The document discusses China's development of anti-access/area denial (A2/AD) capabilities designed to disrupt U.S. power projection in the western Pacific. It analyzes the operational implications of Chinese A2/AD, including ballistic missiles threatening air bases, anti-ship missiles restricting carriers, and integrated air defenses challenging air superiority. It argues the U.S. must address any imbalance between the military objective to defend Taiwan and its ability to achieve that objective against China's A2/AD systems, such as by developing joint concepts like Air-Sea Battle to ensure freedom of movement in contested areas.
The Defense Industrial Base: Issues to be Considered and Recommendations - Dr...GLOBAL HEAVYLIFT HOLDINGS
The Project on National Security Reform (PNSR) Vision Working Group is recommending the establishment of a Center for Strategic Analysis and Assesment (CSAA) within the Executive Office of The President (EOP) in the White House. This center will use foresight tools among many others to improve this decision making process in the EOP. The following scenario explores the use of one of those tools, and because of the current climate, we are sharing this with you. An updated version of this scenario to reflect existing technological, operational and geo-political realities will be a part of an upcoming publication soon to be released by the PNSR.
The Vision Working Group leader, Dr. Sheila R. Ronis, wrote this in conjunction with supporting data from public sources. Her latest book "Timelines Into The Future: Strategic Visioning Methods For Government, Business, And Other Organizations" is available through the following link:
http://www.amazon.com/s/?ie=UTF8&url=search-alias%3Dstripbooks&tag=flipkartcom-20&field-keywords=timelines+into+the+future+sheila+r+ronis
Future Defense Industry Scenarios’
By Sheila Ronis, Leader of the PNSR Vision Working Group
Wednesday, April 30, 2008; 2:30 PM - 4:00 PM
Hudson Institute, Betsy and Walter Stern Conference Center
1015 15th Street, N.W., 6th Floor
Washington, D.C. 20005
Introduction
Future scenarios such as this are designed to unlock the mind from its preconceptions in the hope of revealing undiscovered insights. This process can make some futures appear less plausible that have more or less been taken for granted, and prepare decision-makers to look for signs of likewise unexpected futures. To be clear: the goal is not to predict the future. Rather, it is to think about the future and to be better prepared for it as the future unpredictably unfolds
.
Weaknesses in our defense industrial base supply chain, dependency on third-party vendors, continual disregard for the Berry Amendment, and lack of foresight regarding the interplay between global economy and national security are the root causes of failure in this scenario.
The task is to ensure that the vulnerabilities we highlight are never capitalized on. Doing so will require a shift from hindsight to foresight. Indeed, the necessary prerequisite of creating a better, safer national security environment for tomorrow starts with the ability to envision it. While drawing on lessons from history is certainly important, nowhere in the United States government will you find personnel dedicated exclusively to overarching strategy with a long-term view. It is imperative to remedy this in order to avoid disastrous consequences, and reduce risks – both potential and real.
The 9-11 Commission Report concluded that the devastating attacks in September 2001 were due primarily to a failure of imagination and to leaders who did not fully understand the gravity of the threat we faced. One of the most compelling aspects about the following case study is that although it takes place in the future, it relies very little on imagination. This scenario is not about fantasy or prediction but practical reasoning and logical deduction. To be sure, the framework required for disaster in this scenario to unfold is largely set.
Creating an Opportunity
During the course of the last 30 years, the Chinese have infiltrated critical elements of the U.S. industrial base, which is, of course, inseparable from the defense industrial base. In addition to targeting automotive, aerospace and specialty metals, they have paid particular attention to the electronics industry. Through mergers, joint ventures, outright acquisition and industrial espionage, they have gained access and control to sensitive technologies.
This is especially true in the area of electronic connectors, which are connective devices used to join electrical circuits together, and are absolutely critical to everything using power. For
Doctrine is an army’s game plan. Doctrine not only tells an army how to fight but it communicates intent from the institutional Army to the fighting forces. The progression that leads to doctrine stretches across a temporal “reverse highway” that begins well into the future with a vision of how future wars will be fought. At some point along the highway visioning solidifies into warfighting concepts. All too often, the concept phase of this journey is where dead ends and misleading road signs appear. Visioning is cheap and ephemeral. Concepts, on the other hand, tend to ossify ideas that eventually turn into opinions. Opinions, even false ones, are defended by those whose influences are at stake. Opinions lead to investments that launch programs. Eventually the highway ends at the doctrinal present as organizations and weapons emerge to provide the tools and formations to fight wars
The Defense Industrial Base: Issues to be Considered and Recommendations - Dr...GLOBAL HEAVYLIFT HOLDINGS
The Project on National Security Reform (PNSR) Vision Working Group is recommending the establishment of a Center for Strategic Analysis and Assesment (CSAA) within the Executive Office of The President (EOP) in the White House. This center will use foresight tools among many others to improve this decision making process in the EOP. The following scenario explores the use of one of those tools, and because of the current climate, we are sharing this with you. An updated version of this scenario to reflect existing technological, operational and geo-political realities will be a part of an upcoming publication soon to be released by the PNSR.
The Vision Working Group leader, Dr. Sheila R. Ronis, wrote this in conjunction with supporting data from public sources. Her latest book "Timelines Into The Future: Strategic Visioning Methods For Government, Business, And Other Organizations" is available through the following link:
http://www.amazon.com/s/?ie=UTF8&url=search-alias%3Dstripbooks&tag=flipkartcom-20&field-keywords=timelines+into+the+future+sheila+r+ronis
Future Defense Industry Scenarios’
By Sheila Ronis, Leader of the PNSR Vision Working Group
Wednesday, April 30, 2008; 2:30 PM - 4:00 PM
Hudson Institute, Betsy and Walter Stern Conference Center
1015 15th Street, N.W., 6th Floor
Washington, D.C. 20005
Introduction
Future scenarios such as this are designed to unlock the mind from its preconceptions in the hope of revealing undiscovered insights. This process can make some futures appear less plausible that have more or less been taken for granted, and prepare decision-makers to look for signs of likewise unexpected futures. To be clear: the goal is not to predict the future. Rather, it is to think about the future and to be better prepared for it as the future unpredictably unfolds
.
Weaknesses in our defense industrial base supply chain, dependency on third-party vendors, continual disregard for the Berry Amendment, and lack of foresight regarding the interplay between global economy and national security are the root causes of failure in this scenario.
The task is to ensure that the vulnerabilities we highlight are never capitalized on. Doing so will require a shift from hindsight to foresight. Indeed, the necessary prerequisite of creating a better, safer national security environment for tomorrow starts with the ability to envision it. While drawing on lessons from history is certainly important, nowhere in the United States government will you find personnel dedicated exclusively to overarching strategy with a long-term view. It is imperative to remedy this in order to avoid disastrous consequences, and reduce risks – both potential and real.
The 9-11 Commission Report concluded that the devastating attacks in September 2001 were due primarily to a failure of imagination and to leaders who did not fully understand the gravity of the threat we faced. One of the most compelling aspects about the following case study is that although it takes place in the future, it relies very little on imagination. This scenario is not about fantasy or prediction but practical reasoning and logical deduction. To be sure, the framework required for disaster in this scenario to unfold is largely set.
Creating an Opportunity
During the course of the last 30 years, the Chinese have infiltrated critical elements of the U.S. industrial base, which is, of course, inseparable from the defense industrial base. In addition to targeting automotive, aerospace and specialty metals, they have paid particular attention to the electronics industry. Through mergers, joint ventures, outright acquisition and industrial espionage, they have gained access and control to sensitive technologies.
This is especially true in the area of electronic connectors, which are connective devices used to join electrical circuits together, and are absolutely critical to everything using power. For
Doctrine is an army’s game plan. Doctrine not only tells an army how to fight but it communicates intent from the institutional Army to the fighting forces. The progression that leads to doctrine stretches across a temporal “reverse highway” that begins well into the future with a vision of how future wars will be fought. At some point along the highway visioning solidifies into warfighting concepts. All too often, the concept phase of this journey is where dead ends and misleading road signs appear. Visioning is cheap and ephemeral. Concepts, on the other hand, tend to ossify ideas that eventually turn into opinions. Opinions, even false ones, are defended by those whose influences are at stake. Opinions lead to investments that launch programs. Eventually the highway ends at the doctrinal present as organizations and weapons emerge to provide the tools and formations to fight wars
Augments crisis communication case study of Air Force's reaction to having lost six nuclear missiles in 2007. Find the presentation at http://storify.com/higginbomb/lost-missiles-and-lost-messages
“There is a certain feeling of courage and hope when you work
in the field of the air. You instinctively look up, not down. You
look ahead, not back. You look ahead where the horizons are
absolutely unlimited.”
– Robert E. Gross, Lockheed Chairman/CEO 1932–1961
On a summer day in 1955, ominous clouds darkened the skies over a remote
desert valley in the Western United States, reflecting international tensions
between the U.S. and the Union of Soviet Socialist Republics. In what had
become known as the Cold War, the two superpowers vied for supremacy in
the wake of World War II, waging a high-stakes game of brinksmanship as
each strove to discover the other’s strengths and weaknesses through overt and
covert means. The next bold step for the U.S. involved a spindly silver airplane,
innocuously designated U-2, undergoing preparations for its maiden flight in
the skies above central Nevada. Although this event took place without fanfare
and in utter obscurity, it heralded the beginning of an aeronautical technology
program that spanned more than six decades and showcased innovative aircraft
design and manufacturing techniques. Little did anyone realize at the time that
what had begun as a tool of Cold War necessity would evolve into a versatile
reconnaissance and research aircraft.
The U-2 program originated with a national requirement, an unsolicited
proposal, and studies championed by a panel of notable scientists tasked with
advising President Dwight D. Eisenhower on how the Nation might defend
itself against the threat of a surprise Soviet nuclear attack. To do this required as
much intelligence as possible on Soviet capabilities, but the Russian-dominated
USSR was a closed society that was virtually inaccessible to the outside world.1
British Prime Minister Winston Churchill once described Russia as “a riddle,
wrapped in a mystery, inside an enigma.”2
Global HeavyLift Holdings Cites “Absolute Need” For Commercial Boeing C-17(BC...GLOBAL HEAVYLIFT HOLDINGS
Paris, France -- As an addendum to its May 28, 2009 press releases, Global HeavyLift Holdings, LLC, a Florida incorporated and Defense Logistics Agency (DLA) listed (www.ccr.gov) entity with principal offices in Bloomfield Hills, Michigan, has announced a new emphasizing of plans to permanently augment the U.S. global supply chain with air as a transportation methodology. The strategy would involve utilizing both heavylift (commercial C-17) and standard lift aircraft (747-8F). Current projections suggest at least 300 aircraft in initial phases. (http://www.pressrelease365.com/pr/industry/aerospace/global-heavylift-bc-17-3455.htm )
“Sword of Damocles”
“China’s and South Korea’s virtual control of ocean-borne shipping, along with China’s rise as a blue water naval power capable of interrupting critical east-west ship transit lanes at will, signals an absolute need to neutralize a veritable ‘Sword of Damocles’ over the U.S. industrial base global supply chain,” says Myron D. Stokes, Managing Member.
Augments crisis communication case study of Air Force's reaction to having lost six nuclear missiles in 2007. Find the presentation at http://storify.com/higginbomb/lost-missiles-and-lost-messages
“There is a certain feeling of courage and hope when you work
in the field of the air. You instinctively look up, not down. You
look ahead, not back. You look ahead where the horizons are
absolutely unlimited.”
– Robert E. Gross, Lockheed Chairman/CEO 1932–1961
On a summer day in 1955, ominous clouds darkened the skies over a remote
desert valley in the Western United States, reflecting international tensions
between the U.S. and the Union of Soviet Socialist Republics. In what had
become known as the Cold War, the two superpowers vied for supremacy in
the wake of World War II, waging a high-stakes game of brinksmanship as
each strove to discover the other’s strengths and weaknesses through overt and
covert means. The next bold step for the U.S. involved a spindly silver airplane,
innocuously designated U-2, undergoing preparations for its maiden flight in
the skies above central Nevada. Although this event took place without fanfare
and in utter obscurity, it heralded the beginning of an aeronautical technology
program that spanned more than six decades and showcased innovative aircraft
design and manufacturing techniques. Little did anyone realize at the time that
what had begun as a tool of Cold War necessity would evolve into a versatile
reconnaissance and research aircraft.
The U-2 program originated with a national requirement, an unsolicited
proposal, and studies championed by a panel of notable scientists tasked with
advising President Dwight D. Eisenhower on how the Nation might defend
itself against the threat of a surprise Soviet nuclear attack. To do this required as
much intelligence as possible on Soviet capabilities, but the Russian-dominated
USSR was a closed society that was virtually inaccessible to the outside world.1
British Prime Minister Winston Churchill once described Russia as “a riddle,
wrapped in a mystery, inside an enigma.”2
Global HeavyLift Holdings Cites “Absolute Need” For Commercial Boeing C-17(BC...GLOBAL HEAVYLIFT HOLDINGS
Paris, France -- As an addendum to its May 28, 2009 press releases, Global HeavyLift Holdings, LLC, a Florida incorporated and Defense Logistics Agency (DLA) listed (www.ccr.gov) entity with principal offices in Bloomfield Hills, Michigan, has announced a new emphasizing of plans to permanently augment the U.S. global supply chain with air as a transportation methodology. The strategy would involve utilizing both heavylift (commercial C-17) and standard lift aircraft (747-8F). Current projections suggest at least 300 aircraft in initial phases. (http://www.pressrelease365.com/pr/industry/aerospace/global-heavylift-bc-17-3455.htm )
“Sword of Damocles”
“China’s and South Korea’s virtual control of ocean-borne shipping, along with China’s rise as a blue water naval power capable of interrupting critical east-west ship transit lanes at will, signals an absolute need to neutralize a veritable ‘Sword of Damocles’ over the U.S. industrial base global supply chain,” says Myron D. Stokes, Managing Member.
=====
Current Trends of Regulation against Sexual Expression: The Logic and Politics behind the Application of Obscenity, or Article 175 of the Criminal Code
=====
Yamaguchi Takashi, Link Law Office, Kito and Partners
In July 2014, Rokudenashiko, an artist and columnist, was arrested for “the crime of distributing obscene digital data,” which is regulated by Article 175 of the Criminal Code of Japan. The digital data in question was a three-dimensional scan of her own vagina, which was part of her activities as an artist. This was not an isolated incident. One month later, at a photography exhibition at the Aichi Prefectural Museum of Art, police forced changes to be made in the presentation of work by Takano Ryudai, specifically photographs showing exposed male genitalia. These two cases are examples of governmental authority being asserted in expressive activities when said activities take on the subject of sex, which raises questions about the regulation of culture. What is the relation between the freedom and regulation of expression? In this presentation, I will discuss the legal framework for the regulation of sexual expression in Japan, specifically the logic behind the obscenity charges brought against Rokudenashiko.
Deterrence in Depth: Shaping A Pacific Defense StrategyICSA, LLC
This presentation was given to Centre for Military Studies, University of Copenhagen in Copenhagen, Denmark by Dr, Robbin F. Laird on May 22, 2014.
The Danish Centre for Military Studies (CMS) was established on 1 April 2010. CMS carries out strategic research and provides research-based public sector services with a focus on topical military and defence and security policy issues and provides an organisational framework for interdisciplinary research cooperation between the University of Copenhagen, other research institutions and other relevant parties.
http://cms.polsci.ku.dk/english/about/
Captain Nick Walker on the Queen Elizabeth Class Aircraft CarriersICSA, LLC
This presentation was made by Captain Nick Walker of the Royal Navy on August 10, 2016 in Canberra Australia to a Williams Foundation seminar.
The Williams Foundation has held a seminar on new approaches to air-sea integration on August 10, 2016 in Canberra, Australia.
The Royal Australian Navy has had the ability to network and share situational awareness amongst the fleet for many years and the P-3s has been the only RAAF platform capable of being part of that network. The RAAF’s journey of networking its capability journey started more recently with the Hornet Upgrade Program and has accelerated with the introduction of capabilities like Wedgetail and Vigilaire. All of the RAAF’s fleet is now capable of linking into and contributing to an Air Layer of the Joint Battle management system.
With the advent of 5th Generation capabilities like the JSF and the new combat systems on the AWD as well as the design and development of the new combat systems for the Australia’s future frigates, Offshore Patrol vessels and Submarines, the ADF has a unique opportunity to influence and design in an unprecedented level of integration into the RAN’s and RAAF’s new platforms. That unprecedented level of integration should drive new thinking on the integration of air and sea power effects. The seminar is about examining the challenges and possibilities of the combat power in that future integrated force.
Air Force and Navy need to not only remediate existing deficiencies but take advantage of the transformative nature of fifth generation technology. The seminar aims to explore the art of the possible in future Air-Sea operations.
http://www.williamsfoundation.org.au/event-2230289
The Defense Industrial Base:Issues to be Considered and Recommendations - Dr....GLOBAL HEAVYLIFT HOLDINGS
The Project on National Security Reform (PNSR) Vision Working Group is recommending the establishment of a Center for Strategic Analysis and Assesment (CSAA) within the Executive Office of The President (EOP) in the White House. This center will use foresight tools among many others to improve this decision making process in the EOP. The following scenario explores the use of one of those tools, and because of the current climate, we are sharing this with you. An updated version of this scenario to reflect existing technological, operational and geo-political realities will be a part of an upcoming publication soon to be released by the PNSR.
The Vision Working Group leader, Dr. Sheila R. Ronis, wrote this in conjunction with supporting data from public sources. Her latest book "Timelines Into The Future: Strategic Visioning Methods For Government, Business, And Other Organizations" is available through the following link:
http://www.amazon.com/s/?ie=UTF8&url=search-alias%3Dstripbooks&tag=flipkartcom-20&field-keywords=timelines+into+the+future+sheila+r+ronis
Future Defense Industry Scenarios’
By Sheila Ronis, Leader of the PNSR Vision Working Group
Wednesday, April 30, 2008; 2:30 PM - 4:00 PM
Hudson Institute, Betsy and Walter Stern Conference Center
1015 15th Street, N.W., 6th Floor
Washington, D.C. 20005
Introduction
Future scenarios such as this are designed to unlock the mind from its preconceptions in the hope of revealing undiscovered insights. This process can make some futures appear less plausible that have more or less been taken for granted, and prepare decision-makers to look for signs of likewise unexpected futures. To be clear: the goal is not to predict the future. Rather, it is to think about the future and to be better prepared for it as the future unpredictably unfolds
.
Weaknesses in our defense industrial base supply chain, dependency on third-party vendors, continual disregard for the Berry Amendment, and lack of foresight regarding the interplay between global economy and national security are the root causes of failure in this scenario.
The task is to ensure that the vulnerabilities we highlight are never capitalized on. Doing so will require a shift from hindsight to foresight. Indeed, the necessary prerequisite of creating a better, safer national security environment for tomorrow starts with the ability to envision it. While drawing on lessons from history is certainly important, nowhere in the United States government will you find personnel dedicated exclusively to overarching strategy with a long-term view. It is imperative to remedy this in order to avoid disastrous consequences, and reduce risks – both potential and real.
The 9-11 Commission Report concluded that the devastating attacks in September 2001 were due primarily to a failure of imagination and to leaders who did not fully understand the gravity of the threat we faced. One of the most compelling aspects about the following case study is that although it takes place in the future, it relies very little on imagination. This scenario is not about fantasy or prediction but practical reasoning and logical deduction. To be sure, the framework required for disaster in this scenario to unfold is largely set.
Creating an Opportunity
During the course of the last 30 years, the Chinese have infiltrated critical elements of the U.S. industrial base, which is, of course, inseparable from the defense industrial base. In addition to targeting automotive, aerospace and specialty metals, they have paid particular attention to the electronics industry. Through mergers, joint ventures, outright acquisition and industrial espionage, they have gained access and control to sensitive technologies.
This is especially true in the area of electronic connectors, which are connective devices used to join electrical circuits together, and are absolutely critical to everything using power. For reasons u
Global HeavyLift Holdings, LLC, Cites “Absolute Need” For Commercial Boeing C-17(BC-17)-Based Permanent Air Augmentation Of U.S. Industrial Base Global Supply Chain: Notes China’s Virtual Control of Ocean-Borne Shipping and Rise As a Blue Water Naval Power Capable of Interrupting Critical East-West Ship Transit Lanes At Will
Acknowledges Exhaustively Researched “Battle of The South China Sea: 2011” Scenario by National Security Strategist Dr. Sheila Ronis as Source of Assertion
Global HeavyLift Holdings,LLC, Cites "Absolute Need" For Commercial Boeing C-...guestde926c4
Paris, France -- As an addendum to its May 28, 2009 press releases, Global HeavyLift Holdings, LLC, a Florida incorporated and Defense Logistics Agency (DLA) listed (www.ccr.gov) entity with principal offices in Bloomfield Hills, Michigan, has announced a new emphasizing of plans to permanently augment the U.S. global supply chain with air as a transportation methodology. The strategy would involve utilizing both heavylift (commercial C-17) and standard lift aircraft (747-8F). Current projections suggest at least 300 aircraft in initial phases. (http://www.pressrelease365.com/pr/industry/aerospace/global-heavylift-bc-17-3455.htm )
“Sword of Damocles”
“China’s and South Korea’s virtual control of ocean-borne shipping, along with China’s rise as a blue water naval power capable of interrupting critical east-west ship transit lanes at will, signals an absolute need to neutralize a veritable ‘Sword of Damocles’ over the U.S. industrial base global supply chain,” says Myron D. Stokes, Managing Member.
As part of our assessment of evolving PRC military capabilities, we have interviewed Rick Fisher, Jr., a leading expert on the PRC military. This brief is an excerpt of two longer briefs by Fisher and accompanies a Second Line of Defense interview.
A guided missile, known colloquially as an anti ship missiles market (AShM), is specifically engineered to thwart even the most well-equipped ships and other large vessels. Most AShMs opt for a sea-skimming trajectory that makes it hard to detect until close to the target, while some boast enhanced capabilities through combining inertial guidance with active radar homing to bolster their defensive prowess against airborne radars. Regardless, these missiles are set apart by their remarkable precision and propensity to successfully deliver warhead payloads right into enemy harbours.
Global HeavyLift Cites 'Absolute Need' For C-17-Based Global Supply Chain Per...GLOBAL HEAVYLIFT HOLDINGS
WASHINGTON, D.C. -- As an addendum to its May 28, 2009 press releases, Global HeavyLift Holdings, LLC, a Florida incorporated and Defense Logistics Agency (DLA) listed (www.ccr.gov) entity with principal offices in Bloomfield Hills, Michigan, has announced a new emphasizing of plans to permanently augment the U.S. global supply chain with air as a transportation methodology.
The strategy would involve utilizing both heavylift (commercial C-17) and standard lift aircraft (747-8F). Current projections suggest at least 300 aircraft in initial phases.
"Sword of Damocles"
"China's and South Korea's virtual control of ocean-borne shipping, along with China's rise as a blue water naval power capable of interrupting critical east-west ship transit lanes at will, signals an absolute need to neutralize a veritable 'Sword of Damocles' over the U.S. industrial base global supply chain," says Myron D. Stokes, Managing Member
Horatio Lord Nelson's Warfighting Style and the Maneuver Warfare Paradigm, by...Professor Joel Hayward
Readers seeking to analyze Maneuver Warfare’s applicability to combat on the seas that cover most of the globe can be forgiven for noticing the absence of scholarly interest in this theme and thinking that, in short, Maneuver Warfare must have no applicability at sea. One can, however, easily find many fine examples of what is now called Maneuver Warfare in seapower’s long history. This article draws from one such example – splendidly manifest in the person of Britain’s greatest fighting seaman, Vice-Admiral Horatio, Lord Nelson (1758–1805) – to demonstrate that students of maneuver need not fear turning their attention occasionally from land battles towards those fought at sea. They may indeed be greatly enriched by doing so. While being mindful to avoid anachronism (Maneuver Warfare’s conceptual framework, after all, is very recent), this article shows that Lord Nelson’s warfighting style closely resembles the modern Maneuver Warfare paradigm. He was not fighting according to any paradigm, of course, much less one that dates from almost 200 years after his death. He understood naval tactics and battle according to the norms and behavioral patterns of his own era and continuously experimented and tested ideas, rejecting some, keeping others. The article naturally makes no claim that Nelson’s warfighting style was unique among sea warriors or that he contributed disproportionately to conceptual or doctrinal developments in tactics or operational art. Even a cursory glance at the careers of John Paul Jones, Edward Hawke and John Jervis (one of Nelson’s mentors), to mention but a few, reveals that their names fit almost as aptly as Nelson’s alongside Napoleon Bonaparte’s, Erwin Rommel’s and George S. Patton’s in studies of effective maneuverists. Yet Lord Nelson makes an ideal focus for a case study of Maneuver Warfare at sea. Extant sources pertaining to his fascinating life are unusually abundant and reveal that he raised the art of war at sea to unsurpassed heights, all the while perfecting the highly maneuverist warfighting style that gave him victory in several of naval history’s grandest battles.
This self-help Guide is packed with Tips and relevant info on how one can profit from investing in Bitcoin, and yes, even under current market conditions. Also learn how to mine Bitcoins and the relevancy of the Block chain.
Launch your next campaign, your next engagement, your next go-to-market strategy by connecting with one of the world’s largest active lifestyle participant networks.
Launch your next campaign, your next engagement, your next go-to-market strategy by connecting with one of the world’s largest active lifestyle participant networks.
Launch your next campaign, your next engagement, your next go-to-market strategy by connecting with one of the world’s largest active lifestyle participant networks.
Launch your next campaign, your next engagement, your next go-to-market strategy by connecting with one of the world’s largest active lifestyle participant networks.
Outside Business Journal Marketing Kit 2021Greg in SD
Launch your next campaign, your next engagement, your next go-to-market strategy by connecting with one of the world’s largest active lifestyle participant networks.
This fitness progress chart is intended to be filled out by me (the fitness professional) regarding my client's individual measurements and fitness assessments.
This personal training contract is intended to be filled out by me (the fitness professional) outlining any/all relevant fees, session times, and current cancellation policies and is given to my clients for them to sign.
Physical Activity Readiness QuestionnaireGreg in SD
This Par-Q (Physical Activity Readiness Questionnaire) form by I.D.E.A. is intended to be filled out by prospective clients so that I may identify what amount of physical activity might be appropriate for him/her.
IDEA World Fitness Convention Brochure for August 2014 in Anaheim, Ca.Greg in SD
IDEA World Fitness Convention Brochure for August 2014 in Anaheim, Ca.
Join over 12,000 other fitness professionals for this world wide event.
Learn more at www.IDEAfit.com
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
role of women and girls in various terror groupssadiakorobi2
Women have three distinct types of involvement: direct involvement in terrorist acts; enabling of others to commit such acts; and facilitating the disengagement of others from violent or extremist groups.
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
1. Anti-Access/Area Denial
/Luce.nt/
1
Anti-Access/Area Denial: The Evolution of Modern Warfare
Major Christopher J. McCarthy, U.S. Air Force
Abstract
Throughout the history of warfare, adversaries have regularly attempted to deny one another
freedom of movement on the battlefield. Past forms of anti-access served to both protect friendly
forces and prevent enemies from gaining positions of advantage. As expeditionary warfighters,
American forces have come to depend on safe deployment into theater and the ability to gain and
maintain air, space and maritime superiority. China, however, has emerged as a regional power with
robust anti-access/area denial (A2/AD) capabilities designed to disrupt U.S. power projection into the
western Pacific. In order to conduct successful military operations in the A2/AD environment, U.S.
leadership must address A2/AD as a new way of war, comprehend the associated operational
implications, and eliminate any imbalances between military objectives and the means by which to
achieve them.
2. Anti-Access/Area Denial
/Luce.nt/
2
hroughout the history of warfare, adversaries have regularly attempted to deny one
another freedom of movement on the battlefield. While past forms of anti-movement
efforts included barriers such as the Great Wall of China and the Maginot Line, by the
early 1990s, U.S. researchers identified the combination of information, space, sea, and air denial as the
emerging threat to American military power projection.1
Subsequent studies postulated that future
adversaries would likely be able to use these new capabilities to disrupt U.S. force deployment and deny
access to contested regions.2
In 2003, the Center for Strategic and Budgetary Assessments (CSBA)
defined anti-access as enemy actions which inhibit military movement into a theater of operations, and
area-denial operations as activities that seek to deny freedom of action within areas under the enemy’s
control.3
Today, China has emerged as a regional power with robust Anti-Access/Area Denial (A2/AD)
capabilities and unclear political and military intentions. For this reason, while the U.S. and China strive
for military and political cooperation, a close examination of emerging Chinese capabilities reveals
several potential challenges to U.S. forces. Chinese anti-access capacity includes a large ballistic missile
force designed to attack key point targets, such as air bases and naval facilities. Chinese area denial
capabilities consist of advanced counter-maritime and counter-air systems designed to destroy critical
mobile assets, such as surface ships and aircraft. A2/AD also extends into the space and cyber domains
that support U.S. operations, and is specifically designed to disrupt U.S. power projection.4
Furthermore, Chinese A2/AD is particularly well suited for use against U.S. forces in the event of a
confrontation over the defense of Taiwan.
As expeditionary warfighters, American forces have come to depend on safe deployment into
theater and the ability to gain and maintain air, space and maritime superiority, and have not been
significantly challenged in any of these domains since the Vietnam War. Modern A2/AD, however, has
changed the character of modern warfare, and presents significant challenges to U.S. military freedom
of action wherever these advanced systems are employed. In order to conduct successful military
operations in the A2/AD environment, U.S. military leadership must acknowledge A2/AD as a new way
of war, comprehend the associated operational implications, and eliminate any imbalances between
military objectives and the means by which to achieve them.
OPERATIONAL IMPLICATIONS OF CHINESE A2/AD
“The success of any major operation or campaign depends on the free movement
of one’s forces in the theater. Without the ability to conduct large-scale movements
on land, at sea, and in the air, operational warfare is essentially an empty concept.”5
-Dr. Milan Vego
Chinese analysis of Operation DESERT STORM observed that one of the key elements of U.S.
success was its ability to deploy forces into theater with little risk of hostile interference.6
Chinese
1
Andrew F. Krepinevich, The Military-Technical Revolution: A Preliminary Assessment. (CSBA, 2002), 1.
2
U.S. Department of Defense, Report of the Defense Science Board Task Force on Strategic Mobility. (Washington, DC: DoD, August 1996), 3,
and U.S. Department of Defense, Report of the National Defense Panel, (Washington DC: DoD, December 1997), 1.
3
Andrew F. Krepinevich et al., Meeting the Anti-Access and Area Denial Challenge, (CSBA, 2003), ii.
4
Andrew F. Krepinevich, Why Air-Sea Battle?, (CSBA, 2010), 13.
5
Milan Vego, “The Factor of Space,” Joint Operational Warfare. (Newport, RI: Naval War College, reprint, 2009), III-7.
6
Stuart E Johnson and Duncan Long (eds.), Coping with the Dragon: Essays on PLA Transformation and the U.S. Military, (Washington DC:
Center for Technology and National Security Policy, December 2007), 73.
T
3. Anti-Access/Area Denial
/Luce.nt/
3
military leaders concluded that in the event of a war with the United States, the U.S. military
deployment process must be disrupted or neutralized, and have successfully developed and fielded
military capabilities designed to fulfill this need. Modern A2/AD differs from historical iterations of anti-
access due to the combination of increased range, accuracy and lethality of China’s advanced,
networked weapons systems.7
Chinese A2/AD not only deters U.S. military deployment into the
western Pacific, but also promises to disrupt combat forces operating in and around locations such as
Taiwan or the South China Sea.
In the event of war, Chinese anti-access capabilities consist of land-attack ballistic and cruise
missiles which threaten critical U.S. air and naval facilities on the islands of Okinawa and Guam.8
While
China already possesses the short- and medium-range ballistic missile (SRBM/MRBM) forces required to
disrupt operations on Okinawa, Japan, recent studies also indicate USAF and USN facilities on Guam are
within Chinese ballistic missile range.9
Without the use of Okinawa facilities in a conflict against China,
U.S. operations from Guam may be problematic due to long lines of operation and limited number of
support facilities on the island. Without Guam, operations become incredibly difficult, and may not be
possible due to the distance to Taiwan and logistics limitations of contemporary U.S. military forces.
In addition to land-attack forces, China’s counter-maritime capabilities also constitute a major
A2/AD threat to U.S. sea control in the region. Many of the weapons are strikingly modern, and include
a variety of anti-ship ballistic and cruise missiles (ASBM/ASCM) that can also be launched from the air,
land or sea. With an estimated range exceeding 800nm, the new DF-21D ASBM may force aircraft
carriers to remain beyond distances suitable for efficient air operations, drastically reducing the
effectiveness of a Carrier Strike Group (CSG).10
The Chinese submarine fleet has also emerged as a credible A2/AD threat, as demonstrated by
the 2006 incident in which a Chinese diesel submarine surfaced undetected within lethal firing range of
a U.S. aircraft carrier near the southern coast of Japan.11
With multiple submarine types employing a
variety of anti-ship and land-attack weapons, the Chinese undersea force also threatens U.S. access to
basing facilities within reach of Taiwan and U.S. freedom of action throughout the western Pacific.
Land-attack and counter-maritime forces, while robust, may not even be the most lethal
Chinese A2/AD threat to successful U.S. military operations. The Chinese surface-to-air missile (SAM)
network consists of several Russian built S-300s and similar indigenously produced variants, many of
which can lethally engage aircraft beyond 100 nautical miles (nm).12
In the event U.S. forces successfully
penetrate the anti-access shield, Chinese area denial assets like the S-300 will prevent U.S. airpower
from attaining air superiority to a degree which U.S. forces have become accustomed during recent
conflicts. In practically every military operation since 1991, and specifically during Operations IRAQI
FREEDOM and ENDURING FREEDOM (OIF/OEF), American air forces have operated largely unmolested
in essentially uncontested airspace. Such unchallenged air superiority would not be the case in a
conflict with China. The quality and quantity of the Chinese advanced integrated air defense system
(IADS) and their modern fighter aircraft present a level of defensive capability not experienced by any
military in the history of warfare, including that of the United States.
7
Christopher Claus (CSAF Strategic Studies Group), telephone call with author, 17 February 2010.
8
Krepinevich, Why Air-Sea Battle?,13, 17.
9
Ibid, 13.
10
Andrew S. Erickson, “Ballistic Trajectory – China Develops New Anti-ship Missile,” Jane’s Intelligence Review, 4 January 2010.
11
Washington Times, “China Sub Stalked U.S. Fleet,” 13 November 2006.
12
Krepinevich, Why Air-Sea Battle?, 23.
4. Anti-Access/Area Denial
/Luce.nt/
4
While U.S. 5th
generation low observable aircraft such as the F-22A fighter and B-2A bomber are
expected to have inherent advantages against these systems, they are not immune to the threat, and
only exist in limited numbers.13
The majority of U.S. fighters, bombers and cruise missiles remain
extremely vulnerable to these advanced SAMs, and some experts postulate that strike packages of 4th
generation aircraft such as F-15’s, F-16’s and F/A-18’s could experience attrition rates of 20-30% when
operating in areas defended by these threats.14
The combination of the advanced SAMs and fighter
aircraft fleet make the Chinese IADS virtually impossible for U.S. forces to consistently penetrate with 4th
generation aircraft.15
Furthermore, recent reports indicate China is expected to either soon acquire or
develop S-400 SAMs that will double Chinese air defense coverage out to over 200nm.16
This is
significant because these weapons will be able to deny flight over the entire island of Formosa, and is an
unprecedented example of how traditionally defensive anti-access weapons could be used in an
offensive capacity.
In addition to its significant counter-air and counter-maritime forces, Chinese A2/AD now
extends well beyond the traditional domains of air, sea and land. While Chinese cyber-attack activities
have been well publicized in world-wide news reports over the last several years, anti-satellite weapons
now pose a legitimate threat, as demonstrated by China’s 2007 shooting down of one of its own
inoperative satellites.17
Attacks on U.S. cyber and space targets threaten to disrupt or even completely
deny multiple enablers of U.S. power projection, including but not limited to satellite communications
and Global Positioning System (GPS) based navigation systems.18
One of the most significant
implications of A2/AD, however, is China’s increased advantage over the U.S in terms of the operational
warfare factor of time. While China’s proximity to Taiwan is already favorable, A2/AD increases the
Chinese advantage by interfering with U.S. military movement into the region and within any given
theater of operations.
13
Ibid, 42,66, Krepinevich, Why Air-Sea Battle?, 23, and Geoffrey Church (USAF Air Combat Command), e-mail message to author, 25 November
2009. USAF Air Combat Command reports that current plans are to limited F-22A production to 140 combat capable aircraft.
14
Abdulla Toukan and Anthony H. Cordesman, Study on a Possible Israeli Strike on Iran’s Nuclear Development Facilities (Washington, DC: CSIS),
14 March 2009.
15
Eric Talmadge, USA Today. “US Official Notes China’s Military Gains,” 29 September 2007.
http://www.usatoday.com/news/world/2007-09-29-3112601973_x.htm (accessed 27 April 2010).
16
James C. O’Halloran and Christopher F. Foss (eds.), Jane’s Land Based Air Defence 2008-2009, 187.
17
Krepinevich, Why Air-Sea Battle?,15.
18
Ibid, 16.
5. Anti-Access/Area Denial
/Luce.nt/
5
Figure 1. Chinese SAM & Ballistic Missile Coverage in the Vicinity of the Taiwan Strait. This map depicts notional maximum effective ranges of
Chinese S-300/400 SAMs and land attack ballistic missiles *The S-400 is not yet operational in China .19
BALANCING THE ENDS, WAYS AND MEANS
“Any mismatch or serious imbalance between the objective and the
means assigned to accomplish it will invariably lead to failure.”20
-Milan Vego
The 2010 Quadrennial Defense Review (QDR) states that U.S. forces must be able to project
power into anti-access regions in order to “deter, defend against, and defeat aggression by potentially
hostile nation states.”21
But in the event of a war with China, A2/AD could prevent the U.S. from
deploying sufficient forces into theater, and would most certainly interfere with the accomplishment of
critical objectives necessary for U.S. expeditionary warfare: air, space and maritime superiority. If the
U.S. strategic objective is to defeat Chinese forces in order to “preserve Taiwan’s right of peaceful self-
determination,” then U.S. success could be extremely limited due to the resulting mismatch between
the desired end state and U.S. military capability to counter Chinese A2/AD.22
U.S. Combatant
19
U.S. Department of Defense, Annual Report to Congress: Military Power of the People’s Republic of China, (2009), 42.
20
Milan Vego, “Military Objectives and the Levels of War,” Joint Operational Warfare (Newport, RI: Naval War College, reprint, 2009), II-10-12.
21
U.S. Department of Defense, QDR Report, (Washington, DC: DoD, February 2010), 31.
22
U.S. Naval War College, Joint Military Operations Department, PRC-Taiwan Vignette, 2010.
S-300 SAM
CSS-6
Land
Attack
Missile
CSS-7
Land
Attack
Missile
S-400 SAM*
6. Anti-Access/Area Denial
/Luce.nt/
6
Commanders (COCOMs) must clearly articulate to civilian leadership these military challenges created
by emerging Chinese A2/AD technology and doctrine.
Despite these challenges, the U.S. military must prepare for conflict with China, particularly with
respect to the defense of Taiwan. One of the first considerations is that of clearly communicating ends,
ways, means--as well as cost and risk--both up and down the U.S. military chain of command. While
successful U.S. combat operations in the western Pacific are certainly possible, the risks to American
forces posed by China’s A2/AD are significant. Attempts to deploy into theater and to gain air and
maritime superiority likely will result in loss of life and materiel to levels not experienced since World
War II.
U.S. war planners must thoroughly review U.S. joint doctrine and determine what concepts
adequately address operations against an adversary employing A2/AD technologies. One doctrinal
shortfall is that while air, maritime and space superiority are often assumed possible, U.S. forces do not
have joint methods for organizing and deploying joint forces to achieve these objectives in areas
protected by A2/AD systems.23
The USAF and USN AirSea Battle concept provides some original insight
into how best to plan for joint operations under these conditions. Published in May 2010, AirSea Battle
aims to encourage joint planning, training and deployment to achieve unprecedented levels of
integration that will ensure freedom of movement and freedom of action in areas protected by A2/AD.24
In order to conduct a new style of U.S. expeditionary warfare that challenges A2/AD, AirSea
Battle concepts must improve coordination between air, sea, land, space and cyber assets. One
example, according to the USAF Chief of Staff, is that services need to “better integrate their operations
centers.”25
Counter-A2/AD planning must also effectively coordinate USAF and USN core competencies
to ensure U.S. forces are both realize their maximum potential and identify any capability gaps between
the services.26
While AirSea Battle may focus on USAF and USN power projection, planners must
consider the capabilities of all the U.S. armed services to determine how best to maximize U.S. force
survivability against A2/AD systems.27
AirSea Battle is important because finding enduring alternatives to conventional U.S. military
power application is critical to defeating Chinese A2/AD. Traditional methods of deployment and
employment incur unacceptable levels of risk and must be reconsidered. For example, U.S. forces
cannot assume unmolested operations out of Kadena and Guam, as facilities on these islands are
extremely vulnerable to Chinese attack in a Taiwan defense scenario. Similarly, USN surface combatants
can no longer assume safe entry into the western Pacific, as China’s A2/AD forces threaten to neutralize
or destroy these high-value assets. Furthermore, continuous air, space and maritime superiority, the
critical conditions necessary for U.S. expeditionary warfare, simply will not exist to the level U.S. forces
currently experience in OIF/OEF.
Despite these challenges, the successful defense of Taiwan requires U.S. forces to both operate
from bases close enough to the operational area to sustain combat operations, and be adequately
defended from the A2/AD threat. Past studies have considered air and maritime basing alternatives in
23
Claus, telephone call with author, 17 February 2010.
24
Jan Van Tol et al, AirSea Battle: A Point-of-Departure Operational Concept, (CSBA, 2010), 113.
25
Christopher P. Cavas, “USAF, U.S. Navy to Expand Cooperation: Air-Sea Will Close Gaps, Boost Strengths,” Defense News, 9 November 2009.
http://integrator.hanscom.af.mil/2009/November/11122009/ 11122009-10.htm (accessed 30 April 2009).
26
Ibid.
27
Claus, telephone call with author, 17 February 2010.
7. Anti-Access/Area Denial
/Luce.nt/
7
the region, but logistical limitations of multiple and austere operating bases may become too
cumbersome to sustain.28
In addition, any base within Chinese ballistic missile range is likely to be
vulnerable, and will require joint BMD, counter-air and sea-control capabilities to ensure the protection
of land facilities and forces.
These problems should prompt joint planners to examine the operational function of protection,
which includes the activities required to maximize joint force fighting potential in the A2/AD
environment.29
Since Chinese A2/AD is capable of disrupting U.S. military deployment into a potential
operating base like Guam, PACOM planners must consider the capabilities of all the U.S. armed services
to determine how best to maximize U.S. force survivability against A2/AD systems.30
While air
superiority over Guam is likely, sea control around the island must be assured before U.S. forces are able
to mitigate the Chinese anti-access threat and dependably conduct missions in support of Taiwan’s
defense. Of particular importance will be the U.S. Navy’s ability to keep Chinese submarines and surface
combatants outside of land-attack missile range and to provide sea-based air defense of Guam.
With air and sea control around Guam assured, a joint ballistic missile defense (BMD) force will
be required to defend the island in preparation for air and naval operations. Cooperation between all
U.S. services is critically important, as U.S. BMD is most effective with the maximum integration of
satellite sensor information, USN Aegis equipped ships, and US Army Terminal High Altitude Area
Defense (THAAD) and Patriot SAM systems.31
U.S. cyber operations must also be utilized in order to
both protect information pertaining to friendly force movement and operations, as well as interfere with
Chinese military capabilities to locate and attack U.S. forces on the island.32
In terms of domain control, U.S. military success against A2/AD will require a philosophical shift
in what constitutes an acceptable level of air, space and maritime superiority. Current U.S. joint
doctrine, supported by U.S. experience since the Vietnam War, essentially assumes that attaining this
superiority not only achievable, but is generally required to conduct expeditionary warfare. Gaining
superiority across all domains, however, will prove to be a major challenge when U.S. forces are
required to operate in areas defended by A2/AD. Temporary, local control of the air and sea is a much
more realistic expectation, and may be achieved through focused application of selected principles of
war and by balancing operational factors. For example, the massing of selected U.S. forces at a
particular time and location will create opportunities to surprise, saturate and overwhelm air defenses.
This concentration of forces will create a temporary positional advantage in which specific objectives
may be achieved. Furthermore, unlike wars of the past, the United States must be completely prepared
for both offensive and defensive anti-satellite and cyber warfare, and must be able to effectively
operate without these systems.
In a China-Taiwan scenario, the strengths of A2/AD may prevent U.S. forces from attacking many
Chinese centers of gravity (COGs) directly. However, since China is a large country and area denial
weapons are often expensive and limited in number, they are also unable to simultaneously defend
multiple decisive points across such a large geographic area. As suggested by JP 3-0, indirect approaches
will therefore be critical to U.S. military success. Operational commanders would therefore need to
28
Christopher J. Bowie, The Anti-Access Threat and Theater Air Bases (Washington, DC: CSBA, 2002), ii.
http://www.csbaonline.org/4Publications/Archive/R.20020924.CSBA_AirBases/R.20020924.CSBA_AirBases.htm (accessed 23 February 2010).
29
Chairman, U.S. Joint Chiefs of Staff, Joint Operations, Joint Publication (JP) 3-0, Change 2 (Washington, DC: CJCS, 22 March 2010), III-24.
30
Claus, telephone call with author, 17 February 2010.
31
Lockheed Martin Corporation. Terminal High Altitude Area Defense. Bethesda, MD. http://www.
lockheedmartin.com/products/thaad/index.html (accessed 6 May 2010).
32
Chairman, U.S. Joint Chiefs of Staff, Joint Operations, Joint Publication (JP) 3-0, Change 2 (Washington, DC: CJCS, 22 March 2010), III-24.
8. Anti-Access/Area Denial
/Luce.nt/
8
consider suitable ways to exploit Chinese critical vulnerabilities not protected by A2/AD “to gain
leverage over its COGs,” such as attacking command and control facilities and severing lines of
communication (LOCs).33
One example of an indirect approach is to attack Chinese merchant shipping
and resources transiting the Strait of Malacca. Since 80% of China’s imported oil passes through these
waters, the Strait is arguably a potential decisive point for U.S. and Chinese forces in a western Pacific
conflict.34
Is A2/AD the new face of war right now?
Despite the recent, rapid modernization of the Chinese military, there are two reasons to
believe that the situation in the western Pacific may not be as dire as it appears. While its military
capabilities have drastically improved, China has a host of internal issues preventing it from threatening
the U.S. military in the near future.35
More importantly, while Chinese A2/AD is a viable threat in the
western Pacific, A2/AD does not exclusively represent the face of modern conflict.
Although Chinese military capability is growing impressively, studies suggest three shortfalls that
currently prevent China from posing a serious threat to the U.S. military. China’s defense budget is
smaller than that of the U.S., and a relatively small percentage of Chinese forces are actually modern.36
China also faces significant disadvantages in areas of logistics, readiness, training and experience.37
While these arguments may have merit, comparisons of budgets and percentages of modern
forces are mostly irrelevant metrics when considering the potential effects of A2/AD on U.S. forces.
China wisely invested in ballistic missile and SAM technologies specifically designed to counter strengths
of the U.S. military. For example, it does not matter that China has not fielded an aircraft carrier while
the U.S. has eleven, as Chinese anti-ship missiles are now designed to negate such advantages by
preventing the U.S. ships from entering the area of operations.
Chinese logistics, training, and readiness standards, however, may very well be less than those
of the United States, and they may represent a comparative advantage for U.S. forces. Likewise, history
indicates that the U.S. military is much more experienced in the conduct of modern combat operations,
which also serves as a disadvantage for the Chinese.38
The combination of these factors, however, does
not tell the whole story. No amount of U.S. combat experience, for example, will change the fact that
the S-300 SAM system can deny the vast majority of U.S. airpower flight over the Taiwan Strait.
The importance of addressing A2/AD, however, reaches far beyond Taiwan. Chinese A2/AD
directly influences the balance of power in the South China Sea and throughout the western Pacific, as
China continues to use its new military strength to reveal aspirations of regional leadership and global
relevance.39
In addition, proliferation trends indicate that imbalances created by A2/AD are not limited
33
Chairman, U.S. Joint Chiefs of Staff, Joint Operations, Joint Publication (JP) 3-0, Change 1 (Washington, DC: CJCS, 13 February 2008), IV-12, 13.
34
Mamdouh G. Salameh, China’s Global Oil Diplomacy: Benign or Hostile? (Cleveland, OH: International Association for Energy Economics, First
Quarter 2010), 22. http://www.iaee.org/documents/2010Winter EnergyForum.pdf (accessed 17 April 2010).
35
James Fallows, “Cyber Warriors,” The Atlantic, March 2010. http://www.theatlantic.com/ magazine/ archive/2010/03/cyber-warriors/7917
(accessed 26 March 2010).
36
Ibid.
37
Ibid.
38
Ibid.
39
Christopher Claus (CSAF Strategic Studies Group), e-mail message to author, 21 April 2010.
9. Anti-Access/Area Denial
/Luce.nt/
9
to China, as fourteen other countries possessed S-300 SAMs as of 2009.40
While Iran is not believed to
currently operate the S-300, they have been seeking modern A2/AD technology since the mid-1990s.41
Iranian A2/AD assets positioned near the Strait of Hormuz would similarly alter the balance of power in
the Middle East by denying other’s access to the Persian Gulf, and is just one example of the danger of
A2/AD proliferation.
Admittedly, A2/AD is not the only challenge U.S. forces face in the 21st
Century, as the character
of modern conflict is extraordinarily complex. While not a new concept, many current wars have
recently been defined as “hybrid” in character, with adversaries effectively employing elements of
regular and irregular warfare.42
It is hybrid warfare, not state actors employing A2/AD, which has
become the focus of U.S. military efforts since the terrorist attacks of September 11, 2001, and has
required creative approaches to address the challenges of fighting insurgents in foreign lands.
Additionally, combating irregular warfare has been a top priority of the Department of Defense (DoD)
since 2008. As such, it has driven the majority of contemporary thought on the conduct of operational
warfare.43
Many of the same experts agree, however, that hybrid warfare does not replace conventional
warfare, or eliminate the need to prepare for it.44
A2/AD technologies will, however, serve to amplify
the dangers posed by hybrid warfare as anti-access weapons proliferate to state and non-state actors
around the world. But while the DoD advocates the need for balance between conventional and
irregular capabilities and highlights the need for superior conventional forces, the U.S. military remains
ill-prepared to execute combat operations against modern A2/AD systems that are employed in many
places around the world.45
A2/AD is therefore the critical underlying theme that defines the evolution
of modern combat, whether conventional, irregular or hybrid. As long as U.S. forces remain unprepared
to counter A2/AD, the American military will suffer the same fate as that of the French in 1940: military
failure due to the inability to comprehend the evolution of modern warfare.46
CONCLUSION
Just as Blitzkrieg changed combat in 1940, anti-access/area denial technologies and strategies
have re-defined the character of modern warfare. A2/AD undermines contemporary U.S. power
projection by denying freedom of movement and freedom of action in and around areas of interest, and
clearly reveals problems American forces would face in the event of conflict with China over Taiwan or
the South China Sea. Implications of A2/AD, however, reach far beyond that of conflict in the western
Pacific. To successfully operate in the A2/AD environment, the U.S. military must prepare adequately
for this evolution of modern warfare by understanding the operational implications presented by
modern technology. Planners must use innovative joint planning concepts such as AirSea Battle and
effective integration of joint forces to help achieve the desired end state with the resources available to
40
O’Halloran and Foss, Jane’s Land Based Air Defence 2008-2009, 186.
41
Anoushiravan Ehteshami, “Iran’s National Strategy Striving for Regional Parity or Supremacy?,” Jane’s Online (Vol. 27, Issue 4, 1 April 1994)
http://search.janes.com (accessed 28 August 2009).
42
Robert Wilke, “Hybrid Warfare: Something Old, Not Something New” (Maxwell AFB, AL: Air and Space Power Journal, Volume XXIII, No. 4,
Winter 2009), 14.
43
U.S. Department of Defense, National Defense Strategy, (Washington, DC: DoD, June 2008), 13.
44
Frank G. Hoffman, “Hybrid Warfare and Challenges,” Joint Force Quarterly, No.52, (1st
Quarter 2009).
http://smallwarsjournal.com/documents/jfqhoffman.pdf (accessed 17 April 2009), 38.
45
U.S. Department of Defense, National Defense Strategy, (Washington, DC: DoD, June 2008), 13.
46
Williamson Murray and Allan R. Millett (eds.), Military Innovation in the Interwar Period, 1996, 34-35.
10. Anti-Access/Area Denial
/Luce.nt/
10
the U.S. military. A2/AD not only increases the dangers of conventional war, but also offers non-state
actors worldwide options to increase the effectiveness of irregular or hybrid warfare.
RECOMMENDATIONS
The U.S. Department of Defense should consider the following actions to adequately prepare for
combat operations in the modern A2/AD environment:
Accept A2/AD as a fundamental change to the character of conventional warfare, as adversaries
with A2/AD capabilities can deny freedom of movement and freedom of action across the range
of military operations.
Re-assess joint doctrine relevance to operations against A2/AD threats.
Ensure U.S. forces have the means to achieve the operational objectives.
Accept the increased risk operating against A2/AD threats, or change the objective.
Utilize AirSea Battle innovation as a starting point to integrate command and control between
the services, realize the maximum counter A2/AD potential of existing platforms, and identify
capability shortfalls that need to be addressed. Participation cannot, however, be limited to
USAF and USN – cooperation from other U.S. services and agencies should be encouraged.
Understand that while Chinese A2/AD capability is a leading example, challenges are not limited
to China. A2/AD proliferation is already significant, and today presents challenges to U.S. power
projection around the world.
Major McCarthy was born in Midwest City, Oklahoma. He was commissioned in 1996 from the United
States Air Force Academy, Colorado Springs, Colorado. Major McCarthy served as an F-15C aircraft
commander and Instructor Pilot at Mountain Home AFB, Idaho and Elmendorf AFB, AK. He served as an
Air Liaison Officer at Osan Air Base, Republic of Korea, and most recently flew as an Operational Test &
Evaluation Instructor Pilot with the 85th Test and Evaluation Squadron, Eglin AFB, FL. He is a Senior Pilot
with over 1,746 total flying hours, including 162 combat hours in the F-15C during Operations
NORTHERN WATCH and SOUTHERN WATCH. Major McCarthy is a 2010 Distinguished Graduate of the
College of Naval Command and Staff, United States Naval War College, Newport, Rhode Island and
currently serves as the Country Director for Singapore and Brunei in the PACOM Division, Deputy Under
Secretary of the Air Force for International Affairs, Pentagon, Washington, D.C.