The Heron UAV, the Bundeswehr and the Joint Operator Support Model

12/16/2017

2017-12-07 Airbus Defence and Space published a release today which highlighted the Bundeswehr mission in Africa, operating from a French base at Gao.

The Heron has been part of that mission and has completed its first year of operations in Mali.

According to the Press Release:

The Heron 1 UAV system, which is stationed at the Gao air base for the German Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support (BAAINBw) as part of the UN’s MINUSMA mission, logged its 3,000th flight hour in November 2017.

The system’s maiden flight took place in Mali on 1 November 2016 after the contract was signed in June 2016.

When added to the Heron 1’s operations for the German Armed Forces in Afghanistan, the Air Force’s UAV system has chalked up more than 38,000 flight hours.

Both places of deployment are being managed using a joint operator model between the Bundeswehr and industry.

As with the Heron 1’s operations in Afghanistan, the provision, maintenance and repair of the system in Mali is the responsibility of Airbus Defence and Space in Bremen.

Three Heron 1 aircraft are stationed at the air base in Gao, located in northeastern Mali. Given its reconnaissance depth of up to 800 km, the Heron 1 system has significantly enhanced the German Air Force’s aerial reconnaissance capabilities. The reconnaissance results are then made available to the Joint Mission Analysis Centre (JMAC) for the MINUSMA mission, thereby contributing to the increased safety of all partners involved in the UN mission.

Reconnaissance tasks focus on the country’s crisis regions in order to provide the best possible protection for the country’s population as well as for the German troops and the contingents of other mission nations stationed in the country.

The operator model impressively demonstrated its performance capabilities during operations in Afghanistan and Mali, as emphasised by proven high system readiness of well in excess of 90%.

This is in addition to the system’s full compatibility and interoperability with Germany’s allies. The deployments of the Heron system in Afghanistan and Mali also help develop expertise within the Bundeswehr with a view to future MALE UAS.

Manufactured by the Israeli company IAI, Heron 1 is an unarmed medium altitude long endurance (MALE) UAS for the respective theatre of operations.

The aircraft has a wingspan of 17 metres and a maximum mission endurance of over 24 hours. The system’s military tasks include detecting booby traps from the air, accompanying convoys and patrols, assisting forces in combat situations, reconnoitring and surveilling routes, establishing movement profiles and long-term monitoring, supporting situation assessments, and protecting property and military camps.

The UAS is also used to support humanitarian missions.

Deutsche Welle has provided an overview of German participation in the UN mission in Africa which provides a broader strategic look at where German forces fit into an overall approach.

German interests in the broader Sahel region are tied to the fate of Mali. Berlin’s primary interests include supporting its ally France, combating extremist groups and preventing criminal human-trafficking networks from sending migrants north to Libya and on to Europe. 

Fostering political stability and economic opportunity are integral parts of Germany’s broader Sahel strategy….

Around 875 German troops are currently taking part in the 13,000 strong UN peacekeeping mission in Mali (MINUSMA), aimed at stabilizing the country and supporting a peace agreement between the government and rebels…..

Germany joined MINUSMA from the beginning.

But it has increased its role in Mali over time, in part to support France’s broader counterterrorism operations, especially after a series of terror attacks in France over the past two years. 

The importance of the broader Sahel region has also increased as criminal trafficking networks bring African migrants to Libya, using it as a springboard to reach Europe.

More than 600,000 African migrants, most with little chance of receiving asylum, have arrived in Italy over the past three years. 

The Bundestag, or German parliament, therefore approved a stronger MINUSMA mission in January 2016 in the wake of the Paris terror attacks.

In January 2017, the German parliament approved an increase in the number of German troops that could be deployed to Mali, upping the number to 1,000.

The 2017 decision came after the Netherlands pulled its own helicopters out and Germany decided to fill the gap by deploying NH-90 transport helicopters and Tiger type combat helicopters. 

The Bundeswehr contingent includes transport aircraft, refueling aircraft, anti-personnel tanks, and unmanned drones. The Bundeswehr’s role is primarily in a support and surveillance capacity.

In addition to the UN mission, Germany has about 350 soldiers based in the southern Mali as part of an EU training mission for the Malian army.

Separately, Chad, Mauritania, Mali, Niger and Burkina Faso – known as the G5 -are setting up a 5,000-strong combined force to combat smuggling and extremist groups in the Sahel region. 

The EU is the main funder of this French-backed African force.

The G5 force is expected to complement France’s Barkhane operation and the MINUSMA mission.

For earlier pieces on the Mali mission, see the following:

http://sldinfo.wpstage.net/the-german-military-in-mali-deployment-of-tigers/

http://sldinfo.wpstage.net/german-forces-participate-in-mali-operations-eu-looks-at-broader-support-for-african-operations/

http://sldinfo.wpstage.net/the-coming-of-the-a400m-the-mali-hypothesis/

http://sldinfo.wpstage.net/the-french-in-mali-shaping-the-logistics-element-of-the-operation/

http://sldinfo.wpstage.net/the-french-operation-in-mali-intervene-leverage-and-withdraw/

http://sldinfo.wpstage.net/the-french-in-mali-phase-two/

Redefining the Next Generation Fighter Aircraft: Build Out Air Combat Capability by Shaping a 21st Century Version of the Century Aircraft

12/08/2017

2017-12-01 By Robbin Laird and Ed Timperlake

As the USAF looks to its evolving air combat capability for 21st century operations, clearly continuing the path of innovation being shaped by the Pilot Operators of the capabilities of the fifth-generation aircraft is a crucial driver for change.

The introduction of sensor fusion aircraft with new secure communication systems and an ability to trigger a wide range of multi-domain combat assets is the foundation for understanding what comes next.

And what comes next is less a generational shift defined by the platform than by its inherent upgradeability to insert many user directed requirements furthering the ability to enhance the airpower revolution generated by the fifth generation aircraft and building out the C2 and multi-domain strike capabilities of the 21st century combat force.

It is less about a platform than what is inside those platforms but also what those platforms can provide as a driver of broader combat capabilities.

With the entering of the software defined aircraft, a platform can be its own follow on with regard to evolving capabilities within and its ability to reach out to other assets in the combat space.

This in a very similar way that the iPhone 8 is an enhanced iPhone 7.

Recently, we had a chance to talk with Secretary Michael Wynne about a way to do a 21st century version of the Century Series of tactical aircraft design and testing.

His vision would leverage the software upgrade revolution and built out from the significant strategic shift which fifth generation aircraft have introduced by using an F-22 as the initial test bed design.

This would allow hardware and software upgrades to drive the change that many Pilots are questing.

Combining the proven combat strengths of both the F-22 and F-35,  Secretary Wynne is proposing an accelerator, building from lessons learned with existing assets, but taking full advantage of subsystem research to shape a force multiplier further empowering the air superiority/combat revolution.

Rather than simply design a paper aircraft and then fill in the dots, Secretary Wynne has forcefully argued the case for taking the F-22 and recrafting the aircraft to shape a follow on combat capability.

The F-22 is maturing; being used a lot more than expected and will need modernization; but rather than simply modernizing from the baseline mold lines of the current aircraft, Wynne suggest combining modernization with a measured science and technology effort to rethink what is inside the aircraft subsystems and relevant design or engine features.


F-22 Raptors from the 94th Fighter Squadron, Joint Base Langley-Eustis, Va. and F-35 Lightening IIs from the 58th Fighter Squadron, Eglin Air Force Base, Fla. fly in formation over the Eglin Training Range after completing an integration training mission Nov. 5, 2014. F-35s and F-22 Raptors integrated throughout four missions to fight against T-38 Talons to improve employment of fifth generation aircraft. (U.S. Air Force photo/Master Sgt. Shane A. Cuomo)

According to Secretary Wynne, “I need to evolve a better airplane than the F-22 to have the same command and control characteristics as the F-35.

“I need the F-22 flight characteristics to be marginally better, in the speed of flight; range and, and perhaps even stealth capability.

“But I need it to be massively better in the command and control, and targeting aspects.

“To get there, one could take two aging F-22s, give one to the Phantom Works and give one to the Skunk Works and ask them a simple question: how would you make this airplane better than it is?

“They would be given a budget for a three year effort and an open field in front of them.

“The USAF could send in crew and support teams to the two centers to enable them to determine what the pilots really want. But it is up to the Phantom Works and Skunk Works at the end of three years to deliver their best effort modified F-22.”

At the end of the three year period, the USAF would have two variants of the evolved F-22 to choose from and can compare those two modified aircraft with the extant one to determine if the modifications really make the kind of combat difference the USAF would want.

“It is apparent we have settled on stealth; we have settled on speed under control; we have settled on needs for C2 built into the aircraft. We do not need to go back and redefine those using the requirements process. Rather lets use them as massive beta tests with current and past operators as the critics.

“We know and are learning the parameters for the evolving F-35 and F-22 air combat force.

“Make this airplane extend the capabilities of the total force.”

“What is a sixth gen aircraft? Right now, it is an evolved gen five airplane, with plenty of feedback—and competition for the future.

“And what is that?

“The F-22 was optimally designed for penetration and speed.

“By leveraging as well what we are seeing in the F-35 we can shape its battle manager capabilities and roles as well.

“This allows one to jump the lengthy requirements setting process and gets the development teams focused on the ‘beta’ feedback for how to build out a better aircraft within the parameters of what a fifth-generation evolution is generating for the combat force.

“If you don’t like the outcome of this particular three-year study, you can commence a ten-year development program for what you perceive as the next generation air combat asset.”

“I would be very surprised, however if Skunk Works and Phantom Works did not come back with a very capable aircraft, one which can work with the extant F-22 as a baseline and by leveraging new electronics, new propulsion and maybe even modified designs make the F-22 a better contributor to the combat space.”

“I am paying homage to the requirements process which gave us fifth generation airplanes; I am not just revisiting what they did. I am building out from that to accelerate fielded innovation.”

“It also is not a done deal because what comes out in three years may be not as good as the current commanders want. I would be very surprised if that happens, and thus would encourage taking the risk.”

By working from the concluded fifth generation requirements process forward, user feedback would be driving the redesign of the evolved F-22.

“We now have the actuality of a software upgradable system. We have an air combat system that actually addresses all levels of military from a multi-domain perspective.

“And I can fly my modified F-22 against a fifth gen fleet of F-22s and F-35s and to determine the quality of the contribution of the modified aircraft to the combat force. It is not about an abstract platform development process; it is about taking the fifth generation revolution forward to a new level of capability and performance.”

“The gen 5.0 airplanes surprisingly brought our Combat Forces something different that I didn’t realize it was bringing. I thought it was bringing me advanced stealth and combat power, but what it really brought me was air battle management and ground battle management.

“The next generation may well be upon us with the evolution of C2 and battle management as we get re-task the big airplanes that have done battle management and basically subsume it in a web of fifth generation airplanes in contested battlespace.”

Editor’s Note: As the US and allied forces shift focus from slo mo to high tempo and high intensity operations, the proposal of Wynne to leverage the F-22 combined with the coming of the new bomber, and the foundational build out of US and allied F-35s can provide a significant shift in the capabilities available to the liberal democracies.

The illiberal powers are working hard to reshape the world order to their advantage.

And reshaping capabilities for the US and the allies rapidly is an option if one follows the F-35 buildout, the leveraging of the F-22 and integrating the bomber into the air combat revolution.

Editor’s Note: For earlier Wynne pieces which provide further understanding of how air power is evolving see the following:

https://sldinfo.com/airpower-in-the-next-two-decades-of-the-21st-century-secretary-wynne-looks-ahead/

https://sldinfo.com/the-usaf-thinks-about-the-wolfpack-the-renorming-of-airpower/

https://sldinfo.com/a-global-enabler-american-air-power-in-the-next-part-of-the-21st-century/

The F-35B in the Perspective of Aviation History

Building Out Cyber Defense: Leveraging the Rebuild of Infrastructure

12/06/2017

2017-11-28 By Robbin Laird and Ed Timperlake

It is clear that information system security and appropriate defenses is a very significant issue.

However, shaping an effective way ahead, which both gets the job done and shapes rethinking which can lead to further progress is more difficult that simply buying a software patch.

It is putting all things “cyber” in proper context.

Cyber is simply a digital dimension of storing and moving information.

It was President Trump’s campaign pledge to focus on helping rebuild America’s infrastructure that presents a perfect opportunity to leverage the rebuilding of domestic infrastructure in the United States.

This effort needs as its predicate, cyber defense.

We need to create the defense of many information systems that must be “fail safe” to consistently and securely empower America’s critical national assets such as a power plants, oil refineries, nationwide power boosting distribution grids, and damns.

Recently, we spoke with Secretary Michael Wynne about how to shape such an approach.

Secretary Wynne in government and also at the very senior level of American Industry has been an important cyber security defense policy maker and visionary technology strategist.

He is now emphasizing the need for a significant rethink on how best to proceed.

Recently, Wynne spoke to the Association of Old Crows about cyber domain security, and that presentation is an appendix to our interview.

Secretary Wynne: “We have to review the area of cyber protection from a whole new light and build from an understanding that we have incorporated a fundamental flaw into our communications, into our computations, into our intel databases and into our daily lives.

“There is a mathematical flaw built into the system directly traceable to violating a key rule of systems engineering: You do not any longer know the connection between the outputs and inputs of your system.

“The solution I am focusing on would prioritize dealing with data at rest and would focus on the computational capabilities of gate arrays.

“We have put our efforts predominately in the evolution of the digital integrated circuit, and not into the analog integrated circuit.

“So we now have a problem.

“We have a direct mismatch between the quest for protection and the quest for convenience.

“Presently our way of war and our efforts at productivity are largely based in the convenience of distant data communications and control.

“Unfortunately the investment in learning and technical capability into the digital integrated circuit has zoomed ahead and offered operational capability, operational convenience, distant updates; things that present obstacles and challenges as to whether we want to design secure replacements or give them up.

“We are not easily walking this back.”

Our discussion focused on the importance of an information strategy which would differentiate between efforts to protect core data, the keys to the kingdom so to speak, which can be found in data or rest or in storage versus perishable moving data, which is much harder to protect.

In the beginning of the industrial age direct information feeds from machinery were analog devices steam and pressure gages.

Now those are for the most part digital read outs.

Consider, the difference between a precise 19th Century Swiss watch and today’s Iphone computer chip that also gives very accurate time.

The analog watch can run down but the I phone also has its inherent weakness as it can be attacked from afar by electronic means.

Each has strengths and weakness, but if accurate time is a life or death issue, then combining the strengths of both by wearing an analog Swiss watch and also carrying a digital phone one would have a very safe and secure idea of the accurate time.

It is the classic case of the best being the enemy of the good, if one reaches for a total cyber security solution, one ends up with more insecurity than security.

“By focusing on building out analog circuitry gate arrays, I can see clearly means and methods to shape a way ahead.

“This will slow down communications and operations at first, but as we develop, learn, and apply the kinds of inventions we have seen with digital integrated circuitry but now with analog integrated circuits, we will see communications and operations speeds restored.”

In effect, by differentiating between data in motion and data and rest, one can target the focus of innovation in the enhanced security effort.

“With regard to data in motion, the invention of block chaining is providing for encryption techniques and capabilities that are key elements for data protection.”

With an informational policy within government that makes protection decisions based on data in motion or data at rest, then a cyber defense strategy can be effectively built.

“I think you should prioritize what you want to protect at this point in time from what you might want to protect five years from now, ten years from now and let the system virally develop corrective actions on its own.

“I want to protect the dams. I want to protect the power plants. I want to protect the refineries. I want to protect the natural gas pumping stations. I want to protect nuclear power stations.

“At the same time, the Defense Department could prioritize infrastructure for the military services as well, such as Airfields, Port Facilities, and

“I would prioritize right now both civilian and military infrastructure.

And if the President’s emphasis on rebuilding infrastructure goes into motion, it would make sense to require testable infrastructure information security as a key requirement for any receipt of funding as well.

“In many cases, many of the systems we would want to protect are mechanically designed, we are currently and would be overlaying a digital system on top of them and have for convenience relieved the problem of going to each unit operating and verifying that the systems are OK.

“Unfortunately, this has introduced vulnerability on a previously secure system.

“So, we need to secure this approach, and retain the convenience.

“The SCADA or Systems Control and Data Acquisition system is a digital process that we have overlaid on many of our mechanical critical infrastructure facilities as well.

“What I am proposing is simply to convert this approach into an analog gateway approach to provide cyber security and an infrastructure defense.”

In effect, the approach being suggested is to shape a built-in security system; drawing upon a secure, complete circuitry that cannot be affected by a distant device over the internet.

By building in security, one of the cost returns is avoiding the need to pay the endless cycle of software upgrades and protections needed for a digitally based system.

Appendix

Cyber Domain Security: An Outside the Box Think for a Different Future

October 17, 2017

Presentation to the Association of the Old Crows

Good Morning. I very much appreciate the very kind welcome an introduction to this important conference on the topic of Cyber. Cyberspace first appeared in a short story, then a novel ‘Neuromancer’ by William Gibson in 1984, an auspicious year. From introduction to a full-fledged domain of operations is quite a stretch in the 40 some years since.

My own background in the field of Cyber comes from a long history of interaction, which you will hear about later. Suffice to say that as a product of what I refer to as the University of Hard Knocks in the world of Cyber, wherein lessons are learned through mistakes and harsh criticism; as I used the benefits of this domain to push research in the domains of Air and Space, with cyber as a mathematics tool.

I now realize that I was experiencing both the benefits of society’s embrace of the realm of cyber and the mistakes that were once permissible but that now have taken on operational names of Mal-ware and Ransomware, and have increasingly been used against societal progress.

It is great to share this talk today with giants of Electronic Warfare. Which one can see as either a pre-cursor for, or an enveloping science. It definitely shares spectrum with Cyberspace. Let’s start this journey together in search of a different future in this Cyber Domain.

(Slide 2) The Theme of this conference is a clarion call to look at the Cyber to fulfill its promise of providing a truly beneficial outcome. I don’t want to eliminate the benefits that all of us have extracted from the domain, but work toward minimizing or eliminating the vulnerabilities that have confronted developers and applications companies as this domain creates the ‘Flat Earth’ that Author Tom Friedman predicted several years ago. Unfortunately, the enemy gets a vote, and is using this as an asymmetric space to gain advantage. As this theme calls for, let’s confront both the penalties and benefits, and define a path forward towards balance.

The aspirational point here is technology led us to this point, and technology, and hard work, might lead us to that point of balance.

(Slide 3) Given the aspiration as expressed on the previous chart, let’s start our journey with an overview of what I would like you to take away from our look into a different future. It starts with the physical domains and our reach for balance of risk and reward in those. Sometime smooth and sometimes rough, but we have a governing structure that we can look to and debate. One solid aspect is that these are, in effect natural domains, whether Ground, Maritime, Air or Space, we can see and feel these; and so have pushed for a point of balance as best we can. We can develop images in our mind and have lots of literature to recon with.

But in the area of Cyber. I would see this as man created, nurtured from a better understanding of physical elements, yet now comprising the fastest growing trade segment, and developing into means and methods of Military Operations to shape behavior of Nation states. The dilemma springs from an acknowledgement of our coping with actions and activities detrimental to command and control, whether Military or Civilian; and in reaching out to find a culprit; we land squarely on Technology. So; as we reach for solution, does technology also offer a corrective action. A corrective action that may alter the future, by restoring a physical control, reducing asymmetric advantage. While maintaining as much advantage in our current design and convenience as possible.

Next, to a more difficult question, and that is, given that there exists a corrective course of action, can we, knowing the technology, architect the roadmap to a different future, and will civilian society follow our lead. So; let’s proceed

(Slide 4) These are a random set of items, that represent progress in certain areas of a progress report on human adaptability. We can look across even this small list and ask were these corrective actions; or progress. It sort of reminds me of a famous assertion by a senior leader of IBM, still a terrific company, as he surveyed the future landscape; and could not imaging a change to desk tops or laptops, asserting that the centralization of computing was the best thing to happen; but totally missing that actual outcome.

Many of the ‘Old’ labeled systems continue to not only have merit, but their capability has been increased by some of the items from the ‘New’ column. One thing that can be said however, is that as society saw a benefit for replacing or improving the old, the movement overcame obstacles; and soon the changeover was being actively assisted by creative people. I say this because, if we have a situation that society sees a value in providing a corrective action to our current dilemma in the world of Cyber, there will be very creative people assisting in progressing from a vulnerable Internet of things to a more secure internet of things, while retaining a very surprising amount of the current derived benefit of sharing; globalization, and technological progress.

This realization would start with you in this audience, but lead to an amazingly different and better future.

(Slide 5) Knowing that we have constructed a very vulnerable domain does not mean that there is a general consensus that it is irreparably flawed. Indeed, there are many ‘Cyber Security’ firms operating all over the world purporting to have solved the protection issue, but end up on the rapid discovery of errors, publishing list on list of malware products; and providing an analytic look at where and how the ‘Hack’ occurred. The better hackers have no desire for discovery; and are pleased to gather intelligence for some unknown later use.

This is the difficulty with securing the internet is the false promise of anonymity and safety, and the major concern with making the Internet less user friendly with firewalls, blockages, and even encryption. Therefore, from a systems approach, one needs to accept the current state of play at bottom; and then seek potential solutions to determine their acceptability.

So we ask the fundamental question as to whether the very basis of the digital networks, Turing Machines, need to be replaced. Alan Turing, recently portrayed in the movie ‘The Imitation Game’ was a force in Math and Science whose device brought huge change to society, and seemed totally beneficial. This prompted his peers to as well examine the governing mathematics that Turing used and expose the flaws, which we will see next. His vision allowed our society to make the progress of great designs in Space, and great achievements. Then came the Internet; and the further discovery that the identified flaws took on greater importance.

Given this outcome, we come to the second and important step of identifying the constraints, barriers and guideposts for which an addressed change can and should take place. It is not in societal interest to leave in place flawed mechanisms, but it is hard for society to accept the required change as they want badly to retain the benefits.

Therefore, the pressing and profitable applications tend to lead the way; whether in the age of industrialization wherein Gears were first employed as water fountain art, fiber optic cable made its debut as multi colored lamps in the 60’s; and the age of distributed computers really started in the game industry, which plays a role into today. From today’s society; it seems imperative to protect that which society values; and restrain the infrastructure attacks; or the Ransomware attacks; which could morph into holding Nations hostage in a vote.

So, let’s now take a look at what happened right after Turing introduced his Digital Computing Machine.

(Slide 6) The counter proofs began straight away. This chart comes from the fertile mind of Dr. Joseph Mitola, a colleague who may be known to you. The graphic shows how the liar’s paradox entangles a computer that is trying to assign a truth value in a Turing-capable (TC) machine, and all current ISAs, busses, and networks today are Turing Capable. Inherently Secure Computing and Communications (ISC2) does not use Turing Machines, but rather employs a metaphor for reasoning, avoiding the inherent inconsistencies of formal (axiomatic) logics. Today’s computers have no consistent self-referential self-awareness, hence can never know whether they are secure or not. Malware is as invisible to the proverbial Intel-Windows/Linux or Apple systems as if there were root-kits everywhere since no TC system can ever be made self-referentially complete and consistent at the same time, per Goedel, Kleene, and the many distinguished computing theorists who have studied and verified their theorems in the subsequent decades.

But, the naysayers of the moment were essentially pushed aside as the Digital revolution got underway. There seemed to be no real issues raised just because the Mathematics and Logic was flawed. The large analog devices that were actually portrayed in the recent film about Turing were slowly and then rapidly replaced as the designs of Integrated Circuits, coupled with Moore’s law gave wing to development of Main Frames, Laptops and now Smart phones. But Mathematics cannot forecast the future, and therefore refuses to recognize the negative aspect of a performing system.

Let’s take a look at some emerging signs that we all ignored along the way. My version of ‘Cyber Hard Knocks’

(Slide 7) As we know together, there have been signs along the way that were not taken seriously; as many major programs were released as beta versions, with users enlisted to correct flaws in all sorts of programs. So, my daughter at State College was writing a paper in the library in the early 80’s when an old-fashioned cartoon Bomb flashed on her screen, froze her machine and counted down to zero where upon her unsaved data was erased. Well, after that she wrote no more than three sentences without saving to protect her information from this prank. We see this now as Malware. Though I could tell you many stories, we have seen a steady escalation to where there is expressed grave concern about national or criminal attacks either for power or monetary value

(Slide 8) These signs have continued to escalate; as Governments around the world found themselves subject to scrutiny or worse. They set up learning centers, and involved universities, and around the world have grown an industry which now has good motivation to continue in their professed line of protective work; so, the business of Cyber Security; and the contests have created interesting phenomenon. I attended a ‘Black hat’ convention and attended a class demonstrating how to ‘Hack’ and basically take over the operation of a smart phone.

Now; our legislators spring into action, passing laws and guidelines that are impossible to comply with; which then causes the legal profession to create their own definition of how much protection is enough. Not enough to actually protect, but enough to demonstrate an attempt was made. Thus, are the first stirrings of a societal response. With the rise in Autonomy; and Artificial Intelligence, we are awaiting what comes next.

(Slide 9) While Civil and Military Society is evidencing great concern; there is actually constraint on corrective action. Too much security reduces productivity, and increases the complaint from the workforce or the warfighter. What works in practice sessions is presumed to work in warfare. The same thing goes for the consumer, whose response is yes, we want better security, but do not mess with my convenience.

Meanwhile, we are becoming more, not less dependent on the internet. I list here just two areas where the internet is making inroads; and ignore autonomous operations, drone warfare, UUV’s; and dispersed Command and Control vital to Validation and Verification that underscore the American way of war.

Frankly we need to accept that IT upgrades might have to focus on security; but have minimal impact on productivity. Yes, we want to have it all; but are now truly worried about the bad people gaining the upper hand. So—we see the continued growth in Mal-ware detection. Citizens and Military Commanders must retain the belief that Nations are working for their betterment, and effectiveness—how can we be convincing—in the face of determined, persistent bad actors. This will take a change of course to convince ourselves.

(Slide 10) There is a huge concern that societal disruption, and a peculiar view of mutual cyber impact that is currently evident. Military and Civil Society also is starting to believe that the actual costs that they are bearing for the viruses, mal-ware; and malicious activity are not being summed; and the cost being borne by all of us; starting with the nearly twenty billion (US) spent on the Mal-Ware industry; and in our intensive Cyber Training.

Only in some tight knit circles is true talk of the cost being mentioned, as well as the likely impossibility of a cure.

(Slide 11) We’ve spent time on the current indicators, but should as well begin to see the edges of a future clouded by nervousness over how exactly to protect Intellectual Property; or emerging designs, much less the advanced Movie Film releases. I fear that with all of our society aimed to produce futuristic breakthroughs and educating our young in Science Technology, Engineering or Mathematics.

Do we signal that for all of their learning, the unprotected ideas will be lost? I also see concerns over privacy encouraging more and more degrees of security; which by their nature will impact society’s output. What of our Military Plans: Safe C3 Transmissions, targeting aided by data fusion.

(Slide 12) There are warnings issued all the time warning of vulnerability, but each time the using community rationalizes that convenience is better than complex security. With that understood, as the menace grows ever stronger, there should be a constructed Technically based response that blunts the bulk of Cyber Threats; but as well tries to preserve the convenience that society is benefiting from.

Note that we see the Military forces trying to decide how to make cyber work for them in the most meaningful way. In this instance, a societal decision to minimize Cyber Vulnerabilities, if implemented, would also reduce the importance of Cyber to Offensive Operations. Right now; the effect of cyber operations is quite asymmetric; where a small group can hold a large operation hostage, or deny it access to interchange. Minimizing the vulnerability would as well minimize the asymmetric quality of the Cyber Domain.

(Slide13) In arriving at this point I have postulated outcomes that have become in evidence. I wanted to pause and simply review where we are; and then move on to how society might respond. We can see the ideal future state, and then circle back to what we want in the world future in cyber.

(Slide 14) There is widespread awareness that there have been programs that try to bring order to a chaos brought on by bad or excessive behavior patterns. To drive a corollary, in the current design of the internet structure, we have a computerized behavioral flaw. To change, we must recognize that the previous statement is true.

We have delivered to society and our Military a wonderful tool that is flawed by its design; and has left our world more vulnerable to bad actors than we intended. This has been proven previously; but I wanted to emphasize that this was a violation of the core of Systems Engineering; and as a result of timing, this flaw has persisted.

As the internet blossomed, we essentially gave to unknown parties the ability to invade and change the basic intent of our designs. This is called Hacking. For those involved in Information Technology Design; the concept of beta testing using distributed users, essentially exploits errors. If, not all beta testers are forthright; they can retain access to flaws by their silence. This outcome, in the pure world of Systems Design and Test is fatally flawed; and requires a restart. In golf terms, this is a mulligan of epic proportions. What should we do with this described false start?

(Slide 15) Let’s look at where we are relative to this false start. In my experience when designing a flight control system, I inadvertently created a bad instruction. This instruction effectively pointed to a random number generator instead of my carefully crafted control table. This inadvertent flaw resulted in six hours of test data being generated to ensure I realized my flaw.

With one counter instruction, I fully repaired the flight system. But there is a lesson there. This was the edge between analog and digital; wherein my analog testers wanted to know every input versus every output.

But I as a digital designer was only interested in the path that worked. Now; I am a repentant digital designer, recognizing that violating this Systems engineering principal led to the present state. Society is in a search for a simple secure corrective action. This can’t be just talk and no action.

(Slide 16) Returning to the basics of systems engineering design provides a functioning base from which we can seek a solution set. The one we will pursue is ‘For a System, every output response should be linked to an input’. Followed by ’For a system there should be a tested and proven finiteness to the possibilities of output signals given a known finite set of possible inputs’

This describes a tighter design construct than we have been used to as developers; but it will yield the type of system our fellow society members expect of us; an Military reliance expects from designers. When we turn the steering wheel; there is an expected response; a scary prospect is with autonomous vehicles, ‘can we be sure?’

(Slide 17) In the nature of not wanting to seem like the best designer ever, I wanted to show some flaws. We have a saying that the best instruction comes from UHK, the University of Hard Knocks; when your design flaws are exposed to ridicule or correction by your peers or by customers, and through that failure; great learning is borne. I show here some of my beautiful errors.

But what they have finally taught me is that to correct the fatally flawed internet; we need a return to a solid base of systems engineering, and will require great discipline to effect any widespread correction.

(Slide 18) To effect this corrective action; all together we need to be resolute. Therefore, we need to start this process with a resolution and here it is. ‘Applying the concepts of Systems Engineering Holds out a path for a different future’. As the technical part of society; it is our task ahead to follow these steps, being ever mindful that we collectively have trained our members of Society in the convenience and productivity that is the benefit of even this flawed internet.

Thus, any correction we bring needs to retain these items; as we can’t envision retraining our society. I see this as removing and replacing foundations from buildings while retaining all else about the structure. This is no small task—and therefore I am grateful to have so many smart folks here today to get this started.

(Slide 19) This chart is clearly aspirational; but it does inform what a well-constructed future can look like; and what it will leave behind as a usable replacement for our current state. This requires researching what might be involved; and does something new to physics; or science need to be invented. Let’s take a look at that aspect.

(Slide 20) In fact our research has resulted in a substitute for the “Turing Computers underlying the Integrated Circuit’ Having watched the Imitation Game, a movie about the exploits of Dr. Turing during the world war period. I noted that his device was very complex as portrayed; and dominated by analog components.

Once Dr. Turing constructed the Turing Computing device, it has been the complete underpinning of computational techniques since. Simple, elegant and due to Moore’s law ever smaller yet more powerful.

We as a group have not tracked the growth in capability of Fully Programmable Gate Arrays (FPGA) which at their heart is a complex circuit design to execute logic of all sorts. Not easy to work with; and thus, not accorded the explosive growth; but development has continued; and the provided capabilities can now be harvested and put in place as direct substitutes for a wide variety, if not all applications of the current Turing Counterparts.

It is now time to follow the path of ever more powerful, smaller, with far less power draw—the path of the Fully Programmable Gate Arrays.

(Slide 21) Pausing a minute in our journey to assess where we are, and where to go. Where to go from here. Well; as indicated, we have found a better substitute, and now must organize to allow application of the Field Programmable Gate Array to underpin our quest for Harmonization. Organize where to start, and what is the least line of advance to limit societal resistance; while maximizing the revised benefits of security, coupled with convenience.

While as a technology sector; we have often talked of designing security into our systems; but have then shied away from really doing it as it impacted convenience. Now, there is a different approach. Our quest for corrective action Can Start with a call to action.

(Slide 22) Here is where we are today; and then tomorrow. This does not eliminate good user and developer discipline and self-security. In fact, both rise to levels of prominence that they have had over the decades.

But my point of emphasis is the requirement for total dedication in the Military and Civilian sector for change to restore the element of Systems Engineering, and bring back reliant systems as the order of merit.

(Slide 23) In this call to action, the direction is clear; but the prioritization will require organization and persistent determination. If we start with what might impact society the greatest, it is in the critical Military and Civilian infrastructure that all of us have struggled to provide at large; then we might support the phasing out of cyber based attacks by bad actors. Won’t happen overnight; but over a longer period; will narrow choices and as we call them attack vectors.

My first thought is the last line here. Society is now at risk, therefore next move is to protect, while continuing our own Cyber Attack capabilities, until obsolete. As stated earlier, from Hill Street Blues, ‘Let’s Do It to Them Before They Do It To Us’

(Slide 24) Thank you For allowing me to Talk of this Very Different Look at Cyber

With strong leadership; We can make this different Secure future a reality

The Osprey at 10: 400,000 Flight Hours and Onward

12/05/2017

2017-11-27 If the USMC leadership and the Osprey nation of marine corps operators had not had the courage to introduce the Osprey to combat in 2007, we could still be debating the Osprey as some sort of prototype.

But by deploying the asset, building out its capabilities and learning how to use it in combat, the Marines began the process of a significant transformation of its mindset and approach to combat operations.

Operating at the speed and distance at which the Osprey could facilitate changed many aspects of how the USN-Marine Corps team had to think about the ARG-MEU and has led to entirely new ways to use the sea base.

Now with the introduction of the 21st century flying combat system, namely the F-35B and the addition of the CH-53K, the force is seeing the next phase of its transformation.

Bell Helicopter, has announced that the Bell Boeing V-22 fleet of tiltrotor aircraft, including both CV-22 and MV-22 variants, has surpassed the 400,000-flight hour milestone.

The V-22 Osprey has been continuously deployed since entering service in 2007 with the United States Marine Corps (USMC) and the Air Force Special Operations Command (AFSOC) in 2009.

The aircraft has seen extensive action in Afghanistan as part of Operation Enduring Freedom, in Iraq as part of Operation Iraqi Freedom, and as part of a U.S. Central Command (USCENTCOM) Special Purpose Marine Air Ground Task Force (SPMAGTF) supporting a long-range rapid reaction/crisis response force.

The MV-22B Osprey are operating all around the globe today, transforming the way the Marine Corps conducts assault support, humanitarian relief operations and the broad spectrum of MAGTF missions.“As the number of flight hours indicate, the V-22 Osprey is a mature platform that projects a versatile mission capability for military operations as well as humanitarian relief efforts” said U.S. Marine Corps Col. Matthew Kelly, V-22 Joint Program Manager.

The Bell Boeing V-22 is continuing to achieve outstanding mission success, performing missions only capable with tiltrotor technology. Since entering service, the V-22 has been deployed in numerous missions around the world, including casualty evacuation, tactical recovery of aircraft and personnel, humanitarian assistance/disaster relief, resupply, VIP transport and theater security cooperation.

“This 400,000-flight hour milestone is an incredible testament to the V-22’s leap-ahead capability and is a tribute to the men and women of Bell Helicopter and Boeing who build and support tiltrotor aircraft,” said Vince Tobin, executive vice president of Military Programs at Bell Helicopter.

“The Osprey brings unprecedented range, speed and survivability to the warfighter and will continue to excel in combat and in executing some of the most difficult humanitarian operations.”

“The versatile V-22 Osprey is in demand and indispensable among commanders worldwide,” said Kristin Houston, vice president, Boeing Tiltrotor Programs and deputy director, Bell Boeing V-22 Program.

“In order to improve readiness for our servicemen and women, we are significantly investing for the long-term through modifications and upgrades to our V-22 factory in Philadelphia. Together with Bell Helicopter, we are proud of achieving this flight hour milestone.

Our strategic alliance enables the continued success of this program.”

V-22 Osprey fleet tops 400,000 flight hours

The Osprey entered combat as Second Line of Defense was launched and we have covered the Osprey globally since that time.

And at the 8 year mark, we published our look back at the Osprey and its first 8 years.

2015-05-17 By Robbin Laird

This September, the Osprey will reach an 8-year mark in its operational deployment history.

In September 2007, the Osprey was deployed for the first time to Iraq.

The USMC Commandant Conway and Deputy Commandant of Aviation Castellaw announced and made the decision to deploy the Osprey into combat although virtually all public commentators thought this was too early for an “untested” airplane, as one critic put it.

The plane has not only done well, but in 8 short years has demonstrated its capability to have not only a significant impact on combat but to re-shape thinking about concepts of operations.

Earlier, I provided an update at the five-year mark.

Now let us take the story forward as the first global sales of the Osprey have occurred, and the prospects for a new global phase of the Osprey evolution comes into view.

The First Five Years

During the first five years, the Osprey was introduced first into Iraq and then began operating in Afghanistan.

Early deployments were challenging in terms of support and taking the steps to begin to learn the transition from a helo enabled assault force to a tiltrotar assault force.

And at sea, this learning would take the USN-USMC team to rethink the deployment of the classic three-ship formation of the ARG-MEU and to move the ships further away from one another, and to expand the operational engagement area of the ARG-MEU.

It was used for assault operations from the beginning but over time, the role would expand as the support structure matured, readiness rates grew and airplane availability become increasingly robust.

The Osprey’s speed and range meant that the very large number of forward operating bases which rotorcraft require were not needed, and this became crucial as the drawdown in Afghanistan occurred.

And this would lead to the Osprey being tasked with the Army’s medevac mission as the golden hour could NOT be met by the Army with the draw down of bases.

The Marines were tasked to provide for this capability because of its ability to cover Afghanistan without numerous FOBs.

When Odyssey Dawn entered the picture in early 2011, the Osprey altered the performance of the ARG-MEU and provided a core capability ensuring that a downed pilot did not become a political pawn by Qaddafi.

The ability to link seamlessly support services ashore with the deployed fleet via the Osprey allowed the Harriers aboard the USS Kearsarge to increase their sortie rates dramatically.

By providing a whole new speed and range enablement of the strike fleet aboard a large deck amphibious ship, the future was being re-defined by the Osprey.

The USN began to see a whole new way to look at COD or carrier on-board delivery!

MV-22 Osprey Landing Aboard the USNS Robert E. Peary during the Bold Alligator exercise. Shaping an ability to move systems around on platforms, and islands or on Allied bases will be a key to shaping a new Pacific strategy.Credit: USN
MV-22 Osprey Landing Aboard the USNS Robert E. Peary during the Bold Alligator exercise. Shaping an ability to move systems around on platforms, and islands or on Allied bases will be a key to shaping a new Pacific strategy.Credit: USN

As Lt. Col. Boniface, commanding officer of VMM 266, but the Osprey leader in Operation Odyssey Dawn, argued:

A complete transformation to how we are doing business has been involved by operating the Osprey.  In order for the USS Kearsarge, the ARG and the 26th MEU to stay in their operational box during Operation ODESSEY DAWN, and enable the Harriers to continue their strike mission, we were reliant on other assets to supply us.  For many supply items, the Osprey provided the logistical link to allow the ARG to stay on station and not have to move towards at sea re-supply points and meet re-supply ships.

Without the Osprey you would have to pull the USS Kearsarge out of its operational box and send it somewhere where it can get close enough to land or get close enough to resupply ships to actually do the replenishment at sea.  Or you would be forced to remain where you are at and increase the time you’re going to wait for this part by three, four days or even a week.

The ARG ships are only moving at 14-15 knots. At best, let’s just say they move an average of 13 knots per hour, and add that up for the 300 miles that you have to sail.  Now you’re looking at least a day to get the needed folks, parts or equipment and then the transit time back to the operational box. The V22 will do that in a couple hours and allow the ARG/MEU to keep executing its mission.

And the five-year transition was marked by a further demonstration of transformatory impact in the “return to the sea” associated with the initiation of the Bold Alligator exercises begun in 2011.

At the time of the launching of this series of exercises the goal was defined as follows:

Bold Alligator is designed to revitalize the fundamental roles of the Navy and Marine Corps team as “fighters from the sea” and will focus on conducting major amphibious operations simultaneously with a non-combatant evacuation exercise.

“The nature of amphibious forces is that we’re extremely flexible and can be specifically tailored to any mission at any time,” said Rear Adm. Kevin Scott, commander of ESG 2. “Bold Alligator 2011 represents the ongoing efforts in meeting the challenges of future warfare conflicts, overseas contingency operations and homeland defense, so we remain the world’s premier amphibious force.”

But the Osprey was redefining amphibious assault.

It was no longer about being close to shore and launching amphibious vehicles; it was defining your assault vector and moving into the objective area from a much greater distance with Ospreys as a tip of the spear insertion force.

The existence, deployment and appearance of the Osprey changed the entire approach to thinking about amphibious assault. During Bold Alligator 2012, while observers stood on the beach waiting for the assault, Ospreys were already part of taking an “enemy” fort deep in the terrain.  And not only that but one of the Ospreys deployed from a supply ship!

The next three years from 2012 until now have seen the maturing of the Marine Corps in its use of Ospreys to the point whereby the Marines, as the only tiltrotar-enabled assault force in the world, are redefining force insertion.

A number of key developments have unfolded since 2012.

The Next 3 Years: The Battle Tested Osprey

First, the battle testing has continued for the Osprey and its ability to survive in tough conditions clearly proven.

The redundancy of systems aboard the aircraft, and the performance of the composite systems to take battle damage have been clearly combat proven.

This has been recognized with the awarding of the first Distinguished Flying Crosses to Osprey pilots.

The story of what two Marine aviators did to be the first V-22 Osprey pilots awarded Distinguished Flying Crosses is simple, elegant, and and tactically telling. The double-DFC incident underscores how the Marines are using the unique tilt-rotor aircraft — which can take off and land like a helicopter, then fly long distances at high speeds like an airplane — and its ability to perform in extreme battlefield conditions.

I interviewed the two pilots, Major Michael Hutchings and Captain David Haake, at New River Air Station.

Here’s what happened in Afghanistan in June 2012. Two Ospreys, operating with conventional helicopters — Hueys and Cobras — were supporting the insertion of a Marine reconnaissance battalion. The Ospreys, piloted by Maj. Hutchings and Capt. Haake, were flying in a two-ship formation and planning to put down Marines in two waves.

Major Hutchings after the SLD interview. Credit Photo: SLD
Major Hutchings after the SLD interview. Credit Photo: SLD

The first wave went well, and the Ospreys returned to insert the second group of Marines, to provide the enough armed manpower to perform the mission in Taliban infested territory.

As Hutching’s V-22 came down it took heavy fire, which so damaged the plane that the systems on board told the pilot to not fly the aircraft. Of course, not flying was to face certain death, so the task for the pilot and the crew was to find a way out. The plane was badly damaged, but because of the various redundant systems on board and the skill of the pilot and the crew, they were able to depart and to make it back to Camp Bastion in airplane mode. With a traditional rotorcraft, of course, you do not have the relative luxury of switching between two modes of travel.

As Haake followed Hutching in, the Hueys and Cobras informed him that Taliban were occupying the area around the intended landing zone. Haake took his plane up and took stock of his options. While he did, he learned that Hutchings had landed and was under attack, which meant that Haake had little choice but to insert Marines to reinforce the reconnaissance battalion. He did, also under heavy fire. His plane was badly damaged as well and also had on board a wounded Afghan soldier working with the Marines.

In addition to battle damage to the aircraft, the plane was leaking fuel very badly. This meant that the pilot and crew knew they could not make it back to Camp Bastion, but would have to land at a Forward Operating Base, which also had medical support, about 20 miles away. Again, flying on helicopter mode, the plane and crew made it to the base.

But for Maj. Hutchings, the day was not yet over. This was a night insertion so the Marines needed to be extricated the next day. Hutchings flew an Osprey the next morning as part of the effort to pick up the Marines and get them out. Hutchings landed the plane and took onboard the Marines, who were firing at the enemy as they boarded the plane. The Osprey took off to altitude with speed. “I asked the crew chief after about 10 minutes how the Marines in the back were doing. He said they were asleep,” Hutchings added.

Although their tale is the most dramatic testimony to the maturing of the Osprey, it was not the only one I heard. Frank “Blaine” Rhobotham, the Remain Behind Element Officer in Charge of VMM-365, provided another example of the impact of the Osprey and its maturity. He was the head maintainer involved in preparing the Special Purpose MAGTF, which now operates out of Southern Europe and is available to support missions in Africa and the Mediterranean.

Rhobotham discussed the very short period from the generation of the concept of the Special Purpose MAGTF to its execution. It took about eight months from inception to deployment. He emphasized the flexibility of the force and its light footprint. “With a six-ship Osprey force supported by three C-130s we can move it as needed. The three C-130s are carrying all the support equipment to operate the force as well.”

The flexibility which the Osprey now offers Combatant Commanders and US defense officials is a major strategic and tactical tool for the kind of global reality the US now faces, requiring rapid support and insertion of force.

The Next Three Years: SP-MAGTF

Second, there has been the formation, deployment and now high demand use of what the Marines have called Special Purpose Crisis Response MAGTFs.

The first SP-MAGTF was formed in 2013 and leveraging the Osprey-KC130J combination provide a force for supporting humanitarian or crisis interventions.

The Operational Reach of the SP-MAGTF SR in miles. Credit Graphic: SLD
The Operational Reach of the SP-MAGTF SR in miles. Credit Graphic: SLD

In an interview done at the time with Brigadier General James S. O’Meara then commander, U.S. Marine Forces Europe, and deputy commander, U.S. Marine Forces Africa, the role of the new force structure was explained.

The SP-MAGTF is the basic Marine Corps air ground team or MAGTF approach but applied to a Special Purpose Mission.

Special means it’s uniquely tailored to a particular mission or a few mission sets. 

In this case, the focus is upon security embassy reinforcements or a noncombatant evacuation.

Also, it is a rotational force, which provides a crisis response force able, to deal with EUCOM and AFRICOM needs. 

General Dempsey provided strategic guidance, which was looking for a force, which operates with a small footprint, and is low-cost, and rotational.  This is the answer to that guidance.

The SP-MAGTF meets the need to respond rapidly to a developing situation either proactively or reactively with a small force with a small footprint and has its own organic air, which means that it has operational reach as well.

The force is trained and operational and currently operating from a USAF base at Moran in Spain.

SLD: The SP-MAGTF can reach into Africa or operate throughout the Mediterranean.  Obviously, the Osprey is the enabler of such a force along with your organic lift and tanking.

Marines boarding Ospreys for the SP-MAGTF training mission in December 2013. Credit: Murielle Delaporte
Marines boarding Ospreys for the SP-MAGTF training mission in December 2013. Credit: Murielle Delaporte

If you had only helos, this kind of force capability would not be possible, I would assume?B.G. O’Meara: That clearly is correct.  We can operate over a significant combat radius and of course, refueled with our C-130Js can reach throughout the region and all while carrying equipment, and/or two-dozen Marines inside.

It gives AFRICOM commander a unique tailored operational tactical level force with significant operational reach.

The V-22 allows for a paradigm shift and enables a force like SP-MAGTF.  The V-22 gives you that C-130-like distance and speed with the versatility to land in confined, limited area, with no runway or an expeditionary LZ like a helicopter.  

And when you add organic lift and tanking with our C-130Js, the reach is even greater and allows us to operate throughout Africa and the Mediterranean as needed.

And the self-deploying capabilities of the V-22 means that we can plus up the Osprey component as well as needed or other sites throughout the operating area. 

And being Marines, it did not take long to go from formation of the capability to its use.

And when the co-founder of Second Line of Defense, Murielle Delaporte, visited the unit in Moran, Spain in late 2013, it was shortly before they deployed to South Sudan to deal with a crisis.

Her visit underscored the maxim that you train, deploy and train again to get the mission right.

The unit arrived in April 2013 and has engaged in extensive training and patterning with European and African units in preparing for missions in the AFRICOM and EURCOM areas of responsibility.

The Next Three Years: Reworking the GCE and the Osprey Tandem

Third, the impact of the Osprey on the Ground Combat Element is significant.

By operating off of the Osprey, the ability of the infantry to operate at distance, and range and to insert within a variety of access points is dramatically increased.

But to do so requires changes in Command and Control, and operational concepts.

And since 2012, these changes have been actively pursued through a variety of exercises and training efforts.

U.S. Marines with Marine Medium Tiltrotor Squadron (VMM) 161 transport Marines on MV-22B Ospreys during Exercise Iron Fist 2014 to San Clemente Island, Calif., Feb. 14, 2014. Iron Fist is an amphibious exercise that brings together Marines and Sailors from the 15th Marine Expeditionary Unit, other I Marine Expeditionary Force units, and soldiers from the Japan Ground Self-Defense Force, to promote military interoperability and hone individual and small-unit skills through challenging, complex and realistic training. ( Read more: http://www.dvidshub.net/image/1169668/2-11-marines-jgsdf-fire-mortars-san-clemente-island. Credit: 15th MEU
U.S. Marines with Marine Medium Tiltrotor Squadron (VMM) 161 transport Marines on MV-22B Ospreys during Exercise Iron Fist 2014 to San Clemente Island, Calif., Feb. 14, 2014. Credit: 15th MEU

In a piece which Ed Timperlake and I wrote in May 2014, these innovations were highlighted.

The Marines have been experimenting over the past 15 months with  new ways to connect the GCE within an insertion mission, and they are optimistic that their exercises can lead relatively soon to a deployed capability with Marine Expeditionary Units and Special Purpose MAGTFs focused on crisis response missions. 

These units, then, can subsequently use the initial capability and drive further innovation.

The approach has been to deploy the Ground Combat Element (GCE) over a tilt-rotor-enabled distance and to insert the force with situational awareness, which can enhance mission success.  By shaping new communications capability throughout the flight, the GCE getting off the Osprey is much better positioned for mission success.

With a shift from flying to engaging in a forward leaning operation, a number of key mobility requirements have been highlighted as well:

How to continue to provide SA to the insertion force throughout their mission on the ground?

How to simplify the communications packages and to make them easier to use?

How to shift from more static UAV concepts such as Shadow to a small “Kamikaze” UAV which can be pushed out of the Osprey and work with the mission?

How to leverage the F-35s Distributed Aperture System (DAS) capability and to push that information down to the lowest tactical level?

In other words, by working with a tilt-rotor-enabled force, the Marines are forward leaning their experimentation to procure technology that will enable new capabilities, and not simply fill legacy gaps. 

The Next Three Years: The Arrival of the USS America

Fourth, a new ship is getting ready for deployment, the USS America which is built for the Osprey and the F-35B and will be part of the next phase of the evolution of the tiltrotar-enabled assault force.

The USS America is the largest amphibious ship ever built by the United States.

The ship has been built at the Huntington Ingalls shipyard in Pascagoula, Mississippi and departed mid-July 2014 for its trip to its initial home part at San Diego, California and then was commissioned in San Francisco in mid-October 2014. It is now undergoing its final trials and preparing to enter the fleet.

The USS America has been built to facilitate this capability and will be augmented as the F-35B is added to the Ospreys, and helicopters already operating from the ship and as unmanned vehicles become a regular operational element as well.

The Osprey has obviously been a game changer, where today, the basic three ship formation used by the Amphibious Ready Group-Marine Expeditionary Unit can “disaggregate” and operate over a three-ship distributed 1,000-mile operational area. Having the communications and ISR to operate over a greater area, and to have sustainment for a disaggregated fleet is a major challenge facing the future of the USN-USMC team.

A major change in the ship can be seen below the flight deck, and these changes are what allow the assault force enabled by new USMC aviation capabilities to operate at greater range and ops tempo. The ship has three synergistic decks, which work together to support flight deck operations. Unlike a traditional large deck amphibious ship where maintenance has to be done topside, maintenance is done in a hangar deck below the flight deck. And below that deck is the intermediate area, where large workspaces exist to support operations with weapons, logistics and sustainment activities.

With the coming of the F-35B to the USS America, the tiltrotar-enabled force adds significant capability. This can work a couple of different ways.

The ship can hold more than 20 F-35Bs, but more likely when F-35Bs are being featured would have a 16 F-35B flying with 4 Osprey combinations. The Ospreys would be used to carry fuel and or weapons, so that the F-35B can move to the mission and operate in a distributed base. This is what the Marines refer to as shaping distributed STOVL ops for the F-35B within which a sea base is a key lily pad from which the plane could operate or could move from.

Alternatively, the F-35B could operate as the ISR, C2 and strike asset to work with the rest of the assault force. The beauty of the F-35B for the Marines is that it allows them to operate off of an amphibious ship with a plane which can do C2 or provide forward leaning ISR.

In other words, the F-35 working with an Osprey-enabled insertion force operating off of the USS American could well re-define the meaning of Close Air Support (CAS). 

The F-35 could enter the objective area prior to the arrival of the combat landing team or CLT, push data back to the incoming force, and then provide fire support, “kinetic” and “non-kinetic,” C2 and ISR support during the insertion and operation.

The other new aviation, which will fly off of the USS America, is the CH-53K, which is the replacement for the CH-53E. Although less sexy than an Osprey or a JSF, the K is a backbone element for an airborne amphibious strike force. The CH-53K will be able to carry three times the load external to itself than can a CH-53E and has many operational improvements, such as a fly by wire system.

In short, when one looks at the outside of the USS America and sees a flight deck roughly the size of its predecessors, one would totally miss the point of how this ship fits into USN-USMC innovation.

Looking under the decks, understanding how a radical change in the workflow, enabling and operating with 21st century USMC strike and insertion assets, is how to understand the ship and its impact.

It is an enabler of 21st century amphibious assault operations and not simply an upgrade on the past.

https://sldinfo.com/the-uss-america-cvn-78-and-hms-queen-elizabeth-crafting-capabilities-for-21st-century-operations/

Shaping a Way Ahead

And the result of eight years of operation and innovation is nothing less than creating a high demand force, the Osprey-enabled assault force, which is redefining ways to think about the insertion and withdrawal of force and new ways to engage, prevail and disengage.

V-22 Osprey
V-22 Osprey in exercise at 29 Palms. Credit: USMC

This is part of the next phase of the evolution of the Osprey when married with the F-35B, namely to do some serious strategic rethinking on how to use newly crafted insertion forces.

Another part is the maturing of the production process, and the impact of the USAF and USMC in using the aircraft on perceptions of allies.

There are a number of allies interested in buying the plane.

But to get to this new phase, challenges need to be met and resolved to clear the path to the next phase, a global one for the Osprey.

The first slideshow highlights U.S. Marine Corps MV-22B Ospreys begin flight operations on the USS Bonhomme Richard (LHD 6), off of the coast of South Korea, April 2, 2015.

The aircraft are with Marine Medium Tiltrotor Squadron 262 (Reinforced), 31st Marine Expeditionary Unit.

Credit:31st Marine Expeditionary Unit:4/2/15

The second slideshow highlights the USS America transiting through the US Southern Command and US 4th Fleet area of responsibility on her maiden transit. 

In the first photo, an MV-22 Osprey prepares to land aboard the future amphibious assault ship USS America (LHA 6).

In the second photo, the amphibious assault ship USS America (LHA 6) pulls into Naval Station Guantanamo Bay, Cuba, for a scheduled port visit July 21, 2014. The ship is embarked on a mission to conduct training engagements with partner nations throughout the Americas before reporting to its new home port of San Diego. The America is to be ceremoniously commissioned Oct. 11, 2014.

In the third photo, Marines assigned to Special Purpose Marine Air-Ground Task Force South load onto a tilt-rotor MV-22 Osprey on the flight deck of future amphibious assault ship USS America (LHA 6) to participate in bilateral training exercises with Colombia’s military.America is the first ship of its class, replacing the Tarawa-class of amphibious assault ships. As the next generation “big-deck” amphibious assault ship, America is optimized for aviation, capable of supporting current and future aircraft such as the Osprey and F-35B Joint Strike Fighter

In the fourth photo, an MH-60S Seahawk takes off from the flight deck of future amphibious assault ship USS America (LHA 6) to participate in bilateral training exercises with Colombia’s military.

In the fifth photo, from right, U.S. Marine Corps Gen. John F. Kelly, the commander of U.S. Southern Command, escorts Colombian Minister of Defense Juan Carlos Pinzon Bueno and U.S. Ambassador to Colombia Kevin Whitaker aboard the newly commissioned amphibious assault ship USS America (LHA 6) July 17, 2014, in Cartagena, Colombia.

In the sixth photo, Aviation Ordnanceman Airman Charles Hill, assigned to the future amphibious assault ship USS America (LHA 6), fires a .50-caliber machine gun during a sustainment shoot. The crew conducts routine, live-fire courses to maintain qualifications and improve proficiency. America is currently traveling through the U.S. Southern Command and U.S. 4th Fleet area of responsibility on her maiden transit, “America visits the Americas.”

In the final photo, Aviation Electronics Technician 3rd Class Trevor Vindelov, assigned to the “Blackjacks” of Helicopter Sea Combat Squadron (HSC) 21, performs a corrosion inspection on a MH-60S Seahawk helicopter in the hangar bay of future amphibious assault ship USS America (LHA 6).

Credit:USS America: July 31, 2014

Editor’s Note: One contribution of the Osprey experience has been to the evolving composite manufacturing industry in support of both the commercial and military worlds.

According to the article published on November 27, 2017 in Composites Manufacturing:

More than 43 percent of the V-22 airframe structure is fabricated from composite materials.

The wing is made primarily with IM-6 carbon-epoxy solid laminates that are applied unidirectionally to give optimum stiffness.

The fuselage, empennage, and tail assemblies have additional AS4 carbon fiber materials incorporated during their fabrication.

Many airframe components such as stiffeners, stringers and caps, are co-cured with the skin panels.

This technique provides subassemblies with fewer fasteners, thus fewer fatigue effects.

The composite airframe delivers the necessary stiffness and light weight for V/STOL. It also provides additional resistance to environmental corrosion caused by salt water.

The composite airframe is fatigue resistant and damage-tolerant – a feature particularly desirable for ballistic survivability.

The composite structure provides a solid strength to weight ratio, corrosion resistance, and damage tolerance compared to typical metal construction.

Battle damage tolerance is built into the aircraft by means of composite construction and redundant and separated flight control, electrical, and hydraulic systems.

 

The Prowler’s Last Engagement at a Weapons Tactics and Training Course

2017-11-28 A U.S. Marine Corps EA-6B Prowler assigned to Marine Aviation Weapons and Tactics Squadron One (MAWTS-1) conducts an aerial refuel in support of Weapons and Tactics Instructor Course (WTI) near Welton, Ariz., Oct. 5, 2017.

After a long career in the USMC, the Prowler is being retired as the Marines shape a distributed EW force.

The Prowler in its Last WTI Course from SldInfo.com on Vimeo.

As Steven Valinski noted in his excellent article on WTI 1-18:

“For over 40 years the Prowler has served the DoD as an Electronic Warfare aircraft.

“The Prowler’s role has been to jam enemy radar and communications and perform electronic surveillance in support of air and ground forces.

“While the final sundown of the Prowler in the last operational unit (VMAQ-2) is not until the end of FY-19, MAWTS 1 is training for the future of the MAGTF with MAGTF EW.”

WTI is a seven-week training event hosted by MAWTS-1 cadre, which emphasizes operational integration of the six functions of Marine Aviation in support of a Marine Air Ground Task Force.

MAWTS-1 provides standardized advanced tactical training and certification of unit instructor qualifications to support Marine Aviation Training and Readiness and assists in developing and employing aviation weapons and tactics.

10.05.2017

Video by Cpl. AaronJames Vinculado 

Marine Aviation Weapons Tactics Squadron

The slideshow above shows the F-35B engaged in the WTI 1-18 course.

The Marine Corps EW transition was highlighted in an article which we published earlier this year based on the Williams Foundation Seminar on Electronic Warfare.

2017-08-31 By Robbin Laird

On August 23, 2017, the Williams Foundation held a seminar on the future of electronic warfare.

With the introduction of the Growler, this has provided a natural hook into the broader discussion of the evolving payloads, which need to be part of an integrated 21st century combat force.

As Group Captain Braz put the objective of Growler introduction within the ADF:

“New thinking in terms of dynamic targeting, particularly of non-lethal effects, many of which may be temporary in nature, will be a key to success.

“Delegating these engagement authorities forward will be essential.”

WTI 1-18 Overivew from SldInfo.com on Vimeo.

Lt. General (Retired) Jon Davis, the former Deputy Commandant of Aviation, echoed these sentiments within his presentation to the Williams Foundation seminar.

He described the USMC transition from a core aircraft delivering an EW effect to building out the MAGTF to include ubiquitous access to non-kinetic tron warfare capabilities.

The core approach going forward is very clear.

“MAGTF EW transitions the Marine Corps from a focus on low density/high-demand EW platforms, to a distributed, platform-agnostic strategy – where every platform contributes/ functions as a sensor, shooter and sharer – to include EW.

“Under MAGTF EW the Marine Corps is leveraging emerging technologies and integrating multiple platforms, payloads, nodes, and capabilities to provide commanders with an organic and persistent air and ground EW capability.”

Lt. General (Retired) Jon Davis on a panel at the Williams Foundaton Seminar on Electronic Warfare, August 23,
2017

Davis underscored that with the changing nature of warfare and how the Marines operate, shaping a distributed strategy was a necessity, not an option.

“We operate on ships, from ships to shore and ashore.

“We cannot simply have an on call EW asset.

“We can confront the threat requiring an EW capability anywhere we operate.”

He described the sun setting of the unique EW aircraft, the Prowler, in favor of a sequential role out of distributed capability to the MAGTF.

He focused initially on Intrepid Tiger which is an EW pod being incorporated the Marine Corps legacy air.

It is on the Harrier and UH-1Y currently but will be added to other aircraft in the force.

“It’s made over 20 deployments now.

“It’s an open architecture system.

“It does electronic surveillance; it does electronic attack.

“We have a new one called Intrepid Tiger Block 2X which is being built to do radar jamming.

“It’s about 305 pounds for the Harriers and Hornets.

“It’s going to go next on V-22 then on C-130 and then on the CH-53 helo.

“We had about 120 we’ve built so far, we have 268 in the program of record.”

It’s completely an open architecture.

“And we have invited manufacturers if they have a card that can fit into the system to propose putting it into the pod.

“If you have a card that fits in that slot and you can do so, bring it and you can plug it in, but do not ask us to change the box for us to take your card.

“You have to adapt your card to fix my box.”

The Marines are deploying the F-35 at the same time, which is a core capability for the USMC in delivering non-kinetic effects throughout the distributed force as well.

“The F-35 is part of our electronic warfare strategy for the United States Marine Corps. Indeed, it is a key part of our strategy.”

He then described an exercise involving the F-35.

“We were doing a drill, and the F-35 does a great job at a lot of things.

“It does a very good job in terms of electronic warfare as well.

“Bottom line, I was out there, I saw four ship of F-35s, and the scenario was a double digit SAM threat, it was 1,000 foot overcast, we had four Bs out there, we had a forward air controller on the ground, and these guys had launched off the ship and they were overhead, and they were going to go take out ground vehicles and suppress and shutdown the SAM.

“We brought in all of our senior one and two star generals. In short period of time, the F-35s got rid of the SAMs.

“They were operating more like a pack of dogs than ever seen in 36 years of flying strike airplanes including being the CO of the Weapons School.

“It was a work of art.

“The infantry officer came at the end came up says, “Hey, that was fantastic, but I think that’s not very realistic.”

“We need to capture it on live streaming video see we can see a confirmation of those targets.”

“I commented: Well it’s overcast, they’re not going to be streaming video, and you’re probably not going to have a Reaper out there, right? It’s going to get shot down.”

“He goes, “We need more time so we can review the video feeds.”

“I said, we have to remove the admirals and the generals out of the kill chain.

“If the pilots have got the right RoE, let them loose.

“If you inject too many decision makers from on high, you’re going to get Solders, Sailors and Airmen killed.”

Davis added: “We’re going to grow the F-35; We’re going to be very aggressive about growing capabilities in the F-35. It’s good at what it does right now; it’ll be a hell of a lot better in the future.”

He then went on to describe other roll-outs of evolving EW capability for the MAGTF.

The Blackjack UAV, which has a modular payload structure, has an EW payload inside as well and is currently working with the USS America amphibious group.

The goal is clear: “There will never be a Marine infantry unit or a group on the ground that will not have access to electronic warfare capability.

“The guys on ground can go up and e-connect.

“Almost like they’re going to a server in the sky and pulling the information for them, he or she can basically pull the capability down from the air asset.”

The next platform, which will provide an EW delivery capability to the MAGTF will be the Group 5 UAV, the Marines are working on right now.

This will be a VTOL UAV and will have an open architecture with modular payloads.

And clearly one of those payloads will be an EW one. And by having a VTOL asset this can provide MAGTF support throughout its operational cycle, whether on the ship, coming off the ship or operating ashore.

He concluded by reminding the audience of the philosophy of the Marine Corps as the big green killing machine. It was not about the fair fight; it was about speed and combat success against a determined enemy.

He quoted the most famous Australian general officer from World War I, General Sir John Monash to provide perspective on how the Marines looked at the inclusion of EW as a ubiquitous asset for the MAGTF.

“The true role of infantry was not to extend itself upon heroic physical effort, not to whither away under merciless machine gun fire, not to impale itself upon hostile bayonets, but on the contrary, to advance under the maximum possible array of mechanical resources, in the form of guns, …tanks, mortars and aircraft; to advance with as little impediment as possible; to be relieved as far as possible of the obligation to fight their way forward.”

Editor’s Note: During the panel discussion after the presentations by Group Captain Braz and CDR Mike Paul, a question was asked about the challenge of working with the US Navy and its approach leveraging Growler and the USAF’s approach to leveraging fifth generation aircraft in shaping a way ahead.

The answers were quite noteworthy.

Group Captain Braz viewed the RAAF as in an interesting bridging function between the USN and USAF and playing a potentially useful and significant role in shaping integrated capability across the RAAF, the USN, and USAF as well.

“The diversity that we bring is very useful in shaping the combined team of US Navy and US Air Force capabilities.”

Lt. General (Retired) Davis from the floor added his thoughts on how integration is proceeding in the US.

He sees the schools, MAWTS-1, Nellis and Fallon as key elements in shaping an integrated force. He mentioned that a Marine is for the first time teaching at Nellis and a USAF pilot is training at MAWTS-1 and will be an instructor there as well.

“The more we learn from each other, the better we will be.”

And then CDR Paul added that it remains to be seen how the US Navy will employ the F-35 but that cross learning from the USMC and the USAF will be crucial in this process.

 

Iraqi Christians, Facing Double Whammy Challenges: A Discussion with Joseph T. Kassab, President and Founder of the U.S. Based Iraqi Christians Advocacy and Empowerment Institute (ICAE)

2017-11-20 By Ed Timperlake and Robbin Laird

The Middle East is certainly in turmoil and transition.

The Turkish government under its current government is looking to expand Turkish influence in the region, certainly, in part, to bolster its own power position and to deal with Syrian instability.

The Iranians are working their own form of power projection in the region and have enhanced their power in Iraq.

The dramatic political changes in Saudi Arabia provide a significant input to further turmoil into the region and a very plausible restructuring factor as well.

The battle against ISIS in terms of dislodging them from control of physical territory has progressed with successes.

Yet the Christians in Iraq are in many way operating like a ping pong ball as they suffer from ISIS and then suffer from the forces liberating ISIS.

The Nineveh plain has been largely destroyed and needs to be rebuilt; and an obvious factor allowing for greater stability and ethnic autonomies in the region, namely greater autonomy for the Kurds has been attenuated as well.

The U.S. rejected the legitimacy of the Kurdish vote for independence and the Iraqi government unleashed an assault against Kurdish positions in Iraq.

Although the goal of an Iraqi nation remains and the hope for a peaceful federation is still articulated, providing greater autonomy for the Kurds and build out from that has been a position which we have argued for a number of years.

In a world which is evolving rapidly or breaking down rapidly, it depends where you look, taking a leverage point like the Kurdish vote can form a leverage point, both to aid other minorities, in this case the Christians, as well as to shape practical ways to reduce Iranian influence in Iraq.

Helping the Christians in Iraq is important in and of itself, certainly for the global Christian community.

But also it is part of re-energizing stabilization efforts within a more diversified Iraq itself.

We met with Joseph T. Kassab at the end of his most recent visit to Washington and interviewed him on November 16, 2017.

As Kassab put the situation in the region: “For the peoples of the Middle East, they are reaching a clear breaking point throughout the region.

“Christians going back to their homes in liberated Nineveh Plain are once again facing war challenging due to the fierce conflict between the Kurd and the Iraqi government on this longtime contested region”

“The level of corruption is so high and the inability to deliver stability and a decent quality of life to the to be returned population seems to have no end in sight.

“The recent developments in Saudi Arabia might presage a new round but well applauded of Arab Spring as a result.”

During his visit, he talked with both Iraqi government officials and US government officials.

Recently, both President Trump and Vice President Pence have spoken out clearly with regard to the need to support Christians in Iraq, specifically and with regard to the general challenge of stabilization.

According to Kassab, the Administration has made progress but efforts need to continue.

In his visit to USAID, he saw clear support for the Trump and Pence’s positions to support stability in Iraq and to hold a major conference to shape a way ahead with regard to funding and support, both on the national and international level.

Yet the general concerns which the President has focused upon with regard to immigration has clearly blocked the ability of Iraqi Christians to enter the United States.

He noted that President Obama was able to provide a way to bring 12,500 Muslims into the United States from Syria and he encourages President Trump to use a similar approach for the persecuted Iraqi Christians as well.

Joseph Kassab highlighted what he saw as a growing influence of the neighboring countries in Iraq and the genuine interest of Prime Minister Abbadi to marginalize this influence and to fiercely fight corruption in his own country as a key factor alleviating all realistic approaches to shaping stability.

He suggested that the rebuilding of the Nineveh plain might make an effective focal point for international efforts to reshape the area free from foreign influence and the ability of minority populations like the Christians to be able to be protected in the process.

It was also surprising and important to learn from Joseph  that the tolerance of the Kurdish Islamic followers to accept Kurds of the region to intermarry with people of the Jewish faith.

This is another significant trend and a building block for solid international efforts embracing U.S. development programs in the area.

Recently, Kassab presented a series of proposal to the Honorable Dr. Saleem Al Jubouri, President and Speaker of the Iraqi Parliament, who reacted kindly to the initiative, according to Kassab.

These proposals formed as well the basis for his various discussions during his most recent visites to Washington DC and were as follows:

  1. Amend the Iraqi Constitution to reflect the recognition of civil rights and freedom of religion for all ancient religious minorities including the Christians. More of their representation in the Iraqi Parliament and Government Institutions should be also added,
  2. Combine all non-traditional armed forces with the officially established Iraqi Army to ensure full loyalty to the whole nation and its people,
  3. The US and the Western World should be asked to play instrumental role in helping the Central Government of Iraq and its Parliament to assist in resolving the mushrooming problems between the many disputed factions and political parties which assume power and govern the nation,
  4. Normalize and seek good relationships with the Arab states neighbors,
  5. Encourage interfaith Dialogue and minimize the role of religious institutions in the politics of the nation. Encourage civic institution and citizens to play this significant role,
  6. Establish efficient National Reconstruction and Stabilization Council (NRSC) to rebuild prosper Iraq,
  7. Call for International Conference in or outside the country to pledge support to reconstruct Iraq. This should take place under the auspice of United Nations, United States, Arab States League, and European Union. Also, Iraqi oil revenues should be invested in this initiative,
  8. Reconstruct and strengthen the Iraqi Armed Forces, Police, and Security apparatuses,
  9. Reconstruct the governmental infrastructure to support incoming goods cost and to significantly stimulate the private sector investments to prosper,
  10. Cease and terminate all of shady deals and corruption among officials and their clans,
  11. Secure the porous borders and stop foreign fighters from entering and harming Iraqis by taking Iraq as a sanctuary for their illegitimate attacks,
  12. Limit the interference in the politics of Iraq by ALL of its neighboring countries,
  13. Reactivate the Iraqi National Reconciliation Forum (Al Sahwa) and encourage dialogue between all Iraqi political parties, tribal people, technocrats, and members of the ethno-religious minority groups
  14. Encourage the return of displaced and refugees by providing all necessary needs to re-establish promising future through justifiable protection, reconstruction, security, stabilization, and prosperity programs,
  15. Establish governmental council for reparations and compensation for the war and seatrain violence impacted people like the minority groups in Nineveh Plain.

Editor’s Note: For earlier articles of interest, and our discussions with Joseph Kassab, please see the following

http://sldinfo.wpstage.net/an-update-on-the-evolving-situation-in-iraq-an-interview-with-joseph-kassab-2/

http://sldinfo.wpstage.net/conducting-an-information-war-against-islamic-extremists

http://sldinfo.wpstage.net/christians-in-the-middle-east-washington-conference-looks-at-minority-under-seige

http://sldinfo.wpstage.net/isis-and-information-war-shaping-the-battlespace

http://sldinfo.wpstage.net/the-iraq-dynamic-working-with-kurds-to-save-iraqi-christians/

http://sldinfo.wpstage.net/a-way-ahead-in-iraq-calibrating-a-response/

http://sldinfo.wpstage.net/president-obama-and-his-historic-opportunity-in-iraq

http://sldinfo.wpstage.net/in-iraq-back-to-the-tribes/

In the photos above, respectively they show Joseph Kassab visiting with the head of the Iraqi parliament, the State Department and USAID. 

 

An Update on C-130J

12/04/2017

2017-12-04 The C-130J is clearly a very flexible combat asset.

The Marines have expanded the envelope of their KC-130J as they have added Harvest Hawk several years ago and are adding communication and ISR integration capabilities which allow the aircraft to be a key element in the evolving digital interoperability of the Marine Corps force.

As the US Navy emphasizes distributed lethality, the USMC looks to enhance the capabilities of the Osprey and the C-130J to provide greater capability for the distributed force known as the MAGTF.

The US Air Force has brought its Js to Germany and are working the plane into their support efforts based in Germany as well.

The J first came to Ramstein in 2009 and became the first overseas base to get a C-130J flight simulator in 2015.

In an article by Jennifer Sean published on August 24, 2015 by Stars and Stripes, the coming of the flight simulator was described as follows.

It looks like an alien spacecraft your kid might want to take for a spin.

But this is no amusement park ride.

Ramstein is the first U.S. Air Force base overseas to get a C-130J Maintenance and Aircrew Training System — a fancy name for a flight simulator. It will be used to train aircrews that fly the C-130J Super Hercules from Ramstein and the maintainers who keep them ready to fly.

The 86th Airlift Wing hosted a ribbon-cutting ceremony Monday for the $25 million simulator and the new building that houses it, an $8 million military construction project.

The windowless simulator was open for visitors to take a peek inside, where Maj. Devon Cummings, an operations officer with the 86th Operational Support Squadron, practiced a “landing” on Ramstein’s runway. The physical features whizzing by on the video screen looked exactly as the pilot would see them approaching for landing, from the buildings along the airfield to the farm fields surrounding the base.

“Not bad. You’re qualified,” joked C-130J pilot Capt. Fred Backhus, who was leading Cummings through the drill.

Backhus said the simulator comes with a visual database system programmed to display most airfields to which the crews fly. “We just program it in: ‘We want to go here today.’ Boom, it’s there,” he said.

A recent video shows the C-130J operating from Ramstein.

C130J Operating at Ramstein Airbase from SldInfo.com on Vimeo.

The French are adding four C-130Js to their fleet and have taken their first aircraft this Fall.

France has placed orders for a total of four C130Js — two stretched C-130J-30 airlifters and two KC-130J tankers.

The aircraft are  needed due to premature ageing of French Air Force C160 Transalls and an urgent requirement for additional medium tactical airlift capacity in operations.

The aircraft will be operated as part of a new joint Franco-German transport unit, to be based at the French AF base at Evreux.

First C-130J for the French Air Force, October 2017. Credit Lockheed Martin.

According to an article by Helen Chachaty published on October 20, 2017:

The first of four C-130Js to equip the French Air Force rolled out October 20th. Painted in the colors of the Air Force, Lockheed Martin’s transport aircraft is expected to be delivered by the end of this year.

The rest of the fleet, which will ultimately consist of four aircraft, is expected to be delivered in the next two years, with versions with in-flight refueling capabilities (KC-130J) expected in 2019.

Announced in December 2015 as part of the update of the Military Programming Act, the order of four C-130Js aims to overcome the A400M’s capacity shortfalls in terms of refueling of helicopters, but also to increase the capabilities transportation of equipment and personnel.

In a story which we published in 2014, we looked at the flexibility of the KC-130J which certainly is a good reason for the French to include the aircraft in their force with the retirement of the Transall underway and with the demand for helicopter refueling in the French expeditionary force.

2014-07-31 By Robbin Laird

During my latest visit to Second Marine Air Wing, I focused upon the USMC evolution of its use of the KC-130J.

I spent a morning in the KC-130J simulator watching Marine pilots hone their skills and did so from the tanker seat in the aircraft.

Captain Michael Jordan, Credit: SLD
Captain Michael Jordan, VMGR-252. Credit: SLD

After the simulation experience, I sat down with one of the pilots, Captain Michael Jordan, to talk about his experience working with the Harvest Hawk in Afghanistan.

The Captain is of the new generation of USMC pilots who have flown the KC-130J from the beginning and so the Harvest Hawk experience seems a “normal” evolution and simply preparing for the next transition, whereby the “mother ship” can handle data, C2 or ordinance dependent on the evolution of USMC concepts of operations.

The Harvest Hawk was first introduced into Afghanistan by 3rd MAW so the squadron went to the West Coast to learn their skills in preparation for their use of Harvest Hawk in Afghanistan in 2012.

We trained as Harvest Hawk co-pilots right before we deployed for Afghanistan last year.

And I would say that at least half of the hours we flew in Afghanistan starting in July 2013 through February of this year were Harvest Hawk missions.

After that I went to Spain and became part of the Special Purpose MAGTF.

He emphasized as well that it was different type of flying than on other KC-130J missions.

A lot of what you are doing is working in orbits, circling around targets, talking with people on the ground and managing the battlespace. 95% of what you are doing is flying, holding your orbit and then waiting for that 5% of the mission where you prepare to and then launch your ordinance.

And in flying the plane the operation from the cockpit is different as well.

With the Heads up Display you are flying the aircraft. Now you need to not just focus on just flying the aircraft and executing the mission but also work with the navigation radar to see where you are going and what you are doing within the battlespace.”

Harvest Hawk system on KC-130J at 2nd MAW: Credit: SLD
Harvest Hawk system on KC-130J at 2nd MAW: Credit: SLD

Question: What are the trade-offs necessary to operate a KC-130J as a Harvest Hawk?

Captain Jordan:

We lose the external tank on the left side as a sensor is placed on that tank.

We can not fuel from the tank.

This means that we reduce total fuel capacity.

A typical J would have a max fuel capacity of 60,000 pounds dependent upon fuel conditions.

With the Harvest Hawk configuration we can have a max fuel capacity of around 42,000 pounds. This reduces our time on station.

The Marine Corps is looking at an upgrade which would put the sensor on the front of the plane rather than the external tank and would recover the use of the tank.

The other aspect is that we lose the left side Aerial Refueling pod.

We have four hard points on the left side for the missiles; we can do refueling but with only one hose on the right hand side.

We can not have two houses serving the tanker mission.

Question: How are operations different from inside the aircraft to operate the Harvest Hawk mission?

Captain Jordan:

It is quite different.

In Harvest Hawk the pilot becomes more of a battle manager, while the co-pilot flies the plane.

In the back of the aircraft we have a different crew as well.

We generally have two officers in the back; a Fire Controls Officer sits in the right seat and operates the sensor to provide for target acquisition.

Typically, we have an assistant in the left seat to aid with the communications traffic and to assist the FCO.

Question: Where does Harvest Hawk go next?

Captain Jordan:

The entire Harvest Hawk experience highlights the utility of a “mother ship” in an air dominance environment.

There is no reason that we cannot take data from UAVs or the F-35s or the Harrier litening pods and be able to contribute to combat management or support to the ground commanders.

 

 

The Danes, The Russians and Shaping a Deterrent Strategy

11/28/2017

2017-11-17 By Robbin Laird and Ed Timperlake

Denmark is a small country, but an important player in the NATO Alliance and part of the reworking of Nordic defense with Norway, Sweden and Finland to deal with resurgent Russia.

Notably, in mid-October 2017, the Danish government released its proposed new six-year defense guidance and defense spending guidelines.

The government was very clear about what the threats facing Denmark are, the importance of allies modernizing and working effective interdependence in the defense of the North Atlantic and beyond, and need to invest more in new equipment and personnel.

Here is how the Danish government in the document describes the way ahead for Denmark:

“Denmark faces more serious threats than in any other period following the fall of the Berlin Wall. The freedom and security we value so highly cannot be taken for granted.

“To the east, NATO faces a confrontational and assertive Russia. Instability in the Middle East and North Africa is fuelling militant Islamism, sowing the seeds for the threat of terror and irregular migration flows. Propaganda campaigns challenge our democratic principles and established rules, while in the Arctic, there is increased activity and military presence.

“These are challenges which we cannot afford to ignore. That is why the Government wishes to substantially increase military spending over the next six years.

“The substantial increase will be gradually phased in and ultimately result in the Danish Defence’s annual budget in 2023 being increased by DKK 4.8 billion.

This amounts to an increase of 20% compared to current military spending.

Threats in cyberspace have serious security and socio-economic consequences.”

https://sldinfo.com/wp-content/uploads/2017/10/proposal-for-new-danish-defence-agreement-2018-2023.pdf

During a recent visit to Copenhagen, which coincided with the release of the new defence guidance, there was a chance to talk with a number of Danes and various experts about Danish thinking and the approach they had in mind to deal with shaping a deterrent strategy.

In particular, the discussion with Rear Admiral Nils Wang, former head of the Danish Navy and now head of the Danish Royal Military Academy, was significant in characterizing the nature of the Russian challenge as well as a way ahead for the Danish forces.

Rear Admiral Wang clearly argued that the Russian challenge today and as it is evolving has little to do with the Cold War Soviet-Warsaw Pact threat to the Nordics.

Rear Admiral Nils Wang.

The Soviet-Warsaw threat was one of invasion and occupation and then using Nordic territory to fight U.S. and allied forces in the North Atlantic.

In many ways, this would have been a repeat of how the Nazis seized Norway during a combined arms amphibious operation combined with a land force walk into Denmark.

In such a scenario, the Danes along with their allies were focused on sea denial through use of mines, with fast patrol boats providing protection for the minelayers.

Aircraft and submarines were part of a defense in depth strategy to deny the ability of the Soviets to occupy the region in time of a general war.

He contrasted this with the current and evolving situation in which the Russians were less focused on a general war, and more on building out capabilities for a more limited objective, namely controlling the Baltic States.

He highlighted the nature of the arms modernization of the Russian military focused on ground based missile defense and land and sea based attack missiles along with airpower as the main means to shape a denial in depth strategy which would allow the Russians significant freedom of maneuver to achieve their objectives within their zone of strategic maneuver.

A core asset carried by the Russian forces is the Kalibr cruise missile, which can operate off of a variety of platforms. With a dense missile wolf pack so to speak the Russians provide a cover for their maneuver forces. They are focused on using land based mobile missiles in the region as their key strike and defense asset

“The Russian defense plan in the Baltic is all about telling NATO we can go into the Baltic countries if we decided to do so. And you will not be able to get in and get us out. That is basically the whole idea.”

Rear Admiral Wang argued for a reverse engineering approach to the Russian threat.

He saw the “reverse engineering” approach as combing several key elements: a combined ASW, F-35 fleet, frigate and land based strike capabilities, including from Poland as well.

Vladimir Putin with the Russian Chief of the General Staff, during the Zapad 17 exercise. Credit: TASS

The Admiral’s position is based in part on the arrival of the F-35 and notably the F-35 as a core coalition aircraft with a capability to work closely with either land based or sea based strike capabilities.

“One needs to create air superiority, or air dominance as a prerequisite for any operation at all, and to do that NATO would need to assemble all the air power they can actually collect together, inclusive carrier-based aircraft in the Norwegian Sea.

“This is where the ice free part of the Arctic and the Baltic gets connected. We will have missions as well in the Arctic at the northern part of Norway because the Norwegians would be in a similar situation if there is a Baltic invasion.”

Rear Admiral Wang argued as well for a renewal or augmentation of ASW capabilities by the allies to deal with any Russian submarines in the Baltic supporting the operation, notably any missile carrying submarines.

He saw a focused Danish approach to frigate/helo based ASW in the region as more important than buying submarines to do the ASW mission.

The importance of using the F-35 as a trigger force for a sea-based missile strike force suggests that one option for the Danes will be to put new missiles into their MK-41 tubes which they have on their frigates.

They could put SM-2s or SM-3s or even Tomahawks onto their frigates dependent on how they wanted to define and deal with the Russian threat.

The ongoing work on Aegis integration with F-35 or the USMC work on integrating their High Mobility Artillery Rocket System (HIMARS) launchers is suggestive of their approach.

And leveraging the F-35 as the flying combat system part of the overall strike and defense force is a key part of Danish thinking.

During the recent stay in Copenhagen, there was a chance to discuss this as well with the new head of the Royal Danish Air Force, Col. Anders Rex.

“When I talk with F-35 pilots, the same message is drilled into me – this is not a replacement aircraft; this is not like any aircraft you have flown before. The aircraft enables our air combat forces to play a whole new ballgame.

“And from my discussions with Australians, the Norwegians, the Dutch and the Brits, it is clear that the common drive is to shape a fifth generation combat force, not simply fly the current 256 F-35s as cool, new jets.”

Col. Anders Rex, Danish Air Force. seen at the Copenhagen Airpower Conference, 2015. Credit: Second Line of Defense

He clearly had in mind working on leveraging the introduction of the F-35 to trigger a broader transformation.

And this makes sense, because in large part the F-35 is not simply a fighter which you define but what it does by itself organically, but, rather by what it can trigger in the overall combat fleet, whether lethal or non-lethal payloads.

“We need to focus on the management of big data generated by the F-35 and other assets that will come into the force.

“How do we do the right kind of command and control within a rich information battlespace?

“We need to build self-learning systems as well.

“The F-35 is a revolutionary man-machine system and sets in motion not only the challenge of new approaches to working information and C2, but new approaches to combat learning.

“How do we get there?

“That is what generating a fifth generation combat force is all about.”

https://sldinfo.com/leveraging-the-f-35-as-part-of-danish-defense-transformation-the-perspective-of-the-new-chief-of-staff-of-the-royal-danish-air-force/

An American colleague who has worked in Denmark for several years at the Centre for Military Studies at the University of Copenhagen highlighted the growing cooperation among the Nordics and how that cooperation was reshaping their operational approaches to dealing with the Russian threat.

Notably, the Swedes are introducing conscription, the Norwegians are enhancing their defense spending and the Finns are working new relationships in the region.

As Dr. Gary Schaub, Jr. put it during a meeting in Copenhagen:

“The Nordics are looking for practical ways ahead on credible deterrence with regard to the Russians.

“In this collaborative environment between equal—but small—powers, the suggestions of a Britain or US could smooth over the small barriers that might keep these otherwise pragmatic nations from doing what is in their own, and their region’s, common interests.

“There is a huge opportunity for the new Administration to shape a thoughtful proactive NORDIC agenda as the Nordics themselves seek a more regional approach.

“And as F-35s and P-8s come into the region, there is an opportunity to leverage common assets to shape a more proactive and common effort towards regional defense and security.

“The Administration should seize it.”

An earlier version of this article was published by Breaking Defense on November 17, 2017.

Denmark, Eyeing Russia, Likely To OK 20% Spending Boost; What It Means

Editor’s Note: We were part of a unique Australian-Danish seminar on the future of airpower held in Copenhagen in 2015.

The discussions in that seminar presaged Danish thinking and actions seen in the actions of the government and in evolving Danish and Nordic thinking.

Ed Timperlake laid out at the seminar a set of arguments which have been factored in by the Danes in thinking ahead with regard to their deterrent strategy.

2015-05-01 Ed Timperlake, editor of the Second Line of Defense Forum, was the last speaker of the day prior to the wrap up of the Danish airpower symposium.

The title of his briefing was “Early 21st Century Warfighting Trends: Technology, Training and Tactics,” and focused on the intersection of the coming of the F-35 with the evolving warfighting environment for the US and its allies.

In effect, he provided a look at the synergy of what John Blackburn discussed through Plan Jericho between the F-35 as a trigger for change, and the evolving approach of the RAAF or what Lt. Col. Berke referred as the disruptive change associated with the F-35 and the evolving eco system associated with fifth generation warfare.

As a Marine Corps pilot engaged in both close air support and air-to-air missions, Timperlake completed  his flying career as Commanding Officer of VMFA-321 with over 3000 hours of tactical flying.

Timperlake was looking forward from the perspective of the way ahead for performing the mixture of missions pilots would need to deliver in the coming decade.

A core element of working the evolving future is understanding that even with a disruptive change platform like the F-35, it is intersection of the training and tactics for the platform with the overall capabilities of the force which will drive change, And it is the squadrons and the squadron pilots who are the heart of shaping innovation.

As Lt Col. Berke had highlighted, change was a significant part of what the F-35 was all about for the pilots and their roles.

Timperlake underscored that in visits to the core warfighting centers in the United States associated with airpower – Nellis, Fallon and MAWS-1 – the warfighters had embraced change and were working across the services and with the allies in shaping new combat approaches.

As one who had met John Boyd and sat through his lectures a couple of times, Timperlake focused on how the famous OODA loop was being re-shaped with the coming of the F-35 fleet whereby the “Decide-Act” part of the OODA loop was increasingly important.

F-22 Raptors from the 94th Fighter Squadron, Joint Base Langley-Eustis, Virginia, and F-35A Lightning IIs from the 58th Fighter Squadron, Eglin Air Force Base, Florida, fly in formation after completing an integration training mission over the Eglin Training Range, Florida, Nov. 5, 2014. The purpose of the training was to improve integrated employment of fifth-generation assets and tactics. The F-35s and F-22s flew offensive counter air, defensive counter air and interdiction missions, maximizing effects by employing fifth-generation capabilities together. (U.S. Air Force photo/Master Sgt. Shane A. Cuomo)
F-22 Raptors from the 94th Fighter Squadron, Joint Base Langley-Eustis, Virginia, and F-35A Lightning IIs from the 58th Fighter Squadron, Eglin Air Force Base, Florida, fly in formation after completing an integration training mission over the Eglin Training Range, Florida, Nov. 5, 2014. The purpose of the training was to improve integrated employment of fifth-generation assets and tactics. The F-35s and F-22s flew offensive counter air, defensive counter air and interdiction missions, maximizing effects by employing fifth-generation capabilities together. (U.S. Air Force photo/Master Sgt. Shane A. Cuomo)

The ability of the pilots to share situational awareness across the fleet, and to support one another’s operations over significant distance in compressed time meant that the force would have significant capability to deliver kinetic strike either by itself or from other platforms.

And the passive sensing capabilities of the F-35 would introduce innovations in kinetic and non-kinetic strike as well.

One way to understand the evolving eco system associated with fifth generation warfare is the S-cubed revolution.

Stealth, speed and sensors are an interactive dynamic and underlay the emergence of fifth generation warfare.

The sensor-shooter revolution sees as well the emergence of the offensive-defensive enterprise.

Sensors, stealth and speed enable the air combat enterprise to find, kill and respond effectively to the numerous adversarial threats that  global powers and pop up forces can present to the US and its allies.

The strategic thrust of integrating modern systems is to create a honeycomb that can operate in an area as a seamless whole, able to strike or defend simultaneously.

This is enabled by the evolution of C5ISR (Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance), and it is why Secretary Wynne has underscored for more than a decade that fifth generation aircraft are not merely replacements for existing tactical systems but a whole new approach to integrating defense and offense.

By shaping a C5ISR system inextricably intertwined with platforms and assets that can honeycomb an area of operation, an attack and defense enterprise can operate to deter aggressors and adversaries or to conduct successful military operations.

The F-35 global fleet will help shape the new ecosystem and live off it. Synergy in shaping evolving capabilities to deal with the reactive enemy will be an essential part of the innovations associated with the offensive-defensive enterprise.

Ed Timperlake addresses the Copenhagen Airpower Symposium, April 17, 2015. Credit: SLD
Ed Timperlake addresses the Copenhagen Airpower Symposium, April 17, 2015. Credit: SLD

Timperlake argued that the warfighting centers were interactively working together and with allies to shape the way ahead.

Each center has an evolving special focus that will carry forth innovation across the entire warfighting enterprise.

MCAS Yuma, MAWTS-1, VMX-22 and the F-35 squadron, were working together to shape an innovative approach to 21st century close air support within which the cockpit display gave the pilot a constant read of the AA and GA threats and in which electronic warfare was part of the CAS capabilities of the aircraft. And with the integration with the Osprey and with the MAGTF, the Marines were shaping a whole new approach to assault forces.

Visiting the Warfare Center at Nellis, Timperlake learned of the central importance of shaping a fleet wide mission data set correlated with the F-35 sensors in shaping wide ranging SA and engagement force decision making. With Red Flag exercises the USAF was leading the way in shaping the intersection of the F-35 with other combat assets to shape an air combat revolution that will help reshape an ecosystem that would evolve with the F-35 fleet.

At Fallon, the Navy is looking to lead the way on shaping a live virtual constructive range which will allow the complexities of a modern battlefield to be both inclusive and wide-ranging.

He saw the new carrier air wing evolving under the influence of the F-35 extending its reach and expanding the capabilities of the maritime force to deliver distributed lethality.

This is an open-ended learning process, but to use Lt. Col. Berke’s language, one which needs to be accelerated and to get on with it.

The systems making up the F-35 cockpit provide convergent capabilities but are driven by separate R and D paths to shape new 21st century capabilities. In other words, the F-35 and its evolving ecosystem are both inherent to change within the aircraft and synergistic with change in the entire air combat force.

The future is in the hands of the squadron pilots across the services, and the allies and change driven by any one service or F-35 nation will be part of the overall dynamic of re-shaping the eco-system.

This is a key advantage that the US and its allies can leverage to shape a more effective combat future and to position themselves effectively against adversaries like Russia, North Korea and China.

He concluded that “countless evolutionary and revolutionary aspects of 21st century combat will be in the hands of the squadron pilots – as it should be!”

For our Special Report on the evolution of North Atlantic and Nordic Security, please see the following:

Dealing with Russian Challenges in Northern Europe and the North Atlantic: A New Special Report