Heresies
Heresies
Heresies
Andrew Chubb
WHITEHALL PAPER | 99
Whitehall Paper 99
Necessary Heresies
Challenging the Narratives Distorting Contemporary UK Defence
www.rusi.org
Royal United Services Institute for Defence and Security Studies
SUBSCRIPTIONS
Please send subscription order to:
USA/Canada: Taylor & Francis Inc., Journals Department, 325 Chestnut Street, 8th Floor,
Philadelphia, PA 19106 USA
UK/Rest of World: Routledge Journals, T&F Customer Services, T&F Informa UK Ltd,
Sheepen Place, Colchester, Essex, C03 0LP UK
All rights reserved. No part of this publication may be reprinted or reproduced or utilised
in any form or by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying and recording, or in any information storage or
retrieval system, without permission in writing from the publisher.
Contents
About the Authors iv
Introduction
Justin Bronk and Jack Watling 1
Conclusion
Justin Bronk and Jack Watling 99
About the Authors
Justin Bronk is the Research Fellow for Airpower and Technology in the
Military Sciences team at RUSI. He is also Editor of the RUSI Defence Systems
online journal. Justin’s particular areas of expertise include the modern
combat air environment, Russian and Chinese ground-based air defences
and fast jet capabilities, unmanned combat aerial vehicles and novel
weapons technology.
Justin is a part-time doctoral candidate at the Defence Studies
Department of King’s College London. He holds an MSc in the History of
International Relations from the London School of Economics and a BA
(Hons) in History from York University. Justin is also a private glider and
light aircraft pilot.
Sidharth Kaushal is the Research Fellow for Sea Power in the Military
Sciences team at RUSI. Sidharth’s research covers the impact of
technology on maritime doctrine in the 21st century and the role of sea
power in a state’s grand strategy. Sidharth holds a doctorate in
International Relations from the London School of Economics, where his
research examined the ways in which strategic culture shapes the
contours of a state’s grand strategy.
Nick Reynolds is the Research Analyst for Land Warfare at RUSI. His
research interests include land power, wargaming and simulation. Prior
to joining RUSI, he worked for Constellis. Nick holds a BA in War Studies
and an MA in Conflict, Security and Development from King’s College
London. During his studies, he was Head of Operations of the KCL Crisis
Team, which organises large-scale crisis simulation events.
Peter Roberts was the Director of Military Sciences at RUSI until December
2021, having been the Senior Research Fellow for Sea Power and C4ISR
since 2014. He has researched and published on a range of subjects,
including strategy and philosophy, contemporary war, military doctrine
and thinking, command and control, naval warfare, ISR, professional
military education and disruptive warfare techniques. He lectures, speaks
and writes on these topics as well as regularly providing advice for both
UK and foreign governments.
Previously, Peter was a career Warfare Officer in the Royal Navy,
serving as both a Commanding Officer, National Military Representative
1
About the Authors
and in a variety of roles with all three branches of the British armed forces,
the US Coast Guard, US Navy, US Marine Corps and intelligence services
from a variety of other states. He served as chairman for several NATO
working groups and Five Eyes maritime tactics symposia. His military
career included service in Hong Kong, the Baltics, Kenya, the Former
Republic of Yugoslavia, Iraq, South Africa, Pakistan and Oman,
interspersed with deployments in the GIUK gap and the Persian Gulf.
Peter has a Master’s in Defence Studies and a PhD in Politics and
Modern History. He is a Visiting Professor of Modern War at the French
Military Academy.
Jack Watling is the Research Fellow for Land Warfare. Jack has recently
conducted studies of deterrence against Russia, force modernisation,
partner force capacity building, the future of corps operations, the future
of fires, and Iranian strategic culture. Jack’s PhD examined the evolution
of Britain’s policy responses to civil war in the early 20th century. Prior to
joining RUSI, Jack worked in Iraq, Mali, Rwanda, Brunei and further afield.
2
INTRODUCTION
1
Jonathan Gottschall, The Storytelling Animal: How Stories Make Us Human
(New York, NY: Harcourt, 2013).
2
A phenomenon that explains the success of books like P W Singer and August
Cole, Ghost Fleet: A Novel of the Next War (New York, NY: Houghton Mifflin, 2015).
3
Jens Beckert and Richard Bronk (eds), Uncertain Futures: Imaginaries,
Narratives, and Calculation in the Economy (Oxford: Oxford University Press,
2018).
1
Justin Bronk and Jack Watling
4
Ministry of Defence (MoD) and Nick Carter, ‘Chief of Defence Staff Speech RUSI
Annual Lecture’, 17 December 2020, <https://www.gov.uk/government/speeches/
chief-of-defence-staff-at-rusi-annual-lecture>, accessed 10 July 2021.
5
Shashank Joshi, ‘A Border Dispute Between India and China is Getting More
Serious’, The Economist, 30 May 2020.
6
BBC News, ‘Turkey Shoots Down Russian Warplane on Syria Border’, 24
November 2015; Thomas Gibbons-Neff, ‘How a 4-Hour Battle Between Russian
Mercenaries and U.S. Commandos Unfolded in Syria’, New York Times, 24 May 2018.
7
US Africa Command Public Affairs, ‘Russia and the Wagner Group Continue to Be
Involved in Ground, Air Operations in Libya’, 24 July 2020, <https://www.africom.
2
Introduction
for Donetsk airport10 were part of fait accompli strategies or were actions
which fell short of warfighting is indefensible. While adversary
campaigns have used novel technologies including uncrewed aerial
vehicles and cyber attacks, it was hard power and not ‘the application of
technology’ that provided the means by which they coerced and
controlled their opponents. In order to coerce Kyiv in February 2021,
Moscow applied pressure through the build-up of over 100,000 troops on
the Ukrainian border,11 the tangibility of which contrasted starkly with
Western statements of solidarity and concern.12 Similarly, China is able to
coerce its neighbours with its maritime militia in the South China Sea,13
not because it is carefully avoiding escalation, but because of the size of
the People’s Liberation Army Navy, which makes the Philippines and
Vietnam wary of providing a pretext for Beijing to apply overt military
force.14 Russia and Iran have used undeclared military forces in their
recent campaigns. But this is not new. The use of undeclared forces
featured prominently throughout the Cold War by all sides, from the
Korean War and the Vietnam War15 to the Angolan Civil War16 or the
UK’s campaign in Oman.17
mil/pressrelease/33034/russia-and-the-wagner-group-continue-to-be-in>, accessed
11 July 2021.
8
Andrew Kramer, ‘Fighting Escalates in Eastern Ukraine, Signaling the End to
Another Cease-Fire’, New York Times, last updated 30 April 2021.
9
Bellingcat Investigative Team, ‘Bellingcat Report – Origin of Artillery Attacks on
Ukrainian Military Positions in Eastern Ukraine Between 14 July 2014 and 8
August 2014’, Bellingcat, 17 February 2015.
10
Amos C Fox, ‘“Cyborgs at Little Stalingrad”: A Brief History of the Battles of
Donetsk Airport’, Land Warfare Paper No. 125, Institute of Land Warfare, May 2019.
11
Robin Emmott and Sabine Siebold, ‘OFFICIAL Russian Military Build-Up Near
Ukraine Numbers More Than 100,000 Troops, EU Says’, Reuters, 19 April 2021;
Cyrus Newlin et al., ‘Unpacking the Russian Troop Buildup Along Ukraine’s
Border’, Center for Strategic and International Studies, 22 April 2021.
12
Andrew Hilliar, ‘Biden Offers Ukraine “Unwavering Support” Over Russia
Standoff’, France24, 3 April 2021.
13
BBC News, ‘South China Sea Dispute: Huge Chinese “Fishing Fleet” Alarms
Philippines’, 21 March 2021.
14
Sidharth Kaushal and Magdalena Markiewicz, ‘Crossing the River by Feeling the
Stones: The Trajectory of China’s Maritime Transformation’, RUSI Occasional Papers
(October 2019).
15
Francis X Clines, ‘Russians Acknowledge a Combat Role in Vietnam’, New York
Times, 14 April 1989.
16
Central Intelligence Agency, Directorate of Intelligence, ‘Intelligence
Memorandum: Soviet and Cuban Intervention in the Angolan Civil War’, March
1977, <https://www.cia.gov/readingroom/docs/DOC_0000518406.pdf>, accessed
11 July 2021.
17
John Akehurst, We Won a War: The Campaign in Oman, 1965–1975 (Salisbury:
Michael Russell, 1982).
3
Justin Bronk and Jack Watling
18
MoD, ‘Integrated Operating Concept’, August 2021, p. 5.
19
Ibid., p. 16.
20
MoD and Carter, ‘Chief of Defence Staff Speech RUSI Annual Lecture’.
21
MoD, ‘Integrated Operating Concept’, p. 6.
22
Claire Mills, Louisa Brooke-Holland and Nigel Walker, ‘A Brief Guide to Previous
British Defence Reviews’, Briefing Paper No. 07313, House of Commons Library,
26 February 2020.
4
Introduction
23
Mark Galeotti, ‘I’m Sorry for Creating the “Gerasimov Doctrine”’, Foreign Policy,
5 March 2018.
5
Justin Bronk and Jack Watling
6
Introduction
24
For example, RAF Chief of the Air Staff, ACM Mike Wigston quoted in Aaron
Mehta, ‘Britain’s Royal Air Force Chief Talks F-35 Tally and Divesting Equipment’,
Defense News, 10 May 2021.
7
Justin Bronk and Jack Watling
8
Introduction
Alexandra Stickings argues that the fragility of access to the space domain
creates strong disincentives for states to conduct kinetic operations in
orbit. While these may occur on a highly limited basis, most conflict in
space will comprise manoeuvring for advantageous orbits and the
application of non-kinetic effects to enable operations in the other
domains. The process of competition will occur continuously, while
targeting in space will be strongly tied to the imperatives created by
terrestrial operations. Thus, the key question for understanding warfare
in space is less the interaction between orbital systems, but rather the
effects these systems have on the ground. Indeed, the highest-intensity
conflict for access to space may well comprise the targeting and
occupation of the ground-based infrastructure. Therefore, space should
not be a siloed specialism but must be integrated into other warfighting
domains. Most importantly, space may stand as an important example of
how political constraints will remain a feature of military decision-making
even in large-scale warfare, a fact often ignored in military concepts and
wargames.
While the wholesale destruction of space-based infrastructure is
unlikely, denial of access for a limited duration at critical moments from
defined geographic areas pose a serious threat to the assurance of
communications on the battlefield. There is a growing obsession across
militaries with connecting all parts of the force into an ‘any-sensor-to-
any-shooter’ network. While ensuring that systems can talk to one
another when links are available, the implications of this network are
highly uneven across the domains. In Chapter VII, ‘More Sensors Than
Sense’, Jack Watling explores the challenges in sharing data around a
battlefield within a contested electromagnetic spectrum and argues that
the advantages gained from interconnectedness are highly context
dependent. While transformative in the maritime domain, there are
operational limitations on its usefulness to air forces, and massive
technical hurdles to expecting reliable advantage from such systems in
land operations. This is not to say that a networked force will not have
advantages, but that those advantages will be more incremental,
contextually dependent and less assured than is widely supposed. Thus,
the regular use of ‘combat cloud’-enabled concepts in narrative
descriptions of future military operations needs careful scrutiny if
dangerous distortions to force planning are to be avoided.
As the UK military seeks to modernise in accordance with the
Integrated Review, it is vital that this is done with a sound conceptual
25
For example, BBC News, ‘UK and US Say Russia Fired a Satellite Weapon in
Space’, 23 July 2020; Kim Sengupta, ‘UK Seeks to Prevent Space Arms Race After
Russia Launches Anti-Satellite Missiles’, The Independent, 26 August 2020.
9
Justin Bronk and Jack Watling
10
I. THE SLOW AND IMPRECISE ART OF
CYBER WARFARE
Sally Walker, former Director of Cyber at GCHQ, has stated that cyber
attacks ‘can have impact in the real world and you can do it at scale’.1
Because cyber attacks can target everything from financial systems and
critical national infrastructure to political leaders and legal institutions –
undermining trust and the rule of law – they can have an ‘attritional’
effect on the cohesion of states to which open societies ‘are uniquely
vulnerable’.2 Such warnings over the years, combined with high-profile
incidents like the WannaCry ransomware attack against the NHS, have
meant that military leaders have recognised the importance of the ‘cyber
domain’.3 When new forms of conflict first emerge, however, there is
almost always a period of inflated expectation.4 For the small community
within Defence who have worked in the margins to explore the novel
capability, there is a tendency to hype its effects and downplay its
limitations in order to gain the attention of the wider defence and
security community and secure resources within the bureaucracy. For
that wider community – lacking an understanding of the capability – it is
often much easier to visualise the potential threats posed by novel
weapons than the challenges involved in employing them effectively.
Cyber warfare today is arguably at the peak of this inflated discourse,
1
Sally Walker, ‘Into the Grey Zone Podcast: Episode Five – Cyber Power (Part II)’,
Sky News, 3 June 2021, 06:00, <https://news.sky.com/story/into-the-grey-zone-
podcast-episode-five-cyber-power-part-ii-12212228>, accessed 26 July 2021.
2
Ibid., 10:30.
3
National Audit Office, Investigation: WannaCry Cyber Attack and the NHS, HC
414 (London: National Audit Office, 2018).
4
This is visualised in Gartner, ‘Gartner Hype Cycle’, <https://www.gartner.com/
en/research/methodologies/gartner-hype-cycle>, accessed 30 March 2021.
11
Justin Bronk and Jack Watling
5
US Department of Defense, ‘AUSA Global Force Symposium: Day 3 – Opening
Remarks and Keynote Speaker’, 18 March 2021, 35:00, <https://dod.defense.gov/
News/Special-Reports/Videos/?videoid=668339>, accessed 26 July 2021.
6
Mandi Kogosowski, ‘“We’re on the Brink of an Enormous Cyber Catastrophe”’,
Israel Defense, 4 June 2021, <https://www.israeldefense.co.il/en/node/49194>,
accessed 26 July 2021.
7
John R Allen and Amir Hussain, ‘On Hyperwar’, Proceedings Magazine (Vol. 143,
No. 7, 2017), p. 1373.
8
Walker, ‘Into the Grey Zone Podcast’, 13:49.
9
Cyber practitioners are necessarily very precise in the language they employ. This
chapter is intended to help non-cyber practitioners understand key concepts and
12
The Slow and Imprecise Art of Cyber Warfare
uses analogy and imprecise terms to aid accessibility. The authors apologise to
specialists in the field for the resulting lack of precision.
10
Ministry of Defence, ‘Joint Doctrine Publication 0-30: UK Air and Space Power’,
2nd edition, December 2017, p. 17.
11
David J Peterson, Art of Language Invention, The: From Horse-Lords to Dark
Elves to Sand Worms, the Words Behind World-Building (London: Penguin,
2015), pp. 21–22.
12
The subset of invented languages used in computing comprises markup and
programming languages. Markup languages allow the programming instructions
to not be displayed when displaying data in a non-programming language. See
Thomas Powell, HTML & XHTML: The Complete Reference (New York, NY:
McGraw-Hill, 2003), p. 25. Programming languages use imperative and
declarative syntax to describe and command the execution of specified functions,
see Michael Gordon, Programming Language Theory and Its Implementation
(Hoboken: Prentice Hall, 1988).
13
These offensive aims can be understood as the offensive mirror image of the
CIA’s triad model of cybersecurity principles: confidentiality; integrity; and
availability. See ‘What Is Security Analysis?’, <https://www.doc.ic.ac.uk/~ajs300/
security/CIA.htm>, accessed 21 October 2021.
13
Justin Bronk and Jack Watling
14
Simon Müller, ‘Discourse Makers in Native and Non-Native English Discourse’,
PhD submission to Justus Liebig University Giessen, Amsterdam, 2004; Melissa M
Baese-Berk and Tuuli H Morrill, ‘Speaking Rate Consistency in Native and Non-
Native Speakers of English’, Journal of the Acoustical Society of America
(Vol. 138, No. 3, 2015), pp. 223–28.
15
H P Sanghvi and M S Dahiya, ‘Cyber Reconnaissance: An Alarm Before Cyber
Attack’, International Journal of Computer Applications (Vol. 63, No. 6, 2013),
pp. 36–38.
16
This is the purpose of cyber threat intelligence. See Henry Dalziel, How to Define
and Build an Effective Cyber Threat Intelligence Capability (Waltham, MA:
Syngress, 2015).
17
Micah Zenko, Red Team: How to Succeed by Thinking Like the Enemy
(New York, NY: Basic Books, 2015), pp. 171–83.
14
The Slow and Imprecise Art of Cyber Warfare
begin from scratch against a defender that has gained information about the
attacker’s techniques and signature.
After a critical node is penetrated, data from it must be exfiltrated and
analysed to allow the attacker to see further into the network and target the
next node up the chain. Ultimately, the aim is for the attacker to gain access
to repositories of data, or to components of a system that can control other
parts of the system. Whereas most parts of a network have the right to read a
limited set of data, some administrative nodes have permission to rewrite
the instructions governing the system. Attackers seek access to
administrators because these accounts can change or destroy the data or
physical infrastructure that constitute the enemy system. For example, an
administrator for a fire control system might substitute an accurate range
table for an inaccurate one, ensuring the artillery system as a whole
misses any target it tries to engage. Alternatively, it could delete the range
table so that the system cannot calculate firing solutions. The
administrator could even delete the instructions for the system to read a
range table, and then destroy the instructions for the system to accept
new instructions so that the defender cannot simply upload a new range
table when the data is found to be missing.
Almost all components of a network will be subject to varying levels
of encryption which must be cracked or bypassed by an attacker at each
stage. This could require the entry of a simple password, or for more
sensitive and better defended systems, a three-part authentication
comprising something known by the individual who owns the node (a
password), something they have (a physical key), and something they
are (biometric data). Passwords to confirm that someone requesting
access to a system is the right individual can be cracked through a brute
force (guessing all possible combinations) or analytical attack. The latter
method can be invalidated by randomly generating passwords. In
practice, any effectively defended system will have millions of possible
solutions to passwords at each level, and incorrect entries will attract the
attention of defenders. For this reason, attackers will endeavour to
bypass passwords through hacking. Hacking involves the interrogation of
the code to find ambiguities through which an attack can convince the
system that a password is not necessary or has been entered when it has
not.18
18
There is an alternative distinction drawn between hacking and cracking that is
framed in ethical terms, with the former being constructive and the latter
destructive. In practice, this ethical distinction – while important in the early days
of the internet – has fragmented. See John P Carlin with Garrett M Graff, Dawn of
the Code War: America’s Battle Against Russia, China, and the Rising Global
Cyber Threat (New York, NY: Public Affairs, 2018), chapter 1.
15
Justin Bronk and Jack Watling
19
A common issue is poor hygiene in compound coding for signifier/signified
correlation. See Paolo Rocchi, ‘The Concepts of Signifier/Signified Revisited’, IBM,
<http://mcs.open.ac.uk/dtmd/Presentations/Session%202/Rocchi.pdf>, accessed
30 March 2021.
16
The Slow and Imprecise Art of Cyber Warfare
penetrate the system a third time to trigger the attack at the desired point in
time.
A cyber attack may therefore be envisaged as comprising seven
stages:
20
Joseph Raczynski, ‘Kill Chain: The 7 Stages of a Cyberattack’, Thomson Reuters,
12 October 2018.
21
Author interview with a senior CTI director at a major bank, March 2021; author
interview with a senior military cyber warfare officer, February 2021; author
interview with a law enforcement officer specialising in counter-cyber operations,
January 2021.
22
House of Commons, ‘A Major Cyber Attack on the UK is a Matter of “When, Not
If”’, Joint Committee on the National Security Strategy, 22 January 2018, <https://
houseofcommons.shorthandstories.com/jcnss-cni-report/index.html>, accessed
30 March 2021.
17
Justin Bronk and Jack Watling
23
Jens Stoltenberg, ‘NATO Will Defend Itself’, NATO, last updated 29 August 2019,
<https://www.nato.int/cps/en/natohq/news_168435.htm?selectedLocale=en>,
accessed 30 March 2021.
18
The Slow and Imprecise Art of Cyber Warfare
Estimates vary but some suggest that enough disruption was caused to set
back Iranian nuclear enrichment by 18 to 24 months. However, the system
reconnaissance and infiltration process took years, having reportedly
begun in 2005.25 Furthermore, when Stuxnet leaked accidentally beyond
the air-gapped nuclear facility network, its code was subsequently
identified and analysed by states and cyber security firms around the
world. This resulted in public attribution of the Stuxnet attack itself to
intelligence agencies in the US and Israel, as well as the probable
attribution of other cyber weapons which appear to function in a similar
manner.26 It also gave Iran and other national and civilian organisations
the opportunity to examine a strategic cyber payload described by a
senior cyber security professional as ‘by far the most complex piece of
code that we’ve looked at – in a completely different league from
anything we’d ever seen before’.27
The Stuxnet leak, and the US/Israeli cyber operations against Iran’s
uranium enrichment programme as a whole, illustrate some of the key
practical characteristics of cyber warfare as a standalone tool of national
power. Attacks on defended systems require years of preparation to
identify, infiltrate and exploit weak points. Once triggered, even very
sophisticated payloads will be discovered, analysed and ultimately
identified. The effects created can only ever be temporary in isolation, as
states will patch their systems and replace damaged machinery if not
prevented from doing so by other means. When the payloads are
ultimately identified and analysed, peer and near-peer states can use
insights gained to ascribe probable attribution, and also potentially to
develop or enhance their own offensive cyber capabilities.
Less sophisticated cyber payloads than Stuxnet-type cyber weapons
can still be highly effective in causing standalone disruption and potentially
physical damage if conducted against less defended systems such as those
which control civilian infrastructure. Examples include the attack on a
German steel mill in 2014, and the WannaCry ransomware attacks which
caused major disruption to the NHS in 2017.28 States such as Russia and
24
David E Sanger, ‘Obama Order Sped Up Wave of Cyberattacks Against Iran’,
New York Times, 1 June 2012.
25
Ibid.
26
Josh Fruhlinger, ‘What is Stuxnet, Who Created It and How Does It Work?’, CSO
Online, 22 August 2017, <https://www.csoonline.com/article/3218104/what-is-
stuxnet-who-created-it-and-how-does-it-work.html>, accessed 3 March 2021.
27
Ibid.
28
TrendMicro, ‘German Steel Plant Suffers Significant Damage from Targeted
Attack’, 12 January 2015, <https://www.trendmicro.com/vinfo/fr/security/news/
cyber-attacks/german-steel-plant-suffers-significant-damage-from-targeted-attack>,
accessed 3 March 2021; Josh Fruhlinger, ‘What Is WannaCry Ransomware, How
19
Justin Bronk and Jack Watling
Does it Infect, and Who Was Responsible?’, CSO Online, 30 August 2018, <https://
www.csoonline.com/article/3227906/what-is-wannacry-ransomware-how-does-it-
infect-and-who-was-responsible.html>, accessed 3 March 2021.
29
Nicole Perlroth, This Is How They Tell Me the World Ends: The Cyberweapons
Arms Race (London: Bloomsbury, 2021).
20
The Slow and Imprecise Art of Cyber Warfare
30
Sharon Weinberger, ‘How Israel Spoofed Syria’s Air Defense System’, WIRED, 4
October 2007.
31
BBC News, ‘Israel Admits Striking Suspected Syrian Nuclear Reactor in 2007’, 21
March 2018.
21
Justin Bronk and Jack Watling
32
Ronen Bergman, Rise and Kill First: The Secret History of Israel’s Targeted
Assassinations (New York, NY: Random House, 2018), pp. 590–94.
22
The Slow and Imprecise Art of Cyber Warfare
23
II. THE GREY ZONE IS DEFINED BY
THE DEFENDER
SIDHARTH KAUSHAL
Over the course of recent years, it has become common to hear the term
‘grey-zone strategy’ invoked to conceptualise the ways in which a range of
state competitors are pursuing revisionist goals. Per this understanding,
Western adversaries such as Russia, China and Iran have become adept at
using a range of tools short of open warfare to challenge the status quo,
leaving Western policymakers scrambling to come up with appropriate
and proportionate responses.1 Similarly, the US and its allies have their
own grey-zone tools, including support for colour revolutions, financial
sanctions and cyber attacks. Thus, for example, the US Joint Chiefs of Staff
envision an operating environment defined by sub-threshold activity and
attendant ambiguity.2 Nor is this an exclusively American view: the UK’s
Integrated Operating Concept notes that ‘our adversaries use an array of
capabilities including their militaries below the threshold of war and in
ways that challenge our political and legal norms’.3 Similarly, France’s
2017 national security strategy notes the challenge posed by legally
ambiguous forms of aggression in the information space: ‘Ambiguous
postures and covert aggression are also becoming more common, with
certain states making an increasing use of a wide variety of proxies.’4
1
See, for example, Michael J Mazarr, Mastering the Gray Zone: Understanding a
Changing Era of Conflict (Carlisle, PA: US Army War Studies Press, 2015).
2
Joint Chiefs of Staff, ‘Joint Operating Environment 2035: The Joint Force in a
Contested and Disordered World’, 14 July 2016, <https://www.jcs.mil/Portals/36/
Documents/Doctrine/concepts/joe_2035_july16.pdf?ver=2017-12-28-162059-917#:
~:text=The%20Joint%20Operating%20Environment%202035,and%20its%20allies%
20in%202035>, accessed 27 October 2021.
3
Ministry of Defence (MoD), ‘Integrated Operating Concept’, August 2021, p. 8.
4
Republic of France, ‘Defence and National Security Strategic Review 2017’, 2017,
p. 47.
24
The Grey Zone Is Defined by the Defender
5
Mazarr, Mastering the Gray Zone, pp. 10–20.
6
Colin Clark, ‘CJCS Dunford Calls for Strategic Shifts; “At Peace or at War Is
Insufficient”’, Breaking Defense, 21 September 2016.
7
Herman Kahn, On Escalation: Metaphors and Scenarios (London: Routledge,
1965), pp. 236–50.
25
Sidharth Kaushal
8
Thomas Trask, Jonathan Ruhe and Ariel Cicurel, ‘Countering Iran’s Gray Zone
Strategy’, RealClearDefense, 18 October 2019, <https://www.realcleardefense.
com/articles/2019/10/18/contesting_irans_gray_zone_strategy_114798.html>,
accessed 1 March 2021; Andrew S Erickson and Ryan D Martinson (eds), China’s
Maritime Gray Zone Operations (Annapolis, MD: Naval Institute Press, 2019);
David Carment and Dani Belo, ‘Gray-Zone Conflict Management: Theory,
Evidence, and Challenges’, Journal of European, Middle Eastern and African
Affairs (Vol. 2, No. 2, Summer 2020), pp. 21–41.
9
Elisabeth Braw, ‘Modern Deterrence: Preparing for the Age of Grey-Zone
Warfare’, RUSI Newsbrief (Vol. 38, No. 10, 5 November 2018).
10
For more on the issue of conceptual clarity and the criteria by which it can be
determined, see John Gerring, Social Science Methodology: A Critical Framework
(Cambridge: Cambridge University Press, 2012), pp. 339–50.
11
For example, the study of economic coercion has a long history as a field of
coercion distinct from warfare. See David A Baldwin, Economic Statecraft, 4th
edition (Princeton, NJ: Princeton University Press, 2020).
12
Reuters, ‘Taiwan Says Has Spent Almost $900 Million Scrambling Against Chinese
Jets This Year’, 7 October 2020.
26
The Grey Zone Is Defined by the Defender
13
Austin Carson, Secret Wars: Covert Conflict in International Politics (Princeton,
NJ: Princeton University Press, 2018).
27
Sidharth Kaushal
14
David Holloway, ‘Military Power and Political Purpose in Soviet Policy’,
Daedalus (Vol. 109, No. 4, 1980), pp. 13–30; Michael MccGwire, ‘The Evolution
of Soviet Naval Policy: 1960–1974’, in Michael MccGwire, Ken Booth and John
McDonnell (eds), Soviet Naval Policy: Objectives and Constraints (New York, NY:
Praeger Publishers, Inc., 1975), p. 537.
28
The Grey Zone Is Defined by the Defender
15
On the basic typology of strategy, see Robert J Art, ‘To What Ends Military
Power?’, International Security (Vol. 4, No. 4, Spring 1980), pp. 3–35.
16
Turkey threatened to invade Syria in 1998 unless the latter expelled Abdullah
Ocalan and the Kurdistan Workers’ Party leadership. See Nick Danforth, ‘A Short
History of Turkish Threats to Invade Syria’, Foreign Policy, 31 July 2015. On
Israel’s responses to proxy subversion, see Wendy Perlman and Boaz Atzili,
Triadic Coercion: Israel’s Targeting of States That Host Nonstate Actors
(New York, NY: Columbia University Press, 2019).
29
Sidharth Kaushal
groups to the area.17 Ambiguity, then, has rarely stayed the hand of states
that believed they had viable conventional options.
Alternatively, when states have struggled to respond to low-intensity
aggression, such as Ukraine in 2014 or the Philippines during the
Scarborough Shoals crisis, their militaries were deterred from doing so
effectively by the threat of escalation posed by large regular formations
operating in coordination with proxies and paramilitaries.18 In other
words, the conventional balance of power often determines whether
low-intensity aggression meets a large-scale kinetic response. When
actors choose not to treat an act as one of open warfare, it is generally
because they have been conventionally deterred or seek to prosecute a
competition at a limited level of intensity as a policy choice.19
To begin with the first risk, reconsider Colonel Harry G Summers Jr’s
analysis of the Vietnam War. The US, Summers presciently noted, had
effectively misconstrued the nature of the war as being a conflict against
proxy subversion by a North Vietnamese government which supported
the Viet Cong. In truth, he noted, proxy subversion was an enabler.
When the North finally absorbed the South in 1975, it was by a
quintessentially conventional offensive. The Viet Cong had created the
preconditions for it by forcing a US withdrawal, and it was this offensive
that decided the political outcome of the war.20 Had the US correctly
17
J Michael Cole, ‘The Third Taiwan Strait Crisis: The Forgotten Showdown
Between China and America’, National Interest, 10 March 2017.
18
For a discussion of Russian actions, see Michael Kofman et al., Lessons from
Russia’s Operations in Crimea and Eastern Ukraine (Santa Monica, CA: RAND,
2017). On Chinese activities, see Sidharth Kaushal and Magdalena Markiewicz,
‘Crossing the River by Feeling the Stones: The Trajectory of China’s Maritime
Transformation’, RUSI Occasional Papers (October 2019).
19
Carson, Secret Wars.
20
Harry G Summers Jr, On Strategy: A Critical Analysis of the Vietnam War
(New York, NY: Random House, 1995).
30
The Grey Zone Is Defined by the Defender
21
On the Easter Offensive, see Phil Haun and Colin Jackson, ‘Breaker of Armies:
Air Power in the Easter Offensive and the Myth of Linebacker I and II in the
Vietnam War’, International Security (Vol. 40, No. 3, 2016), pp. 139–78.
22
On the historical parallels between the emphasis of the Kennedy and Johnson
eras on new tools of strategy and the current grey-zone discourse, see John Lewis
Gaddis, Strategies of Containment: A Critical Appraisal of American National
Security Strategy During the Cold War (Oxford: Oxford University Press, 2005),
chapters 7 and 8.
23
See for example, M Taylor Fravel, ‘China’s New Military Strategy: “Winning
Informationized Local Wars”’, China Brief (Vol. 15, No. 13, 2 July 2015).
24
For further information, see Sidharth Kaushal and Peter Roberts, ‘Competitive
Advantage and Rules in Persistent Competitions’, RUSI Occasional Papers (April
2020).
31
Sidharth Kaushal
This leads to the second challenge of framing the grey zone in terms
of the inherent ambiguity of the tools used by a competitor – ignoring the
extent to which defining the boundaries of the competitive space is a
conscious policy choice that depends on the outcome of a parallel
competition to set the rules of competition and to define the contours of
precisely where the competitive space transitions to warfighting. Actors
may have incentives to attempt to define the competitive space in narrow
or broad terms, depending on their circumstances. A conventionally
weaker actor has obvious incentives to broaden the scope of the
competitive space and limit the possibility of high-intensity warfighting.
Take, for example, the dynamic between Pakistan and India, where the
two sides are effectively engaged in a competition to define whether
proxy warfare is a sub-threshold activity. Pakistan’s use of battlefield
nuclear weapons is effectively geared to ensuring that this remains the
case, while the Indian Cold Start doctrine entailing limited conventional
offensives is meant to provide India with usable conventional options to
respond to a proxy attack. Similarly, the assassination of Qassem
Soleimani in response to proxy attacks on US personnel in Iraq was
notable in the way it reframed the nature of the competition by
demonstrating that a direct and potentially highly escalatory kinetic
military response against a sponsoring state might occur as a result of
proxy attacks – thus using conventional forces to narrow the boundaries
of the sub-threshold competitive space for Iran. Defining some tools as
inherently belonging to the grey zone leads policymakers to overlook the
degree to which defining the boundaries of the competitive space is a
strategic choice that must itself be based on an assessment of national
strengths and the use of the levers of national power.
Conclusions
The treatment of low-intensity conflict, as well as the use of other tools of
statecraft within a state’s grand strategy, has some pedigree and is a
useful subject of enquiry. That said, the emphasis on ambiguity evinced
by both analysts and policymakers’ discussions of the grey-zone concept
does more to obscure than clarify.
First, the distinction between grey-zone actions short of war and
warfighting is analytically unhelpful and obscures the role of kinetic
action in many of the instances of revisionism grouped under the grey-
zone rubric. While it is useful and necessary to talk about the strategies
that states can pursue in the context of long-term competition, describing
competition in the grey zone as a ‘strategy’ adds little analytical value.
Second, and finally, an overemphasis on ambiguity ignores the
importance of Kahn’s ‘systemic competition’ to define where the
32
The Grey Zone Is Defined by the Defender
boundaries of the competitive space are, as well as the agency that the
target state has in defining the contours of the grey zone. This has the
effect of eliding the role of a state’s conventional force posture and even
its nuclear assets in the sub-threshold space, as it is the posturing of these
assets that often delineates the boundaries.
33
III. DOING LESS WITH LESS IN THE
LAND DOMAIN
NICK REYNOLDS
1
Raymond Priest, ‘Doing More with Less’, Marine Corps Gazette (Vol. 74, No. 10,
1990).
2
Thomas Colley, ‘Britain’s Public War Stories: Punching Above Its Weight or
Vanishing Force?’, Defence Strategic Communications (Vol. 2, 2017), pp. 172–73.
3
Ministry of Defence (MoD), Defence in a Competitive Age, CP 411 (London: The
Stationery Office, 2021), p. 53.
34
Doing Less with Less in the Land Domain
certainly a major factor.4 However, Chief of the General Staff General Sir
Mark Carleton-Smith has argued that the Integrated Review left the British
Army ‘right-sized’.5 Meanwhile, the Chief of Defence Staff focused his
own assessment on the UK’s technological capabilities and the benefits of
structural changes geared towards competition over warfighting when
justifying the cuts to the number of main battle tanks (MBTs) to be
modernised and the total loss of the infantry fighting vehicle fleet.6
Recently, the UK Defence Secretary claimed when proposing personnel
cuts that ‘the Army’s increased deployability and technological advantage
will mean that greater effect can be delivered by fewer people’.7 The
restructuring reflects serious thinking about the implications of
technological change and how to maximise the utility of the armed forces.
While the need for modernisation is real, the focus on efficiency gains
justifying cuts to the size of conventional forces risks conflating some quite
different issues. That some tasks can be carried out with fewer personnel
does not mean that all tasks demanded of land forces do not require
mass. Reductions in mass are not equally consequential across the force,
and those below certain levels begin to significantly constrain the ground
a force can contest and the risks available to a commander irrespective of
how lethal or enabled individual force elements are. It is important that
the mantra of doing more with less is challenged, because increased
capabilities enabled by specific technologies risk concealing very real
reductions in the breadth of tasks a force can deliver once it is cut below
certain critical thresholds. A focus on the expense of, and problems with,
unmodernised, unrestructured military forces has proved to be deeply
unhelpful, as has the narrative that new technologies should replace
rather than complement legacy platforms. This chapter seeks to contend
that far from maintaining capability, recent cuts to the British Army have
4
Guy Anderson et al., ‘The UK’s Integrated Review and Defence Command Paper’,
Janes, 23 March 2021; Mark Lyall Grant, ‘The Integrated Review’s Concept of Global
Britain – Is It Realistic?’, King’s College London, 19 July 2021, <https://www.kcl.ac.
uk/the-integrated-reviews-concept-of-global-britain-is-it-realistic>, accessed 8
August 2021.
5
RUSI, ‘Land Warfare 2021: Welcoming Remarks and Opening Keynote’ (14:24),
17 June 2021, <https://www.youtube.com/watch?v=JhcGUoNo6Hk>, accessed 6
August 2021.
6
MoD and Nick Carter, ‘Chief of Defence Staff Speech RUSI Annual Lecture’,
17 December 2020, <https://www.gov.uk/government/speeches/chief-of-
defence-staff-at-rusi-annual-lecture>, accessed 8 August 2021.
7
MoD and Ben Wallace, ‘Defence Secretary Oral Statement on the Defence
Command Paper’, 22 March 2021, <https://www.gov.uk/government/speeches/
defence-secretary-oral-statement-on-the-defence-command-paper>, accessed 8
August 2021.
35
Nick Reynolds
8
Andrew Feickert, ‘New U.S. Marine Corps Force Design Initiatives’, Congressional
Research Service, IN11281, updated 2 March 2021, pp. 1–2; Gina Harkins, ‘Marines
to Shut Down All Tank Units, Cut Infantry Battalions in Major Overhaul’,
Military.com, 23 March 2020, <https://www.military.com/daily-news/2020/03/23/
marines-shut-down-all-tank-units-cut-infantry-battalions-major-overhaul.html>,
accessed 29 October 2021.
9
Megan Eckstein, ‘New Marine Corps Cuts Will Slash All Tanks, Many Heavy
Weapons As Focus Shifts to Lighter, Littoral Forces’, USNI News, 23 March 2020,
<https://news.usni.org/2020/03/23/new-marine-corps-cuts-will-slash-all-tanks-
many-heavy-weapons-as-focus-shifts-to-lighter-littoral-forces>, accessed 29
October 2021; David B Larter, ‘The US Marine Corps Wants Grunts Packing
Deadly Swarming Drones’, Defense News, 9 December 2020, <https://www.
defensenews.com/naval/2020/12/09/the-us-marine-corps-wants-grunts-packing-
deadly-swarming-drones/>, accessed 29 October 2021; Peter Ong, ‘“The U.S.
Marine Corps Has Divested in Their Tanks” Well, What Does That Mean?’, Naval
News, 25 September 2020, <https://www.navalnews.com/naval-news/2020/09/
the-u-s-marine-corps-has-divested-in-their-tanks-well-what-does-that-mean/>,
accessed 29 October 2021.
10
Mallory Shelbourne, ‘Panel: New Focus on China Fight Could Rob Marine Corps
of Versatility’, USNI News, 30 July 2020, <https://news.usni.org/2020/07/30/panel-
new-focus-on-china-fight-could-rob-marine-corps-of-versatility>, accessed 29
October 2021; Mark Cancian, ‘Don’t Go Too Crazy, Marine Corps’, War on the
Rocks, 8 January 2020.
36
Doing Less with Less in the Land Domain
The French army has long favoured lighter, more mobile forces,
having tailored their force structure to fit within the constraints of their
limited logistics capability, and generally tolerate greater risks.11 As the
general officer commanding its Centre for Doctrine and Command
Teaching, Michel Delion noted, ‘the French army has maybe a less
technophile approach than other armies’.12 However, its current
modernisation trajectory blends technological updates and multi-domain
concepts that are broadly comparable to their US and UK equivalents,
including a vehicle upgrade programme for its heavy forces, with the
divergent commitment to increasing spending by a projected 46%
between 2018 and 202513 and to generating combat mass on land.14 The
Chief of the French Army Thierry Buckhard has notably committed to
regenerating the army’s ability to conduct combined-arms manoeuvres at
division scale.15 Nevertheless, French military concepts do expect smaller
force packages to offer greater combat power through the application of
reconnaissance, precision fires and manoeuvre.16
Aiming to do more with less is an appropriate approach under the
right conditions. Persistent ISTAR and precision fires are an affordable
means of achieving military effect and are playing a critical role in
counterterrorist and counterinsurgency campaigns, and were recently
seen as enabling a decisive military outcome in Nagorno-Karabakh.
Meanwhile, lighter forces are easier to deploy and subsequently use in
places where heavy forces cannot be deployed within a relevant
11
Michael Shurkin, ‘What It Means to Be Expeditionary: A Look at the French Army
in Africa’, Joint Forces Quarterly (Vol. 82, No. 3, 2016), pp. 76–78.
12
Sydney J Freedberg Jr, ‘Budget Up, French Army Preps for Major Wargames With
US’, Breaking Defense, 25 November 2020, <https://breakingdefense.com/2020/11/
budget-up-french-army-preps-for-major-wargames-with-us/>, accessed 29 October
2021.
13
The Economist, ‘The French Armed Forces are Planning for High-Intensity War’,
31 March 2021.
14
Armée de Terre, ‘Strategic Vision of the Chief of the French Army: “2030
Operational Superiority”’, April 2020, pp. 2, 6, <https://franceintheus.org/IMG/
pdf/french_army_strategic_vision_2020.pdf>, accessed 27 October 2021; Ben
McLennan, ‘Confronting a Foreboding Future: The French Army’s Strategic
Vision’, The Strategist, 14 August 2020; Audrey Quintin, ‘Progress on the Scorpion
Program: France’s Plan to Upgrade its Motorised Capacity’, Finabel, 26 February
2020, <https://finabel.org/progress-on-the-scorpion-program-frances-plan-to-
upgrade-its-motorised-capacity/>, accessed 29 October 2021; Army Recognition,
‘French Army Accelerates Modernization of Land Force’, 19 September 2019,
<https://www.armyrecognition.com/september_2019_global_defense_security_
army_news_industry/french_army_accelerates_modernization_of_land_force.
html>, accessed 29 October 2021.
15
Armée de Terre, ‘Strategic Vision of the Chief of the French Army’.
16
Guy Hubin, Perspectives tactiques (Paris: Economica, 2009).
37
Nick Reynolds
17
Jim Garamone, ‘Milley Makes Case for U.S. Military Keeping Up With Global,
Technology Changes’, US Department of Defense, 2 December 2020, <https://
www.defense.gov/Explore/News/Article/Article/2432855/milley-makes-case-for-
us-military-keeping-up-with-global-technology-changes/>, accessed 29 October
2021.
18
Defence and Military Analysis Team, ‘Russia’s Armed Forces: More Capable by
Far, But For How Long?’, IISS Military Balance Blog, 9 October 2020, <https://
www.iiss.org/blogs/military-balance/2020/10/russia-armed-forces>, accessed 29
October 2021.
19
Liam Collins and Harrison ‘Brandon’ Morgan, ‘Affordable, Abundant, and
Autonomous: The Future of Ground Warfare’, War on the Rocks, 21 April 2020.
38
Doing Less with Less in the Land Domain
20
HM Government, Securing Britain in an Age of Uncertainty: The Strategic
Defence and Security Review, Cm 7948 (London: The Stationery Office, 2010),
pp. 10, 26, 33, 59, 69.
21
MoD, ‘The Defence Equipment Plan 2012’, p. 4.
22
Commons Defence Select Committee, ‘Gambling on “Efficiency”: Defence
Acquisition and Procurement Contents: 3. The Defence Equipment Plan’, 14
December 2017, <https://publications.parliament.uk/pa/cm201719/cmselect/
cmdfence/431/43106.htm>, accessed 10 March 2021.
23
HM Government, ‘National Security Capability Review’, March 2018, pp. 2–6,
14–17.
24
National Audit Office, The Equipment Plan 2020 to 2030, HC 1037 (London:
National Audit Office, 2021), p. 4.
39
Nick Reynolds
25
Shaan Shaikh and Wes Rumbaugh, ‘The Air and Missile War in Nagorno-
Karabakh: Lessons for the Future of Strike and Defense’, Center for Strategic and
International Studies, 8 December 2020, <https://www.csis.org/analysis/air-and-
missile-war-nagorno-karabakh-lessons-future-strike-and-defense>, accessed 28
August 2021.
26
Defence and Military Analysis Team, ‘Russia’s Armed Forces’.
27
Andrew Radin et al., The Future of the Russian Military: Russia’s Ground
Combat Capabilities and Implications for U.S.-Russia Competition (Santa Monica,
CA: RAND, 2019), pp. 30–36.
28
Ong, ‘“The U.S. Marine Corps Has Divested in Their Tanks” Well, What Does
That Mean?’.
40
Doing Less with Less in the Land Domain
29
Brief to RUSI by 16 Air Assault Brigade Combat Team on 12 October 2021.
30
Luke Harding and Ben Doherty, ‘Kabul Airport: Footage Appears to Show
Afghans Falling From Plane After Takeoff’, The Guardian, 16 August 2021.
31
Rupan Jaim, ‘Taliban Guards Continue to Provide Security Outside Kabul Airport
Taliban Official’, Reuters, 26 August 2021.
32
Daniel Kramer, ‘Afghanistan: Why Can’t the UK Hold Kabul Airport Without the
US?’, BBC News, 27 August 2021.
33
Centre for Historical Analysis and Conflict Research, ‘The Big Picture: The UK
Warfighting Division in Context’, Ares & Athena (No. 6, November 2016), p. 6.
41
Nick Reynolds
Integrated Review. The numbers are troubling. Only 148 of the British
Army’s 227 Challenger 2 MBTs are to be retained and upgraded after the
Integrated Review,34 and 3rd (UK) Division will operate 112 of these in
two regiments.35 Within the division, 1 Armoured Infantry Brigade, 12th
Armoured Infantry Brigade and 20th Armoured Brigade36 form a Deep
Recce Strike Combat Team and two Heavy Brigade Combat Teams
(BCTs). Each Heavy BCT will derive its principal combat power from an
armoured regiment of MBTs, specifically the Type 56 Armoured
Regiment, so-called because it consisted of 56 MBTs split into three 18-
strong squadrons, a model that remains fundamentally unchanged from
when the Army 2020 plan was developed.37 While the UK’s fleet
management dictates that units do not routinely hold a full complement
of MBTs, in the event of conflict around 112 out of 148 MBTs would sit
within the Warfighting Division. By contrast, a standard-configuration
Russian tank regiment, their closest equivalent formation to 3rd (UK)
Division’s Type 56 Armoured Regiment, would derive its principal
combat power from 93 T72B3 MBTs that would be spread across three
battalions of 31 MBTs each, supported by a motor-rifle battalion
equipped with 41 BMPs (Boyevaya Mashina Pekhoty, meaning ‘infantry
fighting vehicles’). The two supporting motor-rifle regiments would each
include another tank battalion, bringing the total number of MBTs in a
Russian division to 155.38 Qualitatively, Russian modernisation of their
armoured forces make the workhorse T72B3 MBT a threat to
Challenger.39 UK doctrine dictates that a 3:1 ratio in the close battle
should be sought to achieve decisive advantage, and is a common
planning assumption. The numerical disadvantage between the platforms
delivering combat power that the UK would face in a high-end
warfighting scenario, and the lack of a second echelon to replenish
losses when factoring in the need to retain a training fleet, indicate that
34
MoD, Defence in a Competitive Age, CP 411 (London: The Stationery Office,
2021), p. 54.
35
Ibid., pp. 20, 68.
36
British Army, ‘Continual Operation Readiness: 3rd (United Kingdom) Division’,
<https://www.army.mod.uk/who-we-are/formations-divisions-brigades/3rd-
united-kingdom-division/>, accessed 24 August 2021.
37
British Army, Transforming the British Army: Modernising to Face an
Unpredictable Future (London: The Stationery Office, 2012), p. 5.
38
Konrad Muzyka, ‘Russian Forces in the Western Military District’, CNA, June
2021, p. 23, <https://www.cna.org/CNA_files/PDF/Russian-Forces-in-the-Western-
Military-District.pdf>, accessed 24 August 2021.
39
Will Flannigan, ‘Facts Over Fear; T-14 Armata’, Wavell Room, 19 February 2019,
<https://wavellroom.com/2019/02/19/facts-over-fear-t14-take-the-threat-seriously/>,
accessed 8 August 2021.
42
Doing Less with Less in the Land Domain
43
Nick Reynolds
40
Yaniv Barzilai, 102 Days of War: How Osama bin Laden, al Qaeda & the Taliban
Survived 2001 (Washington, DC: Potomac Books, 2013), pp. 100–18.
41
Author interview with US officers advising the Afghan National Army, February
2020.
42
Ibid.
44
Doing Less with Less in the Land Domain
43
Barzilai, 102 Days of War, pp. 100–18.
44
MoD, ‘Joint Doctrine Note 2/19: Defence Strategic Communication: An
Approach to Formulating and Executing Strategy’, April 2019, p. vi-1.
45
Nick Reynolds
45
Alex Mills, ‘Training and Mission Failure at BATUS’, British Army Review
(Vol. 174, Winter 2019), pp. 91–93.
46
Colin Clark, ‘Gen. Hyten on the New American Way of War: All-Domain
Operations’, Breaking Defense, 18 February 2020, <https://breakingdefense.com/
2020/02/gen-hyten-on-the-new-american-way-of-war-all-domain-operations/>,
accessed 21 March 2021.
47
Christopher Parker, ‘Rushing to Defeat: The Strategic Flaw in Contemporary U.S.
Army Thinking’, Strategy Bridge, 6 July 2020, <https://thestrategybridge.org/the-
bridge/2020/7/6/rushing-to-defeat-the-strategic-flaw-in-contemporary-us-army-
thinking>, accessed 29 October 2021.
46
Doing Less with Less in the Land Domain
47
Nick Reynolds
resource and can credibly achieve their stated aims. Emerging technological
changes for high-end warfighting have tipped the offence–defence balance
in favour of offensive capabilities, incentivising short and fast concepts of
operations to knock out adversaries early. However, lean and efficient
forces will find themselves vulnerable to excessive attrition and being
rendered combat ineffective if they do not operate their first echelon at a
larger scale than they do at present. These must include sufficient
frontline ground combat forces, as platforms, systems and formations
dedicated to delivering long-range kinetic and non-kinetic effects are
ultimately only enablers of more traditional forces which can take, hold
and dominate ground and deliver security in the areas of the battlespace
they control.
48
IV. SWARMING MUNITIONS, UAVs
AND THE MYTH OF CHEAP MASS
JUSTIN BRONK
Swarming munitions and cheap ‘attritable’ UAVs are two of the most
common features of PowerPoint slides and forecasting documents
dealing with the future battlefield.1 Alongside the ubiquitous lightning
bolts representing seamless connectivity, these highly automated assets
are pictured sweeping across future skies in large numbers, rolling back
the fog of war, conducting stand-in jamming and striking key targets with
pinpoint accuracy.2 It is small wonder that this vision is extremely
attractive to many policymakers. In the UK, both the Chief of the Air Staff
and Chief of the Defence Staff recently outlined a vision where such
capabilities might provide up to 80% of the RAF’s combat air mass by the
2030s.3
Swarming munitions are designed to be used in large numbers
simultaneously, and to coordinate their actions as a group to improve
overall efficiency. Attritable, reusable UAVs are an emerging class of UAV
designed for a limited operational lifespan, able to carry modular sensor
1
For example, Ministry of Defence, ‘Joint Concept Note 1/17: Future Force
Concept’, July 2017, p. 43; Frank Fresconi and Scott Schoenfeld, ‘ARL Experts Are
on Target to Find Solutions for the Future Battlespace’, US Army, 9 February
2018, <https://www.army.mil/article/200409/arl_experts_are_on_target_to_find_
solutions_for_the_future_battlespace>, accessed 16 February 2021; Valerie
Insinna, ‘These Are the Five Areas Where the Air Force Wants to See an
Explosion of Technology’, Defense News, 17 April 2019.
2
T X Hammes, ‘Expeditionary Operations in the Fourth Industrial Revolution’,
MCU Journal (Vol. 8, No. 1, July 2017), pp. 82–103.
3
Harry Lye, ‘Future RAF Will Mix Crewed Fighters, UAVs and Swarming Drones:
CDS’, Airforce Technology, last updated 14 April 2021, <https://www.airforce-
technology.com/features/future-raf-will-mix-crewed-fighters-uavs-and-swarming-
drones-cds/>, accessed 9 August 2021.
49
Justin Bronk
4
Mark Gunzinger and Lukas Autenried, ‘Understanding the Promise of Skyborg
and Low-Cost Attritable Unmanned Aerial Vehicles’, Mitchell Institute Policy
Paper (Vol. 24, September 2020).
5
Defence Synergia, ‘CDS Speech to IISS 31 March 2021 – Integrated Review’,
6 April 2021, <https://www.defencesynergia.co.uk/cds-speech-to-iiss-31-march-
2021-integrated-review/>, accessed 29 October 2021. See also General Sir Nick
Carter’s discussion of ‘sunset capabilities’ in HM Government and Nick Carter,
‘Chief of the Defence Staff, General Sir Nick Carter’s Annual RUSI Speech’,
5 December 2019, <https://www.gov.uk/government/speeches/chief-of-the-
defence-staff-general-sir-nick-carters-annual-rusi-speech>, accessed 29 October
2021.
6
Missile Defense Advocacy Alliance, ‘P-700 Granit/SS-N-19 “Shipwreck”’, 28 June
2018, <https://missiledefenseadvocacy.org/missile-threat-and-proliferation/todays-
missile-threat/russia/p-700-granit-ss-n-19-shipwreck/>, accessed 5 March 2021.
50
Swarming Munitions, UAVs and the Myth of Cheap Mass
from the remaining group would climb to take over the guidance and
coordination role. Since the intended target – US Navy carrier
battlegroups – would generally be attacked in open waters and presented
a distinctive radar signature, the limited processing power and sensor
capacity of Soviet missiles at the time was sufficient to enable this
swarming behaviour.
For modern swarming munitions, however, the primary targets are
likely to be hostile radars, missile launchers and armoured vehicles.
These will generally be hidden in complex terrain, mobile, well
camouflaged and often protected by decoys and point defence systems.
This dramatically increases the complexity of the cooperative detection,
classification and prioritisation task which modern swarming munitions
must be able to undertake in flight. Nonetheless, a combination of
compact, high-resolution sensors and increasingly powerful
microprocessors is giving a new generation of weapons the capability to
overcome many of these challenges. The US Air Force is currently testing
a range of adapted cruise missiles and glide bombs to demonstrate
swarming behaviours under the umbrella of its Golden Horde
programme.7 In Europe, MBDA plans to incorporate certain swarming
capabilities into their SPEAR 3/EW family of munitions for the UK
Ministry of Defence (MoD).8 The key target set for both is likely to be
hostile integrated air defence system (IADS) components including
command and control nodes, mobile radars and high-threat surface-to-air
missile (SAM) launchers.
In terms of attritable UAVs, the US Air Force recently launched its
Skyborg autonomous UAV ‘pilot’ development programme, which
commenced flight testing fitted to UAVs manufactured by various
companies in summer 2021.9 The UK’s MoD has funded the development
of its new Lightweight Affordable Novel Combat Aircraft (LANCA)
technology demonstrator, with flight testing due to commence in 2023.10
The Royal Australian Air Force also has six Boeing Loyal Wingman
7
Thomas Newdick, ‘Golden Horde Swarming Munitions Program Back On Target
After Second Round of Tests’, The Warzone, 3 March 2021.
8
Author correspondence with MBDA subject matter expert, 8 March 2021.
9
Valerie Insinna, ‘Skyborg Makes its Second Flight, This Time Autonomously
Piloting General Atomics’ Avenger Drone’, Defense News, 30 June 2021. See also
Daryl Mayer, ‘AFLCMC Awards Contract for Skyborg Prototypes’, US Air Force,
10 December 2020, <https://www.af.mil/News/Article-Display/Article/2440755/
aflcmc-awards-contract-for-skyborg-prototypes/>, accessed 18 February 2021.
10
Craig Hoyle, ‘Spirit Team to Fly LANCA Loyal Wingman Demonstrator for UK’,
Flight Global, 26 January 2021, <https://www.flightglobal.com/defence/spirit-
team-to-fly-lanca-loyal-wingman-demonstrator-for-uk/142126.article>, accessed
3 March 2021.
51
Justin Bronk
11
Greg Waldron, ‘Boeing Australia’s “Loyal Wingman” Conducts Maiden Sortie’,
Flight Global, 2 March 2021, <https://www.flightglobal.com/defence/boeing-
australias-loyal-wingman-conducts-maiden-sortie/142685.article>, accessed 3
March 2021.
12
Royal Air Force, ‘About the Typhoon FGR4’, <https://www.raf.mod.uk/aircraft/
typhoon-fgr4/>, accessed 19 September 2021.
52
Swarming Munitions, UAVs and the Myth of Cheap Mass
shorter range, or a much smaller useful payload. The weight of any aircraft
is closely linked with operating costs, since in conjunction with the
aerodynamic configuration the weight dictates the amount of power
needed from the engines in order to produce sufficient lift at various
speeds. Heavier airframes need more powerful engines to fly at any
given speed, which generally consume more fuel. This results in either a
shorter range or the need to carry more fuel, which in turn further
increases the required size and weight of the aircraft. As such, the lighter
a UAV can be made, the more likely it is to be sufficient to allow
affordable operations at significant scale. However, this will prevent it
from carrying large payloads, and also limit either range or performance.
Sacrificing fast jet-class performance in favour of slower cruising
speeds would allow range to be increased relative to airframe size and
weight. The slower something is required to fly, the less aerodynamic
drag it must overcome and so the smaller and more fuel efficient its
engine can be. Thus, if desired cruise speed (and acceleration
characteristics) can be kept low, then range for attritable UAVs can be
significantly extended for a given size and fuel capacity. However, this
would mean that such attritable UAVs would need to operate in loose
coordination with, rather than in mixed formations alongside, fast jets in
‘loyal wingman’-type roles. A similar dynamic is true for swarming
munitions development – for a given size, weight and cost of munition,
speed can be increased at the expense of range or vice versa, but
militaries cannot have both in the same design. If something must travel
fast and over long distances, it will have to carry a lot of fuel to feed a
powerful engine, and thus be larger, heavier and more expensive.
Stealth properties further shift this equation towards high acquisition
and operating costs. The airframe shapes which are compatible with low
observability to radars operating in the X and Ku bands are generally less
aerodynamically efficient than more traditional aircraft shapes. This
means they must be larger to generate the same amount of lift.
Furthermore, aircraft which rely on low observability to survive against
hostile forces must carry all their fuel and weapons internally, since
traditional stores on external pylons greatly increase radar cross section.
Therefore, stealth aircraft must be larger and more complex than
traditional equivalents due to the need to accommodate internal weapons
bays and all the necessary fuel within the airframe itself. The stealth
coatings which typically cover such aircraft are also more difficult and
expensive to manufacture than traditional aircraft skins and must be
maintained to a high level of finish to remain effective, which increases
the costs of maintenance and storage. The widespread adoption of
stealth aircraft also affects the requirements for both swarming and more
traditional munitions. Since munitions delivered by stealth aircraft must
53
Justin Bronk
54
Swarming Munitions, UAVs and the Myth of Cheap Mass
13
There is a similar phenomenon at play with loyal wingman-type UCAV
autonomy requirements, as has been found by developers of driverless cars. Safe
and predictable interactions are easier to programme between multiple
automated vehicles than a mix of automated and human-controlled ones. See, for
example, Rodney Brooks, ‘The Big Problem With Self-Driving Cars Is People’,
IEEE Spectrum, 27 July 2017.
14
Fast Jet Performance, ‘SAM Dodging Over the Nevada Desert – Why Low-Level
Flying Is Still Necessary’, 2015, <https://www.fastjetperformance.com/blog/sam-
dodging-over-the-nevada-desert-why-low-level-flying-is-still-necessary>, accessed
9 March 2021.
55
Justin Bronk
15
See, for example, Northrop Grumman, ‘X-47B UCAS’, <https://www.
northropgrumman.com/what-we-do/air/x-47b-ucas/>, accessed 9 March 2021;
BAE Systems, ‘Taranis’, <https://www.baesystems.com/en/product/taranis>,
accessed 9 March 2021.
16
For a detailed discussion of each, see Justin Bronk, The Future of NATO
Airpower: How Are Future Capability Plans Within the Alliance Diverging and
How Can Interoperability be Maintained?, Whitehall Paper 94 (London: Taylor
and Francis, 2020).
56
Swarming Munitions, UAVs and the Myth of Cheap Mass
question for medium powers with aspirations for penetrating ISTAR, SEAD/
DEAD and strike capabilities is when rather than if they take the ethical and
political plunge. With the requisite high levels of in-flight autonomy,
standalone UCAVs can be designed with a low airframe fatigue life and
operated sparingly in terms of hours flown to retain combat proficiency
of each squadron compared to piloted aircraft. This means total through-
life costs of such systems are likely to be significantly lower than those of
piloted equivalents. However, the very-low-observable airframe,
autonomy and sensors required to operate in the penetrating role in
defended airspace over comparable ranges to piloted combat aircraft
once again imply an acquisition cost which is lower but still comparable
to those of fast jets. Since they offer clear benefits for high-intensity
mission sets, penetrating low-observable UCAVs are likely to be a major
feature of high-end state air power in the coming decades. However,
although one of their attractive qualities is the lack of risk to human
crew, they are likely to be too expensive to be considered truly attritable
for any but the largest of air forces.
The third important class of attritable UAVs being trialled at the time
of writing are those in or below the size and weight class of cruise missiles.
These UAVs blur the line between autonomous aircraft and advanced,
potentially reusable munitions. The upper end of this category involves
compact, subsonic airframes with a small jet engine, fold-out wings and a
modular sensor and/or electronic warfare payload capacity. They are
designed to be either launched from other aircraft or by using a booster
rocket from the ground or a maritime platform, and then potentially
recovered by parachute or in-flight docking with another aircraft after
they have fulfilled their missions. DARPA’s ‘Gremlins’ programme is
perhaps the best known, but there are likely experiments being
undertaken by many states to develop similar concepts.17 The attraction
of such systems is that they can potentially be reused, adding efficiency
over single-use loitering munitions or stand-in jammer equivalents, while
also having an acquisition cost measured in hundreds of thousands or
low millions of dollars as opposed to tens of millions for loyal wingmen
or standalone UCAVs. The limitations compared to those systems concern
payload, mission flexibility and a likely cost which is still comparable to
high-end cruise missiles, which most medium and small air forces already
struggle to field in sufficient numbers. Ultimately, these UAVs offer
various cost advantages over single-use munitions in certain contexts and
can allow the application of novel swarming tactics to problem sets such
17
Paul J Calhoun, ‘Gremlins’, DARPA, <https://www.darpa.mil/program/
gremlins>, accessed 8 March 2021.
57
Justin Bronk
18
Craig Hoyle, ‘RAF Chief Reveals Combat Cloud, Swarming Drone Advances’,
Flight Global, 15 July 2021, <https://www.flightglobal.com/defence/raf-chief-
reveals-combat-cloud-swarming-drone-advances/144604.article>, accessed 9
August 2021.
58
Swarming Munitions, UAVs and the Myth of Cheap Mass
being trialled in the Golden Horde initiative search for, classify and
collectively prioritise targets as a group, reacting dynamically to
unexpected threats or changes in the environment.19
The degree of autonomous, cooperative capabilities which munitions
are developed with will depend on the anticipated breadth and complexity
of potential mission sets, and the cost, weight and range requirements to
be met. A small munition such as SPEAR 3 or the GBU-53/B StormBreaker,
for example, cannot carry a sufficiently powerful warhead to breach
deeply buried or heavily fortified targets such as bunkers. Furthermore, if a
weapon is to be capable of multiple mission sets in different weather
conditions, this will increase the requirements for multispectral, high-
resolution sensors such as millimetric radar, infrared imaging or light
detection and ranging (LIDAR). However, multispectral sensors also
significantly increase weapon cost and require additional space, batteries
and coolant. The latter compete with fuel, warhead options and the
propulsion system for space and weight. Once again, the longer-ranged
and more responsive, flexible and precise a swarming weapon is required
to be, the larger and more expensive it becomes.
There is also the issue of launch platform capacity and risk tolerance.
The more survivable a launch platform is, the closer it can get to threat
systems and target areas to deploy swarming munitions. Getting closer
also allows launch platforms more opportunities to use their onboard
sensors to give the munitions the best situational awareness picture
possible at launch. Stealth fighters are an obvious candidate but are
limited in terms of munitions capacity by having to carry them internally
to maintain a low radar signature. More traditional fighters such as the
Typhoon or F-15E can carry more munitions but must stand off further
from hostile threats for a given level of risk. Large bombers or transport
aircraft can potentially carry large numbers of munitions but are easy to
detect and have very limited self-defence capabilities if fired upon.
Therefore, there is an inverse relationship between how close a launch
platform can get to defended targets and the number of munitions each
launch platform can carry. This is further complicated by the fact that
having to launch from longer distances from the target area means that
the munitions must be larger or much slower to achieve the required
range. A munition in the 100-kg class with an efficient mini-turbojet
propulsion system might be able to offer standoff ranges of around
150 km with a medium–high altitude release. However, this is still well
19
Garrett Reim, ‘Golden Horde Collaborative Bombs Hit Four Targets
Simultaneously in Test’, Flight Global, 26 February 2021, <https://www.
flightglobal.com/fixed-wing/golden-horde-collaborative-bombs-hit-four-targets-
simultaneously-in-test/142655.article>, accessed 1 April 2021.
59
Justin Bronk
within threat range for legacy fighters, let alone transport aircraft, against a
modern peer IADS. Therefore, swarming munitions intended to be
launched in numbers beyond those which can be carried by the limited
number of penetrating assets available will need to be larger and heavier,
thus making them more expensive.
The addition of swarming capabilities promises significant new
tactical capabilities to a range of existing large and small munitions
classes. These will increase their ability to overcome point defence
systems and allow the integration of organic stand-in jamming
capabilities to a salvo of kinetic munitions. More sophisticated examples
will also allow cruise missiles and glide bombs to search areas for
suspected but as-yet-undetected threats, where rules of engagement
permit. However, these are capability enhancements which will come
with a high cost per weapon fired, even compared to current-generation
standoff weapons. They will also not break the basic relationship
between desired standoff range, cruise speed and weapon size/cost.
Thus, any assumption that swarming munitions will solve current mass
shortcomings in terms of munitions stocks, and the lack of sufficient
survivable launch platforms to get them within range of defended targets,
is sadly misplaced.
In conclusion, swarming munitions and sophisticated UAVs promise
a range of opportunities to increase the efficiency of projecting power in the
air domain. However, unit costs will remain high, especially if the systems
in question are intended to be sufficiently flexible to replace traditional
alternatives across a range of operational scenarios, rather than provide
incremental efficiency gains through a supplementary approach. Even
following the latter approach, the required attributes for most roles mean
that, for countries other than the US and China, swarming munitions and
UAVs/UCAVs will only be affordable in small quantities.
60
V. THE LIGHTS MAY GO OUT, BUT
THE BAND PLAYS ON
PETER ROBERTS
1
J David Singer, ‘Threat-Perception and the Armament-Tension Dilemma’, Journal
of Conflict Resolution (Vol. 2, No. 1, 1958), pp. 90–105.
2
Gary Hamel and C K Prahalad, ‘Strategic Intent’, Harvard Business Review (July–
August 2005).
3
Peter Roberts and Heather Venable, ‘Episode 62: Heather Venable: Gen-Z – The
Best Tacticians in History?’, RUSI Western Way of War podcast, 2 September 2021,
<https://www.rusi.org/podcasts/western-way-of-war/episode-62-heather-venable-
gen-z-best-tacticians-history>, accessed 28 October 2021.
61
Peter Roberts
such as Al-Qa’ida, the Islamic State and the Taliban. In this, political and
military leaders seem to have developed an idea that their state’s will to
fight is a fixed variable that has been in a state of slow decline.4 As such,
the chief variable in determining success on the battlefield has often been
equated to military spending alone and the associated military equipment
that is delivered and in service. This is not only a Western issue – for
example, Russia’s doctrine of a ‘correlation of forces’ considers military
capabilities as lined up against each other in a cold calculation that the
greater capability will win on the battlefield.5 Since the concept of
military ‘mass’ is thought to be unaffordable in contemporary Western
military circles, technology has become the crutch with which military
and (later) political leaders have sought to counterbalance the equation
in their favour.6
However, this chapter will evidence that states have proven highly
resilient and adaptable in response to shocks over time. Unless they are
physically occupied, states are usually able to reconstitute and conduct
prolonged operations. In time, these states have demonstrated an ability
to withstand continuous and considerable pressure from foreign actors.
Furthermore, casualty tolerance is not a fixed variable but is highly
context dependent. In any major conflict, casualty tolerance often
increases drastically but is also variable over time: publics have shown
themselves to be much more tolerant to casualties than their political or
military leaders, depending on the cause. This idea of resetting the
narrative on a national will to fight in political and military circles is vital
in order to embed a sound conceptual understanding of our ability to
wage war in the future.
This chapter aims to refine and redefine this calculation to one that
places a much higher emphasis on the national will to fight. It outlines
the idea that a nation’s military capability multiplied by the national will
to fight must be greater than that of an enemy to prevail in a conflict.
Importantly, the idea of the national will to fight – linked to a political
will, which is itself derived from popular support for an intervention –
has two associated factors. First, that the national will to fight multiplies
military capability and is not a simple addition, and second that the will
4
Michael J McNerney et al., National Will to Fight: Why Some States Keep Fighting
and Others Don’t (Santa Monica, CA: RAND, 2018).
5
Julien Lider, ‘The Correlation of World Forces: The Soviet Concept’, Journal of
Peace Research (Vol. 17, No. 2, 1980), pp. 151–71.
6
Ministry of Defence (MoD) and Nick Carter, ‘Chief of Defence Staff Speech RUSI
Annual Lecture’, 17 December 2020, <https://www.gov.uk/government/speeches/
chief-of-defence-staff-at-rusi-annual-lecture>, accessed 23 August 2021.
62
The Lights May Go Out, But the Band Plays On
Resilient Societies
Western societies have proven themselves remarkably resilient to systemic
shocks. Indeed, in many cases they have exceeded expectations in terms of
their ability to adapt to disruption. Consider, for example, the case of Britain
over the course of the Napoleonic and world wars. The country’s
dependence on food imports and losses to blockades were at their
greatest during the First and Second World Wars, yet suffering from food
shortages during the Napoleonic era exceeded that of the two later
conflicts. The modern state’s ability to reorganise, stockpile and substitute
lost imports largely mitigated the effects of a strategy of punishment,
7
‘Sunk costs’ refer to the amount of resource that has been already expended and
cannot be recovered. In national security terms, there is an associated feeling of
‘how can we give this up after all we’ve sacrificed?’. See Carl Forsling,
‘Understanding the Sacrifice and Sunk Cost of the War in Afghanistan‘, Task and
Purpose, 11 March 2021, <https://taskandpurpose.com/analysis/afghanistan-sunk-
costs-withdrawal/>, accessed 29 October 2021.
63
Peter Roberts
even when a critical resource was threatened.8 The Royal Navy and British-
flagged merchant fleets were essential in providing protection to convoys
and transporting supplies during this period. While they sustained heavy
losses, the state itself proved remarkably resilient.
Such examples worked against the logic of military strategists of the
time. For example, before the Second World War, advocates of air power
such as Guilio Douhet made the case that the destruction of the
infrastructure that underpinned an opponent’s civilian economy would
render direct clashes with its forces unnecessary.9 An analogue to this
notion was also voiced by figures such as Basil Liddell Hart and the
Defence Secretary Leslie Hoare Belisha, both advocates of the so-called
‘indirect approach’ through which a combination of blockades and
airpower would allow Britain to avoid a repetition of the bloody
attritional battles of the First World War.10 Their ideas were founded on
an argument that societies were complex and fragile ecosystems in which
the disruption of key subsystems could produce the collapse of the
system as a whole.11
More recently, much has been made of the use of combined powers
of states to undermine their adversaries at a national level. Russian
operations in Georgia (2008) and Ukraine (2014) used political, military,
economic and cyber levers to attack sovereign governments and achieve
a degree of success in meeting their desired goals. Yet, in doing so,
Russia also galvanised the attacked societies to solidify as states in
response and harden their own resilience to future attacks. In Georgia,
successive administrations overturned NATO advice and reverted to a
conventional military, moving away from the specialised and technical
one that other Western powers had been advocating. In Ukraine, a
40,000-person, crowd-funded militia demonstrated public support for a
8
Mancur Olson Jr, The Economics of the Wartime Shortage: A History of British
Food Supplies in the Napoleonic War and in World Wars I And II (London:
Literary Licensing, 2012).
9
Robert A Pape, Bombing to Win: Air Power and Coercion in War (Ithaca, NY:
Cornell University Press, 1996), p. 60.
10
John J Mearsheimer, Liddell Hart and the Weight of History (Ithaca, NY: Cornell
University Press, 1988), p. 103. In fairness to Liddell Hart, he did accept the
importance of attrition on the ground, but felt that this role should be outsourced
to allies.
11
This idea had a particular (though not exclusive) appeal to classical liberals who
feared the impact of large standing armies on the power of the state and looked to
win wars in an economical way. See, for example, Azar Gat, A History of Military
Thought: From the Enlightenment to the Cold War (Oxford: Oxford University
Press, 2001), pp. 200–50.
64
The Lights May Go Out, But the Band Plays On
12
Edmund J Burke et al., ‘People’s Liberation Army Operational Concepts’, RAND
Corporation, 2020.
13
Jon R Lindsay, ‘The Impact of China on Cybersecurity: Fiction and Friction’,
International Security (Vol. 39, No. 3, 2015), pp. 7–47.
14
Soufan Center, ‘IntelBrief: 15 Years After Madrid Tarin Bombings, What Have We
Learned’, 11 March 2019, <https://thesoufancenter.org/intelbrief-the-15th-
anniversary-of-the-madrid-train-bombings/>, accessed 10 October 2021.
15
Theo Farrell, ‘Culture and Military Power’, Review of International Studies
(Vol. 24, No. 3, 1998), pp. 407–16.
65
Peter Roberts
16
Jan Angstrom and J J Wigen, Contemporary Military Theory: The Dynamics of
War (New York, NY: Routledge, 2015), pp. 78–79.
17
Peter Roberts and Tony King, ‘Episode 30: Is the Era of Manoeuvre Warfare
Dead?’, RUSI Western Way of War podcast, 10 December 2020, <https://rusi.org/
podcasts/western-way-of-war/episode-30-era-manoeuvre-warfare-dead>,
accessed 29 October 2021; Peter Roberts and Mungo Melvin, ‘Episode 23: Utility vs
Utilisation’, RUSI Western Way of War podcast, 5 November 2020, <https://rusi.org/
podcasts/western-way-of-war/episode-23-utility-vs-utilisation>, accessed 29
October 2021.
18
Niklas Schörnig and Alexander C Lembcke, ‘The Vision of War Without
Casualties: On the Use of Casualty Aversion in Armament Advertisements’,
Journal of Conflict Resolution (Vol. 50, No. 2, 2006), pp. 204–27.
19
Thomas R Mockaitis, Civil-Military Cooperation in Peace Operations: The Case
of Kosovo (Carlisle, PA: US Army War College, 2004).
66
The Lights May Go Out, But the Band Plays On
that could have significant implications for their findings.20 These three
factors have resulted in a political casualty intolerance that has been a
focus of military planning in the UK at least since 1996 and, according to
some, has shaped the country’s government policy about interventions,
engagements and national security since 2003.21
The fixation on military casualty rates is a relatively recent
phenomenon, linked particularly to post-Cold War military engagements,
and has been variable throughout campaigns. A direct link between the
nature of public outcry and interest in military interventions is seemingly
linked to perceptions of the campaign itself. For example, deaths during
the 2003 invasion of Iraq received much less attention than the
subsequent deaths of service personnel during the long
counterinsurgency/state-building campaign that followed. Similar
experiences can be found during the campaign in Afghanistan: casualties
in Operation Jacana in 2002 were expected, but during the subsequent
state-building campaign (2004–17), personnel losses were met with more
questions and resistance.
The same is true for US experiences, as well as other allies who
engaged in these campaigns. One might draw the conclusion that the
public expects the military to make sacrifices in wars they believe are
worthwhile but will be less tolerant when the benefits are unclear. They
also change over the course of these campaigns. This has significant
implications for the military, military operations, and political decision-
making in questions of defence and security.
Arguably, Western governments have always had a requirement to
justify their use of military forces to the electorate. As an intrinsic part of
the democratic process, how governments explained why they were
waging war also involved a narrative of how they were fighting it; an
explanation for the costs in ‘blood and treasure’ to the state and society
at large.22 The number, scale and severity of casualties (dead and
injured) during conflict started to become a more prominent question in
proxy conflicts during the final stages of the Cold War.23 Indeed, it has
been argued that the Vietnam War was a turning point in the US – taking
20
Robert Johns and Graeme A M Davies, ‘Civilian Casualties and Public Support for
Military Action: Experimental Evidence’, Journal for Conflict Resolution (Vol. 63,
No. 1, 2019), pp. 251–81.
21
Paul Cornish, ‘Myth and Reality: US and UK Approaches to Casualty Aversion
and Force Protection’, Defence Studies (Vol. 3, No. 2, 2003), pp. 121–28.
22
John E Mueller, War, Presidents and Public Opinion (New York, NY: John Wiley
and Sons, 1973), pp. 60–69.
23
Victor Mahieu, ‘Casualty Aversion in Western Countries’, Finabel, 15 May 2019,
<https://finabel.org/casualty-aversion-in-western-countries/>, accessed 12
February 2021.
67
Peter Roberts
time to move across the Atlantic to other Western allies – and produced new
attitudes towards military casualties in the Western world, stimulating the
term ‘Vietnam Syndrome’ to indicate the ‘American public’s unwillingness
to continue to support US foreign military efforts, particularly as
casualties rise’.24 Elsewhere in the West, timelines might have been
different but thinking was shifting in the same direction: casualties in the
Falklands War (1982), and how the dead were commemorated,25
alongside the long-running counterinsurgency operations in Northern
Ireland did not shape policy decisions in the UK at the time, yet casualty
aversion did become a significant factor in the 1990s. Subsequently, it has
taken up permanent residence in national security decision-making.26
It was only really after the end of the Cold War that the political and
military concern over casualties as such became an issue across all Western
states. The images of dead and injured service personnel in Somalia (1993)
or in the Former Republic of Yugoslavia (1995) brought home the cost of
conflict in a world lauded as largely devoid of enemies.27 For some allies,
it has been claimed that such has been the lack of risk appetite for
casualties that it has become the single factor in determining whether
interventions will take place or not.28 Others claim that the casualty
averse nature of political decision-making since the 1990s has forced
militaries to embrace an entirely new Western military concept of war,
one in which rapid, bloodless victories are possible when technology
and overwhelming superiority can be assured.29 Notably, this research
took place before the global War on Terror following terrorist attacks in
2001. Yet, the rhetoric of risk aversion has again made its way into the
public discourse by senior military leaders.30
Under the broad category of casualties (including those projected in
‘collateral damage’ estimates), one might consider classifying causes for
casualty aversion under four headings: national interest; strategic
24
Richard A Lacquement Jr, ‘The Casualty-Aversion Myth’, Naval War College
Review (2004), p. 41.
25
Helen Parr, Our Boys: The Story of a Paratrooper (London: Allen Lane, 2018).
26
Christopher Coker, ‘Post-Modern War’, RUSI Journal (Vol. 143, No. 3, 1998),
pp. 7–14.
27
Charles A Stevenson, ‘The Evolving Clinton Doctrine on the Use of Force’,
Armed Forces & Society (Vol. 22, No. 4, 1996), pp. 511–35; Jan van der Meulen
and Marijke de Konink, ‘Risky Missions: Dutch Public Opinion on Peacekeeping
in the Balkans’, in Philip Everts and Pierangelo Isernia (eds), Public Opinion and
the International Use of Force (New York, NY and Abingdon: Routledge, 2001).
28
T S Milburn, ‘Casualties – The Crucial Factor in Modern Conflicts’, British Army
Review (Vol. 113, August 1996), pp. 78–84.
29
Andrew P N Erdmann, ‘The U.S. Presumption of Quick, Costless Wars’, Orbis
(Vol. 43, No. 3, Summer 1999), pp. 378–80.
30
MoD and Carter, Chief of Defence Staff Speech RUSI Annual Lecture’.
68
The Lights May Go Out, But the Band Plays On
calculus; internal politics; and long-term social change.31 In doing so, one
must also acknowledge the military drive for reduced casualties that has
endured for millennia in both the East and the West, whether in full-
spectrum, high-intensity conflict or in more coercive and less kinetic
campaigns. Both Sun Tzu (‘Supreme excellence consists of breaking the
enemy’s resistance without fighting’) and Machiavelli (‘Never attempt to
win by force what can be won by deception’) advocated for approaches
that maximised gains and minimised casualties.32 Warfare can never be
regarded as an efficient use of national resource, and the loss and/or
waste of fighting power through avoidable casualties is not a
characteristic normally demonstrated by successful militaries. On the
other hand, it seems impossible that a state could win a war with a
serious opponent unless prepared to accept the risks involved. Yet,
perversely per Clausewitz, inflicting casualties on the adversary is the
very foundation to the nature of warfare,33 driving the adversary to a
position where capitulation is more attractive than the continued loss of
resource. This represents victory in both the political and military space:
casualties rather than financial headlines have become the public
manifestation of resource invested in military operations. Death,
destruction and injury are a core part of warfare and appear likely to
remain so.
Despite this, a notable nobility has developed in political and military
narratives regarding casualty aversion beyond the wasted resource and
costs associated with repatriation and/or long-term treatment. Yet, it is
also clear that a state displaying a high casualty-averse policy or position
can undermine its own strategic posturing: if casualties matter more than
the campaign, and the adversary understands this and messages
accordingly, a state can be forced from the conflict without the
requirement for a decisive military engagement (Spain in Iraq in 2003–04
is a fitting example).34 Such manifestations of policy undermine any
31
Hugh Smith, ‘What Costs Will Democracies Bear? A Review of Popular Theories
of Casualty Aversion’, Armed Forces and Society (Vol. 31, No. 4, 2005), pp. 487–512.
32
See, for example, fs, ‘Attrition Warfare: When Even Winners Lose’, 2017,
<https://fs.blog/2017/07/attrition-warfare/>, accessed 31 March 2021; Karl
Walling, ‘Thucydides on Policy, Strategy, and War Termination’, Naval War
College Review (Vol. 66, No. 4, 2013), p. 24.
33
See Beatrice Heuser, ‘Introduction’, in Carl von Clausewitz, On War, translated
by Michael Howard and Peter Paret (Oxford: Oxford University Press, 2008),
p. xxviii.
34
‘The rich man’s option is to sanitise war; the poor man’s is to make it even more
horrendous than it is’. See Christopher Coker, Humane Warfare (London:
Routledge, 2001), p. 65.
69
Peter Roberts
35
Justin Bronk, ‘The Weakness of “People” in Deterrence’, RUSI Commentary,
18 December 2019.
36
Ben Barry, Blood, Metal and Dust: How Victory Turned Into Defeat in
Afghanistan and Iraq (London: Osprey, 2021).
37
Eyal Ben-Ari, ‘Epilogue: A “Good” Military Death’, Armed Forces & Society
(Vol. 31, No. 4, 2005), p. 662.
38
Smith, ‘What Costs Will Democracies Bear?’.
39
Peter Roberts and Ben Barry, ‘Episode 44: Evolving the Western Way of War Into
(and Out of) COIN’, RUSI Western Way of War podcast, 15 April 2021, <https://rusi.
org/podcasts/western-way-of-war/episode-44-evolving-western-way-war-and-out-
coin>, accessed 20 October 2021.
70
The Lights May Go Out, But the Band Plays On
own book of scenarios for using operational analysis to test force structures
and equipment, in which UK military casualties were deemed to be an
important element of the calculus that would determine success.
Different levels of fatalities and casualties were assigned for different
types of mission and differing scales of effort. Whilst there appeared to
be little detailed analysis behind them, the figures were representative of
the Falklands conflict in 1982, Northern Ireland during The Troubles and
UK Balkan experiences in the 1990s. The belief has been that casualty
risk aversion is a critical determinant in political decisions to undertake
any specific campaign, and that the military might be expected to
guarantee a risk level to deployed forces that bounded missions and the
part that UK forces could play in a wider campaign.40
There is some evidence to underwrite such claims, and an
accompanying set of expectations in infrastructure planning for medical
and psychological casualties that saw the UK remarkably unprepared for
the losses in Afghanistan and Iraq. Part of the problem with managing
fatalities, the wounded and their families from Iraq and Afghanistan was
the apparent lack of preparedness of both Selly Oak and the
rehabilitation and service welfare organisations to manage the
consequences. They gave the impression that they had never envisaged
the high level of steady casualties or were unprepared to quickly ramp
up, or both.41
Considerable efforts have been made to reduce the risk to personnel
deployed in war zones, specifically those from the armed forces. In order to
minimise casualties, there has been an increasing appetite to employ
contractors instead of government employees: an approach as clear in
Russia as it is across Western governments.42 Yet, those measures have
not been sufficient in interventions when the deployment of sovereign
troops has been required. In such circumstances, and against such
perceptions of casualty intolerance, the implications on decision-making,
planning and military activities have been significant. Now underpinning
the entire approach to the UK’s campaign planning, response options,
and assumptions of endurance, risk and appetite, this idea of a political
and societal obsession with casualties has become inculcated in military
life. The result has been a desire that any military operation needs to be
not only high reward, but low risk: a dynamic that is almost impossible
40
Cornish, ‘Myth and Reality’.
41
Richard Dannatt, Leading from the Front (London: Corgi, 2011), pp. 342–57.
42
R Kim Cragin and Lachlan MacKenzie, ‘Russia’s Escalating Use of Private Military
Companies in Africa’, Institute for National Strategic Studies, 24 November 2020,
<https://inss.ndu.edu/Media/News/Article/2425797/russias-escalating-use-of-
private-military-companies-in-africa/>, accessed 1 March 2021.
71
Peter Roberts
43
Lacquement Jr, ‘The Casualty-Aversion Myth’.
44
See Triangle Institute for Security Studies, ‘Project on the Gap Between the
Military and Civilian Society: Digest of Findings and Studies’, Conference on the
Military and Civilian Society, Cantigny Conference Center, 1st Division Museum,
28–29 October 1999.
45
Johns and Davies, ‘Civilian Casualties and Public Support for Military Action’.
72
The Lights May Go Out, But the Band Plays On
realistic, whilst the civilian leadership strata opted for a figure of 19,045. The
mass public considered 29,853 military casualties acceptable.46
Despite the evidence, arguments continue to be made that UK views
and opinions differ considerably from those in the US. Much of this might
be attributed to the UK’s obsession over deciphering wars of ‘choice’
versus ‘necessity’. There is also an idea that UK society is a fast adaptor,
especially in the case of necessity.47 The public may indeed be able to
make nuanced judgements and engage in a discussion about national
security, resourcing of defence and the acceptance of casualties provided
they are able to view the need as having legitimacy. There is therefore a
wider implication that the government, rather than running away from
public scrutiny, should be more prepared to make the case for the use of
force.48
The latter becomes important given the British experience of
casualties in combat when contrasting the entire Afghanistan campaign
(454 soldiers) and the First World War.
A senior British military colleague argued that the public would
never again tolerate a war with significant military casualties. He
made the point that the 454 soldiers killed in Afghanistan
represented ‘a quiet day on the Western Front’ during the First
World War. Some basic maths suggests that Britain lost an average
of 341 men each day on the Western Front between August 1914
and November 1918.49
Given the rhetoric about China and Russia in Prime Minister Boris Johnson’s
speech at the Munich Security Conference in February 2021,50 the near- to
mid-term defence and security challenges for the UK may require greater
sacrifice than has been experienced for two generations. Research does
not just indicate that the casualty-averse nature of society and its
politicians may have changed, but that this would revert to a norm of
behaviours and attitudes rather than the aberration that has been the
46
Triangle Institute for Security Studies, ‘Project on the Gap Between the Military
and Civilian Society’.
47
Cornish, ‘Myth and Reality’.
48
Hew Strachan and Ruth Harris, The Utility of Military Force and Public
Understanding in Today’s Britain (Santa Monica, CA: RAND, 2020).
49
Tim Willasey-Wilsey, ‘Does the Pandemic Tell Us Anything About War
Casualties?’, RUSI Commentary, 12 January 2021.
50
HM Government, ‘Prime Minister’s Speech at the Munich Security Conference:
19 February 2021’, 19 February 2021, <https://www.gov.uk/government/
speeches/prime-ministers-speech-at-the-munich-security-conference-19-february-
2021>, accessed 20 October 2021.
73
Peter Roberts
Western outlook since the 1990s.51 Whilst such a shift would not be
immediately evident to military planners or personnel, the implications
would be significant.
Conclusion
The proposition of this chapter is that the will to fight multiplies the effect
that a state can exert through the use of force. If the sacrifice is considered
worthy, it seems that society both accepts the requirement for casualties
and a willingness to make sacrifices, but that they also have greater
resilience than they are given credit for. Instead of the deeply fragile
ecosystems that they are made out to be, many Western states have been
tested by systemic and long-term shocks and have proved robust.
It also appears clear that the will to fight in Western states depends
greatly on the context, the adversary and the gains that might be made.
Society is unlikely to accept the same sacrifices for a humanitarian
mission in Mali as it would to defeat a Russian attack on a major city. The
other highly dynamic variable appears to be the state of the narrative of
such campaigns: an extremely well-articulated and compelling narrative
seems to increase a state’s will to fight more than an ill-considered and
reactive set of lines-to-take.
In understanding these factors, it also needs to be acknowledged that
neither is fixed but instead is underpinned by another set of variables,
including the national infrastructure, system of alliances, ability to pay for
support and resources, changing demographics, and national strategic
culture. None of these are immutable, and each relies on variables and
dynamic factors.52 The key is that the state has agency in shaping its
populations’ will to fight. But if governments lack sufficient confidence in
their causes to justify them publicly, it should be questioned whether the
cause is indeed worthwhile. The idea that a figure could be placed on
casualties in any campaign is foolhardy and undermines the realities of
public concern and political national security calculations.
The implications for the military – in terms of undertaking operations,
offering options to political leaders, and the expected risk appetite in their
missions and tasks that pose a threat to life – are significant. Two key facets
of a new dynamic are most important.
51
Mueller, War, Presidents and Public Opinion, pp. 60–69; Steven Kullclay
Ramsay, ‘The Myth of the Reactive Public: American Public Attitudes on Military
Fatalities in the Post-Cold War Period’, in Everts and Isernia (eds), Public Opinion
and the International Use of Force, p. 205.
52
Martin van Creveld, The Transformation of War (New York, NY: Free Press,
1991).
74
The Lights May Go Out, But the Band Plays On
75
VI. IN SPACE, NO ONE WILL SEE YOU
FIGHT
ALEXANDRA STICKINGS
1
John J Klein, ‘The Creation of a U.S. Space Force: It’s Only the End of the
Beginning’, War on the Rocks, 2 January 2020.
2
See, for example, Nathan Strout, ‘The Space Force Wants to Use Directed-Energy
Systems for Space Superiority’, C4ISRNet, 16 June 2021, <https://www.c4isrnet.
com/battlefield-tech/space/2021/06/16/the-space-force-wants-to-use-directed-
energy-weapons-for-space-superiority/>, accessed 2 August 2021; Ramin Skibba,
‘How Trump’s “Space Force” Could Set Off a Dangerous Arms Race’, Politico
Magazine, 22 June 2018; Rachel S Cohen, ‘Space Force Will Eventually Put
Troops in Orbit, Ops Boss Says’, Air Force Magazine, 29 September 2020.
76
In Space, No One Will See You Fight
3
Atomic Heritage Foundation, ‘Strategic Defense Initiative (SDI)’, 18 July 2018,
<https://www.atomicheritage.org/history/strategic-defense-initiative-sdi>,
accessed 5 November 2021.
4
There is no international agreement on what constitutes a weapon in space. It is
now commonplace to use the term ‘counterspace capability’, which covers all
threats to space systems, including ground stations and receivers.
5
Brian Weeden and Victoria Samson (eds), ‘Global Counterspace Capabilities: An
Open Source Assessment’, Secure World Foundation, April 2020, <https://swfound.
org/media/206970/swf_counterspace2020_electronic_final.pdf>, accessed 8 March
2021.
77
Alexandra Stickings
6
Paul Glenshaw, ‘The First Space Ace’, Air and Space, April 2018.
7
George Galdorisi, ‘U.S. Navy Missile Defense: Operation Burnt Frost’, Defense
Media Network, 18 May 2013, <https://www.defensemedianetwork.com/stories/
u-s-navy-missile-defense-operation-burnt-frost/>, accessed 1 April 2021.
8
Shirley Kan, ‘China’s Anti-Satellite Weapons Test’, CRS Report for Congress,
23 April 2007, <https://fas.org/sgp/crs/row/RS22652.pdf>, accessed 7 March 2021;
Ashley J Tellis, ‘India’s ASAT Test: An Incomplete Success’, Carnegie Endowment
for International Peace, 15 April 2019, <https://carnegieendowment.org/2019/04/
15/india-s-asat-test-incomplete-success-pub-78884>, accessed 8 March 2021.
9
BBC News, ‘Russian Anti-satellite Missile Test Draws Condemnation’,
15 November 2021.
78
In Space, No One Will See You Fight
10
Todd Harrison, ‘The Future of MILSATCOM’, Center for Strategic and Budgetary
Assessments, 24 July 2013, <https://csbaonline.org/research/publications/the-
future-of-milsatcom/publication/1>, accessed 1 September 2021.
11
Brian Weeden, ‘2007 Chinese Anti-Satellite Test Fact Sheet’, Secure World
Foundation, updated 23 November 2010, <https://swfound.org/media/9550/
chinese_asat_fact_sheet_updated_2012.pdf>, accessed 7 March 2021.
12
Brian Weeden and Victoria Samson, ‘India’s ASAT Test Is a Wake-Up Call for
Norms of Behavior in Space’, SpaceNews, 8 April 2019, <https://spacenews.com/
79
Alexandra Stickings
label the Indian test as more ‘responsible’ and perhaps the way in which any
future tests should be carried out. It certainly did not elicit the same
international condemnation as the Chinese test.13 However, any ASAT use
against an adversary satellite for military purposes in a future conflict
would not be able to take this sort of debris-limitation measure since the
altitude of the interception would be dictated by the target’s altitude. As
such, the unintended consequences of ASAT use could also lead to
unpredictable further escalation and the broadening of terrestrial hostilities.
This is likely to constrain their utility as a practical tool in future conflicts.
In terms of kinetic space conflict, it is also necessary to examine the
narrative that armed service personnel will be in orbit; the ubiquitous ‘space
marines’. It is true that a high percentage of astronauts, from all states, have
been either serving or retired military officers. The early US astronauts were
drawn from the test pilot cadre, and Russia selected its first cadre of
cosmonauts from Soviet air force pilots.14 However, the missions which
they conducted were generally about science and exploration. Today,
NASA astronauts who are serving military officers are seconded to the
Agency, and as such are not considered to be representing the military
during their time in orbit.
Nevertheless, there was some concern recently when NASA
astronaut Mike Hopkins, a US Air Force officer, was sworn into the new
Space Force whilst on the International Space Station.15 This blurring of
the line between military and civilian activities highlights what many are
worried about: that military activities may increasingly be carried out
under the pretence of civilian exploration and experimentation. There is
a fear that crewed military missions being carried out routinely by
competing powers might lead to direct conflict in orbit. However,
beyond the damage that such a confrontation could do to the orbital
environment and the prospects for long-term sustainability, there are
other challenges that suggest caution is required in assessing such
narratives.
First, crewed space platform capabilities are still fairly limited.
Despite a constant human presence in orbit aboard the International
op-ed-indias-asat-test-is-wake-up-call-for-norms-of-behavior-in-space/>, accessed
5 March 2021.
13
Hindustan Times, ‘No Global Heat on India’s ASAT Missile Test’, 29 March 2019.
14
NASA, ‘60 Years Ago: Soviets Select Their First Cosmonauts’, 25 February 2020,
<https://www.nasa.gov/feature/60-years-ago-soviets-select-their-first-
cosmonauts>, accessed 6 March 2021.
15
NASA, ‘NASA Astronaut Mike Hopkins Transfers to US Space Force While
Aboard International Space Station’, 18 December 2020, <https://www.nasa.gov/
feature/nasa-astronaut-mike-hopkins-transfers-to-us-space-force-while-aboard-
international-space/>, accessed 6 March 2021.
80
In Space, No One Will See You Fight
Space Station (ISS) since 2000, human activity is limited to work onboard
the station or space walks in its near vicinity.16 While the ISS does
possess some manoeuvring capabilities to avoid debris in its path, there
are no propulsion systems that could enable spacecraft to ‘fly’ around in
orbit in the manner which mainstream science fiction has normalised in
the minds of many. Manoeuvring and human activities remain at the
mercy of orbital mechanics. How, for example, might weapons be
developed that do not have recoil and could therefore avoid altering the
velocity and movement of a platform or astronaut after firing? While
specific technologies that might solve some of the impediments to a
‘shooting war’ in orbit could potentially be developed, they would have
to successfully compete for limited resources with other capabilities that
are of more immediate practical use.
Crewed military missions would also likely be seen as crossing a line
in terms of ‘militarising’ or ‘weaponising’ space. Although there is general
acceptance that space is a military domain, the vast majority of activities
undertaken are those that support terrestrial operations and are not
overtly aggressive towards others. It is this that keeps the balance in
space between the major state actors. Introducing a new parameter such
as orbiting service personnel could upset this balance, without offering
immediately obvious benefits to offset the potential negative repercussions.
It is evident, therefore, that kinetic conflict in space is neither
inevitable nor of great military use, and that despite the rhetoric of some
of the bigger military space powers, there are strong incentives for most
states to avoid it if possible.
16
Derek Richardson, ‘The ISS Marks Two Decades of Continuous Human
Presence’, Spaceflight Insider, 2 November 2020, <https://www.spaceflightinsider.
com/missions/iss/iss-2-decades-of-continuous-human-presence/#:~:text=The%
20International%20Space%20Station%20has,two%20days%20later%20on%20Nov.>,
accessed 7 March 2021.
81
Alexandra Stickings
17
Andrew Liptak, ‘France Wants to Arm Satellites With Guns and Lasers by 2030’,
The Verge, 28 July 2019.
18
Brian G Chow and Henry Sokolski, ‘U.S. Satellites Increasingly Vulnerable to
China’s Ground-Based Lasers’, SpaceNews, 10 July 2020, <https://spacenews.com/
op-ed-u-s-satellites-increasingly-vulnerable-to-chinas-ground-based-lasers/>,
accessed 7 March 2021.
19
For a full account of the various counterspace capabilities possessed by all
actors, see Weeden and Samson (eds), Global Counterspace Capabilities.
20
Alexandra Coultrup, ‘GPS Jamming in the Arctic Circle’, CSIS Aerospace Security
Project, 31 March 2020, <https://aerospace.csis.org/data/gps-jamming-in-the-arctic-
circle/> accessed 2 August 2021.
82
In Space, No One Will See You Fight
focused on RPO-type vehicle tests,21 and both Russia and China are thought
to have restarted development of this class of vehicle in recent years.
The dual-use nature of RPO capabilities is illustrative of the
difficulties in regulating the development of many space technologies
with potential military capabilities. It is also another reason why states
are likely to pursue them, not necessarily at the expense of kinetic
effects, but as more practically usable tools. They provide opportunities
to disrupt or deny an adversary’s access to space, preventing them from
using the data and other benefits provided, while being potentially
difficult to attribute and having minimal impact on other spacecraft and
the orbital environment.
21
Glenshaw, ‘The First Space Ace’.
22
Jeff Foust, ‘SpaceX Launches Starlink Satellites and Expands International
Service’, SpaceNews, 11 March 2021, <https://spacenews.com/spacex-launches-
starlink-satellites-and-expands-international-service/>, accessed 12 March 2021.
23
Amazon Web Services, ‘AWS for Aerospace and Satellite’, <https://aws.amazon.
com/government-education/aerospace-and-satellite/>, accessed 28 October 2021;
OneWeb, ‘Connected as One’, <https://oneweb.net/>, accessed 28 October 2021.
24
See Blue Origin, <https://www.blueorigin.com/>, accessed 28 October 2021.
83
Alexandra Stickings
25
Ryan Whitwam, ‘Former NASA Head Predicts Commercial Rockets Will Beat
SLS’, Extreme Tech, 11 September 2020, <https://www.extremetech.com/extreme/
314905-former-nasa-head-predicts-commercial-rockets-will-beat-sls>, accessed
11 March 2021.
26
Mike Wehner, ‘Asteroid Mining Will Produce the World’s First Trillionaire,
According to Goldman Sachs’, BGR, 23 April 2018, <https://bgr.com/2018/04/23/
asteroid-mining-trillionaire-goldman-sachs-report/>, accessed 11 March 2021.
27
UN Office for Outer Space Affairs, ‘Treaty on Principles Governing the Activities
of States in the Exploration and Use of Outer Space, Including the Moon and Other
Celestial Bodies, Article II’.
84
In Space, No One Will See You Fight
28
Louis de Gouyon Matignon, ‘Treaty on the Prevention of the Placement of
Weapons in Outer Space’, Space Legal Issues, 8 May 2019, <https://www.
spacelegalissues.com/treaty-on-the-prevention-of-the-placement-of-weapons-in-
outer-space-the-threat-or-use-of-force-against-outer-space-objects/>, accessed
11 March 2021.
29
Aidan Liddle, ‘Disarmament Blog: Space Resolution Adopted’, Foreign,
Commonwealth and Development Office, 10 December 2020, <https://blogs.fcdo.
gov.uk/aidanliddle/2020/12/10/disarmament-blog-space-resolution-adopted/>,
accessed 11 March 2021.
85
Alexandra Stickings
Conclusion
Despite the narratives around the inevitability of kinetic conflict spreading
to the space domain in the early stages of any future state-on-state conflict,
the reality is likely to be more nuanced. Although there is often a danger in
approaching space as separate and unlike other domains, there are ways in
which its differences must be recognised. Due to the core physics involved,
even limited levels of kinetic conflict in space risk greater repercussions on
the environment than similar conflict in other domains. The debris fallout
that would result from kinetic ASAT or on-orbit weapons use would
potentially affect every spacecraft in that and surrounding orbits,
regardless of ownership. Difficulties in attribution and proving intent,
stemming from technical limitations in tracking space objects and
visualising incidents, add a layer of complexity and uncertainty in the
case of less overtly kinetic means, including laser, electromagnetic, cyber
and RPO-type attacks. However, the uncertainties over retaliatory
dynamics and the unavoidably escalatory nature of attacks on core
national capabilities outside the geographical constraints of any particular
conflict zone mean that most offensive capabilities are likely to have
more value as deterrence tools rather than practical ones.
This is not to say that conflict in space will not occur. Indeed, it is
already happening. However, most activity will likely continue to
comprise manoeuvring for advantage and temporary interference through
jamming, or cyber attacks and other non-kinetic effects. States will
continue to find ways that limit the ability of their adversaries to access
space and to assure their own access, but in ways that do not threaten
the long-term sustainability of orbit or risk uncontrolled escalation. As in
many other aspects of future state-on-state conflicts, the mutual interests
of all parties to avoid unrestricted warfare is likely to mean that tight
political constraints remain on kinetic actions in space, at least during the
crucial early stages. As such, orbital conflict should not be seen merely as
the effects of ASAT missiles or satellites against other space systems.
Instead, it should be examined in terms of the effects which more likely
non-kinetic competitive behaviours will have on the ability of these
systems to enable operations on the ground. Fighting will happen in
space, just not in a way we can easily see.
86
VII. MORE SENSORS THAN SENSE
JACK WATLING
The US Air Force likes to describe the future of command and control in
warfare as analogous to Uber.1 Such a system promises a drastic
improvement in efficiency and cooperation across the force. Suppose, for
example, that an infantry platoon needed assistance in engaging enemy
armour advancing on their position. They could make the request by
reporting the target’s position, and this could be made available to all
potential shooters in the area. These might comprise an artillery battery,
an aircraft en route to a target and an aircraft returning from a strike. One
could envisage the artillery battery declining the request because they
were tasked with counterbattery duties and did not want to unmask their
guns. The first aircraft might also decline because they were already
tasked with an important strike mission and needed their munitions for
that. The returning aircraft, finding that it had munitions left over from
the strike, might accept, and the request would no longer be pushed to
other units. Alternatively, if the second aircraft is removed from the
equation, a higher commander might be envisaged, with access to the
options, determining the trade-off between unmasking the guns, or
abandoning the strike mission, based on their broader intent.2 Without
such a system, the infantry platoon would have to call for artillery and air
support on separate systems. Since the artillery and aircraft would not
coordinate with each other, the infantry may receive no support, or
support from both.
1
Rachel S Cohen, ‘Want to Understand MDC2? Think About Uber, USAF Official
Says’, Air Force Magazine, 23 September 2019.
2
Congressional Research Service, ‘Joint All-Domain Command and Control
(JADC2)’, 1 July 2021, <https://fas.org/sgp/crs/natsec/IF11493.pdf>, accessed
26 February 2021.
87
Jack Watling
3
Caitlin O’Neill, ‘Delivering an On-Demand Sensor to Shooter Warfighting
Capability’, US Army, 29 April 2020, <https://www.army.mil/article/235067/
delivering_an_on_demand_sensor_to_shooter_warfighting_capability>, accessed
3 March 2021.
4
Ministry of Defence (MoD), ‘Digital Strategy for Defence: Delivering the Digital
Backbone and Unleashing the Power of Defence’s Data’, April 2021, pp. 14–15.
5
MoD, ‘Joint Concept Note 1/20: Multi-Domain Integration’, November 2020.
6
Johns Hopkins Applied Physics Laboratory, ‘The Cooperative Engagement
Capability’, Technical Digest (Vol. 16, No. 4, 1995), pp. 377–96.
7
For example, as led to the loss of the SS Atlantic Conveyor during the Falklands
conflict. See Max Hastings and Simon Jenkins, The Battle for the Falklands (London:
Pan Macmillan, 2012), p. 286.
8
Open Cellid, ‘The World’s Largest Open Database of Cell Towers’, Unwired Labs,
<https://www.opencellid.org/#zoom=6&lat=29.59&lon=-76.03>, accessed 3 March
2021.
88
More Sensors Than Sense
9
QinetiQ, ‘Free Space Optical Communications’, <https://www.qinetiq.com/en/
what-we-do/services-and-products/free-space-optical-communications>, accessed
27 July 2021.
10
‘BAOR Order of Battle: July 1989’, <https://www.orbat85.nl/documents/BAOR-
July-1989.pdf>, accessed 31 March 2021.
11
RUSI, ‘RUSI LWC 2017 – Session 7’, 19 July 2017, 21:54–48:00, <https://www.
youtube.com/watch?v=_EcrrD1dBhg>, accessed 8 April 2020.
89
Jack Watling
platforms gather thermal imaging, radar data, acoustic signatures and more.
This information must be fused to ensure confirmation of targets at
significant range. The volume of data that must be transmitted for a
targeting solution has therefore increased dramatically. These sensors are
also concentrated on reconnaissance vehicles, which are the most
geographically dispersed element of the force. The exact size of data files
and bandwidth capacity within military networks is sensitive.
Nevertheless, it is evident that the volume of data to be transmitted is
accelerating faster than the bandwidth to support its transmission. Within
the land domain, therefore, while a commander is increasingly able to
interrogate portions of the battlefield in ever-greater detail, accumulating
a consistent picture of the operating environment is becoming harder.
Without an as-yet-unforeseeable technological breakthrough, the
disparity between data volume and available bandwidth in the land
environment is likely to become worse. This is partly because air and
naval assets, lacking many of the constraints of land forces, will seek to
exploit volumes of data that are not supportable on land platforms. As a
result, militaries have experimented with two methods for reducing the
volume that must be transmitted. The first is to employ edge processing
to sort important from unimportant sensor data at source and to only
transmit that which is determined to require the attention of higher
echelons.12 The catch with this system is that the decision as to what is
important is made separately by the crews and their supporting software.
The data that reaches the centre will therefore be incomplete and,
perhaps more importantly, inconsistent. As different parts of the recce
screen come to contextually derived independent conclusions as to what
is important, the information at the centre will not give consistent
information. This will mean that the centre will have a list of targets but
will lack much of the vital information that could enable them to
prioritise the allocation of shooters, since there will be insufficient
information to assess the relative priority of support and advantage. That
is not an issue if the force has enough munitions to cover all targets, but
will create serious problems in a warfighting context where prioritisation
is critical.
The alternative method is for the centre to request discrete returns
from the sensor screen. In this system, the centre might, for example,
request all information regarding enemy main battle tanks identified by
its network of sensors. This system also relies on edge processing. The
sensors must interrogate the data they have collected, isolate that which
12
David S Alberts and Richard E Hayes, Power to the Edge: Command and Control
in the Information Age (Washington, DC: Command and Control Research Program,
2003).
90
More Sensors Than Sense
is relevant to the request and transmit only the relevant data. In practice, the
centre would request a range of information; not just returns on a single
type of vehicle. Nevertheless, the problem with such a system is that it
will only provide the centre with what it expects or thinks it needs to
know. It will not flag the unexpected, provide indicators of the
unforeseen or highlight absences. This exposes higher echelons to the
risk of being surprised, which may be exacerbated by the illusion of
situational awareness created by the feeds of data returning from the
sensor screen.13
Historically, brigades have fought battles, divisions have worried
about the next battle, and corps the battle after.14 The different lead times
at these echelons has provided time for higher commands to receive and
ingest reports from subordinate formations, written by their officers, to
give a commander a combination of baseline statistics and the human
comments that contextualise them. Each commander has therefore had
the ability to have a feel for the battle two echelons below, to balance
knowns and unknowns, and use this information to prioritise resources
for the battle ahead.
On the modern battlefield, the range of systems and the low force
densities anticipated means that all echelons are likely engaged
simultaneously.15 The any-sensor-to-any-shooter concept is an attempt to
ensure competitiveness in this context by accelerating the accumulation
and interrogation of data. But to accumulate a complete dataset will
overload the bearer network. Furthermore, accumulating trend data will
leave a command vulnerable to surprise and letting the edge report
outliers to the centre will not provide the latter with a consistent dataset
to form a basis for analysis. The most realistic workaround is for the
system to accumulate trend data based on a high-priority list generated at
echelon, and for outliers to be reported via standard reporting methods.
This, however, raises two further challenges. First, the trend data will
accumulate at a tempo that is out of sync with the reporting of outliers.
Higher echelons will therefore either make decisions too quickly to take
outliers into account or will have the whole process slowed to the
existing operating speed.16 Second, the usual answer for how the volume
13
It also accentuates vulnerability to systematic deception. See US Army, ‘FM 3-
13.4: Army Support to Military Deception’, February 2019, <https://fas.org/irp/
doddir/army/fm3-13-4.pdf>, accessed 30 March 2021.
14
Jack Watling and Sean MacFarland, ‘The Future of the NATO Corps’, RUSI
Occasional Papers (April 2021), p. 20.
15
Watling and MacFarland, ‘The Future of the NATO Corps’.
16
Nick Reynolds, ‘Performing Information Manoeuvre Through Persistent
Engagement’, RUSI Occasional Papers (April 2021), pp. 37–43.
91
Jack Watling
17
Congressional Research Service, ‘Artificial Intelligence and National Security’,
updated 10 November 2020, <https://fas.org/sgp/crs/natsec/R45178.pdf>,
accessed 3 March 2021.
18
A problem already facing cyber threat intelligence needing to ingest non-digital
feeds. See Sean Barnum, ‘Standardizing Cyber Threat Intelligence Information with
the Structured Threat Information eXpression (STIX™)’, MITRE, 20 February 2014,
<http://www.standardscoordination.org/sites/default/files/docs/STIX_
Whitepaper_v1.1.pdf>, accessed 30 March 2021.
19
RUSI, ‘Session Twelve: Innovation and Adaptability’, 19 June 2019, <https://
www.youtube.com/watch?v=ZYzJIcS36Ls>, accessed 3 March 2021.
92
More Sensors Than Sense
20
Justin Bronk, ‘Approaching a Fork in the Sky’, in Jack Watling (ed.), Decision
Points: Rationalising the Armed Forces of European Medium Powers, Whitehall
Paper 96 (London: Taylor and Francis, 2020), pp. 52–62.
21
Justin Bronk, ‘Modern Russian and Chinese Integrated Air Defence Systems: The
Nature of the Threat, Growth Trajectory and Western Options’, RUSI Occasional
Papers (April 2021).
22
Justin Bronk, The Future of NATO Airpower: How Are Future Capability Plans
Within the Alliance Diverging and How Can Interoperability be Maintained?,
Whitehall Paper 94 (London: Taylor and Francis, 2020).
23
For example, see Peter R Faber, ‘Interwar US Army Aviation and the Air Corps
Tactical School: Incubators of American Airpower’, in Phillip S Meilinger (ed.),
The Paths of Heaven: The Evolution of Airpower Theory (New Delhi: Lancer
Publications, 2000), p. 215.
93
Jack Watling
24
Douglas Barrie, ‘F-35 Situational Awareness: Sensing Isn’t Enough’, IISS Military
Balance Blog, 19 March 2019, <https://www.iiss.org/blogs/military-balance/2019/
03/f-35-situational-awareness>, accessed 3 March 2021.
25
Brian W Everstine, ‘The F-22 and the F-35 Are Struggling to Talk to Each Other
… And to the Rest of USAF’, Air Force Magazine, 29 January 2018.
26
Myron Hura et al., Interoperability: A Continuing Challenge in Coalition Air
Operations (Santa Monica, CA: RAND, 2000), pp. 107–21.
27
British Army, ‘Bowman Radio Update | Director of Information | British Army’,
13 May 2019, <https://www.youtube.com/watch?v=AYr4Hix-AL0>, accessed
3 March 2021.
28
MoD, ‘Morpheus Programme: Next Generation Tactical Communication
Information Systems For Defence’, last updated 18 April 2018, <https://www.gov.
uk/guidance/morpheus-project-next-generation-tactical-communication-
information-systems-for-defence>, accessed 3 March 2021.
94
More Sensors Than Sense
in, such aircraft are easily detectable, and susceptible to electronic attack
from ground assets within line of sight that may inhibit their ability to
receive data from penetrating ISTAR platforms. As a result of the threat to
enabling aircraft, the US in particular is aiming to reduce its dependence
on these kinds of platforms. However, this will eliminate a key
communications node that at present enables integration with higher-
echelon ground formations. If, by contrast, coordination of air assets is
pushed back to the Combined Air Operations Centre (CAOC) or Joint
Forces Command, this will impose more echelons between the air
component and ground units, expanding the lag between detection and
receipt of the relevant data.
The situation is markedly different in a maritime context. It should be
noted that while much ink has been spilt lamenting the death of aircraft
carriers,29 all navies seeking to project power are currently investing in
modernising their carrier capability.30 Carrier operations will therefore
remain at the heart of naval operations for some time. The maritime
domain is consequently intrinsically linked to the air domain. This
chapter began by considering the cooperative engagement capability
within the context of point defence of a naval task group. A carrier strike
group would hope to identify threats long before it had to engage in
point defence, and to be sensing and striking first.31 If a nominal combat
29
John Patch, ‘Fortress at Sea? The Carrier Invulnerability Myth’, US Naval Institute
Proceedings (January 2010).
30
See MoD, ‘Joint Statement on Carrier Strike Group 2021 Joint Declaration
Signing’, 19 January 2021, <https://www.gov.uk/government/news/joint-
statement-on-carrier-strike-group-2021-joint-declaration-signing–2>, accessed 3
March 2021. On France, see Elysee, ‘Notre avenir énergétique et écologique passe
par le nucléaire. Déplacement du Président Emmanuel Macron sur le site
industriel de Framatome’, 8 December 2020, <https://www.elysee.fr/emmanuel-
macron/2020/12/08/deplacement-du-president-emmanuel-macron-sur-le-site-
industriel-de-framatome>, accessed 3 March 2021. On the US, see Congressional
Research Service, ‘Navy Ford (CVN-78) Class Aircraft Carrier Program:
Background and Issues for Congress’, 29 September 2021, <https://fas.org/sgp/
crs/weapons/RS20643.pdf>, accessed 3 March 2021. On China, Japan and South
Korea, see Felix K Chang, ‘Taking Flight: China, Japan and South Korea Get
Aircraft Carriers’, Foreign Policy Research Institute, 14 January 2021, <https://
www.fpri.org/article/2021/01/taking-flight-china-japan-and-south-korea-get-
aircraft-carriers/>, accessed 3 March 2021. Russia continues to try, see Paul Goble,
‘Moscow’s Plans for New Kind of Aircraft Carrier Unlikely to Be Realized’, The
Jamestown Foundation, 11 March 2021, <https://jamestown.org/program/
moscows-plans-for-new-kind-of-aircraft-carrier-unlikely-to-be-realized/> accessed
5 November 2021.
31
This is the objective of the US Navy’s Naval Integrated Fire Control – Counter Air
(NIFC-CA) system. See John Andrew Hamilton, ‘Navy Conducts First Live Fire NIFC-
CA Test with F-35 at White Sands Missile Range’, US Army, 29 September 2016,
95
Jack Watling
radius of 400 nautical miles (nm) is assumed for the carrier air wing,
alongside a sensor radius from their cruising altitude of a comparable
distance, carrier operations sensing targets and potentially engaging them
out to 500 nm or further can be envisaged. That range may be extended
through aerial refuelling, either using carrier-launched refuelling aircraft32
or by linking up with air force aerial refuelling aircraft. The former must
severely reduce the size of strike packages that can be projected.
The distances and ingrained interdependence of the forces involved
have significant implications for the utility of cooperative engagement
beyond the defence of the task group. First, the increase in range
between different cooperating assets increases the potential lag between
action and effect. Aircraft operating at a significant distance from the task
group are likely to detect and encounter incoming threats before the
surface vessels, and consequently any engagement will have progressed
significantly by the time munitions or other capabilities from the task
group can engage the target. The coordination of effects over such
distances requires careful sequencing, even for missiles such as the SM-3
series which offer hypersonic performance. If it has not been planned to
have assets in place to cooperatively engage a target, they may be too far
away to do so opportunistically in many circumstances. Munitions are
increasingly able to interact cooperatively,33 as are aircraft in the same
strike package, but this technology represents an opportunity for iterative
improvements over existing tactics rather than a revolutionary solution to
the tyranny of distance in the maritime domain.
The limitations of enablement also reduce the significance of
cooperative engagement between the services. For air forces operating
over a large maritime area, strike aircraft must either have multiple
refuelling points or the strikes must be carried out by long-range
bombers. If the former approach is taken, the tankers must be protected,
so that to deliver a large strike package against a target requires tiers of
enablement at intervals behind. Those tiers of enablers must also remain
in place to facilitate the return journey, and so must themselves be
escorted. The level of planning, interdependence and precise windows
for intersection between aircraft means that these operations are unlikely
<https://www.army.mil/article/175940/navy_conducts_first_live_fire_nifc_ca_test_
wtih_f_35_at_white_sands_missile_range>, accessed 3 March 2021.
32
Boeing, ‘MQ-25’, <https://www.boeing.com/defense/mq25/>, accessed
3 March 2021.
33
As demonstrated by the US Air Force’s Golden Horde programme. See Garrett
Reim, ‘Golden Horde Collaborative Bombs Hit Four Targets Simultaneously in
Test’, Flight Global, 26 February 2021, <https://www.flightglobal.com/fixed-wing/
golden-horde-collaborative-bombs-hit-four-targets-simultaneously-in-test/142655.
article>, accessed 3 March 2021.
96
More Sensors Than Sense
to be diverted once in progress. They are not going to plan on the basis of
potentially diverting assets from their mission to take advantage of
opportunities detected by maritime assets. They will pursue their mission,
and the data from maritime assets in the operating environment will be
used where available to evade or engage pop-up threats on the pre-
planned route and for planning subsequent operations. Conversely, data
gathered by the strike aircraft may well be passed to maritime forces, but
those maritime units will plan operations based on their own
requirements rather than changing missions in progress to account for
opportunities.
Bombers face a different challenge. Seeking to minimise their
signature, they will employ flightpaths carefully designed to penetrate
hostile air space and will be avoiding datalink transmissions. Again, they
are not likely to divert or cooperatively adjust their missions on the basis
of opportunistic information delivered through joint C2 networks.
Instead, interservice cooperation in the maritime environment is likely to
depend on detailed planning cycles within the air force and navy CAOCs.
Constraints are largely imposed by engagement distances and the time
required to put enablement in place, and will exceed the length of
planning cycles so that accumulating data faster will not necessarily lead
to an increased tempo of sorties and strikes.
The limitations to future C2 do not change the fact that being able to
transfer data between units from different services is valuable and will
improve the effectiveness of the joint force. That units have the ability to
share data – even if they do not always choose to – opens up many small
but important efficiencies and, by increasing the number of routes by
which information can be moved around the battlefield, reduces the
vulnerability of communications systems to attacks on critical nodes.34
The any-sensor-to-any-shooter concept is worth pursuing.
However, the fact that the integration of communications across
domains is advantageous does not mean that it will be decisive. As this
chapter has sought to explain, the reason why communications
architectures for each domain have evolved differently reflects the
distinct challenges that forces face and the way in which they fight.
These differences in approaches will continue to shape decision-making
and ensure that commanders will still need to penetrate the fog of war,
especially in the land domain. That any vehicle can theoretically pass
information back means that the commander, in determining what
information they wish to prioritise on the network, can likely find an
34
Bryan Clark and Timothy A Walton, ‘Taking Back the Seas: Transforming the U.S.
Surface Fleet for Decision-Centric Warfare’, Center for Strategic and Budgetary
Assessments, 31 December 2019.
97
Jack Watling
answer to any question about the battlefield that they choose to ask. But
being able to pierce the fog of war is different from it being lifted
entirely, and as long as bandwidth is limited, there will only be so many
questions that commanders can ask.
The problem with the any-sensor-to-any-shooter narrative is that it
suggests to commanders that they will soon have a complete picture of
the battlefield and be able to access a full set of real-time and assured
information. In practice, while it will be increasingly possible to link any
sensor to any shooter, this does not mean all sensors to all shooters, but
rather some sensors to some shooters, some of the time. The risk, in
short, is that this narrative prevents commanders from accepting the
trade-offs intrinsic in what information they prioritise. Unless militaries
determine what information is vital, accepting that an incomplete picture
will have drawbacks, they risk aspiring to a vision that is unachievable
and in doing so miss the genuine advantages that advances in
communications technology offer.
98
CONCLUSION
1
HM Goverment, Global Britain in a Competitive Age: The Integrated Review of
Security, Defence, Development and Foreign Policy, CP 403 (London: The
Stationery Office, 2021).
2
Ministry of Defence, Defence in a Competitive Age, CP 411 (London: The
Stationery Office, 2021).
3
For more on this trend, see Justin Bronk, ‘The Problem at the Heart of UK
Defense’, Breaking Defense, 13 September 2021, <https://breakingdefense.com/
2021/09/the-problem-at-the-heart-of-uk-defense/>, accessed 22 October 2021.
99
Justin Bronk and Jack Watling
100
Conclusion
deployed for weeks to deliver courses to large, partnered units. The lessons
they delivered rarely stuck. Elsewhere, as with the Afghan National Army,
the scale of personnel mobilised dwarfed the number of trainers
dedicated to support the institution. In short, however knowledgeable
the trainers, what was missing was persistence and mass. By contrast, in
Iraq, a critical mass of trainers was achieved for the CTS. The Ranger
Regiment offers the potential concentration of specialists to enable the
British Army to have more people spending longer with trainees.
However, the Integrated Review does little to articulate a hierarchy of
priorities. Instead, the DCP exhorts the Army to be more deployed, more
of the time, but does not suggest where Defence should place its bets
given limited units of action.
The result of these factors is that the success or failure of the DCP
as regards its forward presence strategy has much less to do with the
name of the unit assigned with the task, or the equipment they carry,
than with whether the MoD remains ensnared by its conceptual
shortcomings. Success will first and foremost be determined by whether
the MoD recognises that there is a critical mass at which partnered
operations will succeed and below which they will achieve little or
even prove counterproductive. The UK has tried doing ‘more with less’
in partnered operations, and the results speak for themselves. Second,
will the MoD pick a manageable number of operations and justify them
publicly in order to develop sufficient public and political will to take
the risks that are necessary to ensure the force’s credibility? As long as
casualty tolerance is assumed to be inherently low, trainers will not be
given sufficient boundaries to achieve success on the ground. The
Ranger Regiment is an example of why the challenges to distortionary
narratives articulated in this paper are necessary; conceptual failings
undermine the ability of the new formation to deliver policy-relevant
results.
The UK’s approach to hostile state actors and strategic competition is
similarly weakened by conceptually flawed narratives within Defence. If
the UK is to expand its international presence and try to compete with
Russia and China for influence or deter Iran from destabilising partners,
then it is axiomatic that its military presence abroad will be in tension
with the foreign policy interests of these states. If the pursuit of
competition short of combat operations comes at the expense of being
able to generate credible combat capabilities, however, then there is very
little reason for such adversaries to accept a competition space framed to
suit UK capabilities. This can already be seen in the extensive use of
coercion by Iran against the UK, with tanker seizures, strikes on UK
shipping and the sponsoring of harassing fire on bases where its forces
are present. Both UK civilians and military personnel have been killed by
101
Justin Bronk and Jack Watling
4
Dan Sabbagh, ‘UK Servicewoman Killed in Missile Attack on Iraqi Base Is Named’,
The Guardian, 12 March 2020; BBC News, ‘Man Killed in Tanker Attack Named as
Adrian Underwood’, 4 August 2021.
5
Antony Beevor makes a strong case for understanding the Second World War as a
series of local and limited conflicts that converged over time, gaining coherence
retrospectively. See Antony Beevor, The Second World War (London: Weidenfeld
& Nicolson, 2012), pp. 1–11.
102
Conclusion
appreciate because the risk of nuclear escalation and thereby total and
mutual defeat ensures that there are very strong incentives for states to
politically and geographically limit conflicts that may occur. This means
that high-intensity warfighting may well occur in the future without a
total war, as in Korea between 1950 and 1953.6 Such a scenario would
entail significant political limitations on what actions can be undertaken
even in a state-on-state conflict. US Multi-Domain Operations, for
example – envisaging the penetration and disintegration of enemy anti-
access and area-denial systems in their own territory – may not be viable
under a range of conflict scenarios due to the likely escalation
implications. Because of the wider consequences, there are also likely to
be severe limitations to what states are prepared to do to one another’s
space-based infrastructure in the event of war. The potential for high-
intensity conflict to occur under geographically and politically limited
conditions means that conventional forces able to credibly conduct high-
intensity limited conflicts have continued policy relevance even in a
world where unrestricted state-on-state warfare remains highly unlikely.
Appreciating that competition and conflict overlap is also important
in assessing the potential utility of cyber capabilities. One of the authors
has observed instances of military officers assuming that because a cyber
capability has been proven against a type of system, it can be called for
and delivered as an effect against any system of that type. In reality,
cyber capabilities can only function against the specific system in which
they have been emplaced. However, this presents a serious challenge to
the idea that cyber attacks are ‘sub-threshold’ capabilities. If they must be
embedded in the specific target system to be militarily effective, and the
process of embedding the capability has a lead time far longer than the
political crisis preceding war, then cyber operations must constitute
preparatory activities for war conducted against a state in peacetime. Any
cyber capability that would be materially significant to a conflict straddles
thresholds between competition and conflict.
Poor understanding of how emerging technologies work,
exaggerated expectations of their effects, and – perhaps most importantly
– a theory–praxis gap between concepts and what is practically available
all present dangers to Defence successfully meeting the requirements in
the Integrated Review. It may be argued that the DCP under-resourced
current capabilities because the government is betting on future systems.
There is undoubtedly a step change in capability on the horizon in many
areas of military technology that will reshape the balance of arms across
6
Donald Stoker, Why America Loses Wars: Limited War and US Strategy from the
Korean War to the Present (Cambridge: Cambridge University Press, 2019),
pp. 44–80.
103
Justin Bronk and Jack Watling
the domains, and in this regard the bet may prove sensible. But it must also
be noted that, in wargames for the future force, communications systems
tend to work perfectly. Data is always available. Bandwidth management
and interference challenges are acknowledged but rarely tested.
Meanwhile, units conducting live exercises cannot test capabilities they
do not possess. To assume that the resultant systems will work in the
field as they have on a map board is dangerous and ignores the huge
investment by competing states in systems and operational concepts
specifically designed to deny connectivity.
Similarly, the RAF, Royal Navy and Royal Artillery may develop a
wide range of complex weapons, and each may be highly effective
because of multispectral sensors and swarming capabilities. However,
expensive munitions make for smaller affordable stockpiles. In Exercise
Warfighter in 2021, the British Army fired a simulated 14,000 GMLRS
rounds and 45,000 155-mm shells over eight days.7 This is consistent with
historical consumption rates. If ground and maritime forces lack mass
and become more dependent on fires, then Defence must have a
sufficient volume of them. Thus, at some point, the UK will need to
select which high-end capabilities it wishes to prioritise and ensure it has
enough launchers and stocks of those capabilities to make a difference.
Similarly, a force design premised on seamless coordination under all
conditions will have far less combat power in practice (once the
adversary and general battlefield chaos cast their votes) than appeared to
be available on paper. Without an appreciation of friction in the
employment of novel technologies, the force will be overly brittle.
Discussion of defence in the UK has gazed wistfully into the sunlit
uplands of future capability for some years now, even as the gap
between its ageing and declining fleets of fielded platforms and its
aspirations has widened over time. The absence of detail in the
description of how future capabilities are to actually work has been
consciously and unconsciously exploited to allow hard decisions to be
avoided. The UK now faces a critical period where its choices will
determine the country’s capabilities for the next generation. It is
important that those decisions are made with a realistic understanding of
the options. Aside from resource constraints, no amount of capability is
of any value if it is not properly employed. The authors hope that the
conceptual challenges set out in this Whitehall Paper will help ensure
that the hard choices confronting UK Defence are approached with clear
eyes.
7
Charlie Hewitt, speaking at RUSI’s Precision Strike in 21st Century Multi-Domain
Operations Conference, 13 May 2021.
104
PRC OVERSEAS
NECESSARY
POLITICAL
HERESIES
ACTIVITES
CHALLENGING
RISK, THE
REACTION
NARRATIVES
AND THE
DISTORTING
CONTEMPORARY
CASE OF AUSTRALIA
UK DEFENCE
Edited by Justin
Andrew
Bronk
Chubb
and Jack Watling
Emergingelites
Political technologies
in liberal democracies
are changingare how showing
militaries
heightened
are structured
concern andabout
how
threats
they willtofight
national
in the
security
future.
from
However,
the overseas
many political
of the interpretations
activities of thecurrently
People’s
Republic
dominating of China
the discourse
(PRC) andinitsUK supporters.
Defence ThisaboutWhitehall
how thesePapertechnologies
argues that
and supposedly
ective liberalnovel
democratic
adversary
policyactivities
responsewillrequires
shapecareful
the future
disaggregation
operating
of
environment
distinct setsare ofprovably
risks: to
false. Necessary
national Heresies
security; civil liberties;
is an attempt
and toacademic
correct
freedom.
some of these
Althoughmisleading
widely narratives
cited as a before
model they
to follow,
driveAustralia’s
acquisitionresponse
and force-
to
these
designissues
decisions
illustrates
that undermine
how aggregation
the British
of these
Armeddiverse
Forces.risks into a singular
national security threat – commonly labelled ‘Chinese influence’ – can produce
alarmist public policy discourse, legislative overreach and mismatched
institutional responsibilities. The Paper suggests a set of measures for
liberal democracies to manage their engagement with China’s powerful and
increasingly authoritarian party-state.