The Strategic Shift: The Role and Impact of the F-35 Global Enterprise

03/31/2019

The liberal democracies are facing a key strategic shift from a primary focus on the land wars in the Middle East to facing the challenges posed by peer competitors.

The Pentagon has referred to this as the return of Great Power competition which requires a significant shift from the forces configured for global deployments against adversaries found in Counter-Insurgency environments to having forces able to compete in higher intensity competition and to engage in and prevail in crisis management situations with peer competitors.

Because the adversaries are building to mass and are emphasizing expansion of strike capabilities controlled by a very hierarchical command structure, the kind of force which will best fit Western interests and capabilities is clearly a. distributed one.

Fortunately, the technology is already here to build effectively down this path, a path which allows engagement at the low end and provides building blocks to higher end capabilities.

The force we need to build will have five key interactives capabilities:

  • Enough platforms with allied and US forces in mind to provide significant presence;
  • A capability to maximize economy of force with that presence;
  • Scalability whereby the presence force can reach back if necessary at the speed of light and receive combat reinforcements;
  • Be able to tap into variable lethality capabilities appropriate to the mission or the threat in order to exercise dominance.
  • And to have the situational awareness relevant to proactive crisis management at the point of interest and an ability to link the fluidity of local knowledge to appropriate tactical and strategic decisions.

To be blunt about the last point – a cutting edge new system, the Triton UAV, is part of the new maritime SA force for the US and selected allies. The SA on this aircraft needs to be used by the presence forces and not be part of the “intelligence collection” team back in the United States.  Or put in other words, the new challenges require a significant challenge in terms of how the very un-agile US intelligence process tries to “own” information.

If we consider the nature of the crisis management regime which is being shaped to deal with peer competitors, how to shape and operate a force which is agile enough to show up and powerful enough to see the crisis through to success, and ask how the F-35, notably as a global enterprise can enable, participate in, and trigger the kill web approach most suited to this challenge, how might we shape an answer?

Our new special report addresses these questions.

The nature of the threat facing the liberal democracies was well put by a senior Finnish official: “The timeline for early warning is shorter; the threshold for the use of force is lower.”

What is unfolding is that capabilities traditionally associated with high end warfare are being drawn upon for lower threshold conflicts, designed to achieve political effect without firing a shot.

Higher end capabilities being developed by China are Russia are becoming tools to achieve political-military objectives throughout the diplomatic engagement spectrum.

This means that not only do the liberal democracies need to shape more effective higher end capabilities but they need to learn how to use force packages which are making up a higher end, higher tempo or higher intensity capability as part of a range of both military operations but proactive engagement to shape peer adversary behavior.

One is buying fifth generation aircraft not simply to prepare for an all-out war to defend the democracies, but to provide tools for governments to defend their interests throughout the spectrum of warfare and co-associated diplomatic activity as well.

It is about using military force in ways appropriate to the political mission.

We have argued that the F-35 global fleet provides for new capabilities appropriate to the strategic shift.

The featured photo:

U.S. 5th FLEET AREA OF OPERATIONS (Sept. 27, 2018)

An F-35B Lightning II with Marine Fighter Attack Squadron 211, 13th Marine Expeditionary Unit (MEU), aboard the Wasp-class amphibious assault ship USS Essex (LHD 2) in preparation for the F-35B’s first combat strike, Sept. 27, 2018.

Essex ARG and 13th MEU is the first U.S. Navy/Marine Corps team to deploy to U.S. 5th Fleet area of operations with the transformational warfighting capabilities of the F-35B Lightning II, making it a more lethal, flexible and persistent force, leading to a more stable region for our partner nations.

(U.S. Navy photo by Mass Communication Specialist 3rd Class Matthew Freeman)

An Aussie Perspective on Red Flag 19-1

By Jenna Higgins

As March rolls around, so ends another Exercise Red Flag Nellis (RF-N); an annual, month-long international exercise held at Nellis Air Base, Nevada.

During our joint #highintensitywar series with From Balloons to DronesDr Brian Laslie explained how Exercise Red Flag was created by the United States Air Force (USAF) as a response to the Service’s experience of high-intensity warfare during the Vietnam War.

He highlighted the exercises’ role in meeting the requirement for pilots to experience the realistic scenarios needed to prepare air forces for the challenges they might encounter in the future.

Red Flag, however, offers more than just training for fast-jet aircrew.

It provides one of the few opportunities to exercise a near full combined air operations centre (CAOC), as well as an opportunity to integrate non-kinetic effects (NKE), command and control (C2) and intelligence, surveillance and reconnaissance (ISR)  into a fighter,  focused high-intensity scenario.

The CAOC at Nellis (CAOC-N) provides AOC personnel with the ability to interact with both constructive and live fly serials, with training running in parallel to the night live-fly events.

While not every division of the CAOC-N operates, it does enable integration of the Combat Operations Division (COD) and the Intelligence Surveillance and Reconnaissance Division (ISRD).

There are limits to the realism of a constructive scenario, but the advantages of AOC integration into RF-N extend further than the hard limits of execution.

Perhaps the most significant benefit of such an exercise is the relationships formed between coalition partners and the subsequent trust it engenders. As proposed by Wing Commander Chris McInnes in a previous The Central Blue post;

“Air power C2 remains a social activity fundamentally and personal links are particularly important in reducing friction between organisations. For the moment, virtual presence remains actual absence.”

As our air forces surge toward a complete fifth-generation capability, and with technology dominating much of the discussion, we must continue to maintain person-to-person links to ensure the effort is harnessed and focused in a similar direction.

Exercise RF-N enabled this to occur at all levels, in all divisions with Australian, British and Americans sharing all of the leadership positions.

The full inclusion of coalition partners into RF-N once again highlighted the limitations of security classifications and communications infrastructure.

Despite having robust sharing agreements between five-eyes partners, there are still a number of instances where communications systems do not support free-flowing mission data (both pre- and post-mission).

This is not a new lesson.

Despite the years we have been working together, information sharing remains an ongoing issue, one not likely to go away any time soon.

Consequently, it is beholden to all participants not to get frustrated by such impasses, but rather to be adaptive and flexible in their approach to international exercises.

Person-to-person debriefing remains a valid form of communicating lessons learnt; however, this does present a baselining issue in ensuring all participants are receiving the same feedback.

Exercises such as Red Flag, where five-eyes partners can operate at higher classifications, further enable personnel to gain greater insight into coalition capabilities and how to employ them best.

While hard facts and figures are often available in ‘smart books,’ the realities of employment can present a delta.

Fully understanding coalition capabilities becomes far more critical as fifth-generation capabilities become more integrated into the fight. Aircraft such as the F-35 offer capabilities that require fourth-generation aircraft to reassess how they can best fit and most efficiently contribute to the fight.

This is especially relevant for the incorporation of NKE capabilities, or ISR optimisation and collection.

In its current construct, RF-N is not optimised for the full utilisation of NKE or ISR collection.

However, RF-N does enable mission and package leads exposure to a full suite of capabilities for which integration must be considered.

Exercise RF-N kicked off the 2019 series of joint and coalition exercises designed to provide Australian and US military training focused on the planning and conduct of mid-intensity ‘high-end’ warfights.

The road to Talisman Sabre will include a number of exercises, with the penultimate Exercise occurring from late June to August 2019. Keep an eye out on The Central Blue for regular updates!

Squadron Leader Jenna Higgins is an Air Combat Officer in the Royal Australian Air Force, and a Co-Editor at The Central Blue. The views expressed are hers alone and do not reflect the opinion of the Royal Australian Air Force, the Department of Defence, or the Australian Government.

This article was first published by The Williams Foundation’s Central Blue series on March 27, 2019.

On defense.info we have a section which focuses directly upon Williams Foundation article as well as the reports produced by Second Line of Defense for the Foundation seminars.

The next seminar to be held in Canberra on April 11, 2019 will focus on a key part of defense or deterrence in depth, namely the ability Australia to enhance the sustainability of its force and its ability to support sustainment engagement by allies operating with the ADF from Australian territory in a crisis.

China’s “Buy In” Strategy for Maritime Operations in the Pacific: Putting It into a Strategic Maritime Context

03/30/2019

By Robbin Laird

China has expanded its maritime reach as it modernizes its navy and air force.  And has done so through a “buy in strategy” but one that is challenged as well with its approach to “gray zone operations” in the region as well.

In a recent article by Leland Lazarus andJohn Brunetti, the “buy in” approach is discussed.

China continues to roil Asian neighbors over claims in the East and South China Seas. However, China has also been cooperating with neighbors to establish codes of conduct to reduce conflict in the maritime arena. For years, China and the Association of Southeast Asian Nations (ASEAN) negotiated maritime codes of conduct.

More recently, China hosted the signing of the Code for Unplanned Encounters at Sea in 2014. In February 2018, China and ASEAN held a two day tabletop exercise in Singapore, where defense ministers from eleven countries planned responses to potential oil tanker fires, search and rescue evacuations, and naval assistance to merchant vessels and civilian ships. And in October last year China and ASEAN organized an inaugural five-day maritime field training exercise.

More than one thousand personnel—deployed on eight ships from Brunei, China, the Philippines, Singapore, Thailand, and Vietnam—conducted exercise drills in the Ma Xie naval base in Zhanjiang, China.  

According to exercise co-director Colonel Lim Yu Chuan of Singapore, the exercise drills “enabled us to strengthen interoperability and more importantly, build trust and confidence for our navies to work with one another in responding to maritime incidents at sea.”  Despite the maritime claim tensions, regional powers are beginning to buy into a cooperative relationship with China.

A second element of the “buy in strategy,” according to the authors is the Chinese maritime reach into the Middle East and Africa, where the Chinese Navy has assisted in counter-piracy operations

PLAN has escorted more than 6,400 Chinese and foreign ships, and prevented about 3,000 suspected pirate boats from launching attacks in the Gulf of Aden. China’s maritime initiative is also evident in the South Pacific. The Peace Ark, China’s ten-thousand-ton medical ship, provided free medical treatment to twenty thousand patients in Papua New Guinea, Vanuatu, Fiji, and Tonga. Such exercises show China’s transition into a blue water navy, and dovetails nicely with China’s narrative of being a peaceful, cooperative neighbor, and not a competitor to be feared.

The third element of the “buy in strategy” is in the area of expanding port ownership as part of its global silk road strategy.

Over the past decade, China has helped finance at least thirty-five ports around the world. One flagship project is the Gwadar port in Pakistan. Part of the $62 billion China-Pakistan Economic Corridor (CPEC) initiative, China is helping Pakistan update the Gwadar port

A final element of what the author’s call a “buy-in strategy” is the Chinese shipbuilding industry.

Today, China’s ship construction dominates the world market. CSSC’s Jiangnan Shipyard and Hudong-Zhonghua Shipbuilding recently began building the world’s largest container ships. These ships are a marvel of size and technology using liquid natural gas to deliver goods the world over. China is also willing to sell existing ships to allies; for instance, China just agreed to sell its aircraft carrier Liaoning to Pakistan. For allies, seeing such transactions certainly sweetens the deal of working with China.

We could put this differently and see what the author’s are calling a “buy in strategy” as key elements of an overall maritime influence strategy designed to expand the power of the authoritarian state at the expense of the liberal democratic order.

This is clearly a global influence strategy in which the “soft power” approach is underwritten by the willingness to use force to support its impact and influence.

The “gray zone” approach being followed by China is a constant reminder to states that China has presence and is willing it to reshape the maritime order to its preferences.

A recent book edited by Andrew S. Erickson and Ryan D. Martinson on Chinese maritime operations looks at “gray zone” operations being conducted by the Chinese.

The book identifies and discusses in detail “gray zone” operations, namely, operations short of the use of lethal force but empowered by a well worked out chain of maritime power elements up to and including the presence of combat forces.

The goal is to reshape the external environment in ways favorable without the need to engage in kinetic operations. In the hybrid war concept, lethal operations are the supporting not the tip of the spear element to achieve what the state actor is hoping to achieve tactically or strategically.

The book argues that this is a phase short of what the Russians have done which has been labelled hybrid warfare.

But from my point of view both gray zone ops and hybrid war ops are part of a broader strategic reality, namely, the nature of crisis management facing the liberal democracies competing with the authoritarian states in a peer-to-peer competition.

And I would subsume the “buy-in strategy” as part of the broader capabilities which can indeed shape how crosses can be avoided, influenced or dominated by the Chinese. In the US, the kind of activity which the Merchant Marine or the Coast Guard does has NEVER been incorporated into the broader influence strategy. For the Chinese, these capabilities, including economic activities have been.

The separation of activities so important to the success of capitalism, is ignored by the Chinese as an authoritarian state and instead works to integrate the spectrum of activities from peace to war in a quite different manner.

The challenge can be put bluntly — deterrence has been designed on the Western side with large scale engagement of enemy forces in mind.

What if deterrence in this sense is the necessary but not sufficient capability to constrain the actions of the authoritarians?

What if you can deter from full scale war, but by so doing not be able to control what your adversary is doing in terms of expanding his global reach and reshaping the strategic environment to his benefit?

What if you have organized yourself for deterrence but not effective crisis management?

The gray zone concept in my view is subsumed in this broader strategic shift and challenge.

There is also a key question whether gray zone operations is the strategic focus or really a phase on the way to engaging in kinetic operations as part of the way ahead.

What if the US and its key allies are not willing or able to respond and the Chinese expand their appraoch over time?

We can not assume that as Chinese look at the world or read RAND studies that they will not believe that actually striking a US or allied warship might not be a useful part of their evolving appraoch to crisis management.

From this point of view the discussions of the book could be seen as a historic look at a phase of Chinese maritime power and the evolving approach to strategic engagement in the region and beyond.

I would note that the focus in the book is on the US Navy and its responses.

Having worked with the USCG for years, I found the resource neglect of the service and the strategic decision to stick them into the Department of Homeland security as significant strategic failures on the part of the US.

First, the engagement in the Middle East has stolen resources from many security and non-security accounts, among them the USCG.

And then the focus on the return of Great Power politics, although admirable must focus on the nature of who these competitors actually are and how they operate.

How do we constrain Chine, and not just deter it?

Many years ago when I started a series on Pacific defense for the then AOL Defense, now Breaking Defense, I actually started with the significance of the USCG and why they were a foundational element for the kind of “constrainment” as well as deterrent strategy we needed to shape.

That series led eventually to our co-authored book on Pacific strategy which again started with the “constrainment” challenge not just the deterrence one.

What I had not realized was that it is the broader challenge which the authoritarian states were generating for crisis management against the liberal democracies  which was in play.

And that this was the core strategic shift from the land wars.

This book simply validates how important the missing USCG National Security and Offshore Patrol vessel hulls and trained personnel are.

Instead, the US focused on Littoral Combat Ships which made no sense.

The white hulls are crucial to a “constrainment strategy”, and the expansion of the Chinese Coast Guard in the region has been central to the gray zone operations discussed in the book.

Or let me be blunt: What the Chinese have done should not be a strategic surprise or a black swan.

It is simply something for which we did not prepare nor resource.

In effect, the “buy in strategy” when combined with the Chinese approach to “gray zone operations” and its expanded capability to fight at the high end really work together to underscore that China is not a liberal power wishing to reinforce current rules of the maritime order.

Rather, they a modern authoritarian power seeking to work with its allies to reshape the global order in a more favorable manner to themselves.

In the second edition of their highly regarded book on Chinese maritime power, Toshi Yoshihira and James R. Holems, what one Chinese analyst has called the “cabbage strategy.”

Zhang Zhaozhong—a retired rear admiral, NDU professor, well-known television personality, and prolific author of nationalistic navalist books for popular consumption—explain(s) how a cabbage strategy works. The strategy, Zhang says, can be encapsulated in “just one word, which is squeezing.”

His explanation is worth quoting at length: “For every measure there is a countermeasure.…If you send fishing vessels to resupply, then we will use fishing vessels to keep them out; if your coast guard sends supplies, then we will send marine surveillance to keep them out. If your Philippine Navy ships hurry over, we will use naval vessels to keep them out. There is nothing to be afraid of, and we must stick it out to the end. The cabbage strategy of which I have spoken many times is to surround them layer by layer, and make them unable to enter [Second Thomas Shoal].48 (Our emphasis).”1

A key disconnect between Western navies and the Chinese over the past few years has been a clear focus by Western navies on maritime missions to support the global trade order whereas the Chinese have been focused on conflict at sea as well as global trade order missions.

China’s approach poses problems from a cultural standpoint as well. In the sense that “Mahanian” connotes girding for fleet battles and “post-Mahanian” means policing the sea or projecting power ashore, China is comfortable using post-Mahanian means for Mahanian ends.

A fishing trawler or coast guard cutter represents an implement of power politics as surely as a warplane or a hulking destroyer.

For their part, U.S. naval officers find it hard to deal with white-hulled China Coast Guard cutters or maritime enforcement vessels trying to cement command of Chinese-claimed waters. Countermeasures for maritime militia embedded within the fishing fleet and working in conjunction with law enforcement ships are still harder to come by.2

The authors note that this is changing as the US Navy begins to refocus on conflict at sea as a core mission and is modifying its combat assets to be more capable of so doing.

The authors conclude their book by looking at ways the US might more effectively counter the Chinese approach and to enhance core combat capabilities.

And it is China’s mounting resistance to the U.S.-led system of trade and commerce, which has nourished the regional order for more than seven decades, that makes the rise of Chinese sea power so worrisome.

Policy makers, then, must resist the temptation to focus narrowly on the material or operational dimensions of Chinese anti-access.

These are important beyond a doubt. But statesmen must recognize that China’s ascent and its accompanying dream pose an all-encompassing challenge to the United States and the long peace over which it has presided in Asia.3

I would add that a major aspect of working mid-term and long-term responses to the Chinese and to shape ways to constrain them is clearly how the US works with core Asian allies.

The military-technical aspects of so doing are important but so are the political-military as well as diplomatic.

But bluntly, how Japan, Australia, the South Koreans and others work together with the US in shaping the next phase of the liberal order is a crucial concomitant of the refocus on what the authors refer to as the “Mahanian” focus which connotes girding for fleet battles and “post-Mahanian or policing the sea or projecting power ashore.

The authors deal with the allied dimension in the context of how the Chinese see the general challenge facing them with regard to their core security challenges.

Geography colors how Chinese strategists appraise threats. The Korean half-island and the Japanese archipelago converge on key bodies of water while forming straits near China’s political and economic centers.

Whether the U.S.–Japan–South Korea alignment can ever become a coherent strategic unit is dubious at best in light of the two Asian allies’ turbulent past.

Nevertheless, Chinese observers find it unsettling that two U.S. allies boasting advanced economies and modern armed forces stand athwart sealanes essential to China’s security and economic health.

Sowing disunion among the allies would partly ameliorate this dilemma—and thus represents a strategic imperative for Beijing.4

Indeed, from my perspective working the technology and working the US and allied concepts of operations along with reshaping how the alliance will work in the presence of persistent Chinese efforts to change that Alliance is at the heart of the challenge.

For US policy makers, rebuilding the US Navy is a necessary but not sufficient condition; working more effective allied relationships to constrain and channel the Chinese is crucial as well.

In short, at the heart of the Chinese transition with regard to seapower is the shift from benefiting from and leveraging the global liberal system which has been underwritten by the US Navy to shaping their own capabilities to defend their interests, operate globally and to provided extended defense of their crucial port regions, where significant population and economic capabilities are located.

And it is not just about the numbers and capability of their gray hulls; it is about the sweep from a “buy in strategy” to “gray zone operations” to “economic presence” in the global maritime system and shaping higher-end capabilities which could come into play as crises occur and need to be managed.

Note: This is what I wrote in my piece on AOL Defense in the second piece in my Pacific series and published on August 14, 2012:

As Vice Admiral Manson Brown, the recently departed Coat Guard Pacific commander, underscored in an interview last year:

“Many people believe that we need to be a coastal coast guard, focused on the ports, waterways, and coastal environment.

“But the reality is that because our national interests extend well beyond our shore, whether it’s our vessels, or our mariners, or our possessions and our territories, we need to have presence well beyond our shores to influence good outcomes.

“As the Pacific Area Commander, I’m also the USCG Pacific Fleet Commander. That’s a powerful synergy. I’m responsible for the close-in game, and I’m responsible for the away game. Now the away game has some tangible authorities and capabilities, such as fisheries enforcement and search and rescue presence,” he said.

At the heart of a strategic rethink in building a U.S. Pacific maritime security strategy is coming to terms with the differences between these two domains, the security and military. The security domain is based on multiple-sum actions; military activity is by its very nature rooted in unilateral action. If one starts with the military side of the equation and then defines the characteristics of a maritime security equation the formula is skewed towards unilateral action against multiple-sum activity.

But there is another aspect of change as well. Increasingly, the United States is rethinking its overall defense policy. A shift is underway toward preparing its forces for global operations for conventional engagement in flexible conditions.

Conventional engagement is built on a sliding scale from insertion of forces to achieve political effect to the use of high intensity sledgehammer capabilities. Policymakers and specialists alike increasingly question the utility of high-tech, high-intensity warfare capabilities for most conventional engagement missions.

In parallel to the relationship between those two domains is the relationship between the Coast Guard and the Navy, rooted in a sliding scale on levels of violence. This needs to be replaced by a new look, which emphasizes the intersection between security operations and conventional engagement, with high-intensity capabilities as an escalatory tool.

To protect the littorals of the United States is a foundational element for Pacific defense, and allows the U.S. to focus on multiple sum outcomes to enhance defense and security, but at the same time it lays a solid foundation for moving deeper into the Pacific for military or extended security operations when needed.

A reflection of such an approach is the North Pacific Coast Guard Forum. Again one must remember the central place the Great Circle Route plays in trans-Pacific shipping and the immensity of the Pacific. Given these conditions, the Coast Guard has participated in a collaborative security effort in the North Pacific designed to enhance littoral protection of the United States.

Among the key participants are the Canadians, Russians, the Japanese, the South Koreans and the Chinese.

Admiral Day, an active participant in the forum during his tenure, notes that members have participated in numerous exercises and several joint operations.

But for the United States to play a more effective role in defending its own littorals and to be more effective in the kind of multi-national collaboration which building Pacific security and providing a solid foundation for littoral defense, a key element are presence assets.

“And it’s presence, in a competitive sense, because if we are not there, someone else will be there, whether it’s the illegal fishers or whether it’s Chinese influence in the region,” said Vice Adm. Manson Brown. “We need to be very concerned about the balance of power in the neighborhood.

If you look at some of the other players that are operating in the neighborhood there is clearly an active power game going on. To keep the US presence relevant, the Coast Guard’s National Security Cutters are a core asset.

The inability to fund these and the putting in limbo of the smaller cutters, the so-called OPCs, or Offshore Patrol Cutters, underscores a central question: without effective littoral presence (for U.S. shores) how does one do security and defense in the Pacific?

The size and immensity of the Pacific means you operate with what you have; you do not have shore infrastructure easily at hand to support a ship. Ships need to be big enough to have onboard provisions and fuel, as well as aviation assets to operate over time and distance.

In short, providing for littoral defense and security on the shores of the United States requires a reaffirmation of the Coast Guard’s Title X role and ending the logjam of funding support for the cutter fleet and the service’s aviation assets which enable that fleet to have range and reach.

The featured photo shows the Chinese Navy guided-missile destroyer Xi’an (153) participates in a maritime interdiction event with the guided missile destroyer USS Stockdale (DDG 106), during Rim of the Pacific (RIMPAC) 2016. Credit US Navy: July 21, 2016.

Diamond Shield 2019

03/29/2019

The Australian Air Force conducted the second biennial Air Warfare Instructor Course in 2019 (AWIC19), a six-month course integrating warfighting functions across a range of specializations.

The second of these practical exercises, Exercise DIAMOND SHIELD (DSD19), will operate RAAF and foreign force aircraft from RAAF Base Amberley, RAAF Base Williamtown and Coffs Harbour Airport from 11-29 Mar 19.

In an article by Staff Sgt. Zade Vadnais, Pacific Air Forces Public Affairs and published on March 28, 2019, the role of the USAF 23rd EBS in the exercise was highlighted.

ROYAL AUSTRALIAN AIR FORCE BASE DARWIN, Australia — 

U.S. Airmen assigned to the 5th Bomb Wing at Minot Air Force Base, North Dakota, participated in Diamond Shield 2019 at Royal Australian Air Force Base Darwin, Australia, March 18, 2019.

More than 80 Airmen and two B-52 Stratofortresses assigned to the 23rd Expeditionary Bomber Squadron and 5th Maintenance Group traveled from their deployed location at Andersen Air Force Base, Guam, to Australia’s Northern Territory to participate in the biennial exercise.

The goal of Diamond Shield is to provide training support to RAAF Air Warfare Centre students while giving U.S. and Australian Air Force members an opportunity to enhance their interoperability and effectiveness through joint training.

“What we’re doing as far as the B-52s is helping the RAAF AWC students by replicating what we call ‘Red Air,’ so we’re acting as the enemy,” said Capt. Benjamin Moer, 23rd EBS B-52 weapons systems officer. “The sorties we fly range in mission depending on what sort of threat environment the planners are trying to replicate in order for the students to get the best training out of it.”

Moer said 23rd EBS pilots operating from RAAF Base Darwin fly sorties lasting approximately 11 hours due to the installation’s relatively remote location, which functions similarly to a forward operating base during the exercise.

“We’ve got U.S. and Australian Air Force personnel scattered across the country and we’re having to communicate digitally to come up with a mission plan and then execute,” said Moer. “That’s really cool because that’s only something you really see when you’re in a deployed environment trying to work with people at different FOBs.”

The installation’s remote location also challenged 23rd EBS and 5th MXG Airmen when it came to identifying and packing the appropriate equipment for mission effectiveness.

A U.S. Air Force B-52 Stratofortress taxis on the runway upon returning from a sortie in support of Diamond Shield 2019 (DS-19) at Royal Australian Air Force Base Darwin, Australia, March 26, 2019. Exercises such as DS-19 increase interoperability between the U.S. and its allies in the Pacific region, cultivating more productive and effective partnerships. (U.S. Air Force photo by Staff Sgt. Zade Vadnais)

“As far as the infrastructure we need in order to operate a B-52, we figured out how to take a little with us from Guam and borrow the rest from the RAAF here at Darwin, set up shop, and operate out of it,” said Moer. “That’s pretty amazing when you think about it. We just said ‘hey, let’s take these B-52s and operate out of Darwin for now.’ Learning what we need to bring and what we need to request [from the host base in order to be successful] is very valuable.”

Whether borrowing equipment from one another or figuring out how to fly together more effectively, the exercise allows the two nations to foster greater integration enhancing interoperability across the full spectrum of operations better preparing them to respond to future challenges in the Pacific region.

The ability to work with one another, according to Lt. Col. Daniel Willis, 23rd EBS director of operations, is the most significant takeaway from Diamond Shield.

“Ultimately the integration with the RAAF is the most important thing we get out of these exercises,” said Willis. “The more we employ together the more flexible we become, and the more flexible we are the more lethal as a team we all become.”

An article published by Australian Aviation on March 21, 2019 added further details regarding the exercise.

Conducted from RAAF Base Williamtown and RAAF Base Amberley, Exercise Diamond Shield includes aircraft and personnel from Australia and the United States.

This includes United States Air Force (USA) F-16s that are acting as aggressors in the exercise, as they did in the inaugural Exercise Diamond Shield in 2017.

USAF aircraft have arrived from its 18th Aggressor Squadron, 765th Air Refuelling Squadron and 23rd Bomber Squadron. Apart from the F-16s, other USAF aircraft include the KC-135 Air refueller and B-52, the Defence said in a statement on March 4.

Meanwhile, Defence said the RAAF had sent F/A-18A Hornet, F/A-18F Super Hornet, EA-18G Growler, Hawk 127, AP-3C Orion, P-8A Poseidon, C-17A Globemaster, KC-30A Multi Role Tanker Transport, E-7A Wedgetail and C-130J Hercules to Exercise Diamond Shield.

The featured photo shows an AP-3C Orion, E-7A Wedgetail and P8 Poseidon from Surveillance and Response Group are parked together during Exercise Diamond Shield, RAAF Williamtown NSW.

Air Marshal Hupfeld Becomes New Chief of the RAAF

Italy, France and the Chinese-European Relationship

03/28/2019

While the EU puts together an initial response to the challenge of Chinese investments and infrastructure ownership in Europe, Italy and France this week signaled sovereign decisions to shape their own approaches within the evolving context.

Two articles in the EUObserver published this week provide insights into the priorities of the leadership of each country.

With regard to Italy, the Chinese have their first EU participant in their global “silk road” initiative.

In an article by Mads Frese and published on March 22, 2019, the Italian position on the silk road initiative was discussed.

During Xi Jinping’s visit to Rome the Italian government will sign a Memorandum of Understanding (MoU) about its participation in China’s ambitious One Belt, One Road, also known as the Belt and Road Initiative (BRI), which aims to create an intercontinental infrastructure connecting Asia with Africa, the Middle East, Latin America and Europe.

 Consequently, Washington has put a lot of pressure on Rome not to sign, primarily citing security issues related to digital infrastructure.

 According to Lucio Carracciolo, director of the geopolitical magazine Limes, Italy has thus, “without even noticing”, ended up “in the ring where the US and China are competing for the World Heavyweight Championship”.

Later in the week, the Chinese leader was in Paris meeting with President Macron.  He was not seen wearing a yellow jacket.

In an article by Andrew Rettman, published on March 26, 2019, entitled “France Takes Chinese Billions Despite EU Concerns,” underscores the tight rope act which President Macron is playing with regard to China.

France has signed €40bn of business deals with China, despite concerns on strategic investment and human rights abuse.

The bulk of the new deals, worth €30bn, were in the form of 300 airplanes to be sold by European firm Airbus to China Aviation Supplies Holding Company, while the rest covered energy, transport, and food. 

French president Emmanuel Macron and Chinese president Xi Jinping announced the moves at a bilateral meeting in France on Monday (25 March). 

They will meet again in an enlarged format with German chancellor Angela Merkel and European Commission president Jean-Claude Juncker also in France on Tuesday….

The wave of Chinese investment, which had so far focused on poorer central European states, has raised alarm in Europe that China’s acquisition of sensitive assets, such as commercial ports, or involvement in high-end IT projects, such as 5G telecoms networks, posed strategic, intellectual property, and security threats to the EU. 

“If some countries believe that they can do clever business with the Chinese, then they will be surprised when they wake up and find themselves dependent,” German foreign minister Heiko Maas warned on Sunday. 

Gunther Oettinger, Germany’s EU commissioner, also voiced concern the same day that, soon, “in Italy and other European countries, infrastructure of strategic importance like power networks, rapid rail lines or harbours [will] no longer be in European, but in Chinese hands”

Meanwhile, the same French government is working with Australia to build a new generation of submarines whose clear focus is upon the Chinese military push out into the Pacific.

Italian and French actions do raise concerns at the EU level, notably with a new effort being launched to raise not just awareness of Chinese investments but also the question of infrastructure controls.

The featured photo shows the French and Chinese leaders ate dinner with their wives, prior to announcing business deals in Paris (Photo: elysee.fr)

https://defense.info/featured-story/2019/03/monitoring-foreign-investments-in-europe-filling-the-gap/

Europe Moves To Better Monitor Foreign Investments, Sort Of A CFIUS

 

 

 

 

 

 

 

 

ADF Assists Australians in Path of Tropical Cyclone Trevor

03/26/2019

The Australian Defence Force is assisting the Northern Territory Government to evacuate remote communities in the path of Tropical Cyclone Trevor.

Defence support was requested on Wednesday 20 March by the Northern Territory Government through Emergency Management Australia and close coordination between the agencies continues.

A Joint Task Force of around 200 personnel has been established out of the Australian Army’s 1st Brigade in Darwin to coordinate Defence’s response in supporting the emergency evacuations.

Three Royal Australian Air Force C-130J Hercules transport aircraft have commenced evacuation operations out of East Arnhem Land. Two aircraft have evacuated people from Groote Eylandt and the third is evacuating people from McArthur River Mine airfield near Borroloola. A fourth aircraft, a C-17A Globemaster, will join the operation at McArthur River Mine airfield later today.

It is expected the aircraft will conduct a number of sorties throughout the day to evacuate those community members identified by the Northern Territory Government for emergency evacuation.

The featured photo shows Lightning striking in the skies surrounding Katherine Showgrounds as Australian Army soldiers from The 5th Battalion, Royal Australian Regiment and Royal Australian Air Force Base Tindal personnel set up emergency shelter tents.

March 22, 2019

Australian Department of Defence

Preparing for Red Flag 19-2

03/25/2019

The role of the US warfighting centers at Nelllis, Fallon and Yuma MCAS have become increasingly significant as the US and the allies shape a new appraoch to Warfighting — the kill web.

The recent RAND report on the US dealing with adversary forces continues their long tradition of taking what the US and the allies used to do and comparing them against a projected enemy force and seeing how that turns out.

But this completely ignores how the US and the allies are significantly reshaping their combat forces, in part under the transformation of airpower association with fifth generation aircraft,

Fortunately, Nellis persists in.believing that real world innovation deters more than studies.

And we thank them for that.

In two recent stories published by Nellis AFB, aspects of preparing for the next Red Flag have been highlighted.

The first story by Airman 1st Class Bryan Guthrie, 99th Air Base Wing Public Affairs was published March 20, 2019

The 726th Air Control Squadron (ACS) are providing comprehensive radar coverage on the Nevada Test and Training Range (NTTR) for all the pilots flying in Red Flag 19-2 this month.

A team of Airmen from multiple career fields has come together at a mobile simulated forward operation base (FOB) to watch over hundreds on nautical miles of the NTTR.

“We’re the glue that binds everything together,” said Lt. Col. Richard Barber, 726th ACS commander. “When the tactical plan comes together, we are the one to orchestrate all the parts. We integrate with other Command and Control (C2) units to bring order to chaos and speed up battle management decisions.”

This is the first time the 726th ACS has brought the “Talk” to Red Flag and implemented it from the NTTR. The “Talk” is where all communication from the radar is brought in and dispersed to the pilots overhead. The overall affect is that it creates more realistic exercise for the 726th ACS.

A TPS-75 long range radar system is used to survey over 240 nautical miles and is one of the main pieces of equipment that gives the 726th ACS eyes over the NTTR.

When the radar is being used, its goal is to locate all aircraft in the air space around the FOB. Once an aircraft is located, personnel communicate with pilots and use data collected to distinguish aircraft between “Blue” and “Red” forces.

The 726th ACS is participating as the C2 function for Red Flag alongside the 964th Airborne Air Control Squadron, 16th Air Combat Control Squadron and Marine Air Control Squadron 24 for Red Flag. They all come together to produce an accurate representation of what is going on in real time. 

The second is about a newbie coming to Red Flag for the first time.

This newbie is an F-35 pilot and even though he is a newbie, as a new fifth generation pilot he has the advantage highlighted in a comment made to an RAAF F-22 pilot earlier this decade:

He cited a comment made to him by a USAF F-15 C pilot:

“I have more SA with only 20 hours on the F-22A than I ever had with over 1500 hours on the F-15C.”

And more to the point, now the USAF as it has expanded significantly its fifth generation force needs to practice from that point forward and not continue to be dominated by legacy thinking.

And it is by such transformation that the USAF and their sister forces are working to prevail in any future air combat with a peer adversary.

The second story was also by Airman 1st Class Bryan Guthrie, 99th Air Base Wing Public Affairs and was published March 22, 2019.

Capt. Kyle Benham, 62nd Fighter Squadron F-35A Lightning II fighter jet pilot, participated in his first Red Flag March 8-22 at Nellis Air Force Base, Nev.

 Benham is participating in Red Flag 19-2 to increase his experience with coalition forces from across the globe and improve on his skills in an F-35A in a mass exercise that pushes even the best fighter pilots to their limits, especially for those at Red Flag for the first time. 

“The goal for me in this exercise is to think beyond just my aircraft and get into the big picture of how I can help 60 plus aircraft in the mission,” said Benham.

 Benham discussed further how Red Flag itself could be a monster.

“Nellis is the location everyone talks about,” said Benham. “There’s a lot of history and tactics that come out of here. As far as Red Flag itself, it’s one of the premiere exercises that a pilot can participate in. If there is any intimidating part of Red Flag, it’s that you’re going to jam 60 to 70 aircraft in a confined space. Thus, forcing everyone to work as a team to solve whatever tactical problem presented.”

Ten other nations will make up all the aircraft in the sky for Rad Flag 19-2.

“The hardest factor will be that coalition partners bring something different such as tactics or the way they communicate them. Making sure that we are all on the same page so we can execute the mission in a real-life scenario.”

As Benham progressed through Red Flag, he noticed minor improvements as the U.S. and its partners worked together. 

“One of the areas I noticed an improvement in is the integration with other aircraft and platforms while airborne,” said Benham. “It is awesome to see the improvement in communication from day one to now, going into the second week, going from some miscommunication to being able to pass and receive information between aircraft for dynamic targeting in a short amount of time.”

Without a doubt, Red Flag has changed over the years, but some legacies have never changed. 

“I feel blessed to have the opportunity, especially because my grandfather was a fighter pilot and the legacy he carried,” said Benham. “Being able to see everything he experienced in his time compared to now. It means a lot to me that the Air Force would take the time and money to put an exercise together, such as Red Flag, so we can have the experience we need to prepare us for real life conflicts.”

Red Flag is conducted three times at Nellis AFB and enhances combat readiness of air forces around the world. The next Red Flag is scheduled for summer 2019. 

And published a decade ago, a response to a flawed RAND study then and Nellis is responding to the now.

I would encourage the Russian and Chinese military to take much more seriously what is going on at Nellis, Fallon and MAWTS-1 than what is being written by an organization like RAND.

That is if you wish to stay alive in combat.

Response to RAND

Lt. General (Retired) Deptula put it well in his introduction to a set of case studies in the use of airpower which was published by USNI in 2017 and made it clear that these case studies were first rate, but airpower was moving in a very different direction.

What Deptula had to say is the baseline from how Nellis is training the 21st century fifth generation enabled Air Force.

Unfortunately, the legacy appraoch seen in the case studies in the book is where the head of too many “strategists” is still stuck while the warriors move on.

July 21, 2016, marked the ninety-fifth anniversary of Brig. Gen. Billy Mitchell’s successful sinking of the battleship Ostfriesland. At that time the airplane’s utility was largely unproven, and this bold, dramatic demonstration of airpower’s potential was a significant event in military history.

The evolution of airpower from that day in 1921 to the present has been difficult, varied, stunning—and controversial.

Airpower’s capacity to achieve tactical, operational, and strategic goals has expanded at a tremendous rate. Airmen who fly and fight today have at their disposal capabilities their pre- decessors could not have imagined.

Modern airpower, its survivability greatly enhanced by platform speed and low observability, can strike anywhere around the globe—rapidly, in all weather, day or night, and with extreme precision. A single aircraft today equipped with weapons of near-zero-miss distance capability can achieve the same effects that in World War II took thousands of bombs on hundreds of aircraft.

Such technological advances have redefined the way in which military leaders can harness airpower.

Airmen have always embraced their ability to rise—literally—above the constraints of terrain and to transcend the restrictions of a horizontal perspective.

As airpower extended its reach into space and the technologies of air and space merged in application, a theory of the indivisibility of aerospace power materialized. By the end of the twentieth century, the resulting combination of air and space technologies gave aerospace systems great accuracy and ensured access.

This combination has yielded a concept of operations for achieving control over an enemy’s essential systems that is no longer defined simply by levels of destruction.

The concept rests on the realization that denying an adversary the ability to operate as it wishes is ultimately at least as important as destroying the forces that the adversary relies on to achieve its aims.

Air forces around the world seize on the advantages of operating in air and space, and now cyberspace, to project power.

By imposing very specific effects on an adversary through means employed from air and space, airpower can effectively exercise strategic control over the outcome of a conflict.

This outcome-driven or effects- based approach has expanded the options for the conduct of warfare beyond the attrition- and annihilation-based models that defined surface warfare for centuries.

Airpower can shape, deter, and dissuade so that nations can attain their most important goals while minimizing the need for combat operations.

When combat becomes necessary, aerospace capabilities can create a variety of strategic, operational, and tactical effects that yield disproportionate advantages relative to surface warfare without projecting the same degree of vulnerability.

Leading-edge computing and network capabilities have empowered the emergence of information as the dominant factor in warfare.

As a result, today we are in the midst of an “information in war revolution”—one in which the speed of information, advances in technology, and the design of organizations are merging to change the way we conduct warfare.

As we move further into the twenty-first century, new aerospace capabilities will create a paradigm shift in the role that aircraft play in warfare.

Fifth-generation aircraft and those that will succeed them will become sensor-shooter nodes in a distributed network.

When integrated with other system “nodes” in every domain—air, space, land, and sea—these assets will coalesce into a “combat cloud”: a self-forming, self-healing intelligence, surveillance, reconnaissance (ISR)-strike-maneuver- sustainment complex that has the potential to usher in a new era of warfare.

Instead of relying on traditional approaches that mass fighters, bombers, and supporting aircraft into strike packages to attack particular targets, a combat cloud will integrate complementary capabilities into a single, combined “weap- ons system” that can conduct disaggregated, distributed operations over an entire operational area.

Concurrently, the concept of employment for aircraft is evolving from a stove-piped, parochial service alignment to a loosely federated “joint and com- bined” construct today, on the way to a highly integrated enterprise collaboratively leveraged through the broad exchange of information.

Stated another way, military forces will increasingly attain desired effects through the interaction of multiple systems, each one sharing information and empowering the others to achieve a common purpose.

As a result, aircraft previously labeled as “fighters,” “bombers,” “reconnaissance,” “cargo,” and so on will play far broader roles than they ever did in the past.

Capturing this potential, however, requires military professionals both to think innovatively and to shed anachronistic beliefs that aircraft can only perform single functions and missions.

In the second cen- tury of airpower, we must untether airpower from the confining categories of “B- . . . ,” “A- . . . ,” “F- . . . ,” “MQ- . . . ,” or any other label.

Constrained thinking, restrictive categorization schemes, and anachronistic nomenclature undermine the innovation needed.

The evolution of airpower depends on the evolution of technology, and the human imagination and knowledge that enable the invention, development, and application of airpower instruments.

As the case studies in this book reveal, airmen from America, Britain, France, Israel, and elsewhere in the world worked tirelessly during the twentieth century to embrace innovation, creativity, and change.

Airpower Applied chronicles the results of their efforts, demonstrated in conflicts ranging from the Allies’ strategic bomber offensive in World War II to today’s campaigns against insurgents.

However, while airpower has matured to the point that it is now acknowledged as an indispensable element of modern page10image1659600warfare, current practitioners may have become too complacent regarding its potential to determine the outcomes of warfare.5

It is clearly the focus of Nellis, Fallon and MAWTS-1 on shedding complacency, shedding legacy thinking, and driving innovation provided by fifth generation aircraft to reshape combat operations and enable the kill web,

We can only hope that policy makers who do not understand this or policy analysts with their heads in the past embolden our enemies rather than supporting and reinforcing the innovation of our warriors,

Nothing less than or fate as a nation or of the free world is at stake.