers often inch forward to try to beat the traffic.
It’s been found that some AI-driven cars occasionally join in, inching for-
ward at a red light even though there is nothing in the rules of driving pro-
vided to the AI to suggest it should act in this manner. The AI learned this
behavior, but its creators don’t know how or why. You don’t need a malevo-
lent AI to cause problems, just an AI that can generate some unwelcome
surprises. What is AI learning that it is not “telling” us? Can we anticipate
unexpected and unwanted AI decisions as its learning progresses?68
Some AI experiments serve as examples of this all-too-real problem.
In one experiment, reminiscent of the runaway brooms in The Sorcerer’s
Apprentice, a robot prototype was programmed to put warehouse boxes
down a chute. A surveillance camera monitored its progress so the robot
could be deactivated when needed. The robot, however, learned to block
the camera so it could keep doing its job of stuffing boxes down the
chute. In this context, the consequences of the robot’s actions were rela-
tively harmless. Yet it does not take much imagination to envision an AI
fire-control system designed to engage incoming high-speed missiles en-
gaging inbound friendly aircraft as well.
Big-data analytics will play an important role in determining how in-
telligent AI will become and how quickly this will happen. This is because
the machine-learning algorithms that form the basis for AI are only as
good as the data sets that constitute the raw material for its training. Raw
data is a poor diet for machine-learning algorithms, especially in their in-
fancy. These algorithms need well-labeled data to provide a baseline of
truth against which they can check their conclusions. Does a video feed
reveal an enemy tank column or a line of decoys? Do reconnaissance
Disruptive Technologies 105
Summary
Recent decades have witnessed impressive advances in artificial intelli-
gence. But as much as humans endeavor to put AI to work for them, it
has a mind of its own and an ability to act—for good or ill—on what it
has learned. It will not be motivated by any sense of kindness or malevo-
lence. It will not feel any satisfaction or remorse from its actions, or grow
weary in its tasks, suffer from burnout, call in sick, or negotiate for im-
proved working conditions.
If AI advances, it will almost certainly exert a significant—and poten-
tially profound—influence on the military balance and on the character
of warfare, even its frequency. As the U.S. National Intelligence Council
concluded, “The increasing automation of strike systems, including un-
manned, armed drones, and the spread of truly autonomous weapon sys-
tems potentially lowers the threshold for initiating conflict, because
fewer lives would be at risk.”73
Given this prognosis, any military that is not on the cutting edge of
developments in AI risks finding itself at a major disadvantage. Conse-
quently, it will be difficult for any military with the means to compete to
refrain from doing so. Moreover, unlike the development of nuclear
weapons or ballistic missiles, militaries do not exercise a monopoly when
it comes to AI. Today many commercial firms are actively pushing the
envelope of AI development. Whether we like it or not, the AI genie is
out of the bottle.
That said, AI is truly a double-edged sword, its “thinking” not fully
transparent to its makers. Yet that’s precisely the point: AI’s value—and
its danger—is inherently in its ability to surprise, to reveal “solutions” to
problems that have evaded the human mind, and to act on them.
assembled from nearly two dozen separately cast parts using subtractive
manufacturing.85 When Boeing applied AM to the F-18 fighter’s envi-
ronmental control system duct, sixteen component parts were reduced to
one.86 The U.S. National Aeronautics and Space Administration (NASA)
is using 3D printing to make parts for its rocket engines.87 Perhaps even
more impressive, the U.S. firm Aerojet Rocketdyne successfully built and
tested an engine that normally includes dozens of parts using only addi-
tive manufacturing. The AM version, however, had only three compo-
nents: the injector and dome assembly; the combustion chamber; and a
throat and nozzle section.
Finally, a component’s design and specifications can be changed and
the new product produced far more rapidly, and at far less cost, using
AM as opposed to subtractive manufacturing, especially in cases where
retooling is required.88 Today additive manufacturing is turning out a
wide range of products, from the soles for Adidas athletic shoes to re-
placement parts for nuclear weapons and the International Space Sta-
tion.89 And it appears we are only at the beginning of what this new form
of manufacturing can accomplish, with the world’s leading militaries po-
tentially realizing major enhancements in systems development and pro-
duction, logistics, and readiness.
Implications
Additive manufacturing could yield significant cost savings in military
system development and production. As mentioned earlier, by reducing
the need for high-cost traditional manufacturing facilities and lowering
labor costs, AI can assist the defense industrial base (DIB) in realizing
substantial efficiency gains, freeing up significant resources to address
other military priorities. By avoiding the expense associated with stand-
ing up unique tooling and facilities, AM can make modifications more
quickly and cheaply than traditional manufacturing processes can.90 This
can compress engineering cycles, aiding a military’s efforts to adapt more
effectively in a turbulent threat environment.
Relative to SM processes, additive manufacturing can save substantial
amounts of energy, both in the manufacturing process and in the created
product. This is particularly relevant for industries requiring low-volume,
high-value parts, such as those in the aerospace, military, and nuclear
sectors. This is accomplished by AM eliminating production steps, reduc-
ing raw-material wastage, reusing by-products, and producing lighter,
110 Part 1
Barriers
Although additive manufacturing enjoys advantages over subtractive
manufacturing processes, it also retains significant limitations, especially
in production speed. The AM production process can require hours or
112 Part 1
Summary
Significant progress has been made in additive manufacturing in recent
years in offering enhanced flexibility, significant savings, and greater op-
portunities for innovation relative to subtractive manufacturing. There is
already talk of “4D printing”: printing products capable of changing
form or function over time in response to shifts in their environment.103
Although barriers to AM’s growth remain—such as the threat posed by
corruption of its production software—its overall prospects appear
promising. AM will not displace subtractive manufacturing anytime
soon, but it seems destined to increase its market share relative to SM,
while retaining the potential to greatly enhance, and perhaps transform,
military logistics.
Disruptive Technologies 113
CRISPR-Cas9
Several years ago, I was in a meeting on emerging technologies at the
Center for a New American Security in downtown Washington, D.C. The
center is a public-policy institute, popularly known as a “think tank,” spe-
cializing in national security affairs. Among the people present was Robert
Work, who had recently stepped down from his post as deputy secretary of
defense. Bob and I have known each other for decades, and I was pleased
to find myself seated across from him at the conference table.
The opening discussion covered familiar ground on technologies
such as directed energy, hypersonic propulsion, and robotics. Then the
conversation turned to something called “CRISPR.”
I had no idea what CRISPR was.
Glancing across the table, I could see Bob nodding knowingly as a
colleague spoke of his concerns that CRISPR could be a “game changer”
when it came to the security challenges confronting the United States.
Bob agreed, noting that the issue had attracted attention at the highest
levels of the Obama administration.
My approach in such situations where I am totally clueless about
what is going on is to listen closely to the conversation in the hope that
it will eventually reveal what is being discussed in terms that I can under-
stand.
No such luck.
After what seemed like an eternity—probably five minutes or so—I
leaned across toward Bob and asked, sotto voce, “Bob, what is CRISPR?”
“Gene editing!” came his whispered reply. “It’s a gene-editing tech-
nique that is revolutionizing the bio sciences.”
It was clear I had some serious homework ahead of me.
Bob, as he almost always is, was right. The prospects for disruptive
advances in synthetic biology had received a major boost with the dis-
covery of a new gene-editing technique based on a molecule, CRISPR-
Cas9 or simply CRISPR. CRISPR stands for Clustered Regularly
Disruptive Technologies 115
DNA to copy itself into the DNA from the unmodified parent, producing
an increase in the preferred specific trait from one generation to the next.
Over time, this change could spread throughout the population.
In this way, and in combination with other genome-engineering
techniques, CRISPR offers an unprecedented ability to improve agricul-
tural productivity and human health by enabling more effective pest con-
trol, enhanced nutritional properties, and crop variations that can be
grown successfully in areas with marginal soil quality.114 Theoretically,
CRISPR-enabled gene editing could lead to eradicating or curbing the
transmission of disease, such as when used against the species of mos-
quito that spread malaria.
Controlling the specific genetic variations introduced into plants
opens up a fundamentally new method of fashioning novel plant culti-
vars.115 Chinese researchers claim that such methods are enabling them
to develop a wheat strain resistant to powdery mildew, a fungal disease
that affects a wide range of plants.116 CRISPR has also aided researchers
in altering the genes of other crops, such as oranges, potatoes, rice, sor-
ghum, soybeans, and tomatoes.117
Crops produced in this manner could include those modified via
transgenesis—the introduction of foreign DNA into a plant genome—
which has characterized most of commercial plant biotechnology inno-
vation since the 1990s.118 Most of the global acreage planted with
genetically engineered crops today involves corn, cotton, soybean, and
canola. Pest-resistance and herbicide-tolerance traits are the dominant
features engineered into these crops. New genetic variations can be cre-
ated by identifying the precise DNA sequence modifications that are
wanted in the cultivated variety and then introducing them using
CRISPR.
Researchers are also using CRISPR to alter livestock genes. One ef-
fort focuses on reducing the loss of livestock to a virus that causes a
deadly form of swine flu. Another finds Chinese scientists employing
CRISPR in attempting to create pigs with a quarter less body fat than
normal pigs to produce livestock that are cheaper to raise.119
Implications
There are security risks associated with these emerging biotechnologies.
They are well expressed by Françoise Baylis, a Canadian bioethicist, and
worth quoting at length:
Disruptive Technologies 117
Simply put, bioethicists fear that in rushing to be the first to reap the
benefits of CRISPR, countries, organizations, or even individuals intent
on using these new techniques to alter a population’s genetic makeup
may trigger harmful effects—perhaps intentionally.
From a national security perspective, there are worries that rivals will
use these techniques to enhance their military capabilities, such as by
breeding humans with specific “enhancements,” such as a race of “super
warriors” to meet the demands of an authoritarian regime, like Stalinist
Russia or Hitlerite Germany, or those that exist today in countries like
China and North Korea.121 The Chinese Communist Party leadership
has shown few, if any, scruples in employing social engineering in ad-
vancing its agenda, which revolves around the CCP maintaining a
stranglehold on power.122 For example, the Chinese company BGI is
conducting large-scale gene-sequencing studies of very-high-IQ individ-
uals, reportedly as part of an effort to increase the Chinese population’s
IQ.123 (This raises an interesting question regarding the military poten-
tial of teaming “super-smart” individuals with advanced AI systems.)
In 2015, at the International Summit on Human Genome Editing, it
was agreed that researchers should be allowed to edit genes in human
embryos subject to regulation but that no pregnancy should be estab-
lished before dealing with questions of safety and ethics. The day before
the opening of the second summit in Hong Kong in November 2018, a
Chinese expert in DNA sequencing, Dr. He Jiankui, announced that he
118 Part 1
had done just that, resulting in the births of two Chinese babies with
modified CCR5 genes. The modification appears to offer some protec-
tion against infection from HIV but is also associated with slightly lower
life expectancy. It was generally agreed that Dr. He had not done any-
thing innovative, but as one of the pioneers in developing CRISPR, Dr.
Feng Zhang of MIT, stated, “The method has existed for several years
now, and we, as a community, have decided it is still too immature to
move to humans. But Dr. He pressed ahead anyway, and in a way that is
totally unnecessary. It is simply beyond belief.”124 One concern is that Dr.
He’s actions may result in mutations in nontarget genes and other unde-
sired changes in the babies’ DNA, which could have severe negative con-
sequences. These concerns notwithstanding, not long after, a Russian
scientist announced that he would use CRISPR in attempting to repli-
cate the Chinese gene-editing experiment on human embryos.125
Scientists are playing with fire. As with many emerging technologies,
technical hurdles must be overcome before CRISPR is capable of safely
realizing its full potential. Although CRISPR is very good at cutting out
faulty DNA, it is less effective at inserting new genes properly. It
can alter DNA in places where it’s not supposed to. It can also fill gaps
with random DNA that could “turn off” genes that may be needed.
Among the most significant challenges are those associated with reduc-
ing unintended—and unwelcome—genetic changes, known as “off-target
activity.” Such activity poses a number of potential risks, including in-
creased cancer rates.126 Moreover, even if “successful,” the consequences
of using gene drives to alter the genome of whole species may be difficult
to arrest, let alone reverse, should they trigger unanticipated negative
outcomes.127
Alas, as the actions of Dr. He remind us, instances when ethical con-
cerns have blocked the march of science for potentially malevolent pur-
poses are exceedingly rare. Consequently, it would be irresponsible for
defense planners to ignore the implications of CRISPR-Cas9 and other
advances in the biosciences.
Historically, biological weapons (or “agents”) were developed in lab-
oratories using natural resources. With advances in synthetic biology,
multiple techniques have been developed to synthesize and map the
DNA characteristics of biological agents.128 The genetic-engineering
techniques just described have the potential to synthesize infectious
diseases from scratch, produce them more cheaply and effectively, and
manipulate DNA to increase their pathogenicity.129
Disruptive Technologies 119
The biophysicist Steven Block notes that “genetic maps of deadly vi-
ruses, bacteria, and other micro-organisms already are widely available in
the public domain.”134 CRISPR kits are cheap, some costing under
$500.135 There are pathogen-specific kits, such as for West Nile virus,
human coronavirus 229E, and human adenovirus 35, sold with few con-
trols or restrictions. The manuals included with the kits contain only
modest cautions regarding the potential risks associated with their con-
tents.136 The use of CRISPR-Cas9 and other biological engineering tech-
niques could enable these pathogens to be modified. Such novel weapons
could theoretically be employed to target entire populations indiscrimi-
nately or to eliminate sectors of a population or specific individuals—a
kind of “precision” biological warfare.137
Henry T. Greely, director of the Center for Law and Biosciences at
Stanford University, warned, “Modified organisms might harm the envi-
ronment, whether through an accidental escape from the laboratory or
intentional release. Think of your least favorite invasive species—kudzu,
Dutch elm disease, the starling in the U.S., the rabbit in Australia. Ge-
nomic engineering could produce more. Even worse, terrorists (or crimi-
nals) could use this to make pathogens for biowarfare or extortion.”138
Nonstate entities, especially terrorist and millenarian groups, may be
especially attracted to this technology, given the minimal effort and re-
source expenditure required to acquire it and the declining levels of ex-
pertise needed to use it effectively. If they want to avoid being identified,
these groups may be emboldened by the forensic challenges posed in de-
tecting the employment of bio weapons. They may also find encourage-
ment from the generally poor performance of the world’s health
organizations in responding effectively to naturally occurring epidemics,
such as Ebola, SARS, and, more recently, COVID-19, and the willing-
ness of certain countries (China comes to mind) to actively block investi-
gation into the origins of disease.139
Consider a suicide bomber, for example, going through an airport
security system. With today’s sensors, this person will probably be de-
tected. Now imagine the same individual injected with a genetically en-
gineered virus capable of transmitting a highly virulent disease triggered
at her discretion. The chances of this person getting through security
without being detected would likely be much greater. By the time she
started showing signs and symptoms of an illness, she would already have
begun infecting people around her. The snowball effect of a cluster of
these infected suicide bio warriors could trigger a public health crisis.
Disruptive Technologies 121
viruses and bacteria is that they tend to evolve over time. Thus, there is a
risk that “precision” pathogens could become less precise in their effects
and, by evolving, produce unwanted “collateral damage” on nontargeted
groups and even trigger blowback.155
In summary, synthetic biology in general has enormous potential to
bring about dramatic improvements in the human condition. Yet, to
draw on Winston Churchill, if humankind fails to address the dangers
posed by advances in the biosciences, then it risks “sink[ing] into the
abyss of a new Dark Age, made more sinister, and perhaps more pro-
tracted by the lights of perverted science.”156
level. Aside from ballistic missiles, only a few other manmade devices,
such as the X-37B spacecraft, are capable of reaching hypersonic speeds,
with the U.S. rocket-powered X-15 being the only manned aircraft to
accomplish this.157
Work on hypersonic systems takes two principal forms. One involves
a “scramjet,” a “fanless” engine that uses the shock waves generated by its
speed to compress incoming air and ignite it to accelerate a vehicle, such
as a cruise missile, to hypersonic speeds. Hypersonic cruise missiles
(HCMs) use a solid-fueled booster rocket to accelerate to at least Mach
4. As the missile approaches or achieves hypersonic speeds, the missile’s
booster drops off, and the scramjet ignites. The scramjet includes three
components: an inlet that draws in the air surrounding the missile, a
combustor to burn fuel combined with that air, and a nozzle to release
the pressurized air to maintain the missile’s hypersonic speed. Unlike tra-
ditional jet engines, scramjets have no moving parts or machinery to di-
rect and combust air, making them highly efficient at propelling an
airframe at high speeds.
The second approach centers on a rocket-assisted “boost-glide” ve-
hicle (BGV) employing multiple-stage rocket engines to propel it into
the upper atmosphere—some twenty-five miles or so—whereupon it is
released. Its initial speed and high altitude enable the vehicle to maintain
hypersonic speeds without internal power, while the friction induced by
passing through lower atmosphere may slow the weapon enough to en-
able it to be guided accurately toward its target. This approach is being
pursued by DARPA with a weapon known as Tactical Boost Glide.158
Implications
Hypersonic missiles’ unusual trajectories enable them to approach their
targets at altitudes between twelve and fifty miles, below the altitude at
which ballistic missile interceptors are typically designed to operate but
above the altitude of air defense systems. Hypersonic vehicles can also ma-
neuver during their trajectory, making it extremely difficult for air and mis-
sile defenses to predict their future location in order to intercept them.159
Hypersonic missiles can do enormous damage. For instance, a hypersonic
weapon weighing 500 pounds, with an explosive charge in a rod casing be-
tween five and ten feet long made of ceramic and carbon-fiber composites
or nickel-chromium superalloys, would strike its target with tremendous
kinetic energy, the equivalent of three to four tons of dynamite.160
Disruptive Technologies 127
Barriers to Implementation
Given the potential of hypersonic weapons to trigger a major shift in the
military balance, it’s easy to see why the world’s leading militaries are
pursuing them. There are, however, formidable challenges that must be
overcome before they can be fielded, especially for hypersonic cruise
missiles. One of the biggest barriers involves getting combustion to hap-
pen in a stream of supersonic air. For scramjet engines to work, they
need to be moving at high speeds to compress air for combustion.
Consequently, scramjets must first be accelerated by piggybacking on a
jet plane or rocket. Assuming that this can be reliably accomplished, hy-
personic missiles face challenges with regard to accuracy and structural
integrity.164
Cooling is crucial in engines of all kinds. Even a commercial jet air-
liner’s turbofans operate routinely at around 400 degrees above the melt-
ing point of their component materials. An elaborate network of cooling
channels is needed to keep these engines from breaking up. The chal-
lenge is greatly magnified with hypersonic engines moving through the
air at speeds ten times faster than a commercial airliner. The higher lift-
to-drag ratios required for hypersonic missiles necessitates their having
sharp leading edges. This, combined with the missile’s extreme velocity,
can generate surface temperatures as high as 3,500 degrees Fahrenheit,
where the heat generated can erode the vehicle’s protective coating, fry
its electronics, and bend it out of shape.
There is also the matter of targeting and heat distribution. In some
hypersonic missile designs, the heat differential between the top and bot-
tom of the missile is so intense that it changes shape during flight, mak-
ing accurate targeting very difficult.165 3D printing may offer a solution.
If you want to make cooling vents using subtractive manufacturing, it re-
quires drilling holes in the material and hoping the process doesn’t com-
promise its structural integrity. To produce cooling vents in a 3D-printed
component, you simply program the printer to print the component to
have the openings in it from the start. Moreover, drilling cooling chan-
nels through subtractive manufacturing imposes far more limits on their
shape, while forming the channels with a 3D printer enables you to pro-
duce elaborate shapes that vent heat much more efficiently.166
There are yet other challenges to be solved. A hypersonic weapon’s
high speeds can also break up molecules in the atmosphere, creating a
field of charged particles (or “plasma”) around the vehicle, disrupting its
130 Part 1
ability to receive guidance signals from GPS and other sources. As the
U.S. Air Force’s Office of Scientific Research concedes, we “still don’t
completely understand the physics of hypersonic flight.”167
Summary
The development of hypersonic missiles, in both their cruise and boost-
glide versions, is consistent with a general long-term trend in the mili-
tary competition toward greater speed and range, often at the expense of
payload and physical protection. If hypersonic weapons perform as ad-
vertised, they may render today’s most advanced air and missile defenses
ineffective. They may be particularly effective against high-value targets
that are difficult to hide or harden, such as surface warships. Hypersonic
cruise and boost-glide missiles could also make a major, and perhaps de-
cisive, contribution to winning the scouting competition, such as by neu-
tralizing key nodes in an enemy’s battle network and by eliminating
ground-based ASAT systems and scouting platforms located at air bases.
Hypersonic weapons—especially if they achieve precision accuracy—
may trigger shock waves in the strategic balance. Their combination of
speed, kinetic energy, and precision accuracy reduces a defender’s warn-
ing time against attacks on bomber bases, missile silos, hardened subma-
rine pens, and underground command-and-control centers. The result
could be a further blurring of the distinction between nuclear and non-
nuclear forms of attack. It could also further increase the incentives for
preemptive attacks. For example, one of the U.S. military’s hypersonic
prototype missiles now being developed is designed to fly at speeds be-
tween Mach 15 and Mach 20, or more than 11,400 miles per hour. If
fired by U.S. submarines off the coast of Shanghai, they could strike any
target in China in less than thirty minutes.168 Correspondingly, a similar
Chinese hypersonic missile battery located near Shanghai could hit the
large U.S. airbase at Kadena, on Okinawa, in less than five minutes. Al-
though ballistic missiles can strike with even greater speed, hypersonic
missiles appear to have a significant advantage in avoiding detection and,
if detected, defeating attempts at interception.
There are significant barriers to fielding highly reliable hypersonic
weapons, particularly the cruise missile versions. The challenges associated
with hypersonic missile engine design and structural integrity are signifi-
cant, and it is not clear that hypersonic weapons will match the accuracy
of today’s precision-guided munitions. However, it would be foolish to
Disruptive Technologies 131
Quantum Computing
The term “quantum computing” (QC) was coined in the 1980s by the
Nobel laureate and physicist Richard Feynman, who raised the possibility
that quantum phenomena, such as exploiting subatomic particles’ “don’t
look and I don’t exist” characteristics, could process information.169
The idea of quantum computing gained traction thanks to the work
of Dr. Peter Shor, a mathematician at Bell Laboratories. In 1994, Shor
published a paper showing that a quantum computer could identify the
prime numbers that, when multiplied together, yield an exceedingly large
number. This meant that Shor had shown, at least in theory, that a quan-
tum computer could break the cryptographic protocols used to protect
military communications and key economic critical infrastructure, such
as those used to secure credit card transactions—an exponential leap in
computational capability over today’s computers.170
Quantum computing’s power is derived from the ability of quantum
bits, or “qubits”—a unit of quantum information—to do more than what
is done in classical computers, which alternate between zero and one. Qu-
bits are capable of existing in the “zero” and “one” state—and in both
states simultaneously.171 This extra mode is called “superposition,” a math-
ematical combination of both 0 and 1. It is the key to making qubits more
powerful than ordinary bits. But qubits alone cannot provide the massive
computational power promised by quantum computing. The qubits must
be “entangled.” A quantum entanglement is a highly counterintuitive phe-
nomenon that occurs when two qubits in a superposition are such that
certain operations on one have instant effects on the other, irrespective of
the distance separating them. This gives a quantum computer an enor-
mous advantage over a traditional computer, which needs to read and
write from each element of memory separately before operating on it. Put
another way, when the qubits are entangled, operating on one qubit in-
volves operating, in varying degrees, on all those qubits that are entangled
with it. Quantum computer algorithms use entangled qubits and their su-
perposition to create a shortcut through calculations. This allows them to
perform incredibly complex calculations at speeds far greater than those
that are possible today and to solve certain classes of problems that are
beyond the grasp of even the most advanced supercomputers.172
132 Part 1
Implications
Although quantum computers are not ideal for all computational prob-
lems, for some they can provide an exponential boost in speed, given that
their advantage over a classical computer increases at a highly nonlinear
rate with the size of the problem.175 For example, classical computers are
unable to simulate the behavior of atoms and electrons during chemical
reactions, as they are driven by quantum mechanics, whose complexity is
too great for classical computers to handle. If QC becomes practical, it
will probably be employed in simulating new molecules and chemical re-
actions that can aid in identifying substances that can be used for a wide
range of purposes, such as engineering lighter airplane parts, creating
more effective drugs, and designing better batteries.
So it’s not surprising that the German automobile makers Daimler
and Volkswagen are investigating quantum computing with the ultimate
goal of improving the chemical process in batteries for their electric ve-
hicles, while Microsoft is exploring how quantum computing can be used
to identify ways to extract carbon dioxide from the atmosphere to offset
global warming.176
From a national security perspective, quantum computers would be
ideal for code-breaking—penetrating the mathematics that are the basis
for the encryption securing military communications, as well as a coun-
try’s critical infrastructure, such as online commerce, including banking
and shopping. As alluded to earlier, these transactions are secured by
using an algorithm that uses factorization, or reverse multiplication, of
Disruptive Technologies 133
Barriers
The enthusiasm surrounding recent advances in quantum computing
after three decades of glacial progress is considerable. Google’s Harmut
Neven expects that by 2030 all machine learning will be running on
quantum computers. Some experts speculate that by then Google and its
leading competitors will be selling quantum computing services via the
cloud—and charging by the second.181
There are, however, skeptics who believe that QC optimists have
been overpromising. One is Jerry Chow, an IBM quantum-computer sci-
entist, who says that QC is “a bit like trying to balance an egg at the
end of a needle. You certainly can do it, but any little disturbance from
noise, from heat, from vibrations, and you’ve suddenly got yourself a
134 Part 1
sunny-side up.”182 Even Feynman warned, “If you want to make a simula-
tion of nature, you’d better make it quantum mechanical, and by golly it’s
a wonderful problem, because it doesn’t look so easy.”183 Indeed, signifi-
cant technical and practical challenges remain to building a quantum
computer and to using it to solve practical problems.184
One barrier is a quantum computer’s relatively high error rate, which
is due to noise.185 A classical computer bit is either one or zero. Even if
the value is slightly wrong due to noise in the system, today’s computers
can strip out variations in their inputs and produce clean, noise-free out-
puts. Not so with qubits. Recent research finds that the error rates for
two-qubit operations on systems with five or more qubits are more than
a few percent.186 Some enthusiasts argue that the problem can be ad-
dressed through error-correction algorithms. But such algorithms would
need additional qubits to check the work of the qubits running computa-
tions. This risks taking a trip down the rabbit hole, with some experts
estimating that checking the work of a single qubit will require an addi-
tional hundred!187
Still, theoretically speaking, there is nothing to prevent adding more
qubits to solve this problem. Quantum computing’s solution to address-
ing the errors problem centers on forming logical qubits using multiple
physical qubits. If so, a practical, useful quantum computer would need a
million or more qubits. Accomplishing this is a daunting task, so it be-
comes difficult to state with any confidence when it might occur.188
Another barrier is the so-called input problem. At present, there is
no method for rapidly converting a large amount of classical data to a
quantum state. For problems requiring large data inputs, the time
needed to convert the data would typically be far greater than the com-
putation time, potentially offsetting the quantum computer’s advantage.
The good news is that this problem goes away if the data can be gener-
ated algorithmically. The bad news is that designing quantum algorithms
is also proving to be challenging. Yet another barrier involves developing
quantum computing software, as well as methods to debug quantum
hardware and software.189
Summary
Quantum computing involves manipulating things at the smallest level of
energy in atoms, where physical behavior is often at odds with our under-
standing of how the world behaves. Owing to qubits’ unique superposition
Disruptive Technologies 135
Interesting Toys
In the late twentieth century, James Schlesinger was one of the United
States’ leading polymaths and strategists, traits that led to his serving in
administrations of both political parties, at various times, as defense sec-
retary, secretary of energy, and director of central intelligence.
Schlesinger also had a reputation as one who did not suffer fools
gladly—and his description of “fools” was quite expansive. For some rea-
son, he took a liking to me, and we would meet from time to time to dis-
cuss some research in which I was engaged. On one occasion, I came to
get his thoughts on directed-energy weapons—those producing concen-
trated electromagnetic energy to incapacitate, damage, disable, or de-
stroy enemy equipment, facilities, or personnel.
At the time, Defense Secretary Robert Gates, on whose policy board
Schlesinger and I were serving, had recently canceled the Air Force’s air-
borne-laser aircraft. The program called for a Boeing 747 armed with a
chemical laser to fly near an enemy country and use the laser to intercept
136 Part 1
ballistic missiles while they were in their “boost phase”—in the atmo-
sphere shortly after launching and before reaching outer space. The air-
borne laser was an idea whose time had not come. The laser itself relied
for its power on a vat of highly corrosive chemicals. A joke at the time
was that if the vat ever sprung a leak, the chemical mix might eat the
plane away before the pilot could land it.
Trying to avoid poking the bear, I mentioned to Schlesinger that re-
markable progress was being made with solid-state lasers that rely on
electricity—not chemicals—for their power. Schlesinger looked at me,
sucked on his pipe, and said, “Ah, yes. Lasers. Those interesting toys.”
I mentioned that there had been other “toys” that seemingly took for-
ever to bear fruit. Torpedoes, for example, took decades before White-
head’s version provided the accuracy and range that turned the maritime
competition on its head. Couldn’t this happen with lasers? Schlesinger re-
sponded by saying that, on this issue, he was “from Missouri.”191
Interesting Progress
Schlesinger’s skepticism notwithstanding, two major developments in re-
cent decades have increased confidence in directed-energy systems’ po-
tential to make significant, and perhaps profound, contributions to
military effectiveness. The first involves changes in expectations. During
the 1980s, lasers were viewed (unrealistically) as components in a “High
Frontier” space-based missile defense system contributing to the U.S.
Strategic Defense Initiative, designed to defeat a Soviet nuclear missile
attack. Over time, expectations were reduced, to where today the focus is
primarily on defending against threats like drone swarms or mortar sal-
vos and rocket barrages.
Second, directed-energy technology has advanced. During the 1990s,
major gains were made in fiber-optic telecommunications, and large
sums began pouring into their development. In the early 2000s, compa-
nies working on the technology began to look for new markets. They
discovered that industrial applications using high-power fiber-laser tech-
nology could be done very cost-effectively, such as with high-precision
cutting, welding, and drilling. At this point, militaries began to look at
how to combine fiber-optic communications and high-power laser tech-
nologies with an eye toward scaling them to weapon-class power levels.
Encouragement was provided in the form of lasers powered by elec-
tricity, not chemicals. As long as they are connected to an electrical
Disruptive Technologies 137
source, like a power grid or batteries, solid-state lasers (SSLs) and fiber
lasers can sustain their rate of fire. That being said, SSL and fiber-
laser power levels are not yet strong enough to defeat threats like high-
performance aircraft and high-speed cruise missiles, let alone hypersonic
or ballistic missiles.
Recent work involving individual fiber lasers shows promise. It’s be-
come possible to field laser weapons capable of defeating low-end threats
and to make them small and rugged enough to be deployed on combat
vehicles and ships. For example, the U.S. Navy’s Laser Weapon System
has been deployed and approved for operational use. The U.S. Army is
making encouraging progress toward fielding laser weapon systems for
countering rockets, artillery, and mortars. That being said, the United
States is but one of several military powers looking to field DE weapons.
Both China and Russia, along with U.S. security partners like Israel, have
well-established DE weapons programs. In some areas, their efforts may
match or surpass current U.S. efforts. Indeed, the Israelis may already be
using an advanced algorithm to combine several laser beams, forming a
strong beam with enhanced coherency capable of intercepting drones
and guided rockets.192
As noted earlier, space-based systems, especially those in low-Earth
orbit, are already vulnerable to laser ASATs.193 The PLA appears to be
pursuing laser ASAT weapons and may already have the ability to “daz-
zle” or disable satellite sensors. The U.S. intelligence community finds
that China will soon field ground-based laser weapons to defeat low-
orbit space-based sensors, if it has not done so already, as well as high-
power systems to threaten satellite structures.194
Like the Chinese, the Russians have been active in developing di-
rected-energy ASAT systems. In 2018, Russia’s military unveiled its
Peresvet laser system, positioning it near its mobile intercontinental bal-
listic missile launchers. The purpose, apparently, is for Peresvet to tem-
porarily dazzle or even blind passing rival satellites, thereby preventing
them from tracking the launchers.195
Lasers may also enhance military communications. Consider, for in-
stance, a battle network’s need to move high volumes of information se-
curely in the face of determined enemy efforts to block it. Lasers can
provide greater speed, data flow, precision-reception, and bandwidth
transmission than other forms of wireless communication. Moreover,
security is enhanced by their narrow beam, as the information in the
beam cannot be compromised unless the interceptor is directly in its path.
138 Part 1
This is in marked contrast to radio waves, which produce “lobes” near the
point of transmission that increase the possibility for an enemy to listen
in. Laser communications technology has been successfully tested at mod-
est ranges of ten miles. Proponents of laser communications believe the
technology can be extended significantly. If so, it may enhance a military’s
reconnaissance-strike complex by securely linking communications from
drones to aircraft, aircraft to each other, and these systems to ground-
based command-and-control centers.196
There are notable advances being made in the area of high-powered
microwave weaponry. These weapons achieved notoriety from a test con-
ducted in 2012 by the Counter-electronics High-powered Microwave Ad-
vanced Missile Project (CHAMP), which produced impressive results.197
The test, undertaken by Boeing’s Phantom Works, knocked out the tar-
geted electronic systems (computers and their monitors) along with the
cameras put in place to record the results. The systems were down for
only a matter of seconds, but depending on how a computer network is
configured and the kind of computers and peripherals employed, a
CHAMP-like weapon generating a larger electromagnetic pulse (EMP)
could disable a computer network, and other enemy electronic systems
such as radars, for a far longer period, perhaps even permanently.198
Barriers
Directed-energy weapon advocates look forward to the day when high-
powered lasers will provide effective defenses against cruise missiles and
aircraft, with laser interceptor “shots” costing about $1 each, compared
to some $3 million for the U.S. Navy’s SM-6 interceptor missile.199 De-
spite the progress made in directed-energy weapons, that day is unlikely
to arrive anytime soon, as there are formidable barriers that must be
overcome before they can achieve game-changer status in their ability to
transform the character of warfare. Most informed observers are still
“from Missouri.”
To begin, there remains the question of boosting a laser’s power to
be effective against more sophisticated threats. There is also the problem
of maintaining a laser’s “beam coherency”—the beam’s ability to remain
focused, rather than dissipating along with its power, as it travels through
the atmosphere, thereby limiting its range. Thus, lasers perform poorly
in bad weather and not at all in rainstorms. They are also as yet unable to
be employed against non-line-of-sight targets.
Disruptive Technologies 139
Conclusion
Today military-related technologies are advancing at an impressive rate
along a broad front. Advances in artificial intelligence, directed energy,
hypersonic propulsion, synthetic biology, and quantum computing,
among others, have the potential to bring about significant and perhaps
even disruptive shifts in the character of warfare.
These advances correlate well with the general trend in industrial
and information-age warfare toward emphasizing system speed and
range, and accurate (as opposed to volume) fires. Increased speed of ac-
tion is also enabled by the growing emphasis on cyber warfare, thanks in
part to advances in artificial intelligence, as well as the prospective vul-
nerabilities of some emerging capabilities, such as additive manufactur-
ing and artificial intelligence itself. Work on military systems employing
directed energy, such as anti-satellite lasers and hypersonic missiles, also
speaks to the focus on speed of action.
The boost in speed enables more effective engagements at enhanced
range. Hypersonic boost-glide vehicles could strike targets halfway
around the world. Land-based laser ASAT weapons can reach into space.
Cyber attacks can span the globe. And although it’s been said that quan-
tity has a quality all its own, the cost of range rewards accuracy relative
to mass when it comes to fires. This is certainly the case with respect to
hypersonic missiles and appears to be so for directed-energy weaponry,
although the latter do not employ kinetic energy to neutralize targets.
Cyber weapons constitute an outlier, as they make good on the informa-
tion age’s promise of the “death of distance.”
As the preceding narrative shows, it’s possible to develop a rough sense
of how these emerging technologies will change warfare. Forecasting how
they will combine with the technologies that enabled the Precision-
Warfare Revolution is another matter entirely. Simply put, there is great
uncertainty regarding how things will play out. For one thing, advances
in certain technologies and the military capabilities they may enable may
140 Part 1
—winston churchill
141
142 Part 1
new military revolution, are eroding efforts to deter general war. Ad-
vances in the cognitive and behavioral sciences find the challenge of con-
structing effective deterrence strategies even more daunting than
previously believed. Consequently, political and military leaders con-
fronted with disruptive shifts in the character of conflict must address not
only how to win the wars of tomorrow but even, more importantly, how
to meet the complex challenge of deterring them.
In the spring of 1986, Graham Allison, a renowned Harvard profes-
sor, was finishing up an extended consultancy for Defense Secretary Cas-
par Weinberger. Allison had been helping Weinberger formulate the
Annual Report to the Congress, known in the Pentagon as the “Posture
Statement.” It was a comprehensive, albeit unclassified, statement of U.S.
defense strategy, policy, resources, and programs spanning more than
200 pages.
With Allison’s departure, someone was still needed to fill his very
large shoes. The Army nominated me, and despite my modest shoe size,
after a series of interviews, I became Weinberger’s military assistant for
special projects, one of which involved overseeing the Posture State-
ment. The job gave me a perspective on how defense strategy was made
at the highest levels of government.
The last Posture Statement completed during my tenure was Defense
Secretary Frank Carlucci’s, submitted only months before the Berlin
Wall came down. It included a twenty-page discussion of the balance of
forces between the U.S. and its NATO allies and Soviet Russia and the
Warsaw Pact. These balances, both “regional” (such as the balance in
Europe) and “functional” (such as the strategic, or nuclear, balance) set
the stage for a detailed discussion of U.S. strategy that spanned nearly
forty pages. One could not help but be impressed by the quality and level
of intellectual effort that went into both developing and explaining the
strategy.
As it turned out, the Berlin Wall was not the only thing that came
down. The Cold War’s end and the rise of the United States’ unipolar mo-
ment made military strategy and defense planning seem less important. In
2005, the annual Posture Statement was replaced by “The National De-
fense Strategy.” The Pentagon managed to publish a twenty-three-page
version in 2008. A decade went by before the most recent version—an
eleven-page “summary”—was produced.
Quantity is not necessarily an indicator of quality, but considering
the progressive decline in the United States’ relative military standing
W(h)ither Deterrence? 143
over the past decade, it seems fair to view the Posture Statement’s demise
as a sign of strategic neglect. Given the importance of securing U.S. vital
interests without having to resort to general war, such negligence is diffi-
cult to understand. Indeed, great-power war in the industrial age in-
flicted enormous levels of destruction and human suffering. As Winston
Churchill was moved to declare following the First World War, “War,
today, is bare—bare of profit and stripped of all its glamour. The old
pomp and circumstance are gone. War is now nothing but toil, blood,
death, squalor and lying propaganda.”1 Churchill’s observation was con-
firmed in World War II, especially by the introduction of nuclear weap-
ons with their immense destructive power.
Emerging from the wreckage of two world wars and with the grow-
ing specter of nuclear Armageddon, the cost of waging general war had
become so high that there appeared to be no political gain that could
justify it. Shortly after the atomic attacks on Hiroshima and Nagasaki,
the strategist Bernard Brodie was moved to write, “Thus far the chief
purpose of our military establishment has been to win wars. From now
on the chief purpose must be to avert them.”2 Although deterrence strat-
egies stretch back to antiquity, they achieved greater prominence in the
nuclear age. For roughly three-quarters of a century, U.S. defense strat-
egy has rested on a foundation of deterrence to preserve its security
while avoiding general wars, both nuclear and conventional. The other
declared nuclear powers—Soviet Russia, Great Britain, France, and
China—either formally or informally appeared to accept the central role
of deterrence in their strategies.
Deterrence, in its simplest form, involves efforts to prevent a rival (the
“target”) from pursuing a proscribed action. Deterrence strategies seek to
influence the target’s calculation of the costs, benefits, and risks associated
with pursuing the proscribed action. Assuming a rational opponent—one
that acts to maximize its overall anticipated gains and minimize anticipated
costs—deterrence succeeds by convincing the target that it has an unac-
ceptably low probability of achieving its goals (deterrence through denial)
or that the costs involved in pursuing the proscribed action will exceed any
benefits derived (deterrence through punishment).
Deterrence prevailed through the Cold War. It was later discovered,
however, that on several occasions, the two superpowers came perilously
close to nuclear Armageddon.3 Following Soviet Russia’s collapse in 1991,
the United States’ military dominance constituted a strong deterrent to
any rival contemplating general war. But this dominance no longer exists,
144 Part 1
Known Unknowns
War between major military powers reveals the true value of military
systems, force structures, and the doctrines governing their employment.
The (thankfully) long absence of general war, compounded by the dis-
ruptive shift in its character triggered by the Precision-Warfare Revolu-
tion, has increased uncertainty with respect to the military balance. The
ongoing introduction of new capabilities described in Chapter 4 further
complicates political and military leaders’ calculations of cost, benefit,
and risk.
These factors heighten the chances that prospective belligerents will
reach significantly different conclusions regarding the risks associated
with pursuing a particular course of action. This will probably enhance
deterrence of risk-averse decision-makers. Decision-makers who are
highly risk tolerant, particularly tyrants, would appear more likely to as-
sume that uncertainties with respect to the military balance will work in
their favor, undermining deterrence where it is needed most.
the attacker’s prospective gains while reducing the risk of failure, eroding
the efficacy of deterrence through denial.
What about deterrence through the threat of punishment? If deter-
rence through denial fails, and the attack inflicts heavy damage, the vic-
tim state’s leaders will probably feel intense political pressure to retaliate
promptly. The ability of modern military organizations to wage war at
unprecedentedly high speeds may also compel a prompt response, lest
the means to do so are lost. What is needed is prompt—and accurate—
attribution of the attacker’s identity.
In each domain, identifying the source of an attack—especially
promptly—appears relatively difficult compared with attribution of large-
scale attacks in more traditional war-fighting domains, such as land, air,
and sea. The problem, for those who seek to deter through the threat of
retaliation, is that many states and perhaps even nonstate groups are ca-
pable of conducting significant cyber and bio attacks, and against targets
on the seabed. The growing number of space-faring nations and the
spread of directed-energy weaponry seem likely to complicate efforts at
timely attribution of attacks in this domain as well. Given the advantages
accruing to the attacker and the problems of achieving prompt, effective
attribution, risk-tolerant actors—all other factors being equal—will find
the prospective costs and risks involved in taking proscribed actions re-
duced, perhaps dramatically, weakening strategies based on deterrence.
Catalytic War
In a multipolar system with many actors in which the competition is of-
fense dominant and the prospects for prompt and effective attribution
are spotty, the risk of a “catalytic war”—one initiated covertly between
two states by a third party—may increase significantly. This occurs when
one state incorrectly attributes an attack to another state or nonstate en-
tity. The term was popularized in On the Beach, a novel from 1957 that
depicts a nuclear-proliferated world where an Egyptian nuclear attack
against American and British targets is misattributed as an attack by the
Soviet Union. A nuclear retaliatory attack is launched against Russia,
triggering Armageddon.24
The novel’s presumption of multiple actors; the diffusion of new, ad-
vanced weaponry; geographic proximity; and highly stressed early warn-
ing and C2 systems mirror the trends described earlier. For example,
consider a crisis between Israel and Turkey set in the early 2030s. With
W(h)ither Deterrence? 153
For those who only want to “watch the world burn,” deterrence through
denial is the only possible strategy. Moreover, if such groups or individu-
als lack sanctuary, they will be incentivized to employ their weapons as
quickly as possible, lest they be captured.
had prevailed, the experience would almost certainly have boosted their
optimism regarding their ability to navigate threats to their rule, both in-
ternal and external.35
Optimism bias may partially explain Hitler’s decision to reoccupy the
Rhineland while in a weak military position relative to Great Britain,
France, and Soviet Russia. It may also aid in understanding Stalin’s cut-
ting off U.S. access to West Berlin even as the Americans enjoyed a nu-
clear monopoly. Saddam Hussein’s decision to take on the United States
not once but twice suggests a belief in his ability to prevail in the face of
enormous odds, as does Mao’s decision to plunge China into the Korean
War barely a year after seizing power following a long civil war. Then
there is Khrushchev’s high-stakes gamble of deploying nuclear missiles
to Cuba despite clear U.S. warnings that it would precipitate a major cri-
sis. In summary, these leaders’ actions strongly suggest that each pos-
sessed a personality that believed all would turn out well even when
pursuing very risky enterprises. This suggests that tyrants may be espe-
cially difficult to deter.
Other recent advances in the behavioral sciences reveal that mem-
bers of markedly different cultures exhibit significant and, in some cases,
dramatic differences in their cognitive processes, including how they
view matters of equity, cost, benefit, and risk.36
In the 1990s, the anthropologist Joseph Henrich was researching an
assumption that humans all share “the same cognitive machinery—the
same evolved rational and psychological hardwiring.”37 His work found
him testing people from various cultures using the Ultimatum Game,
which has two players. Player A is given an amount of money, say, $100.
Player A must then offer Player B an amount of money, anywhere from
$1 to $100. Then Player B chooses to accept or reject the offer. If B ac-
cepts A’s offer, they each receive A’s proposed payout. If, however, B re-
fuses the offer, neither player receives any money, and both end up
empty-handed. Since Player A must offer Player B at least $1, both play-
ers stand to come out ahead if the offer is accepted: a classic “win-win”
result. Henrich knew that most American Player Bs tended to reject of-
fers from Player A that fell below a rough split of the money, even
though B’s financial situation would have improved by accepting it.
With this data in hand, Henrich began conducting the Ultimatum
Game with members of the Machiguenga tribe, which lives in the Peru-
vian Amazon. To his surprise, Machiguenga Player As’ offers were typi-
cally much lower than those advanced by their American counterparts.
158 Part 1
saw it, a lack of “fairness” in U.S. and Soviet overseas nuclear-armed mis-
sile deployments. The United States had deployed missiles in Britain,
Italy, and Turkey, and Khrushchev expected President Kennedy to accept
Soviet missiles in Cuba “as the Turkish missiles were received in the So-
viet Union.”43 When Kennedy did not, both sides moved to the brink of
nuclear war—the ultimate lose-lose outcome. At the time, the United
States enjoyed an enormous advantage in nuclear forces over Soviet Rus-
sia, and the U.S. missiles in Europe were a minor factor in nuclear mili-
tary balance. Despite Khrushchev’s inferior position and the irrelevance,
militarily speaking, of the U.S. missiles in Turkey, getting Kennedy’s
commitment to withdraw the missiles became a crucial sticking point in
negotiations to resolve the crisis. Yet Khrushchev persisted, primarily
due to his need to show that he and his country had been treated fairly
and honorably.44
It seems clear that factors relating to perceptions of fairness can
exert a significant influence on decision-makers when making choices
under conditions of risk. Could U.S. decision-makers today feel confi-
dent that they understand how the Chinese leadership or that of Russia,
Iran, or North Korea views the cost it is willing to pay to be treated in a
way that is “fair” or “honorable”?
T
he preceding chapters describe some prospective char-
acteristics of the maturing precision-warfare regime, as well
as those of an emerging military revolution. The shift in the
military competition’s character will probably be profound.
As such, a military’s ability to adapt on a grand scale—to demonstrate a
world-class competence in disruptive innovation—will be crucial to its
ability to gain a competitive advantage over its rivals.
How well positioned are the world’s militaries to win the race to
identify and exploit the “next big thing” in warfare? How might they im-
prove their odds of succeeding?
Insights on these questions may be found by examining periods over
the past century or so when militaries undertook disruptive innovation
to trigger a military revolution. By examining how these militaries suc-
ceeded, it may be possible to identify general characteristics of military
organizations with a high level of competence in pursuing disruptive in-
novation. These characteristics may be used to help identify how well a
particular military—and the militaries of its rivals—are positioned to
create a military revolution.
Although military revolutions have occurred periodically stretching
back over thousands of years, the emphasis here is on the late nineteenth
and twentieth centuries: the industrial and information ages. The four
militaries examined reflect different time frames, national military orga-
nizations, and branches of the armed services. The purpose is not to
write a new history of these militaries in the periods under investigation.
Many skilled scholars have accomplished that with varying interpreta-
163
164 Part 2
tions, to the point where in some cases we are now in post-revisionist pe-
riods. Rather, the effort here is to draw on their scholarship for a twofold
purpose: to understand how these militaries pursued disruptive innova-
tion, and to identify common features that emerge from their experience.
Four militaries are examined in general chronological order. Among
the factors examined are leadership; fiscal resources; military-technical
resources; the industrial base; investment strategies; field exercises and
experimentation; manpower; and external factors, such as the political
leadership, civilian oversight, and arms control. The four studies vary
considerably in length. This stems primarily from the length of the pe-
riod examined and, to an even greater extent, the level of complexity as-
sociated with the changes they pursued.
We begin in Chapter 6 with the British Royal Navy during an era of
overlapping military revolutions, spanning from the mid-nineteenth cen-
tury’s Steam and Iron Revolution through the so-called Fisher Revolu-
tion, a term coined by Nicholas Lambert that reflects the extraordinary
individual at its heart. During this period, Great Britain confronted major
shifts in the geopolitical and military-technical environment. In response,
the Admiralty, under Admiral John (“Jackie”) Fisher’s leadership, ex-
ploited the potential of emerging technologies—including those associ-
ated with new types of weapons, propulsion, and communications—and
operations in new domains to affect a radical shift in the fleet’s character
and capabilities in order to sustain Britain’s maritime superiority.
Chapter 7 tracks the German military’s pursuit of disruptive innova-
tion between the world wars. Following Germany’s defeat in World
War I, the interwar years saw its armed forces leverage advances in
mechanization, aviation, and radio to create mechanized air-land opera-
tions, popularly known as “Blitzkrieg.”
At the same time that the German military was transforming war on
land, the United States Navy was at the forefront in creating a military
revolution at sea, primarily through naval aviation, long-range radio, and
radar. Its successful efforts led to the battleship being eclipsed by the air-
craft carrier and the fast carrier task force, the subject of Chapter 8.
The examples conclude in Chapter 9 with the United States Air
Force, which led the way in introducing precision warfare. After suffer-
ing substantial losses during the Vietnam War and facing a growing
threat from advanced Soviet integrated air defenses in Europe, the Air
Force developed and fielded what Soviet military theorists referred to as
the first operational “reconnaissance-strike complex.”
Introduction 165
The first essential is to divest our minds totally of the idea that a
single type of ship as now built is necessary.
166
Fisher’s Scheme 167
Admiralty had not recalled a single ship from Britain’s huge Mediterra-
nean battle fleet or from its more distant squadrons deployed around the
globe. As the Times of London declared, “The Fleet . . . is certainly the
most formidable force in all its elements and qualities that has ever been
brought together, and such as no combination of other powers can rival.
It is at once the most powerful and far-reaching weapon the world has
ever seen.”1
For nearly a century, since the Battle of Trafalgar, the Royal Navy’s
supremacy on the world’s oceans had remained unchallenged. The fleet
had underwritten the establishment of the largest empire the world had
ever seen, covering one-quarter of all the territory on the globe and in-
habited by more than 350 million people. The fleet linked Great Britain
and its colonies and dominions, while protecting the global seaborne
commerce that enabled Britain to emerge as the world’s leading eco-
nomic power. Finally, as long as Britannia ruled the waves, it was safe
from invasion.
Yet despite the awesome display of naval might that warm June day,
it represented more a reflection of the century then passing than the one
to come. Just as Queen Victoria’s reign was coming to a close, so too was
the Pax Britannica. Soon the British would find their naval dominance
challenged as it had not been since Napoleon swept across the Conti-
nent. Shifts in the global power balance moved Great Britain to abandon
its aversion to seeking alliances and security understandings. In the two
decades following Victoria’s diamond jubilee, a disruptive shift in the
character of war at sea resulted in the Royal Navy undergoing a radical
transformation in its composition, capabilities, disposition, and approach
to war. This transformation vastly improved the navy’s effectiveness and
enabled it—albeit barely—to defeat an enemy with no naval tradition in
a form of warfare the Admiralty only dimly perceived.
Indeed, as Britain’s sea lords watched the fleet’s hours-long proces-
sion honoring the Queen, they had little idea that the coming years
would find the Royal Navy abandoning its time-honored practice of im-
posing a close blockade of enemy fleets in war; undertaking the whole-
sale decommissioning of more than 150 warships; introducing several
new warship types; creating a “combined-arms” line of battle; adopting
new forms of maritime operations; and exploiting the communications
revolution to realize fantastic increases in the fleet’s combat effectiveness.
The Royal Navy’s transformation was also a product of several other
key developments, principal among them Britain’s relative declining
168 Part 2
economic and industrial power, the emergence of three new naval pow-
ers, demands at home for increasing spending on social welfare, and the
genius of its greatest admiral since Nelson.
blockade the British Isles. Meanwhile, relatively small, distant station fleets
were assigned to protect Britain’s imperial interests. If trade were threat-
ened, the Navy would hunt down enemy commerce raiders and destroy
them. More passive, defensive means for protecting shipping, such as con-
voys, were rejected almost out of hand—even when they were shown to be
effective.4
Britain’s unsurpassed maritime industrial base was yet another source
of competitive advantage. The Admiralty could let its rivals set the pace
and direction of naval innovation, confident that Britain’s superior finan-
cial and industrial strength would enable it to overtake any adversary
seeking to steal a march on the future.5 At midcentury, however, the
French, looking to shift the maritime competition in their favor, ex-
ploited emerging technologies to fuel a naval revolution.
Admiral Nelson’s wooden sailing ships stood watch off enemy ports for
months and even years. Steam-powered ships, however, needed coal. But
coaling at sea was difficult, and impossible in bad weather, and steam en-
gines needed periodic maintenance. This meant that the Navy would have
to rotate the ships conducting the blockade. Thus, although blockade ap-
peared feasible, the combination of moving it farther offshore and the
fleet’s mechanization raised the price of doing business considerably.19
Along with the Russia war scare and the growth of the tsar’s navy, the
fleet exercises provided ammunition for those who advocated a bigger
navy. Further support came when the French began to establish torpedo-
boat bases, or points d’appui, from Brittany to Dunkirk to threaten British
shipping in the English Channel and dissuade any thoughts of close
blockade by “Perfidious Albion.”20 The Admiralty charged three admi-
rals, Sir William Dowell, Sir R. Vesey Hamilton, and Sir Frederick Rich-
ards, with studying the feasibility of maintaining a close blockade, how it
might be accomplished under the changed conditions, and the kind and
number of ships required.
“Charlie B”
At this time, in December 1888, Captain Charles Beresford introduced
his naval program. Beresford, an Irishman, was born in 1846 into nobil-
ity, the second son of John Beresford, the fourth Marquess of Waterford.
Tall and handsome, the future admiral looked—and acted—the part. He
was popular with his men, thanks to his well-deserved reputation for
generosity and his interest in their welfare. As commander of the gun-
boat Condor, he took part in the bombardment of Alexandria in 1882,
winning acclaim by maneuvering his ship to engage the Egyptian batter-
ies at close range. Beresford later took part in a failed expedition sent to
relieve the besieged British garrison at Khartoum in Sudan. While en
route, the British were attacked by Arabs. Beresford formed up with a
British square and fought with distinction.
But there was another side to “Charlie B,” as he was popularly
known. He also enjoyed—indeed, seemed to need—the limelight. He
could often be seen with his bulldog, and his admirers, of whom there
were many, thought him the personification of “John Bull,” Britain’s
“Uncle Sam.” When attention was not forthcoming, Beresford sought
ways to attract it. Born into privilege, Beresford exhibited a lifelong be-
havior of acting as though the Navy’s regulations did not apply to him,
176 Part 2
and that he did not need to heed the orders of its leaders. It’s not surpris-
ing, then, that Beresford combined two careers, one with the Navy and
the other, starting at the age of twenty-eight, as a member of Parliament,
where he served periodically over the next forty years. This enabled him
to take leave from military service and denounce the Admiralty as a
member of the House of Commons.21
Beresford enjoyed playing the role of a maverick reformer. Upon re-
turning from Sudan in 1886, he was again elected to Parliament. The
Prince of Wales (and future King Edward VII) lobbied the prime minis-
ter, Robert Salisbury, to find a suitable spot for Charlie B in his govern-
ment. Salisbury appointed him junior sea lord at the Admiralty, where
Beresford promptly alienated his superiors, eventually resigning his post
in January 1888.22 Returning to Parliament, Beresford began to criticize
the Admiralty, claiming that it was basing its requirements in the absence
of any well-defined strategy or policy. He argued that the government
should establish a definite standard for the fleet that would enable it to
meet the nation’s security and economic needs. Beresford called for a
Royal Navy able to defeat the fleets of two powers combined, one of
which should be France.23
Beresford was only echoing the concerns that led to the Three Ad-
mirals’ Committee. Many politicians and members of the military felt
that Beresford was using his platform in Parliament to attract attention
to himself and gain credit for the ideas of others. Although Charlie B
rarely offered any new insights on naval affairs and often spoke in a ram-
bling, incoherent manner, he had a knack for attracting large audiences
of devoted followers and was described by many contemporaries as “the
biggest of all recorded gas bags.”24 Indeed, Beresford’s observations were,
on occasion, wildly at odds with the state of the maritime competition.
At a time when guns capable of penetrating an ironclad’s armor at ever
greater ranges were coming into service and navies were rapidly aban-
doning the ram, Beresford declared, “In my opinion the ram is the most
fatal weapon in naval warfare—more fatal even than the torpedo.”25
Salisbury remarked to the Queen that Beresford “is too greedy of
popular applause to get on in a public department. He is constantly play-
ing his own game at the expense of his colleagues.”26 Charlie B continued
sniping at the Navy over the next two decades, even as he rose to the
rank of admiral. Ultimately, he would lead the so-called Syndicate of
Discontent that nearly derailed the Royal Navy’s massive effort to adapt
to the new ways of war.
Fisher’s Scheme 177
Africa and Asia. Here the Royal Navy confronted the fleets of Russia and
France. In time of war, fears were that the British fleet based at Malta
could be trapped between the French fleet to its west and the Russian
fleet to its east. Some officials advocated adopting a “Scuttle Policy,” re-
positioning the fleet from Malta to Egypt and Gibraltar and turning the
“Med Sea” into a “dead sea.” Successive governments refused to abandon
the imperial lifeline, moving instead to strengthen the fleet at Malta.
Still, during the Armenian crisis of 1895, the Admiralty, supported by the
majority of the Cabinet, refused to send the Mediterranean Fleet to
Constantinople should a Russian fleet attempt to force the Dardanelles,
over fears that it risked being cut off in the rear by the French.34
Indeed, during the quarter century that elapsed between the Two-
Power Standard’s adoption and World War I, there were periodic public
alarms over the vulnerability of the British fleet to this or that particular
state’s naval program. These alarms often credited potential enemies
with every warship type still on the active list, irrespective of its ability to
accomplish the missions prescribed for them, as well as every major war-
ship authorized in their future programs. In truth, neither the French
nor the Russians ever succeeded in completing their programs, nor were
they ever able to build as quickly or as cheaply as the British.35
Nevertheless, the British had legitimate cause for concern. The Rus-
sians increased their naval expenditures by 64 percent between 1889 and
1893, initiating construction on what were intended to be the fastest,
most heavily armed cruisers of their time. The Italians, with an eye on
the French naval buildup, began to construct battleships designed to ac-
commodate the world’s biggest guns. British apprehensions over French
and Russian naval strength were magnified by rising maritime powers in
Japan, the United States, and Germany. The Japanese fleet that would
destroy its Russian rival at Tsushima was already under construction by
the mid-1890s, and the first new American battleships had been com-
pleted.36 Britain was able to mitigate the challenge posed by these two
rising naval powers. As for the third, Germany, it would ultimately re-
quire the combined effort of all these countries, as well as France and
Russia, to defeat Berlin’s move to overturn the European balance of
power.
Parliament’s adoption of the Two-Power Standard sought to reassure
the British people that maritime supremacy would be preserved. At the
time of Queen Victoria’s diamond jubilee, however, an astute observer
would have identified major geopolitical, domestic, and military-technical
180 Part 2
Fisher
The Royal Navy’s fleet exercises led the first naval lord, Admiral Sir
Frederick Richards, to declare, “The invention of the locomotive tor-
pedo has introduced a feature into naval warfare which must render it a
madness for fleets to move in narrow waters or to remain at anchor in
exposed positions after nightfall when in the vicinity of torpedo flotilla
organizations.”42 To counter the threat, Richards turned to Jackie Fisher,
now a rear admiral and serving as the Navy’s controller (third naval lord)
responsible for procuring new systems and matériel.
Richards could not have made a better choice. Fisher, it will be re-
called, had been among the first to identify the torpedo’s potential, re-
turning from sea duty in 1872 to head the torpedo section at the Navy’s
gunnery school, which was also responsible for mine training. There
Fisher negotiated the purchase of the fleet’s first Whitehead torpedo. In
1879, as captain of the newly completed battleship Inflexible, Fisher was
primarily responsible for implementing the decision to introduce
breech-loaded guns. Like Beresford, Jackie, as he was popularly known,
had commanded a ship in the bombardment of Alexandria during the
Anglo-Egyptian War. Like Beresford, Fisher emerged a hero.43
From 1886 to 1890, Fisher served as the director of naval ordnance,
where he was responsible for developing the quick-firing guns that the
Admiralty hoped would, through sheer firepower, counter the growing
torpedo-boat threat. Fisher was promoted to rear admiral and assigned
to the Portsmouth dockyards as admiral superintendent, traditionally a
figurehead expected to refrain from engaging in management—a “back-
water” assignment, in today’s jargon. Apparently, no one told Jackie.
Under his command, the dockyards, which had grown both slow and in-
efficient, were transformed into the cheapest and fastest building yards in
the world for major warship construction. Fisher’s efforts were aided
considerably by the Royal Corps of Naval Constructors, established in
1883 and consisting of naval architects and engineers, along with skilled
electrical workers. As Fisher recalled, “I felt positive of the fearful loss to
the country in the slow construction of ships, and equally positive there
was a remedy by ruthless dealing with contractors, with dockyard em-
ployees, and with the distribution of labor, and, backed up by each of the
three First Lords I had the pleasure of serving with, and by ‘re-potting’
the chief constructors and other obstructionists, the time of building
a battleship of 15,000 tons was reduced nearly half!”44 The results were
Fisher’s Scheme 183
and then third sea lord and controller, stood as a central figure in the
Royal Navy’s efforts to maintain its maritime dominance in a period
of disruptive geopolitical and military-technical change. Having come
aboard a Navy of wooden-hulled sailing ships, he now served in a fleet
defined by steam and steel.
Yet if the naval competition appeared to have slowed in the mid-
1890s, it soon surged ahead. Advances in torpedo design and gunnery
and the emergence of the submarine, along with tectonic shifts in the
geopolitical environment, resulted in Fisher pursuing innovation on a far
grander scale.
A Broad-Based Challenge
The submarine’s maturation was matched by that of the torpedo. Obry’s
gyroscope had greatly enhanced torpedo accuracy. In 1905, the “Elswick
Heater” provided a major boost in torpedo range and speed. At the time,
Japanese torpedoes being employed in the war with Russia ran at less
than twenty knots to achieve ranges of around 4,000 yards. Less than a
year later, the German Navy’s G-type torpedo boasted a range of 6,560
yards and a speed of thirty-six knots.73
In looking back on these developments after the Great War, Admiral
Reginald Bacon described how the battle fleet would have to transform
itself: “This insidious and somewhat sneaking weapon had, in the inter-
vening years altered the whole of naval tactics, for its deadly menace had
forced the effective fighting range of ships up from the 3,000 yards or so
at Tsushima to some fourteen, sixteen, or even eighteen thousand yards
at Jutland. . . . A decision had to be obtained outside of torpedo range,
192 Part 2
A Geopolitical Revolution
At the time of the Queen’s diamond jubilee, Britain’s geopolitical posi-
tion was growing less favorable. The Dual Alliance powers, France and
Russia, continued dominating the Admiralty’s planning, particularly in
the Mediterranean. That being said, it could not ignore the emergence
of two rising naval powers outside Europe, the United States and Japan,
that could not be blockaded or brought to battle by the Mediterranean
or Home Fleets. The U.S. Navy had performed well in the war with
Spain in 1898, and its “Great White Fleet” would soon be heading
out on a world tour. The Imperial Japanese Navy, much of which was
being built in British shipyards, would soon demonstrate its prowess in
Fisher’s Scheme 193
the crucible of war. Then there was Germany, whose economy, like that
of the United States, had surpassed Britain’s, and whose kaiser was keen
on building a powerful modern fleet.
The waning of the Pax Britannica found Whitehall searching for dip-
lomatic means to shore up Britain’s geopolitical position and, in so doing,
relieve some of the stress on the Royal Navy’s global commitments
—and its defense budget estimates.75 Remarkably, within the span of
a few short years, the British engineered a diplomatic revolution that
saw France transformed from being the obsession of the Admiralty’s
fleet maneuvers to a quasi-ally, and the United States and Japan becom-
ing benign rivals and allies, respectively, with the latter effectively elimi-
nating the Russian fleet from the geostrategic board. That left only the
Kaiser’s rapidly growing fleet as the principal menace to British maritime
dominance.
only result sooner or later, in the loss of Canada, are the conclusions diffi-
cult to avoid.”77 Given this situation, Fisher advised the government to
“use all possible means to avoid such a war,” as “it seems an utter waste of
time to prepare for it.”78 As for Canada, which would no doubt be a prime
target in the event of war with the United States, the Admiralty’s
view was that Ottawa was effectively on its own and should do its best to
get along with its southern neighbor. Simply put, the United States
was not to be included in calculations pertaining to the Two-Power
Standard.79
Britain’s problem in the Far East was trickier. As noted earlier, when
the naval competition heated up in the 1890s, things changed, and France
and Russia began to station first-class warships in the Far East. In the
spring of 1898, the Royal Navy had three battleships and ten cruisers of
various descriptions in Chinese waters, while France and Russia together
had three major warships and twelve smaller ones. Germany seemed to
hold the balance between the two sides, with two battleships and five un-
armored cruisers. Japan, however, now possessed a navy that included
three battleships and twelve unarmored cruisers. Despite its relatively
small size compared to that of the major European maritime powers, the
Japanese fleet was deemed by the Admiralty to be “very formidable,” and
there was every prospect that it would continue to expand.80
Britain’s immediate response was to strengthen its squadron in
China with second-class battleships and to build a class of smaller battle-
ships that could move through the Suez Canal to reinforce its Far East
squadron. By 1900, however, the Russian squadron at Port Arthur in-
cluded six modern battleships. Despite the large cost involved, the Brit-
ish saw no alternative but to follow suit. Yet as in the Mediterranean,
both Whitehall and the Admiralty saw the Royal Navy’s dominant posi-
tion in the Far East eroding rapidly.81
By Britain’s excluding the U.S. fleet from the Two-Power Standard
and its implicit ceding of maritime supremacy in the Western Hemi-
sphere to the United States, the stage was set, at least in principle, for di-
plomacy to address the challenge in the Far East. Advocating an
arrangement with Japan, Lord Selborne argued that if Britain found it-
self at war with France and Russia, “the decisive battles . . . would cer-
tainly be fought in European waters,” and that the Royal Navy should
attempt to ensure that it amassed the strongest possible force in this the-
ater of operations.82 Selborne continued, “If the British Navy were de-
feated in the Mediterranean and the Channel the stress of our position
Fisher’s Scheme 195
The Kaiser saw what the numerical, material, and strategic superiority
of the Royal Navy could do during the Fashoda crisis between Britain and
France over control of the Upper Nile River. The crisis was the climax of
a series of territorial disputes in Africa between France and Great Britain.
In 1898, the French sent an expedition to Fashoda on the White Nile
River. Britain saw the expedition as a French move to control the Upper
Nile River basin that fed the Nile River. The French force met a far larger
Anglo-Egyptian force under Lord Kitchener. During the standoff between
the two forces, the Royal Navy began to mobilize its reserves. Given Brit-
ain’s maritime supremacy, the French would find it difficult to reinforce
their expedition if war broke out. Moreover, France, increasingly con-
cerned over Germany’s growing might, was hardly in a position to take on
Britain as well. In November, the French ordered their troops to withdraw
from the area. Observing France’s humiliating diplomatic retreat and the
key role the Royal Navy played in bringing it about, the Kaiser com-
mented, “The poor French. . . . They have not read their Mahan!”85
Until Kaiser Wilhelm II’s accession to the throne in 1888, Germa-
ny’s navy had actually been headed by an army general. Germany’s rapid
ascension to the first rank of maritime powers began in 1897, when the
Kaiser appointed Admiral Tirpitz as secretary of state of the German Im-
perial Naval Office. Tirpitz proved a master at dealing with the Reich-
stag, Germany’s legislative body, which held the purse strings for military
expenditures. His efforts quickly bore results. In 1898, it passed a naval
law authorizing construction of a seagoing battle fleet. At the time, the
German fleet barely rivaled France’s northern squadron or the Russian
Baltic fleet, and its modest mission centered on supporting the Army’s
flanks in the event of a war against France or Russia.86
In 1900, Tirpitz introduced a supplementary Navy Bill, arguing that
protecting German overseas trade and securing its recently acquired col-
onies required a battle fleet sufficiently powerful that even the greatest
sea power would not risk a war against it, lest it suffer losses that would
imperil its position against the world’s other maritime powers. This, as
Tirpitz famously articulated, was a “Risk Fleet.” The British Admiralty
became increasingly focused on the Kaiser’s fleet, especially since, “in
marked contrast to the gross venality and bureaucratic inefficiency pre-
vailing in the Russian service, the gadfly policies of the French and the
chronic inefficiency of the Italian navy, the German service was notori-
ously hard-working, was backed by great industrial strength and was
administered with single-minded determination.”87
Fisher’s Scheme 197
When war between Japan and Russia broke out in February 1904,
both the French and the British feared being drawn into the conflict on
the side of their allies while Germany stood on the sidelines enjoying the
spectacle. To allay these fears, London and Paris negotiated a series of
agreements signed in April 1904 resolving their differences in Asia, Af-
rica, and the Americas. The British viewed this Entente Cordiale as en-
abling both powers to better address the German threat. Over time,
however, it would blossom into the alliance that sustained the two an-
cient rivals through the Great War.88
The Japanese destruction of the Russian fleet at Tsushima, combined
with the Entente Cordiale, left Germany as Britain’s only major-power
naval rival. This made Britain’s challenge of maintaining a favorable
naval balance less stressful, in part by shifting the competition’s geo-
graphic focus. Sir Charles Ottley, director of naval intelligence, saw an
opportunity for Britain to leverage its positional advantage by emphasiz-
ing economic warfare against Germany: “In view of the geographic con-
ditions, the British Isles, lying like a breakwater 600 miles long, athwart
the path of German trade with the West and remembering the immense
strategic advantage of the French harbours so close to the mouth of the
Elbe, I believe there would be no practical difficulty in proclaiming and
maintaining an effective blockade of the entire German seaboard.”89
To sum up, in the span of little more than five years, British diplo-
macy and the Russo-Japanese War greatly improved the country’s geo-
strategic position. Old rivals France and Russia had been neutralized
through the Entente Cordiale and by the Imperial Japanese Navy, re-
spectively. Britain’s American cousins, though flexing their maritime
muscles, seemed content to focus on their recently won “empire” in the
Caribbean and the Philippines and following George Washington’s in-
junction to steer clear of foreign entanglements. Japan not only was a
British ally but had proved its value by disposing of the Russian fleet.
Only Germany possessed the means and motive to pose a major threat to
Britain’s maritime dominance.
competition stressed its financial resources. The British people were de-
manding expanded social services, and the Liberal Party’s rise to power
in 1905 stemmed, in no small way, from its pledge to meet this demand.
Its ability to do so, however, was threatened by the costs incurred by the
recently concluded Boer War, as well as the rising cost of military man-
power and matériel.
Despite the Royal Navy’s great stature, the British Army had, since
midcentury, enjoyed higher annual budgets.90 Defense expenditures bal-
looned during the Boer War, which lasted from 1899 to 1902. Early esti-
mates were that a conflict in South Africa would cost £5 million to £10
million a year. They quickly grew to £21.5 million. In 1900, expenditures
on the British Army rose to £44.1 million, surging over the following
two years to £92.4 million and £94.2 million.91 Owing to the expense as-
sociated with new technology and the relatively rapid obsolescence of
warships, the price of naval power was also rising dramatically. Between
1889 and 1900, the Royal Navy’s budget roughly doubled, to the point
where it absorbed more than a quarter of the government’s revenue—
and the Admiralty’s demands for ever larger budgets showed no signs of
abating. In the seven years prior to 1904, the naval estimates also nearly
doubled, from £22.5 million to £41.7 million. Adding insult to injury,
that year saw Britain’s economy in recession and tax revenue declining.92
It was also increasingly difficult to man the fleet. Between 1889 and
1904, fleet manpower had more than doubled, to 131,100. The introduc-
tion of advanced technology into new ships found the Royal Navy’s thirst
for skilled sailors seemingly unquenchable. Roughly three-quarters of the
seamen assigned to the battle cruiser Invincible, designed in 1906, required
“skilled” ratings, as compared with only one-third of the seamen manning
the armored cruiser Drake, designed only four years before.93 The prob-
lem was compounded in that it took the Royal Navy roughly six years to
qualify a seaman as a specialist and eight years to train an entire crew
from scratch.94 This was more than twice as long as it took to build a large
ship. Consequently, for the Royal Navy to keep its warships at a high
level of battle efficiency, it needed increasing numbers of experienced sail-
ors, as well as high reenlistment rates. Yet the Navy was experiencing
retention problems. Between 1900 and 1904, the Admiralty offered pay
raises and, in some cases, financial incentives to boost retention, with little
success. Thus, in 1904, at least a third of enlisted personnel had less than
five years’ experience. One of the most serious complaints among sailors
was the large amount of time they spent on deployments overseas.95 The
need to address this issue would become a significant factor in Jackie
Fisher’s Scheme 199
Fisher’s “Scheme” for redeploying Britain’s fleets when he became first sea
lord.96
Another major cause of the Navy’s manpower problems was simple
mathematics: maintaining the numbers of ships required to meet the
Two-Power Standard and patrolling the far reaches of the empire meant
that very few warships had been decommissioned, even though the con-
tinued broad and rapid advance in military technology had made many
of them of dubious value in combat.97 The Royal Navy was also com-
pelled to pay a significant overhead price, in terms of maintenance and
operating costs, to keep these ships in the fleet. These costs acted as bar-
nacles on a ship’s hull, slowing Britain’s ability to keep pace with the dy-
namic maritime competition.98
Given these trends, the state of affairs could not continue. In 1904,
Austen Chamberlain, chancellor of the Exchequer, called for reductions
in government spending, with particular emphasis on defense. He
warned, “however reluctant we may be to face the fact, the time has
come when we must frankly admit that the financial resources of the
United Kingdom are inadequate to do all that we should desire in the
matter of Imperial defense.”99
Politicians were willing to lend an ear to those who could sustain the
Royal Navy’s dominant position within the new fiscal constraints. This
meant looking for ways the Royal Navy could squeeze more value out of
every pound and shilling in its budget. It also meant seizing opportuni-
ties to transform substantially the character of the maritime competition
in ways that advantaged Great Britain, particularly by exploiting the on-
going rapid advances in technology, and especially if such actions could
impose disproportionate costs on its naval rivals.
The task of formulating British naval policy fell to Lord Selborne,
who was first lord of the Admiralty from 1900 to 1905. He, like the Lib-
eral opposition, was a strong supporter of the Navy but also saw the need
for economic reforms.100 In May 1904, Selborne offered the job of first
sea lord to Admiral Fisher, who offered not only to realize economies but
to maintain Britain’s naval primacy—but only if he could enact what he
called his “Scheme.”
Admiral Fisher
As noted earlier, Fisher, unlike most of his contemporaries, had a keen inter-
est in matters of strategy and technology, including their interrelationship.
In 1897, following his unprecedented five-and-a-half-year tour at the
200 Part 2
the prime minister, with Lord Esher serving as a member from 1906
to 1914.
Fisher’s character was as exceptional as his naval background. Born
in Ceylon into a family of modest means, he entered the Navy as a cadet
at the age of thirteen. He was short and stocky, standing about five feet
seven inches. Owing to bouts with dysentery and malaria, Fisher had a
yellow tint to his skin, and this, combined with his features and place of
birth, led his enemies to claim that he was part Chinese, calling him,
among other things, the “Half-Caste” and the “Yellow Peril.” Fisher
gravitated naturally toward nonconformists, mavericks, and radicals of all
kinds. He got on well with the two most notorious liberals of the time,
Winston Churchill and David Lloyd George, and once cheekily sug-
gested naming four of a new class of battleships Winston, Churchill, Lloyd,
and George.104
All who came in contact with Fisher were inspired—for better or ill—
by his enthusiasm. He once persuaded a group of captains to pull oars and
handle wet cable “as if once again they were midshipmen.” Dancing was
an old pastime of the Royal Navy, and Fisher was ready to dance with
anyone, male or female, at any time. If there was no music, he would
whistle or hum a tune. Fisher also had a way with senior leaders. While
serving as the captain of the Royal Navy’s most powerful battleship in
1881, he was introduced to Prime Minister William Gladstone at a Lon-
don party. Gladstone solemnly observed, “I really wonder the human
mind can bear such responsibility.” “Oh, sir,” Fisher responded cheerily,
“the common vulgar mind doesn’t feel that sort of thing.” Whereupon the
prime minister’s face “relaxed into a grim smile.”105 Fisher was fond of
claiming that the British were really the Lost Tribe of Israel. When it was
argued that they didn’t look much like the other tribes of Israel, he replied
that of course they didn’t, or they wouldn’t be lost!106
Fisher proved indefatigable in his work. At the Admiralty, he was
rarely at his desk later than five in the morning or gone earlier than nine
at night. On slow days, he would wander the halls with a sign around his
neck reading “i have nothing to do” or “give me something to sign.”
Yet despite his outsized personality, Fisher preferred to work behind the
scenes. He made only four public speeches in his life. Fisher typically
avoided fashionable London society, with a notable exception. Once a
quarter, he would meet for dinner with Lord Esher, a Liberal Party
member who was influential in military affairs, and Lord Knollys, King
Edward VII’s principal private secretary.107
202 Part 2
Jackie believed the Royal Navy’s dominance was a powerful force for
good and that if war should come, it should be employed ruthlessly to
restore peace. If a British fleet ever went to war under his command, he
assured everyone, nobody would be immune to its power. In speaking to
a British correspondent during a conference on disarmament at the
Hague, Fisher declared,
Fisher’s message: Britain and its Navy did not seek war, but if war came,
the fleet would wage it ruthlessly with every means at its disposal. The
same could be said regarding Fisher’s approach to implementing his
Scheme for transforming the Royal Navy.
The Scheme
In October 1904, Fisher assumed his duties as first sea lord. Like a long-
simmering volcano building up pressure before erupting, the following
months saw Fisher bursting forth with a range of initiatives designed to
transform the Navy. On his first day, Fisher produced a memo declaring
that Britain could sustain its maritime position “with a great reduction in
the Navy Estimates!”—but only if the Scheme was adopted without
modification. Fisher wanted “The Scheme! The Whole Scheme!! And
Nothing But The Scheme!!”109
The Scheme separated Fisher from the other naval leaders of his time.
It was a holistic vision of how war at sea was changing and the practical
Fisher’s Scheme 203
policies needed to enable the Royal Navy to adapt to preserve its dominance.
No vision is without flaws, and several were revealed over time; Fisher was
also unsuccessful in implementing “the whole scheme and nothing but the
scheme.” Yet the great changes he instituted, and they were more than a few,
produced a fleet that passed the ultimate test: achieving victory in war.
Fisher soon bound together a selection of his writings and circulated
them to a select group of naval officers. Titled “Naval Necessities,” it in-
cluded thirty-four essays, thirteen sets of tables, and nine appendices set-
ting forth Fisher’s vision. One paper, titled “The Fighting Characteristics
of Vessels of War,” declared “strategy,” not tradition, “should govern
the types of ships to be designed.” As for ship design itself, “the first es-
sential is to divest our minds totally of the idea that a single type of ship
as now built is necessary.”110
Challenging the primacy of the battleship of the line, Fisher argued,
“There is good ground for enquiry whether naval supremacy of a coun-
try can any longer be assessed by its battleships. To build battleships
merely to fight an enemy’s battleships, so long as cheaper craft [such as
torpedo craft] destroy them, and prevent them of themselves protecting
sea operations [through blockade], is merely to breed Kilkenny cats un-
able to catch rats or mice. For fighting purposes they would be excellent,
but for gaining practical results they would be useless.”111 Fisher’s vision
rested on three main pillars: constructing a new kind of capital ship, the
battle cruiser; employing a “flotilla defense” of the home islands; and
“plunging”: exploiting Britain’s superior industrial and technology base
to disrupt other navies’ ability to compete.
Fisher’s time in command of the Mediterranean Fleet gave him a
healthy respect for the growing danger of attempting close blockades
against an enemy naval base protected by torpedo boats, anti-ship mines,
and, if developments continued along present lines, submarines. Fisher
insisted that the number of destroyers be tripled to combat the guerrilla-
like attacks he anticipated from torpedo-armed craft in the event of war.
“If more destroyers are not obtained,” he warned, “we shall have the
Boer War played over again at sea. . . . To steam a fleet at night without a
fringe of destroyers is like marching an army without an advance guard,
flanking parties or scouts.”112
If torpedo boats were difficult to detect at night, Fisher expressed
even greater concern over the havoc that submarines would create once
they were introduced into the maritime equation. Writing to a fellow
admiral, Fisher declared,
204 Part 2
After departing his command, Fisher spoke at the Royal Academy, where
he predicted “the submarine-boat and wireless telegraphy”: “When they
are perfected, we do not know what a revolution will come about. In
their inception they were weapons of the weak. Now they loom large as
weapons of the strong. Will any fleet be able to be in narrow waters? Is
there the slightest fear of invasion with them, even for the most extreme
pessimist?”114
In a letter written in January 1904 to Rear Admiral Francis Bridge-
man, a member of the “Fishpond”—the name given to his group of
disciples—Fisher boldly asserted,
engines and handling ammunition. This enabled the crews to drill nor-
mally and periodically take their ship to sea for gunnery and tactical ex-
ercises, thereby maintaining their readiness at a fraction of the financial
and manpower costs required to fully man an active warship.128 Fisher
described his nucleus-crew system as “the keystone of our preparedness
for war.” The whole fleet, he said, was now “instantly ready. . . . Sudden-
ness is now the characteristic feature of sea fighting!”129 In announcing
the nucleus-crew initiative to the Cabinet, Selborne mentioned in pass-
ing that to free the needed manpower, “a certain number of ships
of comparatively small fighting value have or will be withdrawn from
commission.”130
Left unsaid was that this amounted to more than 150 ships.131
The redistribution was announced on January 1, 1905. In all, 154
ships were recalled, 90 to be scrapped and the remainder to be placed in
reserve. Fisher won support for redistributing major warships among the
three main fleets and for his battle cruiser concept, both of which sup-
ported his strategy of maneuver while reducing emphasis on forward-
based forces. Fisher did, however, have to make some compromises.
Selborne, more risk-averse than Fisher, insisted he retain eleven old
battleships.
As word spread throughout the Navy, a firestorm ensued. Admirals,
many of whom would later help form the Syndicate of Discontent, saw
Fisher as a traitor to the service. Not surprisingly, admirals on those sta-
tions slated for recalls complained bitterly. The China Station com-
mander charged that “British interests are much handicapped.” The
secretary of the Committee on Imperial Defense argued that declaring
ships unfit for fighting a war as Fisher did ignored the need for them to
support the Navy’s traditional role in carrying out “police duties in peace
time,” which it “must continue to do.” The secretary, however, did not
specify how this was to be achieved at the same time that major econo-
mies were being realized, or why such duties should have priority over
the fleet’s ability to prevail in war.132
Wireless
Fisher’s success in winning the political leadership’s support for the fleet’s
redistribution was, in no small way, enabled by rapid advances in com-
munications. Prior to wireless, information could be moved at high
speed through a telegraph network, which enabled the Admiralty to
Fisher’s Scheme 209
Fisher argued, more than offset by the quality and mobility of the fleet’s
new battle cruisers. The redistribution also exploited the positional ad-
vantage afforded Britain by its global basing posture and its network of
British-controlled wireless telegraph stations.137
The battleship of the olden days was necessary because it was the
one and only vessel that nothing could sink except another battle-
ship. Now every battleship is open to attack by fast torpedo-craft
and submarines. Formerly, transports or military operations could
be covered by a fleet of battleships with the certainty that nothing
could attack them without first being crushed by the covering
fleet! Now all this has been absolutely altered! A battle-fleet is no
protection in daytime because of the submarine. Hence what is
the use of battleships as we have hitherto known them? None!
Their one and only function—that of ultimate security of defense
is gone—lost! No one would seriously advocate building battle-
ships merely to fight other battleships—since if battleships have
no function that the first class armored cruiser cannot fulfill, then
they are useless to an enemy and do not need to be fought.138
range, and endurance? Without reservation, Fisher opted for speed and
long-range armament, specifically on uniform, big-gun armament that
would enable the Royal Navy’s capital ships to engage the enemy at ex-
tended range—and beyond the range of torpedoes.
Of course, the longer the range, the more difficult it is to hit the tar-
get, all other things being equal. Beginning in 1898, gunnery exercises
were conducted at ranges from 3,000 to 6,000 yards to improve accuracy.
Accurate fire control was made easier if the ship fired in coordinated sal-
vos, not independently. The splash from the fall of the salvo was ob-
served, and range adjustments were made until it matched the range of
the target. Since different caliber guns had different ranges, salvo firing
worked best when using guns of a single caliber. Long-range gunnery ex-
periments were carried out in both the Mediterranean and home waters.
In April 1904, it was concluded that effective gunnery at 8,000 yards was
possible, with the engagement beginning at 9,000 to 10,000 yards.139
To exploit an advantage in long-range fires, Fisher’s fast battle
cruiser (or, simply, “battle cruiser”) sacrificed armor in exchange for a
uniform all-big-gun armament—and with it greater engagement range—
and superior speed to rival battleships. And he let everyone know it, de-
claring, “There is no question whatever that the first desideratum in
every type of fighting vessel is speed. . . . It is absolutely impossible to ex-
aggerate the supreme importance of speed.”140 This combination of
range and speed, Fisher argued, would enable the Navy to dictate the
terms of battle:
The first desideratum of all is Speed! Your fools don’t see it—
They are always running about to see where they can put on a
little more armour! to make it safer! You don’t go into Battle to be
safe! No, you go into the Battle to hit the other fellow in the eye
first so that he can’t see you. Yes! you hit him first, you hit him
hard and you keep on hitting. That’s your safety! You don’t get hit
back! . . . The first of all necessities is Speed so as to be able to
fight when you like, where you like, and how you like.141
Fisher’s support for battle cruisers was part of his efforts to get out in
front of major shifts in battleship design. Some of Britain’s maritime ri-
vals were already moving to launch all-big-gun battleships. In the spring
of 1905, Congress provided the U.S. Navy with funding for two 16,000-
ton battleships, South Carolina and Michigan, each with eight 12-inch
guns. At that time, the Japanese were laying down two large 20,000-ton,
twenty-knot battleships of mixed armament, each carrying four 12-inch
and twelve 10-inch guns.142 The Royal Navy clearly needed to respond
to these developments, but how? With the battle cruisers, Fisher looked
neither to ape the competition nor to dominate it through superior
numbers alone.
But Fisher could not discount battleships entirely in favor of his bat-
tle cruisers. The political and institutional resistance was far too strong
for that. It also did not make strategic sense to abandon entirely the class
of vessels that for generations had dominated war at sea. Typical of
Fisher, he continued to support battleship construction, but for novel
reasons, which brings us to the HMS Dreadnought.
Upon becoming first sea lord, Fisher tentatively proposed before the
Committee on Designs that battleship construction be suspended in
favor of battle cruisers. Fisher would get his all-big-gun ships, but not all
of them would be battle cruisers. There would be a new battleship,
Dreadnought, incorporating radical advances in its design. For decades,
almost all battleships mounted four big guns. Dreadnought had ten. Most
battleships steamed at a maximum eighteen knots; Dreadnought, incorpo-
rating the new turbine engines in lieu of the then standard reciprocating
engines, could make twenty-one knots and sustain high speeds over
much longer distances—an important consideration given Britain’s far-
flung empire. Admiral Reginald Bacon enthused, “No greater single step
towards efficiency in war was ever made than the introduction of the tur-
bine. Previous to its adoption every day’s steaming at high speed meant
several days overhaul of machinery in harbour. All this was to be changed
as if by magic.”143 Remarkably, Dreadnought’s cost was only slightly
higher than that of earlier battleships. Yet its all-big-gun armament gave
it a long-range striking capability equal to two or three of them. More-
over, since a “dreadnought” only needed ammunition and spare parts for
one type of gun, further economies were realized.144
Fisher wanted the ship built in record time, and it was. Construction
began on October 2, 1905, and Dreadnought was commissioned for ser-
vice on December 3, 1906. Still, Dreadnought was not so much the core
Fisher’s Scheme 213
of Fisher’s revolution in the battle fleet as it was a useful adjunct. The ad-
miral’s true passion remained the battle cruiser.
Battle cruisers, both Fisher and Selborne argued, represented a
major new approach to naval warfare, owing to the great emphasis
placed in their design on high speed and long-range striking power. As
with Dreadnought and all preceding battleships, the new battle cruisers
would far surpass their immediate ancestors in ranged firepower. Where
existing battleships typically mounted four big guns, the battle cruiser
Invincible would mount eight, and its speed of twenty-five knots would
surpass Dreadnought’s by a full four knots. Selborne pointed out that once
these new ships put to sea, all the commerce-raiding cruisers of Britain’s
maritime competitors “would be hopelessly outmatched.”145
The three Invincible-class battle cruisers were laid down in the spring
of 1906. Unlike Dreadnought, the first battle cruisers were built in se-
crecy. To deceive the competition, however, Fisher did leak misinforma-
tion that the Invincibles would mount 9.2-inch guns. To his delight, the
three battle cruisers, armed with 12-inch guns, appeared nearly simulta-
neously between March and October 1908, creating a stir almost as great
as Dreadnought had. In armament, they were more powerful than any
battleship afloat except Dreadnought, to which they were not far inferior.
They were also much faster. In July 1908, the newly commissioned battle
cruiser Indomitable steamed across the Atlantic Ocean at an average speed
of twenty-five knots, validating the turbine engine’s promise.
Fisher’s New Model warships provoked more frustration in Berlin,
where Germany’s already obsolete cruiser Blucher was still under con-
struction. As with Dreadnought, Tirpitz once again had been outfoxed.146
As Fisher saw it, “You had to have Moses before Paul! You couldn’t
have had the New Testament without the Old first! The Dreadnought
paved the way to the Indomitable. It’s no use one or two knots superiority
of speed—a dirty bottom brings that down! It’s a d——d big six or seven
knot surplus that does the trick! then you can fight how you like, when
you like, and where you like!”147
In the 1909 program, with Fisher seeking to maintain his advantage
in long-range firepower and to address the ever increasing ranges of
modern torpedoes, he included a new battle cruiser class, Lion. It
boosted armament from 12-inch guns to 13.5-inch guns, nearly doubling
the shell weight that could be fired in a single broadside. The Lion-
class ships would be equipped with engines with almost twice the power
of earlier battle cruisers, increasing their speed from twenty-five to
214 Part 2
twenty-seven knots. Fisher proclaimed, “The ships we have just laid down
are as far beyond the Dreadnought as the Dreadnought was beyond all before
her! And they will say again, ‘D—n that blackguard! Again a new era of
Dreadnoughts!’ But imagine the German ‘wake-up’ when these new
ships by and by burst on them! 70,000 horsepower!!! And guns that will gut
them!!!”148
Long-Range Fires
Fisher’s vision of a transformed battle fleet presupposed that his ship’s
big guns could hit their targets at very long range with sufficient accu-
racy to prevail. This appeared to be a reasonable assumption, thanks to
recent advances in gunnery.
For decades prior to the late 1890s, the Royal Navy’s gunnery profi-
ciency ran a poor second to spit and polish. The long peace following the
Napoleonic Wars led to an emphasis on drill rather than marksmanship.
Although ever larger guns could hit targets at 6,000 yards, they seldom
did so in practice even at 1,500 yards. Thus, the default tactics remained
those of Nelson a century before: move to close range and pour over-
whelming fire at the enemy. Moreover, gunnery exercises were typically
unrealistic, with ships steaming at eight knots on a course firing at a tar-
get at a known distance, often around 1,500 yards.
For men like Fisher, advances in technology made this situation in-
tolerable. First, the introduction of guns capable of ever greater range
meant that the navy that first figured out how to hit accurately at long
range would have a major advantage over an enemy battle fleet. Second,
advances in torpedo range and accuracy were making engagements at
216 Part 2
Mines
By the early 1890s, the Royal Navy had developed automatic contact
mines, with Fisher and Ottley closely involved in the effort. Realizing
the dangers posed by mines, and with no countermeasure readily avail-
able, the Admiralty chose to let other navies make the first move in
adopting them. By the time Fisher became second sea lord in 1902, how-
ever, rival navies had already stolen a march. “What justification can we
advance for our apparent supineness?” asked Fisher. “If we do not adopt
them,” he wrote, “we shall lack one weapon possessed by our enemies,
which will be used against us and we shall not be able to retaliate in the
same manner. . . . We cannot afford to leave anything to be a matter of
opinion which affects, in the slightest degree, the fighting efficiency of
the Fleet.”161
218 Part 2
Plunging
During Fisher’s tenure as first sea lord, Britain possessed the world’s
largest, best-equipped, and most technically advanced warship industry.
It allowed Britain to build warships of cutting-edge design, faster and in
greater numbers than its rivals. This enabled the Admiralty to pursue a
strategy of the “second-move advantage” during the periodic disruptive
shifts in the naval competition during the nineteenth century. It was
France, not Britain, that first moved to launch steam-propelled warships
and ironclads. Even though Britain was fully capable of leading the tran-
sition, it held back so as to maximize its advantage in existing warships.
Similarly, the Admiralty sought to “ignore” the development of subma-
rines until a major naval rival introduced this new form of war at sea.
Fisher sought to preserve, exploit, and where possible, extend Brit-
ain’s industrial base supremacy. Typical of Fisher, however, was his deter-
mination to apply these advantages in a new way. He called his approach
“plunging,” and it was, along with the development of the battle cruiser
and flotilla defense, one of the Scheme’s three central elements. In decid-
ing to build Dreadnought and the battle cruisers, Fisher followed the tra-
dition of the second-move advantage to move quickly if a rival was about
to move first.163
But Fisher wanted to do more than react to the competition—he
wanted to shape it. He was looking to set its pace and direction. Dread-
nought was Fisher’s test case. Fisher publicized everything not classified
about the ship’s construction to paralyze rival navies. Through reforming
labor practices in the dockyards and ordering critical-path components
such as big-gun mountings and turbine engines several months before plac-
ing the contract for the hull, he dramatically compressed its construction
Fisher’s Scheme 219
time. A year and a day after construction started, Dreadnought began its sea
trials. Fisher had cut the normal building time for a battleship—in this
case, a radically different and more powerful battleship—by more than
half.164
Dreadnought disrupted the planning efforts of Britain’s principal ri-
vals, the Germans in particular. As Dreadnought was emerging from the
drawing board, Tirpitz was launching Deutschland, the first of five
planned new German battleships. These ships, with their 13,400 tons,
four 11-inch and fourteen 6.7-inch guns, and eighteen-knot speed,
would be inferior even to some of the Royal Navy’s pre-dreadnought
battleships. With Dreadnought, this class was already obsolete.
Tirpitz’s program was also stretching the limits of size in his ship de-
signs. A key limiting factor was the Kiel Canal, which provided the Ger-
man fleet with a shortcut between the North Sea and the Baltic Sea. If
Tirpitz wanted bigger ships, the canal would have to be enlarged, requir-
ing years of effort at enormous expense. Consequently, as news of the
planned size, speed, and armament of Dreadnought reached Tirpitz, near
panic ensued in Berlin.165
Tirpitz secluded himself for months with his most trusted advisers to
determine how best to respond. A consensus emerged that Germany
should meet the British challenge, even if this required expanding all ex-
isting canal and dock facilities. Thus, Fisher’s “plunging” strategy was
also a “cost-imposing strategy,” in that it exploited an enduring source of
German competitive weakness—the limitations imposed on ship design
by the Kiel Canal—to impose substantial cost penalties should Germany
decide to meet the British initiative. As Dreadnought was being built,
Fisher wrote, “An increase in the size of German ships will necessitate ei-
ther widening or deepening the Kiel Canal, possibly both, and its ap-
proaches, and also extensive dredging operations in their naval ports. . . .
It may, therefore, well be doubted whether Germany is at present in a
position to make a sudden advance to ships of 20,000 tons.”166 Fisher’s
gambit also imposed a penalty with regard to time. By moving the naval
competition in a dramatic new direction, Fisher cost the Imperial Ger-
man Navy roughly a year as Tirpitz reassessed his position.167
To Fisher, disrupting the naval plans of his rivals was intended to be
not a one-time affair but an ongoing practice. He hoped his battle cruisers
would continue promoting chaos in his adversaries’ shipbuilding schemes.
Later, he summarized his thinking on plunging to Churchill, who became
first lord in 1911, shortly after Fisher retired. By launching ships that were
220 Part 2
warships and the need to realize economies in the naval estimates meant
that fewer ships could be built. Between 1896 and 1904, the Royal Navy
contracted to build seven capital ships a year, on average. When Fisher
became first sea lord, however, budget projections called for no more
than four large ships to be constructed, on average, in the coming five
years, a reduction of more than 40 percent. Fisher’s plan to shift funds
away from capital shipbuilding and toward flotilla craft would only
worsen industry’s problems.
A major consolidation of Britain’s warship-building industry seemed
inevitable. Fisher wanted to avoid any major reduction in the industry’s
research and development budgets, the key to Britain’s ability to main-
tain a technological lead. He also needed an industrial base with the ca-
pacity to produce his new ships quickly and to surge production if
necessary.171 With these concerns in mind, Fisher reached an informal
(and illegal) agreement with the four most important shipbuilding firms
in the country.172 In return for their being granted an effective monopoly
on all major warship contracts, which included subsidies virtually guar-
anteeing the firms’ profitability, they agreed to maintain spare manufac-
turing capacity for critical components and to retain existing levels of
investment in research and development.173
France and Germany. Asquith pointed out that the Admiralty’s argument
for new capital ships assumed that Britain’s naval rivals would execute
their building plans, which could well be a “bluff” on their part.174 As-
quith said the French “paper program” would remain just that—a plan
that would not be fulfilled. As for Germany, he noted the Kaiser’s diffi-
culties in getting the Reichstag to approve his naval budget requests.
Why, then, should Britain lay down additional battleships?
Fisher’s response to the new government’s challenge essentially ad-
opted the claims of his critics, claiming that Dreadnought’s construction
had effectively restarted the naval competition from scratch. The Admi-
ralty Board noted, “With the introduction of the Dreadnoughts—a leap
forward of 200% in fighting power has been effected, so that as compared
with the dreadnought designs, all existing types of battleships are more or
less out of date.”175
Fisher confided to close colleagues that, in fact, Asquith was right.
He admitted, “our present margin of superiority over Germany (our only
possible foe for years) is so great as to render it absurd in the extreme to
talk of anything endangering our naval supremacy, even if we stopped all
shipbuilding altogether!!!”176
In a letter Fisher penned to King Edward in October 1907, he as-
serted, “The English Navy is now four times stronger than the German
Navy, . . . but we don’t want to parade all this, because if so we shall have
Parliamentary trouble. . . . [Prime Minister] Sir Henry Campbell-Ban-
nerman’s warmest supporters . . . have sent him quite recently one of the
best papers I have read, convincingly showing that we don’t want to lay
down any new ships at all—we are so strong. It is quite true!”177
But Fisher realized that Britain was in an open-ended rivalry with
Germany and that the alignment of other powers could change to Brit-
ain’s detriment as quickly as it had to its benefit. Thus, Britain needed to
sustain its world-class maritime defense industrial base. In July 1906, at
the height of Asquith’s challenge to the Admiralty’s shipbuilding pro-
gram, a private document drafted by the Admiralty Board concluded
that, should the Liberal Party follow through on its plans to reduce ship-
building, the long-term consequences for industry—and British mari-
time superiority—would be devastating. “A day will come when our naval
supremacy will again be challenged, and when, by consequence, the abil-
ity to rapidly build warships in considerable numbers will be a national
asset of incalculable importance. To starve the construction vote in the
Fisher’s Scheme 223
present will, should expansion ever again become necessary, not merely
inevitably enhance the cost of any future program, but will greatly im-
pair the national power of rapid naval recuperation in the vital matter
of our output of new warships.”178 Fisher knew that this argument for
maintaining—indeed, subsidizing—the armaments industry would not
fly with the Liberal leadership, either on fiscal or ideological grounds.
Another line of argument was needed. Hence, Fisher’s support for the
Two-Power Standard and the use of dreadnoughts as the principal mea-
sure of naval power was in no small way motivated by his strategy of
plunging and his desire for fast battle cruisers, rather than out of any
strong belief in the need to maintain a two-to-one supremacy in battle-
ships. Fisher also ensured that the first three battle cruisers were built in
private shipyards, knowing that any Liberal government move to cancel
the contracts would face strong political opposition.179
Fisher’s ability to advance his Scheme despite opposition from multi-
ple quarters was due in large measure to his ability to achieve economies
while providing the Liberal government with political cover by main-
taining the Royal Navy’s status as the world’s preeminent maritime
power. From 1906 through 1908, with Asquith serving as chancellor of
the Exchequer, Fisher produced savings in the shipbuilding budget. The
£8.4 million spent on battleships and armored cruisers in fiscal year
1905–6 dropped to £7.9 million in 1906–7, then to £6.5 million in
1907–8 and to £5.5 million in 1908–9. The slowing construction rate was
the result of Fisher’s plunging strategy’s “wrecking” the shipbuilding pro-
grams of rival navies, particularly Germany’s. Overall, and in spite of ris-
ing costs in other areas, Fisher was able to keep the net naval estimates of
1906–7 through 1908–9 between £31 and £32 million—£5 million less
per year than the peak of £36.9 million that had been reached in fiscal
year 1904–5.180
Yet, despite Fisher’s success, and perhaps because of it, attacks on the
Scheme, and on him personally, continued.
roughly 8,000 yards at which the battle opened, the bulk of the damage
sustained by the Russian fleet was at much shorter range. This stemmed,
in part, from the Japanese ships’ mixed armament, which made it impos-
sible for the gun-layers to spot their shells’ landings and adjust their aim.
Tsushima was won by a Nelsonic “hail of fire” and not long-range fires.
The war provided the world’s navies with an opportunity to assess
how the new technologies, systems, and tactics they had adopted would
fare in modern naval warfare. A long and spirited debate followed over
the “lessons” to be derived from the war, with much of the discussion
focusing on ship speed and engagement range, issues near and dear to
Fisher’s heart.
Fisher’s critics seized on the short range of the Tsushima engage-
ment to criticize his push for the all-big-gun battle fleet. But there was
more to the story. The Royal Navy’s observers found the Japanese fire-
control training and spotting to be poor. Moreover, a complete broadside
of guns of identical caliber would make a splash that was far easier to
spot than a fleet with mixed-caliber armament. This reinforced Fisher’s
argument for ships with uniform-caliber guns. Jackie also had his trump
card: the need for the line of battle to engage beyond the rapidly grow-
ing range of torpedoes.183
There was, however, no consensus on the value of torpedoes emerg-
ing from the conflict. They played no role in the Battle of the Yellow
Sea. In December 1904, however, the Japanese fired roughly 150 torpe-
does in a series of night attacks on the Russian fleet at Port Arthur. Al-
though only four hit their target, they sank the battleship Sevastopol and
fatally damaged the destroyer Storoshevoi. At the close of the Battle of
Tsushima, Japanese torpedo boats finished off Russia’s Baltic Fleet, sink-
ing or fatally damaging the battleship Sisoi Veliki and the armored cruis-
ers Admiral Nakhimoff, Vladimir Monomakh, and Dmitri Donskoi. Torpedo
skeptics tended to agree with Admiral Cyprian Bridge, who concluded,
“Perhaps nothing stands out more clearly in the campaign than the in-
significance of the results effected by locomotive torpedoes.” Others, like
Commander (later Admiral) Murray Sueter, a Royal Navy submarine
commander, countered that Japanese torpedoes suffered from mainte-
nance and technical shortcomings, along with an alarming failure to det-
onate when striking their target.184
Mines, on the other hand, were coming into their own. No battleships
were lost to mines at the Battle of the Yellow Sea, yet three had already
been sunk by mines. Japanese mines destroyed the Russian flagship,
226 Part 2
Petropavlovsk, on April 13, 1904, and Admiral Togo lost two battleships to
mines on May 15, 1904.185
Fleet Maneuvers
As the war between Japan and Russia was heating up, the Royal Navy
continued to conduct fleet maneuvers exploring ways to maintain a suc-
cessful blockade of enemy ports. The 1902 and 1903 maneuvers sug-
gested that such operations were becoming increasingly difficult due to
advances with torpedoes and submarines, and these concerns dominated
the Royal Navy’s 1904 fleet maneuvers. The Channel Squadron was di-
rected by its commander, Admiral Sir Arthur Wilson, to focus on anti-
submarine warfare (ASW) tactics. Captain Reginald Bacon, a budding
member of the Fishpond whom Fisher described as “the cleverest officer
in the navy” (and who would later serve as Dreadnought’s first captain),
commanded the “enemy’s” submarines. Bacon’s crews hit Wilson’s battle-
ships so many times with unarmed torpedoes that the umpires reluc-
tantly ruled two of his battleships “sunk.”186
The August maneuvers confirmed the submarine’s growing influence
on the naval competition and, correspondingly, the prospects for success-
ful blockade. They called for a superior “British” fleet with 106 destroy-
ers to operate within range of a strong “enemy” force of torpedo craft.
The exercises found the destroyers distracting Bacon’s submarines from
attacking the main battle fleet, but only at considerable cost to them-
selves, principally because no reliable method existed for a destroyer to
attack a submarine. Following the exercise, the “enemy” fleet com-
mander, Rear Admiral C. G. Robinson, concluded that close blockade
under modern conditions was becoming impossible.187
Fisher and Bacon felt vindicated in their view that commanders
would not risk major warships in narrow waters if they believed subma-
rines were present. Admiral Wilson was inclined to agree. Their views
soon spread through the Admiralty, as more officers began to accept that
close blockade was no longer an option against any port or base defended
by submarines. “Suffice to say,” Fisher declared in April 1905, “in three or
four years of this date . . . the English Channel and the western basin of
the Mediterranean will not be habitable by a fleet or squadron.”188
There was more distressing news for the Admiralty in the joint ma-
neuvers conducted with the British Army a month later. The exercise
called for landing a force of 12,000 infantry, cavalry, and artillery on a
Fisher’s Scheme 227
War Plans
In March 1906, Ottley urged Fisher to create formal war plans to pre-
empt criticism from Beresford, now commanding the Mediterranean
Fleet and slated to assume command of the Channel Fleet. The two
most well known officers in the Royal Navy apparently had a falling out
when, on December 4, 1905, the last day of the Balfour government,
228 Part 2
Fisher had little use for such reviews, given his dismissive attitude re-
garding the danger of a successful invasion of the British Isles.198 This was
reflected in his participation in the review, where his arguments were pre-
sented primarily for their political effect and not as a serious discourse on
strategy.199 Fisher happily shared the war plans that called for seizing vari-
ous North Sea islands to support close blockade operations and bombard-
ing German naval bases. These options were presented in great detail but
were quite incapable of being executed—and Fisher knew it.200
But he also knew that the political leadership wanted the comfort of
knowing that the Royal Navy would conduct an aggressive campaign
against Germany should war erupt. Although Fisher was convinced that
operating fleets of capital ships in narrow seas was too risky to venture—
indeed, his concept of flotilla defense and distant blockade was the
Scheme’s response to this danger—Fisher gave the politicians what they
wanted to hear and escaped serious damage at the hands of those, like
Beresford, who sought to depict the Admiralty as unprepared. Years later,
Fisher admitted that the plans had been produced solely for the con-
sumption of his critics. Referring to Sir Arthur Wilson, who succeeded
him as first sea lord, Jackie confided, “Not being a Machiavelli, [he]
wouldn’t tell the Cabinet anything. I, on the contrary, told them so much
they thought me perfect. I gave them 600 pages of print of war plans!”201
The war plans were updated in 1908, but these “W” plans were only
marginally different from the Ballard Committee’s work on the previous
year’s “ABCD” plans. Both the W1 and W2 plans called for British heavy
warships to keep out of the North Sea. In August 1908, after meetings
with King Edward’s private secretary and Admiral Fisher, Lord Esher
stated, “J. [Jackie Fisher] told me of Arthur Wilson’s determination, in the
event of war with Germany, not to locate his battle-fleet in the North Sea.
The rendezvous would be in the Orkneys, and there the fleet would lie,
ready for battle. Only Cruisers and Destroyers in the North Sea.”202
Despite objections from Wilson, Corbett, and others that close
blockade was impractical, Plan W3 called for such operations. The Strat-
egy Committee opposed W3, noting, “It is fraught with greater possibili-
ties of danger to the blockading squadrons than the system cordons
across the Straits of Dover and across the northern entrance to the
North Sea.”203 But, again, Fisher’s “war plans” were primarily used for
warding off criticisms from his bureaucratic and political rivals. His
candid thoughts on operating the battle fleet in the North Sea, let
alone having it engage in close or observational blockade, were set forth
Fisher’s Scheme 231
Fisher supported Admiral Wilson’s position that the battle fleet should be
kept out of the North Sea and advocated flotilla defense, pointing out, “It
would be suicide to expose the armoured units of our Fleet to a surprise
Torpedo attack by stationing them before War within striking distance of
the enemy. . . . At such time the North Sea should swarm with our De-
stroyers and Submarines backed with their supporting Cruisers.”205
Fisher shared his views with King Edward with such passion that, for
his Christmas present in 1909, the monarch sent him a silver model of a
submarine. Beamed Fisher, “He thinks I’m mad about them.”206 Indeed,
he was.
Following the Ballard Committee’s work, the Channel Fleet’s June
and July 1907 maneuvers explored close-watch operations on enemy
ports as called for in Plans B and C. The “friendly” force composed of
the Fifth Cruiser Squadron and accompanying destroyers was tasked
with watching the “enemy” fleet under Beresford, who had orders to
break out of his base unobserved. The exercise was a botch. The
“friendly” fleet failed to maintain a fix on the “enemy,” while the latter
failed to engage its rival. The maneuvers’ second phase found Beresford
again commanding the “German” fleet with the objective of crossing one
of two sea zones without being brought to an engagement. He did so, re-
vealing shortcomings in the Royal Navy’s scouting operations. The ma-
neuver’s final phase explored a blockaded fleet employing a torpedo
232 Part 2
attack prior to breaking out from its base. Beresford’s “German” fleet de-
stroyers slipped out undetected and located the “British” fleet, again in-
dicating a scouting problem. This led Beresford to conclude that
conducting an observational blockade would require the “friendly” fleet
to employ “two to three times the number of seagoing Destroyers” as it
had for the exercise.207 Fisher, of course, was not planning to employ an
observational blockade in the event of war.
The July 1908 maneuvers once again found the “German” fleet under
Beresford tasked with preventing a superior but divided “British” fleet
from concentrating. The exercise proved a failure, and Sir Arthur Wilson,
observing the maneuvers, was highly critical of both commanders.208
The following April, noting that the next two largest rival navies were
now Germany and the United States and that the United States was a
friendly power, the government for planning purposes privately adopted
a one-power standard, calculated as being equal to Germany’s capital
ships plus a margin of 60 percent. On December 29, 1911, McKenna’s
successor, Churchill, proposed that the 60 percent standard be formally
(and publicly) adopted, and three months later, he announced it to the
Commons.
In the summer of 1909, however, Austria-Hungary expressed its in-
tention to build three and possibly four dreadnoughts. This led the Ital-
ians to augment their shipbuilding program to four dreadnoughts.
Although each regarded the other as a potential enemy, both countries
were Germany’s allies. From the Admiralty’s perspective, this meant con-
fronting thirteen German dreadnoughts in the North Sea, plus roughly
half that number or more Austrian and Italian dreadnoughts in the Med-
iterranean. In July 1909, McKenna announced that the contingent four
dreadnoughts would be built. The decision moved Churchill, who had
advocated only building the original four ships, to observe, “In the end a
curious and characteristic solution was reached. The Admiralty had de-
manded six ships; the economists offered four; and we finally compro-
mised on eight.”210
The Inquiry
As work on the Scheme progressed, it confronted growing challenges on
multiple fronts from individuals and organizations whose interests and
preferences were threatened. We have seen Fisher’s apparently inconsis-
tent behavior, such as his dismissive views on the Two-Power Standard
and building more dreadnoughts—unless they could help sustain the de-
fense industrial base—and his cranking out war plans that honored the
Navy’s traditions of close blockade and offensive action, even though his
true views were quite different. Such behavior stemmed in no small mea-
sure from Fisher’s delicate balancing act, which focused on protecting
the Admiralty’s budget from being raided by the Army, gutted by the
politicians, or diverted away from the Scheme’s priorities by admirals
whose affection for the past blinded them to the dramatic changes under
way in the maritime competition.
The politicians, of course, were constantly pressing for Fisher to
generate savings from the scheme, and he was able to do so and keep
234 Part 2
and distant blockade. Beresford’s Channel Fleet, with the main battle
fleet, would stay in reserve. Beresford, however, believed the threat from
torpedoes overrated and rejected Fisher’s strategy.218
In October 1907, Beresford conducted a series of fleet exercises to
test his ideas for blockading the Heligoland Bight off the German coast.
The maneuvers confirmed his earlier experience in similar maneuvers
that the Channel Fleet required vastly more “small craft”—small cruisers
and destroyers—to maintain an effective blockade of German ports at
night. Exercises conducted the following year by Vice Admiral Sir Fran-
cis Bridgeman’s Home Fleet appeared to support Beresford’s conclu-
sions, as well as those of the 1906 maneuvers, that the blockading force’s
small craft should outnumber the blockaded fleet’s craft by a ratio of
three to one. If true, Beresford would require roughly 300 of these ships.
The cost of building and manning such a force in peacetime was prohibi-
tive. Indeed, it was one of the principal reasons why Fisher had moved
toward flotilla defense.
Ballard found Beresford’s strategy nonsensical, pointing out that
Beresford had placed his fleet in danger for no good reason, risking
heavy losses from the “enemy’s” destroyers.219 In other words, Charlie B
was proposing to achieve at great cost, through close or observational
blockade, the same effect that could be obtained, at far less cost, through
flotilla defense and distant blockade.
Beresford’s sniping continued unabated throughout his command,
which he left in March 1909. Although his tour of duty would typically
have run another year, the Admiralty finally tired of his insubordination.
But truncating his command, and thus his career, did not silence Beres-
ford. On April 2, he wrote a letter to Prime Minister Asquith citing the
Admiralty’s numerous alleged shortcomings, including a failure to con-
struct sufficient small craft, strategic incompetence in the fleet’s distribu-
tion, and an absence of adequate war plans. Beresford intimated that if
Asquith failed to take appropriate action, the letter would be pub-
lished.220 Asquith caved and decided to resolve the matter by personally
chairing a subcommittee of the CID to explore Beresford’s allegations.
to investigate an internal Navy matter was both highly irregular and in-
appropriate, as it allowed a subordinate, Beresford, to challenge his chain
of command and its authority. But it was clear that Asquith was less con-
cerned about Beresford’s insubordination or the true state of Britain’s de-
fenses than about protecting his political flanks. Not one witness
appeared at his request. Whenever it was possible to skirt an issue, he
did.221 Wherever possible, he left issues unaddressed.
In the hearings, Beresford derided Fisher’s strategy as a “pedagogue
plan.” Reflecting the Royal Navy’s offensive tradition, he found distant
blockade to be “a defensive policy that we cannot afford to adopt.”
Beresford argued, “We have got to have an attacking policy. . . . We have
got to watch the enemy’s coast with watching cruisers; they [the Ger-
mans] have only two egresses, and when they come out the Admiral
should know they have come out.”222 He went on to criticize Fisher’s
scrapping of more than a hundred small cruisers that, Beresford argued,
were needed for close blockade work.
Replying for the Admiralty, First Lord McKenna explained to the
committee that the battle cruisers had rendered the old cruisers obsolete.
Moreover, McKenna added, submarines had assumed the mission for-
merly held by small cruisers. That is to say, if an enemy’s ports were to be
blockaded, it would be accomplished by submarines, not small cruisers.
As Captain Ballard, a member of the Fishpond, concluded, “It is evi-
dent that he [Beresford] entirely fails to grasp the main ideas. These
cruisers are not watching cruisers in any sense of the word as regards
watching for the exit of the enemy’s fleet, but placed solely to intercept
[the enemy’s] trade. . . . Our object is to force them [the enemy] to pro-
ceed a distance of more than 300 miles from their own sheltered base to
defend their trade and then fall on them when outside, or cut off their
retreat.”223 Beresford drew a clear line between his views and Fisher’s
Scheme and declared that he “attached no importance to submarines.” As
Charlie B elaborated, the logic behind his position proved difficult to
discern. “A propos of what I said with regard to shortage [of cruisers], if
the submariners are to take their place, I want to point out that all sub-
marine warfare is entirely theoretical. I will not say they will not ‘put
down’ ships, but they will not revolutionise [naval] warfare unless the
Admirals are afraid of them. . . . Now the submarine is always in a fog.
The one thing that beats a seaman on the top of the water is a fog. So it
is entirely theoretical.”224 Beresford eventually admitted that he had
never seen a submarine at sea, even though he had recently spent more
238 Part 2
than two years commanding the Navy’s premier battle fleet.225 His pre-
sentation bordered on incoherency at times, bringing to mind
Churchill’s observation of Charlie B: “When he gets up, he does not
know what he is going to say; when he is speaking he does not know
what he is saying; and when he sits down he does not know what he has
said.”226
Finally, Beresford tried to prevail in the debate by calling on the re-
tired admiral of the fleet Sir Arthur Wilson to support his contention
that the fleet was “dangerously short” of destroyers and small cruisers. It
was generally accepted that Wilson, who had spent the previous five
years commanding the Navy’s largest fleets, was “the finest Admiral of
his day in command of a Fleet, . . . scrupulously just and extraordinarily
level-headed.” Presented with Beresford’s argument, Wilson balked.
When Beresford persisted, Wilson finally replied, “My point is that, as I
do not want to work over the on German coast [close blockade], I do not
want so many.” Despite Beresford’s pressing him on the point, Wilson
replied, “I say I would work on our side in the North Sea [distant block-
ade].” When Beresford complained that the Admiralty had not supplied
him with war plans, Wilson discounted their value, echoing Helmuth
von Moltke in declaring that he was “perfectly certain that any plan
drawn up in peace would not be carried out in war,” finding the value of
drawing up plans primarily educational. Beresford’s gambit of calling on
Wilson had backfired. As one observer concluded, Wilson “does not be-
lieve in Charlie’s strategy—he does not believe in going over to the Ger-
man coast and watching there day and night.”227
Despite Beresford’s poor showing, Asquith went out of his way to
issue a “General Conclusion” that was critical of Beresford and Fisher.
The committee found that “during the time in question no danger to the
country resulted from the Admiralty’s arrangements for war, whether
considered from the standpoint of organization and distribution of the
fleet, the number of ships, or the preparation of war plans.” It found that
“Lord Charles Beresford . . . failed to appreciate and carry out the spirit
of the instructions of the Board and recognize their paramount author-
ity.” Remarkably, Fisher was implicitly censured for not adequately con-
sulting Beresford during his time in command, implying that Beresford
should have had a veto over his superior’s decisions.228
For Asquith, it was the politically correct thing to do. Despite the
weakness with which Beresford presented his case, he was seen as the
leader of the traditional wing of the Royal Navy and had a great deal of
Fisher’s Scheme 239
public support for his views as well. For Asquith to come down on
Fisher’s side would have been politically risky.229
Beresford considered himself the victor and acted accordingly. He
declared his intention to run for a seat in Parliament and lobbied the op-
position Conservative Party to appoint him as first sea lord to succeed
Fisher should they regain power in the next election. Fisher stewed, writ-
ing to a fellow admiral, “The Committee, by not squashing Beresford
when they had the chance and so utterly discrediting him thereby in the
face of all men, have given Beresford a fresh leash of insubordinate agita-
tion. Had they smashed him, as they could have by the evidence, as a bla-
tant liar, he would have been so utterly discredited that no newspaper
would have noticed him ever again.”230
The findings effectively undermined both Fisher’s authority and
public confidence in the Board of the Admiralty. There was a growing
sentiment that it was time for “Radical Jack” Fisher to go. And so he did.
Fisher retired on January 25, 1910, after fifty-five years’ service. He
did exact some measure of revenge against his tormentor Beresford.
King George V, a friend of Charlie B, urged Asquith to appoint Beres-
ford as first sea lord. McKenna, however, succeeded in blocking the
move in favor of recalling Admiral Wilson to active service. McKenna
was determined that Fisher’s successor sustain the reforms that had been
undertaken during his tenure. Although recalling a retired admiral to ac-
tive duty in peacetime was unusual, Wilson had many qualities that made
him an attractive choice. Fisher was very pleased with Wilson’s selection,
in part because he was not a member of the Syndicate of Discontent and
also because Sir Arthur would reach the mandatory retirement age of
seventy in 1912, by which time he could be succeeded by a member of
the Fishpond.231
In responding to Asquith’s inquiry regarding Beresford’s prospects to
serve as first sea lord, McKenna icily noted, “Sir Arthur Wilson stands
out by universal acknowledgement as the greatest sailor we have had for
many years.” As for Beresford, he merited an unfavorable comparison to
Fisher. “His services are no longer required. He has commanded at sea
with much, but not unusual success. . . . He has not been responsible
for, or associated with, any development of naval science, strategy, or
training.”232
As one prominent historian summarized it, “Beresford stood for
things as they were, for orthodoxy and tradition. Fisher looked beyond,
imagining new men, new rules, new ships, new worlds that broke tradition
240 Part 2
so violently that they constituted revolution. Both men had colossal egos,
but over a lifetime of service, Beresford’s ego tended to focus on himself,
while Fisher’s was devoted to the advancement of the Service.”233
Fisher’s Shadow
Both Fisher and Beresford were now gone. Percy Scott and Reginald
Bacon retired later that year. The Navy was losing some of its best offi-
cers, just as tensions with Germany were heating up. How would Fisher’s
Scheme, or at least those parts he had implemented, be preserved?
The Fishpond
In the near term, support for the concept of flotilla defense persisted.
Only a few months after Fisher stepped down, McKenna, in correspon-
dence to the foreign secretary, Sir Edward Grey, noted, “our destroyers
and submarine flotillas, which are the true defense against invasion, will
be stationed on the East Coast [of England].”234 But McKenna would
soon leave the Admiralty.
Fisher, through his apostles in the Fishpond, sought to preserve and
even advance the Scheme. Shortly after his retirement at the end of
1909, Rear Admiral Bacon presented a paper to the Institute of Naval
Architects. Echoing Fisher, Bacon announced that torpedoes of ever
greater ranges had been developed that made it possible for swarms of
smaller ships to engage battleships effectively. “Not only is the battleship
itself open to attack by small craft which it cannot engage on equal
terms, but it is powerless to protect any form of vessel against the attacks
of such craft.”235
Bacon also predicted that the ongoing naval revolution would re-
quire Britain’s all-big-gun warships to carry only light armor protection,
as it seemed certain that the long struggle between offensive firepower
and defensive armor would be won by the former. Continuing to channel
Fisher, Bacon observed that ships capable of high speeds would be
needed, for both tactical and strategic reasons. Hence, Fisher’s battle
cruisers, with their high speed, light armor, and long-range hitting
power, must be supported.
Finally, Bacon argued that as capital ships would become more vul-
nerable to torpedoes, it would be risky to form them into a traditional
line of battle, the reason being that it would provide those who were
Fisher’s Scheme 241
Churchill
Winston Churchill succeeded McKenna as first lord in October 1911.
Although Churchill had been a leading voice in efforts to wring greater
economies from the fleet, his views changed dramatically once he joined
the Admiralty. He also emerged as an ally of Fisher.
242 Part 2
The two met at Biarritz in 1907 and immediately hit it off. Fisher
wrote, “Fell desperately in love with Winston Churchill”; Churchill told
Fisher, “You are the only man in the world I really love.” King Edward
VII called them “the chatterers.” The prime minister’s daughter, Violet
Asquith, observed, “they can’t resist each other for long at close range.”
Fisher’s fondness for Churchill grew with the new first lord’s support for
his ideas. Fisher lost no time preaching his gospel to Churchill, promot-
ing battle cruisers and proclaiming, “Speed, Big Gun and Cheapness those
are the 3 Fundamentals—& you can have them.”239
In the years immediately following Dreadnought’s appearance, the Lib-
eral government’s financial challenges were eased thanks to an economic
boom. Knowing that busts follow booms, in the spring of 1911, Chancel-
lor of the Exchequer Lloyd George argued that the government needed to
prepare for an inevitable economic downturn. Like many politicians, he
knew the dangers of increasing taxes. The only solution, then, was to be
found in trimming social welfare and military expenditures. As did Fisher
in 1904, Churchill felt pressure to realize economies in the Navy’s budget.
In November 1911, Churchill convinced Asquith to retire Admiral
Wilson a few months early and approve Admiral Sir Francis Bridgeman,
a member of the Fishpond, to succeed him.240 Shortly after Bridgeman
assumed his new position, he reported to Fisher that Churchill was “full
of new schemes of strategy which are almost too bold to be believed!”
What Bridgeman did not know was that Fisher was often the inspiration
for Churchill’s schemes. Reprising his arguments during the 1904 push
to trim naval estimates, Fisher convinced Churchill that British maritime
superiority could be maintained and significant savings achieved by em-
phasizing flotilla defense and the construction of battle cruisers.241
In February 1912, the Admiralty received information that Admiral
Tirpitz’s supplementary naval plan called for increasing the number of
warships in the active German fleet from seventeen battleships and four
battle cruisers to twenty-five battleships and eight battle cruisers. The
Royal Navy, however, normally maintained only twenty-two capital ships
in full commission in home waters, including the six based at Gibraltar.
The Admiralty also had to account for the fleets of Austria-Hungary and
Italy, Germany’s two allies within the Triple Alliance. The former was
building four dreadnought-style battleships, while the latter had four
dreadnoughts in its fleet and another two under construction. They also
possessed nine and eight pre-dreadnought battleships, respectively,
against six Royal Navy pre-dreadnoughts at Malta.242
Fisher’s Scheme 243
fought a rearguard action against his former “budget hawk” ally, but the
popular mood favored battleships over fiscal probity. Lloyd George told
Churchill that he knew it was time to give in when his wife remarked,
“You know, my dear, I never interfere in politics, but they say you are
having an argument with that nice Mr. Churchill about building dread-
noughts. Of course I don’t understand these things, but I should have
thought it would be better to have too many rather than too few.”247
Churchill, for his part, sought to stay in good standing with the fiscal
conservatives and Lloyd George by proposing a “naval holiday” with
Germany, declaring that any reduction in German warship construction
would be met by a proportionate reduction in British shipbuilding. Thus,
if Germany postponed building the three battleships it had planned for
1913, Britain would drop the five it was planning to start. Despite
Churchill’s repeated efforts to win over the Germans, the Kaiser ruled
out any such “holiday.”248
What caught Fisher’s perceptive eye, however, was not the German
plans for dreadnoughts but those for flotilla craft. Seventy-two new sub-
marines would be added to Germany’s High Seas Fleet, and 99 of its 144
destroyers would be fully manned.
Admiral Callaghan also pointed out that stationing the battle fleet in
the north of Scotland precluded its ability to intercept quickly an enemy
fleet transporting an invasion force. But having lost 40 percent of his
capital ships to submarine attack during the exercise, the admiral also
conceded that if the fleet was brought south to protect against an inva-
sion, it would also be running unacceptable risks. Echoing Admiral Ba-
con’s paper from 1909, Callaghan argued that a major fleet engagement
should combine both torpedo attacks and long-range gunnery. This fo-
cused further attention on a growing debate over whether the huge bat-
tle fleet could be effectively commanded in an engagement. The Navy
began to work on devising contingency plans to employ aircraft
equipped with wireless to support the Navy’s early warning flotillas, in-
cluding defense of Britain’s east coast.254
But Churchill also knew that the Liberal government feared the po-
litical backlash of abandoning the battleship. He also knew that dropping
two dreadnoughts would provide the Canadians, who had committed to
funding three dreadnoughts, with an excuse to renege, placing an un-
bearable burden on the Navy’s budget. This looming political crisis pro-
vided Churchill with an opportunity. He informed Asquith that he could
provide him with political cover against the party’s fiscal hawks and
against charges that he was abandoning Britain’s maritime supremacy.
This could be done, Churchill said, by substituting submarines for some
battleships and adopting a fundamentally new way of measuring the
maritime balance. Drop two battleships from the 1914–15 program and
use the funds to build a new class of semisubmersible torpedo craft and
sixteen submarines. Drop all but two or three destroyers in the program
in favor of four additional submarines, bringing their total to twenty.
The “new” maritime balance would be measured not only using merely
capital ships but also by including submarines and other torpedo craft.
Owing to the sensitivity of effecting such a radical shift, the deal was
known only to the Admiralty Board, Asquith, and Lloyd George. As with
support for Fisher’s scheme in 1904, the motives for backing Churchill’s
gambit were both strategic and financial.256
Just as the Admiralty was moving to implement Churchill’s proposal,
general war broke out in Europe, bringing Britain, France, and Russia
into conflict with Germany and Austria-Hungary.257 The crucible of con-
flict would determine whether Fisher’s vision of the maritime competi-
tion or those of his detractors would prove out.
War
The Great War showed how profoundly the character of war at sea had
changed in the span of a few short years. Both Britain’s Grand Fleet and
Germany’s High Seas Fleet proved skittish of submarines. The Royal
Navy adopted a distant blockade. If the High Seas Fleet wished to break
it, it risked moving into waters that might be populated with British
mines and torpedo craft, backed by Britain’s Grand Fleet.
What surprised many people, but not Fisher, was the emergence of
submarine commerce raiding and blockade. Owing to the Navy’s tradi-
tion of offensive warfare, it persisted in search-and-destroy operations
against commerce-raiding submarines while resisting convoy operations.
The results were disastrous, similar to a company of cavalry defending a
wagon train moving across the American West against raids by Native
Fisher’s Scheme 249
superior to any other battleship afloat.268 The ships opened fire on the Ger-
man fleet at 19,000 yards, scoring hits at nearly twice the rate as Beatty’s
battle cruisers, inflicting six hits while taking none, partially confirming
Fisher’s faith in speed and long-range fires. Although there was a spirited
debate following the battle as to which side prevailed at the tactical level,
Fisher’s dreadnoughts had prevailed at the strategic level. As a New York
paper concluded, “The German Fleet has assaulted its jailor, but it is still in
jail.”269
In retrospect, Fisher’s vision of an extended-range fleet engagement
leveraging speed and long-range fires was less flawed than the timing of
its implementation. Had the Pollen system been fully incorporated into
the fleet, it could have provided the Royal Navy with the kind of long-
range gunnery accuracy that Fisher believed he had. Moreover, only
three years after Jutland, the U.S. Navy, employing wireless-equipped
aircraft as spotters, produced dramatic increases in long-range naval
bombardment accuracy. Aircraft would also have provided Fisher’s flo-
tilla defense forces with the scouting capability needed to concentrate
against an enemy fleet approaching Britain’s coast.
Conclusion
The period between the mid-nineteenth and early twentieth centuries
witnessed several disruptive and overlapping shifts in the character of
war at sea. These shifts challenged the Royal Navy’s traditional methods
of defending the British Isles, the empire, and maritime commerce.
Beginning in the late 1890s, rapid progress with submarines and tor-
pedoes offered an entirely new way of waging war at sea. Anti-ship
mines, when combined with torpedo craft, could make close—and, pro-
gressively, observational and intermediate—blockade an unacceptably
risky proposition. Torpedo craft so threatened the survival of major war-
ships that ways needed to be found to operate beyond their range, hence
the all-big-gun capital ships and oceangoing destroyers operating as part
of a combined-arms fleet. As Fisher foresaw, submarines proved formida-
ble threats to battleships and commercial transports alike.
A handful of individuals identified elements of these challenges to
British maritime supremacy, but only one did so comprehensively while
being in a position to respond to them holistically: Admiral Jackie Fisher.
“Radical Jack’s” Scheme focused on meeting these challenges by pro-
foundly altering the Royal Navy’s size, structural form, and disposition.
Fisher’s Scheme 253
His vision had three basic components: battle cruisers, flotilla defense,
and plunging. Fisher was willing—much more so than his colleagues at
the Admiralty or Britain’s political leaders—to place big bets on building
a fleet that could outrange the growing torpedo threat, and exploiting
submarines and torpedoes to defend Britain from direct attack when
blockading the enemy’s fleets was no longer a realistic option.
In a way that seems remarkable in contemporary times, Fisher suc-
ceeded in realizing a significant portion of his Scheme. The drag on
Fisher’s efforts, though deleterious in some ways, also had a positive side.
By continuing to build dreadnought battleships, the Admiralty effectively
pursued a hedging strategy against the possibility that all of Fisher’s big
bets might not prove out. This hedging strategy enabled the Royal Navy
to adapt effectively enough to prevail when war came. Partially “wrong”
about battle cruisers, Fisher proved “right” in advancing the construction
of submarines and destroyers. The latter, of course, paid great dividends
in the convoy operations that defeated the threat to Britain’s maritime
lifeline—even though they had been bought with a different mission in
mind. Fisher was right to abandon the close blockade in favor of distant
blockade, and his frightening predictions on the submarine threat to
commerce proved prescient.
When viewed in the balance, Fisher emerges as one of the most
foresighted and capable military leaders of the past two centuries. At the
fleet’s grand view in July 1914, on the eve of war, Rear Admiral Sir Rob-
ert Arbuthnot was moved to say, “All that is best and most modern here
is the creation of Lord Fisher.”270 That fleet would pass the ultimate
test: it prevented the German fleet from ever coming close to directly
threatening Britain’s or its allies’ homelands; it maintained—albeit with
difficulty—maritime commerce essential to Britain’s survival; and it de-
terred the High Seas Fleet from challenging it in a major engagement.
As Arthur Marder concludes, “The verdict of history is that in Fisher
the Navy and the nation had found their man—a strong man ready to
face the tremendous responsibility and personal risk of carrying out a
constructive revolution in a service rendered by the very pride of its tra-
ditions one of the most conservative in the world.” “Fisher,” says Marder,
“whatever his defects, was a genius.” Churchill concurred, writing: “His
genius was deep and true.”271
chapter seven
Out of the Trenches
254
Out of the Trenches 255
of General August von Mackensen and his chief of staff, Colonel Hans
von Seeckt. Their concept centered on quickly exploiting even small
breaks in the Russian lines by rushing in reserves to widen and deepen
the penetration, with the goal of producing a breakout. September 1917
found General Oskar von Hutier employing these tactics successfully in
operations around Riga. The Germans also discovered that using a short
preparatory bombardment gave the enemy less time to concentrate
forces in the sector being attacked. They began to employ specially
trained troops—“storm troopers”—that were instructed to infiltrate the
Russian lines, bypassing any strong points to sustain their advance into
the enemy’s rear area.4
The Allies, on the other hand, emphasized exploiting new military
systems, especially the tank, a recent invention that had its proximate
origins in the Royal Navy’s Landship Committee, formed by the
Admiralty’s first lord, Winston Churchill. The French soon joined the
British in this endeavor, and by 1916, both countries were producing
tanks. The British Army first used tanks during the Somme offensive in
September 1916. Ironically, given what transpired, the Germans only
began to develop tanks after encountering them on the Somme and had
only begun producing tanks in significant numbers when the armistice
was signed.
The two sides’ attempts at breaking the trench stalemate were on
display on November 20, 1917. The British massed some 400 tanks and
six infantry divisions supported by Royal Flying Corps aircraft and at-
tacked two understrength German infantry divisions along a seven-mile
front near the French town of Cambrai. Within twenty-four hours, the
British drove the Germans back five miles—an unprecedented feat
against well-entrenched forces on the Western Front.5 The German
counterattack at Cambrai coincidentally saw the first major use of storm
tactics on the Western Front. Twenty German divisions operating with-
out tanks erased the British breakthrough, capturing more than 150 ar-
tillery pieces and some 6,000 troops.6
Although the German assault did not involve tanks, German small
units were now equipped with hand grenades, machine guns, grenade
launchers, trench mortars, and flame-throwers, making them combined-
arms units in miniature. Both massed armor and storm tactics showed
promise for restoring maneuver to the battlefield, at least at the tactical
level.7 Shortly thereafter, taking a page from the British, the German
Out of the Trenches 257
Yet another problem was that the penetrating force quickly outdis-
tanced its supporting artillery fires. Attempts to offset this problem by
increasing attacking troops’ weapons loads found them quickly ex-
hausted. The study committees found that tanks, by providing mobile
fire support, represented a potential solution to this problem, but only if
they were not tethered to slow-moving infantry that would compromise
their advantage in speed and mobility. Air forces also showed promise for
providing advancing ground forces with supporting fires.15
These insights formed a basis for thinking about how to solve the
principal task that had eluded the German Army in World War I: restor-
ing mobility at the operational level of warfare in such a way as to enable deci-
sive results at the strategic level. Von Seeckt was not alone in thinking along
these lines. One of the men most responsible for developing the tank,
Winston Churchill, found himself not long after the war pondering,
“Suppose that the British Army sacrificed upon the Somme, the finest we
ever had, had been preserved, trained and developed to its full strength
until the summer of 1917, till perhaps 3,000 tanks were ready, till an
overwhelming artillery barrage was prepared, till a scientific method of
advance had been devised, till the apparatus was complete, might not a
decisive result have been achieved at one supreme stroke?”16
Von Seeckt’s vision did not go unchallenged within the Reichswehr.
Several opposing schools of thought emerged, the most formidable being
the “Defense School,” led by Reinhardt, who, in 1919, ordered that pref-
erence for officer retention in the radically reduced Army go to officers
who had served ably on the front lines. Von Seeckt favored General Staff
officers, believing that their intellect and experience in higher command
planning would help the German military identify and embrace a new
way of warfare. In the end, von Seeckt prevailed, and the Reichswehr
chose brains over brawn.17
There emerged yet a third significant faction, what might be called
the “People’s War School.” Its advocates called for focusing the Army’s
efforts on the immediate danger faced by the country in its weakened
state, arguing that Germany’s only hope of resisting invasion by either
France or Poland rested in a mass army waging guerrilla warfare. When
the French occupied Germany’s industrial Ruhr area in 1923 to compel
it to make good on its reparations obligations, many Reichswehr officers
grumbled that von Seeckt and his small “army of leaders,” with its em-
phasis on the long term, ignored the immediate dangers to Germany’s
security.18 Von Seeckt, they groused, was training a military divorced
260 Part 2
motorized troops and aircraft. By 1926, the Army was conducting multi-
division maneuvers, the largest since the war’s end, to test aspects of
these concepts.25 These exercises were stimulated by von Seeckt’s orders
that focused on infantry units getting out of the trenches, waging mobile
warfare, and executing flanking maneuvers, including having artillery
working on ways to support mobile infantry operations. Between 1921
and 1925, the German Army issued, in three parts, a new operational
doctrine, Army Regulation 487, Leadership and Battle with Combined Arms,
conforming to von Seeckt’s concept of operations.26
military attaché in London, reported, “In the mixed tank brigade the
British army created the most important mobile ‘modern formation,’
which it holds to be necessary for powerful, long-range, all-out strikes.”
That same year, British tank maneuvers in Egypt for the first time saw a
tank brigade and an experimental mobile division execute large-scale
penetrations.36 When Germany began to rearm in 1935, Lutz, now a gen-
eral and head of Germany’s Tank Forces Command, remarked to British
General Sir John Dill that “the German tank corps had been modeled on
the British.”37
Such training had its limits. In December 1936, Germany initiated the
last comprehensive armaments plan prior to the war’s outbreak. Hitler’s
directive to field “a powerful army in the shortest possible time” severely
strained the country’s manpower and industrial base.67 Up to that point,
the high level of training and quality of personnel in the treaty-limited
Reichswehr had enabled Germany’s Army to expand smoothly from
100,000 to 300,000. The December 1936 plan, however, called for creat-
ing a peacetime force of 830,000 that, supported by reserves, would be ca-
pable of mobilizing a force of 4,620,000 in 102 divisions, including five
panzer divisions and eight motorized divisions, by October 1939.68 Achiev-
ing this required a significant watering down of troop quality, even with a
doubling of the conscription period from one year to two.
Early in von Seeckt’s tenure, he directed the Army to “engage in
joint planning with industry so that mass production of approved weap-
ons and material could be begun at the strategically proper moment.”69
German industry cooperated. Krupp established armament subsidiaries
abroad, including at Bofors gun plants in Sweden, Sideius A.G. ship-
building yards in Rotterdam, and torpedo works at Utrecht and The
Hague. Krupp holding companies were set up in Barcelona, Bilbao, and
Cadiz in Spain, where submarine construction and experimentation went
forward. Indeed, “it would be difficult to find a more perfect collabora-
tion than that which existed between Krupp and the military establish-
ment in these years.” German officers also had access to some equipment
proving grounds, such as those at Bofors.70
Throughout the 1920s, other countries’ military industries also in-
fluenced and aided the Germans in designing and developing equipment.
When the French firm Citroën was pioneering half-track technology,
German firms licensed it to support the German Army.71 Technical work
on tanks began in 1925, when design specifications for a Grosstraktor
(“Large Tractor,” so named to deceive the Allies) were established. Be-
tween 1925 and 1929, the German industrial firms of Krupp, Daimler,
and Rheinmetall were all developing tanks, with work on prototypes of
half-track vehicles beginning in 1930.72 By 1928, each firm had built two
Grosstraktors for German field-testing in Soviet Russia.
Germany’s industrial activities in Soviet Russia were particularly no-
table. In 1923, the Reichswehr launched a private holding corporation
that financed a Junkers aircraft factory at Fili near Moscow, a poison-gas
factory at Samara, and shell factories (under Krupp administration) at
Out of the Trenches 271
Mechanization
Despite efforts to mitigate the effects of the Versailles Treaty, the restric-
tions imposed by it clearly constrained the scale and quality of German
efforts toward mechanization. Although the Germans possessed nearly
1,500 Panzer (Panzerkampfwagen) I tanks by the fall of 1938, production
was terminated at that time as the tank, with thin armor and two machine
guns armament, was already obsolete. Nevertheless, the Panzer I formed
the core of the Wehrmacht’s armored force at the war’s beginning.75 The
Panzer II, designed as a gap filler until state-of-the-art tanks could be
produced, was nevertheless an improvement over its predecessor. The
Wehrmacht had more than 1,200 Panzer IIs for the Poland campaign.76
By 1935, the design for the Panzer IV, a medium (twenty-ton) tank
with a 75-millimeter gun, was completed. It entered mass production in
1937 and remained in production throughout the war. Only 211 of the
tanks, however, were in service in September 1939. By May 1940, when
the campaign in the West began, the number had only risen to around
300. The Panzer III was the last tank developed by Germany before the
war, entering mass production in early 1938. It was specially designed to
combat other tanks and was armed with the moderately high-velocity
37-millimeter gun. By the time the war began, Germany had 148 Panzer
IIIs, and by May 1940, 432 were in service.77
272 Part 2
Aviation
Germany’s loss of its air force following World War I retarded the devel-
opment of its aviation industry. Nonetheless, the Reichswehr exploited
the nation’s commercial aviation sector, providing it with subsidies to
create an industrial base that could keep pace with technological devel-
opments in the field. By the mid-1920s, Germany was recognized as a
world leader in commercial aviation, as Germany’s airlines flew greater
Out of the Trenches 273
distances and carried more passengers than the airlines of France, Great
Britain, and Italy combined.83 German pilots gained substantial experi-
ence in long-distance flying, navigation, and instrumentation.84
Still, there was only so much the military could do by way of “out-
sourcing” research and development of new aviation technology and
subsidizing its commercial airlines. These industrial capacity limitations
appeared when rearmament began in the mid-1930s. Nevertheless, once
the military aviation industrial base began to mobilize, the results were
impressive. From a base of roughly 4,000 workers at the time Hitler
came to power, the aircraft industry boasted a force of more than
200,000 in less than six years.85 As with the ground forces, the Luftwaffe
benefited greatly from the rapid advances in aviation technology during
the 1930s, which had the effect of rapidly obsolescing existing stocks of
combat aircraft in the air forces of Germany’s rivals.
five divisions. The lessons learned in these exercises were quickly incor-
porated into military training programs. By 1938, courses at the Kreigs
akademie were being given on the principles of panzer-force operations.
Panzers, students were instructed, should be employed “in mass and in
great depth.” Their mission was “penetration or breakthrough, envelop-
ing the flank or encircling deep to attack from the rear.” Officers were
cautioned, “it is false to restrict the mobility of the [panzer] unit to that
of the infantry.”135
That same year, the position of Chef der Schnellen Truppen (chief of
fast troops) was established and charged with overseeing the doctrinal
development and training of all mechanized troops. Guderian was as-
signed the job and gave priority to developing radio networks, which he
saw as central to coordinating fast-moving panzer formations.136
Blitzkrieg
Poland 1939
Germany’s attack on Poland on September 1, 1939, which triggered war
with France and Great Britain, offered the first test of the Wehrmacht’s
mechanized air-land operational concept. The German Army began the
campaign with roughly 3,000 tanks, nearly all of which were obsolete
Panzer I types, with only about 100 Panzer IIIs and 200 Panzer IVs. But
the panzers incorporated the latest communications system, and many of
the logistical problems that plagued them during the occupation of Aus-
tria had been fixed. The campaign produced a rapid German victory,
with most Polish resistance collapsing by midmonth.
During the campaign, Guderian, now commanding the XIX Panzer
Corps consisting of the Third Panzer Division and the Second and Twen-
tieth Motorized Divisions, gave Hitler a tour of his sector. Observing
some shattered Polish artillery, Hitler asked Guderian, “Our dive-bombers
did that?” To which Guderian replied, “No! Our panzers!”—and, he might
have mentioned, at the cost of only 150 killed in action.148
Out of the Trenches 285
France 1940
The German campaign in Poland was a striking success, but it was
widely believed that the Wehrmacht’s true test would come against the
French Army, still counted by many observers as the world’s finest. After
a winter of inaction on the Western Front, the Germans opened the
campaign season in April with rapid victories over Denmark and Nor-
way, setting the stage for a showdown with the Allies: France and Great
Britain.
The Wehrmacht’s evolving plan for the campaign in the west—Plan
Yellow—reveal an increased willingness to rely on its new methods of war-
fare. Two days after Poland surrendered on September 27, Halder noted
in his diary, “Techniques of Polish campaign no recipe for the West. No
good against a well-knit Army.”151 Early German plans called for Army
Group B under General Fedor von Bock to conduct the main attack,
sweeping through the Low Countries into France—a pale, unambitious
revival of the 1914 Schlieffen Plan that failed in its objective of effecting a
quick knockout blow to the Allies. Supporting von Bock’s attack would be
Army Group A, under von Rundstedt, located to the south from Aachen to
the northern terminus of France’s Maginot Line fortifications along its
border with Luxembourg. Anticipating the German axis of attack through
286 Part 2
Belgium and the Netherlands, the Allies’ Plan D called for rushing three
French armies and most of the British Expeditionary Force forward to a
line between Breda and the Dyle river to prevent the loss of Antwerp and
Rotterdam, while keeping the fighting away from French soil.152
Over the next six months, the plan changed radically, thanks to a
combination of war games, debate among senior Army officers, and Hit-
ler’s personal involvement. When presented with Plan Yellow on Octo-
ber 22, 1939, Hitler, unimpressed, asked Generals Halder and Walther
von Brauchitsch if an attack on the southern Meuse in Army Group A’s
sector could cut off and annihilate the main enemy forces to the north.
The area was dominated by the Ardennes Forest, which appeared to pose
an imposing barrier to the rapid movement of large forces, especially
mechanized and motorized units. Confronted by Hitler’s idea, the gener-
als went back to reconsider their plans.153
Coincidentally, only a few weeks later, von Rundstedt’s chief of staff,
Lieutenant General Erich von Manstein, and Guderian discussed mass-
ing a panzer attack against the Allies through the Ardennes Forest to ef-
fect a breakthrough and trap the main Allied armies in Belgium. The
next two months found Halder and von Rundstedt warming to the
idea.154 During a meeting at General Staff headquarters in mid-Decem-
ber, Halder pointed to the Ardennes Forest on a map, declaring, “Here is
the weak point. Here we have to go through!” In January 1940, von
Rundstedt conducted a war game to test the idea, but with infantry, not
tanks, leading the way.155
On February 7, von Rundstedt conducted another war game to ex-
plore von Manstein’s plan, this time employing a panzer and a motorized
corps to attack and cross the Meuse River at Sedan. When Guderian in-
sisted on attempting a crossing without the infantry divisions, von Rund-
stedt opposed the idea as too risky. Still, the game was sufficiently
encouraging to keep von Manstein’s concept on the table.156
Ten days later, Hitler met with von Manstein for a “routine” break-
fast with new corps commanders. In fact, Hitler had heard of von Man-
stein’s plan, and it piqued his interest. After the breakfast, Hitler invited
the general to stay behind and describe his plan. Hitler was impressed,
and their discussion extended into midafternoon. The next day, Hitler
presented the plan—now “his” plan—to Halder and von Brauchitsch,
with instructions to act on it. The generals, already moving toward von
Manstein’s approach, began to work out the details.
Out of the Trenches 287
The revised plan called for shifting all the panzers, save one division
assigned to von Bock’s Army Group B for invading the Netherlands and
two others ticketed for the assault on Belgium, to Army Group A and the
Ardennes operation. Along with them went most of the Army’s best
tanks.157 In the process, Halder created the equivalent of what would be-
come a panzer army. It had two panzer corps but, out of deference to the
infantry, was designated “Group Kleist,” after its commander, General
Ewald von Kleist, a cavalry veteran. Since the final version of Plan Yellow
was designed to cut off the main French and British armies from their
logistics support as a scythe cuts stalks of grain, it was popularly known
as the “sickle-cut” plan.158
When the German offensive in the west opened on May 10, 1940, it
was far from clear that the plan, relying heavily as it did on deception
and surprise, would succeed. If the French discovered the panzer forces
snaking through the Ardennes, they would be highly vulnerable to attack
from the air while the French thickened their defenses along the planned
breakthrough point along the Meuse.
Indeed, a general examination of the German and Allied forces op-
posing each other seemed, if anything, to favor the latter. Although esti-
mates vary, the Germans possessed some 2,700 tanks in their ten panzer
divisions, most of which were the obsolete Panzer I. The Allies counted
some 3,500 tanks in their inventories (roughly 3,000 French and 200
British, along with some Belgian, Dutch, and Polish systems).159 The Al-
lies’ tank forces, however, without exception included a larger proportion
of models designed for infantry support, not independent mobile offen-
sive warfare.160
The French tanks were heavier than those of the Germans. The lat-
est French tanks, the Somua S35 and the heavy Char B, had twice the
armor of the Panzer IVs and a superior anti-armor gun.161 Reflecting the
French military’s vision of a conflict characterized by positional warfare
and attrition, their tank designs emphasized firepower and armor protec-
tion more so than their German counterparts did. Heavy armor and
large guns meant adding more weight. The German approach, empha-
sizing rapid concentration of combat power and deeply penetrating
breakthrough forces, accorded priority to speed and range.162 The Ger-
man panzers’ range advantage was even more pronounced considering
how the Wehrmacht had extended their effective range though improve-
ments in logistics, such as mobile maintenance and fuel support units.
288 Part 2
nonmotorized forces. Concerned over the prospect that the panzers might
be attacked on their vulnerable flanks, von Rundstedt ordered von Kleist to
slow his advance to allow the infantry forces to catch up. Upon hearing the
orders, Guderian, furious, threatened to resign. General von Richthofen
weighed in, pledging that his VIII Air Corps could secure the panzer spear-
head’s flanks, in effect substituting air power for infantry and artillery sup-
port. Von Rundstedt reluctantly agreed. The VIII Air Corps was directed to
“follow Panzer Group von Kleist to the sea.” Making good on von Richt
hofen’s promise, Luftwaffe fighter and dive-bomber aircraft units were de-
ployed with remarkable speed to support the rapidly advancing panzers,
blunting several French Army attempts to mount a counterattack.170
To ensure continuous close air support, when necessary, maintenance
personnel, aviation fuel, spare parts, and ammunition were airlifted into
newly established forward operating air bases by Ju-52 transport aircraft.
Thanks to insights derived from frequent prewar maneuvers and opera-
tions in Spain, the Luftwaffe had fielded some 117 motorized columns
capable of moving with the Army’s mechanized units. These mobile air-
field-construction companies and engineer units established austere for-
ward air bases or converted captured airfields into operational bases in a
matter of hours, enabling the Luftwaffe to maintain the high sortie rates
needed to support the fast-moving armored columns.171 Robert Citino
has noted, “This campaign marked the true birth of ‘Air-Land battle.’ ”172
Only three days after Churchill’s talk with Reynaud, the Allies’ rapidly
deteriorating position was becoming clear. So, too, was a growing recogni-
tion that the Wehrmacht was breaking new ground in military operations.
Speaking to a joint session of Congress, President Franklin Roosevelt re-
ferred to the German methods, noting, “The element of surprise which
has ever been an important tactic in warfare has become the more danger-
ous because of the amazing speed with which modern equipment can
reach and attack the enemy’s country.”173 As the panzers continued their
race to the Channel, Churchill’s eyes were opened. On May 24, the frus-
trated prime minister messaged General Hastings Ismay, his chief staff of-
ficer and adviser, remarking, “Apparently the Germans can go anywhere
and do anything, and their tanks can act in twos and threes all over our
rear, and even when they are located, they are not attacked. Also our tanks
recoil before their field guns, but our field guns do not like to take on their
tanks.”174 Years later, Churchill recalled, “I was shocked by the utter failure
to grapple with the German armour which, with a few thousand vehicles,
was encompassing the entire destruction of mighty armies.”175
Out of the Trenches 291
The panzers reached Abbeville on May 20, cutting off the main Brit-
ish and French armies, pinning them against the English Channel at
Dunkirk. On May 28, Belgium surrendered. That day, Guderian was
given command of a two-corps panzer group—Panzer Group Guderian
—a panzer army in all but name. Although much of the British Expedi-
tionary Force and some French troops were successfully evacuated to
Great Britain, the Allies had suffered a devastating defeat. Having dis-
patched the cream of the Allies’ armies in less than a month, the Wehr
macht turned south and breached the French defenses in short order.
Paris was taken on June 14, and an armistice confirming France’s defeat
was signed on June 22. What had proved impossible to accomplish in
four long years of static warfare a generation earlier had been accom-
plished in six short weeks in the spring of 1940.
The casualties suffered during the campaign reflected the magnitude
of Germany’s victory. The French suffered roughly 90,000 killed and
200,000 wounded, with 1.9 million prisoners taken. Total British, Belgian,
and Dutch casualties were 68,111, 23,350, and 9,779, respectively. Ger-
man losses were 27,074 killed, 111,034 wounded, and 18,384 missing.176
In evaluating the success of the campaign in France, General Wilhelm
Ritter von Thoma of Germany cited the close cooperation of the panzer
forces with the Luftwaffe, the massed use of armor, and the ability of
mechanized forces to penetrate quickly and deeply into the enemy’s rear
areas. He found it noteworthy that although the panzer divisions had
enough fuel to advance 90–120 miles, their range could be supplemented
by various means, including resupply by air.177 As for the enemy’s armored
forces, von Thoma concluded, “The French tanks were better than ours,
and as numerous—but they were too slow. It was by speed, in exploiting
surprise, that we beat the French.”178 Forced to choose between a “thick
skin” (heavy armor protection) and “a fast runner” (speed), he said that
Germany’s panzer leaders would “always” choose the latter. Von Thoma’s
critique was echoed by General Günther Blumentritt, who believed that
the German victory owed less to armor plate and firepower than to speed,
range, and superior coordination, concluding, “Above all, German tank
troops were more mobile, quicker and better at in-fighting, and able while
in movement to turn wherever required by their leader. This, the French at
that time were unable to do. They still fought more in the tradition of the
First World War. They were not up to date either in leadership [in their
concepts of modern warfare] or wireless control.”179 Indeed, during the
campaign, Guderian carried out impromptu experiments with a captured
292 Part 2
French Char B tank and found its front armor invulnerable to German
tank guns. By comparison, German tank armor was perilously thin.180
It took several years before other militaries could match what the
Germans had wrought. Not until 1942 was the Royal Air Force (RAF)
able to provide the kind of close air support that the Luftwaffe had been
flying since 1939. The U.S. Army Air Forces did not catch up until the lat-
ter half of 1943.181 It took U.S., British, and Soviet mechanized forces even
longer to close the gap. The Allies ultimately prevailed not by mastering
this new form of warfare better than the Germans but by sheer weight of
numbers and the progressively inept generalship of Corporal Hitler.
Conclusion
When did the German military truly acquire the ability to wage combined-
arms mechanized air-land warfare that became Blitzkrieg? The question
remains a matter of debate. For most of the period between the world
wars, there was an awareness on the part of a significant element in the
German officer corps that the new tools of war, especially those enabled by
advances in mechanization, aviation, and radio, could transform war’s char-
acter, land warfare in particular. Most of the senior officer corps, men like
General Beck, accepted that mechanized forces would exert a significant
influence on future wars. In the absence of a clear confirmation on the bat-
tlefield, however, relatively few officers were willing to assert that these
forces would trigger a military revolution. As an impatient General Gude-
rian wrote in 1937,
German thinking, and British field exercises gave men like Lutz and
Guderian growing confidence in their ideas. Soviet Russia aided the
Reichswehr in producing, testing, and evaluating the new equipment
needed to realize its vision, as well as the opportunity to train with it.
Interestingly, while the German military benefited from the actions
of other great-power militaries, the Luftwaffe avoided the infatuation
with strategic aerial bombardment that captured the minds of their
counterparts in the United States and Great Britain. Although this
yielded the “wrong” German air force for the Battle of Britain, it pro-
duced the “right” Luftwaffe for Blitzkrieg operations.183 This again
points out the situational character of disruptive military innovation: the
importance of developing a vision that focuses on the right operational
problem (or problems) at the proper scale.
When did the German Army become convinced that it had wrought
a revolutionary new form of warfare? It was not until after the spring
1940 campaign that the officer corps as a whole accepted highly mobile,
mechanized ground forces as the centerpiece of land warfare.184 Even
following the Wehrmacht’s rapid victory over Poland, initial efforts at
Plan Yellow assumed that the Polish campaign’s success was a one-off
against a weak adversary that could not be replicated against a major-
power army. But given time, the General Staff came around to the ideas
of von Manstein, Guderian, and Hitler. In the Polish campaign, the pan-
zer corps operated under the control of the infantry armies. The panzer
divisions were not concentrated for an operationally decisive campaign
along a single axis of attack. Still, their performance greatly impressed
the Wehrmacht’s senior leadership.185 Given the torpid response by the
other major military organizations to German operations in Poland, it
seems that widespread acceptance in military circles that a fundamental
shift in the character of land warfare had occurred had to await the pre-
cipitous collapse of the celebrated French Army.
The German military’s development of Blitzkrieg represented a
major, or disruptive, innovation in warfare. The Reichswehr (and, later,
the Wehrmacht) focused primarily on the challenge of fighting a war
with Poland, France, or Czechoslovakia, alone or in combination. Blitz-
krieg, as practiced by the German military, was well suited for these con-
tingencies. But Blitzkrieg had limits, in both form and scale.
Following the fall of France, Germany’s mechanized air-land force
was ill-suited to address the operational challenge posed by a defiant
Great Britain, an island nation. Indeed, Germany’s attempt to pave the
Out of the Trenches 295
A fleet whose carriers give it command of the air over the enemy
fleet can defeat the latter. . . . The fast carrier is the capital ship
of the future.
In the closing days of World War I, the U.S. Navy had plans for a
major expansion of the fleet. Top priority was given to increasing the
number of battleships, widely viewed as the principal measure of naval
power. Nearly a quarter of a century later, in December 1941, the Navy
entered World War II against the Axis powers still viewing itself as a
“battleship navy.” The U.S. fleet at that time also included seven aircraft
carriers, a relatively new type of warship. In fact, the first U.S. purpose-
built carrier—Ranger—had only joined the fleet seven years earlier.
Yet during the course of the war, the United States Navy employed a
new type of sea power so revolutionary, and so devastatingly effective,
296
Twilight of the Battle Line 297
that the powerful Imperial Japanese Navy was, in the span of less than
three years, swept from the Pacific. The core element of this new form of
sea power was the U.S. carrier task force. Surface warships protected the
carriers, while a revolutionary system of mobile supply bases enabled
them to stay at sea for extended periods of time.1
When the war ended in September 1945, the Navy counted twenty-
eight large “fast” carriers and seventy-one smaller carrier types in the
fleet; the Navy’s aviation arm had more than 41,000 planes. The fleet in-
cluded fewer than a dozen battleships, and none were being built. So
swift was the change from the battleship to the carrier that when the bat-
tleships damaged in Japan’s attack on Pearl Harbor were repaired, they
were sent back to sea as part of carrier task forces.2 The United States
Navy, which came out of World War I viewing itself, along with the
Royal Navy and Imperial Japanese Navy, as one of the world’s major
naval forces, now stood alone with far and away the world’s most power-
ful fleet.
A Revolutionary Vision
Barely a decade after the Wright brothers conducted the first heavier-
than-air flight, in August 1913, the U.S. Navy’s General Board recom-
mended to the secretary of the Navy that “the organization of an
efficient naval air service should be immediately taken in hand and
pushed to fulfillment.”3 Established in 1900, the General Board served as
the Navy secretary’s advisory group. The original members included the
Navy’s senior admiral, the chief of the bureau of navigation, the chief in-
telligence officer, the president of the Naval War College, and three rela-
tively junior officers. Over time, the board’s composition changed, most
notably to include the Marine Corps’ commandant. Given its members’
expertise, most issues regarding Navy policy and strategy, along with
ship design and emerging technologies, were referred to the General
Board for study and comment, and its recommendations carried great
weight.4
By 1916, Navy Secretary Josephus Daniels envisioned naval aircraft
enhancing the fleet’s scouting ability as well as the battle line’s gunnery.
More expansively, he envisioned the Navy’s nascent air arm engaging in
“offensive operations against enemy aircraft and possibly against ships or
stations.” Two years later, the board recommended that airplanes be car-
ried on scout ships, cruisers, and battle cruisers.5 Here, as was often the
298 Part 2
case, the Navy was following in the wake of Britain’s Royal Navy, which
had long stood as the world’s preeminent naval power. In 1918, the Brit-
ish launched the Argus, the prototype of future carriers. Operations
aboard the Argus revealed that the British had largely solved two of the
three basic challenges for employing carriers in the fleet: launching and
recovering aircraft at sea. The third challenge, conducting large-scale
sustained combat air operations at sea, was more formidable.6 Although
the U.S. Navy initially followed in the British footsteps, it soon diverted
down its own path.
At the end of World War I, many U.S. naval officers were willing to
concede that naval aviation could be useful for scouting the enemy to en-
sure the battleship “line of battle” was positioned to bring maximum fire
against an enemy battle fleet. Moreover, by spotting the fall of the battle
line’s shots, aircraft could enhance naval gunfire accuracy by radioing ad-
justments to the battleships. To prevent enemy aircraft from performing
similar functions, naval officers accepted that friendly aircraft would also
be useful in screening enemy scout aircraft away from the fleet and in
neutralizing enemy spotter aircraft. All this would enhance the battle-
ship’s effectiveness. In this vision of future fleet operations, the battleship
remained the principal arbiter—the “capital ship”—of war at sea.
There was also a small minority of officers who believed that aircraft
employed in fleet operations could revolutionize war at sea. These vi-
sionaries believed that all warships—regardless of their size, armor, and
armament—would, over time, be vulnerable to attack by aircraft. When
this came to pass, they asserted, it would drastically change the speed and
range at which naval actions would be fought. From the beginning, these
officers saw in the carrier the successor to the battleship and its ances-
tors, which had exercised a centuries-old domination of fleet engage-
ments. To the carrier aircrafts’ missions of reconnaissance, observation,
and air defense, which in themselves would significantly alter war at sea,
naval aviation enthusiasts added a game-changing operation: strikes by
naval aircraft at extended ranges and of sufficient magnitude to disable
an enemy fleet’s capital ships.
Some of these visionaries were inspired by the Royal Navy’s early
carrier operations. The most prominent of these men was Rear Admiral
William S. Sims, who had commanded U.S. naval forces in Europe dur-
ing the war. In 1925, Sims declared, “A small, high-speed carrier alone
can destroy or disable a battleship alone. . . . A fleet whose carriers give it
Twilight of the Battle Line 299
command of the air over the enemy fleet can defeat the latter.”7 He con-
cluded, “The fast carrier is the capital ship of the future.” The admiral, a
member of the General Board, went on to presciently define a fast car-
rier as “an airplane carrier of thirty-five knots and carrying one hundred
planes.”8
Sims’s vision was shared by few of his colleagues. Naval aircraft in
World War I were small and fragile, capable of flying only short dis-
tances, and could not communicate effectively with ships at extended
ranges. Their bomb loads were minuscule compared with the firepower
generated by a single battleship’s broadside. Compounding the problem,
aircraft were incapable of accurately delivering their modest payload.
Following the Armistice in 1918, the Navy was confronted with a
range of options for establishing its aviation arm, which included air-
ships, seaplanes, land-based aircraft, planes carried on existing surface
combatants, and planes carried on ships specifically designed for that
purpose: aircraft carriers.9
Two principal schools of thought emerged. Admiral William S. Ben-
son, the chief of naval operations (CNO), belonged to the traditionalist
school, believing that naval aviation could, at best, be useful in scouting
and perhaps in spotting gunfire. Members of the aviation “enthusiast”
school were split in their views, with the majority visualizing naval avia-
tion principally as a key auxiliary to the battle line. Others could envision
aviation becoming a central element in fleet operations but saw several
major barriers that had to be overcome before naval aviation could real-
ize its full potential. Most reflected the views of Captain Ernest J. King,
who believed that unless aircraft technology continued to advance rap-
idly, it would not progress beyond its role as the “eyes of the fleet.”10
Benson viewed Sims and the other air enthusiasts with deep skepticism,
remarking, “The Navy doesn’t need airplanes. Aviation is just a lot of
noise.”11 Benson opposed Sims’s recommendation that battleships be
equipped with aircraft. More ominously, the CNO’s postwar reorganization
plan called for abolishing the naval aviation office and placing its functions
under the Naval Operations Planning and Materiel divisions. A special
committee convened by Benson recommended that a decision on con-
structing a carrier (the Navy had none) be put off.12 Several factors, how-
ever, both internal and external to the Navy, undermined Benson’s plans.
The first was the Royal Navy. Great Britain had established a com-
manding lead in carrier technology and planned to continue exploring the
300 Part 2
potential of naval air forces in fleet operations. For the U.S. Navy, which
aspired to achieve parity with, if not superiority over, the British fleet,
there was a strong institutional incentive to stay abreast with the Royal
Navy in all aspects of naval warfare. This made the Royal Navy’s interest
in both naval aviation and carriers difficult for the Americans to ignore.
The second factor was the Navy’s own embryonic testing of naval air
power. Support for a carrier of some sort received a boost in March
1919, when the battleship Texas conducted a main-battery gunnery exer-
cise at long range employing air spotting. Although the spotting was
done by an untrained observer, the results were “many times better than
was done by ship’s spotters.” Highly impressed with the results, the cap-
tain of the Texas, N. C. Twining, declared, “The Fleet that neglects avia-
tion development will be at an enormous disadvantage in an engagement
with a modern enemy fleet.”13 Suddenly, both spotter and fighter planes
assumed a new importance, as did the carrier, for it alone seemed able to
provide aircraft in sufficient numbers to support a major fleet engage-
ment on the high seas.
The General Board conducted a series of confidential hearings from
January to June 1919 to assess the potential role of aviation in maritime
operations. At one session, Commander Kenneth Whiting, who had
been in charge of the first U.S. naval air station in Britain during the war,
told the board, “If the war had gone on a little longer, the bombing of
Kiel, Cuxhaven and Wilhelmshaven would have been done from airplane
carriers. The [British carrier] Furious was equipped with airplanes and
made an attack on Tondern, as she steamed up and down the North Sea
without hindrance.”14 Whiting declared that the increase in gunfire ef-
fectiveness with air spotting was likely to be as great as 200 percent.15
Testimony like Whiting’s led the General Board to find that “to en-
able the United States to meet on at least equal terms any possible
enemy . . . fleet aviation must be developed to the fullest extent. Aircraft
have become an essential arm of the fleet. A Naval air service must be es-
tablished, capable of accompanying and operating with the fleet in all
waters of the globe. Great Britain has already accomplished this.”16
The General Board also recommended that “airplane carriers for the
fleet be provided in the proportion of one carrier to each squadron of
capital ships.” Despite the board’s recommendation, Admiral Benson told
Navy Secretary Daniels that he was “not yet prepared to admit the ne-
cessity for Spotting Planes and Short Distance Reconnaissance Planes
for the fighting ships of the fleet.”17 Benson, however, was overruled.
Twilight of the Battle Line 301
Soon after, a third event convinced even the Navy’s traditionalists to em-
brace aviation.
In November 1920, the Navy conducted a closely guarded aerial
bombing test against the obsolete battleship Indiana. Owing to the classi-
fied nature of the tests (they were intended to inform future ship de-
signs), no results were announced. The Navy was therefore stunned to
see photographs of the stricken Indiana in the Illustrated London News.18
Army Air Corps Brigadier General William “Billy” Mitchell, a strong
supporter of air power’s potential (and whom many suspected of leaking
the photos), promptly declared to Congress, “We can tell you definitively
now that we can either destroy or sink any ship in existence today.”19
Mitchell’s views had clout. He was a genuine war hero. He was the
first American to fly over German lines and was the first awarded
France’s Croix de Guerre for bravery. Although Mitchell’s claims would
prove wildly exaggerated, the general had a gift for attracting attention.
His exploitation of the Indiana test results was seen as a threat by the
Navy, which began to close ranks against a common peril: the United
States Army. Retired Rear Admiral Bradley A. Fiske, a strong supporter
of aviation—naval aviation—urged the service to develop its air arm, em-
ploying the most colorful terms, declaring, “For the sake of the U.S.N.
and the U.S. [of] America—let’s get a Bureau of Aeronautics—as p.d.q.
[pretty damned quick] as possible. . . . If we don’t get that Bureau next
session, Gen’l Mitchell and a whole horde of politicians will get an ‘Air
Ministry’ established, and the U.S. Navy will find itself lying in the street
. . . and the procession marching over it.”20
The challenge posed to naval aviation by Mitchell in the early 1920s
was real and unprecedented. Not only did Mitchell lay claim to the tradi-
tional naval function of first line of homeland defense, which he argued
could be better performed by aircraft, but he also proposed that an inde-
pendent air service be put in charge of aircraft carriers on the grounds
that these were, properly considered, “aircraft transports.”21 As the battle
lines between the Navy and Mitchell were drawn, the fight shifted to
Congress. Congressman Fred C. Hicks, of the House Naval Affairs
Committee, became an ardent supporter of an independent naval avia-
tion arm, as did Senator William Borah. When General Mitchell suc-
ceeded in having an amendment inserted in a House appropriations bill
for the Army in 1920 that would have put that service in control of “all
aerial operations from the land bases,” Secretary Daniels successfully
mobilized members of Congress to oppose it.22
302 Part 2
Although the Navy warded off Mitchell’s initial challenge, his ideas
continued to gain currency. He secured permission for a highly publi-
cized Army bomber attack on the former German battleship Ostfriesland
in July 1921, to which he invited senior political and military leaders. The
experiment was a success, in that the ship was sunk. But the test parame-
ters were heavily skewed in favor of the attacking aircraft. The ship’s po-
sition was known in advance. It also was at anchor, which precluded it
from conducting evasive maneuvers. It had no escorting air defense ships,
so there was no simulated anti-aircraft fire. Naval observers discounted
the significance of Mitchell’s stunt, but the fact that aircraft had sent a
battleship to the bottom meant that he reaped a public-relations windfall
with the U.S. public and the Congress.
Despite the Navy’s outrage, Mitchell’s well-publicized views proved
useful to the service’s air enthusiasts. Like Mitchell, these men believed
in the potential of air power to transform war at sea, but they sought to
realize that potential within their service, not apart from it. In February
1921, Admiral Benson, concerned over General Mitchell’s criticisms,
finally agreed to establish a bureau for naval aviation. The Bureau of
Aeronautics—“BuAer”—the Navy’s first new bureau in sixty years, was
established in August, with Rear Admiral William A. Moffett as its chief.
Now the Navy had a vision for naval aviation and a home for it as well.
Shortly thereafter, the General Board recommended the construction of
three mammoth 39,000-ton carriers.23
Although a growing number of naval officers believed an air arm
could be an asset, there was great uncertainty as to what form it would
ultimately take, how important it would be, and whether the vision of its
most ardent supporters would be realized. Moreover, while aviation
technology was proceeding at a rapid rate in the early 1920s, it was im-
possible to know how much more progress could be made or how soon.
In 1923, the General Board consulted experts in aeronautics, including
Massachusetts Institute of Technology president S. W. Stratton, Johns
Hopkins physicist J. S. Ames, and E. P. Warner, who chaired the Aerody-
namic Department at MIT, along with leading members of the National
Advisory Committee for Aeronautics (NACA), among them W. F. Du-
rand of Stanford University; George W. Lewis, NACA’s research direc-
tor; and Rear Admiral David Taylor, NACA’s secretary. These experts
forecast that “present maximum performance of heavier-than-air craft
may be increased about thirty per cent by future developments extending
over an indefinite period of years. All of them consider it most unwise to
Twilight of the Battle Line 303
water. The torpedo plane carrier is a capital ship.” Sims asked Fiske if he
would trade the “airplane carrier of the future for the battleship of the
present.” Fiske responded, “Yes:—I think a 35-knot torpedo plane carrier
(able to shoot 20 torpedo planes 200 miles) would be a ‘capital ship’—a
more ‘capital ship’ than the [battleship] New Mexico.” Sims concurred, tell-
ing Fiske, “If I had my way, I would arrest the building of great battleships
and put money into development of these new devices [aircraft carriers]
and not wait to see what other countries are doing.”28
As for the games themselves, they generated important insights for
Navy theorists, planners, and practitioners, exerting strong influence on
carrier design and aircraft type and mix. They showed that it was critical
to maximize the number of aircraft the fleet could operate. This led to
efforts to increase the number of aircraft on carriers and to compress the
operating cycle for launching and recovering aircraft.29
“BuAer”
The Navy trinity’s second element was the Bureau of Aeronautics. Its
head, Rear Admiral Moffett, like Sims, was a product of the surface fleet,
commanding the battleship Mississippi before returning to Washington to
take charge of the Navy’s newest bureau. Earlier in his career, Moffett
had established an aviator training program during World War I while
commanding the Great Lakes Naval Training Center. Sims provided
the intellectual fuel that sustained the Navy along its path toward the
fast carrier task force, and Moffett added BuAer’s own, while providing
bureaucratic and political support, especially through his forceful advo-
cacy in the highest circles of the executive and legislative branches of the
government.
Moffett saw BuAer as a think tank of sorts for naval aviation, as well
as a school for the service’s future aviation leaders. Moffett was a superb
bureaucrat and consummate public-relations chief. His ability to culti-
vate the nation’s political leaders’ support of naval aviation was remark-
able. As one observer noted, “Moffett has tackled the subject with almost
fanatical zeal, supported by the whole nation from the president down-
wards.”30 The admiral’s ceaseless efforts to win key congressional leaders’
support are reflected in a note he penned at Christmastime 1931 to Con-
gressman Carl Vinson, the new chairman of the House Naval Affairs
Committee. Moffett wrote, “Upon my return from the flight of the [Air-
ship] Akron over your district . . . the thought occurred to me . . . that the
306 Part 2
people were all your friends and how fortunate they are to have you rep-
resent them in Congress. . . . I have had the honor and pleasure of know-
ing you a great many years, and feel they are to be congratulated.”31
Vinson would prove an indispensable ally to the Navy in general—and
naval aviation in particular—during the crucial decade of the 1930s.
By the late 1920s, Moffett had been head of BuAer for two consecu-
tive terms spanning seven years. He knew that third terms for bureau
chiefs were almost unheard of. Still, he set out to be reappointed, in part
because he feared that the progress being made in naval aviation, al-
though hard-won, remained tenuous. As BuAer’s chief, Moffett become
so expert at working the levers of power in Washington that there was
strong bureaucratic opposition within the Navy to retaining him as
BuAer’s director. Undaunted, Moffett initiated a letter-writing campaign,
whose message was that the Navy planned to reassign him, as the “Navy
does not appreciate Aviation and its importance, and the majority still
consider battleships and surface vessels of infinitely greater impor-
tance.”32 Soon President Herbert Hoover was receiving letters from key
congressional and business leaders supporting Moffett’s reappointment.
Hoover asked the Navy for nominations for director of BuAer. The
task for responding went to Rear Admiral Richard H. “Reddy” Leigh, the
head of the Navy’s Bureau of Navigation (BuNav) and a Moffett rival.
Leigh submitted three names to the White House, omitting Moffett’s.
The list was returned, with a letter asking for additional nominees. Leigh
resubmitted a longer list, with Moffett’s name still absent. Once again,
the list was shipped back to Leigh, requesting still more nominees. At
this point, articles were appearing in the press supporting Moffett’s reap-
pointment. Finally, Leigh submitted a list of all officers eligible to fill the
billet, with Moffett’s name at the very bottom. At last, Leigh received the
president’s reply: “Approved for Admiral Moffett.”33
Moffett’s early years at BuAer found him beating back Billy Mitch-
ell’s attempts to place naval aviation under a single Air Corps. Mitchell’s
star, however, was dimming. By early 1925, his insubordination led the
Army to reject his request to be reappointed as assistant chief of staff of
the Air Service and to assign him to San Antonio, Texas, as air officer to
an Army corps, where he reverted to his permanent rank of colonel.
Following the crash of a Navy dirigible in September 1925, however,
Mitchell publicly accused both the Army and the Navy leadership of ne-
glecting aviation and thereby encouraging such disasters. He was brought
before a court-martial for his remarks, but President Calvin Coolidge
Twilight of the Battle Line 307
Fleet Problems
In 1921, as Admiral Sims was beginning the war-gaming exercises at the
Naval War College and BuAer was being established, the Navy’s War
Plans Division began to assume the presence of aircraft carriers in the
fleet. It was the Navy’s series of fleet problems, however, that offered the
most visible, and thus perhaps the most compelling, argument for naval
aviation.
The War College, BuAer, and the fleet formed a mutually supporting
trinity. BuAer, through its association with industry and organizations
like NACA, kept apprised of developments in aviation technology. The
Naval War College tapped into BuAer for projections of future aviation
capabilities and employed these projections in its war games. Insights
from the college’s war games were funneled into the fleet problems,
whose results were studied by BuAer and the War College, creating a
virtuous cycle.
The fleet problems brought together the Navy’s chain of command
under conditions that came as close as practicable to war itself. During
the course of twenty-one fleet problems, conducted from the early 1920s
until Pearl Harbor, the fleet explored a range of challenges at the strate-
gic and operational levels of war. The exercises also offered an opportu-
nity to identify and resolve tactical-level matters.
The initial steps were modest. Following the Ostfriesland experiment,
Admiral Moffett saw the need to get significant numbers of aircraft
308 Part 2
into practice insights he had harvested from the War College’s war
games. They included the advantage accrued by conducting carrier air
strikes in “pulses” rather than “streams”—a “downpour” rather than a
“drizzle”—and the need to get as many aircraft aloft as possible and as
rapidly as possible.40
Toward that end, Reeves rejected existing carrier operational proce-
dures, which were based on Royal Navy carrier operations. The British
had only one aircraft on deck at a time, whether for takeoffs or landings.
When a plane landed, it was lowered to the hangar deck before the next
one was allowed to land. Reeves would not abide this torpid pace of car-
rier operations. He fitted the Langley with arresting gear to halt landing
aircraft on the deck and a crash barrier that would enable aircraft to re-
main parked on the flight deck, rather than being lowered below deck.
Thus, when a plane landed on the Langley, the crash barrier, which had
protected the planes in the “deck park” located forward, was lowered.
The plane was moved forward behind the crash barrier, which was then
raised as the next incoming aircraft landed. This dramatically increased
aircraft operational cycle rates. From the beginning, U.S. carriers typi-
cally parked the majority of their aircraft on the flight deck, using the
hangars below primarily for maintenance and repair activities.41
Repelling an enemy air attack was included as part of Fleet Problem
VI, set for February 1926. When Reeves took command, it took fifty-two
minutes to land Langley’s ten aircraft. By August, aircraft were being
recovered at a rate of roughly ninety seconds each. Reeves soon had
the ship launching ten of its fourteen aircraft in less than two minutes.
Three days later, seven planes were launched in forty-one seconds.42
During the fleet problem, the Langley provided the “Blue Fleet” to which
it was assigned a scouting advantage over the “enemy” “Black Fleet,”
which relied on floatplanes stationed on battleships and cruisers. The
Langley also demonstrated its worth operating as part of a new circular
tactical formation, which would prove immensely valuable for the fast
carrier task force in the Pacific War.43 On August 9, Langley’s aircraft
made 127 landings in a single day, demonstrating its ability to conduct
sustained air operations. Thanks to the crash barrier and deck park,
Reeves was able to double the ship’s air complement to twenty-eight
planes.44
Reeves’s experiments aboard the Langley convinced the Navy that
carriers would have to be constructed with an offset island superstruc-
ture, through which boiler-stack gases could pass. Other innovations saw
310 Part 2
the use of a landing signal officer to guide arriving aircraft and indirect
deck lighting to facilitate night operations.45 A carrier’s elevator would be
positioned on the port side, enabling aircraft to be raised and lowered so
as to minimize interference with flight-deck operations. When Fleet
Problem VII was conducted in the Caribbean in 1927, the Langley was
classified as a combatant ship. Yet, despite these encouraging develop-
ments, it was not yet clear that carriers would form the backbone of
naval aviation. Indeed, until the carriers Saratoga and Lexington were
commissioned late that year, barely one-third of the Navy’s air squadrons
were associated with carriers.46
While offering encouragement to naval aviation enthusiasts, the Na-
vy’s early fleet problems also put paid to Billy Mitchell’s extravagant
claims regarding air power’s current capabilities. Despite the publicity
given to the sinking of the Ostfriesland, accurate horizontal bombing
against a maneuvering ship protected by anti-aircraft fires proved highly
challenging. Reeves considered the Navy’s bombsight for horizontal
bombing “a marvel of uncertainty and inaccuracy.”47 In July 1924, the
Royal Navy undertook a similar test with the radio-controlled battleship
Agamemnon. More than 100 bombs were dropped on the ship without
the air attackers scoring a single hit. More discouragement for aviation
enthusiasts came from trials of anti-aircraft guns, which scored 75 per-
cent hits on aerial targets above 4,000 feet, suggesting that an aircraft at-
tacking a battleship would probably not survive to drop its bomb, and if
it did, the bomb would miss anyway.48 The General Board discussed
these trials at length, concluding that battleships armed with anti-aircraft
guns would make the already inaccurate aerial bombing even more so.
It appeared that the only way for carrier-based aircraft to attack sur-
face combatants effectively was with torpedoes—but the torpedoes of the
time were barely faster than the ships at which they were fired. Owing to
the short range of aircraft-borne torpedoes, they had to be released close
to their target, making aircraft highly vulnerable to a ship’s anti-aircraft
defenses. Torpedoes also had a tendency to fail. Finally, early carrier air-
craft could not lift torpedoes powerful enough to sink large warships.49
Undaunted, the Navy continued to experiment with aircraft bomb-
ing tactics. This paid dividends when, on October 22, 1926, Lieutenant
Commander Frank D. Wagner led a flight of Curtiss F6C Hawks in a
simulated attack on ships steaming toward San Diego. With Wagner’s
aircraft commencing their nearly vertical dives at an altitude of 12,000
feet, they achieved total surprise over the defenders, even though the
Twilight of the Battle Line 311
fleet had been forewarned that it would be subjected to an air attack. The
surprise was so complete and the effectiveness of the dive-bombing tech-
nique so impressive that Admiral Charles F. Hughes, commander-in-
chief of the U.S. Fleet, declared that such an attack would succeed over
any defense.50
Wagner’s combination of a steep dive attack employing machine-gun
fire and relatively light bombs proved far more effective than torpedo-
plane attacks.51 In exercises conducted in the fall of 1926, aircraft con-
ducting dive-bombing attacks achieved “staggering” results. Of the 311
bombs dropped, 44.5 percent were scored as direct hits. Even more im-
pressive, experienced pilots flying newer aircraft—the Curtiss F6C
Hawks and Boeing FB-5s—achieved direct hits at a 67 percent rate. The
aircraft, however, were only capable of carrying twenty-five-pound
bombs, so they presented no threat to the battleship.52
Naval aviation enthusiasts took comfort from continuing rapid ad-
vances in aviation engine technology, which meant that aircraft would fly
ever farther and carry ever heavier bombs. Two years after Wagner’s dem-
onstration, the fleet had aircraft capable of carrying 300-pound bombs,
and 500-pound bomb payloads were considered well within the realm of
possibility. That year found BuAer drawing up plans for an experimental
plane dubbed a “diving bomber.” Although the heaviest bombs employed
in dive-bombing to that time topped out at 100 pounds, carrier designs
called for the aircraft to deliver ordnance in the 1,000-pound range.53
Fleet exercises in May and June 1931 off the coast of San Diego indicated
that although carrier torpedo bombers would encounter heavy losses
from battleship anti-aircraft batteries, dive-bombers could attack at far
less risk.54 This further tilted the scales in favor of dive-bombing for car-
rier strike operations. Nevertheless, the Navy, reluctant to put all its eggs
in one basket, continued to pursue its horizontal- and torpedo-bombing
options.
the U.S. and Royal Navies and 81,000 tons for the Imperial Japanese
Navy. The treaty banned Britain, Japan, and the United States from con-
structing new fortifications or naval bases in the Pacific Ocean. This pro-
vision was widely viewed as benefiting Japan, given its location in the
Western Pacific and the relative paucity of U.S. and British bases in the
region.
The British proposed, and the United States and Japan accepted, al-
lowing each country to convert two battle cruisers to aircraft carriers.
Two U.S. ships under construction were designated for conversion. Sara-
toga joined the fleet in November 1927, followed by Lexington a month
later. Each displaced 33,000 tons and had speeds in excess of thirty-three
knots.55 To reach the treaty carrier tonnage limits, the Navy’s plans called
for launching three 23,000-ton carriers over the following three years.
Congress, however, provided no funds for new carriers between 1924
and 1928.
Moffett was skeptical of building such large carriers. BuAer’s princi-
pal measure of merit for carrier design was the size of its flight deck.
Moffett used it in arguing for small carriers in a report to the General
Board on June 20, 1927, noting, “there is a far greater flight deck area
available on a large number of small ships than a small number of large
ships.”56 He concluded, “It appears that 14,000 tons approaches the
upper limit of displacement which should be considered for carriers of
the future.”57 In recommending carriers less than half the size of Saratoga
and Lexington, the admiral argued, “Your whole air force would be more
mobile. You could have the air force in a greater number of places.”58
This, Moffett believed, would provide the fleet with operational flexibil-
ity. Small carriers’ aircraft could patrol a larger area, a major asset in the
broad expanses of the Pacific. Relying on a few large carriers like Sara-
toga and Lexington risked putting too many of the fleet’s aircraft eggs in a
small number of baskets. Simply put, the two large converted cruisers
were almost exactly the type of carrier that the Navy studies and experi-
ments at that time were telling Moffett he should not want. Ironically,
they were the kind of carrier the Navy would need fifteen years later in
the Pacific War.
Although the Navy fretted that the Saratoga and Lexington consumed
an excessive amount of the 135,000-ton treaty limit on carriers, had the
Washington Treaty not been in place the steeply rising unit cost of bat-
tleships and battle cruisers would probably have produced a crowding-
out effect on funding for carrier construction.59 Indeed, when limits on
Twilight of the Battle Line 313
its three converted ships before its first purpose-built carrier, Ranger, ar-
rived in 1934.
Moffett and Vinson’s loss proved the Navy’s gain. The Naval War
College’s assessments and General Board’s misgivings proved correct.
The flying-deck cruiser was neither a good cruiser nor a good carrier. It
would have led the Navy down a dead end as aviation technology contin-
ued to mature. Aircraft were rapidly becoming too large and heavy to
operate off the short deck of a 10,000-ton cruiser-carrier hybrid. In fact,
advances were coming so quickly that even BuAer soon soured on the
concept and allowed it to slip silently beneath the Navy’s programmatic
waves.
The “unwanted” Saratoga and Lexington proved well suited for ac-
commodating the rapid advances in aviation, while offering higher sus-
tained speed and better survivability than the flying-deck cruiser. And
their large aircraft capacity gave the Navy freedom to mix several types
of aircraft in substantial numbers. This would pay big dividends during
two significant shifts in maritime warfare that occurred in rapid succes-
sion beginning in the late 1930s.65
As noted, the Washington Naval Treaty also created a major problem
for the Navy, which had counted on establishing major forward bases on
Guam, the Marianas, and the Philippines to prosecute a successful war
against Japan. Without these bases, the Navy would have to bring its
own air power across the Pacific, while also developing the capability to
seize advanced bases to support its extended operations. Captain Frank
Schofield, a member of the General Board, explained the enormous
significance of this provision in an address at the Army War College in
September 1923:
Sea Power is not made of ships, or of ships and men, but of ships
and men and bases far and wide. Ships without outlying bases are
almost helpless—will be helpless unless they conquer bases and
yet the Treaty took from us every possibility of an outlying base
in the Pacific except one [Hawaii]; we gave our new capital ships
and our right to build bases for a better international feeling—
but no one gave us anything. Manifestly the provisions of
the Treaty presented a naval problem of the first magnitude that de-
manded immediate solution. A new policy had to be formulated
which would make the best possible use of the new conditions.66
[emphasis added]
Twilight of the Battle Line 315
Simply put, the Navy needed a fleet capable of operating at long range
and, at least initially, independent of support from forward bases.
Of course, the Washington Treaty constrained all great-power navies,
only some more than others. On balance, the treaty exerted a positive—
albeit serendipitous—effect on the Navy’s development of the fast carrier
task force. By banning battleship construction and allocating 135,000
tons for carriers, it not only permitted carrier construction but incentiv-
ized it. When the treaty collapsed in the late 1930s, the Navy had the
20,000-ton Yorktown-class carriers entering service and a design for the
31,000-ton Essex class nearly ready.67 By allowing for the conversion of
cruisers to carriers, the treaty encouraged the Navy to build large carri-
ers, the kind that would be needed for the coming war. By also providing
a ceiling on carrier tonnage, the treaty also ensured that there would be
little excess baggage in the fleet in the form of small, obsolete carriers,
such as the Langley and, later, the Ranger, or new battleships whose value
was depreciating rapidly, to slow the final sprint to a radically different
means of conducting war at sea.
the Langley.69 By the late 1920s, Navy planners were assigning new mis-
sions, including long-range patrolling and raids on enemy bases, to the
recently commissioned Saratoga and Lexington.70
The Navy’s vigorous exercise program continued, with Langley par-
ticipating in several small exercises off the coast of the Hawaiian Islands
during the spring of 1928 to test the carrier’s proficiency in these new
missions. On the evening of May 16, Langley, along with several other
ships, steamed out of Pearl Harbor. Just before dawn the following
morning, Langley launched its entire complement of thirty-five planes
within seven minutes. Arriving over Honolulu at daybreak, the aircraft
caught the Army’s air component at Wheeler field by surprise, even
though the Army had been forewarned. Having had to maneuver so close
to the island to conduct its attack, however, the Langley itself was spotted
by land-based torpedo planes, which attacked the vulnerable ship.71
Looking back over the decade since the end of World War I, it was
clear that much progress had been made in the Navy’s understanding
and development of aviation. The carrier was now widely accepted as an
important part of the fleet. But the battleship and the line of battle
reigned supreme, and for good reason. Entering the 1930s, aircraft were
still severely limited in their range and bomb payloads. Thus, carriers
had to steam dangerously close to an enemy fleet before launching their
aircraft and then loiter forward to recover those returning from their
strike missions. To many observers, this level of carrier vulnerability
was too great to sustain an argument for independent carrier strike
operations.
The commissioning of the Saratoga and Lexington with their huge air
wings moved Admiral Charles F. Hughes, the U.S. fleet commander, to
assert that the fleet needed to rethink how it operated its air force, since
“the advantages of suppressing an enemy air offensive before it has
launched may have a far reaching effect upon the engagement of main
forces.”72 The admiral’s views ended up being put to the test in January
1929 during Fleet Problem IX, the first in which both sides had carriers.
The problem was conducted off Central America. During the exer-
cise, Vice Admiral William V. Pratt (who had recently served as president
of the Naval War College) authorized Rear Admiral Reeves, command-
ing Saratoga, to execute a high-speed run toward the Panama Canal.
Reeves “attacked” the canal with a seventy-plane strike force launched
140 miles from the target. The attackers, arriving at 7:00 a.m., achieved
complete surprise, “striking” the Miraflores and Pedro Miguel Locks
Twilight of the Battle Line 317
Both Yarnell and his Black Fleet counterpart, Captain Ernest King,
focused on neutralizing the other’s air power. The Saratoga and Lexington
launched strikes on each other, with each inflicting some damage. King
then received permission from his senior, Admiral William H. Standley,
to operate the Lexington independently of his battle force. King kept the
Lexington out of Saratoga’s engagement range until just the right mo-
ment. Then he launched a forty-nine-plane raid on the Saratoga, crip-
pling it.
King’s attack was praised by the U.S. fleet commander, Admiral
Frank H. Schofield. In Captains King’s and Towers’s presentation of their
insights from the fleet problem, both asserted that the Navy would re-
quire six to eight carriers for an offensive across the Pacific. Towers
wrote Moffett that Fleet Problem XIII was “the most valuable fleet exer-
cise carried out in recent years.”89 The offensive-dominant character of
carrier air operations was now widely accepted. In a speech on October
27 at the Curtiss aircraft plant in Buffalo, Captain Arthur B. Cook, assis-
tant chief of BuAer, declared, “the only effective way to stop the attack of
bombing planes is to seek out and destroy the ships on which they are
based.” Only aircraft operating from carriers could accomplish this,
Cook argued. “The airplane is today one of the most formidable weap-
ons in sea warfare, the aircraft of no less importance than the battleship,
cruiser, submarine, and destroyer.”90
Only three days before Cook’s presentation, Commander Hugh
Douglas, the Naval War College faculty’s only aviator, gave a lecture on
air tactics in which he accurately foresaw the decisive engagement of the
Battle of Midway, some nine years hence. Douglas had recently finished
completing a two-year tour of duty as the Saratoga’s executive officer.
During Fleet Problem XIII, his ship had been put out of action by King’s
aircraft. Douglas told the students, “In case an enemy carrier is encoun-
tered with planes on deck, a successful dive-bombing attack by even a
small number of planes may greatly influence future operations.”91
Fleet Problem XIV, conducted in February 1933, found the Black
(“enemy”) Fleet, with the Saratoga and Lexington and an escorting force,
directed “to inflict maximum damage on the pearl harbor naval base in
order to destroy or reduce its effectiveness.”92 The fleet, however, by-
passed Hawaii in favor of strikes on the U.S. West Coast. The Black
Fleet commander, Admiral Frank H. Clark (a nonaviator), split his force
into three groups, with the northern group organized around the Lexing-
ton and the southern group around the Saratoga. When aircraft from the
322 Part 2
private war apart from the fleet, rather than providing him with air sup-
port. King, who became the chief of naval operations shortly after Pearl
Harbor, was somewhat of a reformist. As a young lieutenant in 1909, he
published a prize-winning article in the Naval Institute Proceedings criti-
cizing the Navy’s culture of “clinging on to things that are old because
they are old,” calling it “a drag to progress.” King also highly valued mili-
tary education, serving a tour as head of the Naval Postgraduate School,
and advocated expanding the Naval War College and requiring all offi-
cers eligible for senior rank to attend it. In 1928, King switched to avia-
tion, earned his pilot’s wings, and became one of the first aviators to
make admiral. He was tough and blunt. One of his daughters described
him as “the most even-tempered man in the Navy. He was always in a
rage.”101 Simply put, King never suffered those whom he considered
fools (and they were many) gladly. Thus, King shot back at his Gun Club
counterpart, informing him that until he, King, won the war for air supe-
riority, he could not ensure the survival of his carriers and that without
the carriers, the battle line would be bereft of air cover, scouts, and gun-
nery support.102
At the General Board hearings in October 1937 called to discuss the
fiscal year 1939 aircraft procurement program, Admiral Arthur B. Cook,
now BuAer’s chief, testified that carriers were clearly offensive systems.
While conceding the point, most Gun Club members pointed out that
even though carrier aircraft could seriously damage a battleship, they
could not sink a battleship; thus, battleships remained the fleet’s capital
ship. Nevertheless, Captain Royal Ingersoll, the director of the Navy’s
War Plans division, testified that strikes by carrier aircraft would be im-
portant in slowing the speed of the faster Japanese battle line. This was
essential if the slower U.S. battleships were to win a fleet engagement.103
Fleet Problem XIX, conducted in March 1938, was designed to help
resolve the growing dispute over the carrier’s role. King, now the Navy’s
carrier commander, saw the exercise as an opportunity to correct what he
felt was a serious misuse of the carrier force in Fleet Problem XVIII.
The scenario divided the fleet into two opposing forces, White and
Black, with the latter seeking to establish a base on White’s coast follow-
ing the destruction of the White Fleet. Black split its forces into two bat-
tleship groups, each accompanied by one of the two carriers in the force,
Saratoga and Lexington. King objected to separating the carriers but
failed to alter the scenario. Ranger, along with some land-based aircraft,
was assigned to the White Fleet.
Twilight of the Battle Line 325
Aircraft from Ranger located and attacked Lexington, which was put
out of commission that evening by nearly forty White land-based patrol
bombers, which also dropped flares to expose Black’s battle line to gun-
fire from the White Fleet. Saratoga, as King had feared, was too distant
to support the Lexington. The exercise reaffirmed several earlier insights,
including the danger posed by land-based air forces and the offensive-
dominant character of carrier warfare. It did not, however, do much to
resolve the dispute over carrier doctrine.
The second phase of Fleet Problem XIX tested Hawaii’s defenses.
Here things went better for King. The forces were again configured in
two fleets. The Blue Fleet was directed to execute an amphibious landing
against a Red Force on Hawaii. Red defenses included Army Air Corps
planes and Navy patrol bombers. King, allowed to devise his own tactics,
had both Saratoga and Ranger at his disposal with the Blue Fleet. He di-
rected Saratoga to maneuver northwest of Oahu to launch a predawn at-
tack on the island. Just before dawn on March 29, Saratoga launched a
surprise attack on the Army’s Hickam and Wheeler air fields and the
Pearl Harbor Naval Air Station. As was the case with Admiral Yarnell’s
carrier force six years earlier, King demonstrated Pearl Harbor’s vulnera-
bility to carrier air attack.
The third and final phase of Fleet Problem XIX found the force
again divided into two fleets. The Purple Fleet prepared to launch at-
tacks on the Green Fleet’s base, located at San Francisco. Assigned to the
Purple Fleet, King formed Saratoga and Lexington into an independent
strike force. Breaking off from the battle force, King maneuvered the
carriers into position where he could begin launching air strikes on
Green’s base. Following the strikes, the carriers rejoined the Purple
Fleet’s main body, where their scouting aircraft located the Green Fleet.
King’s carriers then launched strikes against the Green Fleet’s cruisers,
destroyers, and submarines. As the exercise terminated, there was general
agreement that the carriers had performed well. Still, the debate over
proper carrier doctrine persisted.104
with the installation of the combat information center aboard U.S. war-
ships, radar improved fleet air defense enormously, particularly in vector-
ing combat air patrols toward inbound Japanese air strikes.”106
The Navy began to research radar during the 1930s. By the fall of
1933, the Navy understood radar’s potential to enhance search opera-
tions and fire control; however, it lacked high-power vacuum tubes for
the kinds of radar needed. Firms like RCA and General Electric had no
need for them and were not interested in funding work in this area. Rear
Admiral King, who had succeeded Moffett as head of BuAer following
the latter’s death in the crash of the airship Akron, came up with the
money to fund the radar work at the Navy Research Laboratory.107 By
1936, the Navy Research Laboratory was conducting successful demon-
strations of radar equipment aboard ships. Early in 1938, a search radar
was installed on a battleship and subjected to exhaustive testing during
fleet maneuvers in the Caribbean the following year. The tests were a
success, with approaching aircraft being detected at ranges out to fifty
miles.108 The Navy began to mount search radars on all carriers and on
many surface combatants. Progress was also being made on fire-control
radar.
Breakthroughs in radar technology continued apace. By July 1941,
fleet exercises revealed that carrier formations equipped with radar—able
to detect approaching enemy aircraft at a considerable distance—were
potentially capable of tipping the balance in carrier air warfare in favor
of the defense. Radar was also emerging as an indispensable navigation
tool.109 No less an authority than Fleet Admiral Chester W. Nimitz,
commander of U.S. naval forces in the Pacific during the war, considered
radar as revolutionary for naval warfare as the steam engine had been a
century before.110
to 1929, the naval air arm grew by more than 6,500 personnel, excluding
the crews of the manpower-intensive Saratoga and Lexington, while over-
all Navy personnel strength declined by more than 1,000.118
Budgets became tighter during the Great Depression. Admiral Mof-
fett, who in 1930 was pressing for more carriers, was able to get but one
(the Ranger) authorized by Congress. Even then, the nation’s deepening
financial crisis delayed its being laid down.119 In 1931, the General Board
wanted to build the fleet up to the full limit permitted by the Washing-
ton Naval Treaty; at the same time, many members of Congress favored
decommissioning some battleships and carriers as an economy measure.
(A number of naval aviators brassily argued that, if reductions should
occur, the battleships should be the first to go!)120 Fortunately, enough
carriers were in the fleet to enable their effective use in the fleet prob-
lems, while the industrial base remained strong enough to begin produc-
ing carriers in ever greater numbers as the war clouds grew close in the
late 1930s.
Congress authorized constructing only three “from the keel up” car-
riers in the twenty years following World War I, which coincided with
the Navy’s period of greatest experimentation with naval aviation.121 This
had some deleterious effects. Yet it also helped the Navy to avoid locking
in to a class of carriers before the rapid advances in aviation technology
had begun to level off and before the character of the threat to the
United States had clearly manifested itself. By enabling the Navy to
build and experiment with carriers, Congress serendipitously helped to
ensure that, in the late 1930s, when the danger of war was growing rap-
idly, the United States could quickly expand carrier production.
The Navy proved very effective at “time-based competition.” The
service, through a combination of design and luck, positioned itself to
transform very quickly into a radically different kind of fighting force.
Importantly, the Navy did not have to build carriers in large numbers to
bring about a revolution in warfare at sea. Before Pearl Harbor, the Navy
had constructed only eight carriers. Of those eight, only five—Saratoga,
Lexington, Yorktown, Enterprise, and Hornet—approximated in size the
workhorse Essex-class carriers that started joining the fleet in 1943. Put
another way, a relatively small perturbation in the Navy’s capital ship
program yielded “revolutionary” results.
Following the carrier-dominated fleet engagements at Coral Sea and
Midway in early 1942, the Navy moved aggressively to alter its ship-
building priorities. Battleships were the principal casualty. The Iowa class
Twilight of the Battle Line 329
was terminated at four of the six planned ships, and the Montana class
was canceled. Sixteen fleet or fast carriers (CVs) were commissioned dur-
ing the war, along with seventy-nine light (CVL) and escort (CVE) carri-
ers. Not every ship type suffered the battleship’s fate. Between 1941 and
1945, the number of submarines and destroyers in the fleet more than
doubled, a feat nearly matched by the cruiser force.122
Of course, the carriers needed modern aircraft in large numbers.
This required a capable aviation industrial base. During the 1920s and
1930s, aviation was—if not in its infancy—still very much in its adoles-
cent stage. It was a technology marked by rapid change and not a few
surprises. The Navy had experience designing ships, but it needed an in-
dustrial base that could provide it with aircraft and that could surge pro-
duction when needed to meet the needs of a rapidly expanding carrier
force.
The aviation industry that formed a key element in the United
States’ “arsenal of democracy” took decades to develop. In 1916, Secre-
tary of the Navy Daniels suggested the Navy build its own aircraft fac-
tory to provide the fleet with prototype aircraft in small numbers for
experimenting that private industry could not provide profitably. A plant
for this purpose was built at the Philadelphia Naval Yard in 1917.
The plant also helped the Navy validate the commercial aviation indus-
try’s claims with respect to its costs, production schedules, and technical
competence.123
Although naval aviation benefited little in its early years from the
emergence of civil aviation, NACA did, over time, promote what today is
referred to as dual-use technology. Innovations such as aerodynamic
streamlining, supercharged piston engines for operating at higher alti-
tudes, and internally pressured cabins were developed under NACA aus-
pices with financial and engineering support from the Army and Navy.124
The budget reductions following World War I were ameliorated to
some extent by the Navy’s recognition that accelerating aviation technol-
ogy meant that existing aircraft represented a rapidly depreciating asset.
The General Board acknowledged this in a June 1919 memo, declaring
that “construction [of aircraft] should be kept as low as possible, . . . but
for experimental and developmental work, a liberal appropriation should
be included in each yearly program.” With the postwar drawdown, the
Navy’s requirement for aircraft dropped to just 156 planes in 1921,
stressing the infant commercial aircraft industry, which depended heavily
on the government for business.125 Adding insult to injury, commercial
330 Part 2
firms had to face competition from the Navy’s own Naval Aircraft
Factory, which had emerged as one of the country’s largest aircraft
manufacturers.
In January 1922, Admiral Moffett resolved the problem, instructing
the Naval Aircraft Factory to concentrate primarily on research, develop-
ment, testing, and evaluation of experimental aircraft models. The factory
would continue to produce aircraft, but only in limited numbers to pro-
vide a cost baseline for comparison with commercial manufacturers.126
Some aviation firms argued that their competitive advantage in de-
sign and innovation would be diluted by the Navy’s retaining a compe-
tence in this area.127 Indeed, BuAer’s large design and engineering staff
would remain a bone of contention with private industry throughout the
interwar period. In any event, for the new arrangement to succeed, Con-
gress needed to provide the funding necessary to make it work. Moffett
argued that keeping the fledgling commercial industry alive and innova-
tive was essential since, should war occur, “there would be a tremendous
urge to get what we need in the shortest possible time.”128 Nevertheless,
the Navy’s inventory of combat aircraft fell by more than 50 percent in
the seven years following World War I.
Moffett testified before the Morrow Board, “the best thing that
could be done for the aircraft industry would be for the Government to
have a building program in aviation . . . so that the industry would know
just what we would get not only this year and next year but for several
years.” He noted, “It is extremely difficult for aircraft manufacturers to
carry out an orderly and economic procedure” without “a continuing
construction policy.”129
Moffett lobbied for his aircraft program with key members of Con-
gress and with Morrow himself.130 His efforts paid off. The Morrow
Board report, released in December 1925, recommended that Congress
authorize 1,000 modern aircraft to support naval aviation. The adminis-
tration announced its support, and Moffett and his staff actually drafted
the aircraft authorization bill.131 With all the pieces in place, in 1926
Congress authorized a five-year, 1,000-aircraft naval aviation procure-
ment program.
The Navy reached its goal of 1,000 modern (albeit rapidly obsolesc-
ing) aircraft during the summer of 1930, a year ahead of schedule. Given
the relatively high number of aircraft authorized, the Navy explored
a range of aircraft types that Moffett wanted for experimenting. The
instructions to the Taylor Board, which was charged with reviewing
Twilight of the Battle Line 331
aircraft types, stated, “It is necessary to assume certain risks in the pur-
chase of new equipment, and be willing to assume these risks if we expect
to advance.”132
Naval aviation funding suffered as the Great Depression, triggered
by the stock-market crash of October 1929, stretched through the 1930s.
The Navy’s aviation budget for fiscal year 1934, submitted in April 1932,
called for $29.8 million, a reduction of $3 million from the previous year.
By the time the Bureau of the Budget signed off, however, it was cut to
less than $22 million.133
The tight Depression-era budgets had an unintended salutary effect.
If the Navy’s aircraft procurement budget was quite limited, so too was
its ability to accumulate a large inventory of aircraft depreciating precip-
itously in value given the rapid progress in aviation technology. The Na-
vy’s leaders appeared to realize this and avoided locking in to large buys
of a single type of aircraft. As late as October 1937, the General Board
heard the director of the Navy’s War Plans Division arguing against
large production runs of carrier aircraft on the grounds that these be-
came “obsolete quickly.”134 Thus, from 1932 to 1938, the Navy’s inven-
tory of combat aircraft remained essentially stagnant in number. Yet it
was anything but stagnant in aircraft types. During this six-year period
alone, the Navy introduced eleven new kinds of combat aircraft: two
bombers, one fighter-bomber, five fighters, two scout bombers, and one
torpedo bomber. Rather than invest scarce resources in maintaining a
large inventory of rapidly obsolescing aircraft, the Navy emphasized
keeping pace with technology.
Fortunately for the Navy, Congress passed the Vinson-Trammell Act
of 1934, also known as the Naval Parity Act, authorizing the Navy to
build the fleet to Washington Naval “treaty strength.” Motivated primar-
ily as a means for pulling the United States out of the Great Depression,
it also helped restore the aviation industry’s health by funding the con-
struction of more than 1,000 naval aircraft over five years.135
The pace of events accelerated with Japan’s invasion of China in
1937. Following the Washington Naval Treaty’s collapse, in 1938 Con-
gress passed the Naval Expansion Act, providing for a 20 percent in-
crease in battle fleet ship tonnage.136 Germany invaded Poland in
September 1939, precipitating war with Great Britain and France. Fol-
lowing the stunning collapse of France in June 1940, Congress moved to
enhance U.S. defenses, increasing the ceiling on naval aircraft to 4,500, a
50 percent boost above the level set just a few years earlier. Soon after, a
332 Part 2
third Vinson Act passed, increasing the ceiling to 10,000. In July, Con-
gress passed the Two Ocean Bill, raising the limit to 15,000 aircraft.137
As the war in Europe took a turn for the worse and U.S.-Japan rela-
tions became increasingly strained, the United States’ industrial base re-
sponded to the Navy’s needs. From 1940 to 1944, the numbers of naval
aircraft, on average, doubled each year, for an overall increase of nearly
2,000 percent.138
In summary, given the uncertainties and limitations the Navy faced,
it adopted a hedging investment strategy. It created a “balanced” fleet in
which the option remained open to expand the battle line by ramping up
construction of substantially better battleships of the Iowa and Montana
class or to move relatively quickly to increase the number of fast carriers
with the Essex class. By not accumulating a large inventory of rapidly ob-
solescing aircraft in the 1930s, the Navy could shift more quickly to pro-
duce the modern war-winning air arm of the early 1940s.
Pilots
For the Navy to sustain the development of its aviation arm, it needed to
attract and maintain sufficient numbers of capable officers as pilots. Dur-
ing naval aviation’s infancy in the 1920s, the Navy’s officer corps was
dominated by graduates of the United States Naval Academy. More than
80 percent of Annapolis graduates first went to sea in battleships, the
command of which was almost a prerequisite for making admiral.139 The
naval-aviation visionaries were able to expand their numbers in large part
by demonstrating to the Gun Club admirals that aircraft were necessary
for the battle fleet’s tactical and operational effectiveness.140 This they
did, thanks to experiments like that with the battleship Texas and spot-
ting. Naval-aviation enthusiasts also benefited from the claims made by
General Mitchell and his supporters, and from the Navy’s desire to keep
pace with the Royal Navy, which had pioneered carrier aviation.
Thanks in part to BuAer’s advocacy and findings like that of the Mor-
row Board, talented officers, among them Moffett, King, and Reeves, saw
naval aviation as important and as a means of advancing their careers.
Still others, like Sims and Fiske, were simply enamored of air power’s po-
tential. Then there was flying itself, which had captured the imagination
of many Americans in the 1920s and ’30s. Many young men jumped at
the chance to fly, despite the significant risks involved. As Lindbergh and
other aviation pioneers showed, flying was the exciting thing to do.
Twilight of the Battle Line 333
the battle line. In fact, the senior air expert on Kimmel’s forty-man staff
held the modest rank of commander.165 Yet in the months following the
attack, the aircraft carrier established itself as the Navy’s dominant
weapon, not so much because Gun Club diehards experienced an epiph-
any but rather because the Navy, now greatly inferior in battleships to
the Japanese battle fleet, was limited to hit-and-run raids best conducted
by carriers, which were faster and consumed less fuel.166
The Battles of the Coral Sea and Midway in May and June 1942, re-
spectively, confirmed that a transformation in naval warfare had occurred
and that the United States Navy was well positioned to exploit it. The
Coral Sea engagement was the first in history where the two fleets never
achieved visual sight of each other. One month later, the Battle of Mid-
way was dominated by carrier aircraft. Again, the opposing fleets did not
come within sight of each other. Much as in the fleet problems of the
1930s, both sides’ attacking aircraft sought out the other’s carriers as
their principal target, with U.S. aviators finding their targets first. In six
minutes, dive-bombers from Yorktown and Enterprise destroyed three Jap-
anese carrier flight decks with their entire aircraft complement. The Na-
vy’s decisive victory was confirmed by Japan’s overall loss of four carriers.
As Bernard Brodie observed at the time, “A great change had indeed
fallen over the aspect of war at sea. The advent of the attack airplane was
at least as revolutionary as anything which had occurred since the intro-
duction of steam on the warship. It was clear that not only the tactics but
also the whole strategy of naval warfare had been thrown off their foun-
dations, and that, whatever new readjustments were made, the situation
would never again be as it was. The airplane was bound to remain an in-
strument which would command first attention in any naval battle or
campaign of the future.”167
The Navy changed its shipbuilding priorities accordingly. After Pearl
Harbor, the General Board wanted to increase the number of carriers
but opposed converting light cruiser hulls into light or escort carriers
and proposed a building program that would lay down only nine addi-
tional carriers through 1944.168 In May, however, Admiral King, now
chief of naval operations, unilaterally modified the General Board’s rec-
ommendations, indefinitely deferring five battleships and replacing them
with five carriers and ten cruisers.169 Shortly after the Battle of Midway,
Congressman Carl Vinson submitted a bill authorizing construction of
1.9 million tons of carriers, cruisers, and destroyers—but no additional
battleships. When the chief of the Bureau of Ships testified in hearings
Twilight of the Battle Line 339
on the bill, he concurred with Vinson’s priorities. To some degree the bill
reflected the shortage of battleship armor, but it also acknowledged the
battleship’s eclipse by the carrier as the centerpiece of the fleet.170 In late
July, King informed the chairman of the General Board that submarines
would be granted first priority for construction, with battleships slipping
to sixth. Only four of the planned six Iowa-class battleships ended up
being built, and the Montana-class battleships were canceled in July
1943.171
The Navy’s transformation of fleet operations in response to the emer-
gence of the carrier as the new capital ship was so profound that by war’s
end, no major category of warship except mine craft was employed tacti-
cally for the purpose for which it had been built.172 Just as dramatic were
King’s personnel decisions. He ruled that the aviation admiral command-
ing a task force would be the officer in tactical command, even if he were
junior to the surface-force commander. He followed, on September 1, by
creating the position of commander, aircraft, Pacific Fleet.173 Aviators con-
stituted nearly two-thirds of the forty officers promoted to rear admiral
between November 1942 and August 1943. Admiral Towers was made
Nimitz’s deputy, making Towers, an aviator, his logical successor. As Clark
Reynolds observed, Towers’s appointment meant that “naval aviation
would at last gain control of the navy.”174
Carrier Limitations
In the carrier’s role as the new capital ship, it also showed its limitations,
as had the battleship before it. Carrier aircraft had become the chief
naval weapon during the daylight hours. But when the sun set, they lost
most of their effectiveness, and surface-combatant engagements re-
mained the norm.178 Indeed, carrier forces were quite vulnerable to sur-
face ships at night. Following the U.S. carriers’ devastating success
against the Japanese carriers at Midway, they withdrew during the night,
while Japanese surface ships pressed forward in an attempt to catch the
carriers before they departed the area.179 Although the carrier had clearly
displaced the battleship, the latter did not suffer the horse cavalry’s fate,
at least not right away. The battleship dominated a number of maritime
engagements. Apart from the Japanese raid on Pearl Harbor, the annihi-
lation of a Japanese convoy and escort force by U.S. Army Air Force
bombers in the Bismarck Sea, and the cruiser and battleship actions off
Guadalcanal between November 12 and 15, 1942, there were seventeen
named battles between Japanese and U.S. naval forces during the first
two years of the war. Only four were carrier battles.180
Battleships were hardly sitting ducks against carrier-based aircraft,
particularly once they were fitted with anti-aircraft batteries and oper-
ated as part of a carrier task force. Battleships in the latter part of the war
typically had a defensive effectiveness against aircraft perhaps several or-
ders of magnitude as great as those in the former period.181 In the Battle
of Santa Cruz in November 1942, one of the newly commissioned U.S.
battleships shot down thirty-two Japanese planes in less than thirty-two
minutes, while taking only one bomb hit that did little damage.182 The
fact that it proved difficult to sink a battleship in the open sea purely by
employing carrier aircraft must have provided some solace to members
Twilight of the Battle Line 341
of the Gun Club who recalled General Mitchell’s boasts two decades
earlier.183
Still, there could be no doubt as to the carrier’s status as the fleet’s
new capital ship, reflected not only in the Navy’s budgets and organiza-
tion but also in its operations. They reached their pinnacle in the war
with the U.S. Navy’s fast carrier task force, which became capable of
launching round-the-clock offensive air operations and sustaining itself
for long periods in combat zones thanks to its mobile fleet train. By
1944, the U.S. Pacific Fleet had established a mobile service squadron of
five major units comprising hundreds of ships positioned at strategic
points in the Pacific. Logistics Support Group ships would rendezvous
with carrier task-force combatants, providing them with fuel, munitions,
and provisions. In so doing, the Logistics Support Groups emerged as a
critical factor in the carrier task force’s effectiveness.184
Although battleships still played a significant role in the war, they now
operated without air forces at their peril. By the time the Japanese super-
battleships Musashi and Yamato were sunk by U.S. air strikes in 1944 and
1945, respectively, “the destructive power of numerous U.S. Navy carrier
aircraft and the combined weight of bombs and torpedoes they could
hurl against any surface target would have obliterated the ships planned
by any naval architects of the 1930s.”185 The long era of the battle line
was over. The age of the carrier had arrived.
chapter nine
From Mass to Precision
—william j. perry
In 1944, the united states was waging a global war against the Axis
powers, Germany and Japan. During that summer, forty-seven U.S.
Army Air Corps B-29 bombers operating from bases in China launched
a raid against the Yawata steel works in Japan. Only one plane hit the
342
From Mass to Precision 343
target area. And only one of the 376 bombs dropped by that B-29 hit
anything of value, a powerhouse nearly three-quarters of a mile from the
raid’s target, a success rate of roughly 0.25 percent.1
The U.S. bombing effort was not faring much better in Europe.
That fall, only 7 percent of the bombs dropped by the Eighth Air Force
landed within 1,000 feet of their target or “aim point.” Thus, a raiding
force of 108 B-17 bombers armed with 648 bombs had a 96 percent
chance of two bombs hitting their aim point.2
Until the war’s final months, and particularly in Europe, the bombers
found themselves confronting formidable integrated air defense systems
(IADS) consisting of enemy radars, fighter-interceptors, anti-aircraft
guns, and electronic jamming and counter-jamming. To counter these
defenses, the Army Air Corps typically employed large numbers of
fighter escorts to suppress ground-based air defenses and ward off enemy
interceptors, while employing various kinds of electronic warfare. Even
then, losses were often high, at times approaching prohibitive levels.3 For
nearly half a century following the bomber offensives in World War II,
the U.S. Air Force (hereafter the “Air Force”) and the air forces of other
significant military powers confronted the formidable problem of defeat-
ing ever improving enemy air defenses.
In early 1991, however, over the skies of Iraq, in the course of several
days, a handful of U.S. fighter-bomber aircraft armed with two bombs
each succeeded in dismantling one of the world’s most formidable inte-
grated air defense systems. At the same time, U.S. and allied aircraft
swept the skies of an enemy air force flying modern interceptor aircraft.
Having achieved the air superiority that eluded it for most of the war in
Europe and during wars in Korea and Southeast Asia, the Air Force went
on to wreck the better part of Iraq’s army in one of history’s most lop-
sided campaigns.
How did this remarkable change in air warfare come about? Waging
a successful air campaign in the face of a well-armed and determined foe
is a demanding proposition, requiring the offensive force to overcome a
series of challenges. To begin, the attacking force must successfully navi-
gate its way to the target and return to a friendly base. Second, it must
overcome enemy defenses without incurring unacceptable losses. Finally,
having reached the target area, the attacking aircraft must employ its
weapons with sufficient accuracy to destroy its assigned targets. If the air
offensive force fails in any of these tasks, the campaign is likely to fail
as well. Major air campaigns following World War II through the Yom
344 Part 2
Kippur War found that the offense could be successful, but only by sus-
taining ever higher costs.
Air-to-Air Combat
From the onset of combat between aircraft in World War I up until the
late twentieth century, success in air warfare was closely linked to leverag-
ing a pilot’s experience into an advantage in situation awareness (SA), de-
fined as “accurate representations of where all the friendly and enemy
aircraft in or near the combat arena are, what they are doing, and where
they are likely to be in the immediate future.”5 Superior SA gave pilots an
edge in maneuvering into a favorable attack position and surprising their
enemy. Once that was achieved, a pilot only had to have that aircraft in
his engagement envelope in order to get a kill. If the pilot failed to
achieve surprise, he needed to engage in a far more difficult competition
in outmaneuvering the enemy to achieve and maintain a firing position.
From World War I through much of the Vietnam War, pilots relied
on their vision to identify the enemy, using machine guns and automatic
cannon as their principal weapons. As an air-to-air “sensor,” the human
eye has an effective range of about two nautical miles at roughly two
From Mass to Precision 345
degrees wide. This was sufficient, as an aircraft’s gun range only expanded
from about 50 meters to roughly 500 meters by the mid-1960s.6
Surprise, enabled primarily through superior situation awareness, re-
mained central to successful air combat through the Vietnam War. Ace
pilots who fought in the two world wars strongly agreed that keeping a
sharp lookout, frequently altering course to eliminate their own blind
spots, and turning to meet an enemy attack rather than attempting to
dive away were keys to their success. Their fundamental rule was to
avoid combat in situations where surprise had not been achieved, as this
was seen as a high-risk proposition. Ace pilots sought to achieve surprise.
World War II German aces Erich Hartmann (352 kills) and Gerd
Barkhorn (302 kills) pursued what they called “ambush tactics” similar to
those that American aces Richard Bong (40 kills) and Tommy McGuire
(38 kills) were employing in the Pacific.7 These tactics mimicked those of
World War I ace pilots like the Royal Air Force’s Mick Mannock and
Germany’s Oswald Boelcke.8 Ambush tactics emphasized gaining greater
altitude, which could be converted into speed, either to attack or to avoid
combat. Pilots would approach the enemy from “up sun” (in front of the
sun) to preclude being detected by the enemy pilot or approach from an
enemy’s “blind spot,” such as from behind. Finally, they would open fire
at short range to maximize hits.9
In the spring of 1944, the U.S. Eighth Fighter Command in England
published a study that found that its most successful pilots emphasized
ambush tactics. One pilot declared, “few pilots are shot down by enemies
they see.” Another noted, “90 percent of all fighters shot down never saw
the guy who hit them.” Similarly, the German fighter pilot Hartmann
was “sure that eighty percent” of his kills never knew he was there until
he opened fire.10
Pilot experience also had a significant effect on bombing accuracy.
One U.S. study found that a large portion of the hits obtained were
achieved by relatively few pilots, while the rest were, in the words of one
pilot, “lucky to hit Germany.”11 With bombing accuracy so poor, air
forces began to search for a way to enhance weapon accuracy.
Guided Weapons
Work on guided weapons, or precision-guided munitions (PGMs), began
in earnest during World War II. An early U.S. effort, code-named Aph-
rodite, involved transforming aging bombers into robot attack aircraft
346 Part 2
wall of anti-aircraft fire, one in seven kamikazes hit a ship, and over 8
percent of these hits resulted in the ship’s sinking.17
World War II showed glimmers of guided weapons’ potential. To-
ward this end, in 1948, the newly established United States Air Force es-
tablished the First Experimental Guided Missiles Group at Eglin Air
Force Base in Florida. By year’s end, the group was experimenting with
four radio-controlled guided weapons.18
Work on perfecting the Azon continued with Razon (range and azi-
muth only). As its name suggests, Razon could be guided in both range
and azimuth. Development began in 1942, and extensive testing in 1946.
In early 1950, the Air Force began to deliver specially equipped aircraft
and a supply of Razon tail assemblies to the Nineteenth Air Bombard-
ment Group on Okinawa.19
When the United States went to war in Korea following North
Korea’s attack on South Korea on June 25, 1950, the need for weapons
that could reliably destroy key fixed targets, such as bridges, remained as
acute as it had been in World War II. Despite the use of increasingly so-
phisticated computer-assisted systems, CEPs for unguided bombs were
around 500 feet.20 Once again, the Air Force turned to guided weapons—
in this case, Razon—to boost accuracy.
The first Razon missions over Korea were unsuccessful, primarily
owing to bomb malfunctions and the inexperience of crew and bomb-
maintenance teams. Despite its name, Razon was far more accurate in az-
imuth than in range. This made it attractive for use against long, narrow
targets, like bridges, and Razon was employed almost exclusively against
these types of targets. The results were modest. From September through
the end of 1950, 489 Razons were dropped on Korean bridges, destroy-
ing fifteen, a success rate of 3 percent.21
The Air Force introduced another guided weapon, Tarzon, more
than twelve times the size of the 1,000-pound Razon, over North Korea
on December 14, 1950, and employed it through April 1951. Tarzon pro-
duced some impressive results, knocking out bridges and scoring a direct
hit on a hydroelectric station. Of the twenty-eight bombs employed, six
hit their targets, a success rate slightly above 20 percent. The weapon re-
quired daylight and clear weather, which rendered the bombers carrying
them more vulnerable to fighter-interceptors. It also suffered from reli-
ability problems and high maintenance costs. Most worrisome, however,
was Tarzon’s propensity to detonate inadvertently upon release from its
aircraft, a feature that hardly endeared it to aircrews. The weapon was
348 Part 2
withdrawn from service in April, and the program was terminated in Au-
gust 1951.22
With the signing of an armistice in July 1953, combat operations on
the Korean Peninsula ended. Although guided weapons showed some
promise, one expert spoke for many in declaring, “guided missiles, even
in three-to-five years, . . . still will be very complicated, partly vulnerable
and not as accurate as they should be.” Nevertheless, weapons like Razon
and Tarzon had shown enough promise to encourage their supporters.
The commandant of the Air War College declared that fielding reliable
and effective guided weapons “is one of the most dynamic problems fac-
ing the military forces today” and that once this was accomplished, “they
will fundamentally change the whole war concept, tactically as well as
strategically.”23 By the late 1950s, two critical technologies—the laser and
integrated semiconductor circuits—were emerging. In time, they would
make the commandant’s vision a reality.
Vietnam
The absence of quality training was exposed in the growing U.S. involve-
ment in the Second Indochina War. In early 1965, Major General Gor-
don M. Graham, an ace pilot in World War II, now the Tactical Air
350 Part 2
Southeast Asian climate. And there were technical shortcomings. For ex-
ample, the missiles’ electronics contained fragile vacuum tubes.36
As U.S. forces surged into Southeast Asia in the spring of 1965,
enemy ground air defense capabilities improved dramatically. Respond-
ing to the U.S. effort, the Soviets started to deploy SA-2 surface-to-air
missile (SAM) battalions to North Vietnam in April, primarily around
Hanoi. On July 24, two SA-2 missiles engaged a flight of four F-4s, tak-
ing down one of them. Three days later, the Air Force conducted a large-
scale raid on two SA-2 battalions located outside the Hanoi perimeter.
The 100-plane strike package included forty-six F-105s supported by
fifty-six other aircraft. With the SAMs threatening medium-altitude op-
erations, the F-105s countered by employing very low-level fight profiles
on their way to the target and during ordnance delivery and egress from
the target area. The result was a disaster. Six F-105s were shot down by
anti-aircraft artillery (AAA) batteries providing low-level coverage
around the SA-2 sites.37
With both medium- and low-altitude operations producing unac-
ceptable results, the Air Force and VPAF engaged in a series of moves
and counter-moves, each seeking to gain an edge in the competition.38
Of particular note, the Air Force introduced specialized F-105G “Wild
Weasel” electronic warfare (EW) aircraft to warn aircraft of SAM
launches. The Wild Weasels also conducted suppression attacks against
active SA-2 sites, employing bombs and anti-radiation missiles. Later the
Wild Weasels were equipped with jamming pods to interfere with the
SA-2’s target tracking and missile guidance.39
Generally speaking, Wild Weasels sought to induce North Vietnam-
ese SA-2 units to turn on their radars to target U.S. aircraft. Once this
occurred, the F-105Gs could trace the SA-2 radar waves back to their
source, revealing the SAM site’s position and facilitating an attack by
U.S. aircraft, which were equipped with Shrike anti-radiation missiles
(ARMs) designed to home in on the SA-2’s radar emissions.
Despite the F-105Gs’ impressive capabilities, they suffered heavy
losses. The first Wild Weasels were deployed to Korat, Thailand, in May
1966. By mid-August, all but one of the eleven aircraft had been lost.
The Air Force was also suffering from “virtual attrition,” as the Wild
Weasels further increased the ratio of support to attack aircraft. Efforts
to maintain U.S. offensive air operations over North Vietnam at accept-
able aircraft loss rates led to strike packages involving eighty aircraft or
more, with only 15 to 20 percent of the planes actually dropping bombs.
From Mass to Precision 353
Still, the Wild Weasels performed sufficiently well that the Air Force
converted eighty more F-105Fs to F-105Gs in 1966 and 1967.40
The game of cat-and-mouse continued between the Air Force and
People’s Army of Vietnam (PAVN) air defense crews. The Shrike ARM
proved difficult to employ effectively, as it required a distinctive maneu-
ver in order to lock or “cage” its sensor on the SA-2’s radar, and it only
maintained its lock on the target radar if that radar was emitting; other-
wise it would fly off course. The SA-2 crews quickly caught on and
began to employ their radars intermittently. When their radar screens
showed the Shrike’s distinct caging maneuver, the SA-2 crews turned off
their radars. To counter this move, the Wild Weasels began to carry un-
guided Zuni rockets. The F-105Gs would simulate the Shrike caging
maneuver before launching a Zuni to deceive the SA-2 crews into shut-
ting off their radars, taking them effectively out of action, at least for a
time. The PAVN crews eventually caught on and developed a method to
share data among their radars. This enabled the SA-2s to engage the
Wild Weasels while minimizing the risk of being attacked. By 1968, the
Air Force had developed yet another counter, deploying the Navy’s
AGM-78 Standard ARM, which was capable of continuing to the target’s
radar even after it ceased emitting.41
Guided Weapons
The Air Force made significant advances during the Vietnam War in de-
veloping and fielding guided weapons, thanks in part to progress in
solid-state electronics and laser technology. Success also stemmed from
actions taken by officers outside normal Air Force channels.
The Navy was the first to introduce a guided weapon, the AGM-12
“Bullpup” air-to-surface missile, which was also adopted by the Air Force.
As with earlier attempts at fielding guided weapons during World War II
and Korea, the Bullpup was disappointing. Its radio guidance system
proved unreliable and vulnerable to jamming. The weapon also suffered
from the restrictive flight parameters required to ensure its accurate
delivery.42
Even when successfully employed, the Bullpup’s warhead was typi-
cally too small to be effective against hardened targets. Their most dis-
couraging use occurred on April 3, 1965, when seventy-nine F-105s
attacked the Thanh Hoa Bridge in North Vietnam with Bullpups and
more than six hundred 750-pound bombs, along with some 300 rockets
354 Part 2
and missiles. The Bullpups that were successfully guided “bounced” off
the bridge. Those that detonated produced little damage. The unguided
bombs failed as well. Five U.S. aircraft were lost in the attack. Over the
next three years, another 869 missions were flown against the bridge,
with similar results, at the cost of eleven aircraft.43
Another Navy guided bomb, the AGM-62 Walleye, was employed by
the Air Force beginning in August 1967. Walleye represented a leap for-
ward from earlier radio-controlled munitions, such as Razon, Tarzon, and
Bullpup, and as such was classified by the Air Force as a “second genera-
tion” weapon. Its most distinguishing characteristic was its electro-optical
television guidance system, enabling the Walleye to acquire and autono-
mously home in on a target. The Walleye produced impressive initial re-
sults, as twenty-two bombs destroyed fourteen targets without a single
aircraft being lost.44
When the Walleye was assigned more challenging missions in Octo-
ber 1967, however, its shortcomings were revealed. The Walleye’s TV
guidance system was susceptible to failing when dealing with camou-
flage, smokescreens, dust, or high-contrast decoy targets, resulting in a
“rash of unsatisfactory launches and attempts to launch.”45 The Walleye,
however, was highly effective against high-contrast targets, such as
bridges, and the Air Force continued to employ Walleyes against such
targets, especially where conventional modes of attack had failed.46
In 1958, two years before the first working laser was successfully
demonstrated, the Limited War Panel of the Air Force’s Woods Hole
Summer Study Group discussed using laser beams to guide air-to-
ground munitions. The Air Force’s growing interest in laser guidance
stemmed from increasing concerns that advances in ground-based air
defenses—especially radar-guided SAMs—were occurring at a rate that
would lead to high and perhaps unacceptable losses of aircrews and air-
craft employing unguided weapons in a war with the Soviet Union.47
The Air Force’s efforts received important, if unsolicited, support
from the Army’s Missile Command (MICOM) at Redstone Arsenal in
Huntsville, Alabama, and from one of its own, Colonel Joe Davis at Eglin
Air Force Base (AFB) in Florida. Between 1962 and 1965, work at Red-
stone produced a pulsed laser generator and a detector that could identify
a spot of laser light projected from the generator at considerable distance.
Two MICOM engineers involved in the work began to share their find-
ings with Davis, who became an advocate for laser guidance. Thanks in
part to his efforts, in the spring of 1965 the Air Force began to explore
From Mass to Precision 355
how laser illumination could lead to a workable guided bomb. The effort
was headed by the Air Force’s Limited War Office, at Wright-Patterson
AFB, Ohio, with a supporting detachment at Eglin. The office’s objective
was to identify and acquire technology that promised immediate im-
provements in Air Force combat operations in Southeast Asia.48
Texas Instruments, given the task of developing a prototype, relied
heavily on existing technologies. Apart from the seeker head and the
laser designator, almost every component in the laser-guided bomb used
“proven technology,” including the 750-pound M-117 bomb. Four guid-
ance elements were attached to the bomb: the seeker head, guidance
electronics, control assembly, and fins. Testing began at Eglin in May
1966.49
Over the next nine months, ten tests were conducted. The laser-
guided bomb (LGB) had the potential, in Pentagon parlance, to be a
“game-changing” weapon. In late 1966, Davis began to lobby key Air
Force leaders for support. One particular target was Major General Andy
Evans, the officer at the Pentagon responsible for research and develop-
ment. As the tests continued showing promising results, Davis brought
Texas Instruments representatives to Washington to brief Evans on the
results. The general was won over, surmounting a key hurdle for getting
the program both adopted and accelerated.
Yet the Limited War Office wanted Texas Instruments, which had
produced by far the best weapon design, to stand down for a year to give
another design team, headed by North American Aeronautics, an oppor-
tunity to catch up, in order to conduct another head-to-head competi-
tion. Realizing the absurdity of this approach, Davis also took the
unorthodox step of arranging a “generals board” of eight high-ranking
general officers from around the world, along with the recently retired
Air Force chief of staff, Curtis LeMay.50 Upon reviewing the test results,
the board sent a memo to the chief of staff voicing strong support for
moving forward aggressively with the program using the Texas Instru-
ments design. Responsibility for the program was transferred from the
Limited War Office to a newly created organization called the Pave Way
Task Force.51 Thanks to Davis’s end run around the Air Force bureau-
cracy, the program moved forward quickly, and the LGB was ready for
flight testing seven months later and for combat operations in Vietnam
in early 1968.
The first LGB was used in combat on May 23, 1968. Half of the bombs
scored direct hits. Aircrews flying the LGB missions were enthusiastic.
356 Part 2
Paveway was appreciated by airmen, not only for its accuracy but for its
simplicity. Any aircraft capable of dropping a general-purpose bomb could
drop the laser-guided version of the same bomb. The use of laser guidance
removed most requirements for accuracy from the delivery pilot, which was
not the case with respect to dive-bombing. The Paveway I also had a very
generous release point. Aircraft dropping a laser-guided bomb could deploy
it from beyond an enemy’s primary air defenses, thus further reducing the
likelihood of incurring losses from enemy defenses. Moreover, at the
bomb’s recommended release altitude of 12,000 feet, the “basket” into
which the bomb had to be dropped had a diameter of roughly one mile,
making it “all but impossible to miss.”52
Air Force acquisition managers declared that “the capability . . . to
vastly improve bombing impact accuracy was emphatically demon-
strated,” thereby dramatically reducing sortie requirements, aircraft attri-
tion, aircrew losses, and operational and maintenance costs. As with most
new weapons, however, problems emerged. With continued employ-
ment, the weapon’s performance became less impressive. The LGB’s
success rate declined, and its CEP expanded to seventy-five feet.53 It ap-
peared that Paveway would, like its predecessors, fail to match the hype
around its development.
Fortunately, a second Paveway weapon, the laser-guided Mark 84,
was ready for deployment. The Mark 84 was employed with the M-117
bomb in August and September, recording an unprecedented CEP of
just twenty feet, with 25 percent of the weapons scoring direct hits. By
comparison, manual dive-bombing by F-105s employing unguided
M117 bombs between 1965 and 1968 produced CEPs of roughly 500
feet. In 1969, the Paveway results were even better. The Air Force em-
ployed 1,601 LGBs, with 61 percent scoring direct hits, and with 85 per-
cent of the bombs landing within ten feet, which was within the weapon’s
lethal radius.54
Concurrently, the Air Force began to field an electro-optically
guided (or “TV-guided”) bomb called Pave Way II, which provided a
“fire-and-forget” capability to succeed the Walleye. Nicknamed “Hobo,”
for “homing bomb,” it was more capable and accurate than Walleye and
cost less.55
Toward the end of the Vietnam War, the Air Force started to pro-
duce an anti-armor guided weapon, the AGM-65A Maverick, a TV-
guided, rocket-powered missile. Early versions achieved excellent results
in conditions of good visibility. Half of the first twenty-two weapons
From Mass to Precision 357
tested achieved direct hits, with only six missing their target by more
than ten feet. With an eye toward the Soviet threat, the Air Force began
to develop an infrared version to improve the Maverick’s ability to oper-
ate effectively in the poor visibility conditions that often prevailed in in
Central Europe.56
Pilot Training
The overall kill ratio for Air Force and Navy pilots against enemy air-
craft was 2.4 to 1, which was far worse than the Air Force’s kill ratio dur-
ing the Korean War (4.7 to 1 in 1950–52 and 13.9 to 1 in 1952–53).
Between August 1967 and February 1968, U.S. fighters suffered an ad-
verse kill ratio against the MiG-21, with eighteen U.S. aircraft lost for
only five MiG-21s downed. Combat reports suggested that the Air
Force’s poor performance was even worse than the data suggested, as
they found “little evidence that the MiG pilots ever developed real air
combat maneuvering skills beyond attacking from behind and executing
hard turns for both offensive and defensive maneuvers.”58
As the surprisingly poor air-to-air-combat results piled up, in late
1967, the Navy undertook a rigorous assessment of the problem.59 The
effort, led by Captain Frank W. Ault, focused primarily on technical
problems with the AIM-7 air-to-air missile. Yet it was the section on pilot
tactics and training that triggered a training revolution in the Navy. It
found that the service had not developed appropriate tactics to maximize
358 Part 2
the missile’s effectiveness, which meant that pilots were not being trained
to employ proper tactics. Solving this problem, the report found, re-
quired establishing a Navy Fighter Weapons School with an “Adversary
Squadron” to fly against Navy pilots, with an eye toward providing them
with realistic training.
In October 1969, the Navy established the school at Miramar Naval
Air Station in California. It soon became known as “Top Gun,” empha-
sizing dissimilar air combat training (DACT), with Navy pilots going up
against aircraft similar to those being used by the enemy. In this case,
Top Gun instructors flew the A-4 “Skyhawk,” a small, highly maneuver-
able attack aircraft similar to the VPAF’s MiG-17, the Navy’s main rival
in the skies over North Vietnam.60
Unlike the Navy, following Rolling Thunder, the Air Force training
reverted to emphasizing avoiding accidents. The air-to-air combat train-
ing conducted typically found F-4s operating against F-4s, denying Air
Force pilots experience in identifying and engaging the smaller Soviet-
made aircraft employed by the VPAF.61 More than any other man, Gen-
eral William W. “Spike” Momyer was responsible for this lamentable
state of affairs. He had a fighter-bomber pedigree, including a stint as
TAC’s head of plans from 1958 to 1961. In July 1966, Momyer took
command of the Seventh Air Force, which ran Air Force operations from
bases in South Vietnam during Rolling Thunder. Momyer departed in
August 1968 to head TAC, having witnessed firsthand the Air Force’s
disappointing combat performance. Hopes were high that the new com-
mander would take the kind of action under way in the Navy.
He did not.
Momyer could not bring himself to admit that things had not gone
well under his command, so he never pressed TAC to conduct DACT.
He thought that the Air Force kill ratio in Vietnam from 1963 to 1968
was a “very acceptable” 2 to 1 and that the reason for the lower kill ratio
was due to “political and technological factors . . . with political con-
straints perhaps being the most significant factor.”62 Yet Air Force pilots
in the Korean War had also operated under some similar political con-
straints and flew aircraft that were, in many ways, no more advanced
than the MiGs they fought. Yet the Air Force pilots shot down roughly
six Russian-piloted aircraft for every U.S. pilot lost, and their kill ratio
against Chinese and Korean pilots was 25–30 to 1. Aware that DACT
training would probably increase accidents, Momyer actually cut back on
air-to-air training.63
From Mass to Precision 359
Linebacker
Following the North Vietnamese Army’s overt invasion of South Viet-
nam on March 30, 1972, known as the Easter Offensive, the air war over
North Vietnam resumed. North Vietnam’s air defenses by this time en-
compassed more than 200 radar installations, along with 300 SAM and
several thousand AAA sites. The North Vietnamese supplemented these
defenses with MiG-21 interceptors and large numbers of SAM decoys.
The Soviets were also providing the North Vietnamese with enhanced
SA-2 missiles.65
Linebacker revealed the value of Navy’s new approach to pilot train-
ing. The first air strikes on Hanoi saw Navy F-4s down eight MiGs with-
out a loss, while Air Force pilots shot down three MiGs at the cost of
two F-4s. Following the three-year gap in operations since Rolling
Thunder, the Air Force had difficulty coordinating complex strike pack-
ages against North Vietnam’s IADS, as they had not been trained to do
so. By the end of July, the MiGs enjoyed a 2-to-1 kill ratio in their favor.
Air Force leaders in Washington came under pressure from President
Richard Nixon, who as commander in chief had released them from
many of the restrictions under which they operated in Rolling Thunder.
A frustrated Nixon told his national security adviser, Henry Kissinger,
that he was “disgusted” with the Air Force’s performance. Meanwhile the
Air Force’s top brass found itself sitting in weekly Pentagon briefings
with senior civilian officials where their service’s performance paled in
comparison to the Navy’s, with the admirals praising Top Gun.66
Things came to a head when one of the Air Force’s best pilots, Lieu-
tenant Colonel William Kirk, told the chief of staff, General John D.
Ryan, that the service’s pilots were so poorly trained that he believed
only 10 percent could pass a written test on the basics of air combat.
Ryan told Kirk to devise a test and administer it to pilots in the field—
and not to tell Momyer. More than 200 pilots took the test. The average
score was ten correct answers out of twenty-five questions. Only around
10 percent of the pilots passed the test. Momyer, having learned of the
360 Part 2
But even though the SA-2s in North Vietnam had rendered mid-
altitude air operations a risky proposition in Vietnam, the low-altitude
SAMs and advanced AAA systems employed by the Arab states in the
Yom Kippur War were making low-attack profiles an increasingly haz-
ardous undertaking. For attacking air forces, it was becoming a case of
choose your poison. Moreover, the direct costs of these operations in the
form of friendly aircraft and crews shot down, as well as the indirect
costs—the growing percentage of support aircraft required for strike
packages—were mounting. In a war with the Soviet-led Warsaw Pact in
Central Europe, if U.S. aircraft loss rates mirrored those incurred by the
IAF, NATO’s air forces would be eviscerated in a matter of weeks. Based
on the IAF’s experience, it seemed that ground-based air defenses, not
enemy interceptor aircraft, were the primary threat.73
On NATO’s Central Front, the Soviet IADS combined MiGs, which
by most counts outnumbered NATO fighters by 2 to 1, and overlapping
SAM systems whose coverage extended from very low altitudes to high
altitudes. Advanced AAA systems complemented the SAMs and MiGs.
One major weakness of the Russian IADS, however, was its centralized
command and control, which depended heavily on ground-based radars
to provide its MiGs and SAMs with the location of NATO aircraft. The
Air Force hoped to avoid detection by operating at very low altitudes,
flying under Russian radar coverage, thereby denying the tracking infor-
mation needed by the SAMs and MiGs. There was also the European
weather to consider. For more than 50 percent of the year, the ceiling in
Central Europe was below 3,000 feet and the visibility less than three
miles. Fighter pilots had to see the targets in order to hit them. In Eu-
rope, that meant going in under the weather. And since LGBs did not
perform well at low altitudes, it would be up to the pilot to put the
bombs on target.74
Not everyone, though, was in favor of training fighter forces for low-
altitude combat. The skeptics pointed out that this had been tried by the
F-105s in Vietnam, and AAA had forced aircraft back to higher altitudes.
Low-altitude advocates retorted that the Soviet SAM threat at medium
altitude was far worse than the AAA and low-altitude SAMs. The skep-
tics countered by arguing that low-altitude flight profiles were dangerous
and that identifying targets at low altitude was too difficult. The
“go-low” advocates responded that training to improve pilot proficiency
while perfecting tactics would produce success.75 And so the debate
continued.
From Mass to Precision 363
Red Flag
The origins of the Air Force’s Dissimilar Air Combat Training and Red
Flag were at Nellis Air Force Base, Nevada, the largest military-
controlled range in the United States. In 1949, the Air Force established
its Aircraft Gunnery School at Nellis to capture and exploit the lessons
and experiences that fighter pilots had learned in World War II. After the
Korean War, the school was renamed the Fighter Weapons School, with
the mission of providing a “doctorate in flying fighters.”78 Following the
Air Force’s embarrassing performance in the Linebacker campaigns, a
growing number of Air Force pilots believed that the service had to
make major improvements in pilot training. In 1970, Major Roger Wells,
a Fighter Weapons School instructor, began to develop a threat briefing
on Soviet fighter tactics, which was well received at the school and later
at TAC bases around the world.79
Israeli Air Force pilots proved willing to share their combat experi-
ence with their American counterparts. In early 1972, two experienced
364 Part 2
Israeli F-4 pilots, Asher Snir, one of the IAF’s best, and Eytan Ben-
Eliyahu (a future IAF commander), arrived at Nellis to take the Fighter
Weapons School Instructor’s Course. It quickly became obvious that
only the best Fighter Weapons School instructors were good enough
to fly with them. Snir found the course “not demanding.” He and Ben-
Eliyahu warned the Americans, “know your enemy” and “fly in training
the way you will fly in combat.”80 One of Snir’s instructors at Nellis,
Richard M. “Moody” Suter, was a warm, gregarious individual and an
outstanding pilot, with 232 combat missions under his belt. Suter took
Snir’s comments to heart.81
General Momyer established the Sixty-Fourth Fighter Weapons
(Aggressor) Squadron at Nellis in October 1972. The Aggressors, em-
ploying Soviet fighter tactics, initially flew the T-38 Talon trainer and
then the F-5E Tiger II, a better match for the MiG-21. Later, captured
MiG aircraft would be flown by Aggressor pilots.82 The change in the
training environment was striking. One Air Force pilot, future chief of
staff John Jumper, on confronting the MiG-21’s speed and maneuver-
ability, asked himself, “Why can’t I think?”
Suter’s Vision
Suter, however, saw this as a modest first step toward his emerging vision
of large-scale exercises with aircrews employing live bombs and missiles
while being confronted by realistic enemy air and surface-to-air missile
threats. When Suter was assigned to Air Staff’s Tactics Division at the
Pentagon, he began working with a fellow officer, Chuck Horner (who
later commanded the air campaign in the First Gulf War), in refining the
concept that over time became Exercise Red Flag. His analysis also ben-
efited from Project Red Baron, a detailed set of Air Force assessments
examining air-to-air combat in Southeast Asia during the Vietnam War.83
Red Baron confirmed, once again, that situation awareness is a critical
factor in air-to-air combat success and that a fighter pilot’s chance of sur-
vival in a combat environment increased dramatically after his tenth mis-
sion, validating Suter’s belief in DACT.
Suter slowly built support, beginning with a briefing that he tried out
on fellow staff officers, refining it until it was ready to be presented to
one- and two-star generals. Their feedback enabled Suter to further pol-
ish his pitch. He put the Soviet Union’s red flag on the briefing cover,
and soon it was being referred to as the “Red Flag” briefing. Suter took
From Mass to Precision 365
his briefing to Nellis, where the Aggressor Squadron and the Fighter
Weapons School commanders confirmed that they could execute the Red
Flag concept. Word of Suter’s training concept was spreading, and the Air
Force chief of staff, David C. Jones, requested that Suter brief him.
Suter’s presentation was designed to deflect any reason for scupper-
ing Red Flag. He told Jones that Red Flag’s cost would be minimal, since
the electronic threat simulators and target hulks on various Air Force
gunnery ranges could be consolidated at Nellis. The Aggressors were al-
ready based at Nellis. They would cost nothing extra. The Nellis range
was already in use. Funding could be shifted to Red Flag from less effec-
tive exercises. Suter pointed out that the Air Force could claim it was
promoting “jointness”—interservice cooperation—since other services
could participate with their personnel and equipment. The Army had al-
ready expressed interest. Jones liked the concept and ordered Suter to
brief General Robert A. Dixon, Momyer’s successor at TAC.84
integrated missile and AAA, along with dissimilar interceptors using So-
viet tactics. Dixon liked Suter’s pitch and approved Red Flag on the spot,
while informing General Jones that this would require waiving the low-
level flight and speed restrictions.87
The first Red Flag exercise was conducted in November 1975. Prior-
ity was given to making the training as realistic as possible. Soon Blue
Flag exercises were being conducted so that air commanders and their
staffs could master the “combined arms” planning required to conduct
successful air operations.88
Red Flag was an immediate success. Other Air Force commands
were soon requesting to participate. Strategic Air Command B-52s
began to fly from their bases, “launching” cruise missiles to take out
enemy defenses, then returning home. The Military Airlift Command
(MAC) cargo aircraft joined, conducting cargo drops while attempting to
evade the Aggressor forces. Tankers engaged in refueling both friendly
and Aggressor aircraft, while search-and-rescue aircraft were found pick-
ing up crewmen who were “shot down” behind enemy lines. Forward air
controllers (FACs) started directing close-air-support strikes in support
of ground forces. The Navy and Marine Corps began to participate in
the exercises, along with U.S. allies. A typical Red Flag exercise con-
ducted in May 1977 included nineteen different types of aircraft, and 141
aircraft in all, flying more than 2,000 sorties.89
Given the scale and fidelity of Red Flag training, accidents were in-
evitable. Dixon took the heat, arguing that the realistic training at Nellis
would save many more lives in combat. The general found that he could
win over skeptics from Congress and the media by taking them out to
observe Red Flag firsthand. It also helped that the accident rate began to
drop. Still, 1979 found the Air Force suffering 2.8 accidents per 100,000
flying hours. For TAC, it was 6.3. In the cauldron of Red Flag, the figure
was 21.8.90 By the time Dixon left command in 1978, the Air Force lead-
ership, to its credit, had established high-fidelity pilot training, not mini-
mizing accidents, as its top priority.
Dixon was determined not to have his work undone after departing
TAC. During his time in command, the general worked the Air Force per-
sonnel system to increase the number of general-officer slots at TAC, in-
cluding two three-star-general billets for his subordinate commands, Ninth
Air Force and Twelfth Air Force. Dixon admitted that he could run TAC
without either of these numbered Air Forces but wanted to create more
senior Air Force leaders with TAC backgrounds. He actively looked for
From Mass to Precision 367
The Vision
The three decades following World War II witnessed major changes in
air warfare. The offense-defense competition continued, with both sides
employing increasingly effective means to gain the upper hand, including
jet aircraft, advanced forms of electronic warfare, and missiles. Neither
side, however, was able to gain a clear advantage. To paraphrase the Brit-
ish prime minister Stanley Baldwin, the strike aircraft could always get
through, but often only at high cost. Perhaps the most notable advance
was the United States’ introduction of reliable and effective laser- and
electro-optical guided weapons.
More broadly speaking, impressive advances were being made in
solid-state electronics, which, along with fantastic gains in computational
capabilities, triggered the information technology (IT) revolution. These
technological advances, combined with the lessons emerging from the
Vietnam and Middle East wars, led some military and civilian defense
leaders to envision how they might be combined to bring about a disrup-
tive shift in the character of air warfare.
By the mid-1970s, Soviet Russia’s rapidly expanding nuclear forces
had achieved a rough parity with those of the United States. The loss of
the United States’ nuclear trump card found the U.S. defense establish-
ment searching for ways to enhance its conventional defenses in Europe.
One effort saw the Defense Advanced Research Projects Agency (DARPA)
and the Defense Nuclear Agency bringing together a panel of experts to
examine the problem. Its report, the Long-Range Research and Develop-
ment Planning Program (LRRDPP, pronounced “lar-DEPP”), was issued
in February 1975. It recommended that the country’s senior leaders con-
sider exploiting the potential of nonnuclear weapons with “near zero miss”
accuracy, which were believed to be “technically feasible and militarily ef-
fective.” The report noted that “the effect of this capability would be to
deter limited aggression in the first place, since the credibility of a United
States response with this type of [precision-guided weapon] attack would
be much higher than that of a United States [nuclear] response in which
millions of civilians would be killed.”92
368 Part 2
Perry was convinced that, given the magnitude and scope of the enter-
prise he had in mind, it would take time and persistent, focused manage-
ment by senior Defense Department leaders to succeed. He was
supported by Defense Secretary Harold Brown, who named Perry’s ap-
proach the “Offset Strategy,” as its objective was to offset the United
States’ loss of its nuclear advantage.
Stealth
Perry also became interested in another promising IT-driven develop-
ment: “stealth,” which involves reducing the infrared, visual, acoustic,
and radar signatures emitted by aircraft. At the time, the only successful
effort at fielding an aircraft with a significantly reduced radar cross-
section was the U.S. SR-71 “Blackbird” spy plane, which entered service
From Mass to Precision 369
lead responsibility for the program, code-named Have Blue, was trans-
ferred to the Air Force Special Projects Office.
The two demonstrators were built in roughly one year, with the first
flight test occurring in April 1977. There followed a period of extensive—
and successful—testing. The moment of truth came in August 1979, when
the Have Blue aircraft participated in a classified exercise at Nellis. A Ma-
rine Corps Hawk SAM unit’s radars were placed on the range and in-
structed to track an incoming aircraft. Although the Hawk unit was told
the target aircraft’s flight path in advance, and thus where to focus its ra-
dars, the Have Blue aircraft passed undetected.100
Encouraged by these results, Perry wanted to incorporate stealth
combat aircraft into the Offset Strategy. Secretary Brown agreed. Perry
went to Jones and Slay, and they OK’d fielding a wing (seventy-five
planes) of stealth tactical fighter-bombers—again, as long as the funding
did not come out of the Air Force’s budget. Perry set an aggressive initial
operating capability date of only four years, skipping the normal develop-
ment and prototyping phases. Finally, seeking to steal the greatest possi-
ble march on the Soviets, the acquisition program, code-named Senior
Trend, was designated a highly classified “black” program. In November
1978, Lockheed received a contract to begin full-scale engineering devel-
opment of a stealth aircraft, which would become the F-117. The first
F-117 was delivered, on schedule, in 1981.101
They [LGBs] aren’t very good when the weather is bad. The
weather is bad most of the time in Europe so immediately you’ve
got a severe limitation on their use over here. During Linebacker
II, for example, there was only one eight-hour period during that
entire eleven-day period that we were able to use those laser
guided weapons. The weather wasn’t adequate during all the pe-
riods of that particular operation. And I would think that the per-
centages would even be worse . . . [in Europe] because, as you
know, for nine months of the year we either have darkness or ex-
tremely bad weather. Lasers simply aren’t the answer in that kind
of environment nor are the electro-optical precision-guided
weapons which the Air Force is buying in great quantities.103
“Harvey” concept, not from the Air Force but from DARPA. When the
Defense Department’s director of research and engineering, Malcolm
Currie, was searching for innovative ideas, it was DARPA that came for-
ward with the idea for stealth, not the Air Force. And when Bill Perry ap-
proached the Air Force leadership to win support for stealth aircraft, he
got it—but conditionally.
Creech
General Dixon was succeeded at TAC by General Wilbur (“Bill”)
Creech, a strong supporter of the realistic training embodied in the Red
Flag exercises. But Creech also had a different vision of air operations
and how new ways of fighting, enabled by new capabilities, could pro-
duce a disruptive boost in the Air Force’s effectiveness. As TAC’s com-
mander, he intended to put his ideas to the test.
Starting his career in World War II as an enlisted man in the Army,
Creech transferred to the newly formed Air Force in 1948, entering pilot
school. By the late 1960s, Creech was serving in Southeast Asia as a dep-
uty wing commander, flying 177 combat missions. By all accounts, he
was an excellent pilot. There he became convinced that the Air Force
idea of flying low to avoid IADS was a mistake and began to look for
ways of suppressing enemy air defenses (SEAD) as part of an overall
campaign. After a tour in Europe, he served as vice commander of the
Air Force’s Systems Command’s Aeronautics Systems Division, and then
as commander of its Electronic Systems Division. The latter assignment
gave Creech an appreciation for electronic warfare’s potential. Promoted
to full general, Creech assumed command of TAC in April 1978, a posi-
tion he held for an unprecedented six years.106
The Vision
When Creech arrived at TAC, he found that the Air Force’s doctrine had
stagnated. Although during the Vietnam War tactical fighters had been
employed in strategic bombing operations and strategic bombers like the
B-52 conducted close-air-support “tactical” missions, Air Force doctrine
still viewed aircraft as linked to distinct missions, as they were in World
War II. Creech’s envisioned an “all day, all night, all weather, precision,
standoff, interoperable force.” Creech was close to General Jones, having
served as his director of operations when Jones commanded the United
From Mass to Precision 373
States Air Forces in Europe. When Jones left as Air Force chief of staff to
chair the Joint Chiefs of Staff, he was succeeded by General Lew Allen, Jr.
Creech and Allen soon established an “unwritten understanding” giving
Creech a strong voice in procurement matters pertaining to TAC.107
Shortly after taking command, Creech called a Warfighter Confer-
ence of his senior commanders. The conference, viewed in retrospect as
a seminal event in the Air Force’s history, saw Creech outlining his vision
of air power and calling on his commanders to work with him in adopt-
ing a new and very different way of meeting the challenge of increasingly
sophisticated enemy air defenses.
Creech began by noting the operational problems posed by Soviet
IADS and those of their proxies. Live exercises and operational analyses
showed that the Air Force’s strike operations could not be sustained
against Soviet IADS without incurring unacceptable losses. These find-
ings supported what the general was hearing from Israeli pilots, who de-
scribed how attempting to fly below the Soviet-made IADS coverage was
an exercise in futility. Creech told his commanders that the Air Force
was suffering from “go-low disease.” His experiences in Vietnam con-
vinced him of two things: first, that a different way had to be found to
address the IADS threat; and second, that the Air Force needed to think
more expansively beyond tactics and simply “blowing by” the SAM
threat on their way to and from a target. It needed to focus instead on
the operational or campaign level of war.108
On this second point, Creech declared that air defenses had to be
rolled back and suppressed on a broad level, rather than avoided or dealt
with tactically within the context of a single-strike mission. Once the ene-
my’s air defense system was suppressed, he said, air operations could be
conducted at higher, more survivable altitudes, where guided munitions
could be employed most effectively. For the first time in the Air Force’s
history, Creech said, destroying the enemy’s air defense network was a pre-
requisite to waging an air campaign: “Our basic concept of operations rests
on the fact that we must penetrate enemy defenses. To do that, we will roll
back those defenses using a combination of disruptive defense suppression
and selective destruction with both standoff and overflight weapons.”109
A summary of Creech’s closing remarks at the conference’s conclu-
sion is worth citing at length:
taking the SAMs out our first order of business. No more trying
to fly past SAM sites to get to other targets. That can’t be done.
Taking them out can be done, and it will be easy if we go about it
right. We need to get up out of the weeds as soon as possible to
avoid the AAA, a far more formidable threat. . . . Our fixation on
low-altitude ingress, egress, and delivery and the systems and
munitions that fit solely that approach is over.110
Looking back at the session, one participant, Larry D. Welch, a future Air
Force chief of staff then serving on Creech’s staff at TAC, recalled, “By
the end of the conference, there was full agreement that low-level tactics
might be necessary for a time but that we needed to get out of that mode
as early as possible. Perhaps even more important for the subsequent evo-
lution of both systems and tactics, there was a much greater appreciation
for the potential of new tactical thinking . . . and the right munitions with
precision guidance—all clearly within our technology capabilities.”111
Over the next six years, Creech went about putting his vision into
practice. There was resistance from the “go-low” crowd. Some argued
that the war could be lost during the time it would take to dismantle the
enemy’s IADS. Others feared that Creech was looking for a way to avoid
flying low in order to reduce Red Flag’s accident rate. The general grad-
ually identified the principal sources of resistance and either fired them
or reassigned them where they would not threaten his initiatives.112
The results of his efforts are perhaps best judged by two senior Air
Force leaders. General Jones ranked Creech “with Curtis E. LeMay as
one of the two most influential men in [his] long Air Force experi-
ence.”113 More than twenty years after Jones stepped down as Air Force
chief of staff, his successor, General John Jumper, declared, “No single
officer has had greater influence on the Air Force in recent times than
General Bill Creech. He transformed the way the Air Force conducts
warfare.”114
Many Flags
Creech’s efforts centered around Red Flag. The general believed that Tac-
tical Air Command exhibited a “propensity to put a ‘realistic training’ tag
on unrealistic wartime strategy and tactics.” He directed that Red Flag stop
flying every mission as if it were “the first mission on the first second
on the first day of a war.” For example, the exercises failed to incorporate
From Mass to Precision 375
“kill removal,” in which each side’s losses were removed from play, after
being either shot down or destroyed on the ground. Thus, every day was
“Groundhog Day.”115 The threat was always at its highest, and the air wing
was always fully ready. Under these conditions, pilots were compelled to
fly every mission at low altitudes. Structured this way, the exercises made it
impossible to explore Creech’s concept for a campaign whose objective
was to take down the enemy’s IADS. So Creech directed that Red Flag ex-
ercises be run to reflect the first two weeks of a war rather than repeating
the first day of a war every day for two weeks. This enabled Red Flag exer-
cises to focus on rolling back enemy air defenses, followed by shifting to
higher, more survivable altitudes once this was accomplished.116
Problems identified at the Warfighter Conference were addressed.
For example, before Creech arrived, each wing commander whose unit ar-
rived for a Red Flag exercise designed his training regimen. General
Welch recalled that the wing commanders did this “with no formal benefit
of others’ experiences at Red Flag”: “We saw the same mistakes over and
over with each set of participants starting without much benefit of the les-
sons from prior experiences.”117 This was corrected through “Blue Flag.”
Indeed, Creech continued Dixon’s practice of expanding the “flags”
at Nellis. He institutionalized “Blue Flag” exercises, where commanders
and their staff crafted air-attack plans and simulated target lists, which
were provided to the incoming wing for the next Red Flag. Black Flag
trained aircraft maintenance crews, while Checkered Flag familiarized
nonoperational units with the overall plan and their role in supporting it.
Ultimately eighteen exercises emerged from Red Flag, as the focus
shifted from the tactical to the operational level of war.
Creech added the “blue forces command element” to Red Flag,
where the commander and his staff oversaw all aspects of the air effort,
directing each friendly-force fighter. It made no difference if a Navy or
an Air Force aircraft accomplished a mission. Air power in any form was
air power. As a brigadier general, Chuck Horner had his own turn as a
“blue force commander,” an experience that would pay off during his
command of air operations during the First Gulf War.118
Creech saw electronic warfare playing a prominent role in future air
operations, so he instituted Green Flag, combining Air Force intelli-
gence, jamming, and electronic warfare platforms to support the air cam-
paign against the Aggressor force IADS. Similar to Red Flag, Green Flag
exercises ran six weeks, compelling participants to focus on an extended
campaign to defeat or degrade advanced Soviet IADS.119 By the time
376 Part 2
An Enduring Legacy
Through these “Color Flag Exercises,” Creech forced the Air Force to
raise its eyes from the tactical level of war to the operational level as the
best way to wage offensive air campaigns successfully and at an accept-
able cost. When he stepped down as TAC’s commander, the key elements
of the SEAD campaign that dominated the start of major future U.S. air
campaigns were in place.121
Like Dixon, Creech worked at developing a cadre of future Air
Force leaders, men who he felt shared his vision and methods. His im-
mediate successors at TAC, Generals Jerome F. O’Malley (1984–85) and
Robert D. Russ (1985–91), continued to emphasize the realistic training
exercises that Creech had either instituted or enhanced. All of the six Air
Force chiefs of staff who served from 1986 through 2002 were either a
TAC wing commander or on Creech’s staff during the time he headed
the Tactical Air Command.122 The Air Force shift from a bomber-centric
service to a fighter-dominated service was complete.
Lifting All Boats: The Air Force and the Reagan Buildup
The inauguration of President Ronald Reagan in January 1981 was fol-
lowed by a major U.S. defense buildup lasting into the middle of the de-
cade. The influx of resources enabled the Pentagon to avoid some
difficult choices on defense priorities, providing funding for programs
that, for a variety of reasons, might have been crowded out in an austere
fiscal environment. This enabled the Air Force to pursue the B-1 and
B-2 bomber and F-15 and F-16 fighter programs. There was room in the
budget for capabilities reflecting the visions of men like Bill Perry and
Bill Creech, including investments in guided weapons, precision naviga-
tion, night operations, and electronic warfare. All would play key roles
when the Air Force went to war early in the next decade.
The Reagan buildup saw the Air Force improving its arsenal of
precision-guided weapons under the Paveway III series.123 One, the
From Mass to Precision 377
Air-to-Air Combat
The Air Force was also looking to exploit advances in sensors to enhance
its air-to-air missiles. Success here boosted efforts to shift to beyond-
visual-range (BVR) engagements.
The AIM-7F Sparrow air-to-air missile, first deployed in 1976, had
more than double the range of the Vietnam-era AIM-7Es. Its solid-state
electronics offered greatly enhanced reliability over the vacuum tubes
used in earlier versions. The follow-on AIM-7M, which came into ser-
vice in 1982, improved the missile’s range and effectiveness.131 The 1980s
also found the Air Force and Navy upgrading the AIM-9L Sidewinder
missile, which was now capable of attacking a target aircraft from any di-
rection, known as an “all-aspect” capability.132
When the Cold War ended, both U.S. and Soviet air forces had
fighters capable of detecting and targeting enemy aircraft at ranges out
to forty nautical miles or greater. Enemy aircraft could be targeted effec-
tively even when flying at low altitudes in ground clutter, a capability
known as “look down/shoot down.” This greatly expanded the potential
for BVR engagements by eliminating the “low-altitude sanctuary” due to
the limitations of earlier fighter radars. It also confirmed Creech’s view
that the Air Force’s “go-low” tactics were a losing proposition.133
In 1981, Creech pointed out, “This country has a decided technologi-
cal edge and the technology is mature and workable and reliable enough to
give us the capability to fight at night, and it provides certain advantages if
we can deliver lethal firepower at night.” Shortly after Creech took com-
mand at TAC, Red Flag exercises began to incorporate night operations at
least twice every year. Chuck Horner recalled Creech’s determination to
have the Tactical Air Forces become proficient in night operations, noting
that aircrews “didn’t like night flying (at best an emergency procedure) and
were not very good at it. . . . He acknowledged we had a long way to go,
but he made us start anyway with what little capability we had.”134
From Mass to Precision 379
Friend or Foe?
The Air Force’s efforts to use early IR and radar-homing missiles to fight
beyond visual range were hampered by the challenge of distinguishing be-
tween friendly and enemy aircraft. Aircraft electronic identification, friend
or foe (IFF) equipment was first employed on aircraft in World War II and
From Mass to Precision 381
was standard on nearly every combat aircraft during the Vietnam War.
The IFF equipment, however, suffered from a high failure rate.143 This un-
derstandably made Air Force and Navy aircrews reluctant to engage be-
yond visual range. Concerns ran so high that some commanders required
pilots to have visual identification of the target aircraft before it could be
engaged. Consequently, there were only two confirmed BVR kills by U.S.
aircrews during Vietnam War. Solving the IFF problem became essential
to exploiting the ability to engage the enemy at extended ranges.
Once again, the Israelis provided help. In the 1967 Middle East war,
the Israelis recovered Soviet SRO-2 IFF transponders from downed
MiGs. They shared the equipment with the Air Force, which began a co-
vert program code-named Combat Tree, which involved building a U.S.
SRO-2 interrogator system (the AN/APX-81). By 1971, the system was
being mounted on Air Force fighters, enabling them to trigger a MiG’s
IFF response or to receive a MiG’s replies to interrogations by its own
ground-controlled intercept radars. Aircraft equipped with the Combat
Tree system could identify enemy aircraft at ranges up to sixty nautical
miles, or three times the distance that an F-4 could detect (but not posi-
tively identify) planes with its radar.144
The Air Force also developed the AN/ASX-1 Target Identification
System Electro-Optical (TISEO), which combined a stabilized telescope
with an attached TV camera that displayed images on the U.S. fighter’s
radarscope. Deployed on the F-4E, the TISEO enabled aircrews to iden-
tify large aircraft fifty to eighty nautical miles distant and fighter-size air-
craft at distances of ten nautical miles or more. Still, long-standing pilot
fears associated with “friendly fire” remained.145 But as advances in IFF
systems continued and as more effective command-and-control systems
entered the force, pilots gradually gained the confidence necessary to ex-
ploit the Air Force’s enhanced scouting capabilities. It soon produced a
dramatic shift in the character of air-to-air combat.
Lebanon
On December 4, 1983, eighteen months after the Israeli strikes in the
Bekaa Valley, U.S. warplanes attacked Syrian anti-aircraft sites in Lebanon.
From Mass to Precision 383
El Dorado Canyon
In April 1986, Air Force and Navy aircraft conducted strikes against
Libya in an operation code-named El Dorado Canyon. The operation
followed an attack by Libyan agents against a nightclub in West Berlin
that resulted in a U.S. serviceman’s death.
Drawing on lessons learned from the Israeli operations in the Bekaa
Valley four years before and from training at Red Flag, plans called for
conducting the operation at night and employing guided weapons. The
joint strike package was divided into two groups; one would hit targets
around Tripoli, the other those around Benghazi. The Air Force em-
ployed eighteen F-111Fs based at Lakenheath, England, while the Navy
provided aircraft specialized for SEAD to strike the Tripoli defenses.
(The Navy had full responsibility for the Benghazi part of the operation.)
Both packages included jamming electronic intelligence and surveillance
aircraft, along with fighter escorts.149
384 Part 2
later relied even more for their success on the kinds of high-tech capabil-
ities that many DRM members discounted.154
To the reformers’ great frustration, the Air Force was able to deflect
most of their ideas. Yet the service’s leaders often demonstrated a reluc-
tance to consider how they might introduce new concepts and novel
capabilities to boost air power’s effectiveness. Creech recalled, “In at-
tending quarterly four-star executive sessions at ‘Corona Conferences’
over a span of six-and-a-half years, I cannot recall a single instance where
the chief of staff and the assembled four-stars, addressing a huge range of
issues, ever once talked about doctrine.”155
The same might be said of the Air Force’s thinking on guided weap-
ons. Despite the verdict of RAND analysts that LGB performance was
“spectacularly good” in the 1972 Linebacker campaigns, and although
major improvements in guided weapons had been achieved since the war,
the Air Force went to war in January 1991 with only a small fraction of
its force capable of employing them. When war did come, the Air Force
was the fortunate beneficiary of efforts by officers like Dixon, Creech,
and Suter. It also owed much to forward-thinking civilians like Harold
Brown and William Perry, who saw the enormous potential that emerg-
ing technologies—and the IT revolution in particular—had to transform
air warfare. Still others believed that new capabilities, when employed
with existing capabilities in new ways, could enable dramatically different
kinds of operations that would revolutionize air warfare. Among those in
this latter group were Lieutenant General Chuck Horner, Colonel John
Warden III, and Lieutenant Colonel David Deptula.
Instant Thunder
Warden was one of the Air Force’s leading thinkers. In his book The Air
Campaign: Planning for Combat, Warden presented a model for air opera-
tions consisting of five concentric rings describing the enemy state as a
system, with its leadership at the core.156 He argued that by conducting
air strikes against properly selected targets, air power could cripple, rela-
tively quickly, an enemy’s capacity to make war, by decapitating its lead-
ership, fracturing its ability to control its population, reducing its ability
to wage war, or some combination thereof. Drawing on his five-ring
model, Warden and his team developed a plan they named Instant Thun-
der. It called for prosecuting an aggressive air campaign primarily against
the Iraqi leadership. Warden believed that his plan, properly executed,
could produce a victory in a week or so.157
To some people, however, Warden’s concept appeared little more
than a sophisticated version of arguments dating back to Giulio Douhet
and Billy Mitchell on air power’s ability to defeat an enemy quickly by
destroying or neutralizing its center(s) of gravity. When the concept was
briefed to General Powell, he declared, “I can’t recommend only the
strategic air campaign to the president.” Nevertheless, Warden and
one of the Air Force’s brightest young thinkers, Lieutenant Colonel
David A. Deptula, found themselves on a plane to Saudi Arabia to brief
Horner.158
Horner, for his part, believed that “the best thing to do was to fight a
ground war of maneuver and use airpower to cut the [Iraqi Army’s] sus-
tainment since [the Iraqis] were vulnerable there.” As the general put it,
he intended to “build a hose and point it where the ground commander
sees that it’s needed.”159
Warden briefed Instant Thunder to Horner on August 20. Again,
Warden asserted that the war could be won with air power in six to nine
days. As with Powell, Warden immediately ran into resistance from
388 Part 2
Iraq’s IADS
Iraq’s air defenses were formidable, even when compared to those the Air
Force had encountered over Vietnam. The Iraqi IADS included four air
defense sectors providing the country with overlapping SAM and anti-
aircraft artillery coverage. The Iraqi Air Force, among the world’s larg-
est, boasted late-generation French and Soviet fighters, including three
squadrons of advanced MiG-29 fighters. Each air defense sector had an
operations center linked to subordinate operations centers, along with a
network of more than 100 acquisition and tracking radars. The IADS
hub was in Baghdad, which, after Moscow, had the world’s highest con-
centration of air defenses.162
On paper, the balance of forces between the U.S.-led coalition and
Iraq was heavily in favor of the former. Still, the balance had also been in
the United States’ favor in the Vietnam War and in brief operations like
the 1983 strike in Lebanon. And even though Israel prevailed in the Yom
Kippur War, it paid a fearful price. Saddam Hussein appeared to be bet-
ting that, like the North Vietnamese, if he could inflict heavy casualties
on the coalition and drag the war on for months, he could ultimately
prevail.
From Mass to Precision 389
concept, focusing on Iraq’s IADS. Phase II, planned to last three days, had
air forces concentrating on suppressing Iraqi air defenses in the Kuwait
Theater of Operations. Phase III, anticipated to last roughly a month,
gave priority to inflicting attrition on the Iraqi army and isolating it from
its sources of support. This would pave the way for the coalition ground
offensive. Phase IV envisioned coalition air forces performing a range of
missions during the coalition’s ground-force offensive.
Desert Storm
The air campaign began the night of January 17, 1991, with the daunting
objective of neutralizing Iraq’s IADS within twenty-four hours. Led by a
combination of Air Force reconnaissance systems, precision munitions,
and stealthy F-117s, the mission was accomplished in the war’s first eight
hours.
The stealth F-117s, each armed with two PGMs, were assigned to
strike high-value targets in and around Baghdad, including critical Iraqi
communications and air defense nodes. The air campaign’s initial hours
also included a key deception operation code-named Scathe Mean.
Shortly after the F-117A’s guided-weapon attacks on Baghdad, a wave of
long-range, radio-controlled, aerial drones and air-launched decoys ar-
rived over the city. The drones simulated the electronic radar signatures
of various coalition aircraft, inducing Iraqi air defense units to activate
their radars, thereby revealing their position, whereupon they were
promptly attacked with HARMS launched from F-4G Wild Weasels.166
Operations were coordinated by the U.S. military’s nascent battle net-
work, including GPS, as well as AWACS and JSTARS aircraft. After the
first night, Iraqi air defense sectors were forced into autonomous opera-
tions. Hardened SAM and interceptor operations centers were neutral-
ized within four days.167
With the SEAD mission accomplished, coalition aircraft were able
to operate effectively at acceptable risk at medium and high altitudes.
The Air Force then began to employ a wide range of aircraft to suppress
any remaining Iraqi early warning and ground-controlled intercept radar
sites, command-and-control nodes, SAM sites, and air bases. Thanks to
superior training, tactics, and equipment, Air Force losses were substan-
tially lower than those suffered by allied air forces that persisted in “go-
low” tactics. The Royal Air Force quickly lost 10 percent of its seventy
Tornadoes supporting the coalition. The French Air Force, also “going
From Mass to Precision 391
low,” saw two separate flights suffer serious damage early on. In forty-
three days of intense day and night combat, the Air Force lost thirteen
fighters, by far the lowest loss rate of any coalition air force. The Royal
Air Force’s Tornado had a loss rate of roughly ten per 1,000 sorties,
eleven times that of the F-15E, which flew similar missions.168
General Horner’s air operations center created a daily air tasking
order, including every coalition aircraft flying over the area of operations.
This enabled Horner to exercise overall control—unity of command—
over the air campaign, a critical factor given its scale and scope.169 Horner
also benefited from the technological advances made in the two decades
since Vietnam. Space-based systems provided accurate and timely weather
forecasts. GPS satellites proved indispensable as navigational aids in guid-
ing many coalition aircraft to their targets. This support was especially
key at night and during the first week of the campaign, when air opera-
tions were hampered by poor weather over much of Iraq and Kuwait.170
Elsewhere on the air campaign’s first night, thirteen B-52s, navigat-
ing with their forward-looking infrared sensors and GPS, flew at alti-
tudes less than 400 feet to attack five Iraqi forward-operating airfields.
According to a B-52G radar navigator, “[The GPS’s] super-accurate nav-
igation data kept our systems reliable as we crossed Iraq with our radars
off, and the final radar aiming on our bomb runs needed little or no ad-
justment by the bombardier.”171
The Air Force’s U-2R/TR-1 reconnaissance aircraft relied on its
GPS-assisted radar to locate targets and transmit their precise coordinates
to an AWACS orbiting over Saudi airspace. The AWACS forwarded this
near-real-time intelligence information to B-52s via coded messages, en-
abling the bombers to fly directly to their targets. More broadly speaking,
GPS also allowed coalition air forces to update their inertial navigation
systems, thereby improving the accuracy of their attacks with unguided
weapons by an order of magnitude against fixed targets.172 The AWACS
proved capable of detecting enemy aircraft flying at low altitudes at dis-
tances more than 200 nautical miles and identifying Iraqi aircraft during
their takeoff runs, enabling them to be tagged as hostile and the informa-
tion provided to coalition pilots. The U.S. network of airborne sensors,
weapons, and command, control, and communications links gave coalition
aircrews an enormous advantage in situation awareness, alleviating much
of the resistance pilots had exhibited in earlier conflicts with respect to
BVR engagements.173 The improvements in navigation, including the use
of LANTIRN, combined with enhanced command and control, enabled
392 Part 2
the Air Force to operate effectively at night. Indeed, the F-117 operated
solely at night.174
This nascent U.S. battle network provided coalition commanders
with inter- and intratheater communications links, secure data transmis-
sion, weather information, ballistic missile early warning, surveillance
and reconnaissance imagery, and signals intelligence. Looking back on
the role that GPS and satellite-based communications played in coalition
operations, Air Force chief of staff General Merrill A. McPeak declared
it “the first space war.”175
The Payoff
Coalition air forces rapidly eliminated Iraq’s air force as a significant
threat. Thirty-three Iraqi fixed-wing aircraft were downed during the war,
at a loss of a single Navy F/A-18. This 16.5-to-1 exchange represented an
enormous improvement over the roughly 2-to-1 rate achieved in the Viet-
nam War. Although many combat-experienced Iraqi pilots were flying
modern Soviet fighters, they proved no match for Air Force aircrews
drawing on their training at Red Flag. Every coalition air-combat victory
was achieved with advanced IR-guided Sidewinder and radar-guided
Sparrow missiles. The Sparrows employed by Air Force aircrews were
more than six times more reliable in 1991 than they had been during the
Rolling Thunder campaign and roughly five times more reliable than
those used during Linebacker I and II. Overall, air-to-air missiles in the
First Gulf War were approximately three times more likely to achieve a
kill than those employed during the Vietnam War.176
During the war’s first three days, Iraqi pilots employed tactics that
would have been recognized by North Vietnamese pilots two decades
before. In 82 percent of coalition air engagements against Iraqi fixed-
wing aircraft, AWACS provided target information and identification
well before U.S. fighters had even detected enemy aircraft.177 The Air
Force’s superior target identification and enhanced air-to-air missiles en-
abled U.S. aircrews to attack Iraqi aircraft beyond visual range and gave
them the confidence to do so. During the war, sixteen of thirty-three en-
gagements, or 48 percent, between fixed-wing aircraft occurred BVR.
The war revealed that an aircrew’s SA was no longer primarily limited to
what they could physically see but rather what they received from infor-
mation provided by other sources, such as the AWACS.178
From Mass to Precision 393
package employed thirty-eight Air Force, Navy, Marine, and Saudi air-
craft, with only eight (21 percent) being strike aircraft: roughly the same
ratio of strike to support aircraft employed during the final stages of the
Vietnam War.183 During the First Gulf War, the U.S. military—primarily
the Air Force—dropped more than 9,500 LGBs—more than double the
number released over North Vietnam from 1968 to 1972.184 Some
17,000 guided weapons of all types were employed in the First Gulf War,
but they constituted only 8 percent of the total bombs expended. Yet
they produced more than 75 percent of the serious damage inflicted on
Iraqi targets.185 A 1993 Defense Science Board study concluded that air
operation’s effectiveness had increased by an order of magnitude in the
First Gulf War, noting that “for many target types, a ton of PGMs typi-
cally replaced 12–20 tons of unguided munitions on a tonnage per target
kill basis as well as saving as much as 35–40 tons of fuel per ton of PGMs
delivered.”186
As for the weapons themselves, some—the Paveway LGBs, Walleye,
Maverick, Hellfire, and Shrike—had their roots in the Vietnam War and
its immediate aftermath. By far the majority of guided weapons em-
ployed in Operation Desert Storm were LGBs and Mavericks. Never-
theless, the improvements in guided weapons were significant. For exam-
ple, during the Vietnam War, Paveway I LGBs enabled the Air Force to
take down bridges that had withstood repeated attacks. In Operation
Desert Storm, Paveway II and III munitions with BLU-109/B “penetra-
tor” warheads breached hardened aircraft shelters that were purportedly
invulnerable to conventional bombing. And the 500-pound GBU-12
guided weapon with the Mark-82 warhead took out individual Iraqi
tanks, even when they were sheltered in sand revetments.187
Although consigned to the outer ring in Warden’s Instant Thunder
concept, air attacks devastated Iraq’s army. For example, prior to the be-
ginning of the ground offensive, on the night of February 9, 40 F-111Fs
armed with guided weapons destroyed more than 100 Iraqi armored ve-
hicles. Four days later, during the night of February 13–14, 46 F-111Fs
dropped 184 GBU-12 LGBs, destroying another 132 armored fighting
vehicles, a 72 percent kill rate. Overall, during the war, Air Force F-
111Fs destroyed 920 Iraqi armored fighting vehicles, out of an estimated
total of 6,100, making them a leader in the “tank plinking” air campaign
preceding the coalition’s ground offensive.188
The success of the F-111s and F-15s put to rest still another Defense
Reform Movement assertion: that the advanced aircraft favored by the
From Mass to Precision 395
or “time-sensitive,” targets and strike them effectively. Over the next two
decades, the U.S. military, and the U.S. Air Force in particular, would make
significant progress in meeting this challenge, albeit in “benign” or rela-
tively “uncontested” air environments.
The LGBs employed in the First Gulf War were limited to employ-
ment in clear weather, while other guided weapons relied on IR signa-
tures or radar emissions to identify a target. By the end of the 1990s, new
guided weapons were fielded, notably the Joint Direct Attack Munition
(JDAM) and the Joint Standoff Weapon (JSOW). As “seekerless” guided
weapons, the JDAM (“Jay-dam”) and JSOW (“Jay-sow”) use GPS for in-
ertial guidance and to provide the target’s coordinates. These guided
weapons cost less than similar guided weapons and, unlike LGBs, can be
employed through clouds, smoke, or other forms of obscuration and at
night. They do not require target designation (as with a laser), so, once
they are dropped, aircrews can move on to other missions or employ ad-
ditional weapons. Both JDAMs and JSOWs are also capable of receiving
GPS updates after launch. In brief, they give aircrews an all-weather
“launch-and-leave” capability.198
New air-to-air guided weapons were fielded, enhancing the Air
Force’s effectiveness in air-to-air combat. The AMRAAM gave aircrews a
major boost in performance over the Sparrow. Both had roughly the
same range, but unlike the Sparrow, the AMRAAM is a “fire-and-forget”
weapon, enabling its aircrew to engage in evasive maneuvers or to move
on to perform additional tasks. The AMRAAM also weighs far less than
the Sparrow while having a higher speed, giving the enemy less time to
react and engage in defensive maneuvers.199
Significant advances in what have come to be known as “battle net-
works” occurred following the First Gulf War. Experience in the war
suggested that compressing the engagement cycle or “kill chain” would
become increasingly important, especially against time-sensitive targets,
such as a mobile missile launcher fleeing the site of a launch.200 During
Operation Desert Storm, it typically took about seventy-two hours to
compile the air tasking order that determined the targets that would be
attacked. The process of identifying targets, executing attacks against
them, and assessing the attacks’ success typically spanned several days.
Eight years later, during the Air Force’s participation in Operation
Allied Force against Serbian forces in Yugoslavia, progress had clearly
been made. The average “sensor-to-shooter” cycle was reduced from the
three days it took to create the air tasking order to about three to four
398 Part 2
hours. Tomahawk targeting time was reduced to less than two hours. By
the time of the Second Gulf War (Operation Iraqi Freedom) in 2003,
further refinements to the U.S. battle networks had been made. Ten
types of scout drones were employed, and in unprecedented numbers.
They joined U.S. manned intelligence, surveillance, and reconnaissance
(ISR) assets, including U-2, JSTARS, and AWACS aircraft. Many coali-
tion strike aircraft were able to monitor the movement of Iraqi forces by
using radar images transmitted directly to them from these ISR aircraft,
even in sandstorms. The drones occasionally executed strike missions,
continuing a role they first played in Afghanistan, with Predator UAVs
firing Hellfire antitank missiles against Iraqi targets.201
To move scouting data quickly to strike elements, the Air Force es-
tablished a Time-Sensitive Targeting Cell (TSTC) at Prince Sultan Air
Base in Saudi Arabia. The air attack on the Ba’ath Party headquarters,
where General Ali Hassan al-Majid, the dreaded cousin of Saddam Hus-
sein known as “Chemical Ali,” was reported to be located, was executed
in less than half an hour from the time the general was spotted heading
into his villa by a British special operations soldier. The information was
relayed to the TSTC, which cued an F-16 strike aircraft that destroyed
the villa using PGMs. In some instances, the TSTC put bombs on target
within twenty minutes of being alerted by intelligence. In all, coalition
air forces struck nearly 700 targets based on “dynamic retargeting” and
executed more than 150 missions against time-sensitive targets, such as
Iraqi leaders and suspected weapons of mass destruction.202
For nearly half a century following the bomber offensives in World War II,
the U.S. Air Force and the air forces of other significant military powers
confronted the problem of overcoming ever improving enemy air defenses.
Losses were often high and at times bordered on unsustainable.
In early 1991, however, over the skies of Iraq, in the course of several
days, an air campaign, led by a handful of U.S. fighter-bomber aircraft
armed with two bombs each, succeeded in dismantling one of the world’s
most formidable integrated air defense systems. At the same time, U.S.
and allied aircraft swept the skies of an enemy air force flying modern in-
terceptor aircraft. With the Air Force having achieved the air superiority
that eluded it over North Vietnam twenty years earlier, it went on to
wreck the better part of the Iraqi Army in one of the most lopsided cam-
paigns in the history of war.
From Mass to Precision 399
The First Gulf War revealed a disruptive shift in the character of air
warfare. New capabilities, including guided weapons, stealth aircraft, and
advanced means of navigation and communication, were combined into
a nascent guided-weapons battle network. These capabilities were em-
ployed in a campaign based on an innovative operational concept, the
brainchild of Air Force leaders—and thinkers—that spanned from senior
generals to midlevel officers. The campaign’s execution benefited enor-
mously from a revolution in training that enabled aircrews to gain the
kind of competence that previously could only be acquired through ex-
tended combat. By several measures of merit, the air campaign con-
ducted in Operation Desert Storm yielded orders of magnitude or
greater improvements in operational effectiveness. As Russian military
theorists concluded, the “revolution in military affairs” they had foreseen
was now a reality.
chapter ten
Echoes of History
He who will not apply new remedies must expect new evils.
Senior defense policy makers want to know how their country stands
in key areas of the military competition. They are particularly interested
in knowing when they face disruptive shifts in the competition and how
to exploit them to their advantage. Part 1 of this study argues that we are
in such a period of disruptive change. Not only is the precision-warfare
regime reaching its mature phase, but it appears to be overlapping with
the onset of a new military revolution. It seems that we can discern, if
only dimly, the new regime’s characteristics.
The preceding four chapters describe how military organizations en-
gaged in disruptive innovation to trigger a military revolution and, along
with it, a large and rapid shift in the military balance in their favor. If
400
Echoes of History 401
A Guiding Vision
Each of the four military organizations profiled in the histories had a
guiding vision of the new warfare regime. This vision addressed two
questions of fundamental importance: What are we trying to do? and
How can we accomplish this in a far more effective way than we can at
present? The vision is relatively brief and unambiguous, serving to focus
and inform the organization’s efforts.
In the Royal Navy’s case, Admiral Fisher argued that the existing
naval-warfare regime, centered on battleships and the simple line of bat-
tle, was doomed unless (and perhaps even if) major changes were made.
Fisher declared, “The battleship of the olden days was necessary because
402 Part 2
it was the one and only vessel that nothing could sink except another
battleship. Now every battleship is open to attack by fast torpedo-craft
and submarines.”1 Consequently, Fisher argued, “There is good ground
for enquiry whether naval supremacy of a country can any longer be as-
sessed by its battleships.”2
The admiral’s vision of future war at sea was clear and unambiguous:
for the surface fleet, he wanted ships with superior speed and long-range
strike capabilities to operate effectively beyond the enemy’s rapidly
growing torpedo range. Fisher also envisioned submarines armed with
torpedoes performing a new mission: flotilla defense. The fleet’s actions
would be coordinated by a global command-and-control network.
In the case of the German military and Blitzkrieg, General von
Seeckt’s vision was succinct: “The goal of modern strategy will be to
achieve a decision with highly mobile, highly capable forces, before the
masses have begun to move.”3 Simply put, von Seeckt envisioned over-
turning the positional, attrition warfare that prevailed on the Western
Front in World War I with “highly mobile” and “highly capable” forces
(which eventually became the elite panzer units combined with air sup-
port) capable of not only penetrating the enemy front but also rupturing
it “before the masses have begun to move,” or counter-concentrate to
stop them. Over time, leaders like General Guderian added clarity to the
vision, stating, “We believe that by attacking with tanks we can achieve a
higher rate of movement than has been hitherto obtainable, and—what is per-
haps even more important—that we can keep moving once a breakthrough has
been made.”4
The U.S. Navy was blessed with its own visionaries in the years be-
tween the world wars. One was Admiral Sims, who, nearly a decade be-
fore the United States launched its first purpose-built carrier, asserted,
“A small, high-speed carrier alone can destroy or disable a battleship
alone. . . . A fleet whose carriers give it command of the air over the
enemy fleet can defeat the latter. [Consequently], the fast carrier is the
capital ship of the future.”5 Sims’s vision was shared by Admiral Moffett,
who proclaimed, “We can hardly visualize today the potential power of
aircraft, not so much for scouting and spotting, but for bombing and tor-
pedoing. It may readily be the deciding factor in a war.”6
The U.S. Air Force’s leading visionary was General Creech. The
general was convinced that a different way had to be found to address
the integrated air defense system (IADS) threat that had inflicted such
high casualties on the U.S. Air Force and Navy during the Vietnam War
Echoes of History 403
and on the Israeli Air Force in the Yom Kippur War that followed.
Creech’s vision was of an all-day, all-night, all-weather, precision, stand-
off, integrated force that would wage a campaign whose goal was to sup-
press enemy air defenses, not “fly past” them.7
In summary, in each case where a military organization led the way
to a disruptive shift in the competition, it enjoyed the benefit of a clear
vision of the envisioned end state—what it was trying to do and how it
would go about accomplishing it.
wireless, and the number of modern, fast battle cruisers capable of rapidly
deploying to threatened spots around the globe.
For Fisher to realize his concept of battle fleet engagement, he
markedly increased the emphasis on ship speed and engagement range,
sacrificing armor to get it. The admiral was especially keen on his battle
line enjoying an advantage of speed over its rivals, declaring, “There is
no question whatever that the first desideratum in every type of fighting
vessel is speed. . . . It is absolutely impossible to exaggerate the supreme
importance of speed.”13
Fisher’s concept of flotilla defense measured its effectiveness in terms
of submarines and destroyers armed with torpedoes rather than a surface
fleet defending Britain’s shores. Here we find Fisher again sacrificing
armor (as well as speed and firepower) to exploit the submarine’s greatest
advantage: stealth.
Similarly, the German Army emphasized new MOEs in abandoning
the positional, firepower-heavy attrition warfare that dominated the
Western Front during the Great War and moving toward mechanized
air-land operations. In designing mechanized forces, the Germans em-
phasized tank speed and operational range over firepower and armor
protection. As Guderian described it, “The chances of an offensive based on
the timetable of artillery and infantry co-operation are . . . even slighter today
than they were in the last war. Everything is therefore dependent on this: to be
able to move faster than has hitherto been done: to keep moving despite the ene-
my’s defensive fire and thus to make it harder for him to build up fresh defen-
sive positions: and finally to carry the attack deep into the enemy’s defenses.”14
This contrasted starkly with French tank design, which was wedded to a
war-fighting concept closely aligned to positional warfare and thus gave
priority to armor and armament. Not surprisingly, the German concept
of a highly mobile war of maneuver required greater emphasis on com-
mand and control, so MOEs like the percentage of tanks equipped with
radio transmitters and receivers became increasingly important. This is
not to say that the German Army was happy with its weakly armed Pan-
zer Is and IIs, only to note that when it came to setting priorities, speed
and range generally trumped firepower and armor plate.
Dramatically altered MOEs also characterized the U.S. Navy’s shift
from a battleship-centric to a carrier-centric fleet. The Gun Club em-
phasized the weight of a broadside that could be fired at the maximum
range of the largest guns. As long as this measure of merit prevailed, the
battleships would always compare favorably with carriers.
Echoes of History 409
Those naval officers who envisioned the carrier as the capital ship
advocated different metrics. Like Fisher and the Germans, American
naval visionaries were willing to trade armor and firepower for speed and
range. Toward this end, U.S. carriers dispensed with armor-plated decks.
American naval air enthusiasts valued the carrier air wing’s extended-
range fires over the battle line’s volume fires. A carrier could only deliver
a fraction of the firepower inherent in the line of battle, they admitted,
but it could do so at a range ten times greater. During the 1930s, when it
was clear that carrier warfare was “offense dominant” and that the key to
success was to find and sink the enemy’s carrier before it found yours, the
Navy emphasized scouting to find the enemy carriers and sinking them,
over armor-plated decks and onboard anti-aircraft defenses. Conse-
quently, the Navy sought to maximize the number of aircraft and their
launch and recovery speed on its carriers.
The First Gulf War yielded a major shift in several key MOEs used
by the Air Force to determine military effectiveness. For example, the
growing dominance of beyond-visual-range engagements required less
in the way of aircraft maneuverability and speed in a dogfight and more
ability in scouting—detecting an enemy aircraft at the moment it enters
a friendly aircraft’s missile range. As scouting (and defeating the enemy’s
scouting) became more important, so did stealth.
The combination of stealth and guided weapons produced a shift
away from large-strike packages, where a large majority of aircraft
were in support roles, and toward small numbers of stealthy aircraft
armed with guided weapons. The MOE for these operations shifted
from the number of aircraft that could be assigned to strike a target to
the number of guided weapons employed on stealth aircraft. Similarly,
the measure of bomb tonnage dropped gave way to bomb accuracy.
This can be seen by the rapidly growing percentage of guided weapons
relative to unguided bombs employed in Air Force operations following
the First Gulf War. Precision-guided munitions constituted less than
10 percent of the munitions employed by the U.S. aircraft in the First
Gulf War. This figure grew to roughly 30 percent in the 1999 Balkan
War, exceeded 50 percent in air operations in Afghanistan in 2001–2
(Operation Enduring Freedom), and surpassed 60 percent in the Second
Gulf War.15
Scouting in the form of situation awareness remained crucial to ef-
fective air operations, but in a different way. The shift away from visual
engagements to BVR engagements was made possible by linking an
410 Part 2
aircraft (including its radar and sensors) into a battle network and arming
it with increasingly reliable extended-range air-to-air missiles.
case with the Air Force’s Red Flag exercises and those conducted by the
German Army and Luftwaffe. Red Flag aided the Air Force in develop-
ing, almost on the fly, the innovative air campaign for Operation Desert
Storm. In the German military’s case, field exercises facilitated the blend-
ing of combined arms in panzer divisions and their integration with the
Luftwaffe. The Royal Navy’s exercises were crucial to its shift from close
blockade to distant blockade operations that proved successful against
Germany.
Field and fleet exercises were indispensable in each military’s main-
taining an awareness of significant shifts in the character of military
competition that sometimes occur during periods of revolutionary
change but that are not themselves revolutionary. This was the case with
the U.S. Navy and Air Force. The U.S. Navy’s fleet problems and experi-
ments identified several such shifts. Tests on the battleship Texas in 1919
showed that aircraft acting as spotters greatly enhanced the battle line’s
gunnery at extended ranges. Ten years later, Fleet Problem IX revealed
that carriers could function as an independent strike force by conducting
raids, even though they still had not displaced the battle line as the arbi-
ter of sea control. In the absence of fleet exercises and experiments, it is
doubtful the Navy would have either identified these shifts in the mili-
tary competition or adapted to them as quickly and as well as it did.
Similarly, the U.S. Air Force benefited considerably from its experi-
ence and that of the Israeli Air Force (IAF) in several wars—the ultimate
“field exercises.” The Vietnam War showed that guided weapons could
enable the existing form of air operations—large-strike packages focused
on individual missions at the tactical level of warfare—to be executed
more effectively. The IAF’s operation in the Bekaa Valley demonstrated
the boost in effectiveness that a nascent battle network employing un-
manned aircraft could provide.
One reason why disruptive military innovation typically requires a
decade or more to bring about is that it typically must overcome individ-
ual and institutional resistance. Properly structured field exercises and
fleet maneuvers, involving actual forces in an environment that is as close
to combat as possible, are arguably unsurpassed in their ability to gener-
ate support, and even enthusiasm, within the officer corps for new opera-
tional concepts. The Saratoga’s raid on the Panama Canal in Fleet
Problem IX and the Third Panzer Division’s performance in the German
Army’s 1937 North German Plain maneuvers convinced many officers
who witnessed these exercises—in a way that no war game or simulation
412 Part 2
could have—that they were on to something special and that a new and
far more effective way of conducting military operations was possible.17
The same can be said regarding the effect on the officer corps that oc-
curred following “real-world” operations like the German Condor Le-
gion’s operations during the Spanish Civil War, the IAF’s brief campaign
against Syrian forces in the Bekaa Valley, and the U.S. air strikes in Op-
eration El Dorado Canyon and its Red Flag exercises.
more rapidly and alter their force structure and doctrine more quickly
than their competitors. The ability to compete based on time is espe-
cially advantageous during periods of disruptive change, which require a
far greater degree of adaptation than is the case in periods of evolution-
ary change.
Since time is a resource, employing it effectively can reduce the risk
associated with a military organization’s strategy when it comes to in-
vestment priorities. The faster a military can introduce new capabilities
into the force, the less need it has to field a large standing military. This
is particularly important in periods of disruptive change, when existing
military capital stock is prone to depreciate at an accelerated rate.
Of course, the troops that operate military systems must be familiar
with them in order to maximize their effectiveness. The same can be said
of the need to train them to execute a military’s doctrine—especially one
based on innovative operational concepts. The histories examined in this
study, however, suggest that this does not require a lengthy period of time
to achieve. Within the span of five years, the German Army went from its
Versailles Treaty disarmed state to conducting sophisticated mechanized
air-land operations in two large-scale campaigns resulting in decisive vic-
tories. Within five years, the U.S. Navy, which until the late 1930s had a
carrier force made up of a converted collier, two converted cruisers, and
one undersized purpose-built carrier, found itself operating more than
eighty carriers of all types while waging a fundamentally new type of war
at sea on the way to destroying the formidable Imperial Japanese Navy.
Military organizations enjoying a superior position in time-based
competition are well placed to adopt strategies based on exploiting the
first- and second-move advantage. As the term suggests, the first-move
advantage involves shifting to a new, more effective way of competing
before rivals can react and keep pace. The second-move advantage finds
a military organization confronting a situation where a rival has begun
fielding new capabilities, forces, and operational concepts with an eye to-
ward effecting a disruptive shift in the competition in its favor. If the lag-
ging military enjoys an advantage in time-based competition, it can use it
to catch up—and surpass—the rival that is seeking to exploit the first-
move advantage.
The benefits associated with the second-move advantage are several.
For one, it allows the “second mover” to see with relative clarity the
“first mover’s” plans for gaining a competitive advantage. This reduces
considerably the uncertainty confronting the second mover. Another
416 Part 2
the other hand, was better able to keep pace with advances in naval avia-
tion owing to its late arrival to the competition.
The U.S. Air Force offers perhaps the best example of a military or-
ganization pursuing the first-move advantage. The U.S. military under
Defense Secretary Harold Brown explicitly sought to leverage the coun-
try’s competitive IT advantage over Soviet Russia in pursuing its Offset
Strategy, developing stealth and battle-management aircraft, guided
weapons, advanced sensors, and a space-based navigation and positioning
system. In combination, they enabled the Air Force in particular, and the
U.S. military more broadly, to exploit the first-move advantage and gain
a dramatic boost in effectiveness.
three weeks into the campaign, Army Group Center’s two panzer groups
(later “armies”) had advanced to Smolensk, roughly halfway from the in-
vasion’s jump-off point and Moscow. Those Russian forces not already
destroyed or captured were mostly in disarray. But as Alan Clark notes,
“The extent to which the Panzer armies of [Generals] Hoth and Gude-
rian were outrunning their supporting infantry was a constant source of
worry to OKH [Oberkommando des Heeres, the German Army’s high
command]. The Germans were very short of motorized infantry units,
and those that they had operated close up with the tanks as part of the
armoured spearhead. . . . During the last week in July, both at OKH and
OKW [Oberkommando der Wehrmacht, the armed forces’ high com-
mand], opinions were united in the view that the advance of Army
Group Center should be slowed down.”27
The U.S. Navy’s carriers also had limitations. Carrier aircraft domi-
nated the daylight hours, but at night, surface-combatant engagements
were the norm.28 Following the devastating success of U.S. flattops
against Japanese carriers in the Battle of Midway, they withdrew during
the night, while Japanese surface ships pressed ahead, attempting to en-
gage them.29 Although the carrier had clearly displaced the battleship as
the capital ship, the latter did not quickly go the way of the horse cavalry.
In several maritime engagements during World War II, the battleship
dominated.
The U.S. Air Force’s introduction of precision warfare in the First
Gulf War also had its limitations. The stealthy F-117 aircraft only oper-
ated at night. Their laser-guided bombs were generally ineffective in
poor weather, including conditions involving smoke and cloud cover.
Furthermore, in early 1991, GPS coverage was limited, and there were
times when it was unavailable. Finally, the Air Force’s ability to strike
mobile or “time-sensitive” targets in near real time was exceedingly
modest.
In summary, although war provides the ultimate validation of the vi-
sion of a dramatically new and more effective form of military operation,
it typically also reveals gaps in the vision that remain to be addressed.
area-denial forces is shifting the form of the air competition, from one in
which the Air Force could count on assured access to the theater of oper-
ations to one in which access is now highly contested, in large part from
the threat of air and missile attack on forward U.S. air bases. Moreover,
the PLA Air Force can compete on a far greater scale than any rival the
U.S. Air Force has encountered since the Cold War. The U.S. Air
Force—along with the rest of the U.S. military—is only now beginning
to confront the problems posed by the emergence of a mature precision-
warfare regime.
To sum up, each of the four militaries examined here was the first to
engage in disruptive innovation to realize a major boost in its competi-
tive advantage in a particular aspect of the military competition. This rein-
forces the importance of military organizations’ need to focus on
addressing the questions, What is it we are trying to do? and What is the
particular challenge at the operational level of war that we are trying to
address?
Serendipity
In reviewing the four histories presented in this study, one is struck by
the role that chance, or good fortune, plays in successful disruptive inno-
vation. Serendipity seems to have its greatest effect with respect to the
individuals who lead the effort. In the German military’s case, it seems
unlikely that its progression toward Blitzkrieg would have proceeded as
quickly or effectively as it did if General Reinhardt rather than General
von Seeckt had led the Reichswehr. The same might be said of Admirals
Fisher and Moffett and of Generals Creech and Dixon and their respec-
tive military organizations.
At times, exogenous factors precluded a military organization from
pursuing an ill-advised course of action. Although viewed as an unwel-
come development by many U.S. naval officers, the Washington Navy
Treaty prevented the United States from building battleships at the ex-
pense of carrier construction. On the other hand, the treaty limits also en-
couraged Moffett to argue for dead-end systems like flying-deck cruisers
and constructing false-start carriers like Ranger. In this case, however, the
Great Depression’s austere budgets precluded Moffett from pursuing his
plans. Similarly, the Versailles Treaty prevented the German military from
aggressively pursuing von Seeckt’s agenda in the 1920s. So when Ger-
many began to rearm in the mid-1930s, the Wehrmacht was not burdened
422 Part 2
with the expense of maintaining and operating (or even disposing of)
large quantities of outdated or rapidly obsolescing tanks and planes.
Outsiders nudged the U.S. Air Force toward disruptive innovation.
William Perry’s support for stealth aircraft and guided weapons and the
OK he received from Secretary of Defense Harold Brown were crucial
to creating the new form of air operations that the Air Force introduced
in Operation Desert Storm. During Admiral Fisher’s tenure as first sea
lord, he benefited greatly from the backing provided by King Edward
VII and, following his retirement, by the first lord of the Admiralty, Win-
ston Churchill. German Army panzer enthusiasts, Guderian in particular,
profited significantly from Hitler’s support. Congressman Carl Vinson,
chairing Congress’s Naval Affairs Committee, backed a series of bills in
the years leading up to Pearl Harbor that were crucial in maintaining
naval aviation’s momentum.
Although each military was aided significantly by good fortune, as
Branch Rickey once observed, “Luck is the residue of design.” The role
played by luck was not insignificant, but it was one element of many that
led to success. Those other elements were often the product of conscious
design.
Organizational Innovation
As described above, there is a significant number of common features
characterizing military organizations that led the way in effecting a mili-
tary revolution through disruptive innovation. Still, it’s important to un-
derstand that these characteristics are not definitive, only suggestive. The
militaries examined in this study are small in number, in part because
military revolutions are relatively rare phenomena. That said, there are
others that could be examined to confirm or challenge these findings. For
example, between the world wars, the Imperial Japanese Navy engaged in
disruptive innovation, creating the carrier air arm that proved a formida-
ble match for the U.S. Navy’s fast carrier task forces. During the same pe-
riod, the U.S. Army Air Force and British Royal Air Force created
strategic aerial-bombardment forces, enabling for the first time large-
scale, prompt, direct attacks on an enemy’s population and industry, even
424 Part 2
before its ground and naval forces were defeated. It’s possible that an ex-
amination of these militaries’ success at disruptive innovation could yield
significantly different findings or confirm those reached in Part 2 of this
book.
On a more encouraging note, the characteristics derived from the
four militaries examined here do correlate remarkably well to those iden-
tified as resident in business organizations that have successfully pursued
disruptive innovation. Although military and business organizations have
important differences, corporations, like their military counterparts, are
constantly on the lookout for new sources of competitive advantage,
even as they maintain a vigilant eye on products, services, and other
sources of advantage that risk becoming wasting assets.31
For example, in the 1970s, the Boston Consulting Group developed
a two-by-two matrix that classifies a corporation’s assets. Although it is
rather simplistic, the matrix offers a useful framework for thinking about
a business’s products and competitive advantages. The matrix is defined
on its two sides by increases in levels of market share and by market
growth rate. A firm’s “Stars” are those that have great potential to pro-
vide a major source of advantage (and profit) but have yet to realize that
potential. They are roughly analogous, for example, to the U.S. Navy’s
carrier force in the 1920s and ’30s and the U.S. Air Force’s stealth air-
craft and precision munitions during the 1980s. “Cash Cows” are assets
that enjoy large market share and generate substantial profits in mature,
stable markets. They might be compared to the military systems or capa-
bilities that dominate an existing form of warfare.
A business’s “Question Marks” are assets that are in areas of high
market growth but have a weak competitive position and are behind in
the race to exploit the emerging market. The comparison here to mili-
tary competitions is tenuous. A useful comparison might be to militaries
pursuing the second-move advantage: they are “behind in the race,” but
in the case of an emerging “market” in a new form of warfare, they can-
not abandon the race the way a corporation can, save in situations where
a better alternative exists. Finally, there are the “Dogs,” assets that enjoy
low market share in stable, mature markets. In terms of disruptive mili-
tary innovation, these might be classified as “wasting assets”—systems
and capabilities that offer little in the way of competitive advantage and
that need to be divested so that the resources sustaining them can be bet-
ter employed elsewhere. Fisher’s scrapping of more than 150 ships that
were deemed obsolete provides an example.
Echoes of History 425
that “the most general lesson to be learned . . . is that the change process
goes through a series of phases that, in total, usually require a considerable
length of time.”37
Similar to military organizations that succeed in effecting disruptive
change, those in the private sector that succeed look to exploit a new way
of doing business. For militaries, this means new operational concepts, or
ways of operating. As Porter puts it, “Some innovations create competi-
tive advantage by perceiving an entirely new market opportunity or by
serving a market segment that others have ignored. When competitors
are slow to respond, such innovation yields competitive advantage.”38
Disruptive military innovation leads to a new “market opportunity”
through new forms of warfare, such as the Royal Navy’s concept of flo-
tilla defense (and the German Navy’s strategic submarine blockade), the
German military’s mechanized air-land operations, the U.S. Navy’s fast
carrier strike task force, and the U.S. Air Force’s “reconnaissance-strike”
operations. Not surprisingly, innovation in the modern business world
typically involves using emerging technologies in novel ways. As Porter
describes it, companies “approach innovation in its broadest sense, in-
cluding both new technologies and new ways of doing things.”39
The experience with field exercises of the four militaries in this study
finds support from some of the nation’s top business-school academics
researching organizational innovation. Bower and Christensen found,
“Because disruptive technologies frequently signal the emergence of new
markets or market segments, managers must create information about
such markets—who the customers will be, which dimensions of product
performance will matter most to which customers, and what the right
price points will be. Managers can create this kind of information only
by experimenting rapidly, interactively, and inexpensively with both the
product and the market.”40 In military terminology, “product” appears in
the form of doctrine and capabilities and how they are applied. Address-
ing a “market” refers to either an operational challenge against which
these capabilities are directed or an opportunity to introduce a new and
far more effective way of operating—creating a new “market.”
Experiments conducted by the four military organizations presented
in this study helped refine their operational concepts, while also building
support within the officer corps for the new vision of warfare. Kotter
found a similar phenomenon in the corporate sector. Similar to the en-
thusiasm generated by the German Army’s field exercise on the North
German Plain in the fall of 1937, the U.S. Air Force’s Red Flag exercises
Echoes of History 427
So it is with our four militaries. In each instance, the new “tools” of war
underperformed established systems that dominated the existing warfare
regime. Fisher’s submarine flotilla defense boats lacked just about every-
thing that was valued in a modern battleship, including speed, firepower,
428 Part 2
and range. What they had was stealth. The German Army’s panzer for-
mations lacked the firepower of the artillery, the “king of battle” on the
Great War’s Western Front. What the panzers had, which seemed of
minor significance in static, positional warfare, was speed and range. The
air wing that flew off the decks of the Enterprise at Midway could not
dream of matching the firepower of a battleship or its ability to take a
hit. What it offered was greatly superior range and speed, which could
bring about a disruptive shift in war at sea if carrier aircraft could sink
battleships. In the First Gulf War, the U.S. Air Force’s F-117 stealth air-
craft lacked the speed and maneuverability associated with modern jet
strike aircraft. What the Nighthawk offered was stealth and the ability to
employ precision-guided munitions—two attributes that appeared mar-
ginal to many pilots trained to survive by outmaneuvering their oppo-
nents and achieving “pickle barrel” accuracy through a combination of
computer support and pilot skill.44
This dynamic highlights the importance of placing a military capabil-
ity within the context of a vision of the new competitive environment and
its new operational concept to assess its true value. It’s important for se-
nior leaders to have these “disruptive MOEs” in mind as they proceed. As
Bower and Christensen conclude, “Disruptive technologies tend to stall
early in strategic reviews because managers either ask the wrong questions
or ask the wrong people the right questions.”45 In other words, short-
sighted leaders frame the discussion of MOEs in terms of the current
competitive environment, rather than the environment that will exist. For
leaders who fall into this trap, carriers remain locked into their role of en-
hancing the battle line’s effectiveness, tanks are consigned to support in-
fantry operations, and stealth aircraft are assigned to strike packages.
The histories of our four militaries that led the way in bringing about a
military revolution yield valuable insights for contemporary military or-
ganizations anticipating discontinuous shifts in warfare. That being said,
the findings are not definitive. At best, they are highly suggestive. We are
well served by remembering Richard Feynman’s injunctions that, even in
the hard sciences such as physics, the “laws” stated in textbooks are really
approximations and always subject to revision. So it is, too, with the
study of war and organizational behavior. Still, as conditional as these
findings are, they are arguably more useful than simply “awaiting events”
or “muddling through.”
chapter eleven
Where Do We Stand?
“Would you tell me, please, which way I ought to go from here?”
said Alice to the Cheshire Cat. “That depends a good deal on
where you want to get to,” said the Cat.
Senior u.s. national security policy makers need to know how the
U.S. military stacks up against rival militaries in the balance of power.
The Pentagon’s Office of Net Assessment (ONA) is charged with provid-
ing this analysis. It typically does so in one of two ways. One kind of as-
sessment focuses on the balance in key regions where the United States
has vital interests, such as in the Western Pacific and in Europe. The sec-
ond kind examines so-called functional balances, such as the state of the
competition in space, in the undersea, and in strategic forces. There
are, however, some assessments that do not fit neatly into either bin. For
429
430 Part 2
Operational Challenges
When it comes to operational challenges, the U.S. military operates at a
disadvantage. Recent administrations have been silent on the operational
challenges for which the U.S. military should prepare, complicating its
efforts to develop operational concepts. The most recent National De-
fense Strategy does not even define the term.1 As used here, “operational
challenges” are compelling real-world problems posed by adversaries at the op-
erational (or campaign) level of war.
During the Cold War, for example, Central Europe was the location
of the key regional military competition between NATO and the Soviet-
led Warsaw Pact. Consequently, the U.S. military’s principal operational
challenge involved defending NATO’s Central European frontiers against a
numerically superior foe (Soviet Russia and its Warsaw Pact allies) in a high-
intensity conflict environment while avoiding employing nuclear weapons. This
clear statement of the problem enabled the U.S. military, over the course
of the forty-year standoff between the two superpowers, to develop a se-
ries of operational concepts that informed the crafting of military doc-
trine. These concepts were adapted and, at times, even abandoned, as
circumstances required.
Given the current geopolitical environment, a contemporary set of core
operational challenges for the U.S. military might include the following:
more effective ways of meeting the challenges posed by their rivals at the
campaign level of war.
At present, the U.S. military, lacking a clear statement of the princi-
pal operational challenges it confronts at the theater level of war, is ill
positioned to develop operational concepts capable of effecting a quan-
tum boost in its effectiveness. The causes of this omission are difficult to
discern. After all, the United States has identified its principal great-
power rivals. Senior policy makers on both sides of the political divide
know the key military theaters of operation. Yet the U.S. Joint Staff and
military services are proceeding with concept development at a pace and
level of abstraction that are both unnecessary and unhelpful.
A Lack of Practice?
Part of the problem may be that the U.S. political leadership and mili-
tary are out of practice. The decade following the Cold War found the
United States enjoying a dominant advantage over any existing or pro-
spective major-power rival. There were no pressing major conventional-
war operational challenges against which U.S. military planners could
focus their efforts. The emphasis was on planning for “major regional
contingencies,” “major theater wars,” and “major combat operations”—
synonyms for war against minor powers like Iran, Iraq, and North Korea.
Evidence of this is found in the emphasis at the time on planning based
on “capabilities” (as opposed to “threats”).2
Moreover, after the U.S. military’s phenomenal success in the First
Gulf War, it understandably, if not wisely, adopted an attitude of “if it
isn’t broke, why fix it?” General Colin Powell, chairman of the Joint
Chiefs of Staff during the war, remarked that it was tailor-made for what
the U.S. military had done to prepare for the kind of operational chal-
lenge posed by the Soviets in Europe. The war, he said, “was that Cold
War battle that didn’t come, without trees and mountains. We got a nice
desert, and we got a very, very incompetent enemy to work against.”3
The Second Gulf War found the U.S. military arguably winning an even
more lopsided victory, this time with an enhanced version of the war-
fighting concepts that had succeeded spectacularly twelve years earlier.
Following the 9/11 attacks, U.S. military planning priorities shifted
to addressing the challenges posed by radical Islamist terrorist organiza-
tions and insurgents, particularly in Afghanistan and Iraq. Here the
services found themselves playing a game of catch-up following nearly
434 Part 2
Archipelagic Defense
Once again, the Joint Staff found itself playing catch-up. The previous
year, the Pentagon’s Office of Net Assessment, responding to concerns
from the Office of the Secretary of Defense (Policy) over the lack of
progress being made by the military with its Air-Sea Battle concept, ap-
proached me about leading a “Summer Study”: a two-week effort bring-
ing together a small team of experts to focus on an issue of strategic
importance to the department’s leadership.10 The task: develop a prelimi-
nary operational concept for the WPTO that leveraged the military’s full
capabilities, including those of the Army and Marine Corps. Our work
yielded a basic concept of operations, which my colleague Jim Thomas
christened “Archipelagic Defense.”
The journal Foreign Affairs published my summary of Archipelagic
Defense in early 2015.11 Shortly thereafter, at the invitation of the Japa-
nese government, I traveled to Japan to give a series of briefings on the
concept to senior government and military leaders. The Japanese en-
couraged me to elaborate on Archipelagic Defense, and in 2017, my de-
tailed version of the concept, which drew on the Summer Study effort,
was published.12 Shortly thereafter, in March 2018, again at the Japanese
government’s request, I traveled to Tokyo and gave the keynote address
at the “Group of Five Strategic Dialogue.”13 I was one of only two
nonmilitary participants, the other being Japan’s deputy national security
436 Part 2
adviser, Nobukatsu Kanehara. The U.S. military was not invited to brief
on its JAM-GC concept.
The attention given to Archipelagic Defense led to a series of brief-
ings with senior U.S. defense officials and military leaders, who were en-
gaged in preparing the National Defense Strategy. Secretary of Defense
James Mattis retasked the military with “developing operational concepts
to sharpen our competitive advantages and enhance our lethality.”14
over a decade, ago, when the United States’ geopolitical situation was far
more favorable, and the threats it confronted far less advanced, than
those of today.
Which capabilities merit continued production? Which should be
canceled? Which should be retained as hedges? Absent a decision on
how the U.S. military plans to address real-world operational challenges
and to create a “virtuous cycle” for testing and refining new operational
concepts, answering these questions becomes far more difficult than it
need be.
Closing Thoughts
This study yields four significant findings with respect to the U.S. mili-
tary in particular and the current military competition generally. These
findings are suggestive, not definitive, which is another way of saying
that the range of significant variables influencing military affairs is so
great as to preclude the authoritative conclusions reached in the hard
sciences—although Richard Feynman would no doubt warn us that even
findings in the hard sciences can still be rather soft in spots.
First, the world is in a period of disruptive change in the character of
warfare, or what has come to be known as a military revolution. This is
primarily the result of geopolitical and military-technical change. The
return of China and Russia as active, revisionist great military powers
finds the military competition escalating to a level not seen since the
Cold War. Simultaneously, the advance of a range of new military-related
technologies that can be employed by themselves, or more likely in
Where Do We Stand? 443
Introduction
1. The U.S. Defense Department defines “general war” as “armed conflict be-
tween major powers in which the total resources of the belligerents are em-
ployed, and the national survival of a major belligerent is in jeopardy.” U.S.
Department of Defense, “Dictionary of Military and Associated Terms,”
Joint Publication 1-02, April 12, 2001 (amended through June 9, 2004), 219.
2. John Newhouse, War and Peace in the Nuclear Age (New York: Vintage,
1988), 184.
445
446 Notes to Pages 9–12
3rd ed. (New York: Crane, 1975), 227; Marshal N. V. Ogarkov, “The Defense
of Socialism: Experience of History and the Present Day,” Red Star, May 9,
1984, trans. U.S. Foreign Broadcast Information Service (FBIS).
3. U.S. Air Force, “U.S. Manned Aircraft Combat Losses, 1990–2002,” Air
Force Historical Research Agency, Maxwell Air Force Base, December 9,
2002, 1. A “sortie” is a single mission flown by a single aircraft.
4. The use of the phrase “character of warfare” is instructive. Through the ages
and across military revolutions, war’s nature has remained immutable.
5. Interview with Marshal of the Soviet Union N. V. Ogarkov, chief of the
General Staff, “The Defense of Socialism: Experience of History and the
Present Day,” Krasnaya Zvezda, May 9, 1984, 2–3, quoted in Barry D. Watts,
Six Decades of Guided Munitions and Battle Networks: Progress and Prospects
(Washington, D.C.: CSBA, 2007), 25.
6. Dominic A. Paolucci, Summary Report of the Long Range Research and Devel-
opment Planning Program (Falls Church, Va.: Lulejian and Associates, Febru-
ary 7, 1975), 45, quoted in Barry D. Watts, Nuclear-Conventional Firebreaks
and the Nuclear Taboo (Washington, D.C.: CSBA, 2013), 17.
7. Patrick J. Garrity, “Why the Gulf War Still Matters: Foreign Perspectives
on the War and the Future of International Security,” Center for National
Security Studies, July 1994, xvi, 59–60; Defense Intelligence Agency, “Soviet
Analysis of Operation Desert Shield and Operation Desert Storm,” trans.
LN 006-92, October 28, 1991, 32.
8. A. W. Marshall, Memorandum for Fred Ikle, “Future Security Environment
Workshop Group: Some Themes for Special Papers and Some Concerns,”
September 21, 1987; Krepinevich and Watts, Last Warrior, 193–226.
9. “Anti-access” refers to “those actions and capabilities, usually long range, de-
signed to prevent an opposing force from entering an operational area,”
while “area-denial” refers to “those actions and capabilities, usually of
shorter range, designed to limit an opposing force’s freedom of action
within an operational area.” U.S. Department of Defense, Joint Operational
Access Concept (JOAC), version 1.0 (Washington, D.C.: U.S. Department of
Defense, 2012), 1; Andrew F. Krepinevich, The Military-Technical Revolution:
A Preliminary Assessment (Washington, D.C.: CSBA, 2002), 30, 44; Roger
Cliff, Mark Burles, Michael S. Chase, Derek Eaton, and Kevin L. Pollpeter,
Entering the Dragon’s Lair (Santa Monica, Calif.: RAND, 2007), 1. The term
“system of systems” was originally used to describe the emergence of battle
networks that brought together weapon systems that were the product of
“systems integration,” which combines large numbers of different compo-
nents. Systems integration was generally limited to military powers with an
advanced industrial base. Thus, a “system of systems” described the linking
together of individual integrated systems into systems architectures.
10. Shortly after I departed Marshall’s staff in the summer of 1993, he dropped
the term “military-technical revolution” in favor of another Russian term,
“revolution in military affairs.” This stemmed from his concerns that U.S.
Notes to Pages 13–16 447
senior officials and military leaders would not give sufficient attention to the
need for organizational and doctrinal innovation—which the assessment
found to be critical to success—but would emphasize technology. Despite
the shift from “MTR” to “RMA,” Marshall’s fears were realized.
11. Krepinevich, Military-Technical Revolution, 32, 34. This is a reprint of the
original work produced by the Pentagon’s Office of Net Assessment in July
1992. Two more fully developed assessments with the same title were pro-
duced, which have not been published, one in July 1993 and the other in
November 1993.
12. Bernard Brodie and Fawn M. Brodie, From Crossbow to H-Bomb (Blooming-
ton: Indiana University Press, 1962), 213–15; Thomas Wildenberg, Destined
for Glory (Annapolis, Md.: Naval Institute Press, 1998), 169–70; Ronald H.
Spector, Eagle Against the Sun (New York: Free Press, 1985), 148, 174; An-
drew F. Krepinevich, The Army and Vietnam (Baltimore: Johns Hopkins Uni-
versity Press, 1986), 115–27.
13. See Geoffrey Parker, The Military Revolution: Military Innovation and the Rise
of the West, 1500–1800 (Cambridge: Cambridge University Press, 1988). See
also Krepinevich, Military-Technical Revolution, 32, 34; and Andrew F.
Krepinevich, “Cavalry to Computer: The Pattern of Military Revolutions,”
National Interest, Fall 1994, 30–42.
14. Encyclopaedia Britannica, s.v. “Revolution: Politics,” https://www.britannica.
com/topic/revolution-politics.
15. Robert Forster and Jack P. Greene, introduction to Preconditions of Revolution
in Early Modern Europe, ed. Forster and Greene (Baltimore: Johns Hopkins
University Press, 1970), 1. The contributors to this edited work could only
identify two instances in early modern Europe that fit the definition of “rev-
olution”: the Netherlands in the 1570s and England in the 1640s. Quoted in
Geoffrey Parker, “In Defense of The Military Revolution,” in The Military
Revolution Debate: Readings on the Military Transformation of Early Modern Eu-
rope, ed. Clifford J. Rogers (Boulder, Colo.: Westview, 1994), 339, 357.
16. For a discussion of the characteristics of the term “revolution” in scientific
and political revolutions, see Thomas S. Kuhn, The Structure of Scientific Rev-
olutions, 4th ed. (Chicago: University of Chicago Press, 2012), 92–94.
17. Richard P. Feynman, Six Easy Pieces (New York: Basic, 2011), 3.
18. Ibid., 2.
19. Ibid., 10.
20. Joseph L. Bower and Clayton M. Christensen, “Disruptive Technologies:
Catching the Wave,” Harvard Business Review, January–February 1995, 43.
21. Ibid., 48.
22. Clayton M. Christensen, The Innovator’s Dilemma (New York: HarperBusi-
ness Essentials, 2003).
23. Barry R. Posen, The Sources of Military Doctrine: France, Britain, and Germany
Between the World Wars (Ithaca, N.Y.: Cornell University Press, 1984); Ste-
phen Peter Rosen, Winning the Next War (Ithaca, N.Y.: Cornell University
448 Notes to Pages 16–25
Press, 1991); Williamson Murray, America and the Future of War (Stanford,
Calif.: Hoover Institute Press, 2017).
24. Michael Roberts, “The Military Revolution, 1560–1660,” in Rogers, Military
Revolution Debate, 13, 19.
25. Parker, Military Revolution, 9–10; Parker, “In Defense of The Military Revolu-
tion,” 345–46.
26. Parker, Military Revolution, 4.
27. Jeremy Black, European Warfare: 1660–1815 (New Haven: Yale University
Press, 1995); Black, “A Military Revolution? A 1660–1792 Perspective,” in
Rogers, Military Revolution Debate, 95–116. Other scholars have still differ-
ent interpretations of what occurred during the period between 1500 and
1815. See, for example, Rogers, Military Revolution Debate. Of note, these
scholars’ “revolutions” spanned from 100 years (in Rogers’s case) to three
centuries (as posited by Parker).
28. Parker, Military Revolution, 146.
29. Krepinevich, Military-Technical Revolution, 45–49.
30. Andrew. F. Krepinevich, Jr., “The Pentagon’s Wasting Assets,” Foreign Af-
fairs, July–August 2009, 18–33.
11. Shelby Foote, The Civil War: Red River to Appomattox (New York: Vintage,
1974), 872.
12. Herman Hattaway and Archer Jones, How the North Won (Urbana: Univer-
sity of Illinois Press, 1991), 584, 597, 674.
13. Howard, War in European History, 102–3.
14. Brodie and Brodie, Crossbow to H-Bomb, 152; Ernest R. May, Strange Victory:
Hitler’s Conquest of France (New York: Hill and Wang, 2000), 118–20, 395–
96, 435–36.
15. May, Strange Victory, 120; Walter, “Military Revolution?,” 20; Brodie and
Brodie, Crossbow to H-Bomb, 139.
16. Howard, War in European History, 106.
17. Ibid., 103–4.
18. Paul Kennedy, “Britain in the First World War,” in Military Effectiveness, vol.
1, The First World War, ed. Alan R. Millett and Williamson Murray (Boston:
Unwin Hyman, 1988), 49, 51, 54, 56; Timothy K. Nenninger, “American
Military Effectiveness in the First World War,” ibid., 140.
19. Brodie and Brodie, Crossbow to H-Bomb, 109.
20. Ibid., 137. At Fredericksburg, Union casualties were greater than 13,000,
while the Confederates suffered fewer than 5,000. Pickett’s Charge resulted
in more than 5,000 Confederate casualties, against roughly 1,500 for the
Union. Earl J. Hess, Pickett’s Charge: The Last Attack at Gettysburg (Chapel
Hill: University of North Carolina Press, 2001), 333–35; McPherson, Battle
Cry of Freedom, 572.
21. Consider a simple thought experiment involving two armies of 10,000 men
each. Army A is armed with repeating muskets, giving it a high rate of fire,
while Army B is equipped with rifled muskets, translating to an advantage in
range and accuracy. The Spencer repeating rifle could be fired seven times
in thirty seconds before reloading, while the Dreyse needle gun could be
fired five to seven times per minute. An experienced soldier could fire a
musket about three rounds a minute. A reasonable assumption finds Army A
enjoying a five-to-one rate-of-fire (volume fires) advantage over Army B’s ri-
fled muskets. But Army A’s smoothbore rapid-fire muskets are effective at
only 100 yards, while Army B’s rifled muskets can engage effectively at 500
yards. Thus Army A needs to close to within 100 yards of Army B before it
reaches its effective engagement range, while Army B can begin engaging
Army A at 500 yards. An average soldier took roughly twenty-five seconds to
reload a muzzle loader, and troops advancing at quick-time could cover
roughly 80 yards during that time interval. Thus, in the time it would take
Army A’s troops to cover 400 yards, Army B’s troops could get off five or six
shots (at 500, 420, 340, 260, 180, and perhaps 100 yards) before Army A
could engage effectively. Given the rate-of-fire disparity, for Army B to have
an advantage in effective fires at the point where Army A reaches its effec-
tive fire range of 100 yards, it would have to outnumber Army A by more
than five to one. This means Army A would have had to suffer 80 percent
450 Notes to Pages 29–30
casualties, reducing its effective strength to 2,000. What would Army B need
to do to accomplish this? Again, assuming Army B’s 10,000 troops get off
between five and six rounds (let’s split the difference and say five and a half)
before Army A closes to its effective engagement range, they would have
fired 55,000 rounds, needing 8,000 hits, a success rate of less than 15 per-
cent, or roughly one out of every six rifled bullets fired. Could Army B’s ri-
flemen have accomplished this? It depends on myriad factors, such as
terrain, visibility, training, and leadership. An Army B composed of well-
trained marksmen, ably led and confronting an enemy advancing on open
ground in broad daylight, would stand a much better chance than an Army
B populated by ill-trained and poorly led recruits, positioned in a forest, and
confronting Army A’s advance on a foggy morn. Of course, we’d have to look
at Army A’s training and leadership as well. There’s also the issue of Army B’s
mobility. On the defensive, it’s possible it could extend its range advantage
by forming into three ranks and volley firing, with one rank firing, another
moving back, and a third reloading. This might enable it to fire another vol-
ley or two before Army A could close to its effective range. (Alternatively, if
Army A assumed the defense, Army B could move within its engagement
range while staying beyond Army A’s effective range and firing away.) What
about artillery? The three-inch Parrott gun was the most widely used rifled
gun during the Civil War. In addition to being rifled, it enjoyed a 250-yard
range advantage over the twelve-pound Napoleon, the war’s most popular
smoothbore cannon. Still, artillery accuracy at very long range remained
poor, and guns could not easily advance close to enemy lines, lest gunners
come within range of enemy sharpshooters. As was often the case in the
Great War, preliminary and assault bombardment in the Civil War could
not carry the day for the offense, although artillery could greatly aid the de-
fense. As Bernard and Fawn Brodie conclude, ultimately “the rifle and
trench ruled Civil War battlefields as thoroughly as the machine-gun and
trench rule those of World War I.” Brodie and Brodie, Crossbow to H-Bomb,
105; McNeill, Pursuit of Power, 245; McPherson, Battle Cry of Freedom, 474–
77; James C. Hazlett, Edwin Olmstead, and M. Hume Parks, Field Artillery
Weapons of the American Civil War (Urbana: University of Illinois Press,
1983); Phillip M. Cole, Civil War Artillery at Gettysburg (Cambridge, Mass.:
Da Capo, 2002), 298.
22. Howard, War in European History, 123.
23. Brodie and Brodie, Crossbow to H-Bomb, 162.
24. Arthur Herman, To Rule the Waves (New York: HarperCollins, 2004), 459.
25. Jon Tetsuro Sumida, In Defence of Naval Supremacy: Finance, Technology and
British Naval Policy, 1889–1914 (Boston: Unwin Hyman, 1989), 41.
26. Ibid., 50.
27. Fisher, in fact, preferred battle cruisers to battleships, as they traded armor
for speed and long-range fires to an even greater degree than dreadnoughts.
The Lion-class battlecruisers commissioned in 1912 boosted armament from
Notes to Pages 30–35 451
12-inch guns to 13.5-inch guns, nearly doubling the shell weight that could
be fired in a single broadside, while steaming at twenty-seven knots. Its
armor belt, however, was but nine inches.
28. Karl Lautenschläger, “The Dreadnought Revolution Reconsidered,” in
Naval History: The Sixth Symposium of the U.S. Naval War College, ed. Daniel
M. Masterson (Wilmington, Del.: Scholarly Resources, 1987), 129; Geoffrey
Penn, Infighting Admirals (Yorkshire, U.K.: Leo Cooper, 2000), 138; Robert
K. Massie, Dreadnought (New York: Random House, 1991), 469.
29. Admiral Sir Reginald Bacon, The Life of Lord Fisher of Kilverstone, 2 vols.
(London: Hodder and Stoughton, 1929), 1:255.
30. Edwin Gray, The Devil’s Device (Annapolis, Md.: Naval Institute Press,
1975), 178, 182, 259, 264; Bernard Brodie, Sea Power in the Machine Age
(New York: Greenwood, 1969), 298.
31. Brodie, Sea Power, 277; Edwyn Gray, The Devil’s Device (Annapolis, Md.:
Naval Institute Press, 1991), 178–79, 182, 259–60.
32. Nicholas A. Lambert, Sir John Fisher’s Naval Revolution (Columbia: Univer-
sity of South Carolina Press, 1999), 79.
33. Roger Parkinson, Dreadnought: The Ship That Changed the World (London: I.
B. Tauris, 2015), 84–85.
34. Sumida, Naval Supremacy, 153; Brodie and Brodie, Crossbow to H-Bomb, 188.
35. Nicholas Lambert, “Dreadnought—The Revolution That Never Was,” un-
published paper, 2002, 1–2.
36. Brodie, Sea Power, 96.
37. Martin Gilbert, The First World War (New York: Henry Holt, 1994), 102,
127, 431; Anthony Wells, “Naval Intelligence and Decision Making in an
Era of Technical Change,” in Technical Change and British Naval Policy, 1860–
1939, ed. Bryan Ranft (London: Hodder and Stoughton, 1977), 125.
38. General Heinz Guderian, Panzer Leader, trans. Constantine Fitzgibbon
(Costa Mesa, Calif.: Noontide, 1990), 39, 41.
39. Robert M. Citino, Quest for Decisive Victory (Lawrence: University Press of
Kansas, 2002), 244.
40. Ronald Spector, “The Military Effectiveness of U.S. Forces: 1919–1939,” in
Military Effectiveness, vol. 2, The Interwar Period, ed. Allan R. Millett and
Williamson Murray (Boston: Unwin Hyman, 1988), 84.
41. Roy A. Grosnick, Dictionary of American Naval Squadrons, vol. 1 (Washing-
ton, D.C.: Naval Historical Center, Department of the Navy, 1995), 453–
508.
42. John T. Correll, “Daylight Precision Bombing,” Air Force Magazine, October
2008, 62.
43. Difficulty in obtaining data on the kamikazes has produced some signifi-
cantly differing estimates regarding their operation and performance. For
example, a postwar assessment concluded that roughly one-third of all kami-
kaze fighters who left their bases succeeded in hitting a ship—a success rate
seven to ten times that of a conventional sortie but also more than twice the
452 Notes to Pages 35–40
61. Chris Rohlfs and Ryan Sullivan, “The MRAP Boondoggle,” Foreign Affairs,
July 26, 2012, https://www.foreignaffairs.com/print/node/1070487; Christo-
pher Lamb and Sally Scudder, “Why the MRAP Is Worth the Money,”
Foreign Affairs, August 23, 2012, https://www.foreignaffairs.com/articles/
afghanistan/2012-08-23/why-mrap-worth-money; “Mine Resistant Ambush
Protected Program,” GlobalSecurity.org, last modified August 8, 2016,
https://www.globalsecurity.org/military/systems/ground/mrap.htm; Natalya
Anfilofyeva, “Majority of U.S. MRAPs to Be Scrapped or Stored,” CSBA,
January 5, 2014, https://csbaonline.org/about/news/majority-of-us-mraps-
to-be-scrapped-or-stored.
62. Sydney J. Freedberg, Jr., “Milley’s Future Tank: Railguns, Robotics & Ultra-
Light Armor,” Breaking Defense, July 27, 2017, https://breakingdefense
.com/2017/07/railguns-robotics-ultra-light-armor-general-milleys-future-
tank.
63. Megan Eckstein, “New Marine Corps Cuts Will Slash All Tanks, Many
Heavy Weapons as Focus Shifts to Lighter, Littoral Forces,” U.S. Naval
Institute, March 23, 2020, https://news.usni.org/2020/03/23/new-marine-
corps-cuts-will-slash-all-tanks-many-heavy-weapons-as-focus-shifts-to-
lighter-littoral-forces.
Air Force Employment Concepts in the 21st Century (Santa Monica, Calif.:
RAND, 2011), 61–64.
12. U.S.-China Economic and Security Review Commission, 2020 Report to
Congress of the U.S.-China Economic and Security Review Commission (Wash-
ington, D.C.: U.S. Government Printing Office, December 2020), 393–94.
PLA strategists view the cyber domain as particularly critical to power pro-
jection, and China’s dominance of global telecommunications infrastructure
could bolster that capability. Defense Intelligence Agency, China Military
Power: Modernizing a Force to Fight and Win (Defense Intelligence Agency,
2019), 43, www.dia. mil/Military-Power-Publications; Cliff et al., Shaking the
Heavens, 60–61; Todd Harrison, Kaitlyn Johnson, and Thomas G. Roberts,
“Space Threat 2018: China Assessment,” Aerospace Security Project, Center
for Strategic and International Studies, April 12, 2018, https://aerospace
.csis.org/space-threat-2018-china; Burke et al., PLA Operational Concepts, 8.
13. Kevin L. Pollpeter, Michael S. Chase, and Eric Heginbotham, Strategic Sup-
port Force and Its Implications for Chinese Military Space Operations (Santa
Monica, Calif.: RAND, 2017), 2, 32, 35, https://www.rand.org/pubs/
research_reports/RR2058.html; Burke et al., PLA Operational Concepts, 13.
See also Robert O. Work and Greg Grant, Beating Americans at Their Own
Game (Washington, D.C.: Center for a New American Security, 2019), 8.
14. Burke et al., PLA Operational Concepts, 7, 10; Cliff et al., Shaking the Heavens,
61–62; Scott W. Harold, Defeat, Not Merely Compete (Santa Monica, Calif.:
RAND, 2018), 35; Michael S. Chase, testimony for the U.S.-China Eco-
nomic and Security Review Commission, Hearing on China’s Military Reforms
and Modernization: Implications for the United States, February 15, 2018, 6.
15. Cliff et al., Shaking the Heavens, 56–60.
16. U.S. Office of the Secretary of Defense, Military and Security Developments
Involving the People’s Republic of China 2020 (Washington, D.C.: U.S. Depart-
ment of Defense, 2020), 161; Burke et al., PLA Operational Concepts, 21–22.
17. U.S. Office of the Secretary of Defense, Military and Security Developments,
161.
18. “Finlandization” refers to a situation in which a powerful state indirectly
controls the foreign policy of a smaller neighboring country or group of
countries, while allowing them to maintain their nominal independence.
The term was coined in reference to the Soviet Union’s control over Fin-
land’s foreign policies during the Cold War.
19. Andrew F. Krepinevich, Jr., Archipelagic Defense: The Japan-U.S. Alliance and
Preserving Peace and Stability in the Western Pacific (Tokyo: Sasakawa Peace
Foundation, 2017), 62–99.
20. Andrew F. Krepinevich, Jr., and Eric Lindsey, The Road Ahead: Future Chal-
lenges and Their Implications for Ground Vehicle Modernization (Washington,
D.C.: CSBA, 2012), 17, 33.
21. The nuclear competition, as it has since the advent of this form of warfare in
1945, seems certain to continue favoring the offense for the foreseeable future.
Notes to Pages 54–56 455
22. David Axe, “The U.S. Navy Wants a New Guided-Missile Submarine,” Na-
tional Interest, November 27, 2017, https://nationalinterest.org/blog/the-
buzz/the-us-navy-wants-new-guided-missile-submarine-23372.
23. An aircraft’s range is a function of several factors, including its payload
and flight profile. Its range can also be extended through in-flight refueling
from tanker aircraft. The Vietnam-era A-6’s combat mission radius was
roughly 890 miles carrying a 2,080-pound payload with two external fuel
tanks. The F-18 Super Hornet aircraft on today’s carriers has a range of
roughly 500 miles, while the F-18 Advanced Super Hornet’s range, with
its external conformal fuel tanks, is estimated at approximately 800 miles.
“A-6 Intruder,” GlobalSecurity.org, last modified July 7, 2011, https://www
.globalsecurity.org/military/systems/aircraft/a-6.htm. Kyle Mizokami, “The
F/A-18 Super Hornet Is About to Fly Farther than Ever Before,” Popular
Mechanics, February 16, 2018, https://www.popularmechanics.com/military/
aviation/a18211702/fa-18-super-hornet-longer-legs-fuel-tanks-range. The
Navy’s new F-35C aircraft is listed as having a combat range of 615 miles.
Sydney J. Friedberg, “F-35C & Ford Carriers—A Wrong Turn for Navy:
CNAS,” Breaking Defense, October 19, 2015, https://breakingdefense
.com/2015/10/f-35c-a-wrong-turn-for-navy-cnas.
24. Krepinevich, Military-Technical Revolution, 14.
25. Ibid., 23.
26. Ibid., 14.
27. Ibid., 23.
28. Gregory Falco, “Our Satellites Are Prime Targets for a Cyberattack.
And Things Could Get Worse,” Washington Post, May 7, 2019, https://www
.washingtonpost.com/opinions/our-satellites-are-prime-targets-for-a-
cyberattack-and-things-could-get-worse/2019/05/07/31c85438-7041-11e9-
8be0-ca575670e91c_story.html?utm_term=.be33f7bec97f. See also Alyssa
Newcomb, “Hacked in Space: Are Satellites the Next Cybersecurity Battle-
ground?,” NBC News, October 3, 2016, https://www.nbcnews.com/storyline/
hacking-in-america/hacked-space-are-satellites-next-cybersecurity-
battleground-n658231.
29. Tony Girard, “The Attack-Counterattack Game,” Aerospace and Defense
Technology, April 1, 2014, https://www.aerodefensetech.com/component/
content/article/adt/features/articles/19412.
30. For a detailed discussion of this topic, see Stephen Budiansky, Blackett’s War
(New York: Vintage, 2013).
31. Even fixed assets, such as forward air bases, may benefit from significantly
diminishing the enemy’s scouting forces. See, for example, the discussion in
Krepinevich, Archipelagic Defense, 80–84.
32. The U.S. Navy’s Haystack and UPTIDE exercises in the 1950s and ’60s
were predicated on the belief that such “gaps” could be created and ex-
ploited. Robert G. Angevine, “Hiding in Plain Sight: The U.S. Navy and
Dispersed Operations Under EMCON, 1956–1972,” Naval War College
456 Notes to Pages 56–64
Review, Spring 2011. See also Operations Evaluation Group, “OEG Report
77: The Sixth Fleet Concept and Analysis of Haystack Operations,” January
24, 1958.
33. The Doolittle Raid, conducted on April 18, 1942, was the culmination of a
series of raids by U.S. carrier forces. The U.S. carrier Hornet steamed within
Japan’s inner maritime defenses to a position roughly 650 miles away from
the homeland and launched sixteen Army Air Corps bombers for an attack
on Tokyo. Intensive U.S. scouting preceded the U.S. strike to ensure that
Japanese scouting forces had not uncovered the operation. Submarines were
sent deep into Japanese waters, while the carrier Enterprise sent scout air-
craft out to determine if the U.S. task force had been spotted. Enterprise and
Hornet detected several “enemy surface craft” as they approached the attack
launch point. Upon sighting one within visual range, the attack was immedi-
ately launched—roughly 250 miles away from the planned launch point.
George W. Baer, The U.S. Navy: One Hundred Years of Sea Power (Stanford,
Calif.: Stanford University Press, 1993), 216–17; Lisle A. Rose, Power at Sea:
The Breaking Storm, 1919–1945 (Columbia: University of Missouri Press,
2007), 200, 250–51; Norman Polmar, Aircraft Carriers (Dulles, Va.: Potomac,
2006), 205–6, 209; James G. Roche and Barry D. Watts, “Choosing Analytic
Measures,” Journal of Strategic Studies 14, no. 2 (1991): 184–89.
34. The bombers’ range far exceeded that of their naval counterparts. Interest-
ingly, the Japanese “picket line” of scout ships did succeed in warning of the
approaching attack; however, the Japanese air defense command assumed
that the strike would be conducted by naval aircraft and, based on the re-
ported sightings and shorter range of naval carrier–based strike aircraft, be-
lieved the attack would occur one or two days later than it did. Polmar,
Aircraft Carriers, 206. Only a few months earlier, at Pearl Harbor, the U.S.
side suffered from a similar problem with respect to interpreting scouting
information. Roberta Wohlstetter, Pearl Harbor: Warning and Decision (Stan-
ford, Calif.: Stanford University Press, 1962).
35. Krepinevich, Military-Technical Revolution, 26.
36. “U.S. Combat Pilots on Speed,” ABC News, December 20, 2002, https://
abcnews.go.com/2020/story?id=123778&page=1.
37. There are arguably eight domains in which warfare occurs. The land, sea
surface, undersea, electromagnetic, and air domains featured prominently in
World War II. Since then, three additional domains—space, the seabed, and
cyberspace—have become major military competition venues. The expan-
sion from five domains to eight since 1945 represents a 60 percent increase.
38. Andrew Roberts, The Storm of War (New York: HarperCollins, 2011), 463.
39. The enemy might choose to employ relatively novel forms of scouting, such
as spies providing information via the internet or cell phones. This assumes
that friendly forces have not taken effective countermeasures and that it is
still possible to communicate via cellular transmissions and the internet in
the midst of an intense electronic combat to gain information superiority.
Notes to Pages 65–68 457
40. For a more detailed discussion of the “shell-game” concept in a conflict be-
tween the United States and its allies in the Western Pacific and China, see
Krepinevich, Archipelagic Defense, 82–83.
41. One of the first acts of war by Great Britain against Germany in 1914 was to
cut its overseas telecommunications cables. On August 5, 1914, the Royal
Post Office Cable Ship Alert cut the five German Atlantic submarine tele-
graph cables. Jonathan Reed Winkler, Nexus: Strategic Communications and
American Security in World War I (Cambridge, Mass.: Harvard University
Press, 2008), 5–6, 10.
42. Joshua T. White, “China’s Indian Ocean Ambitions: Investment, Influence,
and Military Advantage,” Brookings Institution, June 2020, 1, 4–7, 10–11.
43. This is one reason that Germany proved much less vulnerable to blockade
in World War II than it did in World War I, when the Allied blockade con-
tributed significantly to its defeat. During the first twenty-two months of
World War II, the Germans could rely on the Soviet Union for raw materi-
als, which greatly reduced the effectiveness of the British blockade. In
World War I, Russia was an active ally of Britain from the beginning.
44. For a detailed treatment of the potential complexities associated with exe-
cuting a blockade against a neutral major power, see Nicholas A. Lambert,
Planning Armageddon (Cambridge, Mass.: Harvard University Press, 2012).
Generally speaking, a land blockade can be pursued along the same general
lines as a maritime blockade, imposing similar costs on the enemy. Friendly
forces would probably impose a distant land blockade in their own rear area
or where they enjoy a local advantage, enabling them to employ less expen-
sive, shorter-range scouting and strike systems. To contest this distant block-
ade, the enemy would probably be compelled to deploy a relatively high
percentage of its scarce long-range scouting and strike forces.
45. For a discussion of this issue, see Andrew F. Krepinevich, Jr., Protracted
Great Power War (Washington, D.C.: Center for a New American Security,
2020).
46. Estimates place Chinese losses at roughly 19,000 combat casualties, and
29,000 noncombat casualties, with the latter being attributed primarily to
weather and lack of food. The historian Yan Xue of the People’s Liberation
Army National Defense University states that the Chinese Ninth Army was
out of action for three months following the engagement. Patrick C. Roe,
The Dragon Strikes: China and the Korean War, June–December 1950 (Novato,
Calif.: Presidio, 2000), 394; Yan Xue, First Confrontation: Reviews and Reflec-
tions on the History of War to Resist America and Aid Korea (Beijing: Chinese
Radio and Television Publishing House, 1990), 59. See also Roy Appleman,
Escaping the Trap: The US Army X Corps in Northeast Korea, 1950 (College
Station: Texas A&M University Press, 1990). In taking Berlin, Soviet casual-
ties were estimated at roughly 80,000 killed or missing and 280,000 sick or
wounded. Grigori F. Krivosheev, ed., Soviet Casualties and Combat Losses in
the Twentieth Century (London: Greenhill, 1997), 157.
458 Notes to Pages 68–73
47. Krepinevich, Army and Vietnam, 238, 248. The U.S. forces suffered roughly
1,500 killed in action. The U.S. command asserted that the Communists
had lost some 32,000 to 37,000 killed and 6,000 captured.
48. Lieutenant General N. Korenevskiy, “The Role of Space Weapons in a Fu-
ture War,” U.S. Central Intelligence Agency, December 1961, 6, https://www
.cia.gov/library/readingroom/docs/CIA-RDP33-02415A000500190011-3.pdf
(originally published by the Russian military journal Voyennaya Msyl (Military
Thought).
49. Ibid., 8.
50. Ibid., 9.
51. Ibid., 12. The general anticipated that the Americans might engage in a race
to the moon to create military bases there that would “preclude the possibil-
ity to destroying the U.S. military might in case of surprise attack.” Earlier
that year, President Kennedy had established the goal of sending a man to
the moon and returning him safely before the end of the decade.
52. Ibid., 21.
53. Paul Tullus, “The World Economy Runs on GPS. It Needs a Backup Plan,”
Bloomberg Business Week, July 25, 2018, https://www.bloomberg.com/news/
features/2018-07-25/the-world-economy-runs-on-gps-it-needs-a-backup-
plan.
54. William J. Broad, “How Space Became the Next ‘Great Power’ Contest Be-
tween the U.S. and China,” New York Times, January 24, 2021, https://www.
nytimes.com/2021/01/24/us/politics/trump-biden-pentagon-space-missiles-
satellite.html; “Nanosats Are Go!,” Economist, June 5, 2014, https://www.
economist.com/technology-quarterly/2014/06/07/nanosats-are-go.
55. Nanosats Database, accessed February 19, 2022, https://www.nanosats.eu;
Michael Sheetz, “SpaceX Is Manufacturing 120 Starlink Internet Satellites per
Month,” SpaceNews, August 10, 2020, https://spacenews.com/u-s-military-
space-architecture-to-bring-in-commercial-systems-small-satellites; Jonathan
O’Callaghan, “SpaceX Launches Rocket with 143 Satellites—The Most
Ever Flown on a Single Mission,” Forbes, Jan 24, 2021, https://www.forbes.
com/sites/jonathanocallaghan/2021/01/24/spacex-launches-rocket-with-
143-satellites--the-most-ever-flown-on-a-single-mission/?sh=387291be27fd;
Amy Thompson, “SpaceX Launches 60 Starlink Satellites on Record-Setting
Used Rocket, Nails Landing,” Space.com, February 4, 2021, https://www.space.
com/spacex-starlink-18-satellites-launch-rocket-landing. Iridium, which had
held the record for the largest commercial satellite constellation, was manu-
facturing roughly six satellites per month at peak production. Even accounting
for the fact that each Starlink is smaller than an Iridium satellite, SpaceX’s
build rate is twenty times as fast. A Starlink satellite weighs roughly 575
pounds.
56. Microsatellites are those weighing about 100 kilograms, or around 225
pounds, while nanosatellites weigh only a few kilograms, or less than 10
pounds. “Nanosats Are Go!”; Mike Wall, “Rocket Lab Launches 13 CubeSats
Notes to Pages 74–76 459
77. Valerie Insinna, “The US Air Force’s X-37B Spaceplane Lands After Spend-
ing Two Years in Space,” Defense News, October 28, 2019, https://www
.defensenews.com/space/2019/10/28/the-air-forces-x-37b-spaceplane-
finally-landed-after-spending-two-years-in-space; U.S. Air Force, “X-37B
Orbital Test Vehicle,” fact sheet, August 7, 2020, https://www.af.mil/About-
Us/Fact-Sheets/Display/Article/104539/x-37b-orbital-test-vehicle.
78. Mike Wall, “X-37B Military Space Plane’s Latest Mystery Mission Hits 700
Days,” Space.com, August 8, 2019, https://www.space.com/x-37b-military-
space-plane-otv5-700-days.html; Kyle Mizokami, “Here’s How the X-37B
Spaceplane ‘Disappears,’ ” Popular Mechanics, July 24, 2019, https://www.
popularmechanics.com/military/a28496447/x-37b-disappear.
79. Mizokami, “X-37B Spaceplane.”
80. Pratik Jakhar, “China Claims ‘Important Breakthrough’ in Space Mission
Shrouded in Mystery,” BBC.com, September 9, 2020, https://www.bbc.com/
news/science-environment-54076895; Andrew Jones, “China Carries Out
Secretive Launch of ‘Reusable Experimental Spacecraft,’ ” SpaceNews, Sep-
tember 4, 2020, https://spacenews.com/china-carries-out-secretive-launch-
of-reusable-experimental-spacecraft; Andrew Jones, “China Launches
Secretive Suborbital Vehicle for Reusable Space Transportation System,”
SpaceNews, July 16, 2021, https://spacenews.com/china-launches-secretive-
suborbital-vehicle-for-reusable-space-transportation-system.
81. Sandra Erwin, “Report: Nuclear Propulsion Would Help Military Satellites
Maneuver Out of Harm’s Way,” SpaceNews, January 14, 2022, https://
spacenews.com/report-nuclear-propulsion-would-help-military-satellites-
maneuver-out-of-harms-way.
82. Broad, “Next ‘Great Power’ Contest.”
83. Davenport, “Battlefield 22,000 Miles Above Earth.” The general was guilty
of an overstatement. Precision-guided munitions, such as laser-guided
bombs, were used effectively decades before GPS and do not require the
precision navigation and timing provided by that constellation, as do weap-
ons such as the U.S. Joint Direct Attack Munition (JDAM).
84. “Air Breaking,” Economist, March 9, 2019, 71.
85. Ibid., 72.
86. Krepinevich, Military-Technical Revolution, 23.
University of Cambridge, the Center for a New American Security, and the
Electronic Frontier Foundation, February 2018, 9.
4. Eric Schmidt, “Remarks at the Techonomy Conference in Lake Tahoe,”
TechCrunch, August 4, 2010, http://techcrunch.com/2010/08/04/schmidt-
data.
5. National Security Telecommunications Advisory Committee (NSTAC),
“NSTAC Report to the President on Big Data Analytics,” May 11, 2016,
ES-1.
6. NSTAC, “NSTAC Report to the President on the Internet of Things,”
November 19, 2014, 1, https://www.cisa.gov/sites/default/files/publications/
NSTAC%20Report%20to%20the%20President%20on%20the%20Internet
%20of%20Things%20Nov%202014%20%28updat%20%20%20.pdf.
7. Gartner Inc., “Gartner Says 6.4 Billion Connected ‘Things’ Will Be in Use in
2016, Up 30 Percent from 2015,” November 10, 2015, http://www.gartner
.com/newsroom/id/3165317; Juniper Research, “ ‘Internet of Things’ Con-
nected Devices to Almost Triple to Over 38 Billion Units by 2020,” July 28,
2015, http://www.juniperresearch.com/press/press-releases/iot-connected-
devices-to-triple-to-38-bn-by-2020; Sagar Bhat, Omkar Bhat, and Pradyumma
Gokhale, “Applications of IoT and IoT: Vision 2020,” International Advanced
Research Journal in Science, Engineering and Technology, January 2018, 36.
8. James Somers, “How the Artificial-Intelligence Program AlphaZero Mas-
tered Its Games,” New Yorker, December 28, 2018, https://www.newyorker
.com/science/elements/how-the-artificial-intelligence-program-alphazero-
mastered-its-games; Larry Greenemeier, “AI Versus AI: Self-Taught Al-
phaGo Zero Vanquishes Its Predecessor,” Scientific American, October 18,
2017, https://www.scientificamerican.com/article/ai-versus-ai-self-taught-
alphago-zero-vanquishes-its-predecessor.
9. Cade Metz, “Hold ’Em or Fold ’Em? This A.I. Bluffs with the Best,” New
York Times, July 11, 2019, https://www.nytimes.com/2019/07/11/science/
poker-robot-ai-artificial-intelligence.html.
10. Zachary Kallenborn, “The Race Is On: Assessing the U.S.-China Artificial
Intelligence Competition,” Modern War Institute, April 16, 2019, https://
mwi.usma.edu/race-assessing-us-china-artificial-intelligence-competition.
11. Peter Sondergaard, “Remarks at the Gartner Symposium/ITxpo,” Gartner,
October 2011, http://www.gartner.com/newsroom/id/1824919. See also
NSTAC, “Big Data Analytics,” 10.
12. Defense Science Board, “Summer Study on Autonomy,” Office of the Under
Secretary of Defense for Acquisition, Technology and Logistics, June 2016,
4–5. Definitions for intelligent system, autonomy, automation, robots, and agents
can be found in L. G. Shattuck, “Transitioning to Autonomy: A Human Sys-
tems Integration Perspective,” presentation at Transitioning to Autonomy:
Changes in the Role of Humans in Air Transportation, March 11, 2015, https://
human-factors.arc.nasa.gov/workshop/autonomy/download/presentations/
Shaddock%20.pdf.
Notes to Pages 90–93 463
13. Jack Corrigan, “Three-Star General Wants AI in Every New Weapon Sys-
tem,” Nextgov, November 2, 2017, https://www.nextgov.com/cio-briefing/
2017/11/three-star-general-wants-artificial-intelligence-every-new-weapon-
system/142225; Richard H. Schultz and General Richard D. Clarke, “Big
Data at War: Special Operations Forces, Project Maven, and Twenty-First
Century Warfare,” Modern Warfare Institute, August 25, 2020, https://mwi
.usma.edu/big-data-at-war-special-operations-forces-project-maven-and-
twenty-first-century-warfare.
14. Defense Science Board, “Autonomy,” 42; Dave Gershgorn, “The Era of Easily
Faked, AI-Generated Photos Is Quickly Emerging,” Quartz, October 30,
2017; https://qz.com/1115353/new-research-from-nvidia-shows-that-the-era-
of-easily-faked-ai-generated-photos-is-quickly-emerging.
15. National Reconnaissance Office, “Sentient Program,” https://www.nro.gov/
Portals/65/documents/foia/declass/ForAll/051719/F-2018-00108_
C05113688.pdf; Edward Giest and Andrew J. Lohn, How Might Artificial Intel-
ligence Affect the Risk of Nuclear War? (Santa Monica, Calif.: RAND, 2018), 10.
16. Sarah Scoles, “Meet the U.S.’s Spy System of the Future—It’s Sentient,” For-
tuna’s Corner, July 31, 2019, https://fortunascorner.com/2019/08/01/meet-
the-u-s-s-spy-system-of-the-future-its-sentient.
17. Ibid.
18. Defense Science Board, “Autonomy,” 53.
19. Ibid.; Giest and Lohn, Nuclear War?, 10; Allen and Chan, “Artificial Intelli-
gence,” 24.
20. “The Fog of War May Confound Weapons That Think for Themselves,”
Economist, May 29, 2021, https://www.economist.com/science-and-technol
ogy/2021/05/26/the-fog-of-war-may-confound-weapons-that-think-for-
themselves.
21. “Russia Says 13 Drones Used in Attack on Its Air Base, Naval Facility in
Syria,” Radio Free Europe/RadioLiberty, January 8, 2018, https://www.rferl.
org/a/syria-russia-says-drones-used-attack-bases/28963399.html.
22. Spencer Jakab, “Saudi Oil Attack: This Is the Big One,” Wall Street Journal,
September 14, 2019, https://www.wsj.com/articles/saudi-oil-attack-this-is-
the-big-one-11568480576; Dion Nissenbaum, Summer Said, and Jared
Malsin, “U.S. Tells Saudi Arabia Oil Attacks Were Launched from Iran,”
Wall Street Journal, September 16, 2019, https://www.wsj.com/articles/u-s-
tells-saudi-arabia-oil-attacks-were-launched-from-iran-11568644126.
23. Defense Science Board, “Autonomy,” 83; Allen and Chan, “Artificial Intelli-
gence,” 16; Brundage et al., “Artificial Intelligence,” 19.
24. Defense Science Board, “Autonomy,” 83. See also John Arquilla and David
Ronfeldt, Swarming and the Future of Conflict (Santa Monica, Calif.: RAND,
2000), https://www.rand.org/pubs/documented_briefings/DB311.html.
25. Brundage et al., “Artificial Intelligence,” 20.
26. General (Retired) John Allen and Amir Husain, “AI Will Change the Bal-
ance of Power,” U.S. Naval Institute Proceedings, August 2018, https://www
464 Notes to Pages 93–96
.usni.org/magazines/proceedings/2018/august/ai-will-change-balance-
power.
27. Seth J. Frantzman, “50 Iranian Drones Conduct Massive ‘Way to Jerusalem’
Exercise,” Jerusalem Post, March 14, 2019, https://www.jpost.com/Middle-
East/50-Iranian-drones-conduct-massive-way-to-Jerusalem-exercise-
report-583387.
28. Aaron Mehta, “Pentagon Launches 103 Unit Drone Swarm,” DefenseNews,
January 10, 2017, https://www.defensenews.com/air/2017/01/10/pentagon-
launches-103-unit-drone-swarm; Shawn Snow, “Pentagon Successfully Tests
World’s Largest Micro-Drone Swarm,” Military Times, January 9, 2017, https://
www.militarytimes.com/news/pentagon-congress/2017/01/09/pentagon-
successfully-tests-world-s-largest-micro-drone-swarm. “Self-healing” occurs
when the swarm reconfigures itself to account for the loss of one or more
members.
29. Joseph Trevithick, “USAF Wants to Network Its Precision Munitions
Together into a ‘Golden Horde’ Swarm,” The War Zone, June 26, 2019,
https://www.thedrive.com/the-war-zone/28706/usaf-wants-to-network-its-
precision-munitions-together-into-a-golden-horde-swarm; Peter Suciu, “The
Air Force’s New Golden Horde Swarming Munitions: A Game Changer?,”
1945, June 10, 2021, https://www.19fortyfive.com/2021/06/the-air-forces-
new-golden-horde-swarming-munitions-a-game-changer.
30. Jeffrey Lin and P. W. Singer, “China Is Making 1,000-UAV Drone Swarms
Now,” Popular Science, January 8, 2018, https://www.popsci.com/china-
drone-swarms.
31. Ibid.
32. Defense Science Board, “Autonomy,” 85–86.
33. Joseph Hanacek, “The Perfect Can Wait: Good Solutions to the ‘Drone
Swarm’ Problem,” War on the Rocks, August 14, 2018, https://warontherocks.
com/2018/08/the-perfect-can-wait-good-solutions-to-the-drone-swarm-
problem.
34. Brundage et al., “Artificial Intelligence,” 18.
35. Andrew F. Krepinevich, Jr., “Get Ready for the Democratization of Destruc-
tion,” Foreign Policy, February 15, 2011, http://www.foreignpolicy.com/
2011/08/15/get-ready-for-the-democratization-of-destruction. Recent Rus-
sian military operations in Ukraine have been characterized by the wide-
spread use of unmanned aerial vehicles for operational intelligence and
tactical targeting. Russian artillery and multiple-rocket launchers employ
advanced munitions to strike targets identified by UAVs promptly. Such
strikes have reportedly produced the majority of all Ukrainian casualties,
while making it difficult for light infantry fighting vehicles to survive.
Consequently, special forces and irregular forces were often forming the
ground maneuver force, rather than “traditional” mechanized formations.
See Phillip A. Karber, “Lessons Learned” from the Russo-Ukrainian War: Per-
sonal Observations, draft (Vienna, Va.: Potomac Foundation, July 8, 2015),
Notes to Page 96 465
https://prodev2go.files.wordpress.com/2015/10/rus-ukr-lessons-draft.pdf;
Mary Ellen Connell and Ryan Evans, Russia’s “Ambiguous Warfare” and Impli-
cations for the U.S. Marine Corps (Arlington, Va.: CNA, May 2015), https://
www.cna.org/CNA_files/PDF/DOP-2015-U-010447-Final.pdf; Can Kasa-
poglu, Russia’s Renewed Military Thinking: Non-Linear Warfare and Reflexive
Control, Research Paper 121 (Rome: NATO Defense College, November
2015); Peter Pomerantsev, “Brave New War,” Atlantic, December 29, 2015,
http://www.theatlantic.com/international/archive/2015/12/war-2015-china-
russia-isis/422085.
In the course of the thirty-four-day Second Lebanon War, fought in the
summer of 2006 between Hezbollah and the Israeli Defense Forces (IDF),
Hezbollah fought Israel, a larger, better-equipped enemy, to a standstill with
the aid of numerous guided defensive weapons. Hezbollah sustained the vol-
ume of its rocket fire during the course of the war, firing more than 4,000 of
its estimated 12,000 nonprecision rockets into Israel, including a salvo of
some 250 weapons in the war’s final hours. Matt Matthews, We Were Caught
Unprepared: The 2006 Hezbollah-Israeli War (Fort Leavenworth, Kan.: U.S.
Army Combined Arms Center Combat Studies Institute Press, 2007), 1, 38–
40, 43–56; Frank G. Hoffman, Conflict in the 21st Century: The Rise of Hybrid
Wars (Arlington, Va.: Potomac Institute for Policy Analysis, December,
2007), 22; David E. Johnson, Military Capabilities for Hybrid War: Insights
from the Israel Defense Forces in Lebanon and Gaza (Santa Monica, Calif.:
RAND, 2010).
In 2021, Colonial Pipeline, an American firm, was subjected to a ransom-
ware attack. The cyber attack disrupted supplies of gasoline, jet fuel, and
diesel along the East Coast of the United States, leading to widespread
shortages, which were resolved only after Colonial Pipeline paid the ransom
of $4.4 million in Bitcoin. Brian Fung and Geneva Sands, “Ransomware
Attackers Used Compromised Password to Access Colonial Pipeline Net-
work,” CNN.com, June 4, 2021, https://www.cnn.com/2021/06/04/politics/
colonial-pipeline-ransomware-attack-password/index.html.
36. “Business Is Booming as Regulators Relax Drone Laws,” Economist, June
19, 2021, https://www.economist.com/science-and-technology/2021/06/17/
business-is-booming-as-regulators-relax-drone-laws.
37. Defense Science Board, “Autonomy,” 43.
38. Alan Phillips, “Drone Sales Numbers: Nobody Knows, So We Venture a
Guess,” Drone Life, April 16, 2015, https://dronelife.com/2015/04/16/drone-
sales-numbers-nobody-knows-so-we-venture-a-guess. See also Rob Lever,
“Drones Swoop into Electronics Show as Interest Surges,” YahooTech, Jan
uary 7, 2015, https://www.yahoo.com/tech/s/drones-swoop-electronics-show-
interest-surges-061549575.html.
39. James Adams, “How Drones Are Dramatically Changing Warfare,” Spectator,
September 15, 2019, https://spectator.us/drones-dramatically-changing-
warfare.
466 Notes to Pages 96–102
the age of oil, cars, and mass production; and the age of information and com-
munication. Each cycle ran between forty and sixty years. The sixth cycle is
postulated by some people as an increase in resource efficiency. This sixth wave
is anticipated to be driven by the internet of things, combined with new indus-
trial applications, business models, and services. Josef S. Koller, “The Future of
Ubiquitous, Realtime Intelligence: A GEOINT Singularity,” Aerospace Cor-
poration Center for Space Policy and Strategy, August 2019, 5. See also James
Bradford Moody and Bianca Nogrady, The Sixth Wave: How to Succeed in a
Resource-Limited World (Sydney: Random House Australia, 2010).
75. A. T. Kearney, “3D Printing: Ensuring Manufacturing Leadership in the
21st Century,” Hewlett Packard, 2017, 6, https://www8.hp.com/us/en/
images/3D_Printing___Ensuring_Manufacturing_Leadership_in_the_21st_
Century_tcm245_2547663_tcm245_2442804_tcm245-2547663.pdf.
76. Ibid.
77. Connor M. McNulty, Neyla Arnas, and Thomas A. Campbell, “Toward the
Printed World: Additive Manufacturing and Implications for National Secu-
rity,” Defense Horizons (Institute for National Strategic Studies, National De-
fense University), September 2012, 4.
78. Photo-polymerization is a technique that uses light (visible or ultraviolet) to
initiate and propagate a polymerization reaction to form a linear or cross-
linked polymer structure.
79. McNulty, Arnas, and Campbell, “Toward the Printed World,” 9.
80. Lieutenant Colonel Benjamin D. Forest, “The Future of Additive Manufac-
turing in Air Force Acquisition,” unpublished paper, Air War College,
March 22, 2017, 8.
81. U.S. Department of Energy (DoE), “Additive Manufacturing: Pursuing the
Promise,” August 2012, 1, https://www.energy.gov/sites/prod/files/2013/12/
f5/additive_manufacturing.pdf; McNulty, Arnas, and Campbell, “Toward the
Printed World,” 3; Trevor Johnston, Troy D. Smith, and J. Luke Irwin, Addi-
tive Manufacturing in 2040 (Santa Monica, Calif.: RAND, 2018), 5.
82. Maryne Dijkstra, Alexandra Krause, Layann Masri, Gordon McCambridge,
Jarrell Ng, Shi Bao Pek, Eun Sung Yang, and Yiting Zheng, “U.S. National
Strategy for Additive Manufacturing,” Jackson Institute for Global Affairs,
Yale University, 2014, 8; DoE, “Additive Manufacturing,” 1.
83. Richard, D’Aveni, “The 3-D Printing Revolution,” Harvard Business Review,
May 2015, https://hbr.org/2015/05/the-3-d-printing-revolution.
84. McNulty, Arnas, and Campbell, “Toward the Printed World,” 3; Johnston,
Smith, and Irwin, Additive Manufacturing, 5.
85. D’Aveni, “3-D Printing Revolution.”
86. Johnston, Smith, and Irwin, Additive Manufacturing, 11.
87. Institute for Defense and Government Advancement, “Top Ten Uses for Addi-
tive Manufacturing for Defense,” June 29, 2015, https://www.idga.org/military-
equipment-platforms/news/top-ten-uses-for-additive-manufacturing-for-defe.
Notes to Pages 109–114 469
110. Nucleases belong to a class of enzymes that cleave nucleic acids into nucle-
otides and other products. They are capable of effecting single- and
double-stranded breaks in their target molecules. In living organisms, nu-
cleases are needed for many aspects of DNA repair. Ribonucleases act only
on ribonucleic acids (RNA), and deoxyribonucleases act only on deoxyri-
bonucleic acids (DNA).
111. Marcy E. Gallo, John F. Sargent, Jr., Amanda K. Sarata, and Tadlock
Cowan, “Advanced Gene Editing: CRISPR-Cas9,” Congressional Research
Service, April 28, 2017, 2–3.
112. John Travis, “Making the Cut: CRISPR Genome-Editing Technology
Shows Its Power,” Science, December 2015, 1456.
113. Gallo et al., “Advanced Gene Editing,” 12.
114. Ibid., 20. For the origins of the “Green Revolution” and Charles Borlaug,
the man most responsible for triggering it, see Charles C. Mann, The Wiz-
ard and the Prophet (New York: Knopf, 2018), 95–155.
115. A “cultivar” is a group of plants selected for their desirable characteristics
that are maintained during propagation. For example, trees cultivated in
the forestry industry are selected with an eye toward their yield of com-
mercial timber.
116. Yanpeng Wang, Xi Cheng, Qiwei Shan, et al., “Simultaneous Editing of
Three Homoeoalleles in Hexaploid Bread Wheat Confers Heritable Resis-
tance to Powdery Mildew,” Nature Biotechnology, July 20, 2014, 947–51.
117. Keith Edmisten, “CRISPR Is Coming to Agriculture—With Big Implica-
tions for Food, Farmers, Consumers, and Nature,” NC State Extension,
January 28, 2016.
118. More broadly speaking, transgenesis is the process by which genetic mate-
rial from one species or breed is transferred to another.
119. Rob Stein, “CRISPR Bacon: Chinese Scientists Create Genetically Modi-
fied Low-Fat Pigs,” NPR.org, October 23, 2017, https://www.npr.org/
sections/thesalt/2017/10/23/559060166/crispr-bacon-chinese-scientists-
create-genetically-modified-low-fat-pigs; Gallo et al., “Advanced Gene
Editing,” 21.
120. Stella K. Vasiliou and Eleftherios P. Diamandis, moderators, “CRISPR-
Cas9 System: Opportunities and Concerns,” Clinical Chemistry, August
22, 2016, http://hwmaint.clinchem.org/cgi/doi/10.1373/clinchem.2016.
263186.
121. Gallo et al., “Advanced Gene Editing,” 18–19.
122. Lon Augustenborg, “Genetics: An Emerging Global Threat,” Teneo, Janu-
ary 1, 2017, https://www.teneo.com/genetics-an-emerging-global-threat.
123. Robert H. Latiff, Future War: Preparing for the New Global Battlefield (New
York: Knopf, 2017), 33.
124. Antonio Regalado, “Chinese Scientists Are Creating CRISPR Babies,”
MIT Technology Review, November 25, 2018, https://www.technologyreview
.com/s/612458/exclusive-chinese-scientists-are-creating-crispr-babies;
Notes to Pages 118–120 471
“Jump Start,” Economist, June 15, 2019, 73; “A Moment for Reflection,”
Economist, December 1, 2018, 70–71.
125. Tucker, “Synthetic Biology.”
126. Prashant Mali, Kevin M. Esvelt, and George M. Church, “Cas9 as a Versa-
tile Tool for Engineering Biology,” Nature Methods, October 2013, 962;
“Jump Start,” 73.
127. U.S. National Intelligence Council, Global Trends, 178. “Gene drives” are
genetic elements for which inheritance is favorably biased. U.S. National
Academies of Sciences, Engineering, and Medicine (NAS), Biodefense in the
Age of Synthetic Biology (Washington, D.C.: National Academies Press,
2018), 18, https://doi.org/10.17226/24890.
128. Vladimír Pitschmann and Zdeněk Hon, “Military Importance of Natural
Toxins and Their Analogs,” Molecules 21 (April 28, 2016): 556.
129. Jerry Warner et al., “Analysis of the Threat of Genetically Modified Or-
ganisms for Biological Warfare,” Defense Technical Information Center,
2011, http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&i
dentifier=ADA547199; Spiez Laboratory, Spiez Convergence: Report on the
Second Workshop (Spiez, Switzerland: Swiss Federal Office for Civil Protec-
tion, 2016), 21–26; Erik Frinking, Tim Sweijs, Paul Sinning, Eva Bontje,
Christopher Frattina della Frattina, and Mercedes Abdalla, “The Increas-
ing Threat of Biological Weapons,” Hague Centre for Strategic Studies,
2016, 10.
130. U.S. National Intelligence Council, Global Trends, 53.
131. Dembek, “Genie,” 53.
132. Ibid.
133. “Improvised Weapons. Hell’s Kitchens,” Economist, May 21, 2016, http://
www.economist.com/news/science-and-technology/21699098-makeshift-
weapons-are-becoming-more-dangerous-highly-sophisticated.
134. Latiff, Future War, 32.
135. Upon reading this section of the manuscript while in draft form, my son
and namesake decided to check this out for himself. He found that he could
purchase a CRISPR kit for $159 online at http://www.the-odin.com/
diy-crispr-kit. Harvard University is offering a course online titled
“CRISPR: Gene-Editing Applications,” https://gs.harvardx.harvard.edu/
harvard-crispr-gene-editing-applications-online-short-course-sf/?ef_id=
c%3A318503670128_d%3Ac_n%3Ag_ti%3Akwd-317599818853_p%3A_k
%3A%2Bcrispr_m%3Ab_a%3A62703010079&gclid=Cj0KCQjwiILsBRCG
ARIsAHKQWLNeC70KN8wmkx-0wEZUV9eOxg79xkvZWYPoIgcspqFY-
s4f6v9yT9EaAhWpEALw_wcB.
136. Daniel M. Gerstein, “Can the Bioweapons Convention Survive Crispr?,”
Bulletin of the Atomic Scientists, July 25, 2016, https://thebulletin.org/2016/
07/can-the-bioweapons-convention-survive-crispr.
137. Augustenborg, “Genetics.”
138. Vasiliou and Diamandis, “CRISPR-Cas9 System.”
472 Notes to Pages 120–126
198. David Axe, “How ‘Revolutionary’ Is CHAMP, New Air Force Microwave
Weapon?,” AOL Defense, November 28, 2012, http://defense.aol.com/
2012/11/28/how-revolutionary-is-champ-new-air-force-microwave-weapon;
Sydney J. Freedberg, Jr., “ ‘A Golden Age for Collaboration’: On Lasers &
Microwaves: But Watch the Cheetos!,” Breaking Defense, July 7, 2020,
https://breakingdefense.com/2020/07/a-golden-age-for-collaboration-on-
lasers-microwaves-but-watch-the-cheetos.
199. Alex Hempel, “The SM-2, SM-3, SM-6, ESSM, and RAM: A Guide to
U.S. Naval Air Defense Missiles, WhiteFleet.net, August 5, 2016, https://
whitefleet.net/2016/08/05/sm-2-sm-3-sm-6-and-essm-a-guide-to-us-
naval-air-defense-missiles.
200. Ballistic missile warheads, which must be hardened to withstand the ex-
treme heat associated with reentering the atmosphere, pose yet another
problem for laser defenses.
201. Hughes, Fleet Tactics, 99–108.
202. Karl Kristian Steincke, Ogsaa en Tilvaerelse, vol. 4, Farvel Og Tak: Minder Og
Meninger (Copenhagen: Fremad, 1948), 227, https://quoteinvestigator.
com/2013/10/20/no-predict.
circumstances where two rivals are playing for high stakes under intense
pressure, neither has an incentive to “shoot first.” Michael S. Gerson, “The
Origins of Strategic Stability: The United States and the Threat of Surprise
Attack,” in Strategic Stability: Contending Interpretations, ed. Elbridge A. Colby
and Michael S. Gerson (Carlisle, Pa.: U.S. Army War College Press, Febru-
ary 2013), 2, 26–27; Glenn A. Kent and David E. Thaler, First-Strike Stability:
A Methodology for Evaluating Strategic Forces (Santa Monica, Calif.: RAND,
1989), v; Elbridge Colby, “Defining Strategic Stability: Reconciling Stability
and Deterrence,” in Colby and Gerson, Strategic Stability, 49.
9. W. J. Hennigan and John Walcott, “The U.S. Expects China Will Quickly
Double Its Nuclear Stockpile,” Time, May 29, 2019, https://time.
com/5597955/china-nuclear-weapons-intelligence; Liu Xuanzun, “China
Urged to Expand Nuclear Arsenal to Deter U.S. Warmongers,” Global
Times, May 8, 2020, https://www.globaltimes.cn/content/1187775.shtml.
10. Dean Cheng, “Chinese Views on Deterrence,” Joint Forces Quarterly, First
Quarter, 2011, 92; Thomas Schelling, Arms and Influence (New Haven: Yale
University Press, 1967), 69.
11. Watts, Six Decades, 25.
12. For a discussion of a general thermonuclear war’s prospective characteris-
tics, see Herman Kahn, Thinking About the Unthinkable in the 1980s (New
York: Simon and Schuster, 1984).
13. Krepinevich, Decline of Deterrence, 20–23.
14. Ibid., 37–45.
15. Richard A. Clarke and Robert K. Knake, Cyber War (New York: HarperCol-
lins, 2010), 7.
16. Evgeny Myasnikov, “Counterforce Potential of High-Precision Weapons,”
in Nuclear Disarmament: New Technology, Weapons and Treaties, ed. Alexei Ar-
batov and Vladimir Dvorkin (Moscow: Carnegie Moscow Center, 2009),
107; Alexei Arbatov, Gambit or Endgame? The New State of Arms Control
(Washington, D.C.: Carnegie Endowment for International Peace, 2011), 9.
17. Arbatov, Gambit or Endgame?, 17, 21.
18. Military Doctrine of the Russian Federation (in Russian), 2014, http://
news.kremlin.ru/media/events/files/41d527556bec8deb3530.pdf, quoted in
Alexey Arbatov, “Nuclear Deterrence: A Guarantee or Threat to Strategic
Stability?,” Carnegie Moscow Center, March 22, 2019, https://carnegie.ru/
2019/03/22/nuclear-deterrence-guarantee-or-threat-to-strategic-stability-
pub-78663.
19. Russian doctrine also includes the possibility of launching a retaliatory
strike should it detect that a nuclear attack is under way against it, typically
referred to as “launch on warning.” The June 2020 policy document de-
scribes a number of circumstances under which Moscow might consider the
use of nuclear weapons, including when it has received “reliable data on a
launch of ballistic missiles attacking the territory of the Russian Federation
478 Notes to Pages 148–154
and/or its allies” and in response to the “use of nuclear weapons or other
types of weapons of mass destruction by an adversary against the Russian
Federation and/or its allies.” Russia also reserves the right to respond with
nuclear weapons following an “attack by [an] adversary against critical gov-
ernmental or military sites of the Russian Federation, disruption of which
would undermine nuclear forces’ response actions” and “aggression against
the Russian Federation with the use of conventional weapons when the very
existence of the state is in jeopardy.” Ministry of Foreign Affairs of the Rus-
sian Federation, On Basic Principles of State Policy of the Russian Federation,
Moscow, June 2, 2020, paras. 4, 5, 10, and 19, https://www.mid.ru/en/web/
guest/foreign_policy/international_safety/disarmament/-/asset_publisher/
rp0fiUBmANaH/content/id/4152094, quoted in Amy F. Woolf, “Russia’s
Nuclear Weapons: Doctrine, Forces and Modernization,” Congressional
Research Service, July 20, 2020, 4–5. See also Woolf, “Russia’s Nuclear
Weapons,” 6–7; and Michael Kofman and Anya Loukianova Fink,
“Escalation Management and Nuclear Employment in Russian Military
Strategy,” War on the Rocks, June 23, 2020, https://warontherocks.com/
2020/06/escalation-management-and-nuclear-employment-in-russian-
military-strategy; Admiral Charles A. Richard, Testimony, Senate Commit-
tee on Armed Services, April 20, 2021, 10.
20. James Mattis, U.S. Nuclear Posture Review (Washington, D.C.: Office of the
Secretary of Defense, February 2018), xii, 8, https://media.defense.gov/2018/
Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-
FINAL-REPORT.pdf.
21. Mingda Qiu, “China’s Science of Military Strategy: Cross-Domain Con-
cepts in the 2013 Edition,” Cross Domain Deterrence Working Paper, Uni-
versity of California at San Diego, La Jolla, Calif., September 2015, 14.
22. Research Department of Military Strategy, Science of Military Strategy, 148,
quoted in Mingda Qiu, “China’s Science of Military Strategy,” 13.
23. Krepinevich, Decline of Deterrence, 50–52.
24. Nevil Shute, On the Beach (New York: William Morrow, 1957).
25. Martin Shubik, “Terrorism, Technology and the Socioeconomics of Death,”
Comparative Strategy 16, no. 4 (1997): 399–414.
26. “The Dark Knight (2008): Michael Caine: Alfred,” IMDb, accessed February
19, 2022, https://www.imdb.com/title/tt0468569/characters/nm0000323.
27. This is the basis for insurance. A risk-averse person accepts an expected
value that is less than that of the gamble in order to obtain a sure thing; that
is to say, the person pays a premium to avoid risk. Uncertainty exists when
the decision-makers do not know the possible outcome of their decision in
advance or the probabilities. On the other hand, risk exists when the deci-
sion-makers have some sense of the probabilities of potential outcomes in
advance. For example, before rolling a pair of dice, an individual knows the
odds of rolling snake eyes (two ones). (The odds are one in thirty-six.) In a
game of poker, the players are less certain of the outcome of a particular
Notes to Pages 155–159 479
hand, but expert players have a sense of the range of the odds in choosing a
particular course of action. Richard E. Nisbett, Kaiping Peng, Incheol Choi,
and Ara Norenzayan, “Culture and Systems of Thought: Holistic Versus An-
alytic Cognition,” Psychological Review 108, no. 2 (2001): 291.
28. Herbert A. Simon, “A Behavioral Model of Rational Choice,” RAND P-365,
January 20, 1953; Herbert A. Simon, “Rational Choice and the Structure of
the Environment,” Psychological Review 63 (March 1956): 129–38. See also
Daniel Kahneman, “Maps of Bounded Rationality: Psychology for Behav-
ioral Economics,” American Economic Review 93 (December 2003): 1449–75.
29. James March and Herbert Simon, with the collaboration of Harold Guetz-
kow, Organizations, 2nd ed. (Cambridge: Blackwell, 1993), 3–4.
30. Richard M. Cyert and James March, A Behavioral Theory of the Firm, 2nd ed.
(Cambridge: Blackwell, 1992), 120–22, 214–15.
31. Daniel Kahneman, Thinking Fast and Slow (New York: Farrar, Straus and Gi-
roux, 2011), 334; Jack S. Levy, “Applications of Prospect Theory to Political
Science,” Synthese, May 2003, 217. Tversky and Kahneman also found that
individuals exhibit diminishing sensitivity to gains and losses (or anticipated
benefits and costs) and that decision-makers overweight low-probability
outcomes and underweight high-probability outcomes.
32. R. H. Thaler, “Toward a Positive Theory of Consumer Choice,” Journal of
Economic Behavior and Organization 1 (1980): 39–60.
33. Kahneman, Thinking Fast and Slow, 250, 256–57.
34. Henry Kissinger, Diplomacy (New York: Simon and Schuster, 1994), 248.
35. The fact that one of those who seeks power obtains it does not necessarily
tell us anything about the winner’s skill. If ten contestants compete in a
“winner-take-all” game, one of them will necessarily emerge as the ultimate
winner, even if all ten are absolutely equal in skill.
36. Nisbett et al., “Culture,” 291.
37. Ethan Watters, “We Aren’t the World,” Pacific Standard Magazine, February
25, 2013, https://psmag.com/social-justice/joe-henrich-weird-ultimatum-game-
shaking-up-psychology-economics-53135.
38. Ibid.
39. Joseph Henrich, Robert Boyd, Samuel Boyles, Colin Camerer, et al., “ ‘Eco-
nomic Man’ in Cross-Cultural Perspective: Behavioral Experiments in 15
Small-Scale Societies,” Behavioral and Brain Sciences 28 (2005): 7.
40. It may also be that in cases where Player A is risk seeking, A may make an
“unfair” offer to Player B, anticipating that B’s self-interest will lead B to ac-
cept the offer.
41. Donald Kagan, On the Origins of War (New York: Doubleday, 1995), 38–39,
204.
42. Alistair Horne, To Lose a Battle: France 1940 (New York: Penguin, 1990), 95.
43. William Taubman, Khrushchev (New York: Norton, 2003), 541, 546.
44. Ibid., 574, 576.
45. Evan Thomas, Ike’s Bluff (New York: Little, Brown, 2012), 105.
480 Notes to Pages 167–177
Tirpitz with respect to the Kiel Canal. The canal was widened and finally
completed, at great cost, in August 1914.
167. Massie, Dreadnought, 486; Herwig, “German Reaction,” 278.
168. Fisher, Fear God and Dread Nought, 2:431.
169. Massie, Dreadnought, 520.
170. Bacon, Fisher, 2:98; Morris, Fisher’s Face, 190.
171. Lambert, Fisher’s Revolution, 8. Indeed, Fisher was constantly being
tempted by his industry friends, who offered him huge salaries if he would
forsake the Navy and enter the private sector.
172. The four major firms were Vickers, Armstrong-Whitworth, the Fairfield
Shipbuilding Company, and John Brown & Co. Ltd.
173. Lambert, Fisher’s Revolution, 24, 147. Interestingly, this relationship sur-
vived Fisher’s tenure on through World War I.
174. Ibid., 132.
175. Privately, senior Admiralty officials admitted (though not to politicians)
that the process of calculating naval balance was “one of extreme complex-
ity.” In public, however, the Navy maintained that in future naval engage-
ments “only dreadnoughts would matter.” Ibid., 135–36.
176. Fisher, Fear God and Dread Nought, 2:141.
177. Lambert, Fisher’s Revolution, 142.
178. Ibid., 148.
179. Parkinson, Dreadnought, 103.
180. Sumida, Naval Supremacy, 113.
181. Spector, At War, at Sea, 21.
182. Parkinson, Dreadnought, 76; Padfield, Battleship, 181–82; Towle, “Russo-
Japanese War,” 72.
183. Towle, “Russo-Japanese War,” 71.
184. Gray, Devil’s Device, 167–70, 172.
185. Ibid., 68; Padfield, Battleship, 171; Cowpe, “Whitehead Torpedo,” 66;
Towle, “Russo-Japanese War,” 66.
186. Lambert, Fisher’s Revolution, 83–85; Robert K. Massie, Castles of Steel (New
York: Random House, 2003), 124.
187. Grimes, Strategy, 37.
188. Herman, To Rule the Waves, 480.
189. Lambert, Planning Armageddon, 46.
190. Ranft, “Protection,” 20–21.
191. Lambert, Planning Armageddon, 71–75; Grimes, Strategy, 86.
192. The designations “A” and “A1” reflect France’s status, either as a neutral (A)
or an active ally (A1) in a war between Britain and Germany. Grimes, Strat-
egy, 89–90.
193. Ibid., 99.
194. Ibid.
195. Ibid., 99, 127–28.
196. Lambert, Planning Armageddon, 4–5.
Notes to Pages 229–235 487
Navy; the British needed endurance to send ships long distances to protect
the outer reaches of the empire. The major shift in German design, how-
ever, was its according a far higher priority to ship protection. The share of
displacement devoted to armor rose from 33 percent in the Deutschland
class to 35 percent in the Nassau class, then to 37 percent in the Ostfriesland
class and to 40 percent in the Koenig class. If Fisher was betting on speed
and range to fight at a gentleman’s distance, the Imperial German Navy
cast its lot with the ability to take punishment and survive a brawl. Before
World War I, only Germany conducted systematic experiments on ship
protection. Not only would British warships prove more vulnerable to un-
derwater hits, but they were also less able to deal with flooding. The Queen
Elizabeth super-dreadnought, for example, could pump out 950 tons of
water per hour, while its German contemporary, the Bayern, could pump at
a rate nearly six times greater. Finally, the Germans had learned an impor-
tant lesson at the Dogger Bank engagement. There a shell had penetrated
Seydlitz’s aft turret, triggering powder in the turret to catch fire, flash
below, and kill everyone in two aft turret systems. The ship would have
blown up if its magazines had not been flooded to extinguish the flames.
The Germans installed antiflash protection on the hatches between han-
dling room and magazines—something Beatty’s ships lacked at Jutland.
Fairbanks, “Choosing Among Technologies,” 129–30, 132, 135; Massie,
Castles, 667.
268. Massie, Dreadnought, 781.
269. Parkinson, Dreadnought, 235, 237; Padfield, Battleship, 228, 240.
270. Marder, Dreadnought, 206.
271. Ibid., 13, 406; Freeman, Naval Feud, 235.
74. Richard Overy, Why the Allies Won (New York: Norton, 1995), 224. Ger-
many also lacked a large tractor industry for producing tracked or half-
tracked vehicles, a secure source of oil, a large oil-refining industry, and a
robust mechanical-maintenance service industry. There apparently was no
system in place for converting Germany’s automobile industry to war pro-
duction. Even with the limited mechanization of the German Army, it was
continuously short of drivers and personnel for salvage and maintenance
units. R. L. DiNardo, Mechanized Juggernaut or Military Anachronism?
(New York: Greenwood, 1991), 7, 9–10.
75. Russell H. S. Stolfi, “Equipment for Victory in France in 1940,” History
Journal of the Historical Association 55 (February 1970): 6. The Panzer I’s
limitations were highlighted in the Polish campaign. Some 150 Panzer Is
were knocked out by the Poles.
76. Ibid., 7. Reflecting in part the Panzer II’s improved capabilities relative to
the Panzer I, the Panzer II remained in production until 1944.
77. Ibid.
78. Deist, “Wehrmacht,” 450.
79. Heineman, “Armoured Forces,” 60.
80. Stolfi, “Equipment,” 8; Werner Haupt, A History of the Panzer Troops (West
Chester, Pa.: Schiffer Military History, 1990), 45. The Germans also outfit-
ted fifteen infantry divisions with confiscated Czech equipment. Deist,
“Wehrmacht,” 451.
81. Overy, Why the Allies Won, 217.
82. DiNardo, Juggernaut or Anachronism?, 7, 9–10.
83. Corum, Luftwaffe, 84, 113.
84. Murray, Strategy for Defeat, 4.
85. Ibid., 7.
86. Corum, Blitzkrieg, 186.
87. Citino, Evolution of Blitzkrieg, 184.
88. Ibid.
89. Corum, Blitzkrieg, 185–89.
90. Heinz Guderian, Achtung—Panzer!, trans. Christopher Duffy (London:
Arms and Armour, 1992), 142.
91. Citino, Evolution of Blitzkrieg, 203.
92. Haupt, Panzer Troops, 70–71.
93. Citino, Evolution of Blitzkrieg, 184.
94. Ibid.
95. Ibid., 214.
96. Citino, Decisive Victory, 203–4.
97. Haupt, Panzer Troops, 70–71.
98. Macksey, Guderian, 62–63.
99. Haupt, Panzer Troops, 59; Macksey, Guderian, 50.
100. Citino, Decisive Victory, 191.
101. Citino, Path to Blitzkrieg, 252.
Notes to Pages 276–281 495
6. Norman Friedman, “The Aircraft Carrier,” in The Eclipse of the Big Gun: The
Warship, 1906–45, ed. Robert Gardiner (Annapolis, Md.: Naval Institute
Press, 1992), 38.
7. Quoted in Clark G. Reynolds, The Fast Carriers (Annapolis, Md.: Naval In-
stitute Press, 1968), 1.
8. Ibid.; Charles M. Melhorn, Two-Block Fox (Annapolis, Md.: Naval Institute
Press, 1974), 30–31.
9. Admiral William Moffett, who became the first head of the Navy’s Bureau
of Aeronautics, actually proposed experimenting with aircraft deployed on
submarines. See William F. Trimble, Admiral William A. Moffett: Architect of
Naval Aviation (Washington, D.C.: Smithsonian Institution Press, 1994),
108.
10. Melhorn, Two-Block Fox, 33.
11. Trimble, Moffett, 71.
12. Melhorn, Two-Block Fox, 28–29, 33.
13. Ibid., 37.
14. Hone, Friedman, and Mandeles, Aircraft Carrier Development, 22–23.
15. Thomas C. Hone and Trent Hone, Battle Line: The United States Navy,
1919–1939 (Annapolis, Md.: Naval Institute Press, 2006), 81. By 1935, the
Navy concluded that aerial spotting produced six times as many hits as spot-
ters placed in a ship’s top mast position.
16. Melhorn, Two-Block Fox, 26; Norman Friedman, Thomas C. Hone, and
Mark D. Mandeles, “The Introduction of Carrier Aviation into the U.S.
Navy and Royal Navy: Military-Technical Revolutions, Organizations, and
the Problems of Decision,” unpublished paper, May 12, 1994, 57.
17. Melhorn, Two-Block Fox, 26, 38.
18. Ibid., 60.
19. Ibid.
20. William M. McBride, “Challenging a Strategic Paradigm: Aviation and the
U.S. Navy Special Policy Board of 1924,” Journal of Strategic Studies 14 (Sep-
tember 1991): 75, quoted in Geoffrey Till, “Adopting the Aircraft Carrier,”
in Murray and Millett, Military Innovation in the Interwar Period, 209–10.
21. Spector, Eagle, 22.
22. Melhorn, Two-Block Fox, 56.
23. Hone, Friedman, and Mandeles, Aircraft Carrier Development, 29.
24. McBride, Technological Change, 144, 182.
25. Melhorn, Two-Block Fox, 88; Thomas C. Hone and Mark D. Mandeles, “In-
terwar Innovation in Three Navies: U.S. Navy, Royal Navy, Imperial Japa-
nese Navy,” Naval War College Review 40 (Spring 1987): 63–83.
26. Friedman, Hone, and Mandeles, “Carrier Aviation,” 22.
27. McBride, Technological Change, 135.
28. Ibid., 135–36.
29. Friedman, “Aircraft Carrier,” 39.
30. Till, “Aircraft Carrier,” 210–11.
Notes to Pages 306–313 499
the construction of new capital ships, and destroyers were too small to un-
dergo conversion, the net effect was solely on cruisers. Ibid., 220–21.
64. Ibid., 223.
65. Friedman, “Aircraft Carrier,” 50. This latter characteristic would be particu-
larly important as the Navy shifted its aircraft mix during the transition pe-
riod from an offensive-dominant mini-regime to a more defense-dominant
regime between 1942 and 1944.
66. Kuehn, Agents of Innovation, 38.
67. Friedman, Hone, and Mandeles, “Carrier Aviation,” 181; Polmar, Aircraft
Carrier, 74–75; Sebastian Roblin, “Why the Navy’s Essex-Class Carriers
Were So Good,” National Interest, April 9, 2020, https://nationalinterest.org/
blog/buzz/why-navys-essex-class-aircraft-carriers-were-so-good-142767.
68. Trimble, Moffett, 204; Reynolds, Fast Carriers, 16.
69. Trimble, Moffett, 204.
70. Edward S. Miller, War Plan Orange (Annapolis, Md.: Naval Institute Press,
1991), 348.
71. Wildenberg, Destined for Glory, 52.
72. Craig C. Felker, Testing American Sea Power: U.S. Navy Strategic Exercises,
1923–1940 (College Station: Texas A&M University Press, 2007), 49.
73. Saratoga carried 110 planes and 100 pilots, an enormous leap in capability
from the Langley’s few dozen aircraft. Fleet Problem IX, National Archives
Publication M964, “Report of the CINC, U.S. Fleet,” 23, 26, 71, cited in
Friedman, Hone, and Mandeles, “Carrier Aviation,” 94; Nofi, To Train the
Fleet, 113. The Saratoga’s exploit was partly the product of chance: it was de-
tached from the battleship force because the battleships’ destroyer screen
did not have sufficient fuel to keep up with it.
74. Nofi, To Train the Fleet, 110.
75. Reynolds, Fast Carriers, 17.
76. Ibid.; Robert L. O’Connell, Sacred Vessels: The Cult of the Battleship and the
Rise of the U.S. Navy (Boulder, Colo.: Westview, 1991), 285.
77. Nofi, To Train the Fleet, 117.
78. Felker, Testing, 51.
79. Ibid., 54.
80. Ibid., 56.
81. Hone and Hone, Battle Line, 74, 76; Nofi, To Train the Fleet, 134–35.
82. Wildenberg, Destined for Glory, 83–85.
83. Ibid., 92.
84. O’Connell, Sacred Vessels, 286.
85. Trimble, Moffett, 226–27.
86. Ibid., 228.
87. Pearl Harbor was also subjected to another “attack” by the Saratoga in 1938.
The Japanese war-gamed carrier-led attacks against Pearl Harbor as early as
autumn 1927. Evans and Peattie, Kaigun, 473.
88. Reynolds, Towers, 237–38.
Notes to Pages 321–328 501
simulate a dive-bombing attack until October 1939. Tests with the drone
revealed that fleet defenses against this form of attack were “quite inade-
quate.” Hone, Friedman, and Mandeles, Aircraft Carrier Development, 164.
160. O’Connell, Sacred Vessels, 310.
161. Spector, Eagle, 22–23.
162. Brodie, Sea Power, 402, 405.
163. Thomas C. Hone and Mark Mandeles, “Managerial Style in the Interwar
Navy: A Reappraisal,” Naval War College Review 32 (September–October
1980): 95–96.
164. Ronald Spector, “The Military Effectiveness of the U.S. Armed Forces,
1919–1939,” in Millet and Murray, Military Effectiveness, vol. 2, 84.
165. Evans and Peattie, Kaigun, 307.
166. Spector, “Second Best Technology,” 15.
167. Brodie, Sea Power, 410–11.
168. Joel R. Davidson, The Unsinkable Fleet (Annapolis, Md.: Naval Institute
Press, 1996), 34.
169. Ibid., 34, 60. When shipbuilding accelerated in 1940, the Navy’s planners
realized that armor-plate production capacity represented the critical bot-
tleneck in expanding the fleet. This led to lighter ships (which could be
built more quickly) being given greater priority at the expense of battleship
construction. In the end, the shortage may have proved serendipitous, ar-
resting as it did the production of the soon-to-be-displaced battleships and
providing modest boost to carrier construction.
170. Ibid., 36.
171. Ibid., 35; O’Connell, Sacred Vessels, 316; McBride, Technological Change, 185.
Interestingly, in the summer of 1942, President Roosevelt opposed build-
ing the large Midway-class (45,000-ton) carriers, arguing that the ships
would use too much steel and take too long to build. In December, the
president approved their construction after much Navy lobbying. Roos-
evelt, however, proved correct: none of the Midway-class carriers were
completed in time to see action in the war.
172. Hughes, Fleet Tactics, 94.
173. Friedman, Hone, and Mandeles, “Carrier Aviation,” 108–9. Before 1942,
the only other such command in the Navy had been that for battleships.
174. McBride, Technological Change, 206, 208.
175. In December 1941, the United States possessed seven fleet carriers: Sara-
toga, Lexington, Ranger, Yorktown, Enterprise, Wasp, and Hornet. A year later,
only one—Ranger—had not been sunk or seriously damaged.
176. Friedman, “Aircraft Carrier,” 47.
177. Hughes, Fleet Tactics, 102, 105.
178. Ibid., 118.
179. Hone, Friedman, and Mandeles, Aircraft Carrier Development, 162.
180. Evans and Peattie, Kaigun, 503.
181. Brodie, Sea Power, 407, 417.
182. Ibid., 418–19.
Notes to Pages 341–346 505
183. The British battleships Prince of Wales and Repulse were sunk in December
1941 by Japanese land-based aircraft.
184. Hone, Friedman, and Mandeles, Aircraft Carrier Development, 69. The IJN’s
formation of the First Mobile Fleet in 1944 was a belated attempt to imi-
tate the Americans’ fast carrier task forces. Evans and Peattie, Kaigun, 501.
185. Evans and Peattie, Kaigun, 380.
Group employed 459 Azons, with roughly 15 percent achieving direct hits. The
Fritz-X had an estimated circular error probable (CEP) of fifteen feet and a 30
percent hit rate. CEP is defined as the radius of a circle within which 50 per-
cent of the weapons employed are expected to fall. Thus, an aircraft carrying a
bomb load of sixteen weapons with a CEP of 500 feet can—on average—expect
half of those weapons (eight) to fall within 500 feet of the target. Yet despite the
weapon’s impressive performance, the Luftwaffe discontinued using it after
1943. This may have stemmed from parochial concerns within the Luftwaffe
that the weapon could lead to a shift from fighter to bomber production or
from an Allied bombing raid that destroyed on the ground the only Luftwaffe
squadron capable of employing the Fritz-X.
17. Difficulty in obtaining data on the kamikazes has produced some signifi-
cantly differing estimates regarding their operation and performance. For
example, a postwar assessment concluded that roughly one-third of all kami-
kaze fighters who left their bases succeeded in hitting a ship—a success rate
seven to ten times that of a conventional sortie but also more than twice the
rate cited in other assessments. Spector, At War, at Sea, 312.
18. Gillespie, “Precision Guided Munitions,” 79–80. One of the four experi-
ments involving a “missile-like” weapon was a variant of the German V-1
“buzz bomb.”
19. Mary R. Self, “History of the Development of Guided Missiles, 1946–1950,”
Wright-Patterson AFB, Ohio, December 1951, 32–34; Jacob Neufeld, “The
Development of Ballistic Missiles in the United States Air Force 1945–
1960,” Office of Air Force History, United States Air Force, Washington,
D.C., 1990, 11.
20. Gillespie, “Precision Guided Munitions,” 87.
21. Ibid., 88.
22. Ibid., 91, 93. The name “Tarzon” is a combination of “Tallboy” (a 12,500-
pound British-developed bomb) and “azimuth and range only.” Troops pro-
nounced it “Tarzan.”
23. Ibid., 97.
24. Brian Daniel Laslie, “Red Flag: How the Rise of ‘Realistic Training’ After Viet-
nam Changed the Air Force’s Way of War, 1975–1999” (Ph.D. diss., Kansas
State University, 2013), 48; Paul R. Schratz, Evolution of the American Military
Establishment Since World War II (Lexington, Va.: George C. Marshall Research
Foundation, 1978), 63; Marshall L. Michel III, “Revolt of the Majors: How the
Air Force Changed After Vietnam” (Ph.D. diss., Auburn University, 2006), 24.
25. Michel, “Revolt,” 24–25.
26. Laslie, “Red Flag,” 77–78.
27. Laslie, “Red Flag,” 49–50, 77–78; Michel, “Revolt,” 45, 194. See also Richard
P. Hallion, “A Troubling Past: Air Force Fighter Acquisition Since 1945,” Air
Power Journal 4 (Winter 1990): 54–64.
28. Laslie, “Red Flag,” 24–27.
29. Ibid., 14; Michel, “Revolt,” 58–59, 62–64.
Notes to Pages 351–356 507
94. The term “Harvey” came from the motion picture of the same name, about
a man whose friend is an invisible six-foot four-inch rabbit named Harvey.
95. Van Atta et al., “Transformation and Transition,” 11–12.
96. Ibid.
97. Ibid., 13.
98. Ibid.; Ian A. Maddock, “DARPA’s Stealth Revolution: Now You See Them
. . .,” DARPA, n.d., 152, https://www.hsdl.org/?abstract&did=805141.
99. Lockheed had not been invited to compete because DARPA was unaware
of its work on the SR-71 aircraft. The Central Intelligence Agency allowed
Lockheed to discuss its experience in stealth design with DARPA’s director,
George Heilmeier, who agreed to allow Lockheed to participate in the
study under a one-dollar contract. Maddock, “DARPA’s Stealth Revolu-
tion,” 153.
100. Ibid., 153–54; Ben R. Rich and Leo Janos, Skunk Works (Boston: Little,
Brown, 1994), 3–6.
101. Grissom, Lee, and Mueller, Innovation, 55; Van Atta et al., “Transformation
and Transition,” 11, 14; Maddock, “DARPA’s Stealth Revolution,” 154.
102. Watts, Precision Strike, 10.
103. Ibid., 196, 198.
104. Ibid., 194.
105. Ibid., 196–98. During the 1960s and most of the 1970s, the pilot in a
squadron who could consistently drop his bombs most accurately in evalu-
ations was accorded the highly sought status as the unit’s “top gun.”
106. United States Air Force, “Gen. Wilbur L. ‘Bill’ Creech: American Airmen,
Breaking Barriers Since 1947: 1970–1980 Generation,” accessed February 19,
2022, http://static.dma.mil/usaf/70/featuredHeros/GenWilburLCreech.html.
107. Slife, “Creech Blue,” 39–40, 56.
108. Grissom, Lee, and Mueller, Innovation, 55.
109. Ibid., 28–29, 56.
110. Ibid., 30.
111. Ibid., 47.
112. Michel, “Revolt,” 278–79.
113. Slife, “Creech Blue,” 1.
114. United States Air Force, “Creech.”
115. The reference is to the motion picture of the same name, in which the
main character begins every day in the same circumstances as he did the
day before.
116. Slife, “Creech Blue,” 27–29; Grissom, Lee, and Mueller, Innovation, 56.
117. Slife, “Creech Blue,” 29.
118. Laslie, “Red Flag,” 101.
119. Grissom, Lee, and Mueller, Innovation, 57; Lambeth, Air Power, 63.
120. Slife, “Creech Blue,” 52–53.
121. Grissom, Lee, and Mueller, Innovation, 57.
122. Slife, “Creech Blue,” 10–11.
Notes to Pages 376–381 511
123. The Paveway II LGBs entered production in mid-1976. Their principal ad-
vantages over the Paveway I LGBs came in the form of folding fins that ex-
panded the weapon’s release envelope, along with their ability to be employed
on a wide variety of U.S. and allied aircraft. Watts, Precision Strike, 190–91.
124. “Rockwell GBU-15(V)/B,” Directory of U.S. Military Rockets and Missiles, ac-
cessed February 19, 2022, http://www.designation-systems.net/dusrm/m-
112.html.
125. Gillespie, “Precision Guided Munitions,” 198, 200–202. The GBU-27 is a
GBU-24 adapted for use in the F-117 fighter.
126. GBU-27 production was eventually resumed for use with a hard-target kill
warhead. Watts, Precision Strike, 190–91.
127. Slife, “Creech Blue,” 54, 58.
128. Grissom, Lee, and Mueller, Innovation, 54; Slife, “Creech Blue,” 57; An-
deregg, Sierra Hotel, 99.
129. Grissom, Lee, and Mueller, Innovation, 53–55.
130. Slife, “Creech Blue,” 57.
131. Stillion, Air-to-Air Combat, 19.
132. Ibid., 20.
133. Ibid., 22.
134. Slife, “Creech Blue,” 32, 51.
135. According to General Joseph Ralston, who served as vice chairman of the
Joint Chiefs of Staff and supreme allied commander of NATO, “LAN-
TIRN would have died many times without Creech.” Ibid., 32, 63; Watts,
Precision Strike, 95.
136. Watts, Precision Strike, 192.
137. Michael Russell Rip and James M. Hasik, The Precision Revolution: GPS and the
Future of Aerial Warfare (Annapolis, Md.: Naval Institute Press, 2002), 9, 66.
138. Ibid.; Watts, Precision Strike, 18.
139. Rip and Hasik, Precision Revolution, 12.
140. Ibid., 9. The Soviets deployed their Globalnaya Navigatsionaya Sputniko-
vaya Sistema (Global Navigation Satellite System, or GLONASS). The
first GLONASS satellites were launched in October 1982. The system was
not fully operational until 1995 but decayed soon after due to budget limi-
tations. It was fully restored in 2011.
141. U.S. Air Force, “E-3 Sentry (AWACS),” September 22, 2015, https://www.
af.mil/About-Us/Fact-Sheets/Display/Article/104504/e-3-sentry-awacs.
142. Lambeth, Air Power, 79.
143. The IFF system works by sending out a coded signal from an aircraft’s
radar. When a friendly aircraft equipped with an IFF system receives the
signal, it responds with a coded signal of its own. If the challenged aircraft
has the proper code in its system, it will be identified as “friend” and not
“foe.” Ideally, this enables friendly aircraft to avoid being attacked by
friendly forces (“blue-on-blue” attacks or “friendly fire”). It also identifies
enemy aircraft, as they will not respond properly. Unfortunately, a friendly
512 Notes to Pages 381–387
aircraft could also be identified as a foe if its IFF system were knocked out
owing to battle damage or if it were simply out of order. The same would
occur if the pilot inserted the wrong IFF code into the system.
144. Stillion, Air-to-Air Combat, 17.
145. Ibid., 17–18.
146. Although roughly half of the MiG kills claimed by Israeli fighters were
achieved with Sparrow-equipped F-15s, the IAF insisted that its pilots
“took no shots . . . from beyond visual range.” Lambeth, Air Power, 93–94;
Watts, Precision Strike, 142.
147. Lambeth, Air Power, 92, 95.
148. Bernard Trainor, “ ’83 Strike on Lebanon: Hard Lessons for the U.S.” New
York Times, August 6, 1989, https://www.nytimes.com/1989/08/06/world/83-
strike-on-lebanon-hard-lessons-for-us.html; Lambeth, Air Power, 96–98.
149. John Pike, “Operation El Dorado Canyon,” GlobalSecurity.org, last modi-
fied May 7, 2011, https://www.globalsecurity.org/military/ops/el_dorado_
canyon.htm; Lambeth, Air Power, 100–101.
150. Major Todd R. Phinney, “Airpower Versus Terrorism: Three Case Studies,”
unpublished paper, School of Advanced Air and Space Studies, June 2003,
19–20.
151. Other organizations that sought to further the DRM’s objectives were
Business Executives for National Security, the Military Reform Institute,
and the Project on Military Procurement. Public-policy research institutes,
such as the Center for Strategic and International Studies, the Heritage
Foundation, and the Hudson Institute, were also involved in the move-
ment. Peter W. Chiarelli and Raymond C. Gagnon, “The Politics of Mili-
tary Reform,” unpublished paper, U.S. Naval War College, June 1985, iv,
http://www.dtic.mil/dtic/tr/fulltext/u2/a158220.pdf.
152. Gary Hart, “The Need for Military Reform,” Air University Review 36
(September–October 1985): 43–44.
153. Slife, “Creech Blue,” 69, 129–30.
154. Michel, “Revolt,” 367–68.
155. Slife, “Creech Blue,” 43, 46.
156. Warden’s five rings held that the center, most crucial ring comprised the
state’s leaders. This ring was encompassed by the outer four rings. Moving
out from the center, the second ring represented military production, in-
cluding factories producing war matériel. The third ring comprised key in-
frastructure, including railroads and power grids. The population was
included in the fourth ring. The fifth and outermost ring was the nation’s
armed forces. Warden argued that instead of attacking the enemy’s forces, air
power could be employed to attack the national leadership in the first ring,
something he and his supporters called “inside-out warfare.” Colonel Ed-
ward C. Mann III, Thunder and Lightning: Desert Storm and the Airpower De-
bates (Maxwell Air Force Base, Ala.: Air University Press, April 1995), 35–36.
157. Slife, “Creech Blue,” 113–14; Grissom, Lee, and Mueller, Innovation, 63.
Notes to Pages 387–392 513
158. Slife, “Creech Blue,” 113–14; Mann, Thunder and Lightning, 60–61, 63;
Abraham Jackson, “America’s Airman: David Deptula and the Airpower
Moment,” unpublished paper, School of Advanced Air and Space Studies,
Air University, Maxwell Air Force Base, Ala., June 2011, 23.
159. Mann, Thunder and Lightning, 60–61.
160. Slife, “Creech Blue,” 114–15.
161. Ibid.
162. Lambeth, Air Power, 110; Mann, Thunder and Lightning, 18.
163. Laslie, “Red Flag,” 174–75.
164. Slife, “Creech Blue,” 116; Grissom, Lee, and Mueller, Innovation, 67–68;
Mann, Thunder and Lightning, 39, 46.
165. Watts, Precision Strike, 260.
166. Ibid., 152.
167. Lambeth, Air Power, 113.
168. Laslie, “Red Flag,” 211–12; Slife, “Creech Blue,” 129–30.
169. Mets, “Search for Surgical Strike,” 37.
170. Watts, Precision Strike, 143.
171. Ibid., 145–46.
172. Ibid., 145–46, 188.
173. Stillion, Air-to-Air Combat, 26, 28.
174. Slife, “Creech Blue,” 129–30.
175. Watts, Precision Strike, 8, 123.
176. Ibid., 144; Stillion, Air-to-Air Combat, 28–29. During 1965–73, of the 195
enemy aircraft downed by U.S. fighters, 56 (28.7 percent) were by AIM-7s.
During Operation Desert Storm, coalition fighters scored 38 air-to-air
kills, 26 (68.4 percent) with the AIM-7M.
177. Stillion, Air-to-Air Combat, 25, 28.
178. The growth in BVR engagements has enormous implications for air oper-
ations. As John Stillion notes,
This transformation may be steadily reducing the utility of some
attributes traditionally associated with fighter aircraft (e.g., ex-
treme speed and maneuverability) while increasing the value of at-
tributes not usually associated with fighter aircraft (e.g., sensor
and weapon payload as well as range). Aircraft performance attri-
butes essential for success in air-to-air combat during the gun and
early missile eras such as high speed, good acceleration, and ma-
neuverability are much less useful now that aircraft can be de-
tected and engaged from dozens of miles away. At the same time,
nontraditional attributes such as minimal radar and IR signature;
space, payload, and cooling capacity; power for large-aperture
long-range sensors; and very-long-range weapons seem to be of
increased importance.
Ibid., iii; see also Watts, Precision Strike, 144–45.
514 Notes to Pages 393–396
23. The U.S. fleet at the time comprised 17 battleships, 7 carriers, 18 heavy
cruisers, 19 light cruisers, 6 anti-aircraft cruisers, 171 destroyers, and 114
submarines. “U.S. Navy in Late 1941,” WW2-Weapons.com, accessed Febru-
ary 14, 2022, https://ww2-weapons.com/us-navy-in-late-1941.
24. Dick Cheney, Secretary of Defense, Annual Report to the President and the
Congress (Washington, D.C.: Department of Defense, February 1992), 138;
Gillespie, “Precision Guided Munitions,” 203; Lambeth, Air Power, 160;
Hallion, “New Era of Warfare,” 9.
25. P. G. Halpern, A Naval History of World War I (London: UCL Press, 1994),
7–20.
26. Doughty, Breaking Point, 247–49.
27. Alan Clark, Barbarossa: The Russian-German Conflict, 1941–1945 (New York:
Quill, 1965), 80–82.
28. Hughes, Fleet Tactics, 118.
29. Hone, Friedman, and Mandeles, Aircraft Carrier Development, 162.
30. Ibid., 125.
31. “BCG Matrix: Portfolio Analysis in Corporate Strategy,” Business-to-You, ac-
cessed February 14, 2022, https://www.business-to-you.com/bcg-matrix.
32. Michael E. Porter, “The Competitive Advantage of Nations,” Harvard Busi-
ness Review, March–April 1990, 73.
33. George Stalk, Jr., “Time—The Next Source of Competitive Advantage,”
Harvard Business Review, July–August 1988, 41.
34. Kotter, “Leading Change,” 63.
35. Bower and Christensen, “Disruptive Technologies,” 47, 53.
36. Porter, “Competitive Advantage,” 75.
37. Kotter, “Leading Change,” 59.
38. Porter, “Competitive Advantage,” 75.
39. Ibid.
40. Bower and Christensen, “Disruptive Technologies,” 50.
41. Kotter, “Leading Change,” 64.
42. Ibid., 60, 66.
43. Bower and Christensen, “Disruptive Technologies,” 44, 50.
44. The term “pickle barrel accuracy” originated in the 1930s when the U.S.
Army Air Corps developed the Norden Bombsight, which a pilot could use
to “drop a bomb in a pickle barrel at 30,000 feet.” As it turned out, during
World War II, the combination of trained bombardier and bombsight failed
to achieve anything close to the predicted results. Ironically, the bombsight
was used in dropping the atomic bomb on the city of Hiroshima, Japan, in a
situation where accuracy was of negligible importance. Christopher Kratzer,
“The Enigma of the Norden Bombsight,” Maxwell Air Force Base, January
20, 2012, https://www.maxwell.af.mil/News/Display/Article/420450/the-
enigma-of-the-norden-bombsight.
45. Bower and Christensen, “Disruptive Technologies,” 49.
518 Notes to Pages 431–435
10. Although the Summer Study lasts less than two weeks, a great deal of prepa-
ratory work is done prior to the event. A successful Summer Study finds the
chairperson arriving with what amounts to a rough draft of the final out-
brief, which is then subjected to rigorous scrutiny by the study members.
11. Andrew F. Krepinevich, Jr., “How to Deter China: The Case for Archipe-
lagic Defense,” Foreign Affairs 94 (March–April 2015): 78–86.
12. Andrew F. Krepinevich, Jr., Archipelagic Defense: The Japan-U.S. Alliance and
Preserving Peace and Stability in the Western Pacific (Tokyo: Sasakawa Peace
Foundation, 2017).
13. The Group of Five includes Australia, France, Great Britain, Japan, and the
United States. India was invited to participate but declined.
14. Mattis, National Defense Strategy, 3.
15. National Defense Strategy Commission, “Providing for the Common De-
fense,” U.S. Institute of Peace, x, 19. I served on the commission.
16. David E. Johnson, “Shared Problems: The Lessons of AirLand Battle and
the 31 Initiatives for Multi-Domain Battle,” Rand Perspective, August 2018, 6.
In critiquing the Army’s Multi-Domain Operations concept, one of the peo-
ple involved in crafting the AirLand Battle doctrine, Brigadier General (Re-
tired) Huba Wass de Czege, noted the absence of a “well-developed theory
of the problem” (e.g., What adversary are we trying to deter or defeat, in
what theater, and under what circumstances? What enemy advantages must
be overcome? What enemy weaknesses can be exploited?). He went on to
note the absence of a “theory of victory” (e.g., What is the operational con-
cept intended to accomplish against the enemy that has been identified? In
the case of AirLand Battle, the goal was to deter an attack on NATO by de-
feating Warsaw Pact armies, with emphasis on its front-line forces, whereas
the Multi-Domain concept is focused on a “generic” threat). Wass de Czege
also lamented the “use of vague language [that] confounds the reader’s un-
derstanding of the concept. For example, the frequent use of ill-defined
terms such as standoff and domain confuse the already thin logic of the con-
cept.” Huba Wass de Czege, Commentary of the U.S. Army in Multi-Domain
Operations in 2028 (Carlisle, Pa.: U.S. Army War College Strategic Studies
Institute, April 2020), xix, xx, 16, 38–39.
17. Colin Clark, “Gen. Hyten on the New American War of War: All-Domain
Operations,” Breaking Defense, February 18, 2020, https://breakingdefense
.com/2020/02/gen-hyten-on-the-new-american-way-of-war-all-domain-
operations.
18. Theresa Hitchens, “JROC Struggles to Build ‘Information Advantage’ Re-
quirement,” Breaking Defense, September 17, 2020, https://breakingdefense.
com/2020/09/jroc-struggles-to-build-information-advantage-requirement.
19. Thomas C. Greenwood and Patrick J. Savage, “Concept for Joint Warfight-
ing,” Institute for Defense Analysis, Spring 2021, https://www.ida.org/
research-and-publications/publications/all/w/we/welch-award-2020-research-
notes-spring-2021.
520 Notes to Pages 438–440
521
522 Index
Air Tasking Order (ATO), 39 75–76, 79–82; China’s use of, 48, 75–
air-to-air missiles (AAMs), 39–40; and 76, 77, 79; land-based, 77; and lasers,
beyond-visual-range engagements, 137; Russia’s use of, 76, 77; space junk
378–79; as used in the First Gulf War, as challenge for, 79–80; U.S. military’s
40; as used during the Vietnam War, use of, 77–78
351–52, 353–54 anti-submarine warfare (ASW), 64
air warfare: ambush tactics as used in, Aphrodite: as code name for guided
345; disruptive shifts in, 367–68, 379– weapons program, 345–46
80, 395–98; and electronic identifica- Arab states: defeat of, in the Six-Day
tion of friend or foe (IFF), 380–81, War, 156
511–12n143; in the First Gulf War, Arbatov, Alexi, 148
343, 388, 389–93; in the Middle East, Arbuthnot, Robert, 253
381–84; situation awareness as factor Ardennes Forest: German offensive in,
in, 344–45, 357, 364, 405; success in, 286–87
344; technological advances relating Argus (British carrier), 298
to, 367, 379–80, 386; in the Vietnam Ark Royal (British carrier), 337
War, 164, 351–53, 359–60; in World armistice. See Versailles Treaty
War II, 345; in the Yom Kippur War, armor, 23; and ironclad naval vessels,
361. See also naval aircraft; pilot train- 28–29; effectiveness of, 26; vulnera-
ing; U.S. Air Force bility of, 40
Allen, Lew, Jr., 373 Army Missile Command (MICOM),
Allies (in World War II): casualties suf- 354
fered by, 291; early defeats suffered Arnold, Henry “Hap,” 349, 505n14
by, 285–86, 291, 295 Arnold-Forster, Hugh Oakeley, 190
Allison, Graham, 142 artificial intelligence (AI), 4, 20, 87–90,
AlphaGo, 88, 89 92–93, 139, 140; barriers to imple-
AlphaGo Zero, 88 mentation of, 103–6; advanced persis-
Amazon: artificial intelligence and ma- tent threats generated by, 99–100;
chine learning as used by, 102 advances in, 88–90; autonomous
American Revolution, 14 decision-making enabled by, 89–90,
Ames, J. S., 302 99–100; future of, 106; military
anti-access/area-denial (A2/AD) implications of, 90–93, 102–3, 106,
reconnaissance-strike complexes, 4, 140; risks associated with, 105, 106,
12, 125, 446n9; cyber strikes as aspect 140; as used by China, 49; as used in
of, 53; overlapping, 50, 52; and cyber attacks, 99–100; as used in
hypersonic weapons, 128; integrated cyber defense, 100–102; as used
response to, 69–70; as a twenty-first- in military logistics, 102–3; as used
century “no man’s land,” 50–51; as in scouting, 56, 61; as used in swarm
used by China, 19, 46–47, 49–50, 69. technology, 93–96; as used with
See also reconnaissance-strike com- satellites, 74
plexes; scouting; strike forces artificial stupidity, 104
anti-radiation missiles (ARMs), 352 Artillery Revolution, 16
anti-satellite (ASAT) capabilities: as Asquith, Herbert Henry (H. H.), 221–
competition between adversaries, 22, 223; and CID investigation of
Index 523
Fisher, 236, 237, 238–39; as prime Battenberg, Louis, 188, 246, 482n69,
minister, 232, 238–39, 242, 247, 250 488n240; on the deployment of sub-
Asquith, Violet, 242 marines, 190
Astroscale, 74 battle cruisers: as aspect of Fisher’s
Atlantic, Battle of the, 36, 420 Scheme, 203, 205, 206, 209, 210–14,
attrition strategies: downside of, 68, 69; 240–41; and Fisher’s plunging strat-
examples of, 68–69 egy, 218, 219–20, 223; speed and
Aube, Hyacinthe, 172–73, 174 range of, 211, 213–14; as used in
Auftragstaktik (mission tactics), 258, World War I, 250–51
491n12 battle damage assessment (BDA): chal-
Ault, Frank W., 357 lenges of, 57–58
Austin, Lloyd, 438 battle networks, 3, 39, 54, 445n2; ad-
Austria: Germany’s annexation of, 281 vances in, 397–98; importance of,
Austro-Hungarian Navy, 242 379–80
autonomous weapons, 89–90 battleships: aircraft carriers’ taking pre-
autonomy: and artificial intelligence, cedence over, 338–39; and challenges
89–90 to Britain’s maritime superiority, 179,
Azons (azimuth-only glide bombs), 346, 185, 212; defensive effectiveness of,
347, 506n16 340–41; eclipse of, 34, 35, 36, 164; in
fleet maneuvers, 174, 184; long-range
B-1 bombers, 376 gunnery capacity of, 31; as response
B-2 bombers, 376 to the threat of the Triple Alliance,
B-17 bombers, 343 243–44; role of, in World War II,
B-29 bombers, 343 340–41, 419; Royal Sovereign class of,
B-52 bombers: as employed in the 171, 183; speed as critical for, 29–30,
Vietnam War, 360 32; submarines as threat to, 189–90;
Bacon, Francis, 400 technological advances in, 29–30
Bacon, Reginald, 29, 191–92, 212, 226, Baylis, Françoise, 116–17
240, 246, 403; as supporter of Fisher’s Beatty, David, 251
Scheme, 240–41 Beck, Ludwig, 260, 272, 276, 277, 278,
Baker, Jim, 85, 86 280, 292
Balck, Hermann, 289 BeiDou Satellite System (BDS), 72
Baldwin, Stanley, 367 Ben-Eliyahu, Eytan, 364
Balfour, Arthur, 191, 200 Benson, William S.: as chief of naval op-
Balkan War (1998), 18 erations, 299, 300, 302
Ballard, George, 228, 237; and the Beresford, Charles, 182, 206, 220, 230,
Système Ballard, 186; war plans de- 406; as Fisher’s admirer, 200; as
veloped by, 228, 245 Fisher’s adversary, 217, 227–28, 235–
Ballard Committee: as the basis for 36; Fisher’s opinion of, 187–88; as
Fisher’s war plans, 228, 231 maverick reformer, 175–76; as mem-
ballistic missiles, 125; as used in World ber of Parliament, 176, 178
War II, 35 Beresford, John, 175
Barkhorn, Gerd, 345 Berlin, Germany: Red Army’s conquest
Barros, Richard, 99 of, 68
524 Index
Brown, Harold, 10, 86, 368, 370, 386, Castlereagh, Robert, 177
417, 422 catalytic war, 152–53
Bullpup air-to-surface missiles: as used Cawdor, Earl of, 205
in the Vietnam War, 353–54 Center for Strategic and Budgetary
Bureau of Aeronautics (BuAer): Moffett Assessments (CSBA), 434–35
as head of, 302, 305–6, 307–8, 312, Chamberlain, Austen, 199
313, 314, 315, 319–20, 321, 328, 330, Charlie B. See Beresford, Charles
333, 334; and naval aviation, 302, Checkered Flag: as implemented by
305–7, 324, 326, 330; and plans for a Creech, 375
dive-bomber, 311; and tensions with Cheney, Dick, 385
the Bureau of Navigation, 333–35 China: A2/AD complex as used by, 19,
Bureau of Navigation (BuNav): and ten- 46–47, 49–50, 69; anti-satellite capa-
sions with the Bureau of Aeronautics, bilities of, 48, 75–76, 77, 79; expan-
333–35 sionist actions of, 156;
Bush, George H. W., 386 informationalized warfare as prac-
business organizations: as analogous to ticed by, 47–48; intelligentized war-
military organizations, 423–28; dis- fare as practiced by, 49; Japan as
ruptive innovation as applied to, 423– adversary of, 65; Japan’s invasion of,
28; and emerging technologies, 426, 331; as nuclear power, 17–18, 145–46;
427; and experimentation as analo- policy of, regarding nuclear deter-
gous to field exercises, 426–27; mea- rence, 148–49; present-day focus of,
sures of effectiveness in, 428; and new 3–4, 47–50; scouting competition as
operational concepts, 426–27; and re- viewed by, 52; space-based navigation
sistance to change, 425–26, 516n17 system used by, 72; space junk gener-
Butler, Henry V., 319 ated by, 79–80; swarm technology as
Buzz (open-source programming lan- developed by, 94–95; and tensions
guage), 97 over Taiwan, 18; as threat in space,
75–76; and U.S. response to the
C-130 cargo planes: as communications- PLA’s A2/AD complex, 49–50. See also
jamming aircraft, 378 People’s Liberation Army
Callaghan, George, 245, 246 Chinese Communist Party (CCP),
Campbell-Bannerman, Henry, 220, 222 48–49
Canada: the Royal Navy’s position on, Chow, Jerry, 133–34
194 Christensen, Clayton, 15, 425, 427
Canby, Steven, 385 Churchill, Winston, 125, 141, 201, 214–
Cape Matapan, Battle of, 337 15, 218, 234; on Beresford, 238; as
Cardillo, Robert, 74 first lord of the Admiralty, 233, 241–
Carlucci, Frank, 142 44, 245–47, 248, 256; as Fisher’s ally
carrier task force, 297, 305, 309, 315, and admirer, 241–42, 253, 422,
318, 339, 325–26, 341; radar as factor 488n240; Fisher’s disputes with, 249–
in, 325–26, 405. See also aircraft 50; and Fisher’s strategy of plunging,
carriers 219–20; on the German military, 290;
Carroll, Lewis, 429 as prime minister, 289; on war, 143,
Carter, Jimmy, 368 144; on World War I, 259
526 Index
circular error probable (CEP): as mea- counter-scouting measures, 23, 33, 55–
sure of a weapon’s accuracy, 23, 35, 56, 445n2. See also scouting
38–39; for unguided bombs, 347 Creech, Wilbur (“Bill”), 342, 384, 386,
Citino, Robert, 276, 290, 295 441; background of, 372; as head of
Civil Aeronautics Authority (CAA), 335 the Tactical Air Command, 372–74,
Civil War, U.S.: impact of rifling on, 25; 403, 404; opposition to programs
and the sea battle between the supported by, 385; night fighting as
Monitor and the Virginia, 28; the tele- advocated by, 378–79, 395; and sup-
graph as used during, 24; trench war- pression of enemy air defenses
fare during, 25 (SEAD), 372, 373, 376, 395, 402–3,
Clark, Alan, 419 407; and transformation of the Air
Clark, Frank H., 321–22 Force, 372–76, 395–96
Clarke, George, 220 crisis stability, 476–77n8
code-breaking: quantum computing as CRISPR-Cas9, 86, 113, 114–16; applica-
used for, 132–33; as used in warfare, tions of, 116; commercialization of,
36 120; and facilitating of gene modifi-
Cohen, William, 22, 385 cation, 119; limitations of, 117; risks
Cold Harbor: Grant’s assault at, 25 associated with, 118–20, 124, 151. See
Cold War: decoys used during, 64; mili- also biological weapons; gene editing
tary strategy following the end of, cryptography: as applied in warfare, 32,
142–43; principal operational chal- 36; as used by the British in World
lenge during, 431; and threat of War I, 32
Soviet anti-ship missiles, 127 Cuban Missile Crisis, 157, 158–59
Cole, William C., 318 CubeSats, 73, 74, 81, 82
Colomb, John, 178 Currie, Malcolm, 369, 372
Combat Tree: program for identification Curtiss F6C Hawks, 310–11
of enemy aircraft, 381 Curtiss Helldiver fighter (U.S. Navy),
Committee of Imperial Defence (CID), 266
200–201; investigation of Fisher by, cyber defense: artificial intelligence as
236–40 applied in, 100–102
computer-aided design (CAD) software, Cyber Hunting at Scale (CHASE), 101
112 cyberspace: as domain for military com-
Condor Legion, 283–84, 412 petition, 47–48, 68, 152; as domain
Cook, Arthur B., 321, 324 for scouting activity, 56
Coolidge, Calvin, 306–7 cyber warfare, 139, 140; artificial intelli-
Coral Sea, Battle of the, 335, 338 gence as applied in, 99–102; against
Corbett, Julian, 228, 230 critical infrastructure, 151; and
Corder, John, 396 denial-of-service attacks, 466n57;
corporate sector. See business implications of, for nuclear deter-
organizations rence, 147, 153; by nonstate forces, 82
Corum, James, 267, 493n61 Cyert, Richard, 155
Counter-electronics High-powered
Microwave Advanced Missile Project Daniels, Josephus, 297, 300, 301, 329
(CHAMP), 138 Dark Knight, The (film), 153–54
Index 527
Davidson, Philip, 442; and Chinese ag- Russian policy regarding, 148; and
gression in the Western Pacific shifting military balance, 150; shrink-
Theater of Operations, 437–38 ing attack timelines as factor in, 149–
Davis, Joe, 354–55 50; under the Trump administration,
decision-making, human: factors enter- 144. See also nuclear weapons
ing into, 154–59, 478–79n27 Deutscher, Isaac, 85
decoys: as employed in scouting, 55, Deutschland (German battleship), 219
63–64; as employed prior to the Dewar, Kenneth, 245
Normandy invasion, 64 digital range frequency memory
deep learning systems, 91 (DRFM), 55
DeepMind team (Google), 88 Dill, John, 264
Defense Advanced Research Projects directed-energy systems (lasers), 4, 20,
Agency (DARPA), 101, 126, 367, 369; 135, 136–38; barriers to implementa-
and stealth bombers, 372 tion of, 138–39; Chinese, 137; costs
defense budgets, U.S.: after the Soviet of, 138; Israeli, 137; Russian, 137
Union’s collapse, 18 disruptive innovation: and advances in
Defense Department (U.S.), 142–43, technologies, 404–5, 426, 427; in air
436–37 warfare, 367–68, 379–80, 395–98; an-
defense industrial base (DIB): artificial ticipation of, 3, 5; assessment of, as
intelligence as used by, 109 applied to modern warfare, 4–5, 443;
Defense Nuclear Agency, 367–68 Blitzkrieg as example of, 294–95, 420,
Defense Reform Movement (DRM), 421; and the challenge of deterring
393, 394–95; and resistance to Air war, 142; characteristics common to
Force efforts toward innovation, 384– military organizations that benefited
86, 512n151 from, 401; in the corporate world,
Dempster, Kenneth, 507n38 15–16, 423–28; exercises and experi-
Deptula, David, 386, 387, 388, 389, 393, mentation as part of, 410–12, 426–27;
395 and extended leader tenure, 403–4;
Desert Storm. See First Gulf War and the First Gulf War, 399; guiding
destruction, democratization of, 96–98, vision as critical for, 401–3, 425; in
140; and nonstate actors, 153–54; in historic perspective, 23; and the im-
the nuclear era, 144; and the use of pact of a small shift in structure and
biological weapons, 119–22 equipment, 417–18; and innovative
deterrence strategies, 143; and the chal- operational concepts, 406–7, 410,
lenge of developing, 154–59; Chinese 426–27; and limitations to the guid-
policy regarding, 148–49; and cyber- ing vision, 418–21; and military effec-
warfare, 147, 153; honor and fairness tiveness, 3, 6, 12–13, 401–7, 418;
as factors in, 158–59; human ongoing need for, 443; resistance to,
decision-making as a factor in, 154– 370–72, 384–86, 406, 411, 425–26; in
59; in a multipolar nuclear world, response to periods of military
145–46; as a multidimensional com- change, 22–23, 184; serendipity as
petition, 146–49; in the nuclear age, factor in, 421–22; situational charac-
143–45; under the Obama adminis- ter of, 294; strategic significance of,
tration, 144; objectives of, 144, 146; 4–5; strategies for advancing, 412–14;
528 Index
180; submarines as used by, 184, 188; mechanization of, 33–34, 164, 255,
warships developed by, 169–70 261, 266, 268, 269, 271–72, 273–76,
French Revolution (1789), 14 277, 278, 279, 292–93, 295, 405, 406–
Fritsch, Werner von, 260, 263 7, 415, 417, 494n74; and military
Fritz-X (radio-guided bomb), 346, equipment from other countries, 270;
506n16 officer training in, 269; panzers as
Fromm, Fritz, 279 critical to, 33–34, 269, 271–72, 277,
Fuller, J. F. C., 262 278–82, 294, 402, 411–12, 414, 428;
radio communication as used by,
Galileo (European space-based naviga- 275–76, 282, 405; rearmament of,
tion system), 72 under Hitler, 268–69, 270–71, 273,
Gates, Robert, 135 277; scouting as employed by, 423;
Gatling guns, 26 second-move advantage as used by,
GE Aviation: 3D printing as used by, 416; speed and range as priority for,
108–9 422; strategic bombing as employed
gene editing, 86, 114–16; applications of, by, 264, 266, 268; transformation of,
116; of human embryos, 117–18; mil- as modeled on the British military,
itary implications of, 116–25. See also 262–64; after the Versailles Treaty,
biological weapons; CRISPR-Cas9 255, 258, 262, 264, 268–69, 273, 293,
gene-drive research, 115–16 413, 415, 421; von Seeckt’s vision
General Board (U.S. Navy), 297; and the for, 259–60, 402, 421–22; war games
role of aviation in maritime opera- conducted by, 263, 274. See also
tions, 297, 300, 302. See also U.S. Luftwaffe; Wehrmacht; World
Navy War II
geography: as factor in strategic advan- German Navy: Dreadnought as threat to,
tage, 65 219; Royal Navy’s war plans directed
George V, King, 239 at, 228–32; shipbuilding plans of, 242,
German Air Service. See Luftwaffe 244; as threat to Britain, 66, 193,
German military: aircraft production 195–96, 242–44, 245, 490n267; torpe-
system of, 267; air-land warfare does as employed by, 191; U-boats as
(“Blitzkreig”) pursued by, 4, 17, 255, employed by, 249
264, 282–84, 290, 292–95, 406–7, Germany: commercial aviation in, 272–
415, 418–19, 421; air power as em- 73; and withdrawal from the League
ployed by, 264–68, 405; and of Nations, 268
Barbarossa campaign in Russia, 418– Gettysburg: Pickett’s Charge at, 25
19; disruptive innovation pursued by, Gingrich, Newt, 385
164, 294–95; field maneuvers con- Ginkgo Bioworks, 124
ducted by, 261–62, 273–76, 410, 411– Gladstone, William, 201
12; guided weapons as employed by, Global Positioning System (GPS), 9; de-
346; infiltration tactics used by, 255– velopment of, 380; as factor in dis-
56; internal reassessment of, 257–61; ruptive shift in air warfare, 380, 405;
and invasion of Russia, 418–19, 420; as global utility, 72; limitations of,
and lack of motorized infantry, 418– 419; as used in the First Gulf War,
19; measures of effectiveness for, 408; 391, 419; vulnerabilities of, 76–77
532 Index
Islamist extremist groups: as focus of the Global War on Terror, 442; indepen-
U.S. military, 18, 19 dent assessment of, 440–41
Ismay, Hastings, 290 Joint Standoff Weapons (JSOWs), 397,
Israel: and attack on Syrian nuclear reac- 515n198
tor, 147; and the Six-Day War (1967), Joint Surveillance Target Attack Radar
156 System (JSTARS), 9, 380, 405
Israeli Air Force (IAF), 385; and the Joint Warfighting Concept (JWC), 437,
Bekaa Valley engagements, 381–82, 438; problems inherent in, 439
385–86, 411; in the Yom Kippur War, Jones, David C., 365, 366, 369, 370, 372–
361, 362 73, 374
Israeli Defense Force (IDF), 51, 465n35; Jumper, John, 364, 374
and the Yom Kippur War, 361
Italian Navy, 179, 242 Kagan, Donald, 158
Ivry, David, 385 Kahneman, Daniel, 155
kamikazes, 35, 346–47, 451–52n43,
jamming. See electronic jamming 506n17
Japan: China as adversary of, 65; China Kanehara, Nobukatsu, 436
invaded by, 331 Ke Jie, 88
Japanese Navy, 179, 185, 192–93, 194; Kelly, Jason, 124
aircraft carrier arm of, 423; battle- Kennedy, John F., 37, 71, 72, 159,
ships developed by, 212; and defeat of 458n51
the Russians at Tsushima, 197, 207, Kennedy (aircraft carrier), 383
221, 224–25; and disruptive innova- Kerr, Walter, 200
tion, 423, as principal rival of the U.S. Kesselring, Albert, 266, 283, 493n48
Navy, 303; torpedoes as used by, 225 Kessler Syndrome, 80
Japanese Self-Defense Force, 65 Khrushchev, Nikita, 157, 158–59
Jellicoe, John, 245, 403, 488n240 Kimmel, Husband E., 337–38
Jeschonnek, Hans, 493n48 King, Ernest J., 299, 321, 323–25, 332; as
Jeune École, 173, 174 chief of naval operations, 338, 339; as
Johnson, Alfred W., 333 head of the Bureau of Aeronautics,
Johnson, David: on the lack of an opera- 326
tional concept, 436–37 Kirk, William, 359
Johnson, Lyndon, 351, 357 Kissinger, Henry, 156, 359
Johnston, Joseph E., 25 Kitchener, Lord Horatio Herbert, 196
Joint Air-to-Surface Standoff Missile Kleist, Ewald von, 287, 290
(JASSM), 515 Kondratiev, Nikolai, 467n74
Joint Army-Navy Exercise, 320 Knauss, Robert, 265
Joint Concept for Access and Maneuver Knollys, Francis, 201
in the Global Commons (JAM-GC), Korean War: Chinese losses in, 457n46;
435 and Chinese offensive against U.S.
Joint Direct Attack Munitions (JDAMs), forces at Chosin, 68; guided weapons
397, 515n198 as used during, 347–48
Joint Forces Command (JFCOM): dises- Korenevskiy, N., 71
tablishment of, 434, 441; and the Kosmotras (Russian satellite company), 73
Index 535
U.S. Air Force: and air warfare in the sophistication, 49–50; the Royal
Vietnam War, 164, 351–53, 359–60; Navy’s position on, 194–95. See also
barriers to change in, 370–72; battle Defense Department (U.S.); deter-
network as employed by, 409; and rence strategies; First Gulf War;
beyond-visual-range engagements, precision-warfare regime, mature;
39–40, 378–79, 391, 392, 409; buildup U.S. Air Force; U.S. Navy; Vietnam
of, under Reagan, 376–78; China’s War; World War I; World War II
PLA Air Force as rival of, 421; U.S. Navy, 18, 192; aircraft carriers built
Creech’s vision for, 402–3, 374–76; by, 312–13, 414; and aircraft carrier
and disruptive innovation, 422; and force, 296–97, 315–16, 319–25, 326–
First Experimental Guided Missiles 27, 337–39, 405, 409, 415, 417, 419;
Group, 347; first-move advantage as aircraft bombing tactics used by, 310–
pursued by, 417; focus of training in, 11, 336; aircraft factory built by, 329,
349–50; guided weapons as employed 330; and assessment of aviation’s role
by, 393–9, 397, 409; jammers as em- in wartime, 336–37; aviation’s poten-
ployed by, 377; laser-guided bombs tial as part of, 297–99, 303–5, 315–16,
developed by, 354–56; Maverick de- 317, 320–25, 414; aviation budget for,
veloped by, 356–57; measures of ef- 327–32; and aviator recruitment and
fectiveness for, 409–10; in the nuclear training, 332–35; battleships of, 30,
age, 348–49, 350–51; Pave Strike pro- 212, 296, 340–41; carrier task force as
gram, 377; pilot training for, 358–60, used by, 407; combat aircraft devel-
363–66, 374–76, 399; precision- oped by, 331; and constraints im-
guided munitions as employed by, posed by the Washington Naval
409; under Reagan, 376–78; Red Flag Treaty, 303, 312, 314–15, 413, 421;
exercises conducted by, 364–66, 374– debate surrounding aviation’s role in,
75, 376, 410, 411; resistance to 298–303, 321, 323–25; dive-bombers
change within, 384–86; successes of, as employed by, 310–11, 315, 317,
against Iraq, 343; suppression of 321, 335–36, 338; fleet problems con-
enemy defenses as goal of, 372, 373, ducted by, 307–11, 410–11; Fleet
376, 395, 402–3, 407; swarm technol- Problem I, 308; Fleet Problem V,
ogy as used by, 94; technological ad- 308; Fleet Problem VI, 309; Fleet
vances as critical for, 405; three Problem VII, 310; Fleet Problem IX,
commands of, 348–49. See also air 316–17, 318, 411; Fleet Problem X,
warfare; First Gulf War; stealth 317–19; Fleet Problem XI, 318–19;
aircraft Fleet Problem XII, 319; Fleet
U.S. Army Air Corps: and success rate Problem XIII, 320–21; Fleet Problem
of bombers during World War II, XIV, 321–22; Fleet Problem XVIII,
342–43 323–24; Fleet Problem XIX, 324–25;
U.S. Army Air Force: during World War flying-deck cruiser proposed for,
II, 292, 423–24 313–14; Laser Weapon System of,
U.S. military: assessment of, in relation 137; measures of effectiveness for,
to rival militaries, 429–30, 442–43; 408–9; and Operation Linebacker,
dominance of, 17–19, 194; response 359–60; pilots needed for, 332–35;
of, to China’s growing military pilot training developed by, 357–58,
Index 547