27.03.2013 Views

Airman Scholar Sp05-1.indd - United States Air Force Academy

Airman Scholar Sp05-1.indd - United States Air Force Academy

Airman Scholar Sp05-1.indd - United States Air Force Academy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In this issue…<br />

This publication is devoted to papers written by<br />

cadets at the US <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong> and represents an<br />

excellent cross section of thinking from the 34th Education<br />

Group’s Military Strategic Studies classes. The<br />

<strong><strong>Air</strong>man</strong>-<strong>Scholar</strong> devotes a large percentage of its space<br />

to showcasing USAF <strong>Academy</strong> cadet writing on military<br />

topics. To this end we include the best papers obtainable<br />

from the History, Political Science, Philosophy and Military<br />

Strategic Studies programs. We welcome all departments<br />

focusing on the general theme of Contemporary<br />

Military Thought which guides the <strong><strong>Air</strong>man</strong>-<strong>Scholar</strong>.<br />

In seeking to present current military thought<br />

by cadets at USAFA we are also trying to illuminate<br />

some of the issues with which future USAF leaders are<br />

grappling as they prepare for an uncertain future. As<br />

these future leaders express themselves in recommendations<br />

for solutions or suggest methods of thinking about<br />

solutions, we hope to capture the “nuggets” of truly<br />

useful concepts and thoughts.<br />

For the first time we include a broader specturm<br />

of work which includes Fourth class cadets as well as<br />

upper classmen. We think that you will find these submissions<br />

interesting and useful.<br />

1<br />

The <strong><strong>Air</strong>man</strong>-<strong>Scholar</strong> invites both full-length articles and<br />

short “letters to the editor” comments. Please submit in<br />

accordance with the following guidelines:<br />

1. Full-length articles should be approximately 6,000<br />

words in length, although all submissions will be considered.<br />

2. Articles should be submitted as hard copy with accompanying<br />

3.5 disk (not returned)<br />

3. Articles will be edited to conform with <strong><strong>Air</strong>man</strong>-<strong>Scholar</strong><br />

format; proofs will not be sent to authors prior to publication.<br />

4. Articles are encouraged from all knowledgeable members<br />

of the academic and military communities. Publication<br />

of outstanding papers by USAFA cadets and other<br />

service academy students is a particular goal of <strong><strong>Air</strong>man</strong>-<br />

<strong>Scholar</strong>.<br />

5. Articles must be received by 1 September 2005.<br />

6. Send articles to:<br />

34th Education Group<br />

Attn: <strong><strong>Air</strong>man</strong>-<strong>Scholar</strong><br />

2354 Fairchild Drive, Suite 2A2<br />

USAF <strong>Academy</strong>, CO 80840-6264


AIRMAN SCHOLAR<br />

Published by the 34th Education Group<br />

at the<br />

<strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong><br />

Spring 2005<br />

Vol XI, No 1<br />

Commandant of Cadets<br />

Commander 34th Training Wing<br />

Brig Gen Johnny Weida<br />

Commander and Professor of USAFA<br />

34th Education Group<br />

Col Thomas A. Drohan<br />

Editors<br />

Glenn Ferguson<br />

John Farquhar<br />

Brent Talbot<br />

The 34th Education Group’s mission is to oversee curriculum<br />

development and instruction in Military Strategic Studies for<br />

the cadets of the US <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>. This consists of courses<br />

covering Military Theory and Strategy, Officership, <strong><strong>Air</strong>man</strong>ship,<br />

Aerospace Theory and Doctrine, and Joint and Coalition<br />

Operations. Group personnel conduct research on a variety of<br />

topics, including international security, space-related issues,<br />

military service culture, and educational modeling. Research<br />

activities are coordinated through the 34th Education Group<br />

Research Office.<br />

The opinions expressed in AIRMAN SCHOLAR do not represent<br />

any official policies of the Commandant of Cadets, US <strong>Air</strong><br />

force <strong>Academy</strong>, US <strong>Air</strong> <strong>Force</strong>, or US government. They are presented<br />

to stimulate discussion on military issues and domestic<br />

and international affairs.<br />

AIRMAN SCHOLAR is published twice annually. If you have<br />

comments concerning articles, would like to contribute an article<br />

for publication, or desire to receive AIRMAN SCHOLAR,<br />

please contact us at:<br />

34th Education Group<br />

att: AIRMAN SCHOLAR<br />

2354 Fairchild Drive, Suite 2A2<br />

USAF <strong>Academy</strong> CO 80840-6264<br />

(719) 333-3255 or DSN 333-3255<br />

e-mail: glenn.ferguson@usafa.af.mil<br />

2<br />

TABLE OF CONTENTS<br />

1 From the Editor<br />

By Glenn Ferguson<br />

3 IS MISSILE DEFENSE A GOOD IDEA<br />

by C4C Rob Auflick<br />

7 WHERE OD PRIORITIES LIE, WITH MEN<br />

OR WITH THE MISSION?<br />

By C4C Michelle Bonneau<br />

11 THE ANATOMY OF CLOSE AIR SUPPORT<br />

by C1C Brandon Burns<br />

24 IS DEMOCRATIC IMPERIALISM VIABLE?<br />

ASSESSING THE VALIDITY OF THE BUSH<br />

DOCTRINE.<br />

By C4C Whitney Camp<br />

27 MORALLY BOUND TO NATIONAL<br />

SECURITY<br />

By C3C Brady Cilo<br />

30 MIND OVER MATTER: THE CASE FOR<br />

DECENTRALIZING PSYCHOLOGICAL<br />

OERATIONS (PSYOPS) IN MODERN<br />

WARFARE<br />

By C1C Kristen L. Fagen<br />

43 SPACE ASSETS: THE ACHILLES HEEL IN<br />

NATIONAL DEFENSE<br />

By C1C Alexander K. Goldfein<br />

57 NO COERCION HERE: THE SOVIET<br />

MILITARY EXPEDITION IN<br />

AFGHANISTAN, 1979-1989<br />

By C3C Roland W. Olmstead<br />

65 ETHICS IN WARFARE<br />

By C3C David Schill<br />

69 AIR CONTROL: THE FALLACY OF COER<br />

CIVE AIR STRATEGY IN BRITISH COLO<br />

NIAL ADMINISTRATION, 1919-1924<br />

By C1C Colby Sullins<br />

81 FALLOUT: THE QUESTION OF NEXT GEN<br />

ERATION NUCLEAR WEAPONS<br />

By C1C Damon A. Wagoner<br />

94 THE MYTH OF ISSUE NETWORKS: A<br />

REBUTTAL TO GIBSON AND SNIDER<br />

By C1C William L. Wisehart<br />

98 THE JUST WAR TRADITION AND EAST<br />

ERN MILITARY THEORY: APPLICATIONS<br />

TO IRAQ<br />

By C3C Matthew H. Yan


IS MISSILE DEFENSE A GOOD IDEA?<br />

By C4C Rob Auflick<br />

The Cold War was in full swing. Both the <strong>United</strong><br />

<strong>States</strong> and the Soviet Union were positioning themselves to<br />

be the world’s one and only great superpower. In 1983, one<br />

side thought that they had come up with a weapon which<br />

would give them the upper hand in the military realm of this<br />

ideological conflict. “Obe Ron Kanobi strapped on his cape,<br />

headed up to the podium, and announced his plan to slay the<br />

evil Dark Side, or the Soviet Union with the Strategic Defense<br />

Initiative (SDI), known then as ‘Star Wars’ (Freedman 57).”<br />

“Star Wars” was to be a multi-layered missile defense system<br />

which would protect the <strong>United</strong> <strong>States</strong> in case of an attack<br />

by thousands of Soviet warheads. “Since 1983, the U.S. has<br />

spent more than $55 billion trying to make President Ronald<br />

Reagan’s dreams a reality (Information 22).” This program,<br />

once considered abandoned and a relic of the Cold War, has<br />

found itself once again the center of national security.<br />

While the end of the Cold War signaled a reduction<br />

in the likelihood of global conflict, the threat from foreign<br />

missiles has grown steadily as sophisticated missile technology<br />

becomes available on a wider scale. The proliferation of<br />

weapons of mass destruction and the ballistic and cruise<br />

missiles that could deliver them pose a direct and immediate<br />

threat to the security of U.S. military forces and assets in<br />

overseas theaters of operation, our allies and friends, as well<br />

as our own country. “Since 1980, ballistic missiles have been<br />

used in six regional conflicts (Report 3).“<br />

Basics of Ballistic Missile Defense<br />

All ballistic missiles share a common, fundamental<br />

element. “They follow a ballistic trajectory that includes<br />

three phases. These phases are the boost phase, the midcourse<br />

phase, and the terminal phase (Project 4).” The boost phase<br />

is the portion of a missile’s flight in which it is thrusting to<br />

gain the acceleration needed to reach its target. This phase<br />

usually lasts between three to five minutes. During this phase<br />

the rocket is climbing against the earth’s gravity and either<br />

exiting the earth’s atmosphere, or in the case of shorter range<br />

missiles, only reaching the fringes of outer space.<br />

Once the missile has completed firing its propulsion<br />

system, it begins the longest part of its flight, which is known<br />

as the mid-course phase. During this phase the missile is<br />

coasting, or freefalling towards it target. This phase can last<br />

as long as 20 minutes in the case of intercontinental ballistic<br />

missiles (ICBMs). Most missiles that leave the atmosphere<br />

3<br />

shed their rocket motors by this time in order to increase the<br />

range that the missile’s weapon, known as a warhead, can<br />

travel. For medium and long range missiles this phase occurs<br />

outside the earth’s atmosphere.<br />

The final phase of a missile’s flight is the terminal<br />

phase. During this phase the missile’s warhead re-enters the<br />

earth’s atmosphere at incredible speeds, some at over 2,000<br />

mph. This phase lasts approximately 30 seconds for ICBM<br />

class missiles.<br />

There are advantages and challenges to set up<br />

engagement opportunities against an incoming missile in<br />

each of these phases. “The capability to defend against an<br />

attacking missile in each of these phases is called a layered<br />

defense, and it may be expected to increase the chances that<br />

the missile and its payload will be destroyed (From18).” “By<br />

attacking the missile in all phases of flight, we capitalize on<br />

opportunities that could increase the advantage of the defense<br />

(Project 30).” A capability to intercept a missile in the boost<br />

phase, for example, can destroy a missile regardless of its<br />

range or intended aim-point and provide a global coverage<br />

capability. In addition, the destroyed missile would threaten<br />

the launching nations territory with debris. A midcourse<br />

intercept capability can provide wide coverage of a region<br />

or regions, while a terminal defense reduces the protection<br />

coverage considerably to a localized area. When we then add<br />

shot opportunities in the midcourse and terminal phases of<br />

flight to boost phase opportunities, we increase significantly<br />

the probability that we will be successful. “Improving the<br />

odds of interception becomes critical when ballistic missiles<br />

carry weapons of mass destruction (Project 52).” “When<br />

defending against more lethal payloads, a capability to<br />

intercept a missile near its launch point is always preferable to<br />

attempting to intercept that same missile closer to its target<br />

(Missile 40).”<br />

Figure 1.


History<br />

“Nike-Zeus was one of the first U.S. efforts whose<br />

objective was to develop long range defenses against ballistic<br />

missiles (From 2).” “The logic driving the program called<br />

for an exoatmospheric (60 miles or higher above the earth’s<br />

surface) or very high altitude, long range interceptor carrying<br />

a 400 kiloton nuclear warhead that, when detonated, would<br />

destroy incoming missiles (From 5).”<br />

While rocket science had put the concept within<br />

reach, the tracking radars were still too primitive to cope with<br />

a large number of missiles. The radars could be spoofed by<br />

countermeasures such as chaff and decoys, and were physically<br />

vulnerable. “The tight defense budgets of the 1950s also<br />

acted as a restraint since a widely deployed system would be<br />

costly (Evolution 8).”<br />

Replacing Nike-Zeus program was Project<br />

Defender, what today might be classified as an Advanced<br />

Technology Demonstrator program that explored possible<br />

new technologies that could be incorporated into future<br />

missile defense programs. “One concept that emerged,<br />

called Ballistic Missile Boost Intercept (BAMBI), envisioned<br />

satellite launched, hit-to-kill missiles containing huge wire<br />

mesh arrays that would destroy offensive missiles in the first 5<br />

minutes (the “boost phase”) of flight (Lethbridge 61).” Low<br />

funding and high projected costs, together with new estimates<br />

of Soviet progress on offensive systems and doubts about the<br />

survivability of the BAMBI system, ended this effort in 1968.<br />

Under President Kennedy, Nike-Zeus was canceled<br />

in 1961 and replaced by Nike-X. This program incorporated<br />

three major advances. “These advances were a phased-array,<br />

electronically guided radar, and an upgraded Nike-Zeus<br />

missile renamed Spartan (From 45).” Nike-X, in turn, was<br />

superceded by Sentinel in 1967. “Recognizing that the<br />

U.S. could not stop an all-out attack by Soviet ICBMs, the<br />

Johnson Administration elected to proceed with a “thin”<br />

anti-ballistic umbrella designed to protect major U.S. cities<br />

(Missile 40).” When Secretary of Defense Robert McNamara<br />

announced this plan in September 1967, he made two points<br />

that have become part of the current debate about 21st<br />

century U.S. national missile defense: (1) attempts to deploy<br />

a comprehensive ABM system will only fuel the offensive<br />

missile race, and (2) what is needed is enough of an umbrella<br />

to counter very limited threats such as that posed by the small<br />

Communist Chinese ICBM fleet.<br />

4<br />

The Nixon Administration refocused the Sentinel<br />

system from guarding cities to guarding vital military<br />

locations by employing as many as 12 ABM sites around the<br />

country. “Renamed Safeguard, the system would provide<br />

protection to Minuteman ICBM missile fields, Strategic <strong>Air</strong><br />

Command bases, and the National Command Authority<br />

in Washington, DC (From50).” In August 1969, Senate<br />

approved this plan after the Vice President broke a tie vote.<br />

Furthermore, the new Administration, like its predecessor,<br />

justified the “light ABM” deployment as a means of<br />

preventing the Chinese from ever using their emergent ICBM<br />

force to blackmail the <strong>United</strong> <strong>States</strong>.<br />

“In fact, the Strategic Arms Limitation Talks (SALT)<br />

negotiations became entwined with separate talks on limiting<br />

anti-ballistic missile deployments (From 82).” In 1972<br />

the <strong>United</strong> <strong>States</strong> and the Soviet Union signed the ABM<br />

Treaty which limited both sides to two anti-ballistic missile<br />

interceptor sites. “A 1974 Protocol reduced the two sites to<br />

one each and to 100 interceptors (Missile 13).” The Soviets<br />

elected to defend Moscow with their nuclear tipped Galosh<br />

system, which is an upgraded “Gazelle” system and is still in<br />

place today. Meanwhile, the <strong>United</strong> <strong>States</strong> opted to defend<br />

the Minuteman missile site around Grand Forks, North<br />

Dakota. On October 1, 1975, the Grand Forks<br />

site became operational. “The next day, the House of<br />

Representatives voted to close the system down because the<br />

Soviet program to put multiple independent reentry vehicles<br />

(MIRV) on their missiles meant that Safeguard would be<br />

easily overwhelmed (From 84).” Furthermore, it was finally<br />

recognized that the radars that were part of the system would<br />

be blinded by the electromagnetic pulse from exploding<br />

nuclear warheads on the Safeguard interceptors. The Senate<br />

concurred with the House action in November, and in<br />

February 1976, the system went into “caretaker” status after<br />

only four months of operation. Except for its supporting<br />

radar, Safeguard was closed completely in 1978.<br />

This was how things were until on March 23, 1983,<br />

in five paragraphs near the end of a televised nationwide<br />

address, President Reagan conveyed his vision of how the<br />

U.S. could counter Soviet ICBMs by developing defenses that<br />

would make “nuclear weapons impotent and obsolete (Reagan<br />

1).” Mr. Reagan conceded that some other nations might<br />

regard defensive measures “paired with offensive systems. . .<br />

as fostering an aggressive policy (Reagan 2).” This has been<br />

a concern that remains to this day.


Several <strong>United</strong> <strong>States</strong> Congressmen and Senators<br />

believe that this futuristic “star wars” scheme was nothing<br />

more than another excuse to increase defense spending which<br />

had little impact on the program. The Strategic Defense<br />

Initiative (SDI) was born. In 1985 the Pentagon’s SDI<br />

Organization (SDIO) proposed a multi-layer, space-based<br />

system to defend 3,500 “targets” against Soviet missiles. By<br />

1987 the reality of technological limitations had set in, and<br />

many anti-missile concepts were abandoned as unworkable.<br />

“Nonetheless, with about $4 billion per year being spent<br />

on SDI, the program anticipated a deployment decision in<br />

1993 and initial operational status by 1997 employing both<br />

ground and space-based interceptors (Report 4).” But by<br />

1992 the Warsaw Pact had disintegrated and the Soviet Union<br />

imploded. Under President Bush, the idea of a nationwide<br />

defense against a massive Soviet missile strike was abandoned<br />

in favor of Global Protection Against Limited Strikes or<br />

GPALS. This envisioned an integrated system that would<br />

provide protection against tactical/theater missiles as well as<br />

up to 200 nuclear warheads mounted on land or sea launched<br />

intercontinental ballistic missiles.<br />

But again outside events intervened. In the 1991<br />

Persian Gulf War, America suffered its first combat casualties<br />

caused by ballistic missiles. <strong>Air</strong> <strong>Force</strong> and special operations<br />

missions to find and destroy Iraq’s Scud missiles and their<br />

launchers met with no better success than the World War<br />

II effort, Operation Crossbow, to locate and hit the Nazi<br />

V-2 launch sites. The one apparent bright<br />

spot came from initial reports that the Patriot <strong>Air</strong> Defense<br />

system had achieved notable success in knocking out Scuds<br />

in their terminal ballistic phase, which was later modified<br />

substantially by engineers. Congress responded by enacting<br />

the Missile Defense Act that specified a ground only system of<br />

interceptors to protect U.S. territory to be deployed by 1996.<br />

“The Pentagon, however, said that meeting the 1996 deadline<br />

was not possible, but deployment by 2002 was (Rumsfeld 6).”<br />

When the Clinton Administration came to power<br />

in 1993, SDIO became the Ballistic Missile Defense<br />

Organization (BMDO). “Estimates that Iraq had been<br />

within 6 months of having a nuclear weapon with which<br />

it could have attacked its neighbors or used to blackmail<br />

the <strong>United</strong> <strong>States</strong>, fueled the psychology of missile defense,<br />

particularly deploying defenses in theatres around the world<br />

(Rumsfeld 7).” When the Republicans gained control of both<br />

Houses of Congress in 1995, the stage was set for a major<br />

push not just for developing and deploying theater systems,<br />

but for a National Missile Defense (NMD) system to be<br />

5<br />

deployed by 2003. Technological setbacks caused this date<br />

to slip to 2005, which is also the year in which, according to<br />

a 1999 National Intelligence Estimate, North Korea could<br />

field a missile capable of hitting the U.S. homeland. But in<br />

late 1999, North Korea agreed to stop developing its Taepo<br />

Dong 2 ICBM, which led a number of analysts to add a year<br />

to the Korean “threat development” time line. Concurrently,<br />

in mid-2000, retired <strong>Air</strong> <strong>Force</strong> General Larry Welch, the head<br />

of the National Missile Defense Independent Review Team<br />

created by the Pentagon to evaluate NMD, told the Senate<br />

Armed Services Committee that NMD’s “high risk” made a<br />

2005 deployment “unlikely (Rumsfeld 8).”<br />

Threats and World Impact<br />

To an extent seldom seen since Cold War days, the<br />

growing debate over the need for a NMD system has split<br />

public opinion. Pros and cons are discussed in increasingly<br />

emotional confrontations, which lead not to understanding<br />

but to angry, emotional, rejection of opposing views. What is<br />

there about NMD that produces such friction when the issue<br />

arises? It is because the decision to deploy an NMD system<br />

rests on the most fundamental issues of America’s role in the<br />

world and our relationship not only with our adversaries<br />

but with our closest allies as well. “It is not surprising that<br />

Russia and China are loud critics of NMD, but Germany,<br />

France, Great Britain and other western nations are also<br />

questioning the wisdom of proceeding with a program that<br />

threatens to ignite a new nuclear arms race (Evolution 19).”<br />

It may be possible to shrug off the anticipated arguments<br />

of countries often treated as enemies, but the <strong>United</strong> <strong>States</strong><br />

must give thoughtful consideration and great weight to<br />

the same criticism from its friends.<br />

President Clinton said that a final decision to deploy<br />

NMD must await satisfactory answers to four criteria. First,<br />

there must be a real threat. Secondly, the <strong>United</strong> <strong>States</strong> must<br />

have the technological means to address that threat effectively.<br />

Thirdly, the U.S. response must be affordable. Finally, NMD<br />

deployment must do acceptable damage to the stability of<br />

current and future international security arrangements. The<br />

fourth criteria is clearly the most critical. What good does a<br />

defense system do if it weakens the current strategic nuclear<br />

stability which was built over the last 30 years? Repeated<br />

U.S. threats to break the Anti-Ballistic Missile (ABM)<br />

Treaty of 1972, ignore the fact that there is a comprehensive<br />

arms control structure in which the individual treaties are<br />

interdependent. The first Strategic Arms Limitation Treaty<br />

(SALT I) of 1972 was negotiated in tandem with the ABM<br />

Treaty as a complementary measure, in which neither one was


possible without the other. Subsequently SALT II and the<br />

Strategic Arms Reduction Treaties I and II (START I and II)<br />

were erected on the SALT I/ABM foundation.<br />

The existence of this stabilizing arms control structure was<br />

recognized by other nations, most importantly by China, and<br />

thereby inhibited the expansion of other nuclear arsenals,<br />

while contributing to global nuclear non-proliferation efforts.<br />

“To pull out a keystone of arms control by breaking of the<br />

ABM Treaty could weaken nuclear stability worldwide,<br />

particularly because of the sensitivity of Chinese, Indian and<br />

Pakistani nuclear programs (Evolution 33).”<br />

Of equal concern is that NMD will certainly disrupt progress<br />

on future arms control agreements, which are essential to<br />

genuine reductions in still excessive nuclear arsenals. President<br />

Jacques Chirac of France identified this problem when he<br />

declared: “Nuclear disarmament will be more difficult<br />

when powerful countries are developing new technologies<br />

[NMD] to enhance their nuclear capabilities (Evolution 16).<br />

According to Chirac, “The great danger is that other nations,<br />

most notably China and Russia, will seek to enhance their<br />

own nuclear capabilities in response to the deployment of<br />

an American NMD system. In the political effort to justify<br />

deployment of defenses against a highly unlikely threat, the<br />

<strong>United</strong> <strong>States</strong> might undo significant arms control measures<br />

and end up facing much greater real nuclear dangers.<br />

While the end of the Cold War signaled a reduction<br />

in the likelihood of global conflict, the threat from foreign<br />

missiles has grown steadily as sophisticated missile technology<br />

becomes available on a wider scale. The proliferation of<br />

weapons of mass destruction and the ballistic and cruise<br />

missiles that could deliver them, pose a direct and immediate<br />

threat to the security of U.S. military forces and assets in<br />

overseas theaters of operation, our allies and friends, as well as<br />

our own country. We have already witnessed the willingness<br />

of countries to use theater ballistic missiles for military<br />

purposes. Since 1980, ballistic missiles have been used in<br />

six regional conflicts. Strategic ballistic missiles, including<br />

intercontinental (ICBMs) and submarine launched ballistic<br />

missiles (SLBMs) exist in abundance in the world today.<br />

This is why the U.S. is seeking to deploy a<br />

national missile defense system. By such an action the U.S.<br />

will signal to the world that they are willing to pursue illusory<br />

defenses against non-existent threats even though we subject<br />

all nations to continued nuclear competition and increased<br />

risks of a future nuclear war.<br />

6<br />

Works Cited<br />

Ballistic Missile Defense: Evolution and Current Issues. General<br />

Accounting Office Report GAO/NSIAD-93-<br />

229, July 1993.<br />

Ballistic Missile Defense: Information on Directed Energy<br />

Programs for Fiscal Years 1985 Through 1993. General<br />

Accounting Office GAO/NSIAD-93-182, June<br />

1993.<br />

Freedman, Lawrence. U.S. Intelligence and the Soviet Strategic<br />

Threat. Princeton University Press, 1986.<br />

From Nike-Zeus to Safeguard: U.S. Defenses Against ICBMs<br />

1958-1976. Union of Concerned Scientists, 1999.<br />

Lethbridge, Cliff. History of Rocketry Part I-Ancient Times<br />

up to World War II. New York: Bergeman, 1989.<br />

Missile Defense Milestones 1944-1993. Strategic Defense Initiative,<br />

Department of Defense, March 1993.<br />

Project Defender, Congressional Research Service Report 87-<br />

689S, July 1987.<br />

Reagan, Ronald. Peace and Security. March 23, 1983,<br />

Transcript of Television Address to the Nation, U.S.<br />

Department of State, Bureau of Public Affairs, Current<br />

Policy Series No. 472.<br />

Report to Congress: Plan for Deployment of Theater and<br />

National Ballistic Missile Defenses. Department of<br />

Defense, June 1992.<br />

The Rumsfeld Commission Report. The Congressional<br />

Record, July 31, 1998 (pp. S9522-9523).


WHERE DO PRIORITIES LIE, WITH MEN OR WITH<br />

THE MISSION?<br />

By C4C Michelle Bonneau<br />

General George S. Patton Jr. states, “Officers must<br />

be made to care for their men. That is the sole duty of all<br />

officers” (Contrails, 64). Throughout military history, leaders<br />

have asked themselves which is priority: one’s men or<br />

the given mission? As Patton clearly stated, it is the leader’s<br />

responsibility to take care of his/her soldiers, to train them<br />

and then to lead them in the accomplishment of the mission.<br />

This concept of duty is simple enough in writing but there is<br />

one thing that officers and soldiers must accept: when there<br />

is a battle or a war, people will die. Not only that, but during<br />

the time of war, soldiers are tested physically, emotionally, and<br />

mentally. The question is how far is a commander willing<br />

to push his men to accomplish any mission? Or perhaps in<br />

some instances, the better question becomes how many men<br />

is the commander ready to lose for the mission? The answers<br />

are controversial, but taking into account military history<br />

and past battles, successful leaders encouraged their men and<br />

exemplified high morale, but also realized men and resources<br />

often must be sacrificed to accomplish the more important<br />

mission. A vital mission with a clear objective should take<br />

precedence over men’s welfare in battle, but the men take priority<br />

during preparation operations before the mission.<br />

Doolittle Raiders<br />

On 18 April 1942 Lt. Col James H. Doolittle, after a<br />

few months of training, decided that accomplishing his mission<br />

was more important than the lives of the men he risked.<br />

Although this seems a harsh and unjust statement, such a<br />

thought could not be farther from the truth. After the Japanese<br />

destruction of Pearl Harbor in Hawaii, the <strong>United</strong> <strong>States</strong><br />

public and government called for retribution! Doolittle was<br />

selected by General of the <strong>Air</strong> <strong>Force</strong>, Henry H. “Hap” Arnold<br />

as commander of a bombing raid on Japan’s mainland. The<br />

objective of this raid was not to annihilate the enemy so much<br />

as to cause confusion, demoralize the Japanese and boost<br />

American morale. If Japan was driven to task resources for<br />

defensive operations as opposed to strictly offensive as seen<br />

in events such as Pearl Harbor, the <strong>United</strong> <strong>States</strong> would have<br />

more time and breathing room in which to plan future attacks<br />

( Whited ).<br />

After some deliberation, it was agreed that an attack<br />

on Japan would have to be launched from aircraft carriers.<br />

Japan itself was too far away from any Allied held air bases<br />

and the aircraft flown were too large, with no fuel to spare,<br />

to return to the carrier from which they launched. Doolittle<br />

painstakingly selected 24 crews for a force that was planned<br />

7<br />

to consist of 20 North American B-25B Mitchell medium<br />

bombers. After training the crews in takeoff procedures from<br />

the short runway available on top of a carrier ship, Doolittle<br />

briefed the crews on their mission (Chun, 152). Before they<br />

even knew they were going to bomb Japan, Doolittle made<br />

sure that they were properly trained, properly cared for and<br />

had the proper motivation and determination to conduct<br />

such a trip where so many things could go wrong. At this<br />

point, Doolittle’s priority was the well-being of his crews.<br />

Completing the mission was the end goal, but without<br />

trained men the mission was sure to fail.<br />

Trained and ready, the crews and aircraft boarded<br />

the USS Hornet, one of the four American carriers left in the<br />

Pacific, and set across the ocean to the Japanese islands. The<br />

air strike was originally set for the early hours of 20 April<br />

under the cover of night. Doolittle wanted the Hornet 450<br />

miles from Japan when the B-25’s were launched (Chun,<br />

153). At this distance the aircraft would have enough fuel to<br />

make it to Chinese landing sights which were predetermined.<br />

At most, Doolittle would accept a launch site of 550 miles.<br />

However, the aircraft ended up launching on 18 April in<br />

broad daylight from a range of 800 miles from the Japanese<br />

coast (Whited).<br />

The American attack force spotted a Japanese patrol<br />

boat that eventful day, causing the mission and launch to be<br />

undertaken immediately. Although forces sunk the patrol<br />

boat, Doolittle considered the possibility of a radio transmission<br />

getting through to Japanese forces. In order to keep the<br />

element of surprise and the best advantage towards accomplishing<br />

the mission, Doolittle launched his aircraft (Chun,<br />

153-154). He knew that after the mission was accomplished,<br />

his men may not have enough fuel to make it to safe ally territory<br />

in China. He also knew that safely landing the aircraft<br />

with a shortage of fuel would be miraculous feat (Whited).<br />

Months of training and extensive planning went into<br />

the Doolittle raid, only to be modified to the peril of those<br />

involved on split second decisions. But again, Doolittle had<br />

trained his crew--his raiders-- to complete their tasks for the<br />

greater good of the American nation and morale. Turning<br />

back was not an option. Failing to accomplish their mission<br />

was not an option. Sacrificing lives of his men would<br />

be a military casualty, but also a military victory in the wider<br />

scheme of the war. In the end, the mission was the ultimate<br />

priority.<br />

As a side note, only sixteen aircraft were selected<br />

for the Japanese bombing mission as opposed to the originally<br />

planned 20 aircraft force. Fifteen of the sixteen aircraft<br />

launched from the Hornet landed in China in relative safety.<br />

All the crews had to either bail out or crash landed their<br />

aircraft. The Japanese believed that the bombers had come


from Midway since their forces never found the USS Hornet<br />

or Enterprise (Whited). This led them to plan an attack on<br />

the islands where their navy met with considerable resistance,<br />

although the American forces were not always the greater in<br />

number or in arms. The Americans were simply blessed with<br />

capable leaders. These commanders knew the value and worth<br />

of their men would be tested in battle. They knew too that<br />

the mission comes first no matter the sacrifices or odds.<br />

Battle of Leyte Gulf<br />

Admiral Clifton A. F. Sprague defended Leyte Gulf<br />

and the Philippine islands from Japanese invasion. His victory<br />

is one of the most impressive battles against the Japanese<br />

in World War II. Outnumbered and outgunned by Japanese<br />

Vice Admiral Takeo Kurita, Sprague did everything he could<br />

to outmaneuver and outwit his enemy. Taffy 3, a 13 ship task<br />

force, relied on its courageous crews and the sacrifices they<br />

made in order to maintain their objective: keep the Japanese<br />

out of the Philippines and protect<br />

American ground forces ( Wukovits, 141).<br />

Sprague was assigned the command of Carrier Division<br />

25, which included the flagship Fanshaw Bay, an escort<br />

carrier and four destroyer escorts. He was later assigned the<br />

command of Taffy 3 with six escort carriers, three destroyers,<br />

and four destroyer escorts. Due to a previous negativeminded<br />

commander, Sprague’s flagship crew’s morale was<br />

extremely low (Wukovits, 111-112). His first task was to<br />

start building up the ship’s and unit’s morale. The Admiral<br />

knew men and therefore knew that low morale contributes<br />

to bad performance, whereas high morale achieves desired<br />

performance. Bad performance leads to unneeded deaths and<br />

loss of lives which was to be avoided when possible. Although<br />

his crew was still undermanned and overworked, because of<br />

the personal and sincere attention the crew received from<br />

their commander, their morale improved drastically. The<br />

crew also developed a loyalty and trust in Sprague which<br />

became fundamental for Sprague’s tactics in the later battle for<br />

Leyte Gulf (Wukovits, 113).<br />

The Japanese planned a massive attack centering<br />

on the Philippine islands consisting of multiple elements.<br />

Kurita, who didn’t have much faith in the Japanese plan,<br />

moved his fleet down the San Bernardino Strait right into<br />

Sprague’s miniscule force (Wukovits, 132). Vice Admiral William<br />

F. Halsey was to assist Sprague with an impressive fleet<br />

dubbed Task <strong>Force</strong> 34. However, Halsey fell for a Japanese<br />

diversion and ended up chasing Japanese carriers, bringing<br />

vital American forces away from aiding Sprague ( Wukovits,<br />

133-135).<br />

A time had come to face death or failure. Sprague<br />

realized this when he first viewed the Japanese fleet set against<br />

him. Sprague valued his men’s lives and well-being but he<br />

8<br />

also knew where his true loyalty at the time of the battle lay.<br />

He gave his men and ships 15 minutes against what he was<br />

sure would be a Japanese onslaught (Wukovits, 145). However,<br />

instead of retreating and saving the lives of his men and<br />

himself, Sprague chose to hold out and defend Leyte Gulf as<br />

ordered against almost impossible odds. This focus on priorities<br />

and the task at hand was an advantage that Sprague had<br />

over Kurita and it played a vital role in the two-and-a-halfhour,<br />

not 15 minute as<br />

Sprague originally expected, battle that ensued.<br />

Kurita didn’t believe in his commander’s complicated<br />

strategy. The Japanese forces were composed of three main<br />

parts. One would be “bait”, luring Admiral Halsey and the<br />

destructive, speedy American ships away. The other two<br />

would rendezvous at the Philippines simultaneously and take<br />

on whatever American forces were there. Kurita, arriving earlier<br />

than his counterpart commander, was sure that his forces<br />

would be demolished going against the Americans as planned<br />

(Wukovits, 116-117). He had no faith in his mission, which<br />

clouded his judgments. Even when he faced 13 small ships<br />

he should have destroyed easily, Kurita was expecting a large<br />

force and was surprised. As Sprague strategically maneuvered<br />

towards a rain squall away from Kurita’s ships, the enemy<br />

was confused. Kurita could stick to the mission and charge<br />

on to Leyte Gulf and the Philippines, or he could follow and<br />

destroy Sprague, fully expecting Sprague’s forces were superior<br />

compared to his (Wukovits, 146). He sacrificed his mission<br />

and advantage by fighting on Sprague’s terms.<br />

American forces commanded by Sprague put up a<br />

steady, yet somewhat desperate defense. Sprague called for<br />

aerial support to come to his aid, but was still out gunned.<br />

His ships and planes eventually ran out of ammo. Still,<br />

Sprague commanded them to continue harassing Kurita’s<br />

ships, even if simply a diversion. Lt Commander R.S. Rogers’s<br />

account of Sprague’s orders clearly illustrates the emphasis<br />

on defending Leyte Gulf at all costs, even at the high price of<br />

losing all men. As Squadron commander of Fanshaw Bay aircraft,<br />

he radioed in stating that his planes were out of ammo<br />

after three runs on the Japanese. Sprague replied, “Well, look.<br />

You just make dummy runs on the ships because every time<br />

you do, you draw fire away from my ships” (Wukovits, 155).<br />

Considering the alternative, American forces would<br />

lose many more men if one ship was sunk as opposed to aircraft.<br />

And because of the care and attention Sprague devoted<br />

to gaining his men’s trust and promoting courageous actions,<br />

they all knew that following his orders, at their own peril, was<br />

necessary. Strategically, Sprague’s reasoning was correct. Sentimentally,<br />

Sprague seems callous, but he reduced casualties<br />

overall and became victorious. Rogers also knew that men<br />

had to be sacrificed:


Sprague had to give the order to make dummy runs.<br />

It shows you the type of leader he was, he had his priorities<br />

in order and he did what he had to do. There’s<br />

a time you’ve got to do things for the greater good,<br />

like falling on a grenade. This was one of those times<br />

(Wukovits, 155).<br />

American forces had succeeded in knocking out<br />

Japan’s communication system. Therefore, Kurita, at the two<br />

hour mark, was unaware of how his ships vs. the Americans<br />

were faring. Thinking that his forces were losing, he called<br />

off the chase on Sprague and recalled his ships (Wukovits,<br />

175-178). In a battle he should have won, Kurita lost because<br />

he thought to save his men, his resources and didn’t strive to<br />

accomplish his mission. He was outwitted by a leader who<br />

had his priorities straight, which cost him and the Japanese a<br />

vital victory in WWII.<br />

The Red Army<br />

In relatively modern warfare, Russia has been the<br />

only nation to put mission completion far above the wellbeing<br />

and lives of its military soldiers. It is irrefutable that<br />

men are considered an essential resource for any military<br />

force during war, especially the army. Throughout history,<br />

the more men in a nation’s army the more probable that the<br />

nation would win the battle and the war. However, a nation’s<br />

fighting soldiers can amount to such a staggering number that<br />

the men lose their human identity and simply become tools<br />

to be used and disposed of at the government’s or their superior’s<br />

will. The Soviet Army during WWII used its citizens<br />

to amass a great standing army, but also forgot that so many<br />

men require care, coordination, and proper training in order<br />

to be an asset to the military. The prevailing mentality of the<br />

Red Army was to defeat the enemy by overrunning them with<br />

a greater force, despite the probability of substantial casualties<br />

(Sysa). Men were expendable…just achieve the military goal.<br />

Nikolai Lenin, leader of the Bolshevik party that<br />

started a revolution and participated in the civil war that<br />

took place in Russia, realized early-on that the old Imperial<br />

Army under the Tsar’s command had to be immobilized and<br />

destroyed. He set out to create an “army of a new type,” an<br />

army for the people to protect their rights and spread Russian<br />

influence and ideals. The Bolshevik party focused on<br />

mobilizing Red Guards, who were armed worker detachments<br />

(Reese, 7-9). The party also sought out peasants, first<br />

allowing them to volunteer, then instituting a military draft to<br />

increase the size of the Red Army since there were few volunteers.<br />

Eventually, the army would grow to 5 million soldiers<br />

by the end of Russia’s civil war. However, desertion rates<br />

were considerably high. The army and its leaders had a hard<br />

time equipping, arming, housing, feeding, and paying its sol-<br />

9<br />

diers which carried over into the eve of World War II ( Reese,<br />

12-14). With their basic needs unmet and forced against their<br />

will to enter into the army, many felt desertion was their only<br />

way out.<br />

To curb desertion and set a future principle, Russian<br />

leader Leon Trotsky instituted Order Number 65, which<br />

illustrated his “no tolerance” mindset. It also conveyed to<br />

the men that they were expendable and should they choose to<br />

forfeit their duty, they would also forfeit their lives to armed<br />

fellow citizens. The Order stated that any “scoundrel” who<br />

encourages retreat, desertion or not fulfilling an order was<br />

to be shot. Any soldier who left his rifle or sold parts of his<br />

uniform was to be shot. Any soldier who deserts on the front<br />

line was to be shot. Lastly, Trotsky also stated that should any<br />

deserter be harbored, the people are liable to be shot and their<br />

house will be burnt down (Reese, 13). Again, with Order<br />

Number 65, Trotsky aimed to motivate Russian soldiers to<br />

succeed in battle, succeed in their mission and never think<br />

about retreating from their line of duty…or else!<br />

Leading up to World War II, conditions and morale<br />

of the Red Army did not improve much, if at all. Housing<br />

was horrible and in short supply. Barracks sometimes<br />

lacked indoor plumbing and lighting. The buildings were<br />

often cheaply and poorly constructed as well. Food was also a<br />

huge morale depressor. There wasn’t enough, especially when<br />

famine struck during 1923 – 1933, when many men suffered<br />

from malnutrition. On the flip side, it was discovered the<br />

officers were eating well, taking most of the scant food for<br />

themselves (Reese, 65-66). Not only does this show the leaders’<br />

irresponsibly, such actions demonstrate the callousness of<br />

the officers towards their men’s health and their lack of duty.<br />

Malnourished soldiers are a liability to the accomplishment of<br />

any given mission.<br />

In 1939, Stalin could not avoid World War. His<br />

army lacked leadership and properly outfitted and trained<br />

men. Still, he wrote a set of “regulations” to give the military<br />

some scope of an objective and a basis for all missions to be<br />

carried out in the future. One, Stalin indicated that any<br />

enemy who attacks the Union of Soviet Socialist Republics<br />

would be mercilessly crushed by the Red Army. If the enemy<br />

forced Russia into war, the army would proceed to launch an<br />

offensive relying on vast numbers of human resources to gain<br />

the advantage in the ensuing battle ( Reese, 94). With such<br />

guidelines, Stalin left no room to doubt which he held higher<br />

in importance, mission or men.<br />

Like Trotsky before him, Stalin issued Order 227<br />

stating that soldiers should take “not one step backwards”<br />

in battle, else they would be shot by their fellow Russians.<br />

Stalin could always find more men due to the Soviet Union’s<br />

vast territory. The Red Army even started enlisting women


to fight as well. ( Reese, 115) So the choice faced by Russian<br />

soldiers was to kill the Germans or be killed by the<br />

Germans; kill the enemy or be killed by Russians. Order<br />

227 was provided for proper “motivation” to accomplish<br />

their duty and defend their homeland by overwhelming<br />

the enemy.<br />

In sum, Russia’s extreme priorities of completing<br />

the mission at all costs led to many victories in World<br />

War II. However, battles were won at the expense of millions<br />

of lives. The Battle of Berlin cast 300,000 Russian<br />

soldiers, a sum greater than all American losses during the<br />

entire war. Russia by far had the highest fatality and causality<br />

rate out of all nations involved in World War II.<br />

What is more important, men or accomplishing<br />

missions? Although there is no straight answer to this<br />

question, it stands to reason that training men and combat<br />

readiness has one end in site: battle. And in every battle<br />

or war there is a military objective to gain, which makes<br />

training men and seeing to their overall readiness vital to<br />

the success in obtaining the objective. Leaders should<br />

motivate their men, encourage them to excel at their training<br />

and promote military awareness. As witnessed with<br />

Admiral Sprague and Doolittle in World War II, during<br />

the preparation phase, men take initial priority and a commander’s<br />

focus. But it should not be forgotten that every<br />

military decision a commander makes is foreshadowed by<br />

something that is bigger than the lives of his men. A successful<br />

mission is the ultimate goal.<br />

The <strong>United</strong> <strong>States</strong> military forces have striven to<br />

avoid massive amounts of casualties. Russian losses during<br />

WWII were drastic, though the army did succeed in winning<br />

many of its battles. Russian leaders also knew the<br />

importance of mission over men but perhaps at too drastic<br />

a cost. More men may be more advantageous in battle<br />

but as Sprague and Doolittle demonstrated, few highly<br />

motivated and exceptionally well trained men can have<br />

just as devastating an impact on their enemy, succeeding<br />

and sometimes surpassing mission objectives. Either way,<br />

large army or small, multiple resources or minimum force,<br />

the military is always striving to accomplish something,<br />

achieve a goal. Men, technology, and strategies are all just<br />

parts working together to obtain and surpass a given task.<br />

Victory lies in mission completion.<br />

10<br />

htm ><br />

Works Cited<br />

Chun, Clayton K.S. War, Military, Theory, and Strategy.<br />

Boston, New York:<br />

Houghton Mifflin Company, 2002.<br />

Contrails, Volume 49. <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>,<br />

2003.<br />

Reese, Roger R. The Soviet Military Experience.<br />

New York: Routledge, 2000.<br />

Sysa, Andrey. “Tactics in the Winter War.” Winterwar.com.<br />

2003. Sam<br />

Korhonen. < http://www.winterwar.com/tactics.<br />

Whited, Bert W. “The Bombing of Tokyo.” USS Salt<br />

Lake City.com. Sandy<br />

Thompson. 13 October 2003.<br />

<br />

Wukovits, John F. Devotion to Duty. Annapolis,<br />

Maryland: Naval Institute Press,


“THE ANATOMY OF CLOSE AIR SUPPORT”<br />

BY<br />

C1C BRANDON BURNS<br />

INTRODUCTION<br />

The birth of the airplane had a revolutionary effect<br />

on warfare, adding a much needed third dimension to the<br />

battlefield. During the course of World War I, airpower came<br />

to be employed in various types of missions to include strategic<br />

bombardment, air interdiction, air superiority, and close<br />

air support. Since gaining independence from the U.S. Army,<br />

the Army has made claims that the <strong>Air</strong> <strong>Force</strong> is not committed<br />

to close air support. 1 Despite such attitudes, the <strong>Air</strong> <strong>Force</strong><br />

has sought to provide close air support systems comprised<br />

of trained pilots, well suited aircraft, command and control<br />

(C 2 ) capabilities, and a variety of additional components that<br />

join to form the close air support (CAS) system or “body”<br />

(see “Limitations of the Study” below for further discussion<br />

of the analogy to the human body). From the legendary P-<br />

47 Thunderbolt to the respected A/OA-10 Thunderbolt II,<br />

the U.S. <strong>Air</strong> <strong>Force</strong> has kept its guarantee to provide CAS. 2<br />

However, military aircraft have not been the only systems to<br />

evolve with the times. The introduction of new technologies<br />

has resulted in significant progress in CAS and the U.S. <strong>Air</strong><br />

<strong>Force</strong> has chosen to incorporate technology into all aspects of<br />

the CAS mission. Doctrine, capabilities, and technology are<br />

interrelated, and there is debate about whether the new technology<br />

and the addition of new capabilities will adequately<br />

fulfill the prescribed doctrine for CAS. The complete answer<br />

to this debate requires an understanding of the CAS body.<br />

The latest edition of <strong>Air</strong> <strong>Force</strong> Basic Doctrine states<br />

that:<br />

Close <strong>Air</strong> Support (CAS) consists of air<br />

operations against hostile targets in close proximity<br />

to friendly forces; further, these operations require<br />

detailed integration of each air mission with the fire<br />

and movement of those forces. CAS provides direct<br />

support to help friendly surface forces carry out their<br />

assigned tasks. To be most effective, however, CAS<br />

should be used at decisive points in a battle and<br />

should normally be massed to apply concentrated<br />

combat power and saturate defenses. 3<br />

To fulfill this mission the aircraft requirements for<br />

CAS have changed little since its debut as an <strong>Air</strong> <strong>Force</strong> mission.<br />

A specialized aircraft, the A/OA-10, has been developed<br />

for the CAS mission and is therefore especially well suited for<br />

such tactical employment. The <strong>Air</strong> <strong>Force</strong> plans to introduce<br />

11<br />

the F-35 Joint Strike Fighter (JSF), a multi-role fighter that<br />

will replace the venerable Fairchild Republic A/OA-10 as<br />

the primary CAS weapons platform. Other aircraft, such as<br />

the Rockwell B-1B, have also recently proven their combat<br />

effectiveness while supporting ground operations. With such<br />

aircraft readily available to carry out the CAS mission, it is<br />

arguable that combinations of A/OA-10s, B-1Bs, and other<br />

aircraft may be able to efficiently support CAS operations for<br />

the foreseeable future. Possibly having more attention than<br />

necessary, the <strong>Air</strong> <strong>Force</strong> has concentrated on one component<br />

of the CAS body: weapons platforms. Weapons platforms,<br />

which unarguably need to be upgraded over time, combine to<br />

form just one system, the muscular system, of the CAS body.<br />

True fulfillment of the CAS mission lies in the development<br />

of the entire CAS organization.<br />

Research Question<br />

The U.S <strong>Air</strong> <strong>Force</strong> must concentrate on acquiring<br />

new or upgrading existing tools that can successfully be<br />

employed during CAS operations based on application of the<br />

desired doctrine. CAS is a specialized and unique mission,<br />

and recent U.S. <strong>Air</strong> <strong>Force</strong> trends support future CAS capabilities,<br />

especially for weapons platforms. Based on recent<br />

U.S. combat experiences, adaptations to current U.S. aircraft,<br />

and the transformational approach towards the military as a<br />

whole, the question remains: Given its cultural disposition<br />

to focus on platforms, has the U.S. <strong>Air</strong> <strong>Force</strong> neglected other<br />

systems of the CAS body, while seeking to produce optimum<br />

capabilities for CAS? Recognition of this is crucial to ensure<br />

that the U.S. <strong>Air</strong> <strong>Force</strong> is heading in the right direction to<br />

prepare to meet new and growing challenges involving lowintensity<br />

conflicts which may be expected to impose increased<br />

requirements for CAS.<br />

Limitations of the Study<br />

The purpose for this research is to identify and<br />

support the best approach for <strong>Air</strong> <strong>Force</strong> CAS development<br />

through an analysis of capabilities based on needs and requirements.<br />

This paper seeks to view CAS as a body consisting of<br />

many systems that work together, much like the systems in<br />

the human body. This paper approaches CAS broader than<br />

most CAS analyses; however, the paper will dissect CAS and<br />

examine each system to see how each system is intertwined<br />

with another. After examining all these systems, there will<br />

be a diagnosis of the CAS body and an explanation of where<br />

problems may exist that require treatment. Training is not a<br />

focus of this paper. Although training is mentioned in a discussion<br />

of the CAS systems, training at any level, is not part


of CAS capabilities.<br />

Definitions and Assumptions<br />

Definitions<br />

Before examining the CAS body however, there are<br />

some terms and ideas that must be defined.<br />

Command and control, or C 2 is:<br />

The exercise of authority and direction<br />

by a properly designated commander over<br />

assigned and attached forces in the accomplishment<br />

of the mission. Command and<br />

control functions are performed through<br />

an arrangement of personnel, equipment,<br />

communications, facilities, and procedures<br />

employed by a commander in planning,<br />

directing, coordinating, and controlling<br />

forces and operations in the accomplishment<br />

of the mission. 4<br />

Capabilities – Hardware used in CAS<br />

Hardware – includes assets such as weapons platforms,<br />

munitions, information networks and infrastructure,<br />

command and control infrastructure.<br />

JSTARS – Joint Surveillance Target Attack Radar<br />

System<br />

SAMS – Surface-to-<strong>Air</strong> Missile<br />

IADS – Integrated <strong>Air</strong> Defense<br />

AAA – Anti-<strong>Air</strong>craft Artillery<br />

PGM – Precision Guided Munition<br />

LGB – Laser Guided Bomb<br />

GPS – Global Positioning System<br />

JDAM – Joint Direct Attack Munition<br />

AOC or CAOC – <strong>Air</strong> Operation Center or Combined<br />

<strong>Air</strong> Operation Center<br />

ATO – <strong>Air</strong> Tasking Order<br />

SATCOM – Satellite Communication<br />

CFACC – Combined <strong>Force</strong> <strong>Air</strong> Component Commander<br />

CFLCC – Combined <strong>Force</strong> Land Component Commander<br />

ISR – Intelligence, Surveillance, and Reconnaissance<br />

Many terms used in this paper will have a biological<br />

connotation. Because this paper is treating CAS as a body,<br />

words such as system: CAS body as related to functions in a<br />

human body. For instance, muscular system, nervous system,<br />

circulatory system, and skeletal system.<br />

Assumptions<br />

In order to propose a convincing diagnosis, the fol-<br />

12<br />

lowing two points will be assumed as being known. First, one<br />

must have a basic understanding of how CAS is executed tactically<br />

because it is essential in developing the mission requirements<br />

for CAS and prescribes a rudimentary depiction of the<br />

environment where CAS operates, thus indirectly identifying<br />

mission essential capabilities. This point will be expanded in<br />

the following sections. This will then enable a link between<br />

CAS as a mission to CAS as a body.<br />

Understanding of basic CAS is incomplete without<br />

knowledge of the overall trend for current operations.<br />

Second, given the current international environment and<br />

associated security issues, the need for the <strong>Air</strong> <strong>Force</strong> to provide<br />

CAS is likely to increase. Most modern combat consists<br />

of relatively small scale ground engagements that require air<br />

support. Because of the countries and organizations that<br />

military force is being used against, enemy air-to-air conflict<br />

is rarely encountered, but surface-to-air threats still exist. The<br />

little air-to-air threat that is present is comprised of obsolete<br />

aircraft and/or ill trained crews. This is a significant consideration<br />

because emphasis must be placed on treatment of a<br />

system that will ensure proper CAS development. If the goal<br />

is to develop a cross-country runner, then a doctor should not<br />

prescribe treatment that is tailored for a boxer. In much the<br />

same way, knowing the combat environment specifies the type<br />

of treatment needed for CAS. If the environment dictated<br />

CAS in an open battlefield against tanks, the treatment would<br />

be different than for urban operations.<br />

Preview of Argument<br />

First, this paper will determine what the systems are<br />

that make up the CAS body. This will be done by describing<br />

the doctrine and tactics of <strong>Air</strong> <strong>Force</strong> CAS. The doctrine<br />

portion will explain what the <strong>Air</strong> <strong>Force</strong> already knows about<br />

CAS and how it should be conducted. Second, tactics will be<br />

examined to describe how the <strong>Air</strong> <strong>Force</strong> conducts CAS operations.<br />

Additionally, this will explain what coordination takes<br />

place and what military assets are used to yield a successful<br />

CAS mission. Once it has been established what assets are<br />

used, these assets and prescribed tactics will be linked to the<br />

body systems for analysis.<br />

Next, the analytical step will have both a description<br />

and analysis of each system. This will take each system, which<br />

has been paired to a function or assets used to perform CAS,<br />

and dissect the system. The dissection is an in-depth examination<br />

to determine the intricate workings and how the <strong>Air</strong><br />

<strong>Force</strong> has attended to or neglected the development of this<br />

system. At the end of each system analysis, this paper will<br />

provide a possible answer for the research question with disregard<br />

to other systems. This preliminary diagnosis, which will


consider multiple possible answers to the research question<br />

from each system analysis, will be scrutinized in the following<br />

section.<br />

The third section will introduce counter arguments<br />

against the preliminary diagnosis. It will evaluate existing<br />

arguments against the preliminary diagnosis and determine<br />

if the premise and support for the counter arguments can be<br />

applied to a physical or metaphysical flaw of the CAS body.<br />

This section will then take the evaluations and support the<br />

diagnosis or establish a new diagnosis.<br />

The forth section and conclusion will study the<br />

current and predicted environment for CAS operations.<br />

Although this paper may have established a diagnosis for<br />

CAS, no evaluation is complete without treatment. To establish<br />

the best possible treatment it must be known what CAS<br />

is being treated for, e.g. CAS operations in European style<br />

battles with tanks, or low intensity conflicts characterized by<br />

urban operations. The conclusion will then establish where<br />

the possible flaw for CAS exists, if any, and the best possible<br />

treatment to ensure the U.S. <strong>Air</strong> <strong>Force</strong> is heading in the right<br />

direction to develop CAS to meet new and growing challenges.<br />

It will also include areas for future research and touch<br />

on developing capabilities that may aid in developing the<br />

CAS body.<br />

LITERATURE REVIEW<br />

What is CAS and How is It Performed?<br />

Literature defining CAS lends itself to a fair amount<br />

of criticism because most students of strategic studies tend to<br />

side one way or another. One side of the argument takes the<br />

<strong>Air</strong> <strong>Force</strong> stance, claiming that CAS is important, that it is an<br />

important <strong>Air</strong> <strong>Force</strong> mission, and that the <strong>Air</strong> <strong>Force</strong> is committed<br />

to it. On the other, there are those who side with the<br />

Army, stating that the <strong>Air</strong> <strong>Force</strong> neglects CAS. Since there<br />

are two sides to this argument, there arises a fundamental difference<br />

in defining CAS. Doctrine is a fairly reliable place<br />

to start, but doctrine has its limitations. <strong>Air</strong> <strong>Force</strong> doctrine<br />

defines what CAS is, but it takes CAS to the extreme side of<br />

this two sided argument, and the same holds true for Army<br />

doctrine. One major flaw that the <strong>Air</strong> <strong>Force</strong> doctrine makes<br />

is the use of the words “close proximity” and “detailed integration”<br />

5 . Although catchy, they have a vague translation,<br />

especially if one considers that the Army and <strong>Air</strong> <strong>Force</strong> may<br />

interpret these differently. What is in close proximity? Is it<br />

the distance between friendly troops and supporting aircraft,<br />

friendly troops to munitions impact, friendly troops and the<br />

enemy, or is it friendly troops and enemy fire? Doctrine provides<br />

a starting point, but because of translation issues it can<br />

13<br />

only establish a loose description of CAS.<br />

A better approach to defining what CAS is, and how<br />

it is really conducted, is to use case studies. Although case<br />

studies are a better approach, they too have misleading flaws.<br />

The case studies on the first Gulf War (Operation Desert<br />

Storm) are extensive. An analysis by Maj Leon Elsarelli<br />

helps to establish a case that there are limitations created by<br />

the environment where CAS operations take place. Elsarelli<br />

makes the claim that the U.S. failed to control the low altitude<br />

environment. This may be true, but he does not identify<br />

why we failed. Knowing why the U.S. failed may change the<br />

conclusion. He went further by stating that the U.S. needs<br />

specialized aircraft with capabilities to withstand attacks. If<br />

one knows why the U.S. failed to control low altitudes, then<br />

a conclusion may be formed such that the U.S. needs more<br />

JSTARS aircraft to observe the area. For this reason, case<br />

studies surrounding CAS can be too general in their description.<br />

Some provide a detailed description of the environment<br />

while others describe the environment only enough to support<br />

their argument, much like Elarelli. Col Edward Mann<br />

has a similar flaw when stating that B-52s lacked significant<br />

strategic objectives, so they became CAS platforms. 6<br />

Most case studies, however, do provide important<br />

information, albeit sometimes indirectly. LtCol Philip<br />

“Goldie” Haun, writing on Operation Allied <strong>Force</strong> in 1999,<br />

identifies the anti-aircraft threats and the U.S. concern for<br />

casualties, then explains what aircraft were used to attack Iraqi<br />

targets in the first Gulf War in 1991. 7 On the basis of Haun’s<br />

comments, it can be inferred that CAS requires a system to<br />

detect threats and relay that information to planning cells and<br />

aircrews. Direct descriptions, however, do exist and Elsarelli<br />

explains that CAS requires aircraft to fly at low altitudes, use<br />

visual identification of targets, and that friendly troops may<br />

be so close that they could be wounded by CAS. 8 Both indirect<br />

and direct descriptions provide significant information<br />

because they identify what CAS is and how it is performed.<br />

The conflicts in the Balkans are another significant<br />

low-intensity conflict. These conflicts for analysis include<br />

Bosnia-Hercegovina (Operation Deliberate <strong>Force</strong>), and Serbia<br />

(Operation Allied <strong>Force</strong>). LtCol Richard Sargent details the<br />

CAS operations during Operation Deliberate <strong>Force</strong>. Like<br />

Haun and Elsarelli, Sargent focuses on the operational environment.<br />

He identifies conditions that inhibit CAS operations,<br />

such as weather, foliage, and terrain. 9 This implies that<br />

CAS is not limited to missions during daytime and optimal<br />

weather. Both Sargent and Elsarelli examine the surface-toair<br />

threats in the environment. Sargent explains that CAS<br />

aircraft, particularly A/OA-10s usually orbit outside of target<br />

areas for on-call CAS. 10 Elsarelli adds that when CAS is called<br />

upon it requires aircraft to fly low over the target areas, put-


ting the aircraft within rage of anti-aircraft weapons. 11 This<br />

creates the need for a rugged design to withstand damage.<br />

Although neither Sargent nor Elsarelli directly state what<br />

aircraft capabilities are most effective, Sargent explains valuable<br />

performance enhancing additions that were used e.g.,<br />

LANTRIN pods. 12<br />

Haun assesses the use of CAS in Operation Allied<br />

<strong>Force</strong>. The environment is analogous to that of Operation<br />

Deliberate <strong>Force</strong>, and much of the same derived capabilities<br />

can be extracted. Haun, however, makes one statement of<br />

particular interest in acknowledging problems with locating<br />

and identifying targets, and limiting collateral damage<br />

while still successfully attacking. 13 This examination provides<br />

important facts from which inferences can be drawn about<br />

capability enhancements and munitions.<br />

The Somalia conflict is centered on the Army’s<br />

delivery of CAS, but Elsarelli identifies through it the special<br />

attention required for urban warfare. Low-intensity conflicts,<br />

characterized by this type of warfare, are points of interest.<br />

Like Haun’s statement concerning visual identification,<br />

Elsarelli uses this environment to highlight visual identification<br />

as a problem due to the use of “technicals”, which are<br />

regular vehicles mounted with weapons. 14 Even with guided<br />

munitions, it can be difficult to decipher between technicals<br />

and ordinary vehicles when using high altitude imagery.<br />

Afghanistan (Operation Enduring Freedom) and<br />

the second Gulf War (Operation Iraqi Freedom) are two of<br />

the most recent military operations, and are requiring more<br />

time to evaluate. To aid in evaluating Operation Enduring<br />

Freedom, however, Maj Anton Eret of the 34 th Education<br />

Group, U.S. <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>, provides substantial primary<br />

information about the CAS operations. Maj Eret is a B-1B<br />

Weapons System Officer, a U.S. <strong>Air</strong> <strong>Force</strong> Weapons School<br />

graduate, and actively participated in Operation Enduring<br />

Freedom. He has furnished a detailed account of <strong>Air</strong> Tasking<br />

Orders (ATO) and how they were designed to support CAS<br />

operations. 15 He also explains how the physical and combat<br />

environment presented specific problems for smaller aircraft<br />

like the A/OA-10.<br />

CAS platform problems during Operation Enduring<br />

Freedom were open to the use of the strategic bomber force.<br />

Eret describes how the combat environment, mainly due to<br />

altitude restrictions, allowed operations of large aircraft with<br />

large payloads. He also cites new munitions that allowed<br />

pin-point accuracy from higher altitudes. This information,<br />

provided by Eret, will help to evaluate other potential CAS<br />

aircraft characteristics that cannot be extracted in any of the<br />

previous operations.<br />

By extracting the needed capabilities from all of the<br />

case studies, a comparison to CAS body functions can be<br />

14<br />

made. This section relies on <strong>Air</strong> <strong>Force</strong> instruction manuals<br />

and pamphlets because they explain how integration among<br />

systems within the CAS body is supposed to work. Information<br />

from manuals, however, only provides a “perfect world”<br />

operation. No matter how smoothly an operation goes,<br />

there will be some problems. The manuals explain how an<br />

<strong>Air</strong> Operation Center works, but do not address problems<br />

that are encountered during actual operations, thus it is also<br />

important that case studies and reports are also examined to<br />

provide data on issues that have significant problems.<br />

Munitions study has a limited number of sources.<br />

The munitions data to include capabilities, delivery platforms,<br />

and other such information, can be obtained through the<br />

1999 Weapons File and the Federation of American Scientists.<br />

16 These sources provide the basic data, but fail to incorporate<br />

an explanation of the most effective delivery in terms<br />

of munitions combinations, altitudes, speeds, and delivery<br />

volume. Maj Anton Eret is the core source for the munitions<br />

study and a key to this research because of his U.S. <strong>Air</strong> <strong>Force</strong><br />

Weapons School background. His knowledge and practical<br />

experience in current operations provide a cornerstone for the<br />

application of munitions in CAS operations. His comprehension<br />

of the current weapons will provide the needed information<br />

for effective munitions research.<br />

A recent scholarly study conducted by Dr. David<br />

Mets, The Long Search for a Surgical Strike, analyzes the effects<br />

new weapons technology has had on operations such as CAS,<br />

similar to the information from Eret. 17 The limitations of this<br />

munitions analysis stems from the lack of previous research<br />

conducted on effective operation during deployment. Until<br />

recently, little evaluation has been placed on munitions capabilities;<br />

rather the focus has been on the weapons platforms<br />

themselves. Further research will be required as well as an<br />

updated weapons guide.<br />

THESIS BODY<br />

The CAS Anatomy<br />

Close air support is a complex entity. Similar to the<br />

way in which a human body is comprised of a collection of<br />

systems with specialized functions, the CAS body can only<br />

function efficiently and effectively if all of its systems are<br />

integrated together. CAS is supported by systems that can<br />

be likened to the muscular, skeletal, circulatory, and nervous<br />

systems, much like systems in the human body. The skeletal<br />

system for CAS provides the same function as any other<br />

skeleton: structure. In the context of CAS, the structure is<br />

not formed by bones, but by doctrine. Military doctrine,<br />

especially in the <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong>, is the foundation<br />

that shapes military operations and, therefore, the CAS<br />

operational architecture. Doctrine is limited because it only<br />

provides a general frame upon which other functions build.


The CAS skeletal system provides abilities and limitations<br />

for other CAS functions, allowing them to strengthen or<br />

weaken, grow or atrophy as required by a given CAS operation.<br />

This is not too difficult to understand when one realizes<br />

that modern U.S. military planning is formulated on the basis<br />

of effects-based operations. Without a solid structure that<br />

provides a construct for other systems to grow upon, the CAS<br />

body would be a conglomeration of unorganized systems ineffectively<br />

attempting to perform complex operations.<br />

While the skeletal structure is essential, it is hopelessly<br />

inadequate to perform functions unless it is combined<br />

with other systems. In the same way, doctrine cannot fight<br />

a war without troops, equipment, training, and orders. The<br />

CAS body’s version of the muscular system can be viewed<br />

as the kinetic means in which operations take place. This<br />

idea is indicative of a muscular system; however, it is hard<br />

to conceptualize in the context of CAS operations. Within<br />

the CAS body, there are only two forms of kinetic activities:<br />

the employment of munitions and the mode or platform<br />

from which they are delivered. In the context of CAS, the<br />

weapons delivery platforms are synonymous to legs and feet,<br />

while the munitions can be thought of as hands. The legs<br />

(weapons platforms) provide a mode of transportation for<br />

the hands (munitions) to actively engage the target. When<br />

power (muscles) is combined with a frame (skeleton), one can<br />

see the importance of having both; all the power in the world<br />

is only dead weight if it is not given a framework for projection.<br />

Likewise, a structure is unable to provide force without<br />

a means of execution.<br />

The CAS mission, unfortunately, is too intricate<br />

to be performed by a mindless creature of massive structure<br />

and power. CAS must be integrated with detailed coordination<br />

in order to perform the mission in close proximity to<br />

friendly forces and in a dynamic environment. The circulatory<br />

(personnel) and nervous (training) systems are the two<br />

mechanisms that allow for such functions to take place.<br />

These systems combine to form the heart and soul of the<br />

CAS mission as part of the nervous system and all of the circulatory<br />

system concentrate on the trained people who work<br />

together to perform a CAS operation. Although training and<br />

personnel issues are not topics of discussion in this paper,<br />

they cannot be disregarded as key features to the efficiency<br />

and effectiveness of the CAS body. It is important to note the<br />

contribution of the circulatory system. In the CAS body, it<br />

allows for the flow of new personnel with innovative ideas and<br />

methods to each part of the body. These ideas can help foster<br />

growth or adaptations of other functions. New outlooks and<br />

methods, dubbed “transformation” in the military realm, is<br />

an important part of the modern U.S. military, but transformational<br />

changes can only be executed by technically skilled<br />

15<br />

operators. 18<br />

These technically skilled operators, found in many<br />

diverse career fields to include the cockpits, <strong>Air</strong> Operations<br />

Centers, High Value Aerial Assets, command and control centers,<br />

and intelligence processing centers, are the neuromuscular<br />

connections that convert information to motion. Included<br />

in the nervous system is also the eyes, ears, brain, and nerves;<br />

each can be associated with a part of the CAS body. When<br />

the nervous system is combined with the other three systems,<br />

CAS becomes a fully integrated, functional, and effective<br />

military operation.<br />

The CAS body does have vulnerabilities and weaknesses<br />

that can be exploited or cause functional problems,<br />

just as human bodies are not immune to diseases, trauma,<br />

and minor injuries. Unlike a human, however, the CAS body<br />

cannot just visit a local doctor; it must be dissected and analyzed<br />

to form a proper diagnosis.<br />

The Muscular System<br />

The <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> has spent billons of dollars<br />

to research and develop some of the most sophisticated<br />

aircraft the world has ever seen. The legacy of U.S. CAS platforms<br />

dates back to World War II and the P-47 Thunderbolt.<br />

Its eight 50 caliber machine guns and robust body construction<br />

allowed the P-47 to prevail at lower altitudes and under<br />

fire when other aircraft were more likely to develop malfunctions<br />

due to enemy fire. 19 Continuing with these design characteristics,<br />

the <strong>Air</strong> <strong>Force</strong> adopted the A-1H Skyraider during<br />

the Vietnam War, and the A-10 Thunderbolt II. These aircraft<br />

have design characteristics that allow them to be effective<br />

CAS platforms based on their durability, firepower, and ironically,<br />

their slow speed.<br />

The A-10 has become a trusted sight for many of the<br />

troops serving on the ground due to its firepower. The A-10’s<br />

30mm Gatling gun and uranium depleted rounds can make<br />

quick work of enemy armored units. The cockpit is designed<br />

around the gun barrel and is enclosed by a titanium shell,<br />

providing increased protection for the pilot and avionics. The<br />

uniquely cambered wings allow greater lift when loaded with<br />

a variety of munitions. The wings are not swept and have<br />

eleven pylons that can be loaded with 16,000 lbs of bombs<br />

and missiles including the AGM-85 Maverick, AIM-9 Sidewinder,<br />

and Mk-82, -83, and -84 bombs. 20 The two twin<br />

turbo fan engines are set higher than the wings to increase<br />

protection. The A-10 also has an internal feature that is<br />

unlike most modern aircraft, a non-hydraulic powered control<br />

capability that allows the pilot to fly the aircraft even if all the<br />

hydraulics have failed. 21 Ugly at best, the A-10 is designed to<br />

be the tank of the sky with the sole mission of providing CAS<br />

to those who need it.


Platforms, however, are moving away from A-10<br />

type aircraft and becoming less mission-based. Advances in<br />

technology and new tactics have made mission titles for aircraft<br />

obsolete. Strategic bombers, attack fighters, and fighter/<br />

bomber designations are becoming combined. Desert Storm<br />

in 1991 saw the use of B-52 bombers as CAS platforms. 22<br />

Operation Enduring Freedom (OEF) and Operation Iraqi<br />

Freedom (OIF) employed B-1s, B-52s, F-16s, F-15Es, and<br />

A-10s in support of CAS missions, though each aircraft was<br />

designed for another mission (long range strategic bombing<br />

(B-52), low level nuclear strikes (B-1), short range inexpensive<br />

fighter (F-16), and air superiority tactical fighter (F-15). 23<br />

Each aircraft has been refitted with avionics that allow it to<br />

execute the CAS mission.<br />

The legs of CAS are also being improved. The introduction<br />

of the F/A-22 will exhibit increased survivability<br />

because of its stealth, speed, and avionics. Like the F/A-22,<br />

the F-35, which is slated to be the true CAS platform replacement,<br />

has similar features to the F/A-22. Neither, however,<br />

has the same robust construction, payload, or main gun of<br />

the A-10. When examined with respect to the effectiveness<br />

of replacing the A-10, the <strong>Air</strong> <strong>Force</strong> argues that there<br />

is a dwindling need for aircraft such as the A-10 in modern<br />

CAS operations because technology has created the ability<br />

to achieve precision at a distance – distance that is needed to<br />

keep aircraft out of range from enemy anti-aircraft fire.<br />

The changing operational environment has played<br />

a massive roll in the <strong>Air</strong> <strong>Force</strong>’s CAS evolution. Modern<br />

combat operations take place in areas that are usually<br />

defended by SAMs threats. Less expensive than having an<br />

air force, many countries have IADs that center on the use<br />

of SAMs and AAA. Such systems are much cheaper to buy,<br />

maintain, and train crews for than are aircraft on alert. To<br />

counter this surface-to-air threat, the <strong>Air</strong> <strong>Force</strong> flies at altitudes<br />

at or above 25,000 feet for as many missions as possible<br />

because at 25,000, seventy-five percent of the ground threat is<br />

negated. 24 The A-10 cannot be used effectively at these altitudes<br />

for CAS, but aircraft like the F-15E, F-16, B-52, B-1,<br />

F/A-22, and F-35 can. What makes these aircraft effective at<br />

such altitudes is not dependant on actual design as much as it<br />

is on avionics and munitions capabilities.<br />

Munitions give the CAS body the ability to physically<br />

touch the enemy. All the systems in a human body<br />

cannot help a boxer in a fight if he does not have hands. CAS<br />

is equally vulnerable without munitions. Without these<br />

“hands,” none of the aircraft capabilities would be of any<br />

advantage to CAS. Mets, a premier scholar, has noted that<br />

the U.S. <strong>Air</strong> <strong>Force</strong> spends a considerable amount of money on<br />

research and development of aircraft but little on the development<br />

of weapons. 25 This is a terrible mistake on behalf of the<br />

16<br />

<strong>Air</strong> <strong>Force</strong> because the CAS body needs a variety of munitions.<br />

Light weapons like the small diameter bomb are extremely<br />

important so aircraft can load more weapons without increasing<br />

weight. Furthermore, these weapons must give CAS the<br />

ability to provide a solid fist- punch (2,000 lb bomb on building),<br />

or a finger poke (PGM into a C 2 structure), but this<br />

ability correlates to the munitions rather than the aircraft.<br />

Although the <strong>Air</strong> <strong>Force</strong> has paid less attention to<br />

munitions development, which is not to say that they have<br />

neglected it altogether. Research and development in the field<br />

has been ongoing. LGBs debuted in the early 1970’s and saw<br />

limited operational use in Vietnam. 26 Since then, there have<br />

been multiple munitions advancements to provide airpower<br />

with much needed accuracy. As Mets points out, this new<br />

surge to produce weapons with launch-and-leave capabilities<br />

and pin-point accuracy started with the maturation of the<br />

GPS at the end of the first Gulf War in which the GPS signals<br />

are received by small computers on the weapon. 27 Once<br />

launched, satellite signals continuously up-date the bomb or<br />

missile until impact. The key capability of the aircraft now<br />

becomes its avionics. The aircraft operators have to input the<br />

target coordinates and launch the weapon. Only aircraft with<br />

computers on board that can “talk” to the weapons are able to<br />

exploit PGM capabilities. JDAM, which is the GPS package<br />

on a Mk-80 class bomb body, are becoming the main air-toground<br />

weapons of choice because they provide all weather,<br />

night-day drop capabilities. 28 LGBs are still used, but they are<br />

susceptible to fog, clouds, foliage, or any other medium that<br />

can block a laser beam from the targeteer (whether it be an<br />

aircraft or ground party) to the target.<br />

It would be presumptuous to say that any aircraft can<br />

now become a CAS platform with proper avionics and guided<br />

bombs, but such a trend is becoming more apparent with the<br />

development of new technology. The days of single mission<br />

aircraft are coming to an end, evidenced by the F/A-22 and F-<br />

35. Multipurpose or multi-role, however one wants to define<br />

it, is the catch phrase of modern aircraft design. From 25,000<br />

feet or higher, the <strong>Air</strong> <strong>Force</strong> is becoming capable of providing<br />

CAS without the need to build aircraft for a threat environment<br />

it can fly over.<br />

The Nervous System<br />

The AOC is the processing center and workhorse for<br />

the CFACC, where the ATO is built and executed. The ATO<br />

is the daily physical list of air operations that will be executed<br />

over a period of twelve hours. Within it, aircraft are allocated<br />

to a variety of commanders and assigned everything from<br />

their missions and targets to what they will be armed with.<br />

The AOC has two primary responsibilities, often broken<br />

down into Combat Plans and Combat Operations. The


Combat Plans division “builds” the ATO and Combat Operations<br />

executes it, though other divisions participate in both<br />

responsibilities. 29 Planning and Operations are done with<br />

both aircraft operators and non-rated personnel because the<br />

AOC must incorporate all aspects of modern combat, from<br />

logistics to intelligence, in order to compose the aerial ballet.<br />

Considerations that are dealt with in the AOC range from<br />

munitions inventory, battle damage assessment, saturation of<br />

SATCOM links, to the details of aircraft turning at the correct<br />

times. Thus it is important that each of the involved elements<br />

actively participate in air operations coordination. 30<br />

Joint Publication (JP) 3-56.1, Command and Control<br />

for Joint <strong>Air</strong> Operations, states that the responsibilities of the<br />

CFACC include: “functioning as the supported commander<br />

for…theater airborne reconnaissance and surveillance.” 31<br />

Intelligence plays a critical role in joint air operations because<br />

of the speed, range, and flexibility of air power. Timely, tailored<br />

intelligence is essential to the effective application of<br />

combat air assets. It plays an integral part in the development<br />

and execution the Joint <strong>Air</strong> Operations Plan, shapes key planning<br />

products prepared by the CFACC and the CFACC’s<br />

staff, and is vital to the development of a comprehensive, prioritized<br />

target list and allocation of CAS sorties. <strong>Air</strong>-focused<br />

intelligence is necessary for combat planners and combat<br />

operations to be able to plan and execute the ATO. 32<br />

The majority of information-related operations that<br />

are located in the AOC fall under the heading of ISR. Overall<br />

integration of ISR functions and C 2 of ISR assets is accomplished<br />

by establishing a single focal point for ISR in the<br />

AOC – ISR Division (ISRD). 33 The AOC is the best location<br />

to integrate the war fighter’s ISR capabilities. The ISRD is<br />

functionally associated, yet fully integrated, to embed sensor<br />

experts, platform experts and intelligence experts within the<br />

other divisions of the AOC. The ISRD is an essential aspect<br />

of all AOC operations and is integrated into every part of<br />

the air tasking cycle. ISRD responsibilities are constant,<br />

whether the AOC is engaged in combat operations or in<br />

military operations other than war. 34 The ISRD’s primary<br />

mission is to provide a fused, constantly updated intelligence<br />

picture throughout the AOC. That mission is accomplished<br />

through teams within the ISRD and liaisons to the other<br />

AOC divisions and through the synchronization of ISR assets<br />

and capabilities. 35 The ISRD concept is to centrally manage<br />

intelligence responsibilities. Through this concept, the<br />

ISRD ensures a consistent intelligence picture is maintained<br />

throughout the air tasking cycle. Additionally, ISR personnel<br />

are integrated within the Strategy Division, Combat Plans<br />

Division, and Combat Operations Division to provide dedicated<br />

and tailored ISR support for specified CAOC processes.<br />

It is the AOC’s focal point for integrating ISR throughout the<br />

17<br />

CFACC’s full range of operations. 36<br />

The Chief, ISRD (CISR) is responsible for all ISR<br />

activities required to support CFACC planning and operations.<br />

The CISR controls, coordinates, and directs the ISR<br />

tasking process through the other division chiefs, as directed<br />

by the CAOC Director. 37 The CISR is responsible for synchronizing<br />

ISR with aerospace strategy, planning, and operations,<br />

and achieves this through centralized control via an ISR<br />

Division and decentralized execution by embedded elements<br />

in the other AOC divisions. 38 The CISR integrates numerous<br />

cross-functional disciplines, enabling the core processes<br />

of the other AOC Divisions to continue. Centralized, fused<br />

ISR control forms a single ISR picture in the AOC. Decentralized<br />

ISR execution provides each JAOC division with the<br />

flexibility to tailor the unified ISR perspective to the unique<br />

processes and products of each division. 39 These products and<br />

processes require continual update of the ISR picture, which<br />

is accomplished through feedback from the ISR personnel in<br />

each division to the ISRD. The CISR’s authority to manage<br />

this process creates a single fused ISR picture, ensuring that<br />

each division has ISR tailored to meet specific ATO requirements.<br />

40<br />

The ISRD develops, maintains, and disseminates<br />

information, threat estimates, intelligence updates, and threat<br />

alerts, manages intelligence collection requirements, and<br />

provides targeting and weaponeering support. The division<br />

integrates numerous cross-functional disciplines and provides<br />

direct support to the other AOC divisions’ core processes<br />

through embedded ISR elements. There are five ISRD elements:<br />

Analysis, Correlation, and Fusion (ACF) Team;<br />

Targeting and Battle Damage Assessment (BDA) Team; ISR<br />

Management Team; Processing, Exploitation, and Dissemination<br />

(PED) Team; and Sensitive Compartmented Information<br />

(SCI) Management Team. ISRD Core Team personnel provide<br />

intelligence products and services that support the entire<br />

AOC, joint force, and subordinate units. 41 In addition, ISRD<br />

core personnel provide oversight and management of JFACC<br />

ISR processes to ensure that the appropriate ISR reporting,<br />

planning, tasking, and deconfliction occurs in order to build a<br />

common source threat and targeting picture. As the adversary<br />

does not operate according to the ATO cycle, core personnel<br />

ensure continuity of the threat picture and horizontal integration<br />

of ISR processes across the AOC. 42<br />

It is critical that intelligence personnel understand<br />

CFACC operations to support decision-making as well as<br />

ATO preparation and execution. From conception to execution<br />

the ATO is created in seventy-two hours. Support of<br />

the seventy-two hour cycle requires an understanding of the<br />

missions and tasks to be achieved and supported. 43 Central to<br />

this understanding is a strong operations-intelligence interface


ased on working side-by-side, knowing each other’s requirements,<br />

and having maximum access to operational and intelligence<br />

information. In this regard, key CFACC intelligence<br />

personnel must have access to all plans and programs so that<br />

intelligence planners are aware of the operations’ requirements,<br />

plans, and programs and can formulate collection<br />

planning or any special tasking required. 44 Likewise, operational<br />

planners should have access to all available intelligence<br />

information that might affect CFACC operations. To attain<br />

such information, the CAS body relies on its eyes and ears.<br />

Feeding the brain constant information are the eyes<br />

and ears of the CAS body, comprised of many elements to<br />

include Special Operations troops, <strong>Air</strong> Liaison Officers, Forward<br />

<strong>Air</strong> Controllers, ISR aircraft, and space assets. These<br />

assets give the CAS body the ability to see and hear the<br />

enemy. Human assets (ALOs and FACs) are personnel on the<br />

ground who can provide real time information to those who<br />

need it. In typical CAS operations, ground controllers use a<br />

variety of techniques to communicate target information to<br />

the pilots flying CAS missions. 45<br />

<strong>Air</strong>craft also play an important role in providing the<br />

CAS body with situational awareness. E-8 JSTARS, RC-<br />

135 Rivet Joint, MC-130s and E-3 AWACS all have specific<br />

functions that are relayed both to operators and to the AOC.<br />

Combined, these aircraft also function as a sort of spinal cord.<br />

RC-135s, built on a Boeing 707 airframe, and MC-130s,<br />

built on the C-130 airframe, have the primary function of<br />

electronic surveillance. 46 They monitor electronic activity<br />

in the area of responsibility and report to the AOC. With<br />

proper guidance from the AOC, these aircraft can inform<br />

CAS pilots of electronic signatures that may pose a threat<br />

such as radar waves from a hostile surface to air missile sight<br />

or enemy communications. Similar to the RC-135, the E-3<br />

scans the sky to pick up enemy aircraft and radar signatures<br />

and warn CAS pilots of possible enemy aircraft. 47 Although<br />

important to the CAS body for situational awareness, these<br />

functions do not directly affect the relationship between aircraft<br />

and troop engagements.<br />

The E-8, however, does directly support such activities.<br />

The JSTARS is the AWACS for ground movement.<br />

Designed with the U.S. Army, this aircraft scans the surface<br />

and can detect enemy vehicle movement or engaged friendly<br />

troops. 48 Using low mounted radar on the JSTARS, trained<br />

operators monitor ground activities and provide real-time<br />

information to ground units, the AOC, and air crews overhead.<br />

Should situations arise that require CAS, JSTARS can<br />

vector in CAS aircraft and provide coordinates to pilots for<br />

targets. The target information is loaded into the avionics for<br />

weapons deployment. Such situations are known in the AOC<br />

as XCAS missions, those without a predetermined target.<br />

18<br />

<strong>Air</strong>craft performing such missions loiter at altitude until a call<br />

is received. In this situation, the JSTARS cannot provide a<br />

picture of the battlefield; all it can relay are coordinates and<br />

elevation. Battlefield imagery and predetermined targets are<br />

gathered by space assets.<br />

Space is the final instrument used by the CAS body<br />

to see and hear enemy activities. Satellite imagery, whether<br />

electro-optical, radar, or infrared, provides a capability that<br />

can feed the AOC endlessly. 49 However, spaces assets are not<br />

limited to imagery. Space assets can perform many of the<br />

same missions as aircraft. The difference between the two is<br />

that space can provide a constant theater-wide watch without<br />

nearly as many trained crews.<br />

Information flow is the key to making the CAS body<br />

function effectively and efficiently. In humans, when a brain<br />

lacks the ability to communicate with the body to create muscular<br />

movement, that body is paralyzed. The same holds true<br />

for the CAS body. In a similar manner, information overload<br />

or sporadic information can cause the body to function<br />

improperly; the CAS body has the same vulnerabilities. In<br />

a properly running body information flows from the brain<br />

continuously. Sights, sounds, smells, and tactile stimulants<br />

are gathered and analyzed. If something is threatening in the<br />

environment, say a bright light, the brain will send a signal<br />

to the neuromuscular junctions and the innervations there<br />

will cause the eye lids to close. Some information may cause<br />

a muscular reaction before the information is even sent to the<br />

brain, such as the reflex when one touches a flame. Immediately<br />

the human body reacts with a quick relay of information<br />

from the finger to spinal column and back, the reflex being to<br />

withdraw one finger. Some reflexes can also be overridden by<br />

the brain. If there is some conscious motivation to continue<br />

through the flame and pain, the brain can override the reflex<br />

and keep the reaction from occurring. The caveat to overriding<br />

a reflex response, however, is that one is aware of the<br />

repercussions of one’s actions. Simple reflexes are the standard<br />

reaction when something happens unexpectedly; CAS works<br />

in a similar manner but with some key differences.<br />

The AOC and ATO are designed to analyze an environment<br />

and preplan accordingly. Information from the<br />

environment is supplied from all ISR assets and sent to the<br />

brain. What may take a human a few hours, minutes, or seconds<br />

to analyze will take seventy-two hours for the CAS brain<br />

to analyze. 50 From the brain, the ATO is sent to all commanders<br />

for execution, just as information is sent to the neuromuscular<br />

junctions. From there operators take the information<br />

and transform it into action. Sorties are launched and<br />

attacks are made.


Diagnosis<br />

All the systems I have discussed play a critical role<br />

in making CAS operations work. Information flow is by far<br />

the system needing the most treatment, but it is not independent<br />

in its damaging effect. Areas of the skeletal, muscular,<br />

and nervous systems all aid in causing the nerves to function<br />

improperly, however the nervous system has the largest<br />

responsibility in the breakdown of information flow, particularly<br />

during action/reaction situations.<br />

While the AOC is fairly efficient at seventy-two hour<br />

planning, it lacks the ability to make effective action/reaction<br />

judgments. During ATO planning, CAS can be allocated a<br />

percentage of assets that will be used strictly for their operations.<br />

Those assets are then given to the CFLCC, the Army’s<br />

equivalent to the CFACC. From the there the CFLCC subdivides<br />

his allocated sorties to subordinate commanders. 51 Up<br />

to this point, it may be somewhat confusing as to action/reaction<br />

situations, but a simple example should aid in clarifying.<br />

Suppose the CFLCC is given 30 sorties, which are then subdivided<br />

among his subordinate commanders. The 1 st Division<br />

Commander may be given 10 sorties, the 2 nd given 5 and<br />

the 3 rd given 15. Suppose the 1 st and 2 nd divisions are engaged<br />

in combat and require CAS, while the 3 rd has had no contact<br />

with enemy forces. If the two engaged divisions require<br />

more CAS, they will call the AOC via their ALO and request<br />

additional support. From there, the CFACC coordinates<br />

with the CFLCC commander, who then pulls those 15 sorties<br />

from 3 rd Division. It should be obvious that is not an efficient<br />

way of reacting to a situation. By the time all the coordination<br />

is completed and CAS is reallocated, the ground battle<br />

may be over. Yet this is merely one part of a larger problem.<br />

Suppose the 3 rd Division had light contact and<br />

launched its 15 sorties for CAS, but then determined that no<br />

CAS was necessary. Since those aircraft are already in the air,<br />

coordination may be conducted quickly through the AOC<br />

and those 15 sorties may be redirected to aid the 1 st and 2 nd<br />

Divisions. As soon as those 30 aircraft drop their payload and<br />

return, all 30 sorties assigned to CAS have been spent. What<br />

happens if 3 rd Division is suddenly counter-attacked and<br />

needs CAS? It is ludicrous to think that the <strong>Air</strong> <strong>Force</strong> will<br />

not provide aid to those troops, and this example illustrates<br />

the problem with planning and information flow at the AOC<br />

level.<br />

Part of the treatment that could be prescribed is to<br />

change joint doctrine regarding CAS sortie allocation. Once<br />

the <strong>Air</strong> <strong>Force</strong> allocates CAS sorties to the CFLCC (typically<br />

an Army or Marine officer), CAS is executed just as it was in<br />

World War II, with disregard for the lessons learned at Kasserine<br />

Pass. 52 <strong>Air</strong>power is not effective when controlled in<br />

19<br />

pockets by ground commanders, thus CAS should not be<br />

slotted to individual ground commanders. One solution for<br />

centralized command of CAS involves integration of the U.S.<br />

Marine Corps. Suppose Joint Doctrine establishes a new<br />

position under the Joint <strong>Force</strong> Commander. This position,<br />

commanded by a marine aviator, becomes the CAS Operations<br />

Center (CASOC), and bridges the needs of the Ground<br />

Commander to the capabilities of the <strong>Air</strong> Commander. Sorties<br />

slotted for CAS are not given to the JFLCC, but rather<br />

to the CAS Commander. Units needing assistance call the<br />

CASOC via ALOs and one commander directs and redirects<br />

aircraft as required. Since the CASOC is linked to the AOC,<br />

the AOC can update the CASOC on aircraft that are available<br />

to provide extra support should it be requested. Doctrine can<br />

easily accommodate such a position, but the flow of information<br />

must also be changed. Requests for air support must<br />

be channeled straight to the CASOC and executed without<br />

interference from either the CFACC or CFLCC.<br />

The next problem that is encountered regarding<br />

information flow relates to munitions. More than a few<br />

CAS missions have ended in fratricide, where our forces<br />

have engaged friendly forces. This, unfortunately, is not an<br />

uncommon problem. Training is very important in limiting<br />

such events, but as this paper does not focus on training it<br />

is forced to look deeper for an explanation. After evaluating<br />

the methods used to conduct CAS operations with regard to<br />

ground and cockpit operations, there is evidence that operator<br />

error is to blame for this problem. That is not to say that<br />

these operators are not sufficiently trained. On the contrary,<br />

they are trained to a high level of technical skill. Forward air<br />

controllers and pilots are subject to some of the longest training<br />

in the U.S. military. What is not surprising is that these<br />

operators do make mistakes – mistakes that are fatal. Miscommunicated<br />

coordinates, wrongly programmed munitions,<br />

and unclear friendly positions are all reasons for fratricide<br />

unlinked to training. Rather, they are linked to information<br />

flow.<br />

Broadening Dr. Mets’ thoughts on munitions development,<br />

there is another advancement that could reduce fratricide.<br />

Blue <strong>Force</strong> Tracking is a system that uses GPS through<br />

a small transmitter worn on an individual, vehicle, or friendly<br />

unit. This system provides a constant feed on the location of<br />

friendly forces. Currently Blue <strong>Force</strong> Tracking is not issued<br />

to every soldier on the ground, but further development<br />

may enable each soldier, vehicle, and ground asset to have<br />

this system. Should developments allow this, could there be<br />

way to integrate such information into a JDAM kit or into<br />

the avionics of aircraft? If JSTARS can actively locate each<br />

ground asset via Blue <strong>Force</strong> Tracking, there should be a way to<br />

integrate such information into a failsafe mechanism on the


aircraft. Bomb blast patterns for and each type of ordinance<br />

has a measurable pattern. That information should be stored<br />

into a small data base on board the aircraft. This would allow<br />

pilots to target units, but should a Blue <strong>Force</strong> signal be picked<br />

up within the pattern based on the targeted impact point, the<br />

bomb will not release from the aircraft.<br />

This system would have some limitations. The database<br />

for blast pattern sizes would not be capable of seeing<br />

the impact point in three dimensions. Friendly troops on<br />

higher ridge lines or inside a building may be out of range for<br />

fragments, but two dimensionally they may be within range.<br />

Three dimensions may be overcome, but barriers, walls,<br />

ground units with armor, and other such obstacles will be<br />

difficult to take into account. These situations may provide<br />

adequate cover for friendly units, but a computer will only see<br />

the units, the blast pattern, and the relative distance between<br />

the point of impact.<br />

Smarter weapons and changing doctrine may<br />

improve the information flow between the different systems<br />

of the CAS body. Since CAS’s inception there has been a<br />

continual need for improvement, but (unlike past attempts)<br />

aircraft are not at the focal point of this examination. In a<br />

sense, aircraft are the shoes for the CAS body. It doesn’t really<br />

matter what is on your feet, but some shoes are better suited<br />

for specific activities, just as some aircraft are better suited for<br />

specific CAS operations.<br />

CONCLUSION AND SUMMARY<br />

The development of the CAS body has experienced<br />

growing pains, and there will always be room for improvement.<br />

From a muscular standpoint, there has been a tremendous<br />

advance in aircraft design. In modern aviation<br />

single mission aircraft are not the only aircraft that are able<br />

to provide CAS. Current aircraft such as the F-15E, F-16,<br />

B52, and B-1 have been given another mission thanks in part<br />

to advances in avionics. Future aircraft such as the F/A-22<br />

and F-35 will enable the <strong>Air</strong> <strong>Force</strong> to fulfill all missions with<br />

a single airframe. The largest contributor to the capability<br />

for multi-role missions stems primarily from the advances in<br />

munitions. GPS and laser guided bombs have enabled accuracy<br />

at altitude, altitudes that negate seventy-five percent of<br />

the world’s surface-to-air threat.<br />

As impressive as PGMs may be, fratricide is still a<br />

tragic risk of CAS. No matter how rugged, fast, or maneuverable<br />

the aircraft, or how accurate the munitions may be,<br />

neither can overcome communication issues that may lead<br />

to friendly troops being in the area when a bomb impacts.<br />

The integration of the Blue <strong>Force</strong> Tracking system into the<br />

on-board computers of aircraft and weapons may prove a<br />

failsafe trigger. This concept does have limitations, but such<br />

a system, if developed properly, could drastically reduce CAS<br />

20<br />

fratricide.<br />

In the context of the CAS body, this aforementioned<br />

munitions development is considered improvement of the<br />

muscular system, but it is intertwined with the nervous<br />

system and a flow of information. By computerizing this<br />

failsafe system with Blue <strong>Force</strong> Tracking, the human operator<br />

is removed from having to keep such an intense situational<br />

awareness of troop movements, targets, flying, navigating, and<br />

targeting. Additional tasks, such as monitoring Blue <strong>Force</strong><br />

Tracking information inside the cockpit and on the ground,<br />

without the aid of a failsafe mechanism can lead to task saturation,<br />

and possibly increase fratricide. Weapons systems<br />

that combine information and precision must be the focus of<br />

newer weapons.<br />

Technology has provided a solution that allows<br />

one airframe capable of carrying out air superiority, strategic<br />

attack, interdiction, and CAS missions. The F-35s can fly<br />

high and fast and are extremely maneuverable, allowing these<br />

aircraft to fight their way into an area in order to provide<br />

CAS. Such performance characteristics combined with the<br />

ability to drop PGMs gives the F-35 an edge over the aging<br />

A/OA-10. Just because troops cannot see the F-35 or feel the<br />

heat from its engines like they could the A-10 does diminish<br />

the aircraft’s ability to deploy precision munitions on target<br />

and provide CAS. 53<br />

Precision from high altitudes is where the <strong>Air</strong> <strong>Force</strong><br />

plans to take CAS in the twenty-first century. From a ground<br />

commander’s point of view, “close proximity” is defined as the<br />

distance between the aircraft and the friendly troops on the<br />

ground. <strong>Air</strong> commanders, however, define “close proximity”<br />

as the distance between the munitions impact and the troops.<br />

In spite of this difference in definitions, neither high nor low<br />

altitude has proven to be any more or less risky from a fratricide<br />

point of view.<br />

Developments in structure could aid in timely information<br />

flow from requests to air support reactions. Currently,<br />

the <strong>Air</strong> <strong>Force</strong> has a division of the AOC, the <strong>Air</strong> Support<br />

Operations Center (ASOC), that acts in a similar role to the<br />

proposed CASOC. 54 The difference between the two is that<br />

the current division reports directly to the CFACC, whereas<br />

the CASOC has a CAS Commander, which is equal to that<br />

of the CFACC and CFLCC. The proposed CASOC could<br />

bridge the gap between fundamental doctrinal disputes, like<br />

the definition between “close proximity”, between the <strong>Air</strong><br />

<strong>Force</strong> and the Army. Furthermore, the Marines have a solid<br />

grasp on CAS operations, thus they may provide a better flow<br />

to CAS action/reaction missions.<br />

The drawback to such a change will inevitably bring<br />

conflict between the services as the <strong>Air</strong> <strong>Force</strong> would be unwilling<br />

to release control of its air assets and the Army would be


unwilling to let go of it option to package out its assigned<br />

CAS support to subordinate ground commander. Even more<br />

complicating would be the problems that surround the ATO.<br />

The ATO is critical to synchronizing operations, and should<br />

CAS be placed under control of a new Commander, the ATO<br />

process would be severely damaged unless further development<br />

of such an alteration takes place.<br />

The two diagnoses presented in this paper are examples<br />

of developments that do not focus on aircraft design.<br />

Although is seems plausible that a munitions development<br />

would occur before such a doctrinal change, one must not be<br />

closed-minded when brainstorming avenues to develop the<br />

CAS body. As this paper has also discussed, no one system<br />

can be examined independently because all systems in the<br />

CAS body are intertwined. Each change or advance in one<br />

system can cause a change, either for better or for worse, in<br />

another system.<br />

The limits of this paper must be acknowledged. This<br />

paper has taken systems and analyzed them with respect to<br />

the others in a medical context, yet it has disregarded parts<br />

of the nervous and circulatory systems. As mentioned in<br />

the beginning of this paper, these omitted analyses focus on<br />

training and the flow of new ideas. New ideas keep military<br />

transformation alive. Innovative ideas, tactics and techniques<br />

can only improve CAS. New ideas are constantly appearing<br />

in student works published at the <strong>Air</strong> University. No<br />

matter who the author, each publication has potential to be<br />

expanded upon and developed. For this reason, it is worthy<br />

to take time and educate oneself about the books and papers<br />

produced at the <strong>Air</strong> University.<br />

Within the writings at the <strong>Air</strong> University new ideas<br />

regarding training can be revealed. Training is an extremely<br />

important part of CAS operations. Training does not center<br />

only on pilots and FACs, but encompasses every operator,<br />

rated, and non-rated officer who participates in CAS operation.<br />

Training ideas that could be researched include CAS<br />

training with the Marines. It may be a feasible option to send<br />

our A-10, F-15E, and F-16 crews to a CAS training program<br />

run by the Marine Corps. The <strong>Air</strong> <strong>Force</strong> has implemented<br />

training programs to improve not only CAS but all air operations,<br />

moreover the <strong>Air</strong> <strong>Force</strong> must not forget how vital all<br />

members of the CAS team are and that their training is just as<br />

important as that of the operator’s.<br />

Other areas that are worthy of continued research are<br />

the use of Unmanned Combat Aerial Vehicles (UCAVs), the<br />

use and implications of the Small Diameter Bomb (SDB),<br />

and offensive and defensive couterspace operations. Publications<br />

in Popular Mechanics, Aviation Weekly, and military publications<br />

may facilitate new ideas that could aid in developing<br />

some of the aforementioned topics. One particular publica-<br />

21<br />

tion of interest is LtCol Mike “Wolf” Smith’s thesis from the<br />

<strong>Air</strong> University. In his paper entitled “Ten Propositions of<br />

Spacepower”, the tenth proposition makes the powerful statement<br />

that “weaponizing space is inevitable.” 55 Could weaponizing<br />

space present a new CAS platform?<br />

The debate over CAS may still rage on, but there is<br />

little doubt that the <strong>Air</strong> <strong>Force</strong> lacks a commitment to performing<br />

CAS missions. The <strong>Air</strong> <strong>Force</strong> uses all it assets as<br />

effectively and efficiently as possible to maximize firepower,<br />

maneuverability, and exploitation of the theatre of operations.<br />

Situations dictate priorities, and as future conflicts<br />

become more frequent and low-intensity in nature, CAS may<br />

become an even more critical mission. <strong>Air</strong>power is dependant<br />

upon flexible response and since Kasserine, the <strong>Air</strong> <strong>Force</strong> has<br />

endeavored to commit to CAS operations while maintaining<br />

the integrity of its other responsibilities. The <strong>Air</strong> <strong>Force</strong> must<br />

seek solutions to optimize CAS capabilities that are not solely<br />

dependent on new aircraft or on a particular development in<br />

one system.<br />

BIBLIOGRAPHY<br />

A-10/OA-10 Thunderbolt II. Federation of American Scientists,<br />

2003. [database on-line]; available from http://<br />

www .fas.org/man/dod-101/sys/ac/a-10.htm; Internet;<br />

accessed 22 September 2003.<br />

<strong>Air</strong> <strong>Force</strong> Doctrine Document (AFDD) 1. <strong>Air</strong> <strong>Force</strong> Basic<br />

Doctrine, 1 September 1997. Maxwell AFB, AL: HQ<br />

AFDC.<br />

<strong>Air</strong> <strong>Force</strong> Doctrine Document (AFDD) 2-1.3. Counterland,<br />

27 August 1999. Maxwell AFB, AL: HQ AFDC.<br />

Cooling, B. Franklin. Case Studies in the Development of Close<br />

<strong>Air</strong> Support. Washington, D.C.:U.S. Government<br />

Printing Office, 1990.<br />

E-3 Sentry (AWACS). Federation of American Scientists,<br />

2003. [database on-line]; available from http://www<br />

.fas.org/man/dod-101/sys/ac/a-10.htm; Internet;<br />

accessed 22 September 2003.)<br />

Elsarelli, Leon E. “From Desert Storm to 2025: Close <strong>Air</strong><br />

Support in the 21 st Century.” Research Paper. <strong>Air</strong><br />

Command and Staff College, 1998.<br />

Eret, Anton. Interviewed by author, 5 September 2003,<br />

USAF <strong>Academy</strong>.


Eret, Anton. Briefing for Military Strategic Studies 368.<br />

“Weapons Technology and Employment Strategies.”<br />

Spring 2005.<br />

Fawcett, John M., Jr. “The JFACC Team.” <strong>Air</strong> and Space<br />

Power Chronicles. , accessed 17 March<br />

2004.<br />

Haun, Philip. “<strong>Air</strong> Power Versus a Field Army.” RAF <strong>Air</strong><br />

Power Review 4, No. 4 (Winter 2004): 65-91.<br />

Hebert, Adam J. “The Long Reach of Heavy Bombers.” <strong>Air</strong><br />

<strong>Force</strong> Magazine, November 3003.<br />

Joint Aerospace Command and Control Course (JAC2C).<br />

Hurlburt Field, FL: USAF C2 Warrior School).<br />

FUN-132, 3.<br />

Joint <strong>Force</strong>s Command Glossary [on-line]. <strong>United</strong> <strong>States</strong> Joint<br />

<strong>Force</strong>s Command; available from http://www.jfcom.<br />

mil/about/glossary.htm; Internet; accessed 18 October<br />

2003.<br />

Joint Publication (JP) 3-56.1. Command and Control for Joint<br />

<strong>Air</strong> Operations. 14 November 1994.<br />

Joint Strike Fighter (JSF). Federation of American Scientists,<br />

2003. [database on-line]; available from http://www<br />

.fas.org/man/dod-101/sys/ac/jsf.htm; Internet;<br />

accessed 22 September 2003.<br />

Joint Surveillance Target Attack Radar System (Joint STARS /<br />

JSTARS). Federation of American Scientists, 2003.<br />

[database on-line]; available from http://www .fas.<br />

org/man/dod-101/sys/ac/a-10.htm; Internet; accessed<br />

23 April 2005.<br />

Kent, John. “The ‘F’ Stands for ‘Future’.” <strong>Air</strong> and Space<br />

Power Journal 17 (Spring 2003): 41-46.<br />

Mann, Edward C., III. Thunder and Lightning: Desert Storm<br />

and the <strong>Air</strong>power Debates. Maxwell AFB, AL: <strong>Air</strong><br />

University Press, 1995.<br />

Mets, David R. “The Long Search for a Surgical Strike: Precision<br />

Munitions in Military Affairs.” The Cadre<br />

Papers, no. 12 (October 2001): 1-79.<br />

“The Republic Thunderbolt,” Jane’s Fighting <strong>Air</strong>craft of World<br />

22<br />

War II, (London: Bracken Books, 1989), 254.<br />

Rife, Shawn P. “Kasserine Pass and the Proper Application of<br />

<strong>Air</strong>power.” Joint <strong>Force</strong>s Quarterly (Autumn/Winter<br />

1998-99): 76-77.<br />

Rivet Joint. Federation of American Scientists, 2003. [database<br />

on-line]; available from http://www .fas.org/<br />

man/dod-101/sys/ac/a-10.htm; Internet; accessed 23<br />

April 2005.<br />

Sargent, Richard L. “Deliberate <strong>Force</strong> Tactics.” In Deliberate<br />

<strong>Force</strong>: A Case Study in Effective <strong>Air</strong> Campainging, ed.<br />

Robert C. Owens, 297-239. Maxwell AFB, AL: <strong>Air</strong><br />

University Press, 2000.<br />

Smith, Mike V. “Ten Propositions of Spacepower.” School<br />

of Advanced <strong>Air</strong>power Studies Thesis, <strong>Air</strong> University,<br />

Maxwell AFB, AL, 2001.<br />

VanHook, Richard. Briefing for Military Strategic Studies<br />

485. “Space Operations.” Fall 2004.<br />

Wills, Steve. Briefing for Military Strategic Studies 400. “Joint<br />

and Coalition Warfare.” 10 Feb 2005.<br />

1999 Weapons File. Eglin AFB, FL: Office of the Armament<br />

Production Group Manager, 1999.<br />

DOCUMENTATION<br />

Dr Titus and Dr Karolick reviewed my structure and made<br />

suggestions for my headers, sub headers and some of<br />

my footnotes.<br />

Maj Eret gave some suggestions about the AOC in respect to<br />

my formulation of the CASOC. These changes will<br />

be incorporated into the next draft. He also gave me<br />

an additional source for CAS and the A-10.<br />

C1C Rebecca Simpson reviewed my paper and made grammatical<br />

corrections.<br />

C1C Joe Mobbley gave me the information and source for the<br />

definition of C 2 .<br />

(Endnotes)<br />

1 B. Franklin Cooling, Case Studies in the Development<br />

of Close <strong>Air</strong> Support (Washington, D.C.: Office of <strong>Air</strong><br />

<strong>Force</strong> History, 1990), 250.<br />

2 Leon E. Elsarelli, “From Desert Storm to 2025:<br />

Close <strong>Air</strong> Support in the 21 st Century,” (Research Paper, <strong>Air</strong>


Command and Staff College, 1998), 2.<br />

3 <strong>Air</strong> <strong>Force</strong> Doctrine Document (AFDD) 1, <strong>Air</strong> <strong>Force</strong><br />

Basic Doctrine, (Maxwell AFB, AL: HQ AFDC: 1997), 49.<br />

4 2003. Joint <strong>Force</strong>s Command Glossary: C2 [on-line].<br />

<strong>United</strong> <strong>States</strong> Joint <strong>Force</strong>s Command; available from http://<br />

www.jfcom.mil/about/glossary.htm#C; Internet; accessed 18<br />

October 2003.<br />

5 Ibid.<br />

6 Edward C. Mann III, Thunder and Lightning:<br />

Desert Storm and the <strong>Air</strong>power Debates (Maxwell AFB, AL: <strong>Air</strong><br />

University Press, 1995), 157.<br />

7 Philip Haun, “<strong>Air</strong> Power Versus a Field Army,” RAF<br />

<strong>Air</strong> Power Review 4(Winter 2004): 71.<br />

8 Elsarelli, “Desert Storm to 2025,”11.<br />

9 Richard L. Sargent. “Deliberate <strong>Force</strong> Tactics,” in<br />

Deliberate <strong>Force</strong>: A Case Study in Effective <strong>Air</strong> Campainging,<br />

ed. Robert C. Owens, (Maxwell AFB, AL: <strong>Air</strong> University<br />

Press, 2000.), 317.<br />

10 Ibid, 318.<br />

11 Elsarelli, “Desert Storm to 2025,” 8.<br />

12 Sargent, “Deliberate <strong>Force</strong>,” 318.<br />

13 Haun, “<strong>Air</strong> Power Versus a Field Army,” 72.<br />

14 Elsarelli, “Desert Storm to 2025,” 24.<br />

15 Anton Eret, interviewed by author, 5 September<br />

2003, USAF <strong>Academy</strong>.<br />

16 1999 Weapons File (Eglin AFB, FL: Office of the<br />

Armament Production Group Manager, 1999), Preface.<br />

17 David R. Mets, “The Long Search for a Surgical<br />

Strike: Precision Munitions in Military Affairs,” The Cadre<br />

Papers, no. 12 (Maxwell AFB, AL: <strong>Air</strong> University Press, 2001):<br />

56.<br />

18 Transformational changes, or the term<br />

“transformation”, as meant by the author, includes the<br />

contemporary, substantial changes in the way the U.S.<br />

military approaches organizing, training, and equipping its<br />

forces. The subject of military transformation is addressed<br />

in greater detail by Colin S. Gray. His entire book is about<br />

Modern Strategy, but his ideas , especially chapter 7, embrace<br />

the idea of transformation. Colin S. Gray, Modern Strategy<br />

(London: Oxford University Press, 1999), 175-206.<br />

19 “The Republic Thunderbolt,” Jane’s Fighting<br />

<strong>Air</strong>craft of World War II (London: Bracken Books, 1989), 254.<br />

20 A-10/OA-10 Thunderbolt II, (Federation of<br />

American Scientists: 2003) [database on-line]; available from<br />

23<br />

http://www .fas.org/man/dod-101/sys/ac/a-10.htm; Internet;<br />

accessed 22 September 2003.<br />

21 Ibid.<br />

22 Mann, Thunder and Lightning, 157<br />

23 Eret interview.<br />

24 Ibid.<br />

25 Mets, “Long Search for Strike,” 35<br />

26 Ibid, 1.<br />

27 Ibid, 42<br />

28 1999 Weapons File, 5-13.<br />

29 Joint Aerospace Command and Control Course<br />

(JAC2C) (Hurlburt Field, FL: USAF C2 Warrior School),<br />

FUN-132, 3.<br />

30 Ibid.<br />

31 Joint Publication (JP) 3-56.1. Command and Control<br />

for Joint <strong>Air</strong> Operations. 14 November 1994.<br />

32 Text for JAC2C, 3.<br />

33 Ibid.<br />

34 Ibid.<br />

35 Ibid.<br />

36 Ibid.<br />

37 Ibid, 1.<br />

38 Ibid, 4.<br />

39 Ibid.<br />

40 Ibid.<br />

41 Ibid, 6.<br />

42 Ibid.<br />

43 Ibid, 1.<br />

44 Ibid.<br />

45 LtCol Steve Wills, Briefing for Military Strategic<br />

Studies 400, “Joint and Coalition Warfare,” 10 Feb 2005.<br />

46 Rivet Joint, (Federation of American Scientists:<br />

2003) [database on-line]; available from http://www .fas.org/<br />

man/dod-101/sys/ac/a-10.htm; Internet; accessed 23 April<br />

2005.<br />

47 E-3 Sentry (AWACS), (Federation of American<br />

Scientists: 2003) [database on-line]; available from http://<br />

www .fas.org/man/dod-101/sys/ac/a-10.htm; Internet;<br />

accessed 23 April 2005.<br />

48 Joint Surveillance Target Attack Radar System (Joint<br />

STARS / JSTARS), (Federation of American Scientists: 2003)<br />

[database on-line]; available from http://www .fas.org/man/<br />

dod-101/sys/ac/a-10.htm; Internet; accessed 23 April 2005.<br />

49 LtCol Richard VanHook, Briefing for Military<br />

Strategic Studies 485, “Space Operations,” Fall 2004.<br />

50 JAC2C, 1.<br />

51 Maj Anton Eret, Briefing for Military Strategic<br />

Studies 368, “Weapons Technology and Employment<br />

Strategies,” Spring 2005.<br />

52 Shawn P. Rife, “Kasserine Pass and the Proper


Application of <strong>Air</strong>power,” Joint <strong>Force</strong>s Quarterly (Autumn/<br />

Winter 1998-99), 76-77.<br />

53 Adam J. Hebert, “The Long Reach of Heavy<br />

Bombers,” <strong>Air</strong> <strong>Force</strong> Magazine, November 3003, 24.<br />

54 Eret interviewed.<br />

55 Mike V. Smith, “Ten Propositions of Spacepower”<br />

(M.A. thesis, School of Advanced <strong>Air</strong>power Studies, <strong>Air</strong> University,<br />

Maxwell AFB, AL, 2001), 98.<br />

24<br />

IS DEMOCRATIC IMPERIALISM VIABLE?<br />

ASSESSING THE VALIDITY OF THE<br />

BUSH DOCTRINE<br />

By C4C Whitney Camp<br />

The Roots of Democratic Imperialism<br />

As the federal convention convened and Federalists<br />

and Anti-Federalists joined in debate and discussion, the<br />

issues of domestic policy in collaboration with expansion<br />

came to the front of the agenda. Recently liberated from the<br />

imperialistic British Empire, most of the founding fathers<br />

assured that “conquest or superiority among powers is not<br />

or ought not ever to be the object of republican systems”<br />

(“A Strategy” 1). Since the late 18 th century, the foreign<br />

and domestic policies of the <strong>United</strong> <strong>States</strong> have changed<br />

significantly and altered their focus based on the global<br />

community’s status. George W. Bush’s National Security<br />

Strategy has been under the microscope of politicians, civilians<br />

and military leaders with the invasion of Afghanistan<br />

and the occupation of Iraq. In his January 2005 State of the<br />

Union address, Bush said, “We are all part of a great venture:<br />

To extend the promise of freedom in our country, to renew<br />

the values that sustain our liberty, and to spread the peace<br />

that freedom brings” (State 4). The expansion of democracy<br />

within the world is significant to the daily lives of Americans<br />

and to the perpetuation and stability of the <strong>United</strong> <strong>States</strong> of<br />

America. In order to assess the validity of the Bush doctrine,<br />

it is essential to analyze the role of a democratic republic in<br />

the world order, explain why opponents believe the Bush<br />

doctrine crosses the line, and finally, clarify the necessity of<br />

<strong>United</strong> <strong>States</strong>’ international intervention as a global power<br />

and economic stronghold.<br />

The Democratic System in Today’s World Order<br />

Classical military theorists to modern political analysts<br />

have continually assessed the place of democracy in the<br />

world order. When does a democracy retain the right to<br />

infringe its own form of government upon another nation?<br />

T.E. Hulme, a British conservative who enlisted in WWI<br />

attacks the pacifist and the passive politician by articulating<br />

that skepticism about war arises for two reasons. The primary<br />

reason is “the fatuous belief that liberty cannot at any rate be<br />

permanent endangered, for Germany herself will inevitably<br />

develop toward democracy” (Hulme 251). Furthermore, as<br />

international institutions such as the <strong>United</strong> Nations and capitalistic<br />

superpowers like that of the <strong>United</strong> <strong>States</strong> begin to see<br />

the necessity of the people’s voice, sovereignty becomes redundant.<br />

In Jihad vs. McWorld, Benjamin Barber says, “Sovereignty<br />

is indeed in a twilight, condemned to a shadow world


y government’s myriad postmodern detractors—ex-Communist<br />

and postindustrialist alike” (Barber 277). Democracy has<br />

taken on a new role in the international society—to bring the<br />

basic human rights and beliefs of the Enlightenment to every<br />

culture and race. Many liberal nations and constituents claim<br />

that democracy, with its basic tenant of the “right to choose”<br />

has no right to infringe upon other nations and peoples.<br />

However, the uniqueness of democracy resides in the fact that<br />

as soon as it is instituted, it can be changed to become the<br />

people’s will. In Hobbe’s social contract theory, he explains that<br />

citizens of a state abandon certain rights for the prosperity<br />

of the state, but as soon as that government infringes on the<br />

inalienable rights of man, the people have the responsibility to<br />

overthrow the government (Lutz 100). The National Security<br />

Strategy offers nations in the Middle East the right to execute<br />

Hobbe’s theory and to choose how they want to be governed.<br />

The Bush doctrine attempts to give every person throughout<br />

the world the right to choose, thereby clarifying the place of<br />

the democratic system in a world of diverse nations. In a 7<br />

March 2005 editorial, Michael Barone affirms: “George W.<br />

Bush gambled that actions can change minds. So far, he’s winning”<br />

(Barone 29).<br />

Opponents to the National Security Strategy<br />

Stanley Kurtz questions, “Could such a venture<br />

in democratic imperialism be harmonized with out liberal<br />

principles?” (Kurtz 1). Many <strong>United</strong> <strong>States</strong> Democrats and<br />

angry foreign nations believe the answer is no. Bush has met<br />

extreme opposition against his foreign policies, which have<br />

thereby affected his domestic policies through legislation<br />

such as the Patriot Act. Seamus Mine in an editorial in The<br />

Week claims: “It is not democracy that is on the march in the<br />

Middle East. It is the U.S. military” (Milne 15). He extends<br />

his analysis by asserting that the 140,000 troops patrolling the<br />

streets of Iraq do not equate to liberty and freedom. However,<br />

Stanley Kurtz uses an analogy to the British Empire’s<br />

occupation of India, recalling that democracy came to India<br />

“very slowly.” Many opponents of the Bush doctrine want<br />

instantaneous satisfaction and expect Bush to deliver freedom,<br />

liberty and immaculate human rights in an immediate turnaround.<br />

“It takes democracy to make democracy” (Kurtz 9).<br />

However, no matter the dissent against Bush, Democrats,<br />

Republicans and nations across the world do agree with<br />

the obligation of the War on Terror. And if the majority of<br />

Americans agree with this specific policy, all citizens have to<br />

do is look towards the sweeping democratic changes taking<br />

place all over the world. As general elections in Iraq took<br />

place with a higher voter turnout than the <strong>United</strong> <strong>States</strong>’<br />

and a presidential Palestinian election was successful, things<br />

are beginning to change in the Middle East. In Febru-<br />

25<br />

ary, thousands of Lebanese took to the streets to protest the<br />

Syrian occupation, demanding democracy. In Egypt, Hosni<br />

Mubarak agreed to allow a second party to the presidential<br />

elections. In Saudi Arabia, the first multi-candidate elections<br />

took place in February. However, in a 5 March 2005<br />

article of the Economist, the writer blatantly says, “The Middle<br />

East is still a dangerous mess. The despots are not becoming<br />

democrats overnight” (Democracy 9). Even if the Middle<br />

East is not perfect yet, Americans must realize that democracy<br />

cannot be linked with immediate satisfaction. Mortimer<br />

Zuckemeran, in an 11 April 2005 US News and World<br />

Report reminds his readers: “Our strategy to push for democratization<br />

is admirable. But let’s recognize that the social and<br />

cultural changes of the Middle East mean it will take time”<br />

(Zuckerman 84).<br />

Opponents of the National Security Strategy are not<br />

merely confined within the borders of the country. The Bush<br />

administration must recognize the true meaning of democracy,<br />

even when it comes at a cost to the Untied <strong>States</strong>. In<br />

Venezuela, Hugo Chavez, the popularly elected president still<br />

holds onto anti-American tendencies. Bush must accept the<br />

dissent and embrace the opponents to his policies, in order<br />

not to lose the pathway to true democratic establishments<br />

(Kurtz 9). The <strong>United</strong> <strong>States</strong> faces the problem of democratizing<br />

cultures that hold different ideals and spiritual values<br />

than what our government is based on. John Stuart Mill in<br />

Representative Government insists that democracies in “uncivilized<br />

countries” must arise first from the formation of democratic<br />

assemblies until full representative government can<br />

be achieved (Kurtz 8). When applied to Iraq, this assembly<br />

is the Iraqi governing council. Whether critics to the Bush<br />

administration lie within or outside the <strong>United</strong> <strong>States</strong>, George<br />

W. Bush must take each opinion carefully and proceed cautiously<br />

as he attempts to provide democracy empirically. The<br />

true line between democratic imperialism and imperialism<br />

will be drawn according to the Bush administration’s reaction<br />

to democratically-induced anti-US sentiments.<br />

The US as a necessary hegemonic power<br />

The article: “A Strategy for Republican Empire?”<br />

emphasizes that Bush’s foreign policy is correct and justified<br />

in order to maintain world order. Hegemonic stability theory<br />

believes that economic prosperity can only be gained through<br />

the presence of a powerful state that is willing to provide<br />

international security (“A Strategy 2). America is now that<br />

hegemonic power. As soon as economic prosperity is gained,<br />

peace will follow. Many others agree with this theory and<br />

America’s homeland security is maintained in the process of<br />

intervening abroad. “Terrorism against American interests<br />

‘over there’…should be regarded just as we regard terrorism


against America ‘over here’” (One 32). Foreign powers must<br />

realize the necessity of a world superpower, both economically<br />

and politically. “The Europeans, with the French and Germans<br />

to the fore, have been gracelessly loth to admit that the<br />

Bush doctrine, however crassly simplistic in expression and<br />

implementation, has moved the scenery—in the right direction”<br />

(Democracy 9).<br />

Bush has caused a sudden democratic stirring in the<br />

Middle East, with the original intent to keep Americans safe<br />

at home. Thucydides believed that countries went to war for<br />

three reasons: fear, honor and interest. The Bush doctrine<br />

is influenced by theses three reasons, though it is primarily<br />

honor and fear. Furthermore, Thucydides also believed that a<br />

state is most secure when it is surrounded by those like itself<br />

(‘A Strategy” 2). In such a global and technological age, it<br />

is no longer the neighbors of a state who can pose harm to<br />

one country; therefore, Bush realizes the necessity of containing<br />

terrorism overseas as well. Not only is Bush preaching<br />

classical military theorists through his actions, but he is also<br />

echoing the doctrine and beliefs of Woodrow Wilson, who<br />

believed in a liberal and free world order (Ajami 31).<br />

Bush boldly declares again and again that American<br />

presence in the Middle East is necessary during the times of<br />

terrorism. The hegemonic stability theory and the current<br />

times of crisis throughout the world dictate the <strong>United</strong> <strong>States</strong><br />

to be the world’s democratic imperialist. For, “peace is maintained<br />

ultimately by the power of the strong” (“A Strategy” 2).<br />

Altering the Bush Doctrine in the face of change<br />

Even if the Bush doctrine has been accepted as successful<br />

to a certain degree by Democrats, Republicans and<br />

foreigners alike, there is always room for alteration. “American<br />

foreign policy thinking also suffered from a reluctance to<br />

abandon, alter or at times even reconsider policies adopted to<br />

meet Cold War needs” (Huntington 309). Now that analysts<br />

have determined the necessity of US power abroad, and met<br />

the opposition head-on, it is time for the Bush administration<br />

to address the challenges of creating new democracies<br />

and allowing them to be sovereign. “For the <strong>United</strong> <strong>States</strong><br />

to be fully secure and prosperous, everyone must be secure<br />

and prosperous” (“A Strategy” 2). Security and prosperity<br />

ultimately stem from rule by the people. As soon as the Bush<br />

administration can achieve democracy in these areas, Americans<br />

will be better off—both domestically and internationally.<br />

Democracy, however, takes time and the formation of a cohesive<br />

political policy requires analysis first and foremost, but<br />

can only be implemented through trial and error. The Bush<br />

administration has taken the first and the hardest steps to creating<br />

a peaceful world through the power of one, but the next<br />

democratically elected administration must maintain the same<br />

26<br />

lofty goals in order to secure the prosperity of the global community.<br />

Therefore, the political motives of Bush and his successors<br />

and the military implementation are inherently linked.<br />

As Clausewitz once said, “War is politics by other means.”<br />

Works Cited<br />

Ajami, Fouad. “A sudden, powerful stirring.” US News and<br />

World Report. 14<br />

Mar. 2005: 30.<br />

“A Strategy for Republican Empire? Understanding the Bush<br />

doctrine.”<br />

Online posting. 22 Oct. 2003. 15 Apr. 2005.<br />

Barber, Benjamin R. Jihad vs. McWorld. New York: Ballantine<br />

Books, 1996.<br />

Barone, Michael. “Minds are changing.” US News and World<br />

Report<br />

7 Mar. 2005: 29.<br />

“Democracy stirs in the Middle East.” The Economist 5 Mar.<br />

2005: 9.<br />

Hulme, T E. “Essays on War.” Conservatism: An Anthology<br />

of Social<br />

and Political Thought From David Hume to the<br />

Present. Comp. Jerry<br />

Z. Muller. Princeton: Princeton UP, 1997. N. pag.<br />

Huntington, Samuel P. The Clash of Civilizations and the<br />

Remaking of World Order. New York:<br />

Touchstone, 1996.<br />

Kurtz, Stanley. Democratic Imperialism: A Blueprint. Stanford<br />

University. 15 Apr. 2005.<br />

Lutz, Donald S. A Preface to American Political Theory.<br />

Lawrence: University P of Kansas, 1992.<br />

Milne, Seamus. “America’s Real Agenda is Power.” The Week<br />

25<br />

Mar. 2005: 15.<br />

“One nation after all.” The Economist 11 Sept. 2004: 32.<br />

State of the Union Address. 2 Feb. 2005. White House. 15<br />

Apr. 2005 .<br />

Zuckerman, Mortimer B. “Good Things Take Time.” Editorial.<br />

US News<br />

and World Report 11 Apr. 2005: 84.


MORALLY BOUND TO NATIONAL SECURITY<br />

By C3C Brady Cillo<br />

More and more often we see headlines in the news<br />

about powerful people, the nation’s leaders, who have dismissed<br />

ethics from their practices in an effort to get ahead by<br />

any means available. Recently, corporate leaders of Enron,<br />

Martha Stewart, and Sammy Sosa, along with many others,<br />

have allegedly forgone personal ethics by opting to take the<br />

easy route and cheating. While the integrity of these individuals<br />

will always be compromised, their lives will continue to<br />

go on, despite attention from the media. A serious problem<br />

occurs when, rather than a well known celebrity, a military<br />

professional chooses to forgo basic morals and puts national<br />

security into question. One way to circumvent this problem<br />

before it manifests itself lies in the acceptance and commitment<br />

to a moral or ethical code that acts as a stepping-stone<br />

in developing one’s own ideals. True adherence to a moral<br />

code such as the <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>’s Cadet<br />

Honor Code develops the character, integrity, and honor<br />

necessary of an officer in today’s military and remains essential<br />

to protecting national security. Past examples of national<br />

security breaches help illustrate the breakdown in morals<br />

and further display the need for an effective honor code. An<br />

analysis of today’s Honor Code reinforces the concepts behind<br />

instilling a value system in every person.<br />

On 14 June 2000, a man named George Trofimoff<br />

was arrested by the FBI for supplying the USSR with information<br />

critical to the security of the <strong>United</strong> <strong>States</strong>. The case<br />

was notable because Trofimoff was the nation’s highest ranking<br />

military member ever convicted of espionage. The Army<br />

Reserve Colonel was charged for and admitted to 25 years<br />

of spying for the USSR and Russia, earning over $250,000<br />

during his career (George). Recruited by the KGB in 1969,<br />

Trofimoff allegedly supplied the USSR/Russia with documents<br />

regarding what the US knew about the defense capabilities<br />

of the USSR and Warsaw Pact nations (Ex-colonel).<br />

On 28 September 2001, Trofimoff was given a break, when,<br />

instead of the death penalty for treason, he was sentenced to<br />

life in prison without possibility of parole (George).<br />

John A. Walker Jr. was sitting in a hotel room pondering<br />

the possible reasons he had not received his payment.<br />

After he had placed the paper bag full of 129 stolen classified<br />

US Navy documents at the drop location, he went to find<br />

his payment of $200,000 in another location, but never succeeded.<br />

Suddenly, he received a phone call from the front<br />

desk that he believed to be a ploy to lure him out of the<br />

room. He looked out the window and saw no police cars in<br />

the parking lot, so he left the room. He was immediately<br />

apprehended by two FBI agents, who promptly strip-searched<br />

27<br />

him and effectively ended his spy career. John Walker, a US<br />

Navy warrant officer, had been engaging in espionage for the<br />

USSR for 18 years. He formed a spy ring, composed of his<br />

son, Michael Walker, and his older brother, Arthur James<br />

Walker. Michael was a petty officer on the USS Nimitz, and<br />

was in charge of disposing of classified documents. Arthur,<br />

a retired Navy Lieutenant Commander, worked for a defense<br />

contractor and was in the position to easily smuggle defense<br />

documents to John. With these sources, John would take the<br />

documents and sell them to the KGB in return for large sums<br />

of money. The most disturbing information that John passed<br />

to the Russians was the ‘keylists’ or encryption codes that<br />

could decipher the Navy’s secret transmissions (Earley 1-4).<br />

In an interview with Russian KGB agent, Vitaly Yurchenko,<br />

Yurchenko admitted that “[the USSR] deciphered millions of<br />

[US] messages. If there had been a war, [the USSR] would<br />

have won” (Earley 1). In the end, John and Arthur received<br />

life imprisonment, and Michael earned 25 years in prison,<br />

lessened by his father’s divulgence of information to the FBI<br />

(Earley 4).<br />

These examples bring to light a true American tragedy.<br />

American citizens, and, more importantly, military<br />

members, who are driven by nothing else than greed for<br />

foreign money, have betrayed the greatest free country in the<br />

world. They compromised national security on the basis of<br />

a big pay-day. Besides a collapse of national security, a total<br />

breakdown of morals occurred on the parts of Trofimoff and<br />

Walker. They completely disregarded character, honor, and<br />

integrity, and were left with nothing except lifetime jail sentences,<br />

the loss of others’ trust, and dishonor to their names.<br />

A case can be argued as to whether these men would have<br />

committed the same crimes had they been under some type<br />

of moral code for a period of four years, like cadets at the <strong>Air</strong><br />

<strong>Force</strong> <strong>Academy</strong>.<br />

A recent article by Darryl Goldman of the Military<br />

Review claims that the Department of Defense has a dilemma<br />

of military members not having the same ethics and values<br />

that they once had. He claims that “the young men and<br />

women joining the military today are a diverse aggregation,<br />

generally without the homogeneous values of their grandparents”<br />

(Goldman). He implies that the values once instilled<br />

by a strong family background no longer exist today as they<br />

once did. Goldman also points out that the military has “no<br />

effective mechanism for teaching [its members] the values<br />

traditionally esteemed by our military services” (Goldman).<br />

This seems to be a reality in the operational <strong>Air</strong> <strong>Force</strong>, as<br />

there seems to be no unified approach to achieving this goal.<br />

Instead, the new trend has become isolated human relations<br />

initiatives, such as a program on violence prevention that<br />

divides into smaller subdivisions like workplace violence,


sexual assault, and suicide prevention (Goldman). These<br />

individual topics draw attention away from the underlying<br />

goal of more improved ethics training. It appears as though<br />

a more encompassing, universal code is necessary to promote<br />

the kind of morals and ethics that the military requires. Once<br />

again, the reference to a moral code such as the <strong>Air</strong> <strong>Force</strong><br />

<strong>Academy</strong> Cadet Honor Code conveys its importance and significance<br />

in today’s society.<br />

In order to understand the benefits of the Honor<br />

Code, an analysis of its purpose, components, and future<br />

outlook is necessary. In the beginnings of the newly formed<br />

<strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> in 1947, a main concern was the<br />

lack of a sufficient supplier of professional, honorable officers<br />

(Charles 178). Many government leaders agreed that a separate<br />

institution such as West Point or Annapolis was necessary<br />

for the <strong>Air</strong> <strong>Force</strong> as well. The bill for this new institution<br />

was signed into law in early 1954, and the rest is history<br />

(179). The <strong>Academy</strong>’s first superintendent, General Hubert<br />

R. Harmon realized the need for some sort of honor structure<br />

that would promote and develop the values necessary of<br />

future <strong>Air</strong> <strong>Force</strong> officers. He also knew that the system must<br />

not only be accepted by cadets, but implemented and maintained<br />

by cadets as well (180). Captain Leonard J. Mahony<br />

of the <strong>Academy</strong>’s first class reflected on the initial process by<br />

saying, “it was clearly transmitted that the code belonged to<br />

us—to accept, change or even reject” (181-2). An almost<br />

unexpected unanimous acceptance of the newly formed code<br />

occurred even without a vote, and established the statement:<br />

“We will not lie, cheat, or steal, nor tolerate those who do”<br />

(182).<br />

The purpose of the newly adopted Code was<br />

summed up beautifully by General Mark Clark, Allied Commander<br />

in WWII, when he said, “A stern code of ethics, a<br />

strong sense of personal morality, ‘obedience to the unenforceable”—these<br />

are qualities a leader must have at the core<br />

of his being…without a firm moral base a man is too unsure<br />

of himself to be an effective leader” (Charles 70). The Honor<br />

Code acts as the code of ethics and the firm moral base to<br />

which Clark refers. It undeniably chips away at the core of<br />

every person’s being, until that person’s foundation has been<br />

replaced with a rock solid base of values that allows him or<br />

her to instinctively make honorable decisions. The honor<br />

system is based on the condition that cadets are willing and<br />

insist on having the Code for themselves, which strengthens<br />

its effectiveness. Exercising the right to modify the Code in<br />

1961, cadets reworded it to its current statement: “We will<br />

not lie, steal, or cheat, nor tolerate among us anyone who<br />

does” (184). These four precepts truly embody the essence of<br />

an honorable leader and provide common values for everyone<br />

under the Code.<br />

28<br />

By definition, the code is meant to guard against the<br />

liar, the cheat, the thief, and the acceptance of their deceitful<br />

acts (Charles 185). Lying constitutes any statement, written<br />

or spoken, that is not entirely true. It includes direct<br />

untruths, but also involves other statements, such as not telling<br />

the whole truth. Suppose an upperclass cadet asks if a<br />

fourthclassman has shined his shoes, implying on the same<br />

day. By responding “yes,” because he shined his shoes the<br />

day before, the fourthclassman conveyed a false image, and<br />

committed an honor violation (186). In the above examples<br />

of national security breaches, both Trofimoff and Walker<br />

lived lives of deceit by masking their true feelings and actions<br />

toward the <strong>United</strong> <strong>States</strong>. These men became immune to the<br />

fact that they were lying to everyone, and this helped them<br />

rationalize their actions. Lying must be eliminated from the<br />

thoughts of a leader, or else he too may become desensitized<br />

by such words and actions.<br />

Stealing deals with the taking of someone else’s<br />

property, thus depriving the true owner of its use (Charles<br />

188). In order to borrow an item, a cadet must have actual<br />

or implied permission, and must leave a note explaining the<br />

case. Stealing can also include destruction of government<br />

property, because in doing so, others are effectively deprived<br />

of the property’s use. When it comes down to it, people must<br />

realize that if it does not belong to them, then they shouldn’t<br />

take it. A big controversy occurs at the <strong>Academy</strong> when cadets<br />

believe that even small things like the condiments of peanut<br />

butter, ketchup, and honey, and utensils are somehow free for<br />

the taking. Actions as seemingly small as this are considered<br />

honor violations (188-90). Obviously, Trofimoff and Walker<br />

were both stealing on a large scale. They used their power to<br />

steal secrets vital to national security, and handed them over<br />

to the enemy for money. A moral breakdown occurred in<br />

both men when they deliberately took what was not theirs. A<br />

true leader understands that stealing is a means used by cowards<br />

who are never worthy of the things they obtain.<br />

Cheating involves having an unfair advantage over<br />

another in an academic or other situation (Charles 191).<br />

Whether during a test in the classroom, down on the intramural<br />

fields, or in the squadron, cheating remains unfair and<br />

immoral. The Dean of the Faculty tries to eliminate many<br />

cases by disallowing take-home tests, employing an alternating<br />

day system, and using the method of academic security.<br />

The Dean understands the importance of academics in class<br />

standing, and realizes that in this area, many people will be<br />

tempted to cheat. Overcoming this temptation forms one<br />

aspect of the foundation a leader acquires while under the<br />

Code. Trofimoff and Walker cheated the system by earning<br />

income not included in their job descriptions. They found<br />

ways to carefully and meticulously take unfair advantages


over others through exploitation of national secrets. A leader<br />

must be strong-willed and confident in his abilities to disallow<br />

himself from cheating.<br />

Toleration is the element of the Code that separates<br />

the <strong>Academy</strong>’s honor code from that of other institutions.<br />

This clause keeps the Code in check because it forces cadets<br />

to be proactive in their pursuit of exposing dishonesty. The<br />

clause, however, is also the one that many people find hard to<br />

enforce for themselves. Many cadets may be confident that<br />

they would never lie, steal, nor cheat, but become hesitant<br />

when they observe others doing those deeds. One must realize<br />

that if a friend would ask to cover for his dishonesty, he<br />

cannot be that much of a friend (Charles 194). The families<br />

of Trofimoff and Walker undoubtedly knew of their relatives’<br />

spy careers, but tolerated their actions and delayed exposing<br />

them because they were family. In Walker’s case, he convinced<br />

his two brothers to join in his criminal activity. Time<br />

and time again, toleration proves to be the hardest decision a<br />

cadet and future leader can make. Tragically, a cadet may be<br />

ostracized by his or her peers because he turned in, or ‘ratted’<br />

on the person who actually committed the violation. A leader<br />

must be firm in his morals, and although one of the toughest<br />

decisions to make is ruining the career of another, the leader<br />

must also never forget that the person brought the violation<br />

on himself.<br />

Many issues with the Honor Code occur because<br />

cadets may view the whole system as something negative that<br />

is ‘always out to get them.’ Although accepting the Code is a<br />

critical choice in one’s life, and should remain of utmost priority,<br />

viewing the precepts by their positive complements may<br />

help some people on the fence make that important choice<br />

more easily. Instead of viewing the concepts of lying, stealing,<br />

cheating, and tolerating as always negative, many people react<br />

better to positive counterparts, by being able to associate these<br />

with the true values of leadership.<br />

The complement of lying becomes honesty. Honesty<br />

should be something every person attains just by living under<br />

the Code. Cadets should not try to find ways to bend the<br />

truth that could be construed as lying, they should just understand<br />

that being honest is part of life. Instead of thinking of<br />

stealing, the quality of respect is easier to measure. Whether<br />

it is respect for other’s property, or respect for them as people,<br />

the concept remains central to the overall spirit of the Honor<br />

Code. Mutual respect ties into attitudes about others, especially<br />

when faced with the decision to lie to them, steal from<br />

them, or cheat in spite of them. The counterpart of cheating<br />

takes the shape of fairness. If one acts fairly in all endeavors,<br />

cheating will never cross the mind. When faced with that terrible<br />

temptation of copying an answer or plagiarizing an essay,<br />

one must remember how fair it would be to take advantage of<br />

29<br />

his peers like that, and act accordingly. Toleration remains the<br />

toughest precept for most cadets, and can be equivocated with<br />

support. As long as cadets support each other and do not let<br />

themselves fall into the pits of dishonesty, they will never have<br />

to make those tough decisions. These alternate perspectives<br />

of the Honor Code precepts help to better convey their true<br />

intentions.<br />

By observing and living the Honor Code on a dayto-day<br />

basis, cadets become accustomed to it and strive to<br />

live up to its standards. Edgar Holt, author of the History<br />

of the <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>, noted that “one of<br />

the most significant features of the cadet way of life was the<br />

part the Honor Code played in every facet of cadet activities”<br />

(Calkins 15). From the beginning of the cadet career, the<br />

cadet is bombarded with encouragement to live honorably<br />

under the Code. By commissioning date, “observance of the<br />

Code on every occasion would have become so much a part<br />

of the inner being of each man that he would be guided by it<br />

throughout his life” (15). This fortunate side effect of living<br />

under the Code is the key to a secure nation for the future.<br />

Some may argue that men like Trofimoff and Walker<br />

were inherently prone to crime and unethical behavior, and<br />

that living under the Code may not have prevented their<br />

actions. However, if this were true, some manifestation of<br />

their lacking integrity would likely have shown while under<br />

the Code and they would have been weeded out. It may be<br />

true that some men and women cannot be swayed by the<br />

Code, but if so, at least this fact becomes apparent and these<br />

individuals are not placed in positions that could compromise<br />

national security in the first place. These people comprise<br />

a minority, because most people living under the Code will<br />

develop and reinforce the continued morals necessary of <strong>Air</strong><br />

<strong>Force</strong> officers.<br />

In a world of changing technology, ruthless competition,<br />

and getting ahead by any means possible, one thing<br />

must remain absolutely steadfast: a person’s morals. The <strong>Air</strong><br />

<strong>Force</strong> <strong>Academy</strong> cadets do their best to support and enforce<br />

the Honor Code, in hopes to eliminate cases like those of<br />

Trofimoff and Walker. These past and current threats to US<br />

national security from the homeland side all stem from a<br />

breakdown or lack of morals. The Honor Code prevents this<br />

breakdown in morals by daily exposure to the officer values of<br />

respect, honesty, fairness, and support that become so deeply<br />

instilled in the cadet that nothing will be able to budge his<br />

will-power throughout his career. A moral or ethical code like<br />

that of the <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong> is extremely crucial to national<br />

security in the future of our <strong>Air</strong> <strong>Force</strong> and nation.


Bibliography<br />

Calkins, Raymond. The Morality of the <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong><br />

Honor Code. Washington, DC: 1966.<br />

Charles, William. Honor Codes: Can They Develop Integrity<br />

in Future Military Leaders? Fort Leavenworth,<br />

Kansas: 1968.<br />

Earley, Pete. “Family of Spies: The John Walker Jr. Spy Case.”<br />

Crime Library: Criminal Minds and Methods.<br />

. 19 October 2003.<br />

“Ex-colonel of USA Trofimoff’s Arrest.” Timeline: On Behalf<br />

of National Security. .<br />

20 October 2003.<br />

“George Von Trofimoff Biography.” Office of the National<br />

Counterintelligence Executive. . 19 October 2003.<br />

Goldman, Darryl. “The Wrong Road to Character Development?”<br />

Military Review, Jan/Feb 98, Vol. 78, Issue<br />

1. EBSCOHost Searchable Database. 18 Oct 2003.<br />

30<br />

“MIND OVER MATTER: THE CASE FOR DECEN-<br />

TRALIZING PSYCHOLOGICAL OPERATIONS<br />

(PSYOP) IN MODERN WARFARE”<br />

BY<br />

C1C KRISTEN L. FAGEN<br />

INTRODUCTION<br />

Statement of Research Question<br />

“There are but two powers in the world, the sword<br />

and the mind. In the long run the sword is always beaten by<br />

the mind,” stated Napoleon Bonaparte, describing the power<br />

of the mind in battle over the physical aspects of war. 1 Psychological<br />

warfare involves the use of mental persuasion in<br />

manipulating the enemy to give in to military objectives without<br />

the use of weapons or destruction. Psychological operations<br />

(PSYOP) have been utilized in military conflict since the<br />

beginning of warfare. The importance of PSYOP is evident<br />

in the writings of Sun Tzu and documented in the military<br />

theory and doctrine of such historic figures as Clausewitz and<br />

Napoleon. PSYOP have been officially utilized under organized<br />

commands in the U.S. military since World War I and<br />

is likely to play an ever increasing role in military operations<br />

into the future. 2<br />

The organization and use of PSYOP in the U.S.<br />

military has been inconsistent throughout the last century as<br />

a result of the fluctuating requirements for PSYOP in different<br />

conflicts and varying combat situations. This leads to my<br />

thesis question: “Has the U.S. military developed the optimum<br />

organizational potential for the delivery of psychological<br />

operations in an era of expanding contingency operations?”<br />

This question demands an examination of current U.S. military<br />

PSYOP organization and of the roles PSYOP play in<br />

military operations. In addition, the need for better PSYOP<br />

organization and defined PSYOP roles will be analyzed and<br />

our present PSYOP capabilities will be determined. This<br />

paper will evaluate how well the U.S. is prepared to utilize<br />

PSYOP in the future. On the basis of this analysis, recommendations<br />

will be offered on ways to improve the conduct<br />

and organization of PSYOP. Sophisticated and well-organized<br />

PSYOP are critical to a modern U.S. military that is prepared<br />

to fight the wars of the twenty-first century.<br />

Background and Significance of the Problem<br />

PSYOP has the potential to play a vast role as a force<br />

multiplier and a combat reducer in the post-Cold War era. 3<br />

PSYOP allow a military force to mentally counteract and<br />

overcome the enemy with limited manpower, limited physical<br />

fighting, and limited carnage. Serving as a force multiplier,<br />

PSYOP expands force capability without the need for more<br />

personnel. Also, PSYOP reduces the need for combat since<br />

the enemy can be persuaded to surrender without physically


fighting. Sun Tzu stated “that the most noble victory [is]<br />

to subdue the enemy without a fight”. 4 PSYOP seeks to do<br />

this. As an adjunct to conventional warfare, PSYOP are used<br />

to facilitate a country’s war fighting capability by mentally<br />

weakening the enemy forces or civilian population in order to<br />

reach a military goal without the spilling of enemy or friendly<br />

blood. PSYOP virtually persuade an adversary to give up the<br />

fight.<br />

Despite the attractiveness of successful psychological<br />

warfare, the use of organized PSYOP in U.S. military operations<br />

was limited in the twentieth century and is still limited<br />

today, partially due to a lack of PSYOP organization. The<br />

lack of organization can be linked to the inconsistent use of<br />

PSYOP in past U.S. military operations. The U.S. military<br />

limited its use of PSYOP in the twentieth century. This is<br />

evident in the rise and fall of PSYOP use during and after<br />

wars or conflicts. 5 Interest in PSYOP would rise during war<br />

then fall after the conflict was over, making PSYOP a forgotten<br />

form of warfare in the interwar periods. This lack of<br />

interest yielded limited PSYOP organization efforts, and left<br />

the Army the only military service with permanent operational<br />

PSYOP groups. Currently, the only existing active<br />

PSYOP group in the U.S. military is the Army’s 4 th Psychological<br />

Operations Group (<strong>Air</strong>borne) at Fort Bragg, North<br />

Carolina. 6 Their mission is “to deploy anywhere in the world<br />

on short notice, and plan, develop, and conduct Civil Affairs<br />

and Psychological operations in support of Unified Commanders,<br />

coalition forces, or other governmental agencies as<br />

directed by the National Command Authority”. 7 Reserve and<br />

guard units also participate in PSYOP delivery, including the<br />

Pennsylvania <strong>Air</strong> National Guard’s 193 rd Special Operations<br />

Wing and a number of Army Reserve components. 8 The <strong>Air</strong><br />

<strong>Force</strong>’s 39 th Information Operations Squadron at Hurlburt<br />

Field is involved in information warfare training which contributes<br />

to PSYOP strategy, but the squadron does not have<br />

an active, operational PSYOP component that is involved in<br />

the delivery of PSYOP. 9<br />

As the only U.S. military PSYOP forces, the 4 th<br />

PSYOP group and reserve and guard PSYOP units, are tasked<br />

with several PSYOP roles. One of the key roles of PSYOP<br />

is to “ensure a seamless information effort by designing an<br />

organization that can coordinate PSYOP efforts at the strategic,<br />

operational and tactical levels”. 10 This task requires the<br />

coordination of PSYOP among multiple PSYOP units, since<br />

one unit cannot seek to control all combat levels at once. A<br />

defined PSYOP organization is necessary to direct the activities<br />

of multiple PSYOP units at the varying levels of war.<br />

PSYOP can be utilized at all levels of war: strategic, operational,<br />

and tactical, and they can also be utilized in all phases<br />

of war, including operations preceding war, during war, and<br />

31<br />

after war. 11 PSYOP are also applicable to any type of military<br />

operation, including the support of conventional warfare,<br />

special operations, peacetime efforts, major military conflicts,<br />

or small, less intense military contingencies. 12 While PSYOP<br />

may be relevant to several types of military operations, phases,<br />

and levels of war, PSYOP efficacy and use are limited by poor<br />

organization of forces responsible for PSYOP delivery. A<br />

better-organized and better-defined PSYOP force would result<br />

in a more modern and better-prepared U.S. military.<br />

Limitations<br />

The limitations surrounding this study pertain to<br />

PSYOP aspects that do not directly influence the organization<br />

and the roles of PSYOP. PSYOP doctrine will be discussed,<br />

but equipment, technology, and training aspects of PSYOP<br />

will be disregarded, since these categories do not apply to the<br />

organization of PSYOP delivery. Equipment and advanced<br />

technology are critical to successful PSYOP but they are not<br />

critical to the study of PSYOP organization. While equipment<br />

and technology play a large role in the modernization of<br />

PSYOP, description of these elements would only add complex<br />

scientific information to the study. Finally, the importance<br />

of training this study is negligible since training cannot<br />

be a focus until PSYOP organization is determined.<br />

This study will focus on U.S. Army and U.S. <strong>Air</strong><br />

<strong>Force</strong> PSYOP doctrine and organization. The U.S. Navy and<br />

Marine Corps’ use and organization of PSYOP will not be<br />

considered in depth. While the Navy and Marine Corps have<br />

PSYOP capabilities, those services play a very limited PSYOP<br />

role at this time. For the purposes of this study, it is assumed<br />

that the <strong>Air</strong> <strong>Force</strong> and the Army will be the key actors in<br />

military PSYOP in future contingencies. Accordingly, recommendations<br />

for PSYOP organization will center on <strong>Air</strong> <strong>Force</strong><br />

and Army needs.<br />

Relevance to current problems involving PSYOP<br />

organization will determine selection of specific case studies.<br />

Moreover, specific emphasis will be given to the most<br />

recent U.S. military operations, specifically Operation Desert<br />

Storm and Operation Allied <strong>Force</strong>, since they appear to hold<br />

the most significance for the future of PSYOP organization.<br />

While earlier operations involving the role of PSYOP<br />

do pertain to historical PSYOP organization, they are not as<br />

applicable to this study regarding the future of the PSYOP<br />

organization.<br />

Definitions and Assumptions<br />

Several definitions are critical to the analysis and<br />

arguments proposed in the study. The following terms will be<br />

used throughout the study:<br />

Information Operations (IO). According to Joint Publication<br />

3-53, Doctrine for Joint<br />

Psychological Operations, Information Operations are


defined as “actions taken to affect<br />

adversary information and information systems while<br />

defending one’s own information and information<br />

systems”.<br />

32<br />

13 IO includes several types of operations,<br />

including military deception, psychological operations,<br />

electronic warfare, operational security, and<br />

computer network operations. 14<br />

Psychological Operations (PSYOP). According to the Doctrine<br />

for Joint Psychological<br />

Operations, PSYOP are defined as “planned operations<br />

to convey selected information and indicators<br />

to foreign audiences to influence the emotions,<br />

motives, objective reasoning, and ultimately the<br />

behavior of foreign governments, organizations,<br />

groups, and individuals”. 15<br />

Organization. The official parties in control, their strategy,<br />

what specific operations they are in<br />

control of, how they utilize their control, and if they<br />

share or do not share control with other parties.<br />

Delivery. Refers to the act of conducting PSYOP as opposed<br />

to the strategic planning of<br />

PSYOP.<br />

Strategic PSYOP. Utilized by “U.S. government departments<br />

and agencies…to influence<br />

foreign attitudes, perceptions, and behavior in favor<br />

of U.S. goals and objectives…These activities take<br />

place predominantly outside the military arena, but<br />

frequently use DOD assets and receive support from<br />

military PSYOP forces”. 16<br />

Operational PSYOP. “Conducted prior to, during war or<br />

conflict, and at the conclusion of open<br />

hostilities in a defined geographic area to promote the<br />

effectiveness of the area commander’s campaigns and<br />

strategies”. 17<br />

Tactical PSYOP. “Conducted in the area assigned a tactical<br />

commander during conflict and war<br />

to support the tactical mission against opposing<br />

forces”. 18<br />

Iraqi Freedom. Finally, organizational recommendations will<br />

be offered for enhancing PSYOP in the future.<br />

Before the question --“Has the U.S. military developed<br />

the optimum organizational potential in the delivery of<br />

psychological operations in an era of expanding contingency<br />

operations?”-- is fully examined, a review of the pertinent literature<br />

is necessary to determine what information is available<br />

from previous research on the topic of PSYOP.<br />

LITERATURE REVIEW<br />

General History of PSYOP<br />

The use of PSYOP has existed since the beginning of<br />

warfare. Documented as far back as biblical times, PSYOP<br />

have been used to mentally manipulate the enemy to meet<br />

certain military objectives. James Radvanyi mentions several<br />

uses of PSYOP throughout history:<br />

Psychological operations are as old as the history of<br />

mankind; indeed, the Bible records numerous cases,<br />

such as the ‘torch-game’ deception of Gideon against<br />

the Midianites that forced them to retreat…the Athenians’<br />

clever use of psychological warfare against the<br />

Melians in the Peloponnesian War…the Romans’<br />

disinformation and blackmail campaigns that ultimately<br />

forced the Carthaginians to surrender in the<br />

Punic Wars…And, one should never forget that the<br />

success of the Golden Horde of Genghis Khan partly<br />

depended on frightening rumors about the savagery<br />

and the greatly exaggerated numbers of the Khan’s<br />

horsemen army.<br />

Preview of Argument<br />

The argument presented in this study will address<br />

the organizational requirement for a modern and successful<br />

PSYOP force ready to face the demands of expanding contingency<br />

operations. It will be determined if the U.S. military<br />

has achieved the optimum organizational arrangements for<br />

PSYOP delivery, or whether organizational changes are necessary<br />

to more effectively utilize PSYOP in contemporary warfare.<br />

It is this researcher’s contention that such changes are<br />

indeed required. My argument will be supplemented by an<br />

evaluation of PSYOP in several recent or current U.S. operations,<br />

such as Operation Desert Storm, Operation Joint <strong>Force</strong><br />

in Bosnia, Operation Allied <strong>Force</strong> in Kosovo, and Operation<br />

19<br />

Many great warriors of the past wrote of the necessity for psychological<br />

means in warfare. As reported by James Rodgers,<br />

while Sun Tzu never used the term “PSYOP,” he did encourage<br />

his commanders “to know the enemy and know yourself;<br />

in a hundred years you will never be in peril,” and he recommended<br />

“[attacking] the enemy where weak, [defending]<br />

only where strong, and [achieving] deception” in warfare. 20<br />

Deception in warfare pertains to PSYOP and the resulting<br />

mental manipulation of the enemy. Differing from Sun Tzu’s<br />

teachings, U.S. PSYOP forces today rely more on sharing<br />

facts with the enemy rather than on deceiving the enemy, in<br />

order to expose true shortcomings in the enemy’s objectives,<br />

mentality, or leadership. More recent historical figures also<br />

have expressed their faith in the effectiveness of psychological<br />

warfare. Mao Zedong stated that, “The mind of the enemy<br />

and the will of his leaders is a target of far more importance<br />

than the bodies of his troops”. 21 This statement epitomizes<br />

the motive of PSYOP to this day; to wage war against the enemy’s<br />

mind and will rather than seeking the physical destruction<br />

of the enemy’s troops. According to Dr. Frank Goldstein,<br />

“Because soldiers and civilians have not fundamentally


changed in nature or psychology since Sun Tzu wrote these<br />

observations, they remain appropriate today”. 22<br />

History of PSYOP in the <strong>United</strong> <strong>States</strong><br />

Like other civilizations and nations, the <strong>United</strong><br />

<strong>States</strong> has utilized PSYOP in warfare throughout its history.<br />

While psychological warfare was used by Americans as early<br />

as the Battle of Bunker Hill, PSYOP did not become a formal<br />

activity of the U.S. military until World War I. 23 Goldstein<br />

mentions that several countries used both strategic and tactical<br />

PSYOP during WWI, including the use of propaganda<br />

created by specialized PSYOP units. 24 PSYOP officially<br />

became known as “psywar” during World War II and was<br />

employed mainly via public broadcast radio. 25 During the<br />

Korean Conflict and then the Cold War, PSYOP were best<br />

used by the Soviets. Western powers, including the U.S.,<br />

lagged behind in PSYOP potential through the Vietnam War.<br />

As expressed by Goldstein, the “North Vietnamese mastered<br />

the art of using the international media for their PSYOP”. 26<br />

In contrast, “U.S. PSYOP planning was not effectively formalized<br />

or coordinated with operations and troop mobilizations”.<br />

27 Following the Vietnam War, PSYOP was utilized in<br />

other combat operations including conflicts in the Falklands,<br />

Afghanistan, Africa, South and Central America, Grenada,<br />

Panama, and the Persian Gulf. 28<br />

American use of PSYOP has changed drastically over<br />

the years, but one theme has remained – the theme of fluctuating<br />

employment of PYSOP in U.S. military operations.<br />

According to Alfred Paddock, the use of PYSOP in warfare<br />

has fluctuated greatly throughout U.S. history. 29 Radvanyi<br />

agrees that American PSYOP can be considered inconsistent<br />

throughout American history, but he interprets this inconsistency<br />

as mere hesitancy to realize PSYOP’s effectiveness<br />

in war. He claims that, “Throughout its history, the U.S.<br />

approach toward practicing PSYOP can only be characterized<br />

as mild, if not timid”. 30 The episodic and timid nature of<br />

PSYOP has placed inadvertent limitations on the U.S. military’s<br />

use of PSYOP in warfare, for its full operational potential<br />

may still be unknown due to its restricted use in the past.<br />

The Role of PSYOP<br />

The roles PSYOP can play in military operations are<br />

boundless. According to Paddock, “PSYOP can be used to<br />

demoralize, disorient, and confuse hostile groups….Against<br />

such groups, PSYOP are employed as an offensive weapon<br />

to enhance the overall effectiveness of military operations”. 31<br />

Pugmire agrees and adds that “PSYOP are used throughout<br />

[a] campaign to support and achieve the commander’s<br />

objective...[the commander’s] PSYOP assets represent his only<br />

organic means to communicate directly with the enemy forces<br />

or civilians within his theater of operations”. 32 In addition to<br />

33<br />

the offensive and communicative nature of PSYOP, Goldstein<br />

claims that, “The ultimate objective of American PSYOP is<br />

to convince enemy, friendly, and neutral nations and forces to<br />

take action favorable to the U.S. and its allies”. 33 This objective<br />

is met by PSYOP at many different operational levels, in<br />

multiple phases of war, and in several types of war.<br />

As expressed by Pugmire, “Different levels of PSYOP<br />

have emerged that span the entire operational continuum”. 34<br />

These PSYOP levels include Strategic PSYOP, Operational<br />

PSYOP, and Tactical PSYOP. Strategic PSYOP are used to<br />

“influence foreign attitudes, perceptions, and behavior in<br />

favor of U.S. goals and objectives”. 35 Operational PSYOP<br />

are “conducted prior to, during war or conflict, and at the<br />

conclusion of open hostilities…to promote the effectiveness<br />

of the area commander’s campaigns and strategies”. 36 Tactical<br />

PSYOP are “conducted in the area assigned a tactical commander<br />

during conflict and war to support the tactical mission”.<br />

37 Goldstein goes into detail concerning both strategic<br />

and tactical uses of PSYOP. He asserts that “Strategic PSYOP<br />

are usually considered an aspect of public diplomacy and are<br />

normally established and guided by inter-government working<br />

groups created for a particular short-term situation or<br />

regional area of concern”. 38 Goldstein says that differing from<br />

strategic PSYOP, “In tactical or battlefield PSYOP, commanders<br />

use such techniques as loudspeaker broadcasts and leaflet<br />

drops with the intent of generating a force multiplier without<br />

having to increase force size”. 39 He further observes, “Psyopsers<br />

support tactical deception, counterterrorism, counterpropaganda,<br />

and other nontraditional means as the tactical situation<br />

merits”. 40<br />

The “operational continuum” expands with the<br />

multiple phases of war and types of conflict in which PSYOP<br />

may play a role. The three official phases are prior to, during,<br />

and after conflict or war. 41 It should be noted that war is not<br />

a prerequisite for the use of military PSYOP. PSYOP may<br />

be used in peacetime operations or in other types of conflict<br />

including conventional warfare, special operations, major<br />

military conflicts, and smaller, less intense military contingencies.<br />

Paddock emphasizes that “while PSYOP do have a<br />

mission in support of special operations, both in high-intensity<br />

conflicts and in low-intensity operations, they also have<br />

a much broader application in peacetime and crisis, with or<br />

without accompanying military operations, and across the<br />

entire spectrum of conflict”. 42 In another article, Paddock<br />

stresses that “First priority…must go to planning military<br />

PSYOP that will assist the unified commands- the combatant<br />

commands- and the conventional forces assigned to support<br />

them for various contingencies”. 43 Paddock includes a list of<br />

additional PSYOP roles that pertain to peacetime and lowintensity<br />

requirements:


Peacetime and low-intensity requirements…may<br />

include humanitarian assistance, peacekeeping,<br />

disaster relief, counter-drug operations, civic action,<br />

unscheduled studies and assessments oriented to<br />

crisis areas, advisory mobile training teams for the<br />

military forces of friendly nations, staff assistance to<br />

unified commands, counterterrorism, foreign internal<br />

defense, and support for DOD and non-DOD agencies.<br />

44<br />

This list proves that there are virtually no limits to the contributions<br />

PSYOP may make in military operations. Since<br />

there are so many possible PSYOP applications, there is great<br />

potential for a high demand for PSYOP in future contingency<br />

operations.<br />

The Current PSYOP <strong>Force</strong> Structure<br />

Despite the vast roles that PSYOP can play in warfare<br />

and other operations, the current U.S. PSYOP organization<br />

restricts PSYOP potential for future operations. The structure<br />

is limited by the small number of active duty members dedicated<br />

solely to PSYOP. The structure is also limited by the<br />

lack of organization among the U.S. military services. The<br />

different branches of the armed forces have individual PSYOP<br />

capabilities but their PSYOP responsibilities are not well<br />

defined and delineated from those of the other branches. The<br />

Army’s 4 th Psychological Operations Group (POG) at Fort<br />

Bragg is the only active duty group whose efforts are dedicated<br />

entirely to PSYOP. 45 The 4 th POG makes up 26 percent<br />

of all Army PSYOP units, while the remaining 74 percent is<br />

made up of reservists. 46<br />

“The majority of [delivery] expertise [resides] in the<br />

Army Reserve Components (RC),” explains Randall Bowdish,<br />

while the other Armed <strong>Force</strong>s branches have limited numbers<br />

of their own reserve or guard units dedicated to PSYOP. 47<br />

The other services have capabilities of their own to contribute<br />

to PSYOP:<br />

The <strong>Air</strong> <strong>Force</strong>’s radio and TV broadcast capability<br />

resides primarily in four EC-130 Commando Solo<br />

aircraft, assigned to the Pennsylvania <strong>Air</strong> National<br />

Guard…the Navy can produce audiovisual products<br />

from a host of imaging commands…and Marine<br />

Corps PSYOP support consists of shore-based loudspeaker<br />

broadcasting, aerial and artillery leaflet dissemination<br />

and audiovisual equipment. 48<br />

In addition to the aforementioned capabilities of the Marines,<br />

Navy, and <strong>Air</strong> <strong>Force</strong>, “A handful of <strong>Air</strong> <strong>Force</strong> officers with<br />

PSYOP expertise are serving in key positions in the Pentagon,<br />

among the unified commands, and at their Special Operations<br />

School at Hurlburt Field”. 49 Also, according to Paddock,<br />

34<br />

“The Marine Corps has two civil affairs groups with PSYOP<br />

as a secondary mission in its reserves”. 50 Despite the available<br />

capabilities of all four services, the Army and the <strong>Air</strong> <strong>Force</strong><br />

combined have the most capabilities to carry out PSYOP missions,<br />

as was demonstrated in both Operation Desert Storm<br />

and Operation Allied <strong>Force</strong>.<br />

While all four services have some PSYOP capabilities,<br />

their potential for successful PSYOP is retarded due to a continually<br />

“‘top-down’ centrally controlled, deliberate approach”<br />

to PSYOP and an “outdated Cold War strategy of force,”<br />

according to Steven Collins in Parameters, a professional journal<br />

published by the US Army War College. 51 Collins argues<br />

that while centralized control of PSYOP is good for “mid to<br />

high intensity” conflicts like Desert Storm, decentralized control<br />

would be more beneficial in the utilization of PSYOP in<br />

modern peacekeeping operations, since “tactical commanders<br />

need a high degree of local autonomy in order to be responsive”.<br />

52 The “Cold War strategy of force” refers to the focus<br />

on strategic PSYOP, rather than the more recently applicable<br />

tactical PSYOP.<br />

PSYOP Organization in Operation Desert Storm (Case Study)<br />

American PSYOP coalition efforts in Iraq during<br />

Operation Desert Storm were mainly tactical in nature and<br />

involved the combination of both ground and air components.<br />

53 There were four modes of delivery of PSYOP in<br />

Operations Desert Storm including radio transmissions,<br />

loudspeaker broadcasts, leaflet disseminations, and enemy<br />

prisoners of war (EPW) team actions. 54 The USAF and its<br />

EC-130 aircraft were responsible for the radio transmissions<br />

from the air, the 4 th POG was responsible for the loudspeaker<br />

broadcasts from the ground, and the leaflets for leaflet disseminations<br />

were prepared and packed into leaflet bombs by<br />

the Army and dropped out of <strong>Air</strong> <strong>Force</strong> aircraft. 55 The joint<br />

nature of PSYOP in the Gulf War is described in greater detail<br />

by Robert Adolph. Adolph mentions that “the 4 th PSYOP<br />

Group broadcast ‘Voice of the Gulf’ (VOG)…from fixed<br />

stations on the ground in Saudi Arabia and Turkey…and<br />

from specially modified <strong>Air</strong> <strong>Force</strong> EC-130 aircraft from the<br />

Pennsylvania <strong>Air</strong> National Guard, known as Volant Solo”. 56<br />

The Army also assisted the joint PSYOP coalition in leaflet<br />

drops with the Navy’s F/A-18 Hornet aircraft and the Marines<br />

“successfully directed a psychological operation over Faylaka<br />

Island in Kuwait Bay…with aid from a specially configured<br />

Marine helicopter mounted with a 2,700-watt loud speaker<br />

system…which [talked] enemy forces into laying down their<br />

weapons and surrendering en masse”. 57 The joint PSYOP<br />

coalition in Operation Desert Storm proved PSYOP to be<br />

very effective in fighting the war against Saddam’s regime.<br />

The temporary wartime organization of Army units and<br />

<strong>Air</strong> <strong>Force</strong> units, specifically, led to successful PSYOP that


esulted in 73 thousand Iraqis reached via PSYOP messages<br />

and 70 percent of the EPWs claimed that PSYOP messages<br />

had “impacted their surrender”. 58 A more tactical PSYOP<br />

approach proved successful in this operation.<br />

PSYOP Organization in Operation Deliberate <strong>Force</strong> (Case<br />

Study)<br />

Unlike Operation Desert Storm, Operation Deliberate<br />

<strong>Force</strong> was more focused on peacekeeping, thus there<br />

was even more need for “local autonomy” of the military<br />

commanders at a tactical PSYOP level, as noted above by<br />

Collins. 59 Collins claims that based on poor U.S. PSYOP<br />

performance in Bosnia, PSYOP needs to better “support<br />

tactical elements,” especially as the “U.S. military finds itself<br />

more involved in protracted struggles at the lower end of the<br />

spectrum of conflict,” for “low-intensity conflict is basically<br />

a struggle for people’s minds”. 60 Collins argues that three<br />

limitations beset PSYOP in Bosnia: 1) leaders’ inability to<br />

conduct an adequate reconnaissance or local media assessment<br />

before December 1995, 2) a lack of facilities and personnel in<br />

Sarajevo to conduct operations, and 3) a muddled policy with<br />

uncertain enforcement. 61 All of these issues relate to poor<br />

PSYOP organization and a poor definition of roles.<br />

PSYOP Organization in Operation Allied <strong>Force</strong> (OAF) (Case<br />

Study)<br />

PSYOP in OAF proved that a combined Army/<strong>Air</strong><br />

<strong>Force</strong> PSYOP coalition could deliver effective results in the<br />

war in Kosovo. The temporary organization of Army and<br />

<strong>Air</strong> <strong>Force</strong> PSYOP units under a joint command in Kosovo<br />

resulted in over 104.5 million dropped leaflets on Yugoslavia<br />

during OAF, according to Ellis of the 4 th POG at Fort Bragg. 62<br />

Once again, the Army’s 4 th POG and the <strong>Air</strong> <strong>Force</strong>’s EC-130s<br />

of the 193 rd Special Operations Wings, Pennsylvania <strong>Air</strong><br />

National Guard, combined efforts with the 7 th Special Operations<br />

Squadron in dropping leaflets that were intended to<br />

influence the Serbian people to turn against Slobodan Milosevic<br />

and his plans to purge Kosovo of the ethnic Albanians. 63<br />

The 193 rd also “assisted the PSYOP effort with airborne radio<br />

and television broadcasts”. 64 The beneficial results of PSYOP<br />

contributions during OAF determined that “PSYOP will<br />

continue to be a weapon of first choice as a combat and diplomatic<br />

multiplier and a combat reducer for future military<br />

operations”. 65 On the other hand, Robert Wall and David<br />

Fulgham argue that the “PSYOP tools” used in OAF were<br />

“largely ineffective,” for the “‘art’ of massaging the view of<br />

locals was not as successful as it might have been”. 66 This<br />

argument points to a significant difference of opinion on the<br />

success of PSYOP in OAF. Perhaps PSYOP was not used to<br />

its full potential in Kosovo due to its poor organization and<br />

ill-defined roles in the operation. This case study suggests<br />

that coalition organization of PSYOP has the potential to<br />

35<br />

reap positive results in military contingencies, but that it also<br />

requires that enhancement of PSYOP organization be considered<br />

and implemented in the future.<br />

PSYOP in Operation Enduring Freedom (OEF) and Operation<br />

Iraqi Freedom (OIF)<br />

(Case Study)<br />

Interestingly, Osama bin Laden has more successfully<br />

utilized PSYOP via media in the country of Afghanistan than<br />

the U.S. has utilized PSYOP in defeating bin Laden. According<br />

to James Poniewozik and others in “The Battle for Hearts<br />

and Minds,” bin Laden has manipulated the minds of the<br />

Afghani people to see America as the enemy of their Muslim<br />

faith and their country. 67 This is surely successful PSYOP, and<br />

much can be learned from bin Laden’s aggressive approach.<br />

While many pamphlets have been dropped into Afghanistan<br />

and Iraq and intensive broadcasts are being made, the people<br />

are not as receptive to PSYOP suggestions as they were in<br />

Operation Desert Storm or even the operations in the Balkans.<br />

It is essential that PSYOP groups understand the nature<br />

of the “sophisticated adversary” and the deep-seated attitudes<br />

of civilian audiences in countries like Afghanistan and Iraq. A<br />

more culturally informed and tailored tactical response by a<br />

PSYOP group would likely prove more successful.<br />

The Need to Modernize the PSYOP Organization<br />

While Operation Desert Storm, Operation Deliberate<br />

<strong>Force</strong>, and OAF showed combined forces PSYOP can be<br />

reasonably effective, it is evident that PSYOP organization<br />

needs to be modernized and structured in order to fully tap<br />

the potential of PSYOP in current and future military operations.<br />

As expressed by Paddock, there is a “need to modernize<br />

our PSYOP force structure, both in terms of personnel<br />

and equipment…not surprisingly, a considerable shortfall in<br />

PSYOP forces exists”. 68 Adolph agrees, saying that “America’s<br />

only active PSYOP organization is stretched to the limit…<br />

more force structure and fully trained personnel are required<br />

in the active component to accomplish the mission”. 69 The<br />

4 th POG is not capable of handling all PSYOP in the future<br />

as U.S. military contingencies expand. As emphasized by<br />

Adolph, “Even in time of peace, the operational tempo of the<br />

4 th PSYOP Group is one of the most demanding in any of<br />

the services, in that it provides support to all levels of DOD,<br />

and to special operations forces and conventional forces”. 70 In<br />

order to utilize PSYOP to its full potential, a larger, structured<br />

organization is needed. Bowdish calls for “a full-time cadre<br />

of PSYOP personnel,” perhaps a joint PSYOP unit with the<br />

necessary number of people to be prepared for all types of<br />

PSYOP, all over the world, at any given time. 71<br />

Current PSYOP Organizational Recommendations<br />

Several recommendations for future PSYOP organization<br />

already exist. Paddock claims that “three broad areas


must be addressed if the PSYOP community is to emerge<br />

from this period of transition to play a viable role in our<br />

nation’s security”: (1) education of senior civilian and military<br />

officials on the value of the psychological dimension; (2) planning<br />

for the use of military PSYOP in a changing world; and<br />

(3) continued modernization of the PSYOP force structure. 72<br />

Paddock’s PSYOP plan calls for a structured organization that<br />

can conduct psychological operations in a time of increasing<br />

resort to the military instrument of power. He challenges the<br />

military community to question whether full PSYOP organizational<br />

potential has been reached.<br />

Brooks makes some similar PSYOP recommendations.<br />

Brooks believes that in the future “we will be faced<br />

with ‘asymmetric’ multi-echeloned adversaries”. 73 These<br />

adversaries “will be more likely to attack our interests using<br />

information technology rather than traditional military<br />

means” and Brooks claims that PSYOP are necessary to<br />

counter that form of an offensive against the U.S. 74 In order<br />

to best modernize U.S. PSYOP forces, Brooks argues that<br />

PSYOP must select and retain quality people, provide quality<br />

training, focus on core PSYOP capabilities, and ensure a<br />

seamless information effort by designing an organization that<br />

can coordinate PSYOP efforts at the strategic, operational,<br />

and tactical levels. 75 The “seamless integration” requires<br />

that PSYOP forces “foster active and habitual relationships<br />

between agencies, between services, and between the active<br />

and reserve components”. 76 Like Paddock, Brooks is calling for<br />

the design of a PSYOP organization that can successfully span<br />

the “operational continuum” of future PSYOP contingencies.<br />

Another recommendation from both Collins and<br />

Maiers/Rahn is that the “PSYOP Task <strong>Force</strong> is on par with<br />

other Joint Task <strong>Force</strong> (JTF) component commanders and<br />

should be under the direct operational control of the Joint<br />

<strong>Force</strong>s Commander, rather than a sub-entity of the component<br />

commanders. Collins refers to this poor organization of<br />

PSYOP as due to the “lack of rank,” saying that the PSYOP<br />

Task <strong>Force</strong> is “on par with the other Joint Task <strong>Force</strong> component<br />

commanders and should be under the direct operational<br />

control of the Joint <strong>Force</strong>s Commander”. 77 Maiers/Rahn also<br />

suggest that PSYOP is not properly integrated into the overarching<br />

JTF plans and that information operations should<br />

be organized under a “centralized commander to coordinate<br />

activities on the JTF level”. 78 They recommend a joint information<br />

operations task force (JIOTF) that would be “critical<br />

[in] establishing and maintaining the knowledge superiority<br />

needed to execute rapid decisive operations” in an efficient<br />

and well-organized PSYOP community. 79<br />

THESIS BODY<br />

Modern psychological operations are based on a joint<br />

perspective due to the broad spectrum of operations to which<br />

36<br />

PSYOP is applicable and the overall joint nature of warfare<br />

in military contingencies today. According to the Doctrine<br />

for Joint Psychological Operations (JP 3-53), which “addresses<br />

military [PSYOP] planning, and execution in support of<br />

joint, multinational, and interagency efforts across the range<br />

of military operations”, the joint psychological operations<br />

task force (JPOTF) is considered a “subordinate joint command<br />

of a joint force” that has “coordinating authority with<br />

tactical forces for developing, producing, and disseminating<br />

PSYOP products”. 80 The joint nature of PSYOP imposes<br />

complex organizational challenges. Despite the current focus<br />

on the implementation of PSYOP tactics in modern American<br />

warfare, there is still much confusion as to the command<br />

structure and responsibility for PSYOP actions. The military<br />

is recognizing that PSYOP should be more decentralized and<br />

tactical, with responsibility devolving to commanders at the<br />

operational level. Decentralization of PSYOP will allow the<br />

U.S. military to more effectively face an unpredictable security<br />

environment characterized by counterterrorism operations<br />

and other contingencies requiring the measured application<br />

of force. It is also essential that PSYOP become more of<br />

a focus in all branches of the military, so that self-contained<br />

Army, <strong>Air</strong> <strong>Force</strong>, or Navy PSYOP units have the ability to<br />

wage psychological warfare against an enemy at the tactical<br />

level, with the supplies and capabilities specific to the PSYOP<br />

needs at that level.<br />

Currently, the Secretary of Defense delegates PSYOP<br />

product approval and dissemination to combatant commanders,<br />

who in turn may delegate PSYOP product approval to<br />

a joint task force (JTF) commander, but no lower than that<br />

without Secretary of Defense approval. 81 This highly centralized<br />

PSYOP organization inhibits PSYOP from being utilized<br />

at its greatest potential efficiency. In particular, the centralized<br />

approach to PSYOP prevents operational commanders<br />

from having effective authority to use PSYOP in a way that<br />

responds to the unique circumstances that confront them.<br />

According to Collins, the product approval delegation is “satisfactory<br />

in a quickly evolving mid- to high-intensity conflict<br />

like Desert Storm where the focus is the decisive application<br />

of maneuver and firepower, but in a peacekeeping operation,<br />

where tactical commanders need a high degree of local autonomy<br />

in order to be responsive, it creates great difficulties”. 82<br />

Today, the U.S. military faces more and more peacekeeping<br />

and low-intensity conflicts, so the need for PSYOP delegation<br />

to operational commanders and tactical levels is critical. As<br />

suggested by Collins, U.S. joint forces should “loosen PSYOP<br />

policy and doctrine when operating in low-intensity conflicts,<br />

giving tactical commanders the latitude to conduct their own<br />

PSYOP plan, within given constraints […]; theater-level<br />

PSYOP must remain the prerogative of the Joint <strong>Force</strong>s Com-


mander or Geographic Combatant Commander”. 83<br />

In order to improve PSYOP capabilities and utilization<br />

in modern war it is critical that the military stop treating<br />

PSYOP as a purely strategic-level consideration. Rather,<br />

PSYOP should be commanded and executed at a decentralized<br />

level best suited to operations in a certain region or<br />

conflict. Doctrine for Joint Psychological Operations (JP 3-53),<br />

states that “because of the strategic and operational importance<br />

of the PSYOP contribution to the combatant commander’s<br />

strategic concept, centralized planning of PSYOP<br />

should be focused at that level”. 84 While PSYOP should<br />

have a strategic impact, they are most successful when they<br />

are immediate and responsive to specific action in a theater,<br />

which can only occur when component commanders have<br />

access to PSYOP when needed. Currently, in most command<br />

structures joint operational control of PSYOP falls under the<br />

Geographic Combatant Commander and the Joint Task <strong>Force</strong><br />

(JTF) Commander, as depicted in the figure below (See figure<br />

1). 85<br />

Figure 1. Current joint force organization chart from Joint<br />

Pub 3-53, 2003.<br />

Referred to as the Joint Psychological Operations Task <strong>Force</strong><br />

(JPOTF), joint PSYOP are often overlooked until a crisis<br />

occurs and the need for PSYOP arises. Instead of giving the<br />

JTF Commander control over accessions of required PSYOP<br />

personnel in an area of operations, the Combatant Commander<br />

is in charge of attaching PSYOP forces to subordinate<br />

component commanders to enhance PSYOP planning<br />

and capability. 86 Ideally, the transfer of operational control<br />

of the JPOTF from the Combatant Commander to the JTF<br />

Commander would allow PSYOP to be more readily used at<br />

the operational and tactical levels. Rather than just giving<br />

the JTF Commander control over JPOTF exercises, the JTF<br />

Commander could directly oversee PSYOP action in the area<br />

of operations.<br />

37<br />

Figure 2. Recommended joint force organization.<br />

In order to remedy the situation and promote efficiency<br />

in the use of PSYOP, this study finds that the JTF<br />

Commander should be placed directly in control of the<br />

JPOTF, making it an equivalent component to, rather than a<br />

sub-component of, the component commanders (As shown<br />

in figure 2). In support of this recommendation, Capt Mary<br />

Cohen, Chief of Influence Operations of the 7 th Information<br />

Warfare Flight at Osan AFB, Korea, emphasizes that “control<br />

of how PSYOP is planned and implemented needs to rest<br />

with theater/JTF commanders.” 87 This structure change will<br />

not be an easy feat, for it would require the officer in charge<br />

of the JPOTF, currently a staff section within the JTF command,<br />

to become equivalent in rank to the air, land, sea, and<br />

marine component commanders. The issue, as explained by<br />

Collins, is “that the limited rank structure in PSYOP often<br />

leads to the PSYOP Task <strong>Force</strong> being under the command<br />

of a lieutenant colonel, or, at best, a colonel” since there is a<br />

“reluctance to treat a field grade officer on a par with a flag<br />

officer exercising land, air, or sea component command”. 88<br />

Typically a Joint Task <strong>Force</strong> staff section job does not merit<br />

the rank of general. However, the critical nature of PSYOP in<br />

current contingencies raises its importance in war fighting and<br />

there should be a certain sense of urgency in making sure that<br />

proper attention is given to PSYOP by the JTF commander.<br />

It is essential that PSYOP be prepared and practiced<br />

like all other military operations before crises occur. As<br />

expressed by Mark Maiers and Timothy Rahn in “Information<br />

Operations and Millennium Challenge,” information<br />

operations, including PSYOP, “cannot be simply an afterthought<br />

addressed immediately before a conflict […] shaping<br />

and influencing activities must occur continuously throughout<br />

peace, crisis, and combat, [for] it is almost impossible to<br />

change a popular negative view of JTF efforts once shots are<br />

fired”. 89 In the current organization, the JPOTF is not adequately<br />

linked to the component commanders, which leads<br />

to an inefficient use of PSYOP. According to Collins in his<br />

assessment of Army PSYOP in Bosnia, the lack of imbedded<br />

PSYOP troops in the Geographic Combatant Commander’s<br />

area of responsibility led to a lack of “intangible physical and<br />

mental links between the supported [combatant commander]<br />

and the regional PSYOP battalion,” because this relationship<br />

is rarely forged before a crisis occurs. 90 The integration of<br />

PSYOP in theater operations should not be an afterthought.<br />

Instead, PSYOP should be considered essential before conflict<br />

arises and the necessary PSYOP experts and trained personnel<br />

should already have a relationship with other component<br />

forces.<br />

The transfer of command authority from the Com-


atant Commander to the JTF Commander and emphasis on<br />

planning and practicing PSYOP prior to a crisis have already<br />

been successfully implemented at Osan AFB, Korea. Due to<br />

the urgent nature of being prepared in a theater that is always<br />

on the brink of potential war, PSYOP is practiced in six different<br />

exercises per year at Osan AFB. According to an <strong>Air</strong><br />

<strong>Force</strong> PSYOP specialist currently assigned to Osan, “PSYOP<br />

has not become a forgotten form of warfare here, [at Osan],”<br />

for Korea’s JTF PSYOP preparation is an “example of good<br />

organization and ever-present need to conduct PSYOP planning<br />

and targeting”. 91 The PSYOP task force at Osan is<br />

called the Combined Psychological Operations Task <strong>Force</strong><br />

(CPOTF), which “has equal footing with the other components<br />

at targeting and planning meetings and is headed by<br />

an active duty O-6, equivalent rank to the ground, air, navy,<br />

marine and special forces component commanders” of Joint<br />

Task <strong>Force</strong> Korea. 92 The fact that the CPOTF commander<br />

holds a rank equivalent to the other component commanders<br />

signals the emphasis on PSYOP in the Korean AOR. CPOTF<br />

is in charge of all PSYOP tasking and implementation, so the<br />

other components must funnel all PSYOP requests through<br />

the CPOTF. 93<br />

This PSYOP organization has proven to be very<br />

successful in Korea and could be used as a model for a<br />

new perspective on PSYOP organization in other theaters.<br />

The CPOTF at Osan suggests that PYSOP reorganization<br />

- moving the CPOTF from its traditional place under the<br />

component commanders to a position equivalent to that of<br />

the other component commanders - is possible and effective.<br />

Capt Cohen credits the efficiency of this organization to the<br />

fact that control of PSYOP is placed at a theater level where<br />

the “Combined <strong>Force</strong>s Commander (Geographic Combatant<br />

Commander) in theater is the person with ultimate control<br />

over what is said and what effects need to be achieved”. 94<br />

This leadership organization is guarded from “risky off-peninsula<br />

concepts as much as possible,” due to the decentralization<br />

of PSYOP at JTF Korea. 95 Their JTF Commander has<br />

chosen to not adopt the traditional form of PSYOP organization<br />

used in other U.S. military commands. Rather, he has<br />

delegated PSYOP control for all influence operations in Korea<br />

to the CPOTF, and the results have proven effective. Other<br />

commands should follow the example of PSYOP organization<br />

at Osan AFB, Korea, in order to be as well prepared for using<br />

PSYOP in warfare.<br />

Another issue that needs to be addressed in the<br />

PSYOP community is the lack of organizational consistency<br />

across military services. The Army, <strong>Air</strong> <strong>Force</strong>, and Navy all<br />

have their own PSYOP structure, but each service varies in<br />

how it implements PSYOP at the strategic, operational, and<br />

tactical levels. With the evolving joint nature of warfare it is<br />

38<br />

necessary to make sure these PSYOP forces can work together<br />

under the designated Geographic Combatant Commander.<br />

While the different services may have different PSYOP<br />

responsibilities, they should be tactically compatible with each<br />

other and PSYOP practitioners should understand the roles<br />

and capabilities of their sister service counterparts. Knowing<br />

what each service contributes to the broad PSYOP picture<br />

allows for better implementation, and can also help distinguish<br />

what capabilities are missing.<br />

Even in a joint atmosphere, the branches can be<br />

quite different. At Osan AFB, Korea, the <strong>Air</strong> <strong>Force</strong> considers<br />

PSYOP to be a part of Information Operations (IO) while the<br />

Army considers PSYOP an entirely separate entity from IO,<br />

according to Capt Celina Croteau, who was previously the<br />

<strong>Air</strong> <strong>Force</strong> PSYOP Planner in Korea and is now a member of<br />

the 381 st Information Squadron at Elmendorf AFB, Alaska. 96<br />

She adds that the <strong>Air</strong> <strong>Force</strong> tends to look at the “big picture<br />

without focusing on technical details” even to the extent that<br />

<strong>Air</strong> <strong>Force</strong> PSYOP practitioners do not possess a specific <strong>Air</strong><br />

<strong>Force</strong> Specialty Code (AFSC) which, in turn, leads to a lack<br />

of clearly stated training requirements. 97 In relation to her<br />

own experience as the only <strong>Air</strong> <strong>Force</strong> PSYOP planner at Osan<br />

AFB, Capt Croteau said “I could coordinate efforts and plans,<br />

but I would never have been able to actually conduct PSYOP<br />

on my own.” 98<br />

In contrast, the Army PSYOP components in joint<br />

commands are much more self-contained and self-sufficient<br />

in carrying out operations. In Korea the Army had a cell<br />

with the responsibility and capability of carrying out PSYOP<br />

efforts until reservists arrived to back them up. According to<br />

Croteau, the Army is very different in that it is more technically<br />

oriented, focusing on “the hands-on training aspects of<br />

how to conduct PSYOP – how to design the most effective<br />

leaflets and use broadcast media”. 99 Based on the lack of technical<br />

PSYOP training in the <strong>Air</strong> <strong>Force</strong>, Capt Cohen suggests<br />

from her experience that even though <strong>Air</strong> <strong>Force</strong> PYSOP personnel<br />

may believe they are actively participating in PSYOP,<br />

they are more in charge of “research or support [of PSYOP]<br />

than actual planning/implementation [of PSYOP]”. 100<br />

Based on the reports from these individuals’ experiences<br />

in joint PSYOP situations, it is apparent that there<br />

should be some efforts, especially on the <strong>Air</strong> <strong>Force</strong>’s part, to<br />

become more familiar with the tactical side of PSYOP. Following<br />

the example of current Army PSYOP organization,<br />

the <strong>Air</strong> <strong>Force</strong> should strive to become more self-sufficient<br />

and better able to better utilize PSYOP independently, at<br />

least until additional PYSOP forces are available for support.<br />

Organizationally, <strong>Air</strong> <strong>Force</strong> PSYOP units should include<br />

more active duty personnel with a high order of specialized<br />

expertise, including planning, implementation, research, and


support operations. Instead of being in the same situation<br />

as Capt Croteau, whose role was limited only to coordinating<br />

and planning PSYOP at Osan AFB, <strong>Air</strong> <strong>Force</strong> personnel<br />

could potentially participate in active PSYOP implementation<br />

as is the case with Army PSYOP members. In order to create<br />

and sustain this enhanced focus on PSYOP in the <strong>Air</strong> <strong>Force</strong>,<br />

it is proposed that PSYOP become an official AFSC. This<br />

step would promote formal training for the creation of true<br />

PSYOP specialists, rather than relying on personnel drawn<br />

from kindred AFSCs, such as intelligence or public affairs.<br />

In addition to further expanding the <strong>Air</strong> <strong>Force</strong>’s role<br />

in PSYOP implementation, it is further recommended that<br />

the Marine Corps be better equipped to execute PSYOP missions.<br />

Due to their typically close contact with adversary<br />

forces and civilian populations, Marines have the potential to<br />

drastically influence the perception of U.S. military forces in<br />

foreign countries and intimidate enemy troops, persuading<br />

them to not fight against American troops. According to the<br />

Doctrine for Joint Psychological Operations, the Marine Corps<br />

currently does not possess a formal PSYOP organization<br />

structure, although it is recognized as possessing the “capability<br />

to execute […] actions designed to convey specific impressions<br />

to an adversary”. 101 Like the U.S. Army, the Marine<br />

Corps should offer PSYOP-specific training and develop<br />

specialists with linguistic abilities and cultural knowledge of<br />

specific regions. Such specialists could then be attached to<br />

tactical battalions, supporting special operations and conventional<br />

task forces, a practice that has proven successful for the<br />

Army. 102 Army and Marine Corps forces arguably could work<br />

together more readily than any of the other branches combined,<br />

because their support needs are similar. Going a step<br />

further, joint Marine and Army PSYOP groups could be utilized<br />

effectively in several regions in which the U.S. military is<br />

involved today.<br />

While the Navy does have some PSYOP capabilities,<br />

mainly “audiovisual products”, the sea service is more<br />

limited when it comes to the actual tactical employment of<br />

PSYOP. The Navy has the capability to produce PSYOP<br />

documents and posters that can be distributed to other<br />

PSYOP forces for use. It also has the TARBS radio station<br />

that broadcasts messages from ship to land and several aircraft<br />

that support the PSYOP mission. 103 While this is evidence<br />

that the Navy has played a role in joint PSYOP over the years,<br />

its PSYOP capabilities are largely untapped. This potential<br />

could be exploited by creating tactical Naval PSYOP groups,<br />

similar to the existing Army groups, which are able to assist<br />

component commanders in joint situations.<br />

Of all the services, the Army has best exploited<br />

the potential of PSYOP. As the only service with an active<br />

PSYOP unit, the Army has a proven tactical PSYOP capabil-<br />

39<br />

ity. The <strong>Air</strong> <strong>Force</strong>, Navy, and Marine Corps would do well to<br />

embrace the Army PSYOP model. The Army has recognized<br />

a need for PSYOP in our current military endeavors, and the<br />

<strong>Air</strong> <strong>Force</strong> regularly supports those Army units. There is a<br />

great need to tap this joint potential of PSYOP, which would<br />

allow the services to quickly join and unite tactically against<br />

the enemy. The more prepared each individual service is<br />

for PSYOP, the better prepared each will be to support each<br />

other. The coordination of PSYOP at the tactical level, by the<br />

JTF Commander and JPOTF Commander, will allow PSYOP<br />

to be utilized efficiently and appropriately for the current situation.<br />

PSYOP will reach its optimum potential, becoming a<br />

more recognized and more utilized form of warfare.<br />

CONCLUSION<br />

The role of PSYOP in modern warfare is critical<br />

for influencing the enemy or foreign populations. Recent<br />

operations have shown that tactical level PSYOP can greatly<br />

contribute to joint success. The likelihood of continued US<br />

involvement is a variety of contingency operations--from<br />

peacekeeping missions to special operations to major military<br />

conflicts--underscores the need to strengthen US PSYOP<br />

capabilities. The diverse nature of PSYOP makes it an effective<br />

tactic at all levels of warfare – strategic, operational, and<br />

tactical. The effective organization of PSYOP resources can<br />

be expected to enhance the role and effectiveness of PSYOP<br />

in the future warfare. PSYOP will become more capable of<br />

targeting the enemy’s mind because of an emphasis on tactical<br />

operations tailored to a specific area of operations.<br />

The best way to ensure that PSYOP meets its full<br />

potential is to enable commanders to plan, coordinate, and<br />

implement PSYOP at decentralized and more tacticallyfocused<br />

levels. Especially within a Geographic Combatant<br />

Command, it is essential that the JTF Commander be given<br />

authority over PSYOP planning and employment within the<br />

theater of operations. PSYOP may then be better utilized<br />

in conjunction with other JTF operations. It is also recommended<br />

that the JPOTF hold a position equivalent to the<br />

component commanders under the JTF Commander. This<br />

would elevate PSYOP from a subordinate staff section of the<br />

JTF command to a more substantial organization headed by<br />

a colonel or officer of equivalent rank to that of component<br />

command officers. Coordination and communication would<br />

become greatly facilitated if component commands and the<br />

JPOTF held equal rank.. The current PSYOP organization<br />

at Osan AFB should be used as a model for other commands<br />

because of the successful planning, preparation, and practice<br />

of PSYOP encouraged by JTF Korea. Decentralizing planning<br />

and implementation of PSYOP to the theater JTF commanders<br />

at Osan AFB has created an ideal and very effective<br />

PSYOP organization. Additionally, each U.S. military service


should prepare itself to better utilize PSYOP as the need for<br />

this tactic increases, especially in operations at the lower end<br />

of the spectrum of warfare. Following the model of Army<br />

PSYOP, the <strong>Air</strong> <strong>Force</strong> should create its own PSYOP AFSC.<br />

That would be the first necessary step to produce airmen<br />

capable of planning and implementing PSYOP. Moreover,<br />

the Marine Corps and Navy should also devote more attention<br />

to PSYOP and its potential for contributing to joint<br />

operations.<br />

The efficient organization of PSYOP is crucial<br />

because of PSYOP’s ever increasing role in military operations<br />

today and in all likelihood, the future. In response to<br />

the thesis question: “Has the U.S. military developed the<br />

optimum organizational potential for the delivery of psychological<br />

operations in an era of expanding contingency operations?”<br />

the answer is the U.S. military has yet to achieve its<br />

full PSYOP potential. Overall, current PSYOP organization<br />

is not meeting operational requirements.<br />

As we have seen, a well organized and highly trained<br />

PSYOP force can be expected to increase prospects for future<br />

military success. The recommendations set forth above are<br />

reasonable and should be implemented to better utilize U.S.<br />

PSYOP forces and capabilities. A tactically-based PSYOP<br />

focus will promote the most effective use of PSYOP. In addition,<br />

decisive and purposeful planning and practice of PSYOP<br />

prior to a conflict will promote a higher level of operational<br />

effectiveness when hostilities commence. With the excellent<br />

examples of the Korean JTF model to draw upon, the U.S.<br />

military should take timely action to strengthen its PSYOP<br />

capabilities.<br />

Future research on this topic will be essential in order<br />

to determine the optimum organizational arrangements for<br />

PSYOP. The arguments proposed in this thesis are based<br />

entirely on unclassified research and the author’s limited interaction<br />

with current PSYOP practitioners. As a cadet who<br />

has yet to experience PSYOP on a firsthand basis, this writer<br />

nevertheless does recognize the vast importance of PSYOP<br />

in modern warfare. In addition to considering the PSYOP<br />

structure adopted by JTF Korea, future research on this topic<br />

should include careful examination of other joint PSYOP<br />

offices for possible alternative organizational constructs.<br />

Needless to say, many other key questions concerning PSYOP<br />

cannot be addressed without access to classified information.<br />

In conclusion, a fully capable PSYOP force can<br />

have a lasting impact on adversary behavior. Accordingly, an<br />

effective PSYOP organization will be critical to future military<br />

success. Effective PSYOP can subdue the enemy’s mind in<br />

a manner that promotes military success without physically<br />

striking the enemy. As stated by German Field Marshall Carl<br />

Gustav Baron von Mannerheim, “For a strong adversary the<br />

40<br />

opposition of twenty-four squadrons and twelve guns ought<br />

not to have appeared very serious, but in war the psychological<br />

factors are often decisive. An adversary who feels inferior<br />

is in reality so”. 104<br />

BIBLIOGRAPHY<br />

Adolph, Robert B., Jr. “PSYOP: Gulf War <strong>Force</strong> Multiplier.”<br />

Army 42 (December 1992): 16-22.<br />

Bowish, Randall G. “Information-Age Psychological Operations.”<br />

Military Review 78<br />

(December-February 1999): 29-34.<br />

Brooks, Paul R.M. “A Vision for PSYOP in the Information<br />

Age.” Special Warfare 13 (Winter<br />

2000): 20-24.<br />

Cohen, Mary E, to author, 3 February 2005. Emailed letter<br />

held by author.<br />

Collins, Steven. “Army PSYOP in Bosnia: Capabilities and<br />

Constraints.” Parameters: U.S. Army<br />

War College 29 (Summer 1999).<br />

Croteau, Celina, to author, 5 February 2005. Emailed letter<br />

held by author.<br />

Ellis, J.O. Psychological Operations Support to Operation Allied<br />

<strong>Force</strong>. Fort Bragg, NC: 4 th<br />

POG, 1999.<br />

Goldstein, Frank L. and Daniel W. Jacobowitz. “Psychological<br />

Operations: An Introduction,” in<br />

Psychological Operations: Principles and Case Studies,<br />

ed. Frank L. Goldstein and Benjamin F. Findley, Jr.<br />

Maxwell AFB, AL: <strong>Air</strong> University Press, 1996, 5-24.<br />

____________________________________. “PSYOP in<br />

Desert Shield/Desert Storm,” in<br />

Psychological Operations: Principles and Case Studies,<br />

ed. Frank L. Goldstein and Benjamin F. Findley, Jr.<br />

Maxwell AFB, AL: <strong>Air</strong> University Press, 1996, 341-<br />

355.<br />

Joint Chiefs of Staff. Doctrine for Joint Psychological Operations,<br />

Joint Pub 3-53. Washington,<br />

D.C. 10 July 1996.<br />

Joint Chiefs of Staff. Doctrine for Joint Psychological Opera-


tions, Joint Pub 3-35. Washington,<br />

D.C. 5 September 2003.<br />

Maiers, Mark W. and Timothy L. Rahn. “Information Operations<br />

and Millennium Challege.”<br />

Joint <strong>Force</strong>s Quarterly 35 (Autumn 2004): 83-87.<br />

Paddock, Alfred H., Jr. “No More Tactical Information<br />

Detachments: U.S. Military<br />

Psychological Operations in Transition,” in Psychological<br />

Operations: Principles and Case Studies, ed. Frank<br />

L. Goldstein and Benjamin F. Findley, Jr. Maxwell<br />

AFB, AL: <strong>Air</strong> University Press, 1996, 26-50.<br />

_______________. “U.S. Military Psychological Operations:<br />

Past, Present, and Future,” in<br />

Psychological Operations and Political Warfare in Longterm<br />

Strategic Planning, ed. Janos Radvanyi. New<br />

York: Praeger Publishers, 1990, 19-35.<br />

Poniewozik, James, et al. “The Battle for Hearts and Minds.”<br />

Time Europe 158 (October 2001).<br />

Pugmire, Brian M. “Psychological Operations: Will the Real<br />

Approval Authority Please Stand<br />

Up?” Naval War College Thesis. Newport, RI: Naval<br />

War College, 2002.<br />

Radvanyi, Janos. “Introduction to PSYOP,” in Psychological<br />

Operations and Political Warfare<br />

in Long-term Strategic Planning, ed. Janos Radvanyi.<br />

New York: Praeger Publishers, 1990, 1-7.<br />

Rodgers, James L. “Information Warfare: Nothing New<br />

Under the Sun.” Marine Corps Gazette<br />

81 (April 1997): 23-29.<br />

Wall, Robert and David Fulgham. “Putting the Spin on<br />

Modern War.” Aviation Week and Space<br />

Technology 154 (February 2001).<br />

4 th Psychological Operations Group [on-line]. available from<br />

http://www.psywarriors.com/4thpog.html; Internet;<br />

accessed 12 September 2003.<br />

39 th Information Operations Squadron [on-line]. Hurlburt<br />

Field AFB, FL; available from<br />

http://www.hurlburt.af.mil; Internet; accessed 12<br />

September 2003.<br />

41<br />

(Endnotes)<br />

1 Brian M. Pugmire, “Psychological Operations: Will the Real<br />

Approval Authority Please Stand Up?,” Thesis (Naval War<br />

College, 2002), 1.<br />

2 Alfred H. Paddock, “No More Tactical Information<br />

Detachments: U.S. Military Psychological Operations in<br />

Transition,” in Psychological Operations: Principles and Case<br />

Studies (Maxwell AFB, AL: <strong>Air</strong> University Press 1996), 20.<br />

3 Paul R.M. Brooks, “A Vision for PSYOP in the Information<br />

Age,” Special Warfare 13 (Winter 2000): 21.<br />

4 Frank L. Goldstien and Daniel W. Jacobowitz,<br />

“Psychological Operations,” in Psychological Operations:<br />

Principles and Case Studies (Maxwell AFB, AL: <strong>Air</strong> University<br />

Press, 1996), 11.<br />

5 Paddock, “No More Tactical Information,” 26.<br />

6 Ibid., 35.<br />

7 th 4 Psychological Operations Group [on-line]. available from<br />

http://www.psywarriors.com/4thpog.html; Internet; accessed<br />

12 September 2003.<br />

8 Randall G. Bowdish, “Information-Age Psychological<br />

Operations,” Military Review 78 (December-February 1999):<br />

30.<br />

9 th 39 Information Operations Squadron [on-line]. Hurlburt<br />

Field AFB, FL; available from http://www.hurlburt.af.mil;<br />

Internet; accessed 12 September 2003.<br />

10 Brooks, “A Vision,” 21.<br />

11 Pugmire, “Psychological Operations,” 3.<br />

12 Paddock, “No More Tactical,” 47.<br />

13 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, Joint Publication 3-53 (Washington, DC: 10 July<br />

1996): GL-6.<br />

14 Mark W. Maiers and Timothy L. Rahn, “Information<br />

Operations and Millennium Challenge,” Joint <strong>Force</strong>s Quarterly<br />

35 (Autumn 2004): 83.<br />

15 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, 1996, ix.<br />

16 Pugmire, “Psychological Operations,” 3.<br />

17 Ibid., 3.<br />

18 Ibid., 3.<br />

19 Janos Radvanyi, “ Introduction to Psyops,” in Psychological<br />

Operations and Political Warfare in Long-term Strategic<br />

Planning (New York: Praeger Publishers, 1990), 1.<br />

20 James L. Rodgers, “Information Warfare: Nothing New


Under the Sun,” Marine Corps Gazette 81 (April 1997): 24.<br />

21 J.O. Ellis, Psychological Operations Support to Operation<br />

Allied <strong>Force</strong> (Fort Bragg: 4th Psychological Group, 14 July<br />

1999), 5.<br />

22 Goldstein, “Psychological Operations,” 15.<br />

23 Ibid., 13. According to Goldstein, during the Battle of<br />

Bunker Hill PSYOP leaflets were used to try and persuade<br />

British soldiers to switch sides. These leaflets were distributed<br />

by colonials and tempted the British soldiers with reports that<br />

food and provisions were better on the Patriot side. Some<br />

leaflets also mentioned the farmland available to British<br />

soldiers who left the fight.<br />

24 Ibid., 13.<br />

25 Ibid., 13.<br />

26 Ibid., 14.<br />

27 Ibid., 14.<br />

28 Ibid., 14.<br />

29 Alfred H. Paddock, “U.S. Military Psychological<br />

Operations: Past, Present, and Future,” in Psychological<br />

Operations and Political Warfare in Long-term Strategic<br />

Planning (New York: Praeger, 1990), 35.<br />

30 Radvanyi, “Introduction to Psyops,” 1.<br />

31 Paddock, “U.S. Military,” 19.<br />

32 Pugmire, “Psychological Operations,” 1.<br />

33 Goldstein, “Psychological Operations,” 5.<br />

34 Pugmire, “Psychological Operations,” 2.<br />

35 Ibid., 3.<br />

36 Ibid., 3.<br />

37 Ibid., 3.<br />

38 Goldstein, “Psychological Operations,” 10.<br />

39 Ibid., 10.<br />

40 Ibid., 10.<br />

41 Pugmire, “Psychological Operation,” 3.<br />

42 Paddock, “U.S. Military,” 29.<br />

43 Paddock, “No More,” 47.<br />

44 Ibid., 47.<br />

45 Ibid., 35.<br />

46 th 4 Psychological Operations Group, 1.<br />

47 Bowdish, “Information Age,” 30.<br />

48 Ibid., 30.<br />

49 Paddock, “No More,” 34.<br />

50 Ibid., 34.<br />

51 Steven Collins, “Army PSYOP in Bosnia: Capabilities and<br />

Constraints,” Parameter, 29 (Summer 99).<br />

52 Ibid.<br />

53 Frank L. Goldstein and Daniel W. Jacobowitz, “PSYOP<br />

in Desert Shield/Desert Storm,” in Psychological Operations:<br />

Principles and Case Studies, ed. Frank L. Goldstein and<br />

Benjamin F. Findley, Jr. (Maxwell AFB: <strong>Air</strong> University Press,<br />

1996), 349.<br />

42<br />

54 Ibid., 349.<br />

55 Ibid., 350-355.<br />

56 Robert B. Adolph, “PSYOP: Gulf War <strong>Force</strong> Multiplier,”<br />

Army 42 (December 1992): 18.<br />

57 Ibid., 19.<br />

58 Goldstein, “PSYOP,” 349.<br />

59 Collins, “Army PSYOP in Bosnia,” 2.<br />

60 Ibid.<br />

61 Ibid.<br />

62 Ellis, Psychological Operatons, 18.<br />

63 Ibid., 2.<br />

64 Ibid., 2.<br />

65 Ibid., 17.<br />

66 Robert Wade and David Fulgham, “Putting the Spin<br />

on Modern War,” Aviation Week and Space Technology 154<br />

(February 2001).<br />

67 James Pniewozik, et al. “The Battle for Hearts and Minds,”<br />

Time Europe 158 (October 2001).<br />

68 Paddock, “U.S. Military,” 26.<br />

69 Adolph, “PSYOP: Gulf War,” 22.<br />

70 Ibid., 21.<br />

71 Bowdish, “Information Age,” 37.<br />

72 Paddock, “No More,” 44.<br />

73 Brooks, “A Vision,” 20.<br />

74 Ibid., 20.<br />

75 Ibid., 21.<br />

76 Ibid., 23.<br />

77 Collins, “Army PSYOP in Bosnia,” 2.<br />

78 Maiers, “Information Operations and Millennium<br />

Challenge,” 87.<br />

79 Ibid.<br />

80 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, Joint Publication 3-53 (Washington, DC: 5<br />

September 2003): xi.<br />

81 Ibid., xii.<br />

82 Collins, “Army PSYOP in Bosnia,” 2.<br />

83 Ibid., 9.<br />

84 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, 2003, III-1.<br />

85 Ibid., III-4.<br />

86 Ibid., III-2.<br />

87 Mary E. Cohen to the author, 3 February 2005, emailed<br />

letter held by author.<br />

88 Collins, “Army PSYOP in Bosnia,” 2.<br />

89 Mairs, “Information Operations and Millennium<br />

Challenge,” 87.<br />

90 Collins, “Army PSYOP in Bosnia,” 2.<br />

91 Cohen emailm 3 Feb 05.<br />

92 Ibid.


93 Ibid.<br />

94 Ibid.<br />

95 Ibid.<br />

96 Celina Croteau, to author, 5 February 2005, emailed letter<br />

held by author.<br />

97 Ibid.<br />

98 Ibid.<br />

99 Ibid.<br />

100 Cohen email, 3 Feb 05.<br />

101 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, 2003, A-5.<br />

102 Ibid., A-2.<br />

103 Ibid., A-4.<br />

104 Joint Chiefs of Staff, Doctrine for Joint Psychological<br />

Operations, 2003, II-1.<br />

43<br />

“SPACE ASSETS: THE ACHILLES HEEL IN<br />

NATIONAL DEFENSE”<br />

BY<br />

C1C ALEXANDER K. GOLDFEIN<br />

INTRODUCTION<br />

Statement of Research Question<br />

In a world of technology and space exploration,<br />

space assets have taken on an unexpected level of value to the<br />

<strong>United</strong> <strong>States</strong> military. So great has their value become that<br />

destruction of these assets could greatly reduce the combat<br />

effectiveness of the <strong>United</strong> <strong>States</strong> armed forces. Space assets<br />

are defined as any satellite or piece of technology in orbit<br />

capable of providing an advantage or important synergies to<br />

war fighters. 1 Growing reliance on space assets highlights a<br />

host of military considerations for protecting these crucial<br />

assets and raises a myriad of applicable questions. Foremost<br />

to the debate is a question which this research paper will<br />

examine: Has the <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> developed the optimum<br />

capabilities for defending U.S. military and commercial<br />

space-based systems of strategic importance? Accordingly,<br />

this paper will evaluate space defense capabilities and propose<br />

changes or improvements in order to overcome any possible<br />

gaps present in current U.S. space defenses. Space defense is a<br />

crucial security issue this nation must address if it is to remain<br />

the world’s greatest military power in years to come.<br />

Background and Significance of the Problem<br />

Throughout the last fifty years of airpower history,<br />

space assets providing a myriad of advantages including imagery,<br />

intelligence, and navigation have played a vital role in<br />

successful military operations. Each helps maintain the victor’s<br />

edge in combat, as pointed out in conflicts such as Desert<br />

Storm and Iraqi Freedom, and are critical to the preservation<br />

of our national defense. Additionally, these tools play a fundamental<br />

part in the <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong> remaining the<br />

world’s greatest air and space force with the most extended<br />

global reach and advanced capabilities of any nation. Clayton<br />

Chun explains that since the Cold War, space assets have<br />

proven their worth as force multipliers in combat. 2 With the<br />

space race still underway, new weapons designed to incorporate<br />

space attack could destroy or otherwise disable our critical<br />

space tools. Accordingly, a key mission of the U.S. <strong>Air</strong><br />

<strong>Force</strong> must be protection of the space assets on which we so<br />

heavily rely. Without our space-based technology, it is feasible<br />

that the U.S. military would be unable to conduct operations<br />

with the precision or effectiveness we have come to expect.


Warfare has reached every battle medium with the<br />

exception of space, and it is simply a matter of time until this<br />

next evolution occurs. The U.S. <strong>Air</strong> <strong>Force</strong> must prepare for<br />

that day and create an effective system of space defense. In<br />

the words of Giulio Douhet, “Victory smiles upon those who<br />

anticipate the changes in the character of war, not upon those<br />

who wait to adapt themselves after the changes occur.” 3 A<br />

forward-looking stance is critical for preparedness against<br />

threats to our space assets and the strategically significant<br />

capabilities they provide.<br />

Limitations<br />

Space research is limited on a number of levels<br />

based primarily on the novelty of the subject. Space warfare<br />

has been hypothesized for a long time, but application is<br />

extremely new. It is also evident now that since discovery and<br />

innovation concerning space are constantly changing at high<br />

speed, the literature is constantly trying to “keep up” with<br />

the most accurate information. In addition, many important<br />

materials on space are classified and thus not accessible to the<br />

general public. Satellites go into space constantly, and technology<br />

is in constant evolution. Furthermore, the topic of<br />

defense of space assets is relatively new to military researchers<br />

and it is not surprising that documents and research on the<br />

topic are fairly limited. Another limitation is the relatively<br />

short time frame during which this research will be conducted<br />

and synthesized.<br />

The last limitation to the paper is the generally<br />

overlooked nature of the topic. Most people do not have<br />

the foresight to see the demand for continued space development<br />

and protection. However, it is this lack of interest that<br />

gives an independent scholar the ability to help shape the way<br />

such developments evolve into military doctrine. Although<br />

limited, the freedom to create is ever present and this research<br />

may potentially make a modest contribution to our understanding<br />

of current gaps in U.S. space defenses.<br />

Definitions<br />

For reasons of clarity, certain military acronyms are<br />

clearly defined. Acronyms important to this paper include<br />

Space Assets, ASAT, RAND, GPS, ICBM, <strong>Force</strong> Multiplier,<br />

ABL, and GBL.<br />

Space Assets: “The indispensable systems of force<br />

enhancement available in the medium of space.” 4<br />

ASAT: An anti-satellite weapon or technology system<br />

used for interference or destruction of space assets.<br />

RAND: The Research and Development Corporation,<br />

a non-profit institution that conducts a large<br />

amount of research on the military application of<br />

space. Some of their past work has concentrated on<br />

space warfare and ASATs.<br />

GPS: The Global Positioning System of the U.S., a<br />

44<br />

network of twenty-four satellites in known orbits for<br />

determining ground positions and navigational directions.<br />

5<br />

ICBM: An inter-continental ballistic missile capable<br />

of long distance flight and attack between continents.<br />

<strong>Force</strong> Multiplier: Any asset that enhances the ability<br />

of another weapon to function. For example, a<br />

Humvee giving security forces troops the ability to<br />

move faster over more terrain instead of walking.<br />

ABL and GBL: The <strong>Air</strong>borne Laser and Groundbased<br />

Laser systems used for offensive action in order<br />

to defend against specific forms of attack.<br />

One major assumption informs the approach of this<br />

study to the subject of space defense: other nations<br />

have, or will acquire, the technology, concepts, and<br />

will to attack <strong>United</strong> <strong>States</strong> assets in space. Such<br />

technology already exists and potential adversaries are<br />

not likely to forsake its use.<br />

Preview of the Argument<br />

To answer the research question, the value of current<br />

space technology as a military force multiplier must be<br />

examined and placed into a hierarchy of <strong>United</strong> <strong>States</strong> security<br />

requirements. Therefore, technical government reports<br />

on the strengths and values of space assets will be critical for<br />

understanding what those assets truly provide to our nation<br />

and our combat forces. To obtain this data, information<br />

must be derived from technical military sources to include<br />

current doctrine, and from officers in the space field who<br />

are concerned with satellite technology. Drawing on their<br />

training and experience in the field, subject matter experts<br />

are expected to provide accurate information or objective<br />

assessments. After assessing the value of this technology, the<br />

research will consider the nature of U.S. dependence on space<br />

assets, current threats to those assets, and current U.S. space<br />

defenses already in place. It will then be determined whether<br />

or not a gap exists between possible threats and available U.S.<br />

space defense capabilities. This distinction provides the basis<br />

for the development of concepts to overcome such vulnerabilities<br />

in the space field. Proposals for improvements will then<br />

be offered. This analysis will be the focus of the paper and<br />

will reflect critical thinking to determine possible solutions<br />

to the research question based on the evidence that has been<br />

assembled. These solutions will be individually evaluated for<br />

risks, benefits, and costs in order to rectify the current lack of<br />

protection. Finally, a proposal or proposals will be offered for<br />

increasing space defenses against the threat of possible attack.<br />

LITERATURE REVIEW<br />

Today space assets have reached unprecedented levels<br />

of use in military operations. Their military value has drastically<br />

increased since their introduction and now has become


an essential element in how the U.S. conducts modern battle.<br />

The first major application of space systems in<br />

armed conflict was the integration of satellites into war fighting<br />

during Operation Desert Storm in 1991. According to<br />

Curtis Peebles, Desert Storm was the first “space war” and its<br />

conduct suggests how space assets will be employed in future<br />

conflicts. 6 Such has been the case in all subsequent U.S. conflicts<br />

to date including recent wars in Iraq and Afghanistan.<br />

Daniel Goure argues that space power “came of age” in the<br />

Gulf War where its military value began to be understood<br />

and space doctrine developed. 7 For example, of all the bombs<br />

dropped in Desert Storm, only 9 percent were precision satellite-guided<br />

weapons, but they accounted for over 42 percent<br />

of targets struck in the theatre. 8 The effect of such enhanced<br />

weapons was critical for missions requiring accuracy and efficiency.<br />

This is the basis for current U.S. battle tactics which<br />

emphasize preserving civilian and military lives and limiting<br />

collateral damage. Targeting based on satellite guidance is<br />

also valuable as it meets many current U.S. <strong>Air</strong> <strong>Force</strong> guidelines<br />

adopted to encourage the fighting of just war. These<br />

include:<br />

-Use of only what munitions are needed to adequately<br />

destroy a target<br />

-Reduce all numbers of sorties to the minimum<br />

required to destroy the target without<br />

repeat missions<br />

-Destroy only what needs to be destroyed without<br />

civilian and other unnecessary<br />

casualties or destruction of public property<br />

-Provide attack and support operations under any<br />

conditions where visibility may be less<br />

than adequate for conventional bombing 9<br />

These guidelines on targeting are easily met by the use of<br />

space technology.<br />

In addition to targeting applications, space assets are<br />

commonly employed for long-range communications and<br />

detection of enemy forces. High-capacity worldwide secure<br />

voice communications were readily available in the Gulf War<br />

due to satellite technology connecting 128 tactical terminals. 10<br />

This is critical to conducting secure, well-planned and coordinated<br />

operations in enemy territory. In terms of surveillance,<br />

satellites in the Gulf War could detect the smoke plume of a<br />

SCUD missile thirty seconds after launch. 11 Although technology<br />

was not available for missile intercept, the value of<br />

early warning for units under attack is beyond measure. The<br />

element of surprise from missile attack can be nearly eliminated<br />

using space technology.<br />

The final components of space assets of great value<br />

to military operations are GPS and mapping capabilities.<br />

45<br />

In early airpower conflicts, such as WWI and WWII, aerial<br />

photography was undertaken with a camera held out of the<br />

side or mounted to the bottom of an airplane, generally while<br />

flying over dangerous territory. Satellites can safely produce<br />

images with resolution superior to that of a still camera used<br />

in flight. To provide good coverage and map accuracy based<br />

on photography, 80 percent overlap must exist and that can<br />

be hard to attain at high rates of speed in the air, as many<br />

frames must be taken to meet this requirement. 12 When<br />

linked with GPS, maps with unprecedented and constantly<br />

improving detail are created and active coordinate systems<br />

implemented in order to provide accurate positioning locations<br />

at any time. Lastly, directions of the utmost precision<br />

can be provided for successful and smooth operations,<br />

when getting to a target or checkpoint becomes an issue. In<br />

summary, the value of space assets for military applications<br />

in peace or war is unmatched by virtually any other force<br />

enhancement system. Satellites and space systems give <strong>Air</strong><br />

<strong>Force</strong> weapons the edge to make them the most advanced and<br />

capable in the world.<br />

When considering the military value of space assets,<br />

it is vital to understand the degree of current reliance on these<br />

force enhancement systems. In Operation Enduring Freedom,<br />

the on-going war in Afghanistan, satellites provide the<br />

ability to conduct effective operations against a tough and<br />

determined enemy many miles from our shores. According<br />

to Daniel Goure, space assets give the U.S. <strong>Air</strong> <strong>Force</strong> the ability<br />

to “strike at global ranges on short notice with devastating<br />

intensity and accuracy.” 13 Our current capabilities would<br />

be severely limited without satellites upon which many of<br />

our weapon systems are dependent. Militarily, to assault an<br />

enemy thousands of miles away, satellites are of the utmost<br />

importance. They are the very cornerstone of U.S. <strong>Air</strong> <strong>Force</strong><br />

operations and reliance on them in the form of precision<br />

bombardment, e-mail transmitted directly into cockpits of<br />

strike aircraft, and delivery of precision weapons are commonplace<br />

features of our modern force. 14 Space assets make these<br />

capabilities possible.<br />

The <strong>Air</strong> <strong>Force</strong> also relies on space assets in order to<br />

provide better security for U.S. forces, especially those in<br />

combat. For example, satellite communication linked with<br />

the airborne Joint Surveillance and Target Attack Radar<br />

System (J-STARS) detected a column of Iraqi units enroute<br />

to engage allied forces in the Gulf War. 15 Benjamin Lambeth<br />

describes how suddenly commanders responded with an air<br />

assault that destroyed the Iraqi forces and prevented a major<br />

attack on our forces in theatre. 16 The military reliance on<br />

satellites to date is directly tied to troop support such as this.<br />

Reorganization of conflict and protection of American soldiers’<br />

lives is a critical value of any military asset. Col Mark


Wells agrees that the value of target-spotting by satellites is<br />

high and led to attacks of unprecedented success against Iraqi<br />

vehicles fleeing Kuwait. 17<br />

The final level of military reliance on space assets<br />

involves their value in providing security for the American<br />

homeland. Peebles makes the point in describing the creation<br />

of early space systems, including the ballistic missile early<br />

warning system (BMEWS), in order to provide the timely<br />

warning of USSR aircraft and missile attacks. 18 Although<br />

only a limited deterrent factor and not capable of stopping<br />

an onslaught, it provided a precious twenty minutes maximum<br />

warning time before an inbound missile would strike<br />

our soil. 19 Given the threat of a massive nuclear war using<br />

inter-continental ballistic missiles (ICBMs), a new concept<br />

was born during the Cold War: missiles and effective missile<br />

defenses were to be developed. The increased build-up under<br />

President Kennedy to fill the perceived “missile gap” against<br />

the Soviets led to even more development of these immensely<br />

destructive weapons which still exist around the world today. 20<br />

Preston agrees that missile warning is critical and incorporates<br />

it into an overarching concept for attaining U.S. space superiority.<br />

21 It became the “Dawn of the Space Age” and missile<br />

warning should be employed to its utmost extent where early<br />

detection is paramount for the continued mission of defending<br />

the <strong>United</strong> <strong>States</strong> against threats from adversarial nations.<br />

In considering the value of satellites to military<br />

forces, it is important not to overlook the multiple civilian<br />

space systems currently aiding the military in capacities far in<br />

excess of the military. It is a consumer world and the commercial<br />

dimension of space today has led to the increased<br />

appearance of civilian entrepreneurs in space. By using civilian<br />

satellites instead of military satellites, the military satellites<br />

will last longer, civilians have increased business, and the military<br />

has more resources to use in their warfighting attempts.<br />

So it is reasonable to assume that civilian satellites are equally<br />

a vulnerability with harmful implications in the event of their<br />

destruction. For example, when the Galaxy 4 communications<br />

satellite failed on 20 May 1998, 80-90 percent of the<br />

40-45 million pagers in use in the <strong>United</strong> <strong>States</strong> instantly lost<br />

service. 22 This did not directly impact the U.S. military, but<br />

could in other cases. Civilian space assets provide services<br />

to include: imagery, communications, and weather information.<br />

23 The most dominant military use, however, remains<br />

communications. In Operations Iraqi Freedom (OIF) alone,<br />

90 percent of all military communications were made through<br />

civilian satellites. 24 This emphasis will always be in place and<br />

the limited assets of civilians are clearly just as valuable and in<br />

need of protection as military satellites.<br />

It is now clear that satellites are both relied on and<br />

valuable to the warfighter. However, who is allowed to attack<br />

46<br />

a satellite? According to Article III of the Outer Space Treaty,<br />

activities in space shall be:<br />

“conducted in accordance with international law,<br />

including the Charter of the <strong>United</strong> Nations, in the interest of<br />

maintaining international peace and security and promoting<br />

international cooperation and understanding.” 25<br />

This makes all laws ordained by the UN Charter applicable<br />

in space. Article 2(4) of the UN Charter then forbids the use<br />

of force against a nation, its people, and its resources. 26 With<br />

that in mind, an attack against a satellite is an attack on that<br />

nation and what it possesses and represents. So, by law, no<br />

one should attack a satellite, but a possible enemy could lead<br />

a massive space attack in the event of a war, making the provisions<br />

of the treaty essentially useless. Due to the vulnerability<br />

and value of space assets, it can be assumed that they can<br />

and will be targeted in a variety of ways through a variety of<br />

means.<br />

There are many methods for attacking US satellites<br />

either from space, land, air, or the sea. The aforementioned<br />

value of these space tools and our growing reliance upon them<br />

serve to make this a dangerous threat to our highly sophisticated<br />

military forces. There are several ways that an attack<br />

potentially could destroy or disable U.S. satellites in orbit. As<br />

described by Preston, these include:<br />

-Kinetic-energy weapons where mass is delivered to<br />

target by a guided or unguided<br />

projectile using velocity as its key destructive power.<br />

-Directed-energy weapons utilizing the propagation<br />

of destructive energy at very high<br />

speeds.<br />

-Conventional high-explosive munitions delivered by<br />

missile, ICBM, or through other<br />

means generally with advanced targeting capabilities.<br />

-Nuclear strike where thermonuclear weapons are<br />

detonated in space to knock out<br />

potentially large numbers of satellites while avoiding<br />

the damages that are caused by<br />

nuclear detonation on Earth. 27<br />

Kinetic-energy weapons are effective in many ways<br />

and one of the most difficult weapons to effectively stop when<br />

deployed at a target. For example, an F-15 based Altair-II<br />

missile capable of orbit, could launch into space, establish a<br />

heading to intercept the satellite, and deploy a hardened projectile<br />

to make the interception. 28 The warhead needs only<br />

a few small boosters to reach the target where the shear mass<br />

of the moving object rips through the target and destroys<br />

it without any form of explosives beyond fuel necessary to<br />

make the journey. Key advantages of such weaponry are


that it avoids the heated issue of arming satellites and can<br />

be deployed from anywhere in the <strong>United</strong> <strong>States</strong>. However,<br />

satellites and ground stations also can both be armed with<br />

this technology. The missile Nike-Zeus, for example, has<br />

been used to intercept reentry vehicles falling out of orbit<br />

from space on thirteen different occasions. 29 The payload was<br />

small, effective, and hit a variety of targets in near Low-Earth<br />

orbits. The on-board targeting technology was almost identical<br />

to that used in the Gulf War to identify and help destroy<br />

ground targets.<br />

An emerging technology capable of attacking satellites<br />

involves the employment of directed-energy weapons to<br />

include laser, light, radio, and other forms of energy that can<br />

interfere with mechanical operation. 30 The first satellites to<br />

contain similar technology of x-ray and gamma-ray carried<br />

equipment for enhanced photographic and detection capabilities.<br />

31 Although not dangerous, this technology’s usefulness<br />

and ease of operation paved the way to continued experimentation<br />

with energy in space. Currently, ABL and GBL<br />

systems can enhance energy into laser form powerful enough<br />

to shoot down enemy missiles and possibly satellites if applied<br />

in that manner. 32 The relatively vulnerable nature of satellites<br />

possibly could make these attacks very effective. If a key<br />

component of a satellite can be damaged or destroyed, even a<br />

minor assault can render the entire system ineffective. Moreover,<br />

simply the employment of radio frequencies or lesser<br />

energy forms can effectively jam a space tool.<br />

Now finally out of testing stages and into U.S. <strong>Air</strong><br />

<strong>Force</strong> operations is the “Counter Communications System”<br />

(CCS). Brought online in late October 2004, the CCS uses<br />

ground-based jamming based on electromagnetic radio frequency<br />

energy to knock out satellite transmissions for a short<br />

period of time in a reversible manner. 33 This technology<br />

offers a way to achieve satellite damage without the pain of<br />

destruction and impending war. A truly simple system based<br />

on off-the-shelf products, even the poorest nations can afford<br />

this technology and be a threat in regards to denying, or at<br />

east interfering with, our space assets.<br />

Finally, conventional and nuclear strike options exist<br />

that can destroy satellites. Standard munitions, when linked<br />

with a launch engine such as an ICBM, can disable a satellite<br />

or destroy it. 34 These could be deployed in the same nature<br />

that current missiles are launched, or in the fashion of kineticenergy<br />

weapons launched from airborne platforms. It should<br />

be noted here that the only weapons prohibited in space by<br />

international law are nuclear weapons. 35 According to the<br />

Limited Test Ban Treaty of 1963, there will be no nuclear<br />

testing in space, underwater, or in the atmosphere. 36 The devastation<br />

would be completely satisfactory for attacking a satellite,<br />

but would involve a large amount of damage for a small<br />

47<br />

goal. Far less mayhem is truly needed and nuclear weapons<br />

operate in a realm the general public undeniably rejects. 37<br />

The electromagnetic pulse (EMP) alone from the detonation<br />

could eliminate a satellite from effective operations, much<br />

less the shockwave from the blast. 38 These weapons can be<br />

deployed from air, space (in smaller size), land and the sea for<br />

use by an ICBM to carry munitions to orbit. This is a good<br />

method to undertake if a space tool needed total destruction,<br />

but other methods exist that do not jeopardize one’s own satellites<br />

in the instance that two space powers were fighting.<br />

Currently, the U.S. military uses virtually no methods<br />

to actively defend against ASAT attacks or any other form<br />

of interference or sabotage of our crucial space assets beyond<br />

the safety afforded by the nature of planetary orbit. 39 The<br />

one primary example of a defensive satellite is the MILSTAR<br />

communications constellation. In a geosynchronous orbit<br />

(extremely high altitude), the MILSTAR system boasts virtually<br />

unjammable UHF transmissions, a small jamming “footprint,”<br />

and low nuclear scintillation (nuclear survivable). 40 In<br />

the past, knowledge of space attack was something considered<br />

unachievable, so few precautions were taken. In general, satellites<br />

are unarmored, crafted for mission execution instead<br />

of defense and armament, and deemed safe in their orbits. 41<br />

This leaves a considerable gap in the defense structure of our<br />

space assets when aligned with the numerous methods of<br />

attack previously established. It must then become the goal of<br />

the <strong>United</strong> <strong>States</strong> military to find methods available, or establish<br />

new techniques to give our space assets the safety they<br />

deserve for the services they render.<br />

While few man-made defenses are in use, there are<br />

several natural aspects of space that give satellites an increased<br />

level of safety. In addition, certain pre-launch measures could<br />

be made to increase the effectiveness and security of satellites.<br />

First, satellites exist in a vast number of orbits, each<br />

with significantly different characteristics, which include lowearth,<br />

sun-synchronous, geostationary, geosynchronous, and<br />

Molniya orbits. 42 These orbits vary in speed and altitude, so<br />

weapons would have to be designed specifically to reach satellites<br />

in each orbital region of space. This is a natural safety<br />

feature of the space environment that has kept our assets safe<br />

to this day and will keep them secure until these conditions<br />

can be reasonably overcome.<br />

There are numerous options for defensive systems<br />

that will protect U.S. space assets from enemy attack. Technology<br />

is so advanced to date that ideas simply need to be<br />

worked out and put into reality. However, some critics think<br />

that there is still no need for weaponization or defenses in<br />

space. Maj Kirk J. Taylor, USA, thinks that “the right time<br />

has not yet arrived” for the arming of space and contends<br />

that space attack and that the belief in imminent attack is


unfounded. 43 Most authors, on the other hand, find the reality<br />

of the U.S. coming under space attack a near-term danger<br />

and one not to be taken lightly. Maj James L. Hyatt, III,<br />

USAF, claims that many systems exist and should be used in<br />

efforts of bolstering defenses.<br />

These conceptualized space defense systems include<br />

simple anti-jam features, increased maneuverability, or more<br />

advanced armor systems that can deflect, block, or intercept<br />

incoming attack. 44 The armor placed on a satellite<br />

could potentially stop certain conventional munitions or be<br />

deployed outward to disrupt kinetic-energy weapons on their<br />

route to destruction while additional position thrusters allow<br />

satellites to “dodge’ incoming threats. All of this can be done<br />

while blocking incoming jamming signals that are attempting<br />

to disorient and incapacitate the satellite. These systems<br />

constitute moderately simple, yet practical means of defense.<br />

However, money will always remain as the major limiting<br />

factor. The average cost to put one pound of cargo into space<br />

is $2,000. 45 This is so even in the heaviest lifting vehicles<br />

available such as the Titan IV-B (only one remaining) which<br />

possesses the ability to ferry 47,800 pounds of cargo to lowearth<br />

orbit. 46 This limitation will always create difficulties in<br />

implementation. In addition, certain technologies, such as<br />

advanced armor, may be ruled out completely when costs and<br />

benefits are analyzed.<br />

Other possible systems counter low-level EMP disruption<br />

by means of electrical fail-safes that can maintain the<br />

satellite’s basic functions in the event of a nuclear blast occurring<br />

outside of destructive distance. 47 Finally, laser or other<br />

interception weapons could be mounted on a limited scale on<br />

satellites to deflect or destroy oncoming munitions. These<br />

solutions are simple enough to be implemented in the near<br />

future in order to effectively protect against current weaponry<br />

intended to knock our satellites out of the sky.<br />

In summary, satellites are crucial tools for the <strong>United</strong><br />

<strong>States</strong> military and give us the capabilities to conduct warfare<br />

in a manner unlike any other nation. In addition, our level<br />

of reliance on space-based systems has increased exponentially<br />

over the years while the ability to destroy those systems<br />

has also become more feasible. The methods of attack that<br />

could harm a satellite must be examined, linked with available<br />

defense systems, and a method created to protect what is so<br />

important to the <strong>United</strong> <strong>States</strong> and its war fighting capabilities.<br />

In this way, the gap between vulnerability and effective<br />

defense can be bridged and our space assets made more<br />

secure.<br />

THESIS BODY<br />

There is a well-established gap in U.S. satellite<br />

defenses that leave our nation highly vulnerable in the event<br />

of a planned space attack. Space assets are a clear strategic<br />

48<br />

tool for the military, an economic tool for the civilian sector,<br />

and platform for scientific research and the betterment of<br />

mankind. If the <strong>United</strong> <strong>States</strong> lost any or all of these critical<br />

assets, a clear disadvantage would be established that other<br />

nations could take advantage of, primarily in the fighting of<br />

wars.<br />

Space attack is a reality. Since even before the Soviet<br />

launch of Sputnik over 47 years ago in October of 1957, the<br />

two great super powers of the time, the <strong>United</strong> <strong>States</strong> and<br />

Soviet Union, were devising methods to employ space for<br />

attack against its enemy and limit their space power. 48 Even<br />

now, this process continues though it hides under many guises<br />

as the world tends to shy away from ripping space away as<br />

a sanctuary for all to enjoy. Satellites are being considered<br />

for many strategic missions of which ballistic missile defense<br />

(BMD) has taken a forefront position, and for good reason.<br />

A weapon in space capable of destroying an inbound missile<br />

is an appealing concept and one strongly advocated by President<br />

Bush, though the U.S. has been primarily concerned<br />

with terrestrially-launched intercept vehicles. A way ASAT<br />

development hides itself is through BMD development where<br />

armed satellites are being conceived to knock out missiles,<br />

while having secondary capabilities of space attack. In fact, it<br />

is then reasonable to say that BMD development could possibly<br />

fuel more ASAT development in a spiral to battlefield<br />

employment. 49<br />

As development continues into the future, it is<br />

important not to forget what exists in space today and has<br />

and still poses a threat to satellites in orbit. As early as 1947,<br />

the U.S. started its first ASAT program designated Bold<br />

Orion which tested the launch of ASAT missiles from B-47<br />

aircraft. 50 Though unsuccessful in eliminating a satellite, this<br />

led to other programs including Project Mudflap from 1963-<br />

1966, Program 437 in 1976, Program 706 designated SAINT<br />

from 1962 on, and other secret programs (satellite interceptor).<br />

51 Of these, the first successful launch was conducted by<br />

Project Mudflap, otherwise known as Program 505. In 1963<br />

under the Kennedy Administration, a variant of the Army<br />

Nike Zeus system, developed as early as SAINT, destroyed<br />

a low-earth satellite target. 52 The U.S. clearly possesses the<br />

most basic capabilities of removing a satellite (at least in a<br />

low-earth orbit) and although these programs were cancelled<br />

in succession, it can be intuitively derived that progress in the<br />

field has never truly ceased completely.<br />

In regard to the Soviet Union, rigorous testing of<br />

ASAT weapons began in 1968 after the concept began being<br />

explored as early as 1963. Though little data is available even<br />

today, it was known that targets launched from Tyuratam<br />

launch station and interceptors from Plsestsk resulted in a<br />

success rate somewhere between 45% and 65% in attacking


satellites as high as 1,000 km exceeding even U.S. capabilities.<br />

53 The launch vehicle was a SL-11 liquid-fueled booster<br />

which deployed an interceptor that then used a co-planar<br />

(same orbital plane) orbit to get close enough to a satellite<br />

to deploy an explosive charge sending shrapnel at the target<br />

satellite. 54 These tests were conducted thoroughly up to<br />

1982, far longer than any documented U.S. ASAT technology<br />

development program. The last of which is documented<br />

as Program 437 which underwent development from 1963-<br />

1975, attempting to develop a nuclear anti-satellite weapon<br />

based on “spare parts.” 55 When considering the possible range<br />

of these interceptors, the only satellite within striking range<br />

is one traveling in the low-earth orbit (LEO) range. These<br />

satellites operate at approximately 400 km though some operate<br />

as high as 1,500 km. However, these would be the only<br />

satellites remotely possible to intercept. A semi-synchronous<br />

orbit, otherwise known as a middle-earth orbit (MEO), operates<br />

at 20,000 km while geosynchronous orbits (GEO) are<br />

positioned 35,900 km from the Earth’s surface. 56 With this<br />

in mind, it is quite unreasonable to assert that all satellites<br />

are in danger. Technology has come a long way since these<br />

programs of the past, but the cost and difficulties involved in<br />

launching to a deep space orbit is not readily wasted on such<br />

ventures. Rockets capable of placing a satellite into a GEO<br />

orbit are extremely limited in themselves and would most<br />

likely be required to accomplish this type of intercept.<br />

As space budgets around the world are stretched thinner<br />

and thinner, the concept that “wasting” launch vehicles<br />

for intercepting satellites has taken hold. In addition, applying<br />

what was previously mentioned, several unique systems,<br />

each capable of reaching different orbital parameters, would<br />

be required to mass a complete space attack. Hundreds of<br />

satellites circle the earth day in and day out. To successfully<br />

eliminate a fair portion of these satellites (one nation’s), these<br />

unique systems would also have to be heavily armed with<br />

what has come to an extremely limited technology. The concept<br />

of a massive space attack is unfounded and not possible<br />

in this day and age. However, the threat still remains against<br />

a single satellite serving a critical mission.<br />

Those satellites existing in LEO space are most often<br />

noted for their applications in remote sensing and communications.<br />

57 Using their low-altitude, they can produce the best<br />

visual imagery and relay information in the shortest period<br />

of time. As space entrepreneurship has developed around the<br />

world, more and more civilian industries also find this the<br />

most suitable realm for business. Launches decrease in price,<br />

drastically making the mission affordable and in conjunction<br />

with their financial goals and limitations. These victims in<br />

the instance of attack have no defense capabilities. In addition,<br />

the military relies heavily on these systems to enhance<br />

49<br />

their own and limit demands on satellites tasked specifically<br />

for military missions. 58 So the ultimate target within reason<br />

of a potential adversary is the lone satellite in a LEO orbit.<br />

This would be done in hope of reducing military strength<br />

while creating a devastating blow to the U.S. government.<br />

Since the Soviet Union posed the only feasible threat<br />

before becoming a “friend” to the <strong>United</strong> <strong>States</strong>, there are<br />

rarely any space adversaries available today. However, the<br />

looming threat continues to exist in which a rogue nation<br />

or terrorist organization acquires dangerous technology for a<br />

deployment escaping the bounds of deterrence. According<br />

to Thomas Schelling, deterrence is the bargaining power that<br />

comes from the physical harm a nation can do to another<br />

nation reflected in threats and assured retaliation. 59 Another<br />

definition reads, “deterrence is the ability to dissuade or discourage<br />

an opponent from taking certain actions based on the<br />

opponent’s fear of the costs or consequences.” 60 This method<br />

of diplomacy (bargaining for a political goal) is effective when<br />

applied face to face such as the U.S. – Soviet standoff that<br />

ensued during the Cold War. When applied to space, attack<br />

has been limited over the years because the opposing nations<br />

so feared retribution in the event of an unprecedented assault<br />

that they never utilized their technology. The ultimate fear<br />

of a deterrent nation is the lone militant commander without<br />

regard for others and no tools susceptible to retaliation in<br />

kind. 61 To better explain this, a rogue nation without satellite<br />

technology has no reason not to attack U.S. space assets.<br />

They have nothing to lose in return and they know the magnitude<br />

of the effects of their actions. Though a simplification<br />

of world affairs, this risk is simply the only one that reasonably<br />

falls into the context of the potential adversary yet to<br />

be faced in the space realm. In the words of the Honorable<br />

Richard E. Horner, Assistant Secretary of the <strong>Air</strong> <strong>Force</strong>, “we<br />

are all too susceptible to oversimplification.” 62 Thinking outside<br />

the box at potential threats is the most important phase<br />

for taking a protective and well-oriented stance.<br />

Though terrorists and small, destructive groups desire<br />

this technology, acquisition is a completely different story.<br />

The technology involved is expensive, limited, and something<br />

that can be considered a national strategic asset. This is noted<br />

in terms of U.S. policy in which space is known for providing<br />

a safe haven for military systems that contribute to strategic<br />

stability. 63 As such technology is strategic, the defense of<br />

these assets and exploitation of an enemy’s asset is a strategic<br />

goal as well. Therefore, satellite intercept technology is not<br />

something that can be sold, exported, or employed by a new<br />

user easily. It is considered crucial for the efforts of negating<br />

military benefits while further establishing personal safety. 64<br />

In these terms, the reference is being drawn to an intercept<br />

weapon which not only requires the launch vehicles, but a


launch site capable of handling a space launch. Only a few<br />

sites even exist capable of such action. For example, all USSR<br />

tests were conducted out of specifically Tyuratam launch facility<br />

though Plesetsk was certainly capable as well. 65 If a rogue<br />

nation were to even acquire such technology, they would have<br />

few options for deployment. In addition, when most technology<br />

finds itself reaching secondary consumers, it is outdated.<br />

These old systems are effective, but not in comparison to<br />

what have been developed in the years following. On top of<br />

all of these barriers, it is also difficult to use these systems.<br />

The technology is something easily appreciated, but hardly<br />

feasible for employment by low-tech forces utilizing terrorist<br />

tactics to exploit their limited forces.<br />

What can be drawn from this analysis is that acquiring<br />

and effectively using ASAT technology that falls into the<br />

categories of kinetic-energy, conventional, or nuclear is nearly<br />

impossible for a nation attempting to quickly enter into space<br />

combat. First, kinetic energy specifically fails as it tends to be<br />

the most expensive and demanding technology. For this to<br />

work, you need either a homing missile or projectile, both of<br />

which require advanced technology and an adequate launch<br />

site. 66 They also demand the most complex targeting systems<br />

as not only do they have to find a satellite, but actually<br />

shoot it down as opposed to simply creating a large explosion.<br />

Therefore, conventional weapons are just as complicated, but<br />

typically lack a small deal of targeting finesse. The U.S. has<br />

spent most of its time in this realm, although research has<br />

been conducted in many fronts. Finally, nuclear weapons detonated<br />

in space have typically been abandoned as it is against<br />

international agreements, promotes nuclear retaliation, and<br />

may cause harm to or interfere with nearby friendly space<br />

assets. 67 The law is unavoidable as it has been established<br />

that nuclear testing will not occur in the atmosphere under<br />

the aforementioned provisions of the 1963 Limited Test<br />

Ban Treaty. 68 Not only do scientists not readily know what<br />

will happen if a nuclear weapon is detonated outside of our<br />

atmosphere, it is generally considered a taboo practice to test<br />

nuclear weapons in modern times knowing the consequences<br />

that can await those who engage in such actions for a hostile<br />

purpose. Deterrence and the latent retributional violence it<br />

entails is still a driving policy force in the world today and its<br />

implications can even be identified on the most irrational terrorist<br />

levels. 69<br />

The remaining ASAT category and the only with<br />

viable enemy options, is the realm of directed-energy weapons.<br />

These can range from high-energy lasers (HEL) to<br />

light interference, or jamming systems specifically designed<br />

to interfere with radio signals. 70 The concept is said to have<br />

been initially developed by the Soviets with their Radio Electronic<br />

Combat (REC) system. The capabilities were intended<br />

50<br />

to include saturating satellite transponder and ground station<br />

receivers to block out normal communications receiver functions.<br />

71 In regard to lasers, no nation is yet known to actually<br />

possess a ground-based laser capable of delivering a strong<br />

enough and tightly focused beam capable of either disrupting<br />

or destroying a satellite. Also, these lasers require absolutely<br />

immense amounts of power on top of lengthy “reload” times<br />

as only a few “shots” may be potentially fired while a satellite<br />

is in view. It is important to remember that this technology<br />

is currently being developed as it coincides with U.S. nuclear<br />

ballistic missile defense goals. 72 Development of a laser capable<br />

of stopping a missile en route to its target will undoubtedly<br />

be capable of destroying a low-earth orbiting space asset<br />

with minor alterations. Since this technology is not even fully<br />

available to U.S. users, it will then also be ruled out as a possibility<br />

for use by terrorist organizations or other groups identified<br />

as the primary threats in the development and employment<br />

of weapons against strategic U.S. space assets.<br />

What remains may not even be considered weapons<br />

at all, but rather a unique design capable of limiting satellite<br />

use if not rendering it useless altogether. 73 What is implied<br />

here is that the use of jamming technology in the form of<br />

radio waves or other wave frequencies can easily degrade satellite<br />

communications making it incapable of reaching and<br />

transmitting data to enemy ground users. Every satellite has<br />

some link to the ground. To use gathered information, satellites<br />

must transmit vast amounts of data to earth through<br />

either direct transmission or transmission via other satellites<br />

to reach specific stations on the surface. 74 The benefits of<br />

this system then are that it can be used from anywhere on the<br />

earth within the satellite’s footprint, anonymously, and with<br />

little fear of immediate tracking. Jamming is intended to<br />

degrade signals and it does it so well that locating a jamming<br />

system is typically very difficult. The next benefit is that it is<br />

an inexpensive means of accomplishing a strategic goal. The<br />

earliest attempts at using this method occurred during the<br />

second Gulf War. Iraqi troops used portable GPS jamming<br />

kits in an effort to block GPS signals making it nearly impossible<br />

to use joint direct attack munitions (JDAMs) based on<br />

targeting through GPS guidance systems. 75 The result was<br />

a failure for the Iraqi soldiers as GPS munitions inevitably<br />

destroyed the jamming equipment, but set the stage for<br />

future development. Another example of this type of weapon<br />

employment recently occurred involving the effective jamming<br />

of a U.S. communications satellite broadcasting TV<br />

programs in Iran. 76 The results were a loss in satellite communication<br />

with ground stations, resulting in signal transmission<br />

failure, and ultimately complete mission degradation.<br />

What makes this situation difficult is that the source took<br />

many engineers a good deal of time to assume that Cuba was


to blame. Tracking the signal is difficult when the possibilities<br />

of location range from parts of eastern North and Latin<br />

America to Cuba. 77<br />

So why then is jamming so appealing? There are<br />

several reasons for this shift in ideologies. First and foremost,<br />

it is affordable. Jamming technology is nothing more than<br />

off-the-shelf parts. This in turn lowers costs and greatly opens<br />

the possibilities for enemy acquisition. Next, it debilitates<br />

capabilities while avoiding outright destruction. Although a<br />

shaky issue that can be viewed in two distinct ways, the results<br />

prove far friendlier than other options. The initial view is<br />

that interference is attack. By ridding capability you are<br />

attacking the underlying structure, integrity, and mission of a<br />

satellite. Even the most minor interference deprives military<br />

action which can be viewed as a threat. On the other hand,<br />

no physical damage is done. This second argument tends<br />

to hold the most influence and is shaping U.S. policy as the<br />

technology propagates and continues to develop. Jamming<br />

is both “benign” and “passive” while it can turn on and off in<br />

the blink of an eye and leaves no trace behind. 78 Therefore, it<br />

is not an attack, but rather a safe posture and position without<br />

any aggression or decisive interference on the part of the<br />

enemy.<br />

When considering this development, it is easy to<br />

use Sputnik as an example of how technologies develop and<br />

U.S. policy is directed in that regard. Some elements of the<br />

<strong>United</strong> <strong>States</strong> government favored allowing the Soviet Union<br />

to launch the first satellite as it created a precedent of safe<br />

and allowable over flight of the opposing nation from space. 79<br />

Since the <strong>United</strong> <strong>States</strong> did not oppose nor deny the ability of<br />

the Soviets to survey their land from space, the international<br />

policy was established that information collection from over<br />

flight is both legal and an addition to common international<br />

law. As small nations have begun to use these simple methods<br />

to acquire jamming systems, the <strong>United</strong> <strong>States</strong> has not openly<br />

complained about the concept, except publicly that this<br />

action has political consequences, since U.S. broadcasting to<br />

Iran is an important diplomatic objective. 80 But why establish<br />

such a precedent when at a disadvantage? By allowing its use,<br />

you may then pursue this technology and better it for yourself<br />

instead of creating international policy against its use. Since<br />

these incidents, the <strong>United</strong> <strong>States</strong> has introduced its Counter<br />

Communications System (CCS). The 76 th Space Control<br />

Squadron recently unveiled the system which boasts the ability<br />

to deny the communications abilities of multiple satellites<br />

simultaneously, making them useless to their benefactor. 81<br />

What this development ultimately points to is the<br />

direction of space attack in the years to come. Due to the<br />

complex nature of ballistic or guided ASAT weapons, the few<br />

rogue enemies in the world today do not have the faculties or<br />

51<br />

capabilities to attain or successfully use such a tool. In addition,<br />

the <strong>United</strong> <strong>States</strong> is more interested in ballistic missile<br />

defense than satellite attack, based primarily on the fear that<br />

retaliation will cause great harm. Since the priorities have<br />

shifted, the less expensive and equally effective jamming technology<br />

will hit the forefront in development. A precedent<br />

has been set and the world will follow the lead as it has been<br />

established as a unique possibility in warfare.<br />

From a legal perspective, this is a truly innovative<br />

and clever method to evade certain policies that are in place<br />

that help establish space as a sanctuary. Attack is defined in<br />

many ways, but one potent definition is “the onset of a corrosive<br />

destructive process.” 82 This specifies the non-repairable<br />

nature of an attack. Since it is not an attack nor causes any<br />

irreversible damage, sanctuary is preserved. In addition, to<br />

retaliate, there is typically the need for a premeditated and<br />

malicious attempt to deny certain military, political, or diplomatic<br />

capabilities. 83 Therefore, there is no pressing fear of<br />

retaliation in regard to jamming a satellite. It may not necessarily<br />

be a wise political move to jam a signal of a supposed<br />

“ally,” but it does not qualify as an attack.<br />

This analysis then must reiterate how critical it is<br />

to protect against ASAT threats and retain space dominance<br />

against potential enemies. As the background suggests, vulnerabilities<br />

exist and few satellites were designed with jamming<br />

avoidance in mind as an active defense system. Antijamming<br />

systems need to be supplemented in order to deter<br />

enemy interference and prepare for an unstable world where<br />

U.S. space assets remain critical military tools and valuable<br />

civilian assets. Bolstering defenses is thus the first step with<br />

an inevitable goal of veritable safety from influence. But what<br />

challenges await in defending against systems designed “to<br />

load enemy receivers with strong signals?” 84 How can satellites<br />

circumvent this influence and retain usable communications<br />

with ground stations?<br />

By establishing international policy allowing for the<br />

unannounced jamming of satellites in orbit, it has clearly been<br />

established that this activity will occur again. To accomplish<br />

the mission of defense, several courses can be pursued, all of<br />

which can be implemented in the mediums of the air, land,<br />

sea, or space. By increasing the frequency of a transmission,<br />

the footprint is lowered and jamming capability reduced. 85<br />

The resultant effect of such technology is secure transmission<br />

capability and increased awareness of a jamming location as<br />

it is identified within the footprint. The Defense Satellite<br />

Communications System (DSCS) utilizes ten satellites each<br />

possessing the capability to transmit over six super high frequency<br />

transponder channels. 86 The system is secure, and<br />

rightly so, as it is designed to send crucial information to<br />

military commanders during conflict. This technology placed


directly on the satellite is an ideal system as it is virtually<br />

untouchable, especially if ground resources to protect the satellites<br />

are removed through hostile action. The most important<br />

consideration for bringing this tool to the fight is again<br />

cost, primarily for the civilian sector of space. Space launch<br />

carries so large a price; extra funds to increase protection are<br />

typically overlooked. The mantra is simply to use what works<br />

as opposed to what is the most resistant. This unfortunately<br />

leaves virtually all companies beyond the <strong>United</strong> <strong>States</strong> government<br />

unable to afford such a venture. Though this may<br />

be a long-term goal, the more likely solution rests in groundbased<br />

technology.<br />

When considering these upgrade options, it is possible<br />

to consider placing them on satellites currently in orbit,<br />

thus taking special care to protect the most essential satellites<br />

in the growing U.S. network. However, cost is still the driving<br />

factor. The proposed Hubble telescope repairs, brought<br />

to the attention of NASA nearly 2 months ago, were estimated<br />

to be nearly $2 billion. 87 This large sum was required<br />

to repair merely one fourteen-year old satellite that has previously<br />

needed attention to maintain its functioning capabilities.<br />

Satellite repair is not easy, nor is it the safest action, as<br />

it requires a manned crew which places astronauts in danger.<br />

This assertion has been proven in the past as the Columbia<br />

shuttle was lost on 1 February 2003, creating a certain level<br />

of fear in what was once considered routine space operations.<br />

88 With ever limited space budgets, there is no current<br />

feasible way to ever be capable of affording missions to repair<br />

every crucial satellite. Though all may not be considered<br />

important, over 700 U.S. satellites alone orbit the earth. Too<br />

many exist, the danger is increasingly high, and the cost is<br />

phenomenal. In addition, manned repair crews must travel<br />

to space in the shuttle, which is only capable of operating in<br />

the low-earth space environment. Any satellites currently in<br />

higher orbits are, therefore, considered unreachable for repair<br />

and augmentation unless completed by theoretical robotic<br />

“astronauts.” Therefore, missions that fall in the category of<br />

launching to augment satellites in orbit are not a possibility<br />

for future protection of U.S. space assets. 89<br />

A British company known as QinetiQ, Europe’s largest<br />

science and technology organization, boasts the ability to<br />

detect satellite signal interference to within ten kilometers in a<br />

matter of seconds. 90 By using two intercept stations, it tracks<br />

the target satellite and an adjacent orbital element to locate<br />

the “beam” and utilize position and velocity analysis to locate<br />

the source of transmission. 91 Not only is this easy, but the<br />

system is itself ready for purchase and implementation. This<br />

alternative is a financial blessing when compared to the other<br />

aforementioned methods. A single set of stations could track<br />

multiple jamming frequencies simultaneously providing safety<br />

52<br />

of transmissions. If this technology can be implemented, it<br />

is the start needed in the process of space protection against<br />

U.S. enemies of today and tomorrow.<br />

The recommendations, then, that best suit meeting<br />

the mission of closing the gap between possible satellite interference<br />

and available defenses is a three-fold process. First,<br />

to ensure security and a limitation of jamming incidents,<br />

ground-based systems must be made operational as soon as<br />

possible. Systems such as QinetiQ can bolster awareness and<br />

prevent lengthy problems such as those encountered in operations<br />

already undertaken such as the jamming conducted<br />

by Cuba. Several redundant systems will provide adequate<br />

security to a large area and provide coordinates of jamming<br />

sites, enabling targeting and destruction of the threat. Next,<br />

new satellites with missions of the utmost security (specifically<br />

communications) shall, to the highest degree available,<br />

be fitted with jam resistant transmitters as they are launched<br />

in the future. This is a long-term enabler, and although more<br />

expensive, will give added protection and satellite independence<br />

of operation that the U.S. desires in completing the<br />

missions it sees fit and retaining the value of its strategic assets<br />

in space. Finally, satellites armed with jamming detection<br />

technology should be launched in order to facilitate the detection<br />

of threats. Space has been identified as a realm capable<br />

of very precise analysis, mapping, and oversight of the earth.<br />

Therefore, pinpointing something from space based on satellite<br />

triangulation, such as that already done by GPS satellites,<br />

is inherently more accurate than a land-based system. This<br />

would add the final ability of receiving increasingly accurate<br />

threat location information for its removal or destruction.<br />

CONCLUSION<br />

The growing reliance of the Unites <strong>States</strong> and other<br />

nations on their strategic satellite systems has identified<br />

these assets as critical for military operations, bolstering the<br />

economy, and providing deterrent measures. Space attack<br />

has been developed for years in the form of kinetic-energy,<br />

directed-energy, conventional munitions, and nuclear munitions<br />

that have ASAT application. Destroying a satellite is a<br />

major blow to the morale and national strength of another<br />

country. This then must be protected against in the instance<br />

that a nation comes into possession of technology capable of<br />

delivering such a blow. However, due to the complex nature<br />

of the space environment, limited finances for ASAT development,<br />

and difficulty in acquisition for terrorist or other rogue<br />

groups, most forms of attack are negligible as a threat.<br />

What remains is the previously tested and implemented<br />

technique of satellite signal jamming. Since all<br />

satellites must communicate their message to be effective,<br />

jamming offers an inexpensive, non-destructive means to<br />

eliminate satellite effectiveness while not taking a war stance


or violating international agreements. This is the method<br />

of choice and the primary threat to be defended against and<br />

prepared for in years to come. Due to the costs of space<br />

launch, the most reasonable and effective method for space<br />

defense involves three phases. The first introduces several<br />

ground-based jamming systems to locate threats in order for<br />

conventional forces to eliminate them or allow politicians to<br />

pressure the adversary to stop, given the knowledge of the<br />

jamming and its location parameters. Next, deploying more<br />

satellites with increased onboard jamming protection will<br />

create the independence in space needed to operate without<br />

fear. Finally, to fully ensure future protection against jamming<br />

technology, space-based jamming-signal locators should<br />

be employed to accurately locate the threat.<br />

Space has proven time and again to be the best means<br />

of locating, mapping, and targeting what is encountered<br />

on the surface of the earth. From this, we develop strategy.<br />

Though many years away, this goal would be adequate to<br />

close the gap currently present between vulnerabilities and<br />

defenses. Space is a strategic realm and extremely important<br />

in supporting military operations which have grown increasingly<br />

reliant on these systems. Space assets are one of the<br />

greatest military enablers ever devised, but if exploited by the<br />

enemy, our “Achilles Heel” in national defense. The damage<br />

would be devastating. Therefore, protective action can and<br />

will be pursued in the years to come in order to retain the<br />

superiority of <strong>United</strong> <strong>States</strong> strategic space assets.<br />

Although these solutions pose a sound method for<br />

solving the problem at hand, additional research should be<br />

pursued to ensure the best execution. The research should be<br />

directed at determining which of the proposed solutions best<br />

meets mission requirements in light of costs and other limiting<br />

factors. In addition, each method must be fully examined<br />

in terms of its practicality and applicability to civilian space<br />

assets. What remains is fully verifying the usefulness of the<br />

defense techniques now that the threat and solutions have<br />

been laid out. The pursuit of space dominance begins here<br />

and additional research must be pursued to ensure taking the<br />

best course of action possible.<br />

BIBLIOGRAPHY<br />

“Attack” [on-line]. Google Dictionary; Internet; available<br />

from http://www.google.com/search<br />

?hl=en&lr=&oi=defmore&q=define:attack, accessed<br />

17 March 2005.<br />

Baker, Joe A, CMD, USN. A U.S. SAT: Do We Need It?<br />

Maxwell AFB, AL: <strong>Air</strong> War College<br />

1989.<br />

Burmeister, Maj, USA. “Space Policy.” Class Presentation to<br />

PS 465 Class on 21 October<br />

53<br />

2004. USAFA; Vandenberg Hall, CO.<br />

Chun, Clayton K. S. Shooting Down a “Star”: Program 437,<br />

The U.S. Nuclear ASAT System<br />

and Present-Day Copycat Killers. Maxwell AFB, AL:<br />

<strong>Air</strong> University Press, 2000.<br />

Chun, Clayton K. S. Aerospace Power in the Twenty-First<br />

Century: A Basic Primer. Maxwell<br />

AFB, AL: <strong>Air</strong> University Press, 2001.<br />

CNN. “US Deploys Satellite Jamming System.” Washington<br />

D.C. 1 November 2004. [online];<br />

available from http://edition. cnn.com/2004/<br />

TECH/space/11/01/satellite.<br />

hjamming.reut/; Internet; accessed 15 November<br />

2004.<br />

“Congress Balks at Hubble Repairs.” Associated Press; 2 February<br />

2005. [on-line]; available<br />

from http://www.wired.com/news/<br />

space/0,2697,66486,00.html; Internet, accessed 17<br />

March 2005.<br />

Corporation for Atmospheric Research. “U.S. Pagers<br />

Silenced” [on-line]. Window to the<br />

Universe; available from http://www.windows.ucar.<br />

edu/tour/link=/headline_univers e<br />

_pagers.html; Internet, accessed 15 Sep 2004.<br />

“Cuba Identified as Likely Jamming Source of U.S. Satellite<br />

Programming to Iran” [on-line].<br />

Primedia; Internet; available from http://broadcastengineering.com/news/broadcasting_<br />

cuba_identified_likely/, accessed 17 March 2005.<br />

Darling, David. “Orbits” [on-line]. The Encyclopedia of<br />

Astrobiology, Astronomy, and<br />

Spaceflight; available from http://www.daviddarling.<br />

info/encyclopedia/O/orbit.html;<br />

Internet, accessed 16 March 2005.<br />

“Defense Satellite Communications System Phase III,” USAF<br />

Fact Sheet February 2000 [online];<br />

available from http://www.loasangeles.af.mil/<br />

SMC/PA/fact_Sheets/dscs_fs.htm;<br />

Internet, accessed 17 March 2005.<br />

Gibbons, John H., ed. Anti-Satellite Weapons, Countermeasures,<br />

and Arms Control.<br />

Washington D.C.: Office of Technology Assessment,<br />

1985.<br />

Gibbons, John H., ed. Ballistic Missile Defense Technologies,<br />

Anti-Satellite Weapons,<br />

Countermeasures, and Arms Control. New Jersey:<br />

Princeton University Press, 1986.<br />

Goldman, Nathan C. American Space Law: International<br />

and Domestic. Iowa: Iowa State<br />

University Press, 1988.


Goure, Daniel and Christopher M. Szara. <strong>Air</strong> and Space<br />

Power in the New Millennium.<br />

Washington, D.C.: Center for Strategic Studies,<br />

1997.<br />

Hays, Peter L., ed., et. al. Spacepower for a New Millennium:<br />

Space and U.S. National Security.<br />

New York, NY: McGraw-Hill, 2000.<br />

Hyatt, James L., III, Maj, USAF. Space Power. Washington,<br />

D.C.: Research <strong>Air</strong> Command and<br />

Staff College, 1995.<br />

Jasani, Bhuphendra, ed., Space Weapons – The Arms Control<br />

Dilemma. Philadelphia, PA:<br />

Taylor and Francis, 1984.<br />

Johnson-Freese, Joan. The Viability of U.S. Anti-Satellite<br />

(ASAT) Policy: Moving Towards<br />

Space Control. USAFA, CO: USAF Institute for<br />

National Security Studies, 2000.<br />

Koltz, Frank G. Space, Commerce, and National Security.<br />

New York, NY: Council on Foreign<br />

Relations Press, 1998.<br />

Lambakis, Stephen. On the Edge of Earth: The Future of<br />

American Space Power. Louisville,<br />

Kentucky: University Press of Kentucky, 2001.<br />

Lambeth, Benjamin S. “The Synergy of <strong>Air</strong> and Space.” <strong>Air</strong>power<br />

Journal12 (Summer 1998):<br />

4-14.<br />

___________________. “<strong>Air</strong> Power, Space Power, and<br />

Geography.” The Journal of Strategic<br />

Studies 22 (June/September 1999): 63-82.<br />

___________________. The Transformation of American<br />

Space Power. Ithaca, New York:<br />

Cornell University Press, 2000.<br />

Mueller, Karl P. “Totem and Taboo: Depolarizing the Space<br />

Weaponization Debate.”<br />

Astropolitics 1 (Summer 2003): 4-28.<br />

Nye, Joseph S., Jr. and James A. Schear, ed. Seeking Stability<br />

in Space: Anit-Satellite Weapons<br />

and the Evolving Space Regime. Lanham, MD: University<br />

Press of America, 1987.<br />

Pace, Scott. Assessing Options for Anti-Satellite Arms Control:<br />

The Analytical Hierarchy<br />

Process. Santa Monica, CA: RAND Corporation,<br />

1986.<br />

Peebles, Curtis. High-Frontier: The U.S. <strong>Air</strong> <strong>Force</strong> and the<br />

Military Space Program.<br />

Washington, D.C.: <strong>Air</strong> <strong>Force</strong> History and Museums<br />

Program, 1997.<br />

Preston, Bob et. al. Space Weapons: Earth Wars. Santa<br />

Monica, CA: RAND, 2002.<br />

“QinetiQ Counters Satellite Jamming,” Space Newsfeed 4<br />

54<br />

March 2004 [on-line]; available from<br />

http://www.newsfeed.co.uk/2004/7March2004_<br />

23.html; Internet, accessed 176 March<br />

2005.<br />

Reynolds, Glenn H. and Robert P. Merges. Outer Space:<br />

Problems of Law and Policy. Boulder,<br />

CO: Westview Press, 1997.<br />

Schelling, Thomas C. Arms and Influence. New York, NY:<br />

University Press, 1996.<br />

Stares, Paul B. Space and National Security. Washington,<br />

D.C.: The Brookings Institute, 1987.<br />

Sterner, C. Douglas. 2003. Cast a Giant Shadow [on-line].<br />

Home of Heroes; available from<br />

http://www.homeofheroes.com/wings/part2/03_<br />

walker.html; Internet; accessed 19<br />

November 2003.<br />

Stever, Guyford H. and Heinz R. Pagels, ed. The High Technologies<br />

and Reducing the Risk of<br />

War. New York, NY: The New York <strong>Academy</strong> of Sciences,<br />

1986.<br />

Straubel, James H., et. al. Space Weapons: A Handbook of<br />

Military Astronautics. New York,<br />

NY: Praeger Publishers, 1959.<br />

Taylor, Kirk J., Maj, USA. Arming the Skies: The Right Time<br />

has not Arrived. Kansas: School<br />

of Advanced Military Studies, 2000.<br />

Tirpak, John A. “Securing the Space Arena” [on-line]. <strong>Air</strong><br />

<strong>Force</strong> Magazine Online. Internet;<br />

available from http://www.afa.org/magazine/<br />

July2004/0704space.asp; Internet, accessed<br />

17 March 2005.<br />

U.S. <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong> Department of Economics and<br />

Geography. Geospatial Data Systems.<br />

Colorado Springs, CO: John Wiley and Sons, Inc,<br />

2003.<br />

VanHook, Richard, Maj, USAF. “Satellite Communications.”<br />

Class Presentation to MSS 485<br />

Class on 12 October 2004. USAFA: Vandenberg<br />

Hall, CO.<br />

Wells, Mark K., Col, USAF, ed. <strong>Air</strong>power: Promise and Reality.<br />

Chicago, IL: Imprint<br />

Publications, 2000.<br />

Wrachford, Jason S., Capt, USAF. “Space Law.” Class Presentations<br />

to PS 465 Class from 30<br />

September to 10 November 2004.<br />

(Endnotes)<br />

1 Peter L. Hays, ed., et. al., Spacepower for a New<br />

Millennium: Space and U.S. National Security (New York,<br />

NY: McGraw-Hill, 2000), 3.


2 Clayton K. S. Chun, Shooting Down a “Star”:<br />

Program 437, the U.S Nuclear ASAT System and Present-Day<br />

Copycat Killers (Alabama: <strong>Air</strong> University Press, 2000), 8.<br />

3 C. Douglas Sterner, Cast a Giant Shadow (Home of<br />

Heroes) [on-line]; available from http://www.homeofheroes.<br />

com/wings/part2/03_walker.html; accessed 19 November<br />

2003.<br />

4 Benjamin S. Lambeth, “<strong>Air</strong> Power, Space Power,<br />

and Geography,” The Journal of Strategic Studies 22 (June/<br />

September 1999): 74.<br />

5 U.S. <strong>Air</strong> <strong>Force</strong> <strong>Academy</strong> Department of Economic<br />

and Geography, Geospatial Data Systems (Denver, CO: John<br />

Wiley and Sons, 2003), 33.<br />

6 Curtis Peebles, High Frontier: The U.S. <strong>Air</strong> <strong>Force</strong><br />

and the Military Space Program (Washington, D.C.: <strong>Air</strong><br />

<strong>Force</strong> History and Museums Program, 1997), 73.<br />

7 Daniel Goure and Christopher M. Szara, <strong>Air</strong> and<br />

Space Power in the New Millennium (Washington D.C.: The<br />

Center for Strategic and International Studies, 1997), 8.<br />

8 Ibid.<br />

9 Clayton K. S. Chun, Aerospace Power in the<br />

Twenty-First Century: A Basic Primer (Maxwell AFB, AL: <strong>Air</strong><br />

University Press, 2001), 144.<br />

10 Benjamin S. Lambeth, The Transformation of<br />

American <strong>Air</strong> Power (New York: Cornell University Press,<br />

2000), 236.<br />

11 Benjamin S. Lambeth, “The Synergy of <strong>Air</strong> and<br />

Space,” <strong>Air</strong>power Journal 12 (Summer 1998): 7.<br />

12 Mark K. Wells, USAF, ed. <strong>Air</strong> Power: Promise and<br />

Reality (Chicago: Imprint Publications, 2000), 232.<br />

13 Goure, <strong>Air</strong> and Space Power, 106.<br />

14 Lambeth, The Synergy of <strong>Air</strong> and Space, 8-9.<br />

15 Benjamin S. Lambeth, “<strong>Air</strong> Power, Space Power,<br />

and Geography,” 68.<br />

16 Ibid.<br />

17 Wells, <strong>Air</strong>power: Promises and Reality, 301.<br />

18 Peebles, High Frontier, 34.<br />

19 Ibid.<br />

20 Clayton K. S. Chun, Shooting Down a “Star”, 8.<br />

21 Bob Preston, ed., Space Weapons: Earth Wars<br />

(California: RAND Publishers, 2002), 9.<br />

22 Corporation for Atmospheric Research, “U.S.<br />

Pagers Silenced” [on-line], Window to the Universe; available<br />

from http://www.windows.ucar.edu/tour/link=/headline_<br />

universe_e_pagers.html; Internet, accessed 15 Sep 2004.<br />

23 Stephen Lambakis, On the Edge of Earth<br />

(Kentucky: University Press of Kentucky, 2001), 20-23.<br />

24 Maj Burmister, USA, “Space Policy” (Class<br />

Presentation to PS 465 Class on 21 October 2004).<br />

25 Nathan C. Goldman, American Space Law:<br />

55<br />

International and Domestic (Iowa: Iowa State University<br />

Press, 1988), 71.<br />

26 Capt Jason S. Wrachford, USAF, “Space Law”<br />

(Class Presentations to PS 465 Class from 30 September to 10<br />

November 2004).<br />

27 Ibid., 24, 36, 45.<br />

28 Peebles, High Frontier, 65.<br />

29 Chun, Shooting Down a “Star”, 8.<br />

30 Karl P. Mueller, “Totem and Taboo: Depolarizing<br />

the Space Weaponization Debate,” Astropolitics1 (Summer<br />

2003): 5.<br />

31 Peebles, High Frontier, 79.<br />

32 Preston, Space Weapons: Earth Wars, 25.<br />

33 CNN, “U.S. Deploys Satellite Jamming System”<br />

(Washington, D.C.; 1 November 2004), 1.<br />

34 Mueller, “Totem and Taboo,” 7.<br />

35 Ibid.<br />

36 Glenn H. Reynolds and Robert P. Merges, Outer<br />

Space: Problems of Law and Policy (Boulder, CO: Westview<br />

Press, 1997), 52.<br />

37 Goure, <strong>Air</strong> and Space Power, 107.<br />

38 Chun, Shooting Down a “Starr”, 4.<br />

39 Ibid., 35.<br />

40 Maj Richard VanHook, USAF, “Satellite<br />

Communications” (Class Presentation to MSS 485 Class on<br />

12 October 2004).<br />

41 Ibid., 36.<br />

42 Ibid., 35.<br />

43 Maj Kirk J. Taylor, USA, Arming the Skies: The<br />

Right Time has not yet Arrived (Ft. Leavenworth, KS: School<br />

of Advanced Military Studies, 2000), 1.<br />

44 Maj James L. Hyatt, III, USAF, Space Power 2010<br />

(Maxwell AFB, AL: <strong>Air</strong> University Press, 1995), 5.<br />

45 Maj Richard VanHook, USAF, “Satellite<br />

Communications.”<br />

46 Ibid.<br />

47 Chun, Shooting Down a “Star”, 35.<br />

48 Frank G. Koltz, Space, Commerce, and National<br />

Security (New York, NY: Council on Foreign Relations Press,<br />

1998), 1.<br />

49 John H. Gibbons, Anti-Satellite Weapons,<br />

Countermeasures, and Arms Control (Washington D.C.:<br />

Office of Technology Development, 1985), 22.<br />

50 Bhuphendra Jasani, Space Weapons – The Arms<br />

Control Dilemma (Philadelphia, PA: Taylor and Francis,<br />

1984), 11.<br />

51 Ibid, 12-13.<br />

52 Joan Johnson-Freese, The Viability of U.S. Anti-<br />

Satellite (ASAT) Policy: Moving Towards Space Control<br />

(USAFA, CO: USAF Institute for National Security Studies,


2000), 5.<br />

53 Jasani, Space Weapons, 14.<br />

54 Paul B. Stares, Space and National Security<br />

(Washington D.C.: The Brookings Institute, 1987), 85.<br />

55 Clayton K. S. Chun, Shooting Down a “Star”,<br />

xiii.<br />

56 David Darling, “Orbits” [on-line]. The<br />

Encyclopedia of Astrobiology, Astronomy, and Spaceflight;<br />

Internet; available from http://www.daviddarling.info/<br />

encyclopedia/O/orbit.html; Internet, accessed 16 March<br />

2005.<br />

57 Maj Richard VanHook, USAF, “Satellite<br />

Communications.”<br />

58 Maj Burmister, USA, “Space Policy.”<br />

59 Thomas C. Schelling, Arms and Influence (New<br />

York, NY: Yale University Press, 1966), 5.<br />

60 Scott Pace, Assessing options for Anti-Satellite<br />

Arms Control: The Analytical Hierarchy Process (Santa<br />

Monica, CA: RAND Corporation, 1986), 5.<br />

61 Ibid., 95.<br />

62 James H Straubel, et. al. Space Weapons: A<br />

Handbook of Military Astronautics (New York, NY:<br />

Praeger Publishers, 1959, 11.<br />

63 Joseph S. Nye, Jr. and James A. Schear, Seeking<br />

Stability in Space: Anti-Satellite Weapons and the Evolving<br />

Space Regime (Lanham, MD: University Press of America,<br />

1987), 5.<br />

64 H. Guyford Stever and Heinz R. Pagels, The<br />

High Technologies and Reducing the Risk of War (New<br />

York, NY: The New York <strong>Academy</strong> of Sciences, 1986), 49.<br />

65 Jasani, Space Weapons, 14.<br />

66 H. Guyford Stever and Heinz R. Pagels, The<br />

High Technologies, 23.<br />

67 Ibid.<br />

68 Glenn H. Reynolds and Robert P. Merges,<br />

Outer Space, 52.<br />

69 Thomas C. Schelling, Arms and Influence, 5.<br />

70 CMD Joe A. Baker, USN, A U.S. ASAT: Do<br />

We Need It? (Maxwell AFB, AL: <strong>Air</strong> War College, 1989),<br />

17-18.<br />

71 Ibid., 18-19.<br />

72 Johnson-Freese, Joan, The Viability of U.S.<br />

Anti-Satellite (ASAT) Policy, 9.<br />

73 CMD Joe A. Baker, USN, A U.S. ASAT: Do<br />

We Need It?, 18.<br />

74 Maj Richard VanHook, USAF, “Satellite<br />

Communications.”<br />

75 John A. Tirpak, “Securing the Space Arena”<br />

[on-line], <strong>Air</strong> <strong>Force</strong> Magazine Online Internet; available<br />

from http://www.afa.org/magazine/July2004/0704space.<br />

56<br />

asp, accessed 17 March 2005.<br />

76 “Cuba Identified as Likely Jamming Source of U.S.<br />

Satellite Programming to Iran” [on-line], Primedia; Internet;<br />

available from http://broadcastengineering.com/news/<br />

broadcasting_cuba_identified_likely/, accessed 17 March<br />

2005.<br />

77 Ibid.<br />

78 Joseph S. Nye, Jr. and James A. Schear, Seeking<br />

Stability in Space, 6.<br />

79 Glenn H. Reynolds and Robert P. Merges, Outer<br />

Space, 8.<br />

80 “Cuba Identified as Likely Jamming Source of U.S.<br />

Satellite Programming to Iran” [on-line], Primedia.<br />

81 John A. Tirpak, “Securing the Space Arena” [online],<br />

<strong>Air</strong> <strong>Force</strong> Magazine Online.<br />

82 “Attack” [on-line], Google Dictionary, Internet;<br />

available from http://www.google.com/search? hl=en&lr=&<br />

oi=defmore&q=define:attack; Internet, accessed 17 March<br />

2005.<br />

83 Thomas C. Schelling, Arms and Influence, 22.<br />

84 John H. Gibbons, Anti-Satellite Weapons,<br />

Countermeasures, and Arms Control, 9.<br />

85 Maj Richard VanHook, USAF, “Satellite<br />

Communications.”<br />

86 “Defense Satellite Communications System Phase<br />

III,” USAF Fact Sheet February 2000 [on-line]; available<br />

from http://www.losangeles.af.mil/SMC/PA/Fact_Sheets/<br />

dscs_fs.htm; Internet, accessed 17 March 2005.<br />

87 “Congress Balks at Hubble Repairs,” Associated<br />

Press; 2 February 2005 [on-line]; available from http://www.<br />

wired.com /news/space/0,2697,66486,00.html; Internet,<br />

accessed 17 March 2005.<br />

88 Ibid.<br />

89 Maj Richard VanHook, USAF, “Satellite<br />

Communications.”<br />

90 “QinetiQ Counters Satellite Jamming,,” Space<br />

Newsfeed 4 March 2004 [on-line]; available from http://<br />

www.spacenewsfeed.co.uk/2004/7March2004_23.html;<br />

Internet, accessed 17 March 2005.<br />

91 Ibid.


NO COERCION HERE:<br />

THE SOVIET MILITARY EXPEDITION IN<br />

AFHGANISTAN, 1979-1989<br />

By:<br />

C3C Roland W. Olmstead<br />

Introduction<br />

The Soviet withdrawal from Afghanistan in 1989<br />

was a result of the pressures that were building towards the<br />

impending collapse of the Soviet Union rather than military<br />

defeat at the hands of the mujahideen and its foreign supporters.<br />

This paper seeks to accomplish four goals: (1) create<br />

a framework for analyzing coercion based on Robert Pape’s<br />

theory of coercion and additional considerations based on<br />

politics and the difficulties inherent in coercing non-state<br />

actors; (2) understand the objectives and strategy of each participant<br />

in the conflict along with the reality on the ground;<br />

(3) consider the course and results of the war from the point<br />

of view of each of the participants through the lens of coercion<br />

as established in the framework; (4) draw conclusions<br />

and ‘lessons learned’ from this war and apply them to the current<br />

US involvement in Afghanistan.<br />

Framework<br />

To understand what coercion is, it must first be<br />

understood what it is not. Coercion is not brute force.<br />

Although the two concepts share the use of force as a means<br />

of conforming an enemy’s behavior to the coercer’s will they<br />

differ in that brute force imposes that conformity, whereas<br />

coercion convinces the enemy to comply. 1 Coercion is also not<br />

deterrence. The difference is the desired end state: deterrence<br />

aims at maintaining the status quo while coercion seeks to<br />

alter the enemy’s behavior. 2<br />

In his book, Bombing to Win: <strong>Air</strong> Power and Coercion<br />

in War, Robert Pape defines coercion, analyzes the three<br />

type of coercive strategies, and offers six propositions concerning<br />

the success or failure of conventional coercion. He<br />

defines coercion as “efforts to change the behavior of a state<br />

by manipulating costs and benefits”. 3 To better understand<br />

these costs and benefits, Pape has created an equation that<br />

relates the resistance of an enemy (R) to the benefits of resistance<br />

(B), the probability of successful resistance (p(B)), the<br />

costs of resistance (C), and the probability of suffering those<br />

costs (p(C)), which mathematically is expressed as R = B*p(B)<br />

- C*p(C). 4 Thus, when the costs of resisting exceed the benefits,<br />

resistance will cease (R becomes negative) and the enemy<br />

will comply with the coercer’s demands.<br />

This breakdown into factors affecting an enemy’s<br />

decision leads to three coercive strategies, each one specifi-<br />

57<br />

cally targeted at one of the variables. The punishment strategy<br />

inflicts maximum death and destruction on the civilian<br />

population. 5 The risk strategy also targets the civilian population<br />

but with scheduled intervals of no hostilities to give the<br />

people the opportunity to consider changing their policy. 6<br />

Finally, the denial strategy targets the enemy’s military strategy<br />

and capabilities, including both fielded forces and logistical<br />

support. 7 Pape argues that the benefits of resisting (B)<br />

cannot be manipulated by a coercer but that the other three<br />

variables can be targeted by the three coercive strategies: punishment<br />

aims at increasing the cost of continued resistance<br />

(C), risk tries to increase the probability of costs (p(C)), and<br />

denial seeks to decrease the probability that resistance will be<br />

successful or beneficial (p(B)). 8 The success of each of these<br />

strategies, punishment, risk, and denial, will be tested in light<br />

of the Soviet-Afghan conflict.<br />

Having defined coercion and its three associated<br />

strategies, Pape puts forward six propositions regarding conventional<br />

coercion. The validity of these conclusions will also<br />

be cross-examined against the author’s findings in regards to<br />

the Soviet decision to withdrawal from Afghanistan, the culmination<br />

of which occurred in 1989. They are:<br />

1. Punishment strategies will rarely succeed<br />

2. Risk strategies will fail<br />

3. Denial strategies work best<br />

4. Surrender of homeland territory is especially<br />

unlikely<br />

5. Surrender terms that incorporate heavy additional<br />

punishment will not be accepted<br />

6. Coercive success almost always takes longer than<br />

the logic of either punishment or denial alone would suggest. 9<br />

Pape’s theory, while concise and scientific, suffers<br />

from two serious shortcomings: the failure to consider political<br />

limitations that restrict coercive efforts and the inherent<br />

difficulties of coercing non-state actors, both of paramount<br />

importance in the case of Afghanistan in the 1980’s. First,<br />

political limitations to prosecuting successful coercion include<br />

the necessity of popular domestic support, the effect on the<br />

economy, the costs in terms of people, money, resources, and<br />

opportunity costs, the reality that limited operations equates<br />

to limited options, and the need to balance commitments. 10<br />

All of these factors may restrict the coercer from choosing<br />

the optimal or the best mix of coercive instruments. Second,<br />

non-state actors (NSAs), as implied by their name, do not<br />

behave like states. They act in their own interest and often<br />

ignore the state government if one exists. 11 Indirect coercion<br />

is often fruitless because the NSAs simply do not care. Thus<br />

coercive measures must be that much more precise when<br />

identifying and targeting a non-state actor’s centers of gravity.


Further difficulties include gathering accurate intelligence,<br />

the lack of viable targets, the traditional adaptation to coercive<br />

efforts by NSAs, and the fact that the leaders of NSAs<br />

often have only nominal control of their organizations. 12 If<br />

the difference between conventional coercion and coercing<br />

NSAs is not properly understood, much effort may be misdirected,<br />

especially if conventional coercive strategies are applied<br />

against a non-state actor, leading to great frustration and<br />

waste and possible defeat.<br />

Having defined what coercion is, and what it is not,<br />

set up the three coercive strategies, put forward six propositions<br />

concerning coercion, and added political and NSA<br />

considerations to Pape’s theory, it is time to examine the facts<br />

surrounding the Soviet invasion, occupation, and withdrawal<br />

from Afghanistan during the decade lasting from 1979-1989.<br />

Facts<br />

The history of Afghanistan has been more cyclical<br />

than linear. Although time has moved on, technology<br />

has progressed, and enemies have changed, the Afghan pattern<br />

has remained the same. The Afghans have fought each<br />

other until a foreign power would invade, at which time they<br />

united against their common enemy and, as soon as the foreigners<br />

had been repelled, immediately returned to fighting<br />

one another. This pattern has repeated itself multiple times<br />

against the Russians and the British and the Soviet intervention<br />

would be no different, nor would its aftermath.<br />

To outsiders, Afghanistan has always been a means<br />

rather than an end in itself. The British originally became<br />

involved in Afghanistan not because they wanted to colonize<br />

it but because it would serve as a buffer to protect the crown<br />

jewel of the British Empire: India. Likewise, the Soviets in<br />

1979 did not want Afghanistan for itself but as a stepping<br />

stone to Iran, which was home to much-coveted warm water<br />

ports and oil. 13 The Soviets were not the only foreigners<br />

who would try to use Afghanistan during the 1980’s. All of<br />

the mujahideen’s supporters offered their help with their own<br />

interests in mind, none of which happened to coincide with<br />

the well being of the Afghan people.<br />

The Soviets had a long history of dealing with the<br />

Afghans but put it to surprisingly poor use. They were also<br />

accustomed to ruling large populations of Central Asian Muslims,<br />

50 million of whom were living under the aegis of the<br />

USSR as of 1990. 14 This led to the second objective pursued<br />

by the Soviets in Afghanistan: suppression of growing Islamic<br />

radicalism, particularly before it could spread to the Islamic<br />

populations directly under Soviet control. 15 A third more<br />

immediate objective prompted the Soviet intervention and<br />

that was the establishment and immediate teetering of a communist-style<br />

government in Afghanistan. The Soviet leadership<br />

felt a strong need to support socialist and communist<br />

58<br />

governments wherever they appeared, especially in a country<br />

in such close proximity to the USSR.<br />

At the outset of the conflict, the Afghans lacked<br />

any kind of national identity or purpose save one: evict the<br />

Soviets. Independence was achieved from British interference<br />

in 1919 and the King Muhammad Zahir Shah ruled<br />

for forty years until he became a constitutional monarch in<br />

1964 and was subsequently overthrown in 1973. 16 Although<br />

Afghanistan tried to remain non-aligned, Soviet influence<br />

began to creep in during the 1960’s. 17 Tribal and religious<br />

loyalties remained strong and often superseded nationalistic<br />

or political allegiance. In 1978, the Afghan communists, with<br />

Soviet support, seized power and began implementing socialist<br />

reforms. 18 Such secular communism was too much for<br />

most Afghans, including both radical and nominal Muslims. 19<br />

Some declared a jihad (literally: struggle) against the Afghan<br />

communists and many army units mutinied. 20 The resistors,<br />

irrespective of their tribal or religious affiliation, collectively<br />

became known to the world as mujahideen, or those who<br />

practice jihad.<br />

By 1979, it was clear that Afghanistan’s experiment<br />

in communism had gone drastically wrong. Three problems<br />

led to eventual Soviet intervention. First was the resistance of<br />

the people to the new government’s socialist-based reforms.<br />

Mir Husain quotes Olivier Roy who said that this reaction<br />

“was expressed in the garb of a defense of Islam, because Islam<br />

was inextricably bound to tradition in the worldview of the<br />

Afghan peasantry.” 21 Second, infighting plagued the Afghan<br />

communist party, known as the People’s Democratic Party of<br />

Afghanistan (PDPA). 22 Nur Muhammad Taraki and Hafizullah<br />

Amin, the prime minister and deputy prime minister,<br />

respectively, ended up in conflict with the eventual murder of<br />

Taraki. 23 Third, the final straw was the falling out between<br />

Amin and the Soviets, specifically after his appeal to the West<br />

for aid. 24 So prompted, the Soviets invaded in December,<br />

murdered Amin, and installed their own puppet: Barbak<br />

Karmal. 25 Thus began an occupation that would last over<br />

nine years (). It would be a time of great suffering for both<br />

the Soviets and the Afghans, with the only real success being<br />

achieved on behalf of the radical Islamists, especially the Taliban<br />

and Al Qaida.<br />

The Soviet invasion provoked an outcry around the<br />

world but it was in the Muslim world that the cry resonated<br />

the deepest. It was as if a match had been struck and lit the<br />

fire of Islamic unity, which previously had only been achieved<br />

during the Arab-Israeli Wars. The Islamists who sent money<br />

and those who went themselves shared the single-minded<br />

vision of the Afghans but with a slight twist: evict the atheists<br />

from dar Al-Islam (the House of Islam). 26 They saw the invasion<br />

through a religious rather than a political lens: that this


was an attack on Islam. 27 Radical Muslims from a myriad of<br />

countries made their way to neighboring Pakistan to support,<br />

train, and fight with the mujahideen. Many of their governments,<br />

under the threat of growing domestic problems such as<br />

severe unemployment, were facing opposition from Islamists<br />

and were glad to see them go, moreover, privately hoped that<br />

they would become martyrs in the Afghan jihad. 28 The Saudis<br />

even subsidized one-way plane tickets to Pakistan. 29 Thus, the<br />

war expanded from an Afghan civil war, to attempted subversion<br />

and colonization by the USSR, to a ‘clash of civilizations’<br />

between Atheism and Islam.<br />

The <strong>United</strong> <strong>States</strong> saw and used Afghanistan strictly<br />

in terms of the Cold War. Prior to Soviet involvement,<br />

the US turned down Afghan requests for aid and generally<br />

ignored the region. After the Soviet withdrawal, the US<br />

would again turn its back on Afghanistan until it was attacked<br />

by the Afghan-based Al Qaida on 11 September 2001. In<br />

the interim period, the primary US objective was to prevent<br />

Soviet expansion into southwest Asia in general and in the<br />

direction of the Persian Gulf, whose oil was considered to<br />

be in the US national interest, in particular. 30 The strategy<br />

chosen to check this Soviet aggression was largely colored by<br />

the US’s recent exit from Vietnam and the strong desire to<br />

avoid getting involved in another ‘dirty war.’ 31 Thus, the massive<br />

amounts of financial aid and weapons (ironically, most<br />

of which were Soviet manufactured 32 ) supplied to the mujahideen<br />

was given with no US oversight. “For as long as these<br />

mujahedin were giving the Soviets a “hard time”, Washington<br />

remained oblivious to, and unconcerned about, their anti-<br />

US posture, penchant for terrorism, involvement in the drug<br />

trade, and even their alienation from the vast majority of the<br />

Afghan population in whose name, and for whose liberation,<br />

these mujahedin were ostensibly fighting.” 33<br />

Following the traditional use of Afghanistan as a<br />

‘means,’ the initial US policy was to only supply enough aid<br />

to make the Soviets bleed but not enough to give the mujahideen<br />

the decisive edge needed to obtain victory. 34 This covert<br />

aid changed when President Ronald Reagan issued National<br />

Security Directive #166, which called for all available means<br />

to be employed to evict the Soviets from Afghanistan. 35 The<br />

two immediate results of this Directive were the establishment<br />

of training camps in Pakistan and Stingers. 36 Approximately<br />

900 man-portable Stinger surface-to-air missiles were supplied<br />

to the mujahideen who put them to use against the Soviet and<br />

Afghan <strong>Air</strong> <strong>Force</strong>s. 37 The Afghans inflicted significant but not<br />

irreproachable casualties, particularly against Soviet helicopters.<br />

The Soviets had pursued a three-pronged strategy in<br />

trying to subdue Afghanistan. First, they set about dividing<br />

and destroying the Afghan leadership. 38 Second, they wanted<br />

59<br />

to erode the mujahideen base of popular support by destroying<br />

the social and economic infrastructure of the country. 39<br />

Third and finally, they tried to isolate the region from the<br />

outside world. 40<br />

The Afghans responded in accordance with their<br />

own great military tradition: let them come and suffer. They<br />

pursued a classical insurgency strategy of raising the cost of<br />

remaining in country to the point that it become unbearable<br />

for the Soviets to pay. The other component of their strategy<br />

is what saved the Afghans a myriad of times throughout history:<br />

great endurance and patience. This time was different<br />

in that it is unlikely that the mujahideen would have survived<br />

without external support.<br />

The effectiveness of the non-Afghan fighters, especially<br />

the so-called ‘Arab Afghans,’ against the Soviets has long<br />

been highly overrated, especially by the Arabs themselves.<br />

This should not diminish their contribution but it was propping<br />

up and keeping the mujahideen alive rather than militarily<br />

defeating the Soviets. Their largest contribution was<br />

monetary not military. They built training camps and Islamic<br />

schools across Pakistan in support of the resistance and to<br />

provide Islamic motivation and education.<br />

As in most wars, the objectives and the strategies<br />

of the parties varied dramatically with the reality on the<br />

ground. The Soviets kept the larger strategic picture in mind<br />

and nearly won, despite incredible tactical deficiencies. The<br />

Afghans margin of success was much slimmer than is usually<br />

portrayed, especially by the Western media. The Islamists,<br />

while contributing little towards defeating the Soviets, made<br />

incredible gains in Afghanistan that would rapidly spread<br />

throughout the Islamic world and beyond. The US strategy,<br />

while beneficial to the mujahideen, had only a minimal<br />

impact in compelling the Soviets to withdraw and had the<br />

unintended consequence of building and funding radical<br />

Islam, which would redirect its wrath from the Soviet Union<br />

to its former patron, the West and the <strong>United</strong> <strong>States</strong> in particular.<br />

Of the three strategies pursued by the Soviets two<br />

were successful. Throughout the war, the Soviets kept the<br />

mujahideen divided and constantly checking their backs<br />

against potential treachery. Afghan unity is an oxymoron<br />

and the Soviets played it to full effect. Secondly, the Soviets<br />

inflicted an incredible amount of punishment on the Afghan<br />

people, with an estimated one million dead in Afghanistan<br />

and “significant numbers of the 3 to 5 million refugees living<br />

in Pakistan [who] were also killed.” 41 Their goal was to<br />

undermine mujahideen’s base of popular support and to show<br />

that they were incapable of protecting the people from Soviet<br />

retribution. In this they were again largely successful. The<br />

problem lies in the third objective, which was not realized.


Although the mujahideen were divided and lost the support of<br />

the Afghan people over the course of the war, they managed<br />

to survive because the Soviets could not effectively isolate<br />

them. The majority of the engagements between communist<br />

and mujahideen forces took place on or near the Afghan<br />

border. Pakistani support in particular was critical to keeping<br />

the Afghan resistance alive and was largely supplemented by<br />

both the Muslim world and the <strong>United</strong> <strong>States</strong>.<br />

What is most often highlighted when recounting the<br />

Soviet-Afghan War is the tactical success of the mujahideen<br />

against the Soviets. The question is often posed: how were a<br />

rag-tag bunch of guerillas able to defeat one of the world’s two<br />

great superpowers? While strategically the mujahideen were<br />

very near defeat, they scored many tactical successes because<br />

of Soviet ineptitude in fighting insurgents. 42 Afghanistan’s<br />

rugged terrain and porous borders provide the ideal environment<br />

for guerilla tactics such as ambushes, hit-and-run<br />

raids, sniping, etc. Likewise, the Limited Contingent of<br />

Soviet <strong>Force</strong>s in Afghanistan (LCSFA) was a conventional<br />

force assigned an unconventional mission. 43 The motorized<br />

rifle companies employed against the mujahideen were not<br />

trained, equipped, or motivated to fight under such conditions.<br />

Morale among the conscripted Soviet solders plummeted,<br />

especially as the war dragged on for a decade. One<br />

of the greatest Soviet failures was the slow pace at which they<br />

adapted their tactics and applied ‘lessons learned.’ 44 There<br />

was no sense of urgency and very limited sharing of experiences.<br />

Thus, the Afghan resistors could frequently re-employ<br />

the same traps and tactics and the Soviets simply absorbed the<br />

punishment. As the war dragged on the Soviets did improve,<br />

introducing a special Counter-Insurgency <strong>Force</strong>, taking<br />

advantage of their total air superiority, and, increasingly, providing<br />

combat support to the Afghan communists. 45 Also,<br />

the Limited Contingent of Soviet <strong>Force</strong>s in Afghanistan was<br />

just that: limited, and it remained so throughout the war. 46<br />

More forces might have provided the mass needed to overcome<br />

the mujahideen but not necessarily. More rapid progression<br />

of counterinsurgency tactics and cutting off outside aid<br />

would have harmed the mujahideen far more than the introduction<br />

of additional Soviet troops.<br />

Despite their incredible tactical shortcomings, the<br />

Soviets nearly won and throughout the conflict they kept the<br />

larger strategic vision firmly in view. The <strong>United</strong> <strong>States</strong> was<br />

not the only one to learn from Vietnam. The Soviet leadership<br />

observed and made sure that Afghanistan did not become<br />

‘their Vietnam,’ despite frequent allegations to the contrary.<br />

They did this by keeping Afghanistan from dominating the<br />

larger strategic picture because, in reality, their intervention<br />

there was not that important to the Soviet national interest<br />

and by imposing and adhering to a strict limitation on the<br />

60<br />

number of troops. They did not allow Afghanistan to become<br />

a ‘black hole’ of men and materiel that Vietnam was to the<br />

<strong>United</strong> <strong>States</strong>. This larger strategic vision, while ultimately<br />

successful in preventing Soviet over commitment in Afghanistan,<br />

also proved exceptionally frustrating for the troops in<br />

theater. Because Afghanistan was intentionally a low priority,<br />

so too was improving tactics, learning proper counterinsurgency,<br />

and providing the necessary troops and equipment that<br />

would be necessary for victory. 47<br />

The Afghans won, as do many insurgents, by not<br />

losing. Although they remained divided and absorbed tremendous<br />

punishment, they were kept alive by outside intervention.<br />

Their military success, and even more so of the ‘Arab<br />

Afghans,’ has been greatly inflated but this does not take away<br />

from their courage, tenacity, and perseverance. The value of<br />

US involvement also tends to be grossly overestimated, especially<br />

the effectiveness of the Stinger surface-to-air missiles.<br />

Even after the implementation of National Security Directive<br />

#166, at no time were the Soviets ‘bled white.’ During the<br />

war the Soviets suffered 13,000 killed in action and many<br />

more in non-combat related accidents and fatalities but at no<br />

time was the punishment inflicted excessive or unbearable.<br />

Even the celebrated Stingers, while quite effectively employed,<br />

did not bring about a change in the Soviet mind. These casualty<br />

figures are actually quite miniscule when considered in<br />

light of the Soviet history of absorbing millions of casualties<br />

during World War II.<br />

The results of this conflict, so often misconstrued,<br />

were nonetheless far reaching. The Soviet withdrawal, completed<br />

in 1989, and the subsequent collapse of the Soviet<br />

Union are frequently linked in the minds of the Afghans and<br />

Arabs. Essentially, they claim that they fought and defeated<br />

a superpower and thereby caused its collapse. However, this<br />

is a fallacy known as post hoc ergo propter hoc, which literally<br />

means ‘after this therefore because of this.’ Because the<br />

collapse of the USSR occurred shortly after the Soviet withdrawal<br />

from Afghanistan, many in the Islamic world, most<br />

prominently Osama bin Laden, attribute the withdrawal as a<br />

major cause of the collapse. The truth is the exact opposite:<br />

the impending collapse of the USSR led to the withdrawal<br />

of Soviet forces from Afghanistan. However fallacious, bin<br />

Laden and many of his colleagues’ conclusion has led to their<br />

belief that a small group of Muslim fighters can defeat and<br />

moreover destroy a superpower. They have turned their attention<br />

to the <strong>United</strong> <strong>States</strong> and attacked her, most dramatically<br />

on 11 September 2001, in hopes that the US would be drawn<br />

into Afghanistan and defeated, repeating the Soviet experience.<br />

Although the Soviet Union collapsed shortly after the<br />

1989 withdrawal, Russia has remained involved in Central


Asia in general and Afghanistan in particular. Two problems<br />

linger from the Soviet-Afghan War and they both revolve<br />

around Islamic radicalism. Immediately after the Soviet<br />

withdrawal, the world turned its back on Afghanistan and<br />

this allowed the radical Taliban to seize power and moreover<br />

to export it, particularly to the newly created Central Asian<br />

republics. Thus, the original Soviet objective of checking<br />

the growth of radical Islam was a dismal failure. Chechnya<br />

illustrates this problem even closer to home; but there is also<br />

another inherited problem of the Soviet-Afghan War: tactical<br />

incompetence when fighting insurgents. The Russian Army<br />

suffers today against Chechnyan rebels from many of the<br />

same deficiencies that the LCSFA had against the Afghans.<br />

Many in the West expected the almost immediate<br />

collapse of the Afghan communist government upon the<br />

withdrawal of the last Soviet forces, similar to collapse of<br />

South Vietnam after the American withdrawal. But such was<br />

not the case. Najibullah remained in power until 1992, when<br />

his government finally collapsed and chaos ensued until order<br />

was restored by the Taliban. This was because the mujahideen,<br />

never united, began fighting each other even before the<br />

Soviet withdrawal was complete. Another factor was that<br />

outside support for the mujahideen rapidly dried up, while<br />

Najbullah continued to receive significant Soviet assistance.<br />

The conflict in Afghanistan between religion and<br />

tribalism was successfully manipulated by outsiders, ensuring<br />

further chaos in the wake of the Soviet withdrawal. The<br />

Pakistani government, fearful of Pashtun desires for autonomy<br />

within their own country, helped create the madrassahs<br />

(Islamic schools) that spawned the Taliban desiring to unite<br />

the people under the banner of Islam rather than tribalism.<br />

The Soviets, in the process of their retreat northwards, reignited<br />

Pashtun and Uzbek nationalism as a counterweight to<br />

radical Islam. These forces have been at work up to the present<br />

day, seen in the rise and subsequent fall of the Taliban.<br />

Fit<br />

Now that a framework has been created for analyzing<br />

coercion and the case study of Afghanistan has been examined<br />

in depth, the question remains, were any of the participants<br />

able to successfully execute a coercive strategy? The answer<br />

in every case, for the Soviets, for the mujahideen, for the<br />

Islamists, and for the <strong>United</strong> <strong>States</strong>, is a resounding ‘no!’<br />

The Soviets were successful at employing both punishment<br />

and risk strategies against the Afghans but they failed<br />

miserably at denial. The Soviets inflicted tremendous pain on<br />

the Afghan population and even undermined their support of<br />

the mujahideen, but it did not matter; this was not critical to<br />

the resistance. They also successfully killed and divided the<br />

Afghan resistance factions; in Pape’s words, the risk strategy of<br />

decapitation. Again, this was important but not crucial to the<br />

61<br />

survival of the mujahideen. Although some could argue that<br />

the Soviets also attempted a denial strategy, in reality it was<br />

brute force. It failed because of the tactical incompetence at<br />

the outset of the conflict and the lethargic pace at which the<br />

LCSFA adapted.<br />

The underlying reasons for the Soviet failure mesh<br />

well with Pape’s propositions regarding conventional coercion.<br />

As predicted, punishment and risk failed and denial, which<br />

has the potential for success, did not occur. Furthermore,<br />

the costs of surrendering were too great for the Afghans to<br />

accept. Pape notes that the surrender of homeland territory is<br />

unlikely. Even more than this, the Afghans were being asked<br />

to accept a completely new culture, ideology, and worldview,<br />

which the Afghan communists tried to impose. The Soviets<br />

recognized that trying to impose such drastic and draconian<br />

changes would be counterproductive and advised the PDPA<br />

accordingly. But the Afghan communists preceded and successfully<br />

stirred up nearly all the Afghans against the communists.<br />

The Soviets, once they directly intervened, were thus<br />

compelled to use brute force against the Afghans as nothing<br />

short of total defeat would be enough to make the Afghans<br />

into communists.<br />

The Afghans also failed to coerce the Soviets to leave<br />

their country. They pursued primarily a punishment strategy,<br />

hoping to make the cost of remaining in Afghanistan<br />

outweigh the benefit by killing as many Soviet soldiers as<br />

possible. Their problem was that the Soviet Armed <strong>Force</strong>s<br />

(SVS) could absorb tremendous losses with no real effect on<br />

capability or their will to continue the war. Casualties paled<br />

in comparison to Soviet losses during World War II or even<br />

American losses in Vietnam. Also, by keeping the LCSFA<br />

truly limited, there was never any real danger that Afghaninflicted<br />

punishment would rise to unacceptable levels.<br />

The mujahideen were never in a strong enough position<br />

to effectively employ a denial strategy. Although they<br />

won many small engagements, the Soviets retained the strategic<br />

initiative throughout the war and could do anything they<br />

wanted, provided they were willing to pay the price. 48 “Significantly,<br />

throughout the lengthy and bitter war in Afghanistan<br />

the resistance was unable to challenge the Soviet hold<br />

over even a single strategically-important asset.” 49<br />

The Islamic supporters of the mujahideen saw their<br />

objective accomplished, namely Soviet withdrawal, but they<br />

contributed very little to that success. Their real contribution<br />

was in propping up the mujahideen, and so they did not exercise<br />

any type of coercion.<br />

Likewise, the US achieved its objective only at a tremendous<br />

cost. The massive aid provided to the mujahideen<br />

also meant that anti-American factions would subsequently<br />

turn against their Western patrons. Not only did the US have


a minimal impact on the Soviet decision to withdraw from<br />

Afghanistan, its attempts spawned disastrous side effects.<br />

Having established that there was no successful coercion<br />

from 1979-1989 in Afghanistan, the question remains,<br />

what caused the Soviet withdrawal? The answer lies beyond<br />

Pape’s theory in the larger political context of the Cold War.<br />

The Afghans won not because of any military success<br />

against the LCSFA, but because of the one thing they<br />

did not do: surrender. In 1985, Mikhail Gorbachev came<br />

to power in the USSR and he immediately began to consider<br />

how to remove the LCSFA. 50 He did this not because<br />

of the punishment that the Afghans were inflicting on the<br />

Soviets, but because he recognized the “long-festering Soviet<br />

weaknesses…[that] later brought the collapse of the Soviet<br />

Communist power and the USSR itself.” 51 Ronald Reagan<br />

was effectively ‘spending the Soviets into the ground’ by<br />

building cold war arms at a rate at which the Soviet economy<br />

could simply not compete. As Gorbachev embarked on his<br />

reformation of communism he encountered growing public<br />

outrage against Soviet troops in Afghanistan. The width and<br />

breadth of the tactical disaster was getting back to the Soviet<br />

people, who could not see the larger strategic picture and how<br />

close the LCSFA was to victory. Having opened Pandora’s<br />

box by allowing criticism of the Soviet system, he was then<br />

unable to contain it in regards to Afghanistan. The impending<br />

economic collapse of the USSR, combined with growing<br />

public pressure, is what finally drove Gorbachev to withdraw<br />

the LCSFA.<br />

Future<br />

The decade of foreign interference in Afghanistan<br />

from 1979-1989 carries many lessons for others who dare<br />

to tread the same ground, especially the <strong>United</strong> State since<br />

it began an armed intervention in Afghanistan in November<br />

2001 following the terrorist attacks of September 11 th . Key<br />

Soviet failures and successes can be avoided and applied by<br />

the <strong>United</strong> <strong>States</strong> in order to accomplish its objectives and<br />

avoid becoming bogged down in a never ending engagement<br />

between US forces and Afghan insurgents.<br />

The <strong>United</strong> <strong>States</strong> must first recognize the will and<br />

motivation of the Afghan people. Over the course of history<br />

they have fiercely opposed attempted occupation by the Russians,<br />

the British, and the Soviets. They will not accept undue<br />

American influence. If forced to fight, they have the stomach<br />

for a long drawn-out war of attrition, in stark contrast to the<br />

American people who are impatient for total victory 52 . The<br />

Afghans have proven over and over again their willingness to<br />

persevere and outlast their enemies. The <strong>United</strong> <strong>States</strong> would<br />

do well to avoid becoming such an enemy.<br />

The second Soviet mistake was the imposition of<br />

an extreme form of government on the Afghan people. The<br />

62<br />

Soviets actually recognized that Taraki and Amin were too<br />

radical and tried to restrain them. 53 Secular communism<br />

proved to be completely unpalatable to the average Afghan. 54<br />

The Soviet efforts were too late and, once they invaded, they<br />

were forced to deal with the consequence: namely, a people<br />

galvanized against the Soviet ideology. The lesson for the<br />

<strong>United</strong> <strong>States</strong> is clear: do not try to impose a foreign system<br />

of government. Any new constitution must be sufficiently<br />

‘Afghan’ and, consequently, Islamic.<br />

The <strong>United</strong> <strong>States</strong> military involvement today in<br />

Afghanistan shares one great similarity with the decade of<br />

Soviet occupation: most of the fighting is between US forces<br />

and insurgents, remnants of both the Taliban and Al Qaida,<br />

and it is occurring on and near the Pakistani border. This<br />

carries two implications, both of which were major Soviet<br />

failures. First, the US forces engaged must learn, refine, and<br />

perfect counterinsurgency tactics. Politically, the US cannot<br />

afford to lose tactical engagements nor suffer casualties anywhere<br />

on the order of the Soviet losses. A system must be<br />

developed to share ‘lessons learned’ and thereby improve<br />

tactics and avoid repeating mistakes. Second, Pakistan must<br />

cease to be a sanctuary for insurgents, who traverse the border<br />

with relative ease. Just as the <strong>United</strong> <strong>States</strong> and sympathetic<br />

Muslim nations supplied the mujahideen via Pakistan, so the<br />

remaining anti-American forces are operating out of Pakistan.<br />

Either the border must be sealed, which geographically is difficult<br />

to impossible, or the fight must be taken to Pakistan,<br />

preferably by Pakistani government forces rather than American<br />

or Western troops, whose presence would likely do more<br />

harm than good. The bottom line is that there will be no<br />

peace or victory in Afghanistan as long as the insurgents have<br />

secure bases to operate out of in Pakistan.<br />

The last lesson for American forces in Afghanistan to<br />

learn from their Soviet predecessors is to clearly grasp the conflict<br />

between ideology, religion and tribalism that so fractures<br />

Afghan society. Afghani, Pakistani and Soviet leaders encouraged<br />

and supported communism, radical Islam and tribalism,<br />

respectively, as a counterweight to the other. The <strong>United</strong><br />

<strong>States</strong>, perhaps unwittingly, has fallen to supporting tribalism<br />

through its alliance with the likes of Uzbek General Dostum<br />

and other ethnically-based groups who opposed the Taliban.<br />

To bring permanent peace and democracy to Afghanistan,<br />

the <strong>United</strong> <strong>States</strong> must find something that supersedes both<br />

ethnic and religious identity. Such a centrifugal force, that is<br />

sufficient to overcome Afghanistan’s many schisms, has yet to<br />

be discovered and applied.<br />

Bibliography<br />

Anonymous, Through Our Enemies’ Eyes: Osama bin Laden,<br />

Radical Islam, and the Future of America, (Washington:


Brassey’s, 2002).<br />

Bodansky, Yossef and Evgeny Nikitenko, “Reflections on<br />

Afghanistan,” Defense & Foreign Affairs’ Strategic<br />

Policy, February 1999.<br />

Bradsher, Henry S., Afghan Communism and Soviet<br />

Intervention, (Oxford: Oxford UP, 1999).<br />

Ewans, Martin, “America and Afghanistan: A Troubled<br />

History,” World and I, 1 March 2002.<br />

Husain, Mir Zohair, Global Islamic Politics, 2d ed., (New<br />

York: Longman, 2003).<br />

McMichael, Scott R., Stumbling Bear: Soviet Military<br />

Performance in Afghanistan, (London: Brassey’s, 1991).<br />

O’Ballance, Edgar, Afghan Wars: Battles in a Hostile Land,<br />

1839 to the Present, rev. ed., (London: Brassey’s, 2002).<br />

Pape, Robert A., Bombing to Win: <strong>Air</strong> Power and Coercion<br />

in War (Ithaca: Cornell UP, 1996).<br />

Phillips, James A., “Consolidating Victory in Afghanistan,”<br />

Heritage Foundation Reports, 20 February 1990.<br />

Rogers, Tom, The Soviet Withdrawal from Afghanistan, Analysis<br />

and Chronology, (Westport: Greenwood, 1992).<br />

Thomas, Troy S. and Stephen D. Kiser, Lords of the Silk<br />

Road: Violent Non-State Actors in Central Asia (US<br />

<strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>: Institute for National Security Studies,<br />

2002).<br />

Acknowledgements<br />

I would like to thank Major Melton for proofreading a draft<br />

of my paper.<br />

I would also like to thank Dr. Talbot for proofreading a draft<br />

of my paper.<br />

Many of the ideas and concepts incorporated into this paper<br />

were discussed and refined during Major Melton’s<br />

MSS 365, T1 class and I would like to thank all those that<br />

took part in those discussions whose ideas were not<br />

directly cited.<br />

(Endnotes)<br />

1 The idea that there is a difference between brute<br />

force and coercion was discussed in Major Melton’s Military<br />

Strategic Studies 365 class, section T1, on 16 January<br />

2004. The example given for brute force was Rome’s total<br />

destruction of Carthage during the Third Punic War.<br />

2 Robert A. Pape, Bombing to Win: <strong>Air</strong> Power and<br />

Coercion in War (Ithaca: Cornell UP, 1996), 4.<br />

3 Ibid.<br />

4 Ibid., 16.<br />

5 Ibid. 21.<br />

63<br />

6 Ibid., 18-19.<br />

7 Ibid., 19.<br />

8 Ibid., 18.<br />

9 Ibid., 20.<br />

10 These factors were covered on 19 February 2004<br />

while discussing the Byman theory of diplomatic coercion in<br />

Maj Melton’s MSS 365 class, section T1.<br />

11 Troy S. Thomas and Stephen D. Kiser, Lords of<br />

the Silk Road: Violent Non-State Actors in Central Asia (US<br />

<strong>Air</strong> <strong>Force</strong> <strong>Academy</strong>: Institute for National Security Studies,<br />

2002), 73.<br />

12 These five challenges to coercing non-state actors<br />

were discussed on 25 February 2004 in Maj Melton’s MSS<br />

365 class, section T1.<br />

13 Yossef Bodansky and Evgeny Nikitenko,<br />

“Reflections on Afghanistan,” Defense & Foreign Affairs’<br />

Strategic Policy, February 1999, 8.<br />

14 James A. Phillips, “Consolidating Victory in<br />

Afghanistan,” Heritage Foundation Reports, 20 February<br />

1990, 1.<br />

15 Bodansky, 8.<br />

16Mir Zohair Husain, Global Islamic Politics, 2d ed.,<br />

(New York: Longman, 2003), 297.<br />

17 Edgar O’Ballance, Afghan Wars: Battles in a Hostile<br />

Land, 1839 to the Present, rev. ed., (London: Brassey’s, 2002),<br />

viii.<br />

18 Husain, 297.<br />

19 Bodansky, 8.<br />

20 Husain, 297.<br />

21 Ibid, 261.<br />

22 O’Ballance, viii.<br />

23 Husain, 262.<br />

24 O’Ballance, viii.


25 Husain, 262.<br />

26 Anonymous, Through Our Enemies’ Eyes: Osama<br />

bin Laden, Radical Islam, and the Future of America,<br />

(Washington: Brassey’s, 2002), 109.<br />

27 Ibid.<br />

28 Ibid., 111.<br />

29 Ibid.<br />

30 Bodansky, 8.<br />

31 Ibid.<br />

32 Martin Ewans, “America and Afghanistan: A<br />

Troubled History,” World and I, 1 March 2002, 20.<br />

33 Bodansky, 8.<br />

34 Ewans, 20.<br />

35 Ibid.<br />

36 Ibid.<br />

37 Ibid.<br />

38 Bodansky, 8.<br />

39 Ibid.<br />

40 Ibid.<br />

41 Pape, 353.<br />

42 Bodansky, 8.<br />

43 Scott R. McMichael, Stumbling Bear: Soviet<br />

Military Performance in Afghanistan, (London: Brassey’s,<br />

1991), xix.<br />

44 Bodansky, 8.<br />

45 McMichael, 52.<br />

46 Ibid.<br />

47 Bodansky, 8.<br />

48 Bodansky, 8.<br />

49 Ibid.<br />

64<br />

50 Tom Rogers, The Soviet Withdrawal from<br />

Afghanistan, Analysis and Chronology, (Westport:<br />

Greenwood, 1992), 3.<br />

51 Henry S. Bradsher, Afghan Communism and Soviet<br />

Intervention, (Oxford: Oxford UP, 1999), xi-xii.<br />

52 The shortness of the American attention span is illustrated<br />

in questions currently being raised such as “why are<br />

Americans still in Iraq one year after the takeover?” whereas<br />

history tends toshow that it takes many years to secure and<br />

rebuild a country.<br />

53 Bodansky, 8.<br />

54 Ibid.


ETHICS IN WARFARE<br />

By C3C David Schill<br />

“For as long as men and women have talked about<br />

war, they have talked about it in terms of right and wrong”<br />

(Walzer 3). From tribal warfare thousands of years ago, to the<br />

stories of King David defeating Goliath and the Philistines,<br />

and to the trench warfare in the recent World Wars, warriors<br />

have fought and killed each other mercilessly. Is this right?<br />

Should the human race be allowed to take the bare essence of<br />

human life away from another? If so, when is this permissible<br />

and what limitations must be placed upon warfare? In order<br />

for warfare to be considered morally right and even allowable,<br />

all actors involved must fight for the correct justifiable purpose,<br />

and they must fight justly and morally.<br />

As in any discussion about ethics or philosophy, it is<br />

necessary to begin with assumptions that lead to the cohesion<br />

of an argument. To begin, morality needs to have a common<br />

definition. Immanuel Kant provides a definition which has<br />

three propositions. First, an action must be done from duty<br />

in order to have any moral worth. The second follows the<br />

first; that this action is not judged by the outcome of the<br />

action, but on the principle of the action itself. Finally, “Duty<br />

is the necessity of an action done out of respect for the law”<br />

(Kant 12-13). Without further definitions of these propositions,<br />

morality is, in essence, doing the right thing because<br />

the action is right in and of itself and because it follows societal<br />

law. This societal law can be determined to be based on<br />

cultural relativism, specifically the cultural attitude founded<br />

on current day Western society. Keep in mind, as James<br />

Rachels states, that cultural relativism “…says that there is<br />

no such thing as a universal truth in ethics, there are only the<br />

various cultural codes” (Rachels 50). Because of the importance<br />

of morality and ethics in warfare to the Western World<br />

in the twenty-first century, this is the best and most natural<br />

viewpoint to take and understand in the discussion.<br />

Now, in order for warfare to exist and occur between<br />

two nations, there must be a conflict or disagreement of some<br />

sort between the two. There must be a purpose for going to<br />

war. For example, the citizens of Great Britain living in the<br />

Americas during the eighteenth century went to war because<br />

of unfair taxation and representation, as well as a desire to<br />

govern themselves. Hitler went to war in order to destroy<br />

inferior races and gain land for the supreme German race.<br />

What is the difference between the two reasons?<br />

Jus ad bellum, the justice of war, requires the judgment<br />

of the reason or purpose for going to war. It questions<br />

the moral worth of aggression, self-defense, and human integrity<br />

in warfare (Walzer 21). Did Hitler have a just purpose<br />

65<br />

of going to war? Obviously to destroy an inferior race and<br />

conquer land is not a just purpose for going to war. Did the<br />

soon to be American citizens have a just purpose for going to<br />

war? Were they pushed to war with extreme and unfair taxation<br />

and lack of representation, and have to defend themselves<br />

against such treatment?<br />

The principles of jus ad bellum can easily answer<br />

these questions and determine which action of warfare was<br />

moral and which was not. John Locke, in the seventeenth<br />

century, developed these widely used principles. To begin, he<br />

states that governments have the responsibility and the duty<br />

to provide national security to their people. Secondly, the<br />

citizens have the responsibility of supporting wars of national<br />

defense and resisting aggression by foreign states. Lastly,<br />

the citizens also have the right to oppose domestic or international<br />

aggression by their own governments. Just as individual<br />

men have no natural right to commit attack on the life,<br />

liberty, health, and possessions of others, governments have<br />

no right to attack its neighbors lives, liberties, and possessions<br />

(Davidson 130-131).<br />

If no government has the right to attack another<br />

government, then the only just and moral action in warfare<br />

is self-defense. In all wars, one nation is the aggressor, while<br />

the other is the victim of this aggression. The nation then,<br />

who pursues this initial attack, is then acting aggressively in<br />

an unjust manner. The victim nation, by defending itself,<br />

and eventually defeating and punishing the aggressor, is acting<br />

justly. The case of World War Two is obvious, in which the<br />

Axis Powers were the unjust aggressors. However, are the<br />

colonists of Great Britain, who desire their own nation, unjust<br />

because they initiated the attack? Or were they acting in selfdefense<br />

to protect their rights and liberties. This answer is<br />

not as clear cut as the first, and can be argued either way. Its<br />

ambiguity provides evidence of jus ad bellum, or the need to<br />

have justice in determining the purpose of warfare. Just ad<br />

bellum also forces the actors to have a justifiable reason for<br />

being in the war.<br />

“It is perfectly possible for a just war to be fought<br />

unjustly and for an unjust war to be fought in strict accordance<br />

with the rules” (Walzer 21). For example, General<br />

Sherman of the Union Army devastated Atlanta and the<br />

Confederate South in his “March to the Sea.” In all considerations,<br />

the Civil War was just, but he used extremely brutal<br />

and unjust tactics to achieve the end. Likewise, what if a<br />

nation is attacked and fights unjustly. For example, the Royal<br />

<strong>Air</strong> <strong>Force</strong> and the <strong>United</strong> <strong>States</strong> Army <strong>Air</strong> <strong>Force</strong> in Operation<br />

Overlord during World War Two performed civilian morale<br />

raids on Germany. Was the action taken against Hamburg<br />

just? What is the difference between Hitler’s unjust war and<br />

the unjust method used by the Allied forces?


Walzer asks the question, why is it wrong to begin<br />

a war? He answers it with saying, “War is hell” (Walzer 21).<br />

Large numbers of soldiers and citizens die in conflict. For a<br />

given purpose, whether it is territorial gain or in self-defense,<br />

the outcome has to have certain means used to reach the<br />

desired end. These means can also be what makes war wrong;<br />

these means or military tactics and strategy can be considered<br />

evil. How does one achieve victory over an enemy? The easiest<br />

way is for one country to kill all the citizens and soldiers of<br />

the enemy country.<br />

If logic is followed, it is possible and unarguable to<br />

say that killing is always wrong. It also follows that warfare<br />

between nations involves killing. The obvious conclusion<br />

is developed into the idea that warfare is wrong. If this is<br />

believed strictly word for word, then it must be said that all<br />

warfare is wrong. However, these assumptions are not always<br />

true.<br />

Take for example the case of the thousands of little<br />

children who are living with a terminal disease. One boy<br />

living across the country has the genetic material to save the<br />

lives of all these children. However, they can only be saved if<br />

the one boy gives up all his blood for the others, and dies as a<br />

result. Although many arguments from many philosophical<br />

perspectives can be used to consider the case, it is easy and<br />

understandable to say that the one boy should sacrifice his life<br />

in order to save the others. In other words, it is right to kill<br />

the boy in order to save thousands of other lives.<br />

Therefore, the assumption that killing is always<br />

wrong is changed to killing is sometimes wrong. This brings<br />

up the question: in warfare, when is killing permitted and<br />

when is it not?<br />

Jus in bella, or justice in war, really brings about “…observance<br />

or violation of the customary and positive rules of<br />

engagement” (Walzer 21). These rules of engagement are<br />

fairly complex, and at times they are also extremely clear.<br />

The action of attacking noncombatants and those considered<br />

innocent has moral connections to it. Also, the mere act of<br />

killing another human in warfare has severe consequences<br />

mentally and can play a huge part in the moral world.<br />

In past battles, many individuals and their decisions<br />

can be observed and stacked against morality. For instance,<br />

how moral is Douhet’s theory which centers on national<br />

morale decadence through civilian bombing? The whole<br />

treatment of prisoners of war has its roots in morality. In<br />

addition, think of General Sherman’s tactics during the Civil<br />

War and the used of the atomic bomb against Japan.<br />

During 1864 in the American Civil War, the Northern<br />

morale was at an all time low. Many Northerners were<br />

extremely upset at the duration of the war, and they were<br />

especially upset with their army’s performance and lack of<br />

66<br />

success in the war. “Many Northerners began to feel that<br />

perhaps the only way to end the war lay in a negotiated,<br />

compromised peace” (Doughty and Gruber 436). Because<br />

of this, Lincoln felt quite unsure about the upcoming election<br />

of 1864, for many voters might choose a candidate who<br />

does not support the war or a strong, centralized government.<br />

However, Major General William Tecumseh Sherman, one of<br />

the most trusted Union generals during the war, became the<br />

chief maker of increased morale and increased optimism in<br />

the North.<br />

General Sherman was in Northern Georgia during<br />

the summer of 1864, and his first goal was to destroy the city<br />

of Atlanta. After two months of evasion and preparation,<br />

the battles for Atlanta began. Sherman formed a quasi-siege<br />

on the city, and began lobbing artillery shells against the city,<br />

aimed at anything and everything. Eventually, General Hood,<br />

the Confederate commander, and his troops became overwhelmed.<br />

With supplies dwindling, the city burning, and<br />

after failed attempts to counterattack, Hood withdrew from<br />

Atlanta. Sherman then ordered a complete evacuation of the<br />

civilian population of Atlanta. When the mayor of Atlanta<br />

protested to the inhumanity of this action, Sherman replied,<br />

“My orders are not designed to meet the humanities of the<br />

case but to prepare for the future struggles … War is cruelty,<br />

and you cannot refine it … You might as well appeal against<br />

the thunder storm as against these terrible hardships of war”<br />

(Doughy and Gruber 443). It would take the city of Atlanta<br />

nearly one hundred years to fully restore and fix the aftereffects<br />

of the damage done by Sherman in the summer of<br />

1864. Sherman’s victory did, on the other hand, provide an<br />

enormous boost in Union morale (Doughty and Gruber 441).<br />

After finishing off Atlanta, General Sherman realized<br />

the impact that Southern raids were having on his supplies.<br />

Something had to be done, and in a letter to Ulysses Grant,<br />

he proposed the famous “March to the Sea,” in which he<br />

would seek the Confederate General Hood’s army. He concluded<br />

this letter with the quote, “I can make the march, and<br />

make Georgia howl” (Doughy and Gruber 444). On November<br />

15, the Union army advanced and carved out a sixty-mile<br />

wide path of destruction. One of Sherman’s men wrote home<br />

to his family about the march, and this is what he said. “We<br />

had a gay old campaign … Destroyed all we could not eat,<br />

stole their niggers [sic], burned their cotton and gins, spilled<br />

their sorghum, burned and twisted their R. Roads and raised<br />

Hell generally” (Doughy and Gruber 444). These marches<br />

traveled through Savanna, Georgia, and eventually lead all the<br />

way through the Carolinas in equal and greater destruction.<br />

They ruined Southern morale by not only destroying what<br />

aided the army directly, but also by demolishing anything in<br />

their path. Sherman’s march exemplified the concept of total


war perfectly.<br />

Besides utterly devastating the morale of the South,<br />

it has been argued that this action took the fight out of the<br />

Confederate states and directly lead to the surrender at Appomattox<br />

Court House. This can be considered quite a successful<br />

plan by the Northerners. However, although successful,<br />

the lack of morality is obviously a topic for discussion. Not<br />

only did the march affect thousands of noncombatants, these<br />

noncombatants were the actual target. Up to this point, warfare<br />

had rarely seen attacks on those not involved in the war,<br />

especially to this magnitude. It is even possible to compare<br />

Sherman’s slaughter of the innocents to the slaughter of the<br />

innocents by the Nazis in World War Two.<br />

On the other hand, some might argue, didn’t the<br />

positive outcome of the march, namely victory in war, far<br />

outweigh the negative method in which it was carried out?<br />

The proponents of this approach assume that the greatest<br />

good was to win the way, no matter what means, strategies,<br />

and tactics were used. The contradicting side would say that<br />

this is entirely unjust, that all means leading to the outcome<br />

must indeed be moral and just. Whichever side is taken, this<br />

example proves the necessity of ethics in warfare.<br />

Likewise, the Italian, Giulio Douhet, who continues<br />

to have a far reaching impact on the strategy and development<br />

of airpower, had a similar viewpoint to that of Sherman.<br />

“The linkage between civilian morale and ending a conflict<br />

was the key to Douhet’s theory of airpower” (Chun 28). In<br />

all certainty, Douhet would have supported Sherman’s tactics<br />

in the Civil War. Whereas Sherman would destroy everything<br />

with his army, Douhet would destroy everything with airpower.<br />

Douhet’s main purpose was strategic bombardment.<br />

Besides advocating a war against civilians to break the will to<br />

fight, Douhet also promoted the use of poison gas and incendiary<br />

weapons. When discussing Guilio Douhet, how many<br />

people talk about the ethics of his theories and not just the<br />

theories themselves? Imagine if every war followed Douhet’s<br />

theory of strategic bombardment of civilian populations; warfare<br />

would be entirely different. Primary targets of oil refineries<br />

and military headquarters would be changed to apartment<br />

complexes and shopping malls. This would lead to the complete<br />

lack of ethics in warfare.<br />

One subject that continues to create an enormous<br />

amount of debate is the use of nuclear weapons. The atomic<br />

bomb was created and developed during the end of the<br />

Second World War. During the attacks on Hiroshima and<br />

Nagasaki, the unit charged with delivering the bomb was<br />

Col. Paul Tibbetts’ 509 th Bombardment Group. The airmen<br />

were well aware of their mission and the destructive power of<br />

the atom bomb, and “there was some sentiment among the<br />

airmen that the nuclear weapons ought not to be used” (Mets<br />

67<br />

302). Even those involved in the war itself need to have<br />

vision of the morality of their actions.<br />

Twenty years later, the American forces were in Vietnam<br />

fighting a new type of warfare.<br />

Besides obvious cases of unethical attacks, such as Mei Lai,<br />

there are also cases where ethical decisions and situations are<br />

totally ambiguous. A soldier, upon receiving fire on a routine<br />

walk through a village, immediately turned to the direction of<br />

the attack and replied with a couple rounds from his M-16.<br />

He killed the assailant, and upon further inspection, what he<br />

saw was extremely disturbing. On the ground lay a twelve<br />

year old girl, her blood pooling beneath her as she still held<br />

tight to the smoking rifle.<br />

When is it ever ethical to kill a twelve year old girl?<br />

Never? When she is attempting to take your life? Imagine<br />

the soldier, who one day has to return home to his own<br />

family, and his own daughter, and then will have to realize the<br />

terrible nature of his actions. Was the soldier acting unethically<br />

by returning fire on a child, or was the child unethical<br />

for picking up that rifle? “Public opinion tends to focus<br />

on the concrete reality of war and on the moral meaning of<br />

killing and being killed” (Walzer 64). However, there are<br />

numerous cases where the concrete reality of war and killing<br />

crumbles to obscure ash.<br />

If there is one overlaying moral principle, which<br />

stands above all others, it would be that taking the life of<br />

another human is absolutely immoral. Any domestic action<br />

which results in the deliberate elimination of the life of<br />

another is always punished. Warfare, conversely, allows situations<br />

in which this deliberate elimination of life is permitted.<br />

Because of this, it is absolutely necessary to define these situations,<br />

and they are defined on the basis of ethics.<br />

It is important to note that this paper does not decide<br />

on whether the examples of warfare are or are not just. Many<br />

differing perspectives and theories can be used in order to<br />

accomplish that task. A situation can be considered ethical<br />

or unethical depending on the reasoning of the individual.<br />

This paper does, however, reflect on the importance of having<br />

ethics in warfare, and also emphasizes why individuals in<br />

warfare need to act justly and morally. Walzer sums up the<br />

proposition of ethics in warfare properly when he says, “Until<br />

wars are really fought with pawns, inanimate objects, and not<br />

human beings, warfare cannot be isolated from moral life”<br />

(Walzer 64).


Bibliography<br />

Chun, Clayton K.S. <strong>Air</strong> and Space Power for the Twenty-<br />

First Century. Carlisle Barracks,<br />

Pennsylvania: Houghton Mifflin Custom Publishing,<br />

2002.<br />

Davidson, Donald. “The Development of the Just War Tradition.”<br />

Moral Dimensions of the<br />

Military Profession. Ed. Martha Wagner. Cincinnati,<br />

Ohio: Thomson Learning Custom Publishing,<br />

2001. 125-133.<br />

Doughty, Robert A. and Gruber, Ira D. Warfare in the Western<br />

World. Ed. Martin Lew.<br />

Boston, MA: Houghton Mifflin Custom Publishing,<br />

2001.<br />

Kant, Immanuel. Grounding for the Metaphysics of Morals.<br />

3 rd Ed. Indianapolis, Indiana:<br />

Hackett Publishing Company, Inc., 1993.<br />

Mets, David R. Master of <strong>Air</strong>power: General Carl A. Spaatz.<br />

Novato, CA: Presidio Press, 1988.<br />

Rachels, James. “The Challenge of Cultural Relativism.”<br />

Moral Dimensions of the Military<br />

Profession. Ed. Martha Wagner. Cincinnati, Ohio:<br />

Thomson Learning Custom Publishing, 2001. 49-<br />

54.<br />

Walzer, Michael. Just and Unjust Wars. Basic Books: New<br />

York, 2000.<br />

68<br />

AIR CONTROL:<br />

THE FALLACY OF COERCIVE AIR STRATEGY<br />

IN BRITISH COLONIAL ADMINISTRATION,<br />

1919-1924<br />

C1C COLBY SULLINS<br />

<strong>Air</strong>power is not the silver bullet that will cheaply<br />

and effectively win a war, even a very limited one; early airpower<br />

theorists formulated this idea of airpower as a fast<br />

and efficient panacea and propagated it throughout their<br />

governments, erroneously touting the economy and effectiveness<br />

of the British concept of “air control” used to police her<br />

Middle Eastern colonies after World War I. <strong>Air</strong> control was<br />

not, however, effective in every case, and those cases in which<br />

it was effective were due primarily to causes other than the<br />

effects of the bombs that were dropped. Making strategic<br />

policy decisions based on a flawed and incomplete theory of<br />

airpower coercion is therefore dangerous, and may very well<br />

result in a prolonged escalation of involvement in a conflict<br />

originally planned to be quick and decisive. Thus it is necessary<br />

to determine the true causes for any successes enjoyed by<br />

the Royal <strong>Air</strong> <strong>Force</strong> in its campaigns of air control in order to<br />

obtain a more reliable framework for making good coercive<br />

policy decisions.<br />

PART I<br />

INTRODUCTION TO COERCION<br />

Carl von Clausewitz said, “War is an extension of<br />

politics by other means 1 .” This means that military action<br />

is but one of several tools that states may use to realize their<br />

national strategic policies. The first of these tools is diplomatic,<br />

the second is economic. The former is the most preferable,<br />

discussing a conflict in an open forum in order to seek<br />

a resolution that is mutually beneficial to both parties; the<br />

latter requires a greater level of commitment, so before it can<br />

be undertaken more consideration must be made regarding<br />

the desired outcome. The economic tool uses a carrot-andstick<br />

approach to conflict-resolution in which cooperation<br />

is rewarded with favorable trade relations and opposition<br />

is punished with unfavorable relations or even embargoes.<br />

The third and most intensive policy tool is the military tool.<br />

This involves the use of carefully applied violence to force<br />

an adversary’s cooperation, either through coercion or the<br />

exhaustion of the adversary’s defensive means. Of the three<br />

policy tools, the military tool is the riskiest, most destructive,<br />

and the hardest to resolve in the long-term sense. For these<br />

reasons, it should be used as a last resort—yet it is all too<br />

often one of the first tools used to impose the will of one government<br />

upon another.


The political nature of war is essential to defining<br />

violent conflict; war is not an end unto itself but a means by<br />

which governments might attain some other end. Clausewitz<br />

outlined the nature of war by likening it to a triad comprised<br />

equally of three conflicting elements: the Government, the<br />

People, and the Military, with war itself being the interaction<br />

between the elements 2 . The Government represents control,<br />

restraint; the People represents passion, mania, and loss of<br />

control; the Military represents uncertainty, the fog of war,<br />

the role of fate. These three interact, determining the nature<br />

of the constantly evolving conflict.<br />

The nature of war is fluid, constantly ebbing and flowing<br />

between the three elements with varying degrees of intensity<br />

based on the predominant element in the conflict. The<br />

People element is ruled by emotion, passion, and ideology 3 .<br />

It is the most basic and human of the three elements. Raw<br />

passion blends seamlessly into hatred, hatred into cruelty, and<br />

cruelty into brutality, terrorism, or worse. The People element<br />

constantly tends to bring a conflict closer to the essential<br />

nature of war: absolute, horrific violence 4 . Fortunately,<br />

the other two elements are able to hold the People in check<br />

and keep conflict more limited. The Military element might<br />

also be called Fate 5 . Clausewitz called this the fog of war,<br />

the confusion and uncertainty that guarantees that there can<br />

be no guarantees. This entropy can dash a well thought out<br />

strategy to pieces within days, hours, or even minutes after<br />

a conflict begins. The confusion also serves to mitigate the<br />

violence of human emotion on the battlefield. Fate serves<br />

to limit the violence of the conflict, yet also makes it more<br />

difficult to control forces and predict the outcome of the<br />

conflict. The Government element is directed at control 6 . It<br />

therefore tends to limit conflict, to keep the action at a lesser,<br />

more manageable level. The more limited a conflict, the less<br />

emotion is involved and the easier it is to prevent the conflict<br />

from escalating unnecessarily. This allows the conflict to be<br />

resolved with minimal cost in treasure and life. That is the<br />

principle aim of coercion: accomplish national strategic goals<br />

using the minimum force, resources, and treasure necessary.<br />

There are two predominant theories governing the<br />

application of force to affect strategic policy. The first, suggested<br />

by Clausewitz, is called exhaustion 7 . It might also be<br />

called annihilation, because it demands the absolute destruction<br />

of the adversary’s defensive ability. The adversary, left<br />

defenseless, will have no other recourse than to acquiesce.<br />

Cooperation is thereby achieved and the conflict resolved.<br />

Annihilation strikes at the ability of the adversary to resist.<br />

This traditional method of conflict is very effective but tends<br />

to be costly and time-consuming, and therefore is not very<br />

efficient. The other theory, coercion, is designed to be much<br />

faster and less costly. Coercion is a calculated process of hard-<br />

69<br />

hitting, precise attacks engineered to convince an adversary<br />

that the costs of continuing non-cooperation greatly exceed<br />

any benefits, thereby inducing the adversary to choose the<br />

less-costly option, cooperation. Coercion strikes at the will of<br />

the adversary to resist.<br />

Robert Pape, in his book Bombing to Win: <strong>Air</strong><br />

Power and Coercion in War, outlines three basic strategies to<br />

coerce an adversary. The first, punishment, strikes at the will<br />

of the adversary by placing the adversary’s people in peril 8 .<br />

The society itself is threatened with attack, siege, annihilation—any<br />

means available that might frighten the people<br />

into begging their leaders to end the conflict, thereby inducing<br />

the adversary’s cooperation. The second strategy is called<br />

risk strategy and aims at the will of the adversary by gradually<br />

escalating the level of conflict in increments 9 . First, the threat<br />

of escalation is made. Then, the level of conflict is increased<br />

and the threat of further escalation is made. This goes on<br />

until the adversary can no longer support further escalation<br />

and chooses to acquiesce. The third strategy is called denial.<br />

Denial strikes at the will of the adversary by attacking the<br />

adversary’s military capability 10 . Denial differs from Clausewitzian<br />

annihilation of the adversary’s forces because its aim<br />

is not to completely disarm the adversary. On the contrary,<br />

the more soldiers and materiel the adversary retains at the end<br />

of the conflict, the more effective the denial strategy. Denial<br />

seeks to induce the cooperation of the adversary by demonstrating<br />

that the adversary’s military is no longer capable of<br />

making a viable defense. Denial attacks the adversary’s military<br />

strategy.<br />

Enter the latest medium in which force is brought to<br />

bear on an adversary: the air. Since the First World War, airpower<br />

has offered many advantages over traditional groundbased<br />

operations. <strong>Air</strong> operations are inherently offensive in<br />

nature—they take the fight to the adversary and keep the<br />

war away from the people at home. <strong>Air</strong> operations are by<br />

nature faster than ground operations, and provide the ability<br />

to attack, with surprise, virtually anywhere on the battlefield,<br />

beyond the front lines, and even into the very heart of the<br />

adversary’s capital. <strong>Air</strong>power is extremely flexible, which<br />

means that it may be used in a wide variety of situations to<br />

engage any number of different types of targets. Fewer lives<br />

are put at risk in air operations than in ground operations.<br />

<strong>Air</strong>power is tailor-made to inflict fast, precision damage with<br />

great cost to the adversary at comparatively low cost. All of<br />

this makes airpower extremely attractive in undertaking a<br />

coercive strategy.<br />

If airpower is used as the means of applying force, all<br />

of Pape’s coercive strategies simply become coercive air strategies<br />

11 . A punishment air strategy inflicts maximum force on<br />

the civilian population, pushing their endurance to the break-


ing point. A risk air strategy attacks military and civilian targets<br />

on a very limited scale at first, but incrementally increases<br />

in intensity until the adversary must submit. A denial air<br />

strategy is achieved by three distinct methods: direct support<br />

to ground forces, strategic interdiction, and operational<br />

interdiction 12 . The first of these, direct support, is essentially<br />

close air support and is most effective in conflicts where the<br />

battle lines are static as in World War I or the Korean War.<br />

The second method, strategic interdiction, is meant to slowly<br />

and systematically destroy the critical components of an<br />

adversary’s industrial base and sever the production of war<br />

materiel. The third method is operational interdiction. This<br />

aims to cut off logistical support to the adversary’s operational<br />

forces and is most effective in fluid-front conflicts where the<br />

two combatant forces require a great deal of consumables in<br />

order to fight, such as fuel and ammunition. When using<br />

airpower to achieve coercion, Pape argues that another strategy<br />

is possible that could not be used otherwise: a strategy of<br />

decapitation 13 . This calls for two possible options in targeting.<br />

The most common coincides with a theory proposed by<br />

John Warden in which the primary series of targets should<br />

be designed to separate commanders from their troops in the<br />

field, sowing confusion and rendering an adversary’s military<br />

forces ineffective 14 . The other, less common option calls for<br />

a deliberate attack against the leader of the adversarial state in<br />

the hope that any successor will be more willing to cooperate.<br />

All of the coercive strategies of Robert Pape have one<br />

thing in common: coercion is a military option, and the use<br />

of force in coercion is a forgone conclusion. The success or<br />

failure of coercive policies depends solely on the political wills<br />

and military abilities of the two primary adversaries in the<br />

conflict.<br />

Daniel Byman, with the help of Matthew Waxman<br />

and Eric Larson, argues a somewhat more dynamic theory<br />

of coercion than that of Robert Pape in the book <strong>Air</strong>power<br />

as a Coercive Instrument. Coercion is no longer regarded<br />

as just a simple cost/benefit analysis, but something a little<br />

more complicated. It is not a yes/no proposition, it does not<br />

have a certain start or stop time, there is no real success or<br />

failure and both sides may get all, some, or none of what they<br />

desired initially, and political and economic factors become<br />

real considerations in formulating a coercive strategy 15 .<br />

Coercion, according to Byman, is not simply a manner by<br />

which to employ military force. Coercion is the use of the<br />

threat of force, possibly backed by actual force and combined<br />

with political and economic means, to induce the adversary<br />

to change some behavior. There are two types of coercion.<br />

Compellance coercion seeks to persuade an adversary to cease<br />

a behavior, and deterrence coercion seeks to ensure that an<br />

adversary does not begin an undesirable behavior 16 . Deter-<br />

70<br />

rence, in turn, has two distinct types: general, or long-term,<br />

deterrence aims to prevent an action whether it is planned by<br />

an adversary or not, and immediate deterrence that seeks to<br />

prevent an imminent, planned action 17 .<br />

Byman’s concept of coercion has many factors which<br />

determine how successful coercion will be. The first is escalation<br />

dominance 18 . In a conflict, the party with the ability to<br />

control the escalation of the conflict will win. This ability to<br />

control the level of intensity of a conflict depends on credibility,<br />

pressure, capacity, and will. It is vital an adversary believes<br />

that any threats will be carried out. Pressure must be maintained<br />

so that the adversary does not have the ability to counter<br />

any escalation in intensity. The capacity to follow through<br />

with any escalation, the military ability to make good on any<br />

threatened escalation, is every bit as important to deciding<br />

the level of escalation as the political will to see it through.<br />

Escalation dominance as a factor of coercion resembles Pape’s<br />

theory of a risk strategy; however, escalation according to<br />

Byman does not necessarily mean increasing pressure on civilians.<br />

Rather, coercion is the sum product of several different<br />

factors in which the will of the populace—the populace of the<br />

coercer as well as that of the adversary—is only a small factor,<br />

the domestic factor. The military abilities of the two parties<br />

are also only a factor. Additional factors include, but are<br />

not limited to, coalitions or alliances, non-state actors, economic<br />

factors, over-arching strategic goals, religious or social<br />

mores, international media coverage, even weather, climate,<br />

or season. All of these play a role in the ability of one state to<br />

coerce another. The challenge, then, is to determine to what<br />

extent each of the many variables will affect the adversary’s<br />

decision to continue opposition and manipulate the factors in<br />

order to attain the most favorable position possible. It is also<br />

important to remember that, according to Byman, the coercer<br />

may very well end the conflict in a worse position than that<br />

when the conflict started.<br />

One might sum up the definition of coercion by say<br />

that it is the threat of force, as well as the actual use of force,<br />

used in conjunction with political and economic actions,<br />

meant to induce an adversary into cooperation. It does this<br />

by persuading that adversary to refrain from beginning some<br />

undesired behavior or ending an undesired behavior that is<br />

currently being done by the adversary. <strong>Air</strong>power coercion,<br />

then, might be said to be the use of airpower, by means of<br />

punishment, risk, decapitation, or denial strategies, to coerce<br />

an adversary using weaponry and shock value. It is essential<br />

to take into careful consideration the many variables affecting<br />

the particular strategic situation and attempt to exploit them<br />

to some advantage against the adversary. <strong>Air</strong>power is the most<br />

cost-effective means, in terms of lives, time, and treasure, of<br />

ensuring escalation dominance, the key to coercion.


Why is coercion important, however? Wars are<br />

slow and brutal. Wars require men and materiel, both of<br />

which will be lost. Wars require commitment on the part of<br />

the political leadership and the national will to support the<br />

leadership’s decisions. Most importantly of all, wars require<br />

time. With time, all of the aforementioned components dissipate<br />

away towards nothing—men are lost, there exists only<br />

so much materiel, the national will can easily turn against<br />

the war, and, most importantly to democratic societies, if the<br />

will of the people is lost the political leadership can quickly<br />

change. Time, in war, is the enemy of all. Coercion seeks to<br />

deprive time of its power by making conflict fast and costeffective<br />

in terms of both men and materiel. The sheer speed<br />

of coercion, combined with its economy, ensures that national<br />

will and thus political commitment will last the duration<br />

of the conflict. Coercion strategies, properly undertaken,<br />

thereby increase the odds that a conflict will end in success for<br />

the government that elects to use military force as the means<br />

by which to attain its strategic aims.<br />

PART II<br />

SETTING THE STAGE: BRITAIN AT THE END OF<br />

THE FIRST WORLD WAR<br />

During the First World War, over ten million young men<br />

from around the world lost their lives from the skies over<br />

Great Britain to the mountains of northern Italy, from the<br />

western borders of Russia to the Hellespont, and south into<br />

the deserts of Palestine and Mesopotamia and everything in<br />

between 19 . The prolonged war of attrition consumed the<br />

economies of Europe for four years, leaving a shattered wreck<br />

of the prosperity that had been before the war. In 1918, the<br />

world was further wracked by a plague of influenza that killed<br />

over twenty-one million people in a matter of months 20 . In<br />

Russia, a revolution was underway in the name of a political<br />

ideology called communism, and the class-based strife threatened<br />

to erupt spontaneously throughout Europe. German<br />

soldiers returned home to find their country on the very brink<br />

of civil war, their country’s economy in ruins, and their prospects<br />

for the future grim indeed. France found itself rebuilding<br />

hundreds of miles of utterly blasted countryside while<br />

dealing with an army of hundreds of thousands of former<br />

conscripts flooding a job market that simply was no longer<br />

there. Great Britain also struggled to find itself anew, demobilizing<br />

its vast forces, restructuring its economy, and trying<br />

to find a balance of power between the radically differing<br />

political parties struggling for control.<br />

Great Britain’s situation, however, was somewhat more<br />

delicate even still. After the defeat of the Turks and the dissolution<br />

of the Ottoman Empire, Great Britain found itself with<br />

a mandate to manage colonial holdings that almost doubled<br />

the size of the Empire before the war 21 . The power struggle<br />

71<br />

within Parliament rose ever-higher in pitch and intensity, and<br />

the battle lines between the Labour Party and the conservatives<br />

were drawn along the issue of military spending 22 . Britain<br />

emerged from World War I with almost twice the area to<br />

control as before, but with less than half the military budget<br />

and many fewer troops. The Empire, its money, and its forces<br />

were all spread dangerously thin.<br />

During the war, Great Britain had managed to<br />

develop a separate air arm, the Royal <strong>Air</strong> <strong>Force</strong>. Early on,<br />

the Ministry of Armaments decided that command and control<br />

of air assets could best be obtained by way of a separate<br />

command structure working in close concert with the Army<br />

and the Navy. The first real commander of the air service<br />

was General Jan Smuts, a South African who realized that<br />

airpower had the potential to be much more than simply a<br />

weapon to augment the power of the Army and the Navy.<br />

Working closely with then-Prime Minister David Lloyd<br />

George, the two created an <strong>Air</strong> Ministry and laid the foundation<br />

for the Royal Flying Corps 23 . The second commander<br />

was General Hugh Trenchard. He picked up the reigns where<br />

Smuts left off—creating a functional organizational structure<br />

based on centralized command and decentralized execution<br />

in which air support for the ground forces in France would be<br />

coordinated at higher staff levels and the orders would trickle<br />

down to the individual squadron level to be carried out 24 .<br />

Trenchard left his position in command of the air service in<br />

France in early 1918 and became the Chief of the <strong>Air</strong> Staff.<br />

Trenchard’s successor, General John Salmond, took up control<br />

of the air service in France when the Royal Flying Corps<br />

and the Royal Naval <strong>Air</strong> Service became one entity, the Royal<br />

<strong>Air</strong> <strong>Force</strong>, in April of 1918. Salmond focused on directing<br />

the RAF into an offensive arm, striking back at Germany in<br />

reprisal for attacks on London and focusing heavily on providing<br />

air support for ground offensives 25 . Salmond’s brother,<br />

General Geoffrey Salmond, commanded the air forces in the<br />

Middle East, and played a pivotal role in the development of<br />

the unique concepts of air support that would later be used by<br />

Trenchard to formulate his theory of <strong>Air</strong> Control.<br />

After the war, the Ministry of Armaments was dismantled<br />

and the purging of the defense budget began. At the<br />

end of the war, the RAF consisted of 30,000 officers, 263,410<br />

enlisted members, 23,000 aircraft, 401 aerodromes in Great<br />

Britain and 274 overseas, and a total of 185 operational<br />

squadrons 26 . Prime Minister Lloyd George found himself<br />

dealing with civil war in Ireland, an uneasy and suspicious<br />

relationship with Britain’s former ally France, and greatlyincreased<br />

expanse of colonial territory that was as peaceful<br />

now as it had been during the war, all while trying to reduce<br />

military spending and appease the rumblings of the War<br />

Office, the Admiralty, and the Labour Party. The Royal <strong>Air</strong>


<strong>Force</strong> found itself in a fight for survival.<br />

PART III<br />

GENERAL HUGH TRENCHARD<br />

Fortunately for the Royal <strong>Air</strong> <strong>Force</strong>, Winston<br />

Churchill was named <strong>Air</strong> Minister—a political hot potato at<br />

the time—as the price for also being given the War Office. 27<br />

Churchill asked Trenchard to come back as the Chief of the<br />

<strong>Air</strong> Staff after he had resigned due to a dispute with a former<br />

<strong>Air</strong> Minister. Trenchard agreed, and immediately went about<br />

saving the Royal <strong>Air</strong> <strong>Force</strong> from the Army, the Navy, and the<br />

Parliament.<br />

Trenchard’s solution was twofold: create a peacetime<br />

mission for the RAF that could not be accomplished by the<br />

Army or by the Navy, and establish a strong, well-trained<br />

cadre of officers, pilots, and maintenance personnel while<br />

focusing on research and development into better aircraft<br />

technology. This small, highly-trained core of experienced<br />

personnel could weather the storm of post-war cutbacks in<br />

the greatly reduced Royal <strong>Air</strong> <strong>Force</strong>, but could immediately<br />

train a larger force to use the new and improved weapons systems<br />

once the money was available to fund it all 28 .<br />

General Trenchard is known best to historians for<br />

his role in the formation of the independent RAF, and for his<br />

theories regarding the role of strategic bombing. Trenchard<br />

was himself a devoted believer in the absolute necessity of<br />

close concert between air and ground forces. However, in<br />

1918 and 1919 he found himself in the unique position of<br />

defending the very survival of the air force he had worked so<br />

hard to build. It is not surprising that he began to report to<br />

Parliament that strategic air power could be utilized in some<br />

future conflict as a means of shortening the war and limiting<br />

its costs. However, strategic bombing alone would not have<br />

saved the Royal <strong>Air</strong> <strong>Force</strong> from being delivered piecemeal<br />

back into the eager control of the Army and Navy—after all,<br />

following the First World War, it did not appear to Parliament<br />

that there were any more great wars to fight 29 . France was the<br />

closest thing to an adversary, and it seemed unlikely that there<br />

would be any great conflict for another twenty years. There<br />

was therefore no immediate need for strategic bombers.<br />

However, there was an urgent need to pacify the vast<br />

Empire-Commonwealth. During the war, Great Britain’s<br />

entire attention had been devoted to fighting Germany and<br />

the Ottoman Turks in the many different theaters of the<br />

war. In the meantime, renegades and rebellions rose up and<br />

began challenging Great Britain’s authority around the world.<br />

Estimates made by the Army put the costs of pacifying the<br />

smallest of these rebellions, in Somaliland, at two divisions<br />

of regular troops and an entire railway system constructed to<br />

move them around 30 . Trenchard saw in this an opportunity<br />

72<br />

to forge a real, tangible mission for the Royal <strong>Air</strong> <strong>Force</strong> that<br />

would keep it alive: air control.<br />

The essence of air control was an extremely mobile,<br />

highly flexible force comprised of flying squadrons and levies<br />

of local and colonial troops. The flying squadrons would provide<br />

for their own base defense, and would also be equipped<br />

with an equal number of armoured cars as aircraft 31 . This<br />

would give the squadrons equal hitting power on the ground<br />

and from the air. Combined with battalions of low-cost colonial<br />

conscripts to provide the bulk of the ground forces and<br />

to augment aerodrome defense, each squadron could offer the<br />

fighting power of an entire division at a small fraction of the<br />

cost. Furthermore, the inherent advantages of airpower—<br />

speed, flexibility, offense, and surprise—would be present at<br />

no extra charge. Army divisions would need such air support,<br />

anyway.<br />

It is interesting to note that Trenchard’s plan for <strong>Air</strong><br />

Control at first glance refers only to air power, but after closer<br />

examination is heavily reliant upon ground forces. This is in<br />

contrast to the popularly held belief that Trenchard advocated<br />

an airpower-only approach to conflict 32 . Perhaps one of the<br />

major reasons why the role of ground forces used in Great<br />

Britain’s campaigns of <strong>Air</strong> Control was understated by those<br />

praising the colonial victories was the political significance of<br />

the Royal <strong>Air</strong> <strong>Force</strong>’s successes. Churchill was <strong>Air</strong> Minister,<br />

and in 1921 he left the War Office to become head of the<br />

Colonial Office 33 . Any successes the RAF had in administering<br />

the colonies, especially by itself with minimal help from<br />

the Army, reflected all the brighter upon Winston Churchill.<br />

Regardless, <strong>Air</strong> Control was effective for the sum of<br />

its parts, the aircraft, the armoured car detachments, and the<br />

battalions of local levied troops that provided the anvil for the<br />

hammer of the two more mobile elements. Not long after<br />

Trenchard began building his <strong>Air</strong> Control squadrons, Great<br />

Britain had its first opportunity to try airpower as a means<br />

of defending its colonial power. The Third Afghan War had<br />

begun.<br />

PART IV<br />

AFGHANISTAN<br />

The abdication of the Tsar of Russia in 1917 and the<br />

ensuing revolution inspired the hereditary ruler of Afghanistan,<br />

the Amir Ammanullah, to seize power in 1918 and<br />

renounce all treaty obligations that Afghanistan had made<br />

with Great Britain following the Second Afghan War in<br />

1880 34 . The Amir believed that, after four long years of terrible<br />

and bloody war, Great Britain would not be willing to<br />

put up any real defense. The time was ripe for an invasion of<br />

northern India.<br />

The Amir began his invasion of India with over


50,000 regular troops. The army of Afghanistan was small,<br />

but Ammanullah relied on the might of his irregular forces,<br />

the warrior tribesman that comprised over sixty percent of<br />

Afghanistan’s population, to swell the ranks to match the<br />

combined British and Indian force of 150,000 troops 35 . The<br />

war initially went very well for the Amir. His forces smashed<br />

through British outposts along the border and captured<br />

strong positions in rough terrain that could be held by the<br />

resourceful Afghan troops indefinitely. The Afghans advanced<br />

relentlessly the first week of the war until they finally met the<br />

main British and Indian force 36 . The war bogged down into a<br />

stalemate, the two sides battering each other mercilessly.<br />

Enter the Royal <strong>Air</strong> <strong>Force</strong>. Though there were only<br />

two operational squadrons in India at the time, aircraft from<br />

both joined the conflict. They provided air support for troops<br />

engaged in mountain-fighting, reconnaissance and intelligence<br />

for commanders with no accurate maps of the region,<br />

and even ferried supplies to troops surrounded in isolated<br />

mountaintop defensive positions 37 . The Royal <strong>Air</strong> <strong>Force</strong><br />

even attempted limited strategic bombing. One raid, against<br />

the major Afghan city of Jalalabad, managed to set aflame<br />

the entire military quarter of the city while the garrison was<br />

conducting a parade for visiting tribesmen 38 . The tribesmen,<br />

numbering in the thousands, became uncontrollable in<br />

the ensuing confusion and looted the city. This might have<br />

served to convince the Amir that his tribesmen were not reliable<br />

and their allegiance was beginning to fade, but he probably<br />

already knew that prior to the bombing raid. The other<br />

major raid was conducted against the capital of Afghanistan,<br />

Kabul. British pilots dropped several bombs on the city, with<br />

four of them striking the grounds of the Amir’s Palace, and<br />

one of actually causing damage to the roof 39 . Soon after the<br />

bombing of Kabul, the Amir began negotiating an end to<br />

hostilities.<br />

Within four weeks of the invasion of India, around<br />

the same time as the raids on Kabul and Jalalabad, the British<br />

and Indian forces had regained nearly all of the territory<br />

lost in the first week of the war 40 . The combined force, with<br />

340,000 troops, was poised to invade Afghanistan when<br />

a peace settlement was agreed upon and the war ended.<br />

Afghanistan had achieved independence from the last remaining<br />

vestiges of British control left over from the Second<br />

Afghan War, while Great Britain had gained a little territory<br />

from Afghanistan. At only four weeks long, the Third Afghan<br />

War was the bloodiest and most arduous in Britain’s history of<br />

colonial warfare 41 .<br />

British airpower enthusiasts at the time pointed to<br />

the critical role the two operational RAF squadrons played<br />

in shortening the war. They cited the air support operations<br />

conducted to help the situation on the ground, the vital<br />

73<br />

importance of aerial reconnaissance, and the impact of the<br />

strategic bombing raids in coercing Amir Ammanullah to agree<br />

to a peace settlement 42 .<br />

Coercion strategies achieved by means of strategic<br />

bombing raids? Contemporary theories on strategic bombing<br />

were based upon what Pape would call, at their most discriminative,<br />

strategic interdiction and, by far the most popular,<br />

punishment strategies. In terms of coercive airpower, the<br />

RAF conducted operations in keeping with the great theories<br />

of the age. The bombing raids on Kabul and Jalalabad were<br />

meant to inflict damage on the population, thereby destroying<br />

their will to support the war in a classic punishment<br />

strategy. Strikes were made against the war-production capacity<br />

of Afghanistan, trying to eliminate the munitions factory<br />

in Kabul as part of a limited strategic interdiction strategy.<br />

Finally, the bombs dropped on the Amir’s palace were done as<br />

part of a deliberate, if ineffective, decapitation strategy. The<br />

most effective coercion strategy, however, was the use of British<br />

airpower in the role of direct support to the British ground<br />

forces.<br />

<strong>Air</strong>power played a vital role in the support of the<br />

British ground offensive, and probably made the war much<br />

less costly than it otherwise would have been by providing<br />

close air support and aerial resupply to British and Indian<br />

troops high in the mountains. At the time, there were no useable<br />

maps of the region 43 . The reconnaissance aircraft using<br />

aerial photography to “build” maps doubtless saved thousands<br />

of lives for the British and shortened the war by years. To<br />

credit the end of the war to two attempts at strategic bombing<br />

raids, however, might be stretching things a bit. The<br />

Amir was beginning to lose his hold on the loose confederation<br />

of warrior-tribesmen that represented the bulk of his<br />

force. Their poor discipline was made frighteningly evident<br />

by the looting of Jalalabad. This loss of control over what was<br />

essentially two-thirds of his army was no doubt all the more<br />

worrisome to the Amir as the British forces poised along the<br />

borders of Afghanistan swelled to over 340,000, three times<br />

as many troops as the Amir had even before he began losing<br />

control of his tribesmen.<br />

This is where the absolute importance of what<br />

Byman called “escalation dominance” comes into account.<br />

The British forces were poised along the border between India<br />

and Afghanistan, waiting only for the word from their leaders<br />

to spring into the offensive. The Afghans, however, had no<br />

option by the fourth week of war but to defend their territory<br />

from the inevitable crush of the British forces. Thus, the British<br />

had the power to control the pitch of the conflict more so<br />

than the Afghans. The Afghans failed to see that the British<br />

would be unable to sustain such a massive conflict for more<br />

than a mere few weeks, or the Amir might have opted for a


prolonged guerilla conflict. Instead, he saw only the British<br />

force of 340,000 troops and the will of the British commanders<br />

in India to invade and chose to end the conflict.<br />

It seems that in light of the other factors affecting<br />

the war in its fourth week, it is more than reasonable to<br />

surmise that the real winner of the Third Afghan War, as in<br />

the two Afghan Wars that preceded it, was ground power.<br />

The ground forces were greatly supported by the RAF, but<br />

these only increased the abilities of the ground troops. Furthermore,<br />

the logistical situation in India by the end of<br />

the war was so over-extended that the same two squadrons<br />

were unable to sortie sufficient aircraft to put down a tribal<br />

rebellion that flared up the following year in a region called<br />

Waziristan 44 . In Afghanistan, ground operations and the<br />

political will to initiate a ground invasion were the effective<br />

policy tools, with air power providing some backup.<br />

PART V<br />

SOMALILAND<br />

Since 1884, the British controlled a colony in the<br />

northern part of the Horn of Africa, from which they were<br />

able to control the Gulf of Aden and ensure the safe passage<br />

of shipping into and out of the Red Sea. This colony<br />

was called Somaliland. Prior to British administration, it<br />

had belonged to Egypt and to Abyssinia—Ethiopia—before<br />

that. In 1905, control of Somaliland was transferred from the<br />

Indian Office to the Colonial Office. The same year, a Somali<br />

warlord named Mohammed bin Abdullah Hassan, began<br />

his first war against the British authorities. He spent a year<br />

rampaging through the eastern areas of Somaliland before<br />

he was finally brought under some measure of control. He<br />

struck out again in 1910, this time staging raids and hit-andrun<br />

attacks throughout the colony before disappearing into<br />

Somalia, 45 also located on the Horn of Africa but to the south<br />

of Somaliland. Both territories now make up what is known<br />

simply as Somalia.<br />

By now known as the Mad Mullah by the British<br />

authorities for his many eccentricities and his barbarism to<br />

his victims, Hassan took advantage of the Great War to wage<br />

his own war 46 . Uniting several tribes together, Hassan began<br />

his campaign of pillaging along the eastern tip of the Horn,<br />

bringing the entire area under his control. The British colonial<br />

governor levied and trained extensive forces to combat<br />

the warlord. By the end of the Great War colonial forces<br />

had wrested control away from Hassan once again, and what<br />

remained of his army fled with him once again into Somalia<br />

47 . The majority of the colonial forces were then disbanded,<br />

retaining only the Somali Camel Corps, an elite, fast-moving<br />

battalion of five-hundred men and camels 48 . Then, in 1920,<br />

the Mad Mullah returned and began pillaging in southern<br />

74<br />

Somaliland. Lord Milner, Secretary of the Colonial Office<br />

called upon Winston Churchill—at the time the Secretary of<br />

the War Office—for aid in bringing Hassan to ground once<br />

and for all.<br />

Churchill first posed the question of solving the<br />

Somaliland problem to the Army. The responded with the<br />

suggestion of two divisions of troops, with at least one of<br />

those being of regulars, and a railroad to be constructed in<br />

territory taken by the British to ensure that future uprisings<br />

could be quashed quickly and easily 49 . Almost as an afterthought,<br />

the Army requested a squadron of aircraft from<br />

the Royal <strong>Air</strong> <strong>Force</strong> to support them. Churchill was reluctant<br />

to accept this expensive plan, and turned to the Chief<br />

of his other service, the <strong>Air</strong> Ministry, General Trenchard.<br />

Trenchard’s <strong>Air</strong> Control squadrons were ready, and he suggested<br />

that they be used along with forces already in the<br />

area. One squadron of twelve DH-9 light-bombers, an equal<br />

number of vehicles in an armoured car squadron, a battalion<br />

of King’s African Rifles comprising the light infantry element,<br />

and the 500-man strong Camel Corps were the regular forces<br />

available 50 . A levy of 1,500 troops would be used to supply<br />

base defense and garrison known water-holes. All forces were<br />

in place by January of 1921.<br />

Almost immediately, the war turned against Hassan.<br />

The very mobile forces of the Camel Corps and the squadron’s<br />

armoured cars were more than capable of keeping pace<br />

with Hassan’s raiding forces, while aircraft kept the Mullah<br />

under constant surveillance and ceaseless harassment by aerial<br />

bombardment and machine-gun fire. The hammer-and-anvil<br />

of the aircraft, the mobile ground forces, and the battalion of<br />

African Rifles proved too much for Hassan, who fled to his<br />

fortress at Tale in Somalia 51 . The British forces pursued and<br />

captured the fortress by early February. The Mad Mullah fled<br />

to Abyssinia with a handful of followers, where they were all<br />

killed by local tribesmen later that year. The total cost of the<br />

war was a mere £77,000, touted by airpower advocates as the<br />

cheapest war in colonial history 52 .<br />

Yet, how effective was airpower in coercing Hassan<br />

to flee from his forces and his Somali fortress and escape to<br />

Abyssinia where his eccentric behavior could get him killed?<br />

For over fifteen years, colonial troops—mostly from the elite<br />

Camel Corps—had been battling Hassan’s camel-mounted<br />

army in a campaign based on an aggressive denial strategy.<br />

By destroying Hassan’s forces, the British hoped to remove<br />

his will to continue fighting. By 1920, Hassan’s forces were<br />

a mere shadow of their former strength, and the Mad Mullah<br />

himself was in his fifties—old to be galloping around on<br />

a camel battling the world 53 . The importance of Hassan’s<br />

age—quite old for a Somali warlord—cannot be overemphasized<br />

as a factor affecting his eventual abandonment of his


forces. <strong>Air</strong>power was a shock to the forces of Hassan, and<br />

their constant harassment using small bombs and machinegun<br />

fire no doubt made the going a little rougher on the old<br />

man and his weary troops; against such constant harassment,<br />

Hassan’s hit-and-fade strategy was torn to shreds. However,<br />

more than anything else it was Hassan’s inability to make a<br />

decent camp near water because of the constant harassment<br />

from the Camel Corps, the armoured car detachment, the<br />

King’s African Rifle battalion, and the 1,500 conscripted<br />

troops who were guarding all of the water wells in Somaliland<br />

that compelled him to seek refuge in his fortress, as he had<br />

done in years past 54 . Pape would call this strategy operational<br />

interdiction, keeping Hassan’s forces away from the resources<br />

essential to their war effort. Pape, however, argued that<br />

this was an airpower strategy. <strong>Air</strong> control achieved success<br />

through operational interdiction utilizing ground forces.<br />

Hassan’s numbers were greatly reduced when the<br />

British forces surrounded his fortress, and he was in no condition<br />

to wait out a siege and still survive the inevitable assault<br />

that would follow. Furthermore, at over fifty years of age,<br />

Hassan was beginning to feel the strain of constant fighting<br />

and fleeing. Therefore, I argue that while airpower was effective<br />

in increasing the pressure on Hassan and denying him his<br />

fast-paced hit-and-run strategy, without the mobile ground<br />

forces constantly harassing the Mullah and keeping him from<br />

water there is no way that he could be induced to abandon<br />

his forces. Coercion, if it was achieved at all, was achieved<br />

through ground power interdicting vital water supplies and<br />

providing the threat of further punishment to Hassan and the<br />

meager scraps of his raiders.<br />

PART VI<br />

MESOPOTAMIA<br />

The British took control of Mesopotamia, which<br />

would later be known as Iraq, during the First World War.<br />

The British ground offensive to take the Ottoman Turk territory<br />

began in what is now known as Kuwait. The British<br />

charged northwards and took the port city of Basra, from<br />

which they were able to resupply their offensive as it moved<br />

northwards along the Tigris River 55 . While support operations<br />

were being conducted by special operations forces, comprised<br />

of Arab tribesmen led by British officers, to control the<br />

western part of Mesopotamia, the bulk of the British mechanized<br />

advance moved steadily on towards Baghdad until<br />

the offensive was halted on the outskirts of Al Kut 56 . The<br />

Royal <strong>Air</strong> <strong>Force</strong> came to the aid of the beleaguered ground<br />

forces, allowing them to break through the Turkish lines and<br />

take Baghdad, the principal city of the region. The British<br />

continued advancing northwards and were stopped again in<br />

early 1918 at the city of Kirkuk 57 . A terrible battle ensued,<br />

75<br />

and the majority of British forces, outnumbered and cut-off,<br />

were forced to surrender. In the summer of 1918, the British<br />

launched a new offensive from Baghdad, relying more heavily<br />

on mobile armoured car companies and air support 58 . The<br />

British smashed through the Turkish lines, blew past Kirkuk<br />

and captured Mosul, the northernmost city in Mesopotamia<br />

and the last city before the Turkish border. Turkey sued for<br />

peace and the war came to an end in the Middle East.<br />

Or so it seemed on paper. The British signed a peace<br />

treaty with the Sultan of Turkey, and as far as the Sultan was<br />

concerned all of his territories in Mesopotamia, Transjordan,<br />

Palestine, Syria, and Egypt were lost. There was, however,<br />

no peace for the colonial administration of the Protectorate<br />

of Mesopotamia 59 . Baghdad was a safe city for the British,<br />

heavily defended by whole divisions of Indian troops and<br />

several battalions of British regulars. Additionally, there were<br />

still multiple squadrons of attack and pursuit aircraft in the<br />

region, left over from the Great War. The regions around<br />

Baghdad, however, belonged to no man and immediately<br />

became an area of unrest and rebellion. Renegade raiding<br />

parties belonging to warlord chieftains began attacking other<br />

tribes and British officials. Shiite and Sunni clerics, interested<br />

in their own personal power base, began trying to rouse<br />

public support against the British and against each other. Terrorist<br />

attacks and brutal massacres of small Imperial defense<br />

forces and British administrators became common, forcing<br />

the British into the safety of Baghdad, Mosul, and Basra, leaving<br />

the rest of the country to itself 60 .<br />

To make matters worse, Bolshevik agents from the<br />

Soviet Union infiltrated into Mesopotamia from the former<br />

Russian territory of Northern Persia and began to fund<br />

nationalist rebellions against the British in the east 61 . Agents<br />

of the young Turkish revolutionary, Kemal Ataturk, penetrated<br />

into northern Mesopotamia into a region known as<br />

Kurdistan. Supplying some funding and munitions to the<br />

Kurds, Turkish agents began trying to inflame the Kurdish<br />

chieftains to rise up and fight the British to obtain an<br />

independent Kurdistan 62 . By 1920, there were over 130,000<br />

tribesmen violently under arms around the region 63 . British<br />

forces suddenly found themselves desperately huddled atop<br />

scant high ground with the flood waters of civil war rising up<br />

around their ankles.<br />

The British garrison in Mesopotamia was raised<br />

to 17,000 British regulars and 85,000 Indian troops. The<br />

estimated annual cost of supporting these forces rose to £30<br />

million 64 . Winston Churchill had been placed in charge of<br />

the Colonial Office following the brilliant success of the <strong>Air</strong><br />

Ministry in controlling Somalia, and now called a meeting<br />

of all of the regional governors to decide what could be done<br />

about the Middle East. In regards to Mesopotamia, it was


decided that Amir Feisal would be made King of the wartorn<br />

protectorate. Feisal was brother to Amir Abdullah, King<br />

of neighboring Transjordan. Churchill believed that it was<br />

vitally important that Amir Feisal be chosen by the people<br />

of Mesopotamia, which would be renamed Iraq, in order for<br />

him to truly have sovereignty65 the first time, was <strong>Air</strong> Control truly effective in coercing the<br />

Kurds to abandon their rebellion. Though the armoured car<br />

companies were helpful to the flying squadrons, the rocky<br />

terrain made it difficult for the vehicles to keep pace with the<br />

fast-moving mounted Kurdish warriors. However, the sheer<br />

. In order to achieve support number of planes available to Salmond—eight full squadrons<br />

for Feisal, it was necessary to put down the rebellions. with excellent logistical support, as opposed to one squadron<br />

The many divisions based in Mesopotamia by the in both Somaliland and Afghanistan with hit-or-miss logis-<br />

end of 1921 began going about rounding up the more militics—allowed air power to be supplied with much greater<br />

tant renegades and bringing them to justice. The less militant<br />

leaders and clerics were bribed into cooperation by the British<br />

administration 66 . With several additional squadrons from<br />

the Royal <strong>Air</strong> <strong>Force</strong> providing reconnaissance, air support,<br />

and aerial resupply, the British forces were able to destroy<br />

the larger concentrations of renegade forces. Soon, the initial<br />

furor that had caused so many rebellions abated and the<br />

tribesmen and villagers lost interest. By 1922, the region was<br />

mostly pacified except for parts of Kurdistan, and many village<br />

referendums were held in which Amir Feisal was chosen<br />

for their King 67 . Feisal was a gifted negotiator, and his com-<br />

76<br />

force and effectiveness.<br />

<strong>Air</strong> forces, using machine guns and small-diameter<br />

bombs, were directed against war parties of Kurdish horsemen<br />

moving in the open. The massed airpower was very effective<br />

at inflicting losses 71 . <strong>Air</strong>power, practically by itself, ended<br />

the forays and raids by the Kurdish rebels through coercive<br />

methods. The tribes still maintained several warriors—who<br />

still conducted raids from time to time, and still do to this<br />

day—but the rebellion was ended. Therefore, in subduing<br />

Kurdistan, the hammer-and-anvil denial strategy of <strong>Air</strong> Con-<br />

mand presence demanded the respect and obedience of all the<br />

tribal chieftains he met with68 . Peace finally came to Mesopotamia,<br />

and the process of drafting a constitution and beginning<br />

self-rule began in earnest.<br />

The bulk of the British ground forces in Mesopotamia<br />

returned to India, leaving behind nine battalions of<br />

British and Indian infantry, eight flying squadrons with six<br />

armoured car companies as support, and the local levies of<br />

Iraqi troops69 . These were tasked with dealing with the last<br />

remaining renegade forces in the north. These forces were<br />

predominantly Kurdish tribesmen urged on by the Turks to<br />

fight for an independent Kurdistan, and they were supported<br />

by Turkish advisors and even companies of Turkish troops70 trol was effective as a coercive air strategy.<br />

In regards to pacifying the rest Mesopotamia, however,<br />

once again it was not airpower alone that made it work.<br />

Although the costs of putting down the rebellions dropped<br />

considerably from £30 million in 1922 to £3 million by<br />

1923, it was still the 120,000 troops of the British forces<br />

that managed to quash the more militant leaders and clerics<br />

.<br />

General Geoffrey Salmond, head of the <strong>Air</strong> Service in the<br />

Middle East during the Great War, had administered the air<br />

support operations that had enabled the ground forces to reassert<br />

control in Mesopotamia. He now turned his attention<br />

to applying the hammer-and-anvil of <strong>Air</strong> Control to dealing<br />

with the sporadic fighting in the north.<br />

In this, the mobile ground forces of the armoured<br />

car companies worked in concert with the flying squadrons<br />

to harass and weaken Kurdish war parties and Turkish troop<br />

incursions both of them utilizing denial strategies to destroy<br />

the rebel forces coupled with operational interdiction sorties<br />

to deny the rebels access to food, munitions, and information.<br />

Meanwhile, other armoured car detachments worked<br />

in concert with levies of Iraqi troops to occupy Kurdish territory<br />

and flush out renegades in the guerilla-warfare equivalent<br />

of strategic interdiction, denying the renegades access to<br />

their greatest logistical base. It may be argued that here, for<br />

72 . The more moderate leaders and clerics were bought<br />

by the administration, and their subsequent support further<br />

helped the British cause73 . The single most important factor,<br />

however, in pacifying and controlling Mesopotamia was the<br />

installation of Amir Feisal as King. No longer could the scattered<br />

tribes unite to fight some foreign control apparatus in<br />

the form of the British Colonial Office, but rather united<br />

under their charismatic King and began working to form a<br />

viable self-rule with their own constitution. With King Feisal<br />

governing in the place of a colonial governor, Britain was able<br />

to win the hearts and minds of the majority of the people of<br />

Mesopotamia and the widespread cooperation allowed Britain<br />

to rebuild the country better than it had been under the<br />

Ottoman Turks. It is certainly interesting to note that the<br />

most effective means of coercion, to date, involved very, very<br />

little force and a very, very great amount of diplomacy.<br />

In pacifying the Kurds in the north, and in 1923<br />

putting down a small jihad led by a renegade Iraqi magistrate<br />

named Sheik Mahmud who proclaimed himself King of<br />

Kurdistan74 , the winner was airpower alone. Fast, maneuverable,<br />

and hard-hitting, the eight squadrons of Mesopotamia<br />

under General Salmond were able to smash any organized<br />

rebel forces before they could do any damage. The mobile<br />

squadrons of armoured cars provided the effective ground


ase to mop up after the airpower had finished, cutting off<br />

the renegades from their strategic logistics bases in their own<br />

villages and in Turkey. This effective combination, combined<br />

with waning support from the Turks, persuaded the Kurds to<br />

cease their rebellion and turn instead to conducting sporadic<br />

raids on one another.<br />

PART VII<br />

LESSONS TO BE LEARNED<br />

In controlling the very-different situations in the<br />

three colonies mentioned, there were certain over-arching<br />

measures which proved effective. Among them was the close<br />

coordination between ground forces and air forces. At one<br />

time, ground forces alone might have been able to do the<br />

job, but at the cost of hundreds of millions of pounds and<br />

hundreds of thousands of lives lost. After the Great War, the<br />

British people would never have supported such endeavors,<br />

military action would have ended in failure and political<br />

fiasco, and it is likely the colonies would simply have been<br />

left to fend for themselves. <strong>Air</strong>power allowed the British<br />

commanders the ability to strike hard and fast, with good<br />

reconnaissance and aerial intelligence, with accurate and<br />

timely air support in harsh and mountainous terrain where<br />

artillery could not be used, and even with resupply. The<br />

mobile ground forces of the armoured car detachments and<br />

squadrons worked very well to complement the attacks of the<br />

flying squadrons, creating a hammer-and-anvil that gave the<br />

adversary no rest from denial-based attack and operational<br />

interdiction. This is in keeping with the concepts of coercion:<br />

constant pressure keeps the adversary from developing<br />

new strategies or counterstrategies. Meanwhile, the adversary<br />

has no ability to escalate the situation while friendly air<br />

and ground forces are constantly maneuvering to deny the<br />

adversary even the slightest hope of success. The adversary is<br />

compelled to cease the conflict, though the actual ability to<br />

continue resistance may very well be present.<br />

Measures which were tried but which did not work<br />

were the use of ground forces by themselves, and the use of<br />

airpower by itself. The ground forces, for example in Somaliland,<br />

simply did not have the information or the speed to<br />

bring Hassan’s raids to an end without the use of airpower or<br />

without ensnaring the Empire Commonwealth in a brutal<br />

quagmire of slow attrition warfare. In Somaliland, the Royal<br />

<strong>Air</strong> <strong>Force</strong>’s constant denial and decapitation campaign against<br />

Hassan and his raiding forces wrested away the one advantage<br />

that Hassan had possessed in his earlier conflicts against<br />

ground forces—his mobility and stealth.<br />

However, neither could coercive airpower strategies<br />

alone end any conflicts. In Afghanistan, although strategic<br />

bombing raids were conducted against the armaments factory<br />

77<br />

in Jalalabad—strategic interdiction—and against the palace of<br />

Amir Ammanullah—decapitation—the war did not end until<br />

the 340,000 ground troops of the British forces were about to<br />

invade Afghan territory.<br />

This is critical—all too often airpower is seen as the<br />

more sanitary, cost-effective means of coercing an enemy.<br />

However, such an approach lacks the teeth that give coercion<br />

its real bite—the believable threat of escalation. With<br />

airpower, the limit to the level of escalation that is possible is<br />

using nuclear weapons, and unfortunately that level of escalation<br />

is reached decidedly soon in the coercion process. Trying<br />

to assess a probability of success in nuclear coercion begins to<br />

enter heavily into games theory and brinksmanship—psychology,<br />

sociology, and social calculus, desperately attempting to<br />

see how close the opponent will go towards total annihilation.<br />

Suffice to say, with nuclear weapons coercive air strategies<br />

cease to be, and thus may reasonably be termed a failure of<br />

airpower coercion. Ground forces, however, retain almost<br />

limitless escalation. After all, a young soldier occupying an<br />

adversary’s street corner has the ability to do quite a bit more,<br />

overall, than a pilot flying at twenty-thousand feet.<br />

It can therefore be concluded that coercive air strategies—in<br />

effect, using airpower alone to achieve coercion in<br />

any of the many forms outlined by Pape and Byman—will<br />

not work against a determined adversary, especially one who<br />

has military training and whose people are also well-acclimated<br />

to warfare. Only through the use of coordinated air<br />

and ground forces working in close concert might coercion be<br />

achieved. <strong>Air</strong>power may be used to affect a denial-strategy on<br />

the adversary’s military capabilities while razing the logistical<br />

base of the adversary’s forces through operational interdiction,<br />

while ground forces are poised to finish the job and continually<br />

harass the adversary as the anvil of an aggressive denial<br />

strategy and separate adversarial forces from any strategic<br />

logistical support that might be found in the local populace.<br />

Most importantly of all, while airpower is making a fast denial<br />

strategy possible, overwhelming ground forces must be standing<br />

by to invade in order to provide a believable threat of conflict-escalation.<br />

PART VIII<br />

IN CONCLUSION<br />

The British turned to <strong>Air</strong> Control as a means of putting<br />

down rebellion throughout the Empire-Commonwealth<br />

cheaply and effectively. Though <strong>Air</strong> Control did reduce the<br />

costs of the several frontier wars in which it was utilized, it<br />

did not solve all of Britain’s problems. Each conflict still<br />

demanded a high level of commitment, and even the smallest<br />

of the wars, in Somaliland, demanded over a thousand<br />

ground troops to occupy the area, and over five-thousand


local troops levied before the end of the war. It requires vast<br />

amounts of treasure, national will, and even blood to build<br />

and maintain influence around the world. There is no quick<br />

and easy way of asserting such influence, there are no halfmeasures,<br />

and most importantly, there are simply no surgical<br />

strikes that can paralyze an adversary completely, shocked to<br />

the point where the will to fight no longer exists.<br />

<strong>Air</strong>power can help shorten the duration and cost of a<br />

conflict, in terms of blood and treasure. <strong>Air</strong>power can shock<br />

the adversary into realizing vulnerability, and can weaken the<br />

adversary’s forces for the great decisive blow that can only be<br />

delivered by ground forces. However, what is necessary for<br />

any conflict is a clearly defined end-state that national will<br />

can focus on and the political commitment to stay the course<br />

and see the campaign through. Escalation dominance, the<br />

ability to increase pressure on the adversary at will, is the real<br />

key to any coercive strategy. Escalation dominance, however,<br />

can only be achieved if the national will is present to follow<br />

through with what the adversary has to believe is a real, imminent<br />

threat.<br />

There is a real danger, however, in resolving conflict<br />

by means of threatening even worse conflict: that the lesson<br />

learned by the adversary is to strike in a different manner in<br />

the next conflict, in a manner that will be unanticipated and<br />

have a much greater chance of success. The sad truth of coercion,<br />

and war for that matter, is that there is no way of absolutely<br />

winning. There is only postponement, posturing, and<br />

renewal of hostilities at some later date.<br />

The closest way to ensure successful coercion is<br />

actually not through violence at all but through the hearts<br />

and minds of the people. The British were trying to control<br />

colonies through the use of airpower, yet the flying squadrons—and<br />

their armoured car counterparts—were directed<br />

at their adversary’s military capabilities, the formations of<br />

troops, the raiding parties, very much a denial-based strategy.<br />

Meanwhile, the whole time in every colony the British<br />

authorities were trying to ensure that when the conflict was<br />

over there would still be colonials loyal to Britain. The concept<br />

of <strong>Air</strong> Control relied heavily on the use of local levies of<br />

troops, who cost less than British and Indian troops and were<br />

more numerous in the immediate area. These local levies<br />

could never have been possible if British authorities weren’t<br />

ensuring that the majority of the people agreed that the British<br />

needed their help and were willing to give it. The British<br />

accomplished this by building schools and educating the<br />

people of their colonies, by undertaking construction projects<br />

using local labor and thereby providing a job market, and by<br />

simply bribing local leaders into supporting the British cause.<br />

Of the 130,000 tribesmen under arms in Mesopotamia just<br />

after the First World War, only a small fraction would actually<br />

78<br />

be engaged by the British forces in the protectorate. The vast<br />

majority simply began to agree with British rule. This seeming-impossible<br />

reversal was accomplished by converting the<br />

tribal leaders and clerics to the British cause by way of bribes,<br />

gifts, and assurances that their own personal power-base<br />

would not be threatened as long as the supported the British.<br />

Thus, the vast majority of Mesopotamia was coerced<br />

into cooperating with the British without any military<br />

involvement whatsoever, but through the work of positive<br />

public relations, imaginative and effective diversion of funds,<br />

and projects designed to educate the people and build them<br />

a way of life better than they had known before. Imagine—<br />

influencing an entire population through education, health<br />

care, development of infrastructure, and a sense of pride and<br />

self-determination. Perhaps a lesson in real coercion can be<br />

learned from that.<br />

WORKS CITED<br />

Armitage, Sir Michael. The Royal <strong>Air</strong> <strong>Force</strong>: An Illustrated History.<br />

New York, NY:<br />

Sterling Publishing Co., 1993.<br />

Billings, Molly. The 1918 Spanish Influenza Pandemic. Stanford<br />

University, June 1997.<br />

http://www.stanford.edu/group/virus/uda/<br />

Byman, Daniel L., Matthew C. Waxman, and Eric Larson.<br />

<strong>Air</strong> Power as a Coercive<br />

Instrument. Santa Monica, CA: Rand, 1999.<br />

Clausewitz, Carl von. On War. New York, NY: Random<br />

House, Inc., 1993.<br />

Pape, Robert A. Bombing to Win: <strong>Air</strong> Power and Coercion in<br />

War. Ithaca, NY:<br />

Cornell University Press, 1996.<br />

Scovill, Elmer B. The Royal <strong>Air</strong> <strong>Force</strong>, the Middle East, and<br />

Disarmament, 1919-1934.<br />

Ann Arbor, MI: Michigan State University Press,<br />

1973.<br />

Smith, Malcom. British <strong>Air</strong> Strategy Between the Wars. New<br />

York, NY: Oxford<br />

University Press, 1984.<br />

St. George Saunders, Hilary. Per Ardua: The Rise of British <strong>Air</strong><br />

Power 1911-1939. New<br />

York, NY: Oxford University Press, 1945.


ACKNOWLEDGEMENTS<br />

Special thanks go to Major Robert Melton, Jr.,<br />

USAF, for all of his help in writing this. Before he read it,<br />

it was long. After he read it, it was long and was actually<br />

worth taking a look at. Thank you so much, sir, for getting<br />

me back on track! Thanks to my boys in the MSS Class of<br />

’04. We’re so ready. Thanks to the website that provided the<br />

excellent story of the First Afghan War and to Major Melton<br />

for vaguely remembering something about it, and to the old<br />

British pilot that killed the Mad Mullah’s camel, thanks for<br />

reminder that some days it’s chickens and some days it’s feathers!<br />

Thanks to my fiancée Stephanie—no one has ever helped<br />

me more.<br />

Ditat Deus<br />

(Endnotes)<br />

1 Clausewitz 90-99. Excellent, excellent book. Clausewitz is<br />

usually considered a must-read by the military-types (at least<br />

the Cliff’s Notes), but the social theorist and the political<br />

scientist should definitely read it as well; not only is there<br />

much to learn from it, but reading a work is the only way to<br />

be free of misquotations!<br />

2 Clausewitz 101. The terminology is actually People,<br />

Commander, Government. The Commander interacts with<br />

fate, resulting in my explanation which, though a slight<br />

misquote, cuts right to the chase!<br />

3 ibid<br />

4 Clausewitz 85. The writings on this subject are frightening<br />

to contemplate. Absolute war.<br />

5 Clausewitz Chapter One. This is much more effective<br />

documentation. You are charged with reading the entire<br />

chapter and becoming wiser not only concerning the nature<br />

of war but of humanity.<br />

6 ibid<br />

7 ibid<br />

8 Pape 20. The strategist may be confused and perhaps even<br />

bored by this Joministic approach. The political scientist<br />

may not have thought much into the psychological and<br />

circumstantial maelstrom that defines the nature of conflicts<br />

and may see Pape’s arguments as a road to panacea. This<br />

is not the case! Perhaps large-n surveys and application of<br />

chi-squared modeling may help in other aspects of political<br />

science, but in the conduct of military operations, a silverbullet<br />

approach will not be of any value and might actually<br />

be harmful if attempted without proper safety precautions.<br />

To paraphrase Sun-Tzu, we must look at the characteristics<br />

of each individual situation, for they are always different but<br />

often similar.<br />

79<br />

9 ibid<br />

10 ibid<br />

11 Pape 55-58. Pape’s coercive air strategies have some<br />

merit to them, I think. However, readers who wish to learn<br />

about them should be sure to prepare themselves by reading<br />

Clausewitz, Sun Tzu, Cohen, and any history book worth its<br />

salt about any conflict.<br />

12 ibid<br />

13 ibid<br />

14 ibid<br />

15 Byman Read this book. It is short, it is sweet, it is potent,<br />

and it is free online at RAND’s website.<br />

16 ibid<br />

17 ibid<br />

18 ibid<br />

19 Scoville 5-7. A most excellent read. Scovill’s book, written<br />

in 1973 shows striking similarities between the British<br />

experiences in the Muslim world and the experiences the<br />

<strong>United</strong> Status is having now. It is actually quite eery.<br />

20 Billings. I don’t understand why a virus that became the<br />

worst pandemic in recorded history by killing 20-40 million<br />

people in one year does not get more attention. Everybody<br />

knows about “Black Death.” Who’s heard of Spanish<br />

Influenza? I think it’s an injustice.<br />

21 Scoville, Chapter 2.<br />

22 ibid<br />

23 Scovill, Chapter 5<br />

24 ibid<br />

25 ibid<br />

26 ibid<br />

27 ibid. It is amazing to think that Churchill went from the<br />

Admiralty to the War Office and the <strong>Air</strong> Ministry to the<br />

Colonial Office.<br />

28 ibid<br />

29 ibid. Scovill is an outstanding source on the “interwar”<br />

period of RAF. He is an even better source on the concept of<br />

<strong>Air</strong> Control in the Middle East.<br />

30 Scovill,Chapter 6.<br />

31 ibid<br />

32 ibid<br />

33 ibid<br />

34 ibid. It’s necessary to tell a story of the First Afghan War to<br />

show how brutal the fighting was between the British and the<br />

Afghans since the mid-1800s: The British had been warring<br />

against Afghanistan for almost a hundred years by the time<br />

of the Third Afghan War. The First Afghan War was a terrible<br />

debacle. The British Army had found itself embroiled<br />

in a conflict in some of the most unforgiving terrain in the<br />

world against an entire culture of warriors. They fought using<br />

Napoleonic tactics against a mounted force of guerillas and


hardy mountain troops, and though they initially met with<br />

success against the scattered tribes, they soon found themselves<br />

outnumbered by a unified Afghanistan. In the retreat<br />

from Kabul in the January of 1842, a force of over four thousand<br />

soldiers and more than ten-thousand women, children,<br />

and support personnel left the city to join the British garrison<br />

at the city of Jalalabad. Jalalabad was ninety miles from<br />

Kabul, over high, snow-covered mountain passes and rough<br />

terrain. The column was under constant attack by tribesmen<br />

and guerillas. Of the 16,000 souls that left Kabul in the British<br />

retreat, only one made it to Jalalabad, severely wounded<br />

and half-dead from hunger and thirst.<br />

35 Armitage, 33. I liked this book and found it to be an<br />

excellent companion to Scovill’s work. It has nice pictures!<br />

36 Scovill, Chapter 6<br />

37 ibid<br />

38 ibid<br />

39 ibid<br />

40 ibid<br />

41 ibid<br />

42 Armitage, 33<br />

43 Scovill, Chapter 3<br />

44 Armitage, 33; Scovill, Chapter 5. The fight for Waziristan<br />

took years, more than a decade, to quell. The reason that the<br />

British public supported such an extended military action was<br />

that, first off, they for the most part knew nothing about the<br />

conflict and, secondly, the war was relatively “inexpensive.”<br />

45 Armitage 35, Scovill Chapter 6. Excellent story!<br />

46 ibid<br />

47 ibid<br />

48 ibid<br />

49 Scovill, Chapter 6<br />

50 ibid<br />

51 ibid. The following story is from a British pursuit pilot’s<br />

attack. The British were trying to perform decapitation<br />

strategies without precision munitions! On one of the raids<br />

against Hassan, a British pilot dropped a bomb which landed<br />

quite fortunately. Hassan was well-known to ride a white<br />

camel with a long black banner carried high on the wind, a<br />

mark of his eccentric fascination with himself. The young<br />

pilot saw the white camel with the black banner and aimed<br />

his bombs at Hassan, sure that there was no possible way he<br />

could even come close to hitting him. To his surprise, when<br />

he looked back the camel had disappeared, blown to bits, and<br />

Hassan was struggling to get to his feet. At over fifty years of<br />

age, this had to be quite a blow to Hassan. The black banner<br />

was not to be seen flying again behind any camels.<br />

52 ibid<br />

80<br />

53 ibid<br />

54 Scovill, Chapter 6<br />

55 Scovill, Chapter 3<br />

56 Scovill, Chapter 3<br />

57 ibid<br />

58 ibid<br />

59 ibid<br />

60 Scovill, Chapter 3<br />

61 Scovill, Chapter 6<br />

62 ibid<br />

63 ibid<br />

64 Armitage, 37<br />

65 Scovill, Chapter 6. Scovill had an absolutely brilliant idea.<br />

I wonder if we could try it or not in Iraq?<br />

66 ibid<br />

67 ibid<br />

68 ibid<br />

69 ibid<br />

70 Armitage, 35-51<br />

71 Scovill, Chapter 6—probably the best chapter in the entire<br />

book!<br />

72 ibid<br />

73ibid 74 Armitage, 37


FALLOUT:<br />

THE QUESTION OF NEXT GENERATION<br />

NUCLEAR WEAPONS<br />

By C1C Damon A. Wagoner<br />

INTRODUCTION<br />

Statement of the Research Question<br />

As the <strong>United</strong> <strong>States</strong> enters the twenty-first century,<br />

the question of how best to provide for the common defense<br />

remains a primary concern for both the government and the<br />

military. With ever-increasing threats of terrorism and the<br />

proliferation of weapons of mass destruction, the U.S. needs<br />

to take a close look at its own inventory of weapons and evaluate<br />

their usefulness in the coming years. The purpose of the<br />

following research is to evaluate whether or not the <strong>United</strong><br />

<strong>States</strong> should develop a new generation of nuclear weapons<br />

given the potential threats to its national security. The specific<br />

question that the research seeks to answer is this: Should<br />

the <strong>United</strong> <strong>States</strong> design, build, and test low-yield earth-penetrating<br />

nuclear weapons?<br />

Background and Significance of the Problem<br />

Since the development of the atomic bomb in the<br />

1940s, politicians and military leaders have wrestled over<br />

the employment of nuclear weapons in the name of defense<br />

and national security. During the Cold War, the testing and<br />

stockpiling of nuclear weapons led to an incredible arms race<br />

between the <strong>United</strong> <strong>States</strong> and the Soviet Union. The primary<br />

purpose of these weapons was clear: the complete annihilation<br />

of the other nation should it be deemed necessary.<br />

However, the collapse of the Soviet Union left each nation<br />

with a multitude of weapons that no longer could be used<br />

for the mission for which they were created. Limited by the<br />

Anti-Ballistic Missile Treaty and the Comprehensive Nuclear<br />

Test Ban Treaty which prohibit the research and development<br />

of precision nuclear weapons, American’s atomic program<br />

came to a grinding halt. 1 Today, however, new threats have<br />

presented themselves in the form of rogue states and non-state<br />

actors such as terrorists. Both groups have started to develop<br />

nuclear capabilities, either through their own research or<br />

through the purchase of such weapons.<br />

Unlike the Soviet Union in the Cold War, these<br />

new nuclear actors are undeterred by the <strong>United</strong> <strong>States</strong>’ large<br />

nuclear arsenal, which currently exceeds 10,000 weapons. 2<br />

The idea of mutually assured destruction is no longer feasible,<br />

since none of the new actors have the ability to completely<br />

destroy all of America’s strategic points as did the Soviet<br />

Union. However, some of these actors, such as North Korea,<br />

have the ability to strike American allies such as Japan and<br />

81<br />

South Korea. As American troops are stationed in both of<br />

these areas, the <strong>United</strong> <strong>States</strong> has a vested interest in deterring<br />

North Korea from launching nuclear warheads. Nuclear<br />

retaliation is the only real military threat the U.S. possesses to<br />

discourage North Korea from an atomic strike. It is unlikely<br />

that the U.S. would retaliate with a nuclear attack, because<br />

the weapons that comprise our current nuclear inventory are<br />

too large and would create too much collateral damage. For<br />

this reason, President Bush and members of his administration<br />

are calling for a study of the need to update our nuclear<br />

arsenal. The purpose of the investigation is to analyze<br />

whether or not our current nuclear capabilities adequately<br />

address the threats facing the U.S. In 2002, after declining<br />

further participation in the Anti-Ballistic Missile Treaty and<br />

opting to construct a missile defense system, President Bush<br />

requested Congress to approve the research and development<br />

of nuclear weapons in general. Congress approved the President’s<br />

proposal in May of 2003. 3<br />

The research and development of new nuclear<br />

weapons is a significant decision that will greatly affect the<br />

military’s operations. Most research is currently directed at<br />

the development of low-yield nuclear weapons. Often called<br />

“mini-nukes,” these weapons are meant to penetrate into the<br />

earth to destroy underground facilities while theoretically<br />

minimizing collateral damage. As a result of the ongoing<br />

research, the potential use of such weapons becomes much<br />

more likely. That, in turn, could have dramatic effects on<br />

current military doctrine.<br />

Limitations of the Study<br />

This study will evaluate the research, development,<br />

and employment of a new generation of nuclear weapons<br />

from a military point of view. The study is limited to examining<br />

how these weapons could affect military operations, and<br />

whether or not a different approach could be used to achieve<br />

the same objectives. It is important to realize there are very<br />

significant domestic political and international issues associated<br />

with the development of new nuclear weapons. Nonproliferation<br />

is a major component of international politics.<br />

The idea of developing a new nuclear program will provoke<br />

strong opposition from both American political spokesmen<br />

and foreign governments. Congressional resistance to a<br />

nuclear program has already been voiced by Senators Dianne<br />

Feinstein and Edward Kennedy, as they have attempted to<br />

halt funding for nuclear weapons research, arguing that it<br />

could result in a new arms race. 4 Such opposition will be<br />

crucial to consider before the Bush administration produces a<br />

new generation of weapons. Although the politics of nuclear<br />

weapons development is not the focus of this study, it is<br />

important that the reader be aware of the political dimension


of this issue.<br />

This study will focus on the effectiveness of nuclear<br />

weapons as a deterrent or usable military instrument. Therefore,<br />

domestic and international political considerations will<br />

not be considered. An additional limitation includes the<br />

availability of information. The highly sensitive nature of<br />

nuclear weapons means much of the relevant information<br />

about this subject is classified. While this should not significantly<br />

affect the findings of the present study, it is still worth<br />

acknowledging the limits of research and analysis based on<br />

unclassified information.<br />

Definitions and Assumptions<br />

To fully understand the significance of developing<br />

a new nuclear arsenal, it is important to define and describe<br />

weapons in the U.S. nuclear arsenal and what they are capable<br />

of doing.<br />

Nuclear Weapons: Nuclear weapons are based on the<br />

physics of atomic fission and fusion. The first nuclear weapons<br />

developed by the U.S. were fission bombs. Both types<br />

of bombs require some form of a radioactive material such as<br />

plutonium or uranium. Due to radiation, the bombs are very<br />

dangerous environmentally as radioactive dust can travel hundreds<br />

of miles away from the blast area.<br />

Nuclear Fission Bombs: “Nuclear fission is the process<br />

that occurs when a neutron strikes the nucleus of an atom<br />

of one of the heavy radioactive elements. The atom splits<br />

apart and two or more lighter elements are formed and one<br />

or more neutrons are ejected along with beta particles and<br />

gamma rays.” 5 The continued splitting of atoms within a fission<br />

bomb causes a chain reaction that results in an enormous<br />

release of heat and energy. These types of weapons require the<br />

use of a fissile material which is usually either highly enriched<br />

uranium (HEU) or plutonium.<br />

Nuclear Fusion Bombs: The second type of weapon<br />

is a hydrogen or thermonuclear device. This weapon works<br />

on the basis of nuclear fusion. Whereas a fission device is a<br />

chain reaction of breaking atoms, fusion devices work on the<br />

combination of atoms. Fusion devices are much more complex<br />

but have a higher destructive yield. For a fusion reaction<br />

to occur, it is necessary to first create a fission reaction. 6 This<br />

heats the hydrogen core to approximately twenty million<br />

degrees, and forces the hydrogen atoms to fuse together into<br />

helium creating an incredibly large explosion. 7 Nuclear detonations<br />

are measured according to the equivalent amount of<br />

TNT it would take to create the same explosion. For fission<br />

weapons, this is generally in the kiloton (KT) range. Fusion<br />

weapons are much larger and are measured in the megaton<br />

(MT) range. For example, the largest thermonuclear weapon<br />

ever detonated was by the Soviet Union was about 50 megatons.<br />

8 Therefore, it would take about 50 million tons of<br />

82<br />

TNT to create an explosion of the same size.<br />

Radioactive fallout: Fallout is the name given to<br />

radioactive material that is dispersed after the detonation of<br />

a nuclear device. Radiation is caused by excess energy within<br />

an atom due to an imbalance of protons and neutrons. 9 The<br />

excess energy within the atoms is released through alpha and<br />

beta particles and gamma rays, which constitute the dangerous<br />

material in a radioactive element. Alpha and beta particles<br />

are relatively simple to repel, requiring at most a thin<br />

sheet of metal. Gamma rays are highly dangerous and are<br />

very difficult to stop. Thick blocks of lead or concrete are<br />

required to repel gamma rays. They easily penetrate the skin<br />

causing severe damage to both the exterior and interior of the<br />

body. Radioactive fallout is an inevitable side-effect of any<br />

nuclear weapon. Factors affecting fallout include the weapon<br />

size, the fissile material used, the altitude at which the weapon<br />

detonated, and the prevailing winds after detonation. Fallout<br />

can have lasting consequences long after the weapon explodes,<br />

making the surrounding area uninhabitable for decades.<br />

Final definitions for consideration in this study<br />

include the terms “proliferation”, “rogue state”, “non-state<br />

actor” and “collateral damage”.<br />

Nuclear proliferation: Proliferation is the dispersion<br />

of nuclear weapons capabilities throughout the world. Counter<br />

or nonproliferation is a main goal of the U.S. government<br />

as a means of underwriting its national security. The spread<br />

of nuclear weapons makes it more likely that America will be<br />

the victims of a nuclear attack.<br />

Rogue <strong>States</strong>: For the purposes of this study, a rogue<br />

state will be defined as a nation led by a corrupt regime that<br />

poses a potential threat to both the U.S. and its allies based<br />

on its actions. North Korea, Iran, and Syria are examples<br />

of rogue states because their continued hostile actions are<br />

inconsistent with international efforts towards peace. The<br />

Non-Proliferation Treaty, designed to control the diffusion<br />

of nuclear weapons capabilities, is one example of current<br />

international attempts at peace. In January of this year, North<br />

Korea rejected the treaty.<br />

Non-state Actor: In general, a non-state actor is a<br />

self-governing body that is not an internationally recognized<br />

nation. No physical boundary encircles non-state actors<br />

because they do not posses a physical piece of geography. The<br />

Kurds are an example of a non-state actor. Though they claim<br />

to be a legitimate and self-governing nation, they are not<br />

internationally recognized as a sovereign state and there is no<br />

geographic entity known as “Kurdistan.” For the purposes of<br />

this study, the term “non-state actors” will be used to denote<br />

terrorist groups.<br />

Collateral Damage: Collateral damage is defined as<br />

the unintended destruction of people and/or property. Inno-


cent civilians and noncombatants that are injured or killed in<br />

an attack on a legitimate target are the main types of collateral<br />

damage that the U.S. wishes to avoid. The reduction of collateral<br />

damage is a major concern regardless of the type of<br />

weapon being used.<br />

Preview of the Argument<br />

It is clear that the <strong>United</strong> <strong>States</strong> does not have a<br />

weapons arsenal commensurate with security requirements of<br />

the twenty-first century. Both the conventional and nuclear<br />

arsenals of the <strong>United</strong> <strong>States</strong> require serious modernization.<br />

Current capabilities are ill-suited to destroy a growing number<br />

of hardened underground facilities that effectively neutralize<br />

U.S. strategic bombing. U.S. adversaries can easily store<br />

weapons of mass destruction in these bunkers, and there are<br />

currently no weapon systems that can damage or destroy these<br />

facilities. The U.S. must adapt to this changing security environment,<br />

or it can seriously negate non-proliferation attempts<br />

around the globe. These facilities make it very difficult to<br />

track and stop the spread of weapons of mass destruction.<br />

Within the Departments of Defense and Energy, the<br />

most popular concept to counter this emerging threat is the<br />

low-yield earth-penetrating nuclear weapon. The major argument<br />

of this paper is that employment of this specific weapon<br />

will create far too many negative consequences, and that the<br />

U.S. should consider developing non-nuclear alternatives.<br />

Today, the <strong>United</strong> <strong>States</strong> is fighting non-state actors and must<br />

be careful not to cause large amounts of collateral damage in<br />

the process. This specific nuclear weapon does not prevent or<br />

reduce collateral damage. On the contrary, this weapon will<br />

only create additional problems for the military. Most importantly,<br />

there is a strong possibility that this weapon cannot<br />

achieve its stated objective of destroying hardened underground<br />

facilities.<br />

LITERATURE REVIEW<br />

The terrorist attack on the <strong>United</strong> <strong>States</strong> in September<br />

of 2001 caused the government and the military<br />

to quickly evaluate America’s nuclear stockpile and policy<br />

regarding the use of atomic weapons. The majority of experts<br />

before September 11 were concerned with nonproliferation<br />

and the elimination of nuclear arsenals worldwide. Post<br />

9/11 experts are very critical of America’s nuclear arsenal and<br />

have raised the question of whether or not it is still an effective<br />

deterrent against attacks on U.S. soil. Some experts are<br />

vehemently against the development of new atomic weapons,<br />

while others are in favor of new research. Still others argue<br />

that prolonging the life of the current weapons is the best<br />

course of action. At this point, the U.S. still has not taken a<br />

clear direction. President Bush has only called for research<br />

83<br />

into the feasibility of small-yield nuclear weapons. Full-scale<br />

development and production has not started, and many<br />

experts contend that nuclear testing, if restarted at all, is still a<br />

long way off.<br />

The issue of re-evaluating America’s nuclear arsenal<br />

has evoked very strong opinions. Joseph Cirincione, director<br />

of the Non-Proliferation Project at the Carnegie Endowment<br />

for International Peace in Washington, expressed his concerns<br />

over the manufacture of new nuclear weapons in an interview<br />

with the National Journal. 10 Cirincione argues that conventional<br />

weapons would be more effective in destroying underground<br />

facilities if they were employed by “repeated precision<br />

strikes” that “bore deeper and deeper until you reach your<br />

target.” 11 This idea does seem to provide a seemingly acceptable<br />

alternative to using nuclear weapons.<br />

Cirincione believes that the most effective way to<br />

destroy underground facilities would be “repeated strikes”<br />

with conventional weapons. If the enemy realizes that we<br />

know the whereabouts of his facility, and if it takes several<br />

strikes to destroy that facility, the enemy might have time<br />

to escape and possibly salvage important equipment. Cirincione’s<br />

argument does allow for a non-nuclear solution, but<br />

it requires more time, resources, and money, as it will take a<br />

number of missions and a number of conventional weapons<br />

to destroy the facility. An earth-penetrating nuclear weapon<br />

(EPW) could theoretically destroy the facility in one pass.<br />

According to Cirincione, the EPWs are only effective to a<br />

depth of fifty yards or less, thus requiring the use of a highyield<br />

weapon which defeats the necessity of decreased collateral<br />

damage. A test conducted in Alaska confirmed Cirincione’s<br />

conjecture as an earth penetrating bomb dropped from<br />

40,000 feet went only 20 feet into the ground. 12 A key aspect<br />

of this test, is that it was a bomb being dropped, which means<br />

it was dependent upon gravity alone. A propulsion device<br />

could propel the warhead even deeper into the earth.<br />

Robert W. Nelson, in an article for the Journal of the<br />

Federation of American Scientists, agrees with Cirincione about<br />

the futility of the “mini-nukes.” 13 Citing the same example<br />

of how these weapons fail to bury themselves deep enough<br />

into the ground, Nelson argues that “mini-nukes” would only<br />

cause a fallout disaster for the local population. Nelson states<br />

that even a .15 KT weapon failing to penetrate deep into the<br />

soil would create a large radioactive crater, throwing contaminated<br />

dirt around the area. 14 The amount of contamination<br />

is dependent on the size of the bomb. Contamination could<br />

be limited to a few square miles. Prevailing winds after the<br />

blast are unpredictable and could spread the radiation over<br />

several hundred square miles. If there is no possibility of the<br />

mini-nukes penetrating any farther into the dirt, then Nelson<br />

offers a very compelling argument. However, he does make a


large assumption. His fear of a large radioactive crater is only<br />

legitimate if the underground facility is around a population<br />

center. If the underground facilities are in an isolated area,<br />

then the risk of fallout, though still critical to consider, would<br />

be minimized. However, as will be discussed later, there is<br />

little reason to believe that U.S. enemies would place these<br />

facilities in a rural area, because it would only reduce inhibitions<br />

about using these weapons.<br />

Henry Kelly and Ivan Oelrich agree with Nelso and<br />

Cirincione about the problems associated with the mininukes.<br />

15 They introduce a different argument in their article,<br />

stating that “you can’t attack bunkers if you don’t know where<br />

they are – unless you contemplate nuclear carpet bombing.” 16<br />

Failure of American intelligence seems to be a large assumption<br />

in this argument. The idea of nuclear carpet bombing is<br />

an unreasonable proposition, and no where else in the literature<br />

is that even remotely suggested as an alternative. Obviously<br />

carpet bombing with nuclear weapons would create hazards<br />

not only to the local population, but to American troops<br />

in the theater, and also to neighboring countries where winds<br />

could spread the fallout. These authors fail to give enough<br />

credit to the armed forces’ ability to pinpoint important<br />

targets. Current <strong>Air</strong> <strong>Force</strong> doctrine places high importance<br />

on precision bombing. Technology such as smart bombs,<br />

GPS-guided munitions, and infrared targeting are essential<br />

tools for hitting the right target and minimizing risks to noncombatants.<br />

Operation Enduring Freedom in Afghanistan<br />

serves as a prime example of how the U.S. military can hit a<br />

target with notable accuracy. <strong>Air</strong> <strong>Force</strong> bombers successfully<br />

destroyed a vast amount of al Queda’s network of caves with<br />

remarkable precision.<br />

John Swomley argues that success with conventional<br />

precision bombing in Iraq still had negative consequences<br />

because the ordnance “sent high-speed shrapnel flying as far as<br />

a mile, causing many civilian casualties.” 17 Swomley actually<br />

makes a valid point since the results of a nuclear blast, even<br />

small-yield, are likely to be much more severe. But Swomley’s<br />

argument is applicable only for congested areas. As was the<br />

case in the previous arguments, Swomley fails to address the<br />

issue of a rural area. If there will be high civilian casualties,<br />

then the arguments against mini-nukes are very valid. None<br />

of the above arguments, however, mention the use of nuclear<br />

weapons in largely uninhabited regions where the risk of collateral<br />

damage is very low or non-existent. Unless a clear and<br />

immediate threat exists to America’s national security, the use<br />

of nuclear weapons in an urban area is difficult to justify. In<br />

a rural environment it becomes much easier to justify, but<br />

those who oppose a new nuclear research program fail to consider<br />

this possibility. Again, one must consider, though, the<br />

strong possibility that hardened underground facilities will be<br />

84<br />

located mainly in urban areas.<br />

In a report for the Congressional Research Service,<br />

national defense specialist Jonathan Medalia evaluates the<br />

positive aspects of EPWs. 18 According to Medalia’s report,<br />

the Defense Intelligence Agency (DIA) estimates that over<br />

1,400 underground facilities exist throughout the world. 19<br />

Unfortunately, this report does not discuss whether or not<br />

they are located in urban or rural areas. Nevertheless, Medalia<br />

is very balanced in his report, and admits that it is possible<br />

to disable underground facilities with conventional weapons.<br />

But he also notes that to actually destroy the facilities, it will<br />

be necessary to create a shock wave that can only be achieved<br />

by a nuclear blast. 20 The disabling of an underground facility<br />

means that the personnel inside the bunker would be<br />

killed, but the facility itself could continue to function if new<br />

personnel were introduced. Destruction of a facility means<br />

that it has been damaged beyond repair and is no longer<br />

usable. This is an interesting point, because there may be a<br />

case where disabling the facility is all the military needs to do.<br />

This could be particularly effective in areas of high civilian<br />

populations. Disabling facilities in crowded environments<br />

and destroying facilities in rural areas would serve as a balance<br />

between nuclear and conventional forces.<br />

A strong argument for developing mini-nukes comes<br />

from the fact that underground facilities were created in order<br />

to negate the threat of U.S. conventional weapons. Such<br />

facilities are used to house enemy weapons caches and also<br />

serve as laboratories for research on nuclear, chemical, or biological<br />

weapons. In an interview with the National Journal,<br />

C. Paul Robinson, the director of Sandia National Laboratories,<br />

expressed his belief that “nations have gone to school on<br />

our conventional military capabilities,” which is why they are<br />

“moving their high-value targets out of our reach by locating<br />

them in deeply buried tunnels and inside mountains.” 21 If<br />

our enemies are finding ways to neutralize our conventional<br />

threat then it is understandable why nuclear alternatives are<br />

being considered. This does not mean, however, that nuclear<br />

weapons are the only alternative. Medalia’s report to Congress<br />

concurs with Robinson’s findings: “Adversaries learned from<br />

the Persian Gulf War and elsewhere that U.S. conventional<br />

forces can readily destroy unprotected assets. In response,<br />

they have buried key facilities. The U.S. needs EPWs to<br />

respond to their moves.” 22<br />

Both Robinson and Medalia see the importance of<br />

designing weapons that can penetrate the earth and strike<br />

underground facilities. Though mini-nukes currently seem to<br />

be the most popular way in which to accomplish this mission,<br />

neither of these men are completely sure that nuclear weapons<br />

are the only way in which to proceed. Robinson says, “I<br />

would argue that the <strong>United</strong> <strong>States</strong> must respond by main


taining a robust deterrent against whatever is hidden in those<br />

underground facilities.” 23 Notice that Robinson does not<br />

say that the U.S. needs only a conventional or only a nuclear<br />

deterrent. He realizes that it will likely take a variety of different<br />

weapons to form a robust deterrent. The U.S. cannot<br />

put all of its effort and reliance on a single system and hope<br />

to succeed. Medalia believes that “nonnuclear earth penetrators<br />

could also be improved.” 24 As noted above, he further<br />

believes that conventional weapons have the ability to damage<br />

underground facilities but not completely destroy them.<br />

Whether nuclear or conventional warheads are used, both<br />

men argue that it is necessary to better develop the earth-penetrating<br />

cone. If the missiles or bombs can penetrate deeper<br />

into the ground, there is a much higher chance of success for<br />

either disabling or completely destroying the facilities. This<br />

will also decrease the possibility of collateral damage, since the<br />

explosions will occur deep within the soil.<br />

Until a new program is decided upon, America’s current<br />

nuclear stockpile needs to remain ready for deployment.<br />

Colonel Rick Patenaude, the chief of Deterrence and Strike<br />

for <strong>Air</strong> <strong>Force</strong> Space Command (AFSPC) at Peterson <strong>Air</strong> <strong>Force</strong><br />

Base, is in charge of keeping the U.S. nuclear missile program<br />

at an operational level while considering possible future<br />

upgrades. 25 Kelly and Oelrich disagree with Patenaude’s<br />

attempt to develop a replacement nuclear program. They use<br />

a review by the National <strong>Academy</strong> of Science to support their<br />

contentions that the U.S. can remain confident in its existing<br />

nuclear arsenal due to the routine and complex maintenance<br />

on the intricate parts of the warheads. 26 It is true that the<br />

<strong>Air</strong> <strong>Force</strong> puts a great deal of effort into maintaining the current<br />

U.S. nuclear arsenal, but there is a point at which a new<br />

program must be developed. The current system has outlived<br />

its usefulness with the end of the Cold War and has little to<br />

no applicability in today’s world. In an interview with the<br />

Colorado Springs Gazette, Colonel Patenaude observed that<br />

the U.S. needs to build a new generation of ICBMs because<br />

the Cold War is over. 27 Colonel Patenaude appears to realize<br />

that a transformed security environment requires changes in<br />

how the military provides for the national security. Though<br />

he cannot foresee the precise future of the U.S. nuclear program,<br />

he does understand that an upgrade will be required to<br />

replace the outdated Minuteman III program. John Bolton,<br />

the Undersecretary of State for Arms Control and International<br />

Security, was quoted in Medalia’s report to Congress,<br />

“‘I think the nuclear arsenal is central to our ongoing security<br />

needs…where deterrence failed…we would certainly want an<br />

arsenal that was capable of being used and being used with<br />

effectiveness.’” 28 Mr. Bolton’s quote supports Colonel Patenaude’s<br />

judgment that it is necessary to begin conceptualizing a<br />

new nuclear agenda.<br />

85<br />

A key element of any research and development<br />

program involves vigorous testing of the findings. Unfortunately,<br />

there is still a taboo on nuclear testing in the <strong>United</strong><br />

<strong>States</strong> and in the international community. There are three<br />

main nuclear laboratories in the U.S. including Los Alamos<br />

National Laboratory in New Mexico, Lawrence Livermore<br />

National Laboratory (LLNL) in California, and Nevada<br />

Test Site (NTS) outside of Las Vegas. Testing today consists<br />

mainly of high explosives and non-fissile materials. At LLNL,<br />

depleted uranium-238 (D38) is used for testing because it<br />

lacks the ability to sustain a nuclear chain reaction. President<br />

George H. W. Bush put an end to nuclear tests at NTS<br />

in 1992. 29 The current Bush administration, however, has<br />

expressed interest in beginning nuclear tests, since it would<br />

assist in evaluating new nuclear programs while examining<br />

the functionality of our current arsenal. A key component<br />

of testing is the loss of expertise in the field. The declining<br />

number of nuclear physicists responsible for America’s current<br />

weapons is leaving very little expertise in the field.<br />

Although Congress has approved President Bush’s<br />

proposal to reduce the preparation time required to begin<br />

nuclear testing at NTS, many believe that the U.S. is still a<br />

long way off from reinstituting tests. 30 In his interview, Robinson<br />

said, “I can categorically state that no one is proposing<br />

returning to nuclear testing.” 31 This interview occurred<br />

in August of 2003, and since that time, President Bush has<br />

worked with Congress to gradually introduce the idea of<br />

nuclear testing. This contradicts what former Secretary of<br />

State Colin Powell said that same month: “The President has<br />

no intention of resuming nuclear tests, and there is no need<br />

for us to do so.” 32<br />

This leads to some confusion as former Secretary<br />

Powell is assuring the American people that there is no reason<br />

for testing to resume, while President Bush is lobbying Congress<br />

for quicker preparation time for testing. Kelly and<br />

Oelrich believe that the constant upkeep and inspections of<br />

the U.S. nuclear arsenal has removed any reason for our current<br />

weapons to be tested. 33 Senator Jon Kyl, chairman of<br />

the Subcomittee on Technology, Terrorism, and Homeland<br />

Security, disagrees and believes we should resume nuclear<br />

tests: “ ‘We’ve had a self-imposed moratorium on testing.<br />

Has it stopped other countries [North Korea and Iran]? No.<br />

It shows a failed strategy.’ ” 34 Senator Kyl’s comments show<br />

a possible reason for ending the tests in the 1990s. The<br />

U.S. ended testing on its own, without requests or international<br />

pressures. A possible reason, according to Senator<br />

Kyl, was to set an example for the rest of the world. It seems<br />

that he believes the U.S. hoped that ending its own nuclear<br />

tests would convince other nations to follow suit. Most the<br />

nations throughout the world did exactly that. Other nations


such as Pakistan, India, North Korea, and Iran did not, and<br />

now they pose legitimate threats to our national security.<br />

The creation of a new nuclear program for the<br />

<strong>United</strong> <strong>States</strong> is a hotly debated topic among experts in the<br />

government, military, and civilian world. Several civilians,<br />

along with a number of Democratic members of Congress<br />

including Senators Feinstein and Kennedy, believe that the<br />

current nuclear program adequately provides for our national<br />

security. They see a revived testing and development program<br />

as an unnecessary expenditure. Much of the civilian opposition<br />

comes from a belief that the mini-nukes are not militarily<br />

feasible. Opponents make strong arguments that new weapons<br />

will not succeed in minimizing collateral damage. Using<br />

the evidence provided by tests of EPWs, they claim that a<br />

nuke detonated in a shallow part of the ground will spread<br />

radioactive dust killing thousands of innocent people. Those<br />

in favor of a new nuclear program realize that the current<br />

system is outdated and will not work to deter rogue states<br />

and non-state actors. Medalia and Robinson have good arguments<br />

for strengthening all “bunker-busting” casings for all<br />

types of warheads. This will allow the military to remain flexible<br />

and have both nuclear and conventional weapons at its<br />

disposal. Unfortunately, there seems to be only two extremes.<br />

Either we keep our current nuclear capabilities or we go completely<br />

to mini-nukes. Colonel Patenaude appears to have the<br />

best outlook, as he is trying to gather a number of ideas in<br />

order to determine the best way to upgrade the U.S. nuclear<br />

arsenal.<br />

THESIS BODY<br />

Background Information<br />

What first began as a scientific discovery has now<br />

become the source of the most powerful weapons on earth.<br />

In the early 1940s, few realized the intensity of the energy<br />

released through the splitting of atoms. It was this energy<br />

that helped bring the Second World War to an end. Though<br />

there are considerable political concerns about the use of<br />

nuclear weapons, the fact remains that they are still the most<br />

lethal component in the <strong>United</strong> <strong>States</strong> arsenal, and they are<br />

highly sought by rogue nations and terrorist organizations.<br />

The U.S. has consistently sought to halt the proliferation<br />

of nuclear weapons throughout the world, but the ability to<br />

detonate an atomic bomb has become an indication of a technologically<br />

advanced culture. The inherent problem that the<br />

U.S. now faces is how to maintain a credible defense posture<br />

with nuclear weapons while still attempting to keep other<br />

nations from developing their own nuclear programs.<br />

Before undertaking a discussion about the future<br />

of the U.S. nuclear armament, it is essential to look at how<br />

U.S. nuclear policy has developed over the past sixty years.<br />

86<br />

The U.S. nuclear weapons program began when intelligence<br />

reports raised concerns over the possibility of Nazi Germany<br />

developing an atomic weapon. President Franklin Roosevelt<br />

authorized the creation of the Manhattan Project which was<br />

the U.S. program responsible for the research and development<br />

of a nuclear weapon. In early 1943, J. Robert Oppenheimer,<br />

the civilian director of the program, and Major General<br />

Leslie R. Groves, the military commander, founded Los<br />

Alamos National Laboratory in New Mexico. 35 The sole purpose<br />

of this laboratory was to create and test a nuclear weapon<br />

for use against U.S. adversaries in World War II.<br />

The world’s first nuclear weapon was detonated at<br />

Trinity Test Site in New Mexico on the morning of 16 July,<br />

1945. 36 This area of theoretical physics had now become an<br />

astonishing reality. None who witnessed the explosion were<br />

quite prepared for what they saw and felt. One scientist at<br />

the base camp, ten miles away from the explosion said, “ ‘The<br />

thing that got me was not the flash but the blinding heat of a<br />

bright day on your face in the cold desert morning.’ ” 37 This<br />

successful test proved the incredible power contained in a fissile<br />

weapon, and convinced President Harry Truman that a<br />

nuclear weapon could be employed effectively in the Pacific<br />

Theatre.<br />

Now that a nuclear weapon had become a reality,<br />

President Truman faced a daunting moral and political decision<br />

– whether or not the U.S. should use an atomic bomb in<br />

order to achieve a military victory. A weapon of this magnitude<br />

would indiscriminately kill tens of thousands of Japanese<br />

citizens within a matter of seconds. Thousands more would<br />

suffer the effects of radiation exposure in the following weeks.<br />

There were several contributing factors to President Truman’s<br />

decision. An invasion of the Japanese home islands would be<br />

costly both in American and Japanese lives, and in time. The<br />

Soviets were now turning their attention towards the Pacific<br />

Theatre, and President Truman did not want them to enter<br />

the war against Japan. The Japanese had made it clear that<br />

they would not surrender unconditionally. Finally, there was<br />

a moral question about slaughtering innocent Japanese civilians.<br />

The U.S. gave the Japanese one final chance at surrender<br />

when it issued the Potsdam Declaration which called<br />

for “…Japan to proclaim now the unconditional surrender of<br />

all Japanese armed forces…,” or it would face “prompt and<br />

utter destruction.” 38 Japan did not accept the conditions of<br />

the declaration, and elected to continue fighting. Then Secretary<br />

of War Henry L. Stimson recommended to President<br />

Truman that they use the atomic bomb in the hopes of forcing<br />

Japan to surrender. Stimson later recalled:<br />

My chief purpose was to end the war in victory<br />

with the least possible cost in the lives


of the men in the armies which I had helped<br />

to raise. In the light of the alternatives<br />

which, on a fair estimate, were open to us<br />

I believe that no man, in our position and<br />

subject to our responsibilities, holding in<br />

his hands a weapon of such possibilities for<br />

accomplishing this purpose and saving those<br />

lives, could have failed to use it and afterwards<br />

looked his countrymen in the face. 39<br />

Following the advice of his Secretary of War and military<br />

advisors, President Truman gave the order to employ the use<br />

of a nuclear weapon against Japan.<br />

On 6 August 1945, the Enola Gay B-29 Superfortress<br />

dropped the atomic bomb nicknamed “Little Boy” on<br />

the city of Hiroshima. “Little Boy” was a uranium-fueled<br />

device that was considered to be so reliable that it was never<br />

tested prior to its use in Japan. 40 Three days later, a second<br />

bomb was dropped on the city of Nagasaki. This bomb was<br />

an exact replica of the uranium device tested at Trinity. The<br />

use of these weapons in Japan was the first and only time in<br />

world history that atomic bombs have been employed in a<br />

combat situation. Though the necessity for their use is still<br />

a highly controversial topic even today, the fact remains that<br />

it did force Japan to accept an unconditional surrender and<br />

promptly end World War II.<br />

Though nuclear weapons can be credited with ending<br />

one great struggle, they can almost certainly be cited for<br />

the creation of the ensuing confrontation -- the Cold War.<br />

During the years after World War II and until the collapse<br />

of the Soviet Union, the true mark of a world power was the<br />

possession of a nuclear arsenal. Of course, the only way to<br />

increase the number and effectiveness of such weapons was by<br />

means of an intense schedule of testing. Between 1957 and<br />

1992, Nevada Test Site alone conducted 825 underground<br />

nuclear tests. 41 This does not even take into account the<br />

number of tests that occurred in the atmosphere and at the<br />

various test facilities in the South Pacific. Testing became<br />

even more intense with the creation of thermonuclear or<br />

fusion devices which had yields in the megaton range. In late<br />

1961, the Soviet Union detonated a 50-megaton thermonuclear<br />

device, which still remains the largest atomic weapon<br />

ever tested. 42 The high tempo of testing by both the U.S. and<br />

the U.S.S.R. during the early years of the Cold War encouraged<br />

the accumulation of a vast number of nuclear weapons.<br />

The unfortunate result was that each nation had the power<br />

to destroy the world several times over. Since the end of the<br />

Cold War, both nations have had to face the reality of finding<br />

ways to reduce the number of nuclear weapons in attempts to<br />

promote non-proliferation.<br />

87<br />

The nuclear posture of the U.S. throughout much<br />

of the Cold War was based on the idea of Mutually Assured<br />

Destruction (MAD). Since both nations had a strong nuclear<br />

capability, an attack by one country would almost insure the<br />

destruction of both countries. Deterrence was the main goal<br />

of a strong nuclear arsenal. Due to the U.S. nuclear triad<br />

of bombers, ballistic submarines and intercontinental ballistic<br />

missiles, it was impossible for the Soviet Union to be<br />

prepared for all possible strikes. The same held true for the<br />

Soviet Union’s offensive capabilities against the U.S. The fear<br />

of retaliation was the single-most important aspect of each<br />

nation’s nuclear strategy during the Cold War.<br />

Though maintenance of a strong and determined<br />

image was important during the Cold War, there were several<br />

attempts during these years to begin reducing the frequency<br />

of tests. This legislation was important because it has helped<br />

shape the current U.S. nuclear strategy. In October of 1963,<br />

the U.S. passed the Partial Test Ban Treaty which terminated<br />

nuclear tests aboveground, underwater, and in outer<br />

space. 43 In the following years, a number of other treaties<br />

were passed to further reduce the impacts of testing on the<br />

environment, and to help aid the reduction of each nation’s<br />

nuclear arsenals. Today, the U.S. is still faced with the difficult<br />

stance of attempting to reduce nuclear proliferation<br />

while still maintaining a legitimate nuclear presence in order<br />

to deter potential adversaries. In 1993, Congress passed the<br />

Spratt-Furse ban on the research and development of a new<br />

small-scale nuclear weapon with a yield of five kilotons or less;<br />

this legislation placed additional restrictions to the nuclear<br />

testing moratorium enacted by President George H. W. Bush<br />

that same year. 44 This ban was repealed in 2003 as President<br />

George W. Bush called for an investigation into the practicality<br />

of a new low-yield earth penetrating nuclear weapon to<br />

defeat hardened underground facilities.<br />

Presentation of the Argument<br />

During the Cold War, the strategy of deterrence<br />

worked in the sense that a nuclear war never occurred<br />

between the U.S. and the Soviet Union. Deterrence worked<br />

because each nation apparently was unwilling to accept the<br />

destruction of major cities and the deaths of tens of thousands<br />

of innocent civilians. Yet today the strategy of deterrence<br />

seems archaic with little prospect for influencing international<br />

behavior. Most nations are aware that the U.S. would be<br />

hesitant if not completely unwilling to use a nuclear weapon<br />

against an adversary simply because of the political turmoil<br />

that would ensue. The Cold War presented the U.S. with a<br />

single major enemy that happened to be a sovereign nation.<br />

The ongoing campaigns in the Middle East, suggest today’s<br />

enemies are much harder to identify. Therefore, it is under-


standable why the <strong>United</strong> <strong>States</strong> is now rethinking its nuclear<br />

posture. Weapons with yields in the high kiloton and megaton<br />

range simply no longer serve a valid purpose in today’s<br />

security environment.<br />

In order to modernize the U.S. nuclear inventory, the<br />

Bush administration tasked the Departments of Defense and<br />

Energy to evaluate the effectiveness of low-yield nuclear weapons.<br />

With the repeal of the Spratt-Furse ban in 2003, these<br />

departments quickly began researching potential replacements<br />

to the nation’s traditional nuclear force. The most popular<br />

concept is the Robust Nuclear Earth Penetrator (RNEP)<br />

bomb, and the administration plans on spending $484.7 million<br />

in research and development over the next four years. 45<br />

The idea of a RNEP was born out of the emerging threat of<br />

hardened underground facilities and the weapons of mass<br />

destruction that were potentially stored inside. Theoretically,<br />

a RNEP would burrow into the ground and detonate in close<br />

proximity to the shelter. The shock of a nuclear explosion<br />

would destroy the facility, while the resultant intense heat and<br />

radiation would destroy the chemical and biological weapons<br />

stored inside. 46 The relatively low yield of the weapon (5 kilotons<br />

or less) would hypothetically allow the surrounding soil<br />

to absorb the radioactive fallout and prevent a hazard to the<br />

local population. The RNEP concept is very simple, and in<br />

theory, appears to be a suitable replacement to the high-yield<br />

weapons in the current inventory. However, these weapons<br />

have several drawbacks and are not suitable for employment<br />

in any situation. The U.S. should cease the research of these<br />

devices and consider non-nuclear alternatives to defeat hardened<br />

underground facilities.<br />

The physics of a nuclear earth-penetrator is the first<br />

area of concern when considering its reliability. There are two<br />

components of an earth-penetrating weapon: the warhead and<br />

the weapon casing. The entire unit must travel fast enough<br />

to penetrate deep into the ground. However, the unit cannot<br />

travel too fast, or the weapon casing may become deformed<br />

and potentially damage the warhead. Given the relatively<br />

fragile nature of nuclear weapons, it is essential that the warhead<br />

remain intact or the weapon could fail to detonate.<br />

The U.S. <strong>Air</strong> <strong>Force</strong> conducted a test in 2003 to<br />

examine the penetration capabilities of current systems. A<br />

B-2 Stealth Bomber dropped an unarmed B61-11 earth<br />

penetrating bomb from an altitude of 40,000 feet and it was<br />

able to penetrate the earth only to a depth of twenty feet<br />

deep. 47 This test only proved what many physicists already<br />

had hypothesized about penetrating the earth’s soil. Earthpenetrators<br />

get their energy from gravity. They are simply<br />

dropped from an aircraft at a high altitude and depend upon<br />

the acceleration of gravity to give them a high enough rate of<br />

speed to burry into the ground. Upon impact, most gravity-<br />

88<br />

dependent bombs have speeds around 450 meters per second.<br />

This can be doubled by adding rocket propulsion and would<br />

increase the penetrating depths of the weapon by 75 percent<br />

in hard rock and almost 1,000 percent in soft soil. 48 Though<br />

a simple increase in speed seems to be the logical answer,<br />

the strength of the bomb casing represents another important<br />

consideration. It is simple enough to add a propulsion<br />

device to the back of a bomb, but that creates a risk of hitting<br />

the surface at such a high rate of speed that the weapon is<br />

destroyed almost immediately. Robert W. Nelson of Princeton<br />

University has studied the strengths of various materials<br />

that can be used for earth-penetrating weapons. According<br />

to his research, he found that twenty meters of penetration<br />

may be a theoretical maximum. 49 Thus, there is a strict balance<br />

between speed and strength for these weapons. If twenty<br />

meters is in fact the maximum depth of penetration, these<br />

weapons are entirely infeasible.<br />

The threat of nuclear fallout, which will be discussed<br />

later, is simply too great if a nuclear device were to be detonated<br />

at a depth of twenty meters. Moreover, underground<br />

facilities could be located several hundred feet underground.<br />

If a nuclear weapon, even at a low-yield, is detonated at<br />

twenty meters or less, there is a strong possibility that the<br />

facility will not even receive damage. The shock of the blast<br />

would simply reverberate off of the ground into the atmosphere.<br />

The only answer to this problem would be to increase<br />

the yield of the weapon in order to ensure the destruction<br />

of the facility. But this would only defeat the purpose of a<br />

low-yield RNEP, and is effectively the same idea as detonating<br />

a nuclear weapon on the surface. The physics of this type<br />

of weapon is a major limiting factor in its usefulness. An<br />

increase in speed allows a deeper penetration, but there are no<br />

existing materials strong enough to withstand such an increase<br />

in velocity. A small-yield detonation will likely not achieve<br />

the objective of destroying an underground facility if it can<br />

only bury twenty meters into the soil, and larger yields would<br />

only cause a great deal of radioactive fallout.<br />

The high risk of radioactive fallout is quite possibly<br />

the strongest argument against the military use of nuclear<br />

earth-penetrators. Proponents of these weapons hypothesize<br />

that the depth and the low-yield of the nuclear explosion<br />

would allow the radiation to be absorbed by the surrounding<br />

soil. As discussed above, the depth of the explosion will be<br />

relatively shallow. In order to completely contain the radiation<br />

from a one-kiloton weapon, an explosion would need<br />

to be at least ninety meters underground. 50 Both scientific<br />

studies and actual tests make clear that this depth is currently<br />

unobtainable by an airdropped bomb or missile. Instead of<br />

absorbing the shock and fallout, the surrounding soil would<br />

most likely be thrown into the atmosphere creating an envi-


onmental hazard and risking the lives of those in the surrounding<br />

area.<br />

The exact amount of fallout is difficult to predict, but<br />

the existence of fallout after the use of a RNEP is almost certain.<br />

Regardless of how deep the bomb is able to penetrate,<br />

it is going to leave a trail of open space in the soil through<br />

which fallout can escape. 51 Once radioactive fallout escapes<br />

into the atmosphere, there is little that can be done to protect<br />

local populations. The situation would deteriorate even<br />

further if winds began spreading the fallout over a wide area.<br />

The following circumstances give an idea of the problems<br />

associated with radioactive fallout:<br />

Consider a one-kiloton bunker buster bomb<br />

set off at relatively shallow depth – less than<br />

10 meters – in wind conditions averaging<br />

10 kilometers an hour. Although the numbers<br />

will vary slightly depending on detonation<br />

depth, geology and weapon details, the<br />

basic results will be similar. If it takes six<br />

hours for people in the vicinity to evacuate,<br />

then calculations show that nearly everyone<br />

downwind of the blast within approximately<br />

five kilometers would still be killed by<br />

fallout, and half the inhabitants eight kilometers<br />

away would die. Only if the nearest<br />

population center is 10 or more kilometers<br />

downwind will the fallout lead to few if any<br />

rapid fatalities. 52<br />

America’s enemies are well aware of U.S. policies on<br />

collateral damage. The American military does everything<br />

within its power to ensure there are no unnecessary casualties<br />

to noncombatants. Military commanders will always have<br />

a legal advisor to evaluate potential targets and ensure that<br />

operations abide by international laws and treaties. Technology<br />

is used to limit the accidental deaths of innocent civilians.<br />

Based on the above situation, the use of a RNEP defies the<br />

very principles of war that the U.S. military seeks to embrace.<br />

The military cannot choose when and where it will recognize<br />

the protections afforded to noncombatants. If a nuclear<br />

option creates too much of a danger to surrounding populations,<br />

then the military must find a way to employ conventional<br />

munitions. U.S. enemies are well aware of its stance on<br />

collateral damage. It is therefore logical to surmise that these<br />

enemies will place underground facilities in highly populated<br />

areas. A nuclear weapon, regardless of yield, would not be a<br />

viable option in these situations.<br />

Aside from the concern for collateral damage, radioactive<br />

fallout from a RNEP could cause further complications<br />

for military operations. The U.S. <strong>Air</strong> <strong>Force</strong>, in particular, is<br />

89<br />

concerned with Bomb Damage Assessment (BDA). This is<br />

and has been a critical part of airpower doctrine since World<br />

War II. The <strong>Air</strong> <strong>Force</strong> must know the effectiveness of its<br />

strikes against an enemy target so that it can make appropriate<br />

plans for future attacks. Since the RNEP is an airdropped<br />

weapon, it is likely that the <strong>Air</strong> <strong>Force</strong> will be the primary<br />

branch to use these weapons. BDA will be extremely difficult<br />

if RNEPs are utilized against an enemy target. Surveillance<br />

from space-based satellites will be of little use because they<br />

will not be able to see deep enough into the ground to assess<br />

the damage to enemy facilities. Fallout will make it extremely<br />

dangerous if not completely impossible for military personnel<br />

to examine the facility. The area will likely be closed off to<br />

any type of military operations due to the danger to our own<br />

forces. The RNEP was designed to give the military additional<br />

options in dealing with hard-to-reach targets, but the<br />

negative repercussions are numerous and have the potential to<br />

actually hinder operations.<br />

Though not the primary focus of this research, some<br />

attention must be given to the matter of politics, albeit only<br />

as it applies to military operations. The U.S. has taken a firm<br />

stance in preventing the proliferation of nuclear weapons<br />

throughout the globe. The U.S. military plays a crucial role<br />

in this area of international relations. Regional combatant<br />

commanders are often the primary ambassadors to other<br />

countries on military matters. Nuclear weapons are a threat<br />

to the national security of the <strong>United</strong> <strong>States</strong>, and therefore<br />

their proliferation is a key concern of the Department of<br />

Defense. Thus it seems ironic that while the DoD is attempting<br />

to stop the spread of nuclear weapons abroad, it is pushing<br />

the development of a new generation of nuclear weapons<br />

at home. These actions severely diminish the political credibility<br />

of the U.S. in the international arena. The U.S. wants<br />

to retain, and indeed expand its own nuclear arsenal, while<br />

proclaiming to other nations the importance of nuclear nonproliferation.<br />

53 In the end, this hypocrisy may only serve to<br />

place more stress on the American military. Other nations<br />

will likely view the U.S. development of RNEPs as a threat<br />

which, in turn, could cause some heretofore “nuclear free”<br />

nations to begin development of their own nuclear arsenals.<br />

If RNEPs are not the answer to destroying underground<br />

storage facilities, the question then becomes how<br />

can the U.S. combat this emerging threat? Advocates of the<br />

RNEP state that there are no conventional alternatives and<br />

that the only way to get an explosion big enough to destroy<br />

an underground facility is to use a nuclear device. But critics<br />

counter, “… if a bomb can be delivered close to its target<br />

bunker, the explosive power of a nuclear warhead may be<br />

superfluous; a conventional warhead will usually do.” 54 The<br />

key issue, therefore, is how to get any weapon close enough to


the target so that it can inflict enough damage. The RNEP<br />

is the convenient option for the military right now. It does<br />

not need to get very close in order to inflict damage simply<br />

because the nuclear explosion will likely be large enough to<br />

cause damage to the facility from a relatively large distance.<br />

The consequences of using the RNEP far outweigh<br />

the benefits. There are ways to destroy or incapacitate these<br />

facilities without using the RNEP. One concept is the Deep<br />

Digger, which would bore into the ground and then deliver<br />

the warhead once it was in close proximity to the target. 55<br />

Though this would take longer than the simple detonation<br />

of a RNEP, it would not produce the negative effects and<br />

resultant controversy that look to come with using a nuclear<br />

weapon. Another idea is to hit the access points to the facility.<br />

Of course, the obvious problem is finding these points,<br />

but it is also difficult to find underground facilities in the first<br />

place. Conventional bombs or ground forces could seal off or<br />

destroy the access points to the facility, thereby neutralizing<br />

their effectiveness. A final option would be kinetic-energy<br />

space weapons. Sometimes called “Rods from God”, the basic<br />

principle of these weapons is based upon high rates of speed.<br />

After entering the atmosphere from an orbiting space platform,<br />

these weapons, in theory, can hit a target with remarkable<br />

precision and devastation. It would be interesting to<br />

investigate the feasibility of using these weapons on hardened<br />

underground facilities.<br />

With so many viable conventional options, it is<br />

unclear as to why the U.S. continues to make the RNEP such<br />

a high priority. C. Paul Robinson, the aforementioned director<br />

of Sandia National Laboratory, has stated, “Our primary<br />

focus is still to accomplish this [destruction of hardened<br />

underground facilities] with conventional weapons, and we<br />

work hard on that problem. Nuclear weapons remain a blunt<br />

instrument of last resort.” 56 If this is truly the case, why does<br />

it appear that the RNEP is the only weapon the DoD and<br />

DoE are researching? It is no secret that the current U.S.<br />

nuclear inventory is out-dated. However, this is not an excuse<br />

for developing a system that will turn out to be as equally<br />

useless. More time, effort, and funding should be dedicated<br />

to the research of non-nuclear options. The U.S. nuclear<br />

arsenal needs to be modernized, but that does not necessarily<br />

mean that it needs to be modernized with additional nuclear<br />

weapons. Perhaps a strong conventional force can offset the<br />

reliance on nuclear weapons. The consequences of using a<br />

nuclear weapon, whether it be a RNEP, or a traditional highyield<br />

weapon, are simply too great. For now, if it still provides<br />

a welcome measure of deterrence, the current nuclear arsenal<br />

should be retained. But with a nod to the “iron law of unintended<br />

consequences,” there is no need to exacerbate political<br />

and military problems by developing a new generation of<br />

90<br />

nuclear weapons.<br />

CONCLUSION<br />

Summary of Findings<br />

Military history is filled with examples of how one<br />

side must adapt to the changes created by an adversary. It is<br />

this adaptation that creates new doctrine, new procedures,<br />

and new technology. The U.S. is currently faced with a<br />

change in the nature of its adversaries. The U.S. has long<br />

depended upon its ability to fly over enemy territory and<br />

destroy high-value targets using various methods of airpower.<br />

Now new enemies have devised new technologies for negating<br />

U.S. airpower. Placing high-value assets underground<br />

has effectively neutralized the U.S. ability to reach important<br />

enemy targets. The U.S. must adapt to this new situation.<br />

Conventional “bunker buster” bombs have been highly effective<br />

against exposed targets in Iraq and Afghanistan. However,<br />

these weapons are of little use against deeply buried<br />

targets. Believing it necessary to update the U.S. nuclear<br />

posture and to have the capability to strike at hardened facilities<br />

underground, the Bush administration has called for the<br />

research into a robust nuclear earth-penetrating bomb.<br />

The Cold War is over, and the idea of nuclear deterrence<br />

no longer appears to be a credible threat to a new generation<br />

of U.S. enemies. The threat of nuclear retaliation certainly<br />

did not hinder attacks on New York City and the Pentagon<br />

in 2001. Nor has nuclear deterrence restrained North<br />

Korean dictator Kim Jong Il from testing ballistic missiles and<br />

developing weapons grade fissile material. America’s nuclear<br />

posture is no longer a credible threat to its adversaries. The<br />

world is very much aware that there are almost no circumstances<br />

in which the U.S. would be willing to kill thousands<br />

of innocent people by using a nuclear device. Therefore, it<br />

is essential that the <strong>United</strong> <strong>States</strong> develop a new posture to<br />

thwart an attack by its enemies.<br />

The RNEP has become the favored weapon for modernizing<br />

the U.S. nuclear inventory and for serving as a deterrent<br />

to underground facilities. Proponents argue that it will<br />

bury deep into the soil and that the surrounding earth will<br />

absorb the fallout so as not to endanger local populations. By<br />

all indications, this simply is not true. There are several problems<br />

with the RNEP that make it a poor choice for a future<br />

U.S. weapon.<br />

First, the basic physics of this weapon suggest that<br />

it will not do in practice what it is expected to do in theory.<br />

There are no materials strong enough to withstand the forces<br />

of speeds necessary to penetrate deeply into the earth. The<br />

bomb casing will likely disintegrate on contact with the<br />

ground and render the warhead useless. Studies have shown<br />

that the limit of penetration is around twenty meters, which


is not nearly deep enough for the earth to absorb the fallout.<br />

Furthermore, there is a strong possibility that if the facility<br />

were buried deep enough, the shock of the bomb would never<br />

even reach the target. This would make the bomb completely<br />

ineffective. Development of this weapon becomes pointless if<br />

it cannot achieve its stated objectives.<br />

Second, the risk of radioactive fallout associated with<br />

the RNEP is too great. Regardless of how deep the weapon is<br />

able to penetrate, there will be a trail that the fallout can trace<br />

back into the atmosphere. The U.S. military prides itself<br />

on its ability to hit targets with precision and accuracy with<br />

little collateral damage. The RNEP would create a dramatic<br />

end to this selective targeting. Even if the RNEP successfully<br />

destroyed an enemy bunker, the negative impacts of the bomb<br />

would overshadow its accomplishments. These targets are not<br />

worth the deaths of thousands of innocent civilians. Though<br />

the short term effects of radiation exposure would be easy to<br />

track, it would be almost impossible to determine precisely<br />

the long term consequences on the local population if an<br />

RNEP was detonated in theatre. The threat not only affects<br />

civilians, but also personnel in the U.S. military. Soldiers<br />

could very well be in the path of the prevailing winds after<br />

detonation and therefore be exposed to lethal doses of radiation.<br />

The high costs of the RNEP with respect to fallout far<br />

outweigh the potential benefits.<br />

Third, the research and development of the RNEP<br />

can actually hinder military operations throughout the world.<br />

The DoD plays an essential role in combating nuclear proliferation.<br />

For the U.S. to pursue development of new nuclear<br />

weapons while attempting to halt the spread of nuclear<br />

weapons elsewhere is nothing short of hypocrisy. The U.S.<br />

strives to be an example to other nations. Accordingly, U.S.<br />

attempts to increase its own arsenal will only encourage other<br />

nations to do the same. This creates increased security risks<br />

for DoD personnel stationed abroad, and can hinder military<br />

diplomacy between U.S. regional commanders and our allies.<br />

Finally, the U.S. has not put enough effort into<br />

studying conventional alternatives to the RNEP. There are<br />

many theories about how best to strike underground facilities,<br />

but the DoD and DoE seem to be focused solely on<br />

the RNEP. Conventional weapons will never have the same<br />

explosive yield as nuclear devices, but a nuclear explosion may<br />

not be necessary. The funding allotted by Congress for the<br />

RNEP over the next four years could be better spent on developing<br />

conventional means of destroying hardened shelters.<br />

The research in this area may very well lead to the realization<br />

that a strong conventional force is the answer to the question<br />

of the current nuclear arsenal.<br />

Direction for Future Research<br />

91<br />

This research was narrowly focused on the military<br />

use of a robust nuclear earth-penetrator. There are several<br />

related matters that could be examined in greater detail. The<br />

question of using a nuclear weapon in combat is fraught with<br />

political controversy. Many nations have a problem with the<br />

U.S. simply considering the use of these weapons. What type<br />

of response can the U.S. expect from the international community<br />

if it did indeed use the RNEP? RNEP employment<br />

could easily lead to a global arms race, and if the U.S. used<br />

these devices, other nations would likely be more willing to<br />

use nuclear weapons as well. The political turmoil could be<br />

expected to have domestic consequences as well. Any Administration<br />

that actively pursued development of RNEPs could<br />

expect to face a great deal of opposition from the American<br />

public.<br />

Additional research would also be useful regarding<br />

the feasibility of the conventional options mentioned earlier.<br />

For example, what sort of studies are being conducted<br />

on the Deep Digger? This weapon system may not have<br />

the same destructive force as the RNEP, but if it can place a<br />

conventional weapon closer to the target, a lesser amount of<br />

force may suffice. Finally, the concept of kinetic-energy space<br />

weapons, while still in its infancy, is quickly gaining support.<br />

The politics of space weaponization alone could develop into<br />

a broad study, but specifically, would space-based weapons<br />

have the capability to destroy an underground target? If so,<br />

how would these weapons compare to other conventional<br />

systems? Regardless of what type of weapon is used, we ultimately<br />

will depend on the quality of our intelligence. In that<br />

respect, it would be useful to have studies that can help us<br />

develop methods for identifying underground facilities and,<br />

in particular, the key access points to such facilities.<br />

The questions proposed above go beyond the scope<br />

of this paper. But it seems clear that answers to these questions<br />

will only serve to broaden our understanding of what<br />

has been discussed here.<br />

Notes<br />

1. Robert W. Nelson, “Low-Yield Earth-Penetrating<br />

Nuclear Weapons,” Journal of the Federation of American Scientists<br />

54, (2001): 1-8.<br />

2. Ben Friedman. 2002. <strong>United</strong> <strong>States</strong> Nuclear Arsenal<br />

[on-line]. Washington, D.C.: Center for Defense Information;<br />

available from http://www.cdi.org/issues/nukef&f/<br />

database/nukearsenals.cfm#<strong>United</strong>%20<strong>States</strong>; Internet;<br />

accessed 30 October 2003.<br />

3. John Swomley, “World Domination via Nuclear


Weapons,” The Humanist 63, (2003): 35.<br />

4. Colorado Springs Gazette, 27 September 2003.<br />

5. Wayne LeBaron, America’s Nuclear Legacy ( New<br />

York: Nova Science Publishers, 1998), 7.<br />

6. Ibid, 10.<br />

7. Ibid.<br />

8. Ibid, 11.<br />

9. Ibid, 6.<br />

10. James Kitfield, “The Pros and Cons of New<br />

Nuclear Weapons,” National Journal 35 (2003): 2566.<br />

11. Ibid.<br />

12. Robert W. Nelson, “Low-Yield Earth-Penetrating<br />

Nuclear Weapons,” Journal of the Federation of American Scientists<br />

54, no. 1 (2001): 1-8.<br />

13. Ibid.<br />

14. Ibid.<br />

15. Henry Kelly and Ivan Oelrich. 2003. Will New<br />

Nuclear Weapons Make us More Secure? [on-line]. Washington,<br />

D.C.: Federation of American Scientists; available from<br />

http://www.fas.org/ssp/docs/030916-newnukes; Internet;<br />

accessed 30 October 2003.<br />

16. Ibid.<br />

17. Swomley, “World Domination”, 35.<br />

18. Jonathan Medalia. 2003. Nuclear Earth Penetrator<br />

Weapons [on-line]. Washington, D.C.: Federation of<br />

American Scientists; available from http://www.fas.org/spp/<br />

starwars/crs/RS20834.pdf; Internet; accessed 30 October<br />

2003.<br />

19. Ibid.<br />

20. Ibid.<br />

21. Kitfield, “The Pros and Cons”, 2566.<br />

92<br />

22. Medalia, Penetrator Weapons.<br />

23. Kitfield, “The Pros and Cons”, 2566.<br />

24. Medalia, Penetrator Weapons.<br />

25. Andrew Koch. 2003. US Considers Major<br />

Changes to Strategic Weapons [on-line]. Alexandria, VA:<br />

Jane’s Defence Weekly; available from http://ebird.dtic.<br />

mil/Sept2003/s20030915217115.html; Internet; accessed 10<br />

October 2003.<br />

26. Kelly, More Secure.<br />

27. Colorado Springs Gazette, 27 September 2003.<br />

28. Medalia, Penetrator Weapons.<br />

29. Julain Coman. 2003. Pentagon Wants ‘Mini-<br />

Nukes’ to Fight Terrorists [on-line]. Washington, D.C.:<br />

London Sunday Telegraph; available from http://ebird.afis.<br />

osd.mil/ebfiles/s20031027228041.html; Internet; accessed 30<br />

October 2003.<br />

30. Ibid.<br />

31. Kitfield, “The Pros and Cons”, 2566.<br />

32. Zhu Iizhen. 2003. US Plots to Develop Small<br />

Nukes [on-line]. Beijing, China: People’s Daily; available<br />

from http://english.peopledaily.com.cn/200308/13/<br />

eng20030813_122264.shtml; Internet; accessed 30 October<br />

2003.<br />

33. Kelly, More Secure.<br />

34. Coman, Fight Terrorists.<br />

35. Richard Rhodes, The Making of the Atomic<br />

Bomb (New York: Simon & Schuster, 1986), 451.<br />

36. Ibid, 667.<br />

37. Ibid, 673.<br />

38. Ibid, 692.<br />

39. Ibid, 696.<br />

40. Kevin O’Neill, “Building the Bomb,” in Atomic


Audit, ed. Stephen I. Schwartz<br />

(Washington, D.C.: Brookings Institution Press, 1998), 58.<br />

41. Ibid, 83.<br />

42. Ibid, 78.<br />

43. Ibid, 83.<br />

44. Michael Levi, “Nuclear Bunker Buster Bombs,”<br />

Scientific American 291 (Aug 2004): 74.<br />

45. Ibid, 66.<br />

46. Ibid.<br />

47. Nelson, 2.<br />

48. Levi, 67.<br />

49. Ibid.<br />

50. Ibid.<br />

51. Ibid.<br />

52. Ibid.<br />

53. John Deutch, “A Nuclear Posture for Today,”<br />

Foreign Affairs 84 (Jan/Feb 2005): 51.<br />

54. Levi, 68.<br />

55. Ibid.<br />

56. Kitfield, “The Pros and Cons”, 2566.<br />

Bibliography<br />

Alexander, Brian, and Alistair Millar, ed. Tactical Nuclear<br />

Weapons. Washington, D.C.:<br />

Brasseys, Inc., 2003.<br />

Colorado Springs Gazette, 27 September 2003<br />

Coman, Julian. 2003. Pentagon Wants ‘Mini-Nukes’ to Fight<br />

Terrorists [on-line]. Washington,<br />

D.C.: London Sunday Telegraph; available from<br />

93<br />

http://ebird.afis.osd.mil/ebfiles/s20031027228041.<br />

html; Internet; accessed 30 October<br />

2003.<br />

Deutch, John. “A Nuclear Posture for Today.” Foreign Affairs<br />

84 (Jan/Feb 2005): 49-61.<br />

Freedman, Lawrence. The Evolution of Nuclear Strategy. New<br />

York: St. Martin’s Press, 1981.<br />

Gray, Colin S. Modern Strategy. Oxford: University Press,<br />

1999.<br />

Kellerhals, Merle D. 2003. Congress Agrees to Let Pentagon<br />

Study Low-Yield Nuclear<br />

Weapons [on-line]. Washington, D.C.: U.S. Department<br />

of State; available from<br />

http://usinfo.state.gov/topical/pol/terror/<br />

texts/03052300.htm; Internet; accessed 30<br />

October 2003.<br />

Kelly, Henry and Ivan Oelrich. 2003. Will New Nuclear<br />

Weapons Make us More Secure? [online].<br />

Washington, D.C.: Federation of American<br />

Scientists; available from<br />

http://www.fas.org/ssp/docs/030916-newnukes;<br />

Internet; accessed 30 October 2003.<br />

Kitfield, James. “The Pros and Cons of New Nuclear Weapons.”<br />

National Journal 35 (2003):<br />

2566.<br />

Koch, Andrew. 2003. US Considers Major Changes to Strategic<br />

Weapons [on-line].<br />

Alexandria, VA: Jane’s Defence Weekly; available<br />

from<br />

http://ebird.dtic.mil/Sept2003/s20030915217115.<br />

html; Internet; accessed 10 October<br />

2003.<br />

Levi, Michael. “Nuclear Bunker Buster Bombs.” Scientific<br />

American 291 (Aug 2004): 66-74.<br />

Iizhen, Zhu. 2003. US Plots to Develop Small Nukes [online].<br />

Beijing, China: People’s Daily;<br />

available from http://english.peopledaily.com.<br />

cn/200308/13/eng20030813_122264.shtml;<br />

Internet; accessed 30 October 2003.<br />

LeBaron, Wayne. America’s Nuclear Legacy. New York: Nova


Science Publishers, 1998.<br />

Medalia, Jonathan. 2003. Nuclear Earth Penetrator Weapons<br />

[on-line]. Washington, D.C.:<br />

Federation of American Scientists; available from<br />

http://www.fas.org/spp/starwars/crs/RS20834.pdf;<br />

Internet; accessed 30 October 2003.<br />

Nelson, Robert W. 2001. Low-Yield Earth-Penetrating<br />

Nuclear Weapons [on-line].<br />

Washington, D.C.: Federation of American Scientists;<br />

available from<br />

http://www.fas.org/faspir/2001/v54n1/weapons.htm;<br />

Internet; accessed 10 October 2003.<br />

Nuclear Weapon Testing [on-line]. Washington, D.C.: Federation<br />

of American Scientists;<br />

available from http://www.fas.org/nuke/intro/nuke/<br />

test.htm; Internet; accessed 10<br />

October 2003.<br />

O’Neill, Kevin. “Building the Bomb.” In Atomic Audit, ed.<br />

Stephen I. Schwartz. Washington,<br />

D.C.: Brookings Institution Press, 1998.<br />

Rhodes, Richard. The Making of the Atomic Bomb. New<br />

York: Simon and Shuster, 1986.<br />

Swomley, John. “World Domination via Nuclear Weapons.”<br />

The Humanist 63 (2003): 35.<br />

Titus, A. Costandina. Bombs in the Backyard: Atomic Testing<br />

and American Politics. Reno and<br />

Las Vegas: University of Nevada Press: 1986.<br />

94<br />

THE MYTH OF ISSUE NETWORKS:<br />

A REBUTTAL TO GIBSON AND SNIDER.<br />

BY<br />

William L. Wisehart<br />

In the article, Civil-Military Relations and the<br />

Potential to Influence: A Look a the National Security Decision-Making<br />

Process by Christopher Gibson and Don Snider,<br />

the issue of a crisis in civil-military relations is argued away<br />

as being a natural phenomena related to a “changing of the<br />

guard”. Gibson and Snider present a thorough argument supporting<br />

the “non-crisis” party. This argument supports the<br />

theory that it is natural for the civilian and military sectors to<br />

experience tension due to a highly experienced and educated<br />

military elite teamed up with inexperienced and relatively<br />

under-educated civilian elite. They argued that as time progressed,<br />

military and civilian counterparts would eventually<br />

establish a relationship of mutual respect and trust, thus arguing<br />

away the assertion that there was a growing linear gap<br />

between the military and civilian sectors. While this argument<br />

is well researched and fundamentally sound, its Achilles<br />

heel lies in the idealism and lack of true historical evidence<br />

to back it up. Drawing heavily upon the works of Richard<br />

Kohn as well as two well known case studies, McNamara and<br />

the Vietnam crisis as well as the resignation of CSAF General<br />

Ronald R. Fogleman, I intend to show that in truth, an environment<br />

of mutual respect and trust between military and<br />

civilian elite may never come to fruition.<br />

With the advent of the Clinton Administration, the<br />

issue of civil-military relations had escalated to an unprecedented<br />

height. It seemed that the gap between the military<br />

and civilian sectors was expanding at an alarming rate. Many<br />

scholars began questioning whether or not there was a civilmilitary<br />

relation crisis looming on the horizon. Indeed,<br />

during the Clinton administration America would witness the<br />

controversial retirement of six four star flag officers. 1<br />

A myriad of academic speculation ensued, all trying<br />

to decipher the cause of such an erosion of civil-military relations<br />

in American society. Two parties emerged throughout<br />

all this speculation, the crisis party and the non-crisis party. I<br />

have already covered the basic premise of the non-crisis party<br />

in describing Gibson and Snider’s basic arguments. Before<br />

continuing I will cover some of the basic arguments of the<br />

crisis party.<br />

The crisis party has many well known academics<br />

within its ranks, perhaps the most prominent being Richard<br />

Kohn, one of the leading experts on civil military relations.<br />

The crisis argument asserts that there is a growing gap in civil<br />

military relations and that unchecked, it is very likely that we


may have a fundamental breakdown between the civilian and<br />

military elite within our country. Kohn attributes the growth<br />

in the crisis or “gap” to several issues, most notably the growth<br />

in partisanship within the military, the emergence of a powerful<br />

JCS chairmen, and the ghost of Vietnam and the McNamara<br />

years. 2 All of these issues combined with other lesser<br />

topics have combined to create a seemingly unbridgeable gap<br />

in civil-military relations.<br />

With the rise of the Clinton Administration would<br />

come a drastic change in office. Republicans had dominated<br />

the White House for twelve years, and with this dominance<br />

a relatively stable foundation in civil-military relations had<br />

existed. This stable foundation would end as Clinton naturally<br />

replaced many positions. What ensued was a disruptive<br />

“changing of the guard”. Now the military elite had<br />

to work hand-in-hand with a new, relatively inexperienced<br />

staff. While the military remained solidly educated in political<br />

and military topics, the civilian sector of especially the<br />

Department of Defense was fresh and inexperienced with its<br />

particular nuances. Ensuing tension resulted as inexperienced<br />

and relatively under-educated civilians went head to head<br />

with experienced and adept military elite that were used to a<br />

large degree of control. It was not that the civilian sector was<br />

undereducated in the traditional sense, but more accurately in<br />

regards to national security policy and studies. What it truly<br />

boils down to is a lack of experience on the part of the civilian<br />

sector. They had not been dealing with the day-to-day<br />

national security issues like their military counterparts had for<br />

years before. In this sense alone where they considered undereducated<br />

when compared to the military elite. This then is<br />

the premise of the Gibson/Snider argument; that initially<br />

tension was expected between a “new order” and older established<br />

military elite.<br />

Gibson and Snider rely heavily upon an issue network<br />

framework to come to this hypothesis. This framework<br />

asserts that over time, an environment of trust and mutual<br />

respect between civilian and military counterparts would blossom.<br />

3 Gibson and Snider assert that initially, there was a clash<br />

between civilian and military counterparts. This clash was a<br />

result of first and foremost a lack of experience and education<br />

on the part of civilian political leaders. Gibson and Snider<br />

focus primarily on the educational levels of civilian elite and<br />

its relation to the military elite as well as the amount of military<br />

experience of the civilian elite then in power 4 .<br />

Their findings indicate that for the civilian sector,<br />

the educational level of the civilian elite as compared to the<br />

military elite was inferior. 5 In addition they also find that<br />

the level of personal military experience of the civilian elite<br />

had decreased over the last four decades. 6 Conversely, they<br />

assert that the level of political experience in the military elite<br />

95<br />

had risen over the same period of time. 7 From these findings<br />

Gibson and Snider assert that there was bound to be an initial<br />

clash between the military and civilian sector in the government.<br />

8 They conclude however that despite this initial clash,<br />

overall tensions would eventually disappear as time progressed<br />

and both parties gained experience in dealing with the other.<br />

They assert that over time, civilian and military counterparts<br />

would begin to trust each other.<br />

While this argument appears sound and is certainly<br />

logical, I find that it assumes far too much in its conclusion.<br />

My primary issue is with Gibson and Snider’s assertion that<br />

over time, military and civilian counterparts will grow to<br />

overlook educational and experience gaps between the two<br />

parties. Ideally this would absolutely be the case, but Gibson<br />

and Snider are in many ways far too detached from the reality<br />

of civil-military relations in making that assertion. They are<br />

conveniently discounting the effect the McNamara crisis continues<br />

to have on the memory of the military. They far too<br />

quickly choose to gloss over such monumental events as the<br />

resignation of General Fogleman and the indication that provides<br />

on the true nature of civil-military relations in current<br />

society. By investigating both the McNamara Age and the<br />

resignation of General Fogleman, I will prove that the conclusion<br />

Gibson and Snider assert will in many cases never come<br />

to fruition.<br />

Robert McNamara’s rise to power occurred during<br />

the Kennedy and Johnson administrations at the height of<br />

such controversies as mutually assured destruction and the<br />

Cuban missile crisis. Over the ensuing years, McNamara<br />

would strive to regain control over the military establishment.<br />

The true conflict with McNamara and the Service Chiefs<br />

would arise during the Johnson administration and the Vietnam<br />

conflict. During this time McNamara would prove that<br />

the pendulum had swung too far in the direction of civilian<br />

control over the military. Much to the great disdain of the<br />

military, McNamara and Johnson had gone as far as personally<br />

selecting the targets to be struck by the military. Perhaps<br />

McNamara’s intentions were good as he would assert time and<br />

time again that he was merely trying to prevent the escalation<br />

of the Vietnam Conflict into a potential World War III.<br />

During the McNamara reign, constant tension<br />

between the JCS existed. McNamara was always going<br />

against JCS recommendations to escalate specifically air<br />

strikes against North Vietnamese targets. In one particular<br />

case, McNamara directly opposed the JCS recommendation<br />

to attack North Vietnamese surface to air missile sites, recommending<br />

instead that the MiG airfields needed to be targeted<br />

first. 9 In another instance, McNamara removed six of fourteen<br />

targets recommended by the JCS in the Rolling Thunder<br />

campaign, completely undermining their advisory role on the


issue. 10 Such tactical scrutiny by the Secretary of Defense was<br />

utterly absurd, yet situations like this plagued the Vietnam<br />

Conflict on a regular basis.<br />

McNamara extended his campaign to further civilian<br />

control of the military in other non-war fighting realms of the<br />

military. Financial issues also became a heated area of contention<br />

between the JCS and the Secretary of Defense. With<br />

the advent of the Joint Chiefs of Staff, the control of financial<br />

issues shifted from individual services to that of the JCS.<br />

With the rise of McNamara, the control of lower-level military<br />

policy was again shifted from the JCS to the Secretary of<br />

Defense. 11 This of course only added to the growing tensions<br />

between the military and civilian elite of that time.<br />

The tension between McNamara and the JCS<br />

would grow to a heightened state with Senate hearings in the<br />

summer of 1967 that would pit McNamara against the JCS.<br />

All five Chiefs of Staff as well as numerous other high ranking<br />

officers would testify against the McNamara strategy in<br />

Vietnam and the “meddling by the civilians in Washington. 12 ”<br />

After the Stennis hearings, the subcommittee issued a unanimous<br />

declaration that McNamara was micromanaging the<br />

war and that “careful controls and restrictive ground rules had<br />

resulted in the application of our air power in a manner which<br />

was of limited effectiveness.” 13 In the end it was reported that<br />

the JCS had nearly revolted after the testimony of McNamara<br />

and although it was partially untrue, even McNamara admits<br />

and partially understates, “strong differences of judgment did<br />

divide us [,] and the frictions they caused created stress, which<br />

took its toll.” 14<br />

McNamara’s aggressive policy of asserting civilian<br />

control over the military would be highly criticized. Many<br />

scholars like James M. Roherty, author of Decisions of Robert<br />

S. McNamara attack McNamara’s failure to “engage in consensual<br />

policy-making.” 15 Roherty asserts that McNamara<br />

represented a threat to the “integrity of the new military<br />

professionalism that had developed during the 1950’s.” 16<br />

Roherty “emphasized the importance and McNamara’s neglect<br />

of this importance of military judgment to force structure<br />

planning.” 17<br />

In the end McNamara would completely lose face<br />

with both the military and the Johnson administration. The<br />

tension between civil-military relations was catastrophic to an<br />

almost immeasurable degree. While it could easily be attributed<br />

as one of the major factors in our eventual defeat in Vietnam,<br />

its larger impact on the future of civil-military relations<br />

draws the most importance in this argument. It shows that<br />

Gibson and Snider’s thesis that eventually tensions between<br />

military and civilian authorities will decrease over time is<br />

flawed. It proves that in many cases, issues between civilian<br />

and military officials may not be resolved, often times con-<br />

96<br />

tributing to a catastrophic failure in American foreign policy<br />

and operations.<br />

In my second case study, I will examine the events<br />

and repercussions surrounding General Fogelman’s early<br />

retirement from his position as Chief of Staff of the <strong>Air</strong> <strong>Force</strong>.<br />

This is intended to provide a contemporary example of the<br />

lack of resolution that can result form civil-military tension.<br />

Throughout General Fogleman’s tenure as CSAF, he admits to<br />

openly clashing with his civilian counterparts, both Secretary<br />

of Defense Cohen and Secretary of the <strong>Air</strong> <strong>Force</strong> Widnall. It<br />

is imperative to note that many of the controversies occurred<br />

at a later date in the Clinton administration, which provide a<br />

direct rebuttal to Gibson and Snider’s argument that over an<br />

extended period of time civil-military tension would decrease<br />

if not disappear between civilian and military counterparts.<br />

Some of the major controversies surrounding General<br />

Fogleman’s early retirement were his disagreement with the<br />

Secretary of the <strong>Air</strong> <strong>Force</strong>’s decision in the Kelly Flinn fiasco.<br />

In this particular case, the year was 1997, well into the Clinton<br />

administration. Secretary Widnall was contemplating<br />

issuing 1 st Lt. Flinn an honorable discharge for the offense of<br />

adultery 18 . General Fogleman disagreed with this and felt it<br />

was in direct opposition to his assertion that a dishonorable<br />

discharge be issued.<br />

Another major controversy during General Fogleman’s<br />

tenure as CSAF was the blocking by Secretary Cohen<br />

of Brigadier General Schwalier’s promotion to Major General.<br />

In this particular instance, General Fogleman had conducted<br />

an extensive investigation into the Khobar Towers bombing<br />

and concluded that Brigadier General Schwalier had done<br />

everything and more to provide for the security of his base.<br />

This did not suit the Clinton Administration and in the<br />

end Secretary Cohen blocked Brigadier General Schwalier’s<br />

promotion to Major General. General Fogleman was disgusted<br />

with the “Washington scene, the pressure from the<br />

Hill—from people who were uninformed.” He was unwilling<br />

to stand by and watch as the DoD “treated this man [BGen<br />

Schwalier] and the <strong>Air</strong> <strong>Force</strong>” poorly 19 .<br />

As a result of these two main incidents, General<br />

Fogleman realized that he had “simply lost respect and confidence<br />

in the leadership that I was supposed to be following.” 20<br />

General Fogleman goes on to state that<br />

“As chief of staff of the <strong>United</strong> <strong>States</strong> <strong>Air</strong><br />

<strong>Force</strong>, charged with providing military<br />

advice to the civilian leadership that the<br />

civilian leadership did not value for whatever<br />

reason, I had become ineffective as a spokesman.”<br />

21<br />

This kind of “loss of confidence” is a primary example of<br />

how civil-military relations eventually worsened instead of


improved over time. After three years of service General<br />

Fogleman decided that early retirement was a much better<br />

alternative to continued service in such a stifling atmosphere.<br />

In this particular case study one can see the opposite<br />

of Gibson and Snider’s thesis at work. Instead of civil-military<br />

relations improving over a period of time, they naturally<br />

degraded to the point that General Fogleman felt compelled<br />

to retire. This is a direct and strong rebuttal to Gibson and<br />

Snider’s argument that over time relations between civil<br />

and military counterparts improve. Here we have a mature<br />

administration in direct conflict with a mature military leader.<br />

The facts simply speak for themselves. How is<br />

that General Fogleman, after completing three quarters of<br />

his assignment cannot resolve a conflict with an administration<br />

that had been in place for well over four years? Simply<br />

put, what we have is a complete failure in the hypothesis of<br />

Snider and Gibson’s non-crisis theory. If we followed Gibson<br />

and Snider’s argument, General Fogleman and his civilian<br />

counterparts should have been able to resolve these situations.<br />

There should have been some form of mutual respect and<br />

trust gained over the years between Fogleman and the DoD<br />

that should have prevented both of these occurrences. Instead,<br />

there is a severe lack of respect and trust on both sides of the<br />

spectrum to the unprecedented point that an early retirement<br />

on the part of General Fogleman was the only resolution.<br />

What Gibson and Snider fail to estimate correctly<br />

is the impact Vietnam and the McNamara years had on the<br />

minds of the military member. They fail to fully appreciate<br />

the fact that in the minds of leaders like General Fogleman, a<br />

repeat of the McNamara years was the last thing they wanted.<br />

General Fogleman himself is quoted as stating that the McNamara<br />

situation had a direct impact on his decision. He states<br />

that he saw a similar situation brewing in what he refers to as<br />

the “tank” and did not want to be a part of such a notorious<br />

reconstruction of events. That was in many ways a primary<br />

motivator for his early retirement from his position. Rather<br />

than make the same mistakes as the service chiefs made<br />

during Vietnam, he wanted to end the situation at the cost of<br />

his own early retirement. 22<br />

Both the McNamara and Fogleman case study prove<br />

that while Gibson and Snider’s arguments are ideally sound,<br />

they have no historical evidence to support their premise. In<br />

addition, these case studies represent two strong refutations<br />

against their argument. They show that the stark reality of<br />

civil-military relations in the Washington political arena can<br />

be far from the sometimes “rosy” picture Gibson and Snider<br />

paint. The fact that in both cases very senior political and<br />

military members with several years of experience under their<br />

belts failed to resolve severe conflicts of civil-military policy<br />

shows that the crux of the non-crisis theory presented by<br />

97<br />

Gibson and Snider can neither explain away the friction in<br />

civil-military relations or predict the outcome of future tensions.<br />

Perhaps if Gibson and Snider had presented significant<br />

historical cases in the argument of their thesis, they may have<br />

had more validity in their non-crisis theory, nonetheless, their<br />

conclusion is fundamentally flawed without it.<br />

Bibliography<br />

Gibson, Christopher P. and Snider, Don M. Civil Military<br />

Relations and the Potential to Influence: A Look at the National<br />

Security Decision Making Process. (Armed <strong>Force</strong>s and Society,<br />

Winter 1999).<br />

Kohn, Richard, The Erosion of Civilian Control of the Military<br />

in the <strong>United</strong> <strong>States</strong> Today. (Chapel Hills, University of North<br />

Carolina at Chapel Hill Press, 2002).<br />

Kohn, Richard, ed., The Early Retirement of General Ronald R.<br />

Fogleman, Chief of Staff, <strong>United</strong> <strong>States</strong> <strong>Air</strong> <strong>Force</strong>. (Aerospace<br />

Power Journal, Spring 2001).<br />

McMaster, H. R. Dereliction of Duty (New York: HarperCollins<br />

Publishing, 1997).<br />

McNamara, Robert S.. In Retrospect: The Tragedy and Lessons<br />

of Vietnam. (New York: Times Books, 1995).<br />

Murdock, Clark A. Defense Policy Formation: A Comparative<br />

Analysis of the McNamara Era. (Albany: State University of<br />

New York Press, 1974)<br />

Palmer, Gregory. The McNamara Strategy and the Vietnam<br />

War: Program Budgeting in the Pentagon, 1960-1968. (Westport:<br />

Greenwood Press, 1978).<br />

Whitehead, YuLin G., LtCol. Civil-Military Relations during<br />

Coalition Operations in the Balkans. (National Defense University,<br />

2001)<br />

(Endnotes)<br />

1 Richard H. Kohn, The Erosion of Civilian Control of the<br />

Military in the <strong>United</strong> <strong>States</strong> Today.<br />

2 Richard H. Kohn. Out of Control: The Crisis in Civil-<br />

Military Relations. The National Interest (No 35., Spring<br />

1994), 3-17.<br />

3 Christopher P. Gibson and Don M. Snider, Civil Military<br />

Relations and the Potential to Influence: A Look at the National<br />

Security Decision Making Process. (Armed <strong>Force</strong>s and Society,


Winter 1999), 212.<br />

4 Gibson and Snider, 203-205.<br />

5 Ibid.<br />

6 Gibson and Snider, Table 5, 207.<br />

7 Ibid.<br />

8 Gibson and Snider, 212.<br />

9 H.R. McMaster, Dereliction of Duty. (New York:<br />

HarperCollins Publishers, 1997). 285.<br />

10 McMaster, 286.<br />

11 Gregory Palmer, The McNamara Strategy and the Vietnam<br />

War: Program Budgeting in the Pentagon, 1960-1968.<br />

(Westport: Greenwood Press, 1978), 47.<br />

12 Robert S. McNamara, In Retrospect. (New York: Times<br />

Books, 1995), 286.<br />

13 McNamara, 290-291.<br />

14 McNamara, 291.<br />

15 Clark A. Murdock. Defense Policy Formation: A<br />

Comparative Analysis of the McNamara Era. (Albany: State<br />

University of New York Press, 1974), 157.<br />

16 Ibid.<br />

17 Ibid.<br />

18 Kohn, The Early Retirement of General Ronald R. Fogleman,<br />

Chief of Staff of the <strong>Air</strong> <strong>Force</strong>, 2.<br />

19 Kohn, 2.<br />

20 LtCol YuLin G. Whitehead. Civil-Military Relations<br />

during Coalition Operations in the Balkans. (National Defense<br />

University, 2001).<br />

21 Ibid.<br />

22 Kohn, 2.<br />

98<br />

THE JUST WAR TRADITION AND EASTERN<br />

MILITARY THEORY: APPLICATIONS TO IRAQ<br />

By C3C Matthew H. Yan<br />

The just war tradition, which has been recently manifested<br />

in the preemptive strike by President George W. Bush would<br />

have been seen as appropriate by the eastern military theorist<br />

Sun Tzu but not Mao Zedong. The just war theory<br />

describes the set of conditions that must be met for a war to<br />

be described by modern standards as just. According to the<br />

theory, a just war is a war that has been, “declared by a legitimate<br />

authority, initiated for a just cause, and waged using<br />

the correct means [with] no wrong intentions” (Fotion 107).<br />

Although the theories on just war have evolved over time they<br />

have continued to describe two main concepts. First, the<br />

purpose of war and the extent in which war is to be executed.<br />

Secondly, advances in the destructiveness of weapons have<br />

caused political leaders, like President Bush, to reconsider the<br />

just war theory. It has been adapted to take into consideration<br />

terrorist factions and nations that have the potential to<br />

irresponsibly produce and use weapons of mass destruction.<br />

It is important to understand that the moral standard created<br />

to distinguish what is just and not just derived from society,<br />

and different societies have different ideas on what action is<br />

justified. Although the just war tradition has been born out<br />

of predominantly Christian societies, eastern military theorists<br />

such as Sun Tzu and Mao Zedong have had similar thoughts<br />

on why war is necessary. However, there are still distinct differences<br />

between both Just War Tradition and eastern societies<br />

in regards to how war should be carried out and also their<br />

influences.<br />

Why War is Necessary?<br />

Sun Tzu, perhaps the most influential eastern military<br />

theorist, felt there were several reasons to go to war,<br />

however, “committing army to battle should be undertaken<br />

with the greatest gravity” (Sawyer 154). Based on Sun Tzu’s<br />

thoughts, a prince would be justified if he engaged, “in<br />

attacking a dark and rustic country, in civilizing barbarians,<br />

in punishing the willfully blind, or in dealing summarily with<br />

a state going to ruin [because] such chastisements were in<br />

accord with the Will of Heaven” (Sun Tzu 32). His theories<br />

on warfare emphasized caution when interacting with foreign<br />

nations or kingdoms. Sun Tzu encouraged kings to employ<br />

espionage to its greatest effect. Spies served to provide the<br />

king with information on both his enemies and his allies,<br />

because Sun Tzu wrote, “never rely on the goodwill of others<br />

or on fortuitous circumstances” (Sun 155). Instead he said,<br />

“guarantee through knowledge, active study, and defensive


preparation that the enemy cannot mount a surprise attack or<br />

gain a victory through simple coercion” (Sun 155). The decision<br />

to declare war would be easier for kings with abundant<br />

knowledge about their opponents. Though Sun Tzu describes<br />

how victory is preferably attained without armed force, he<br />

also states, “the government should resort to armed combat<br />

[when] an enemy threatens the state with military action or<br />

refuses to acquiesce without being forced into submission<br />

through warfare” (Sun 154). Applying Sun Tzu’s theory, a<br />

nation is justified in resorting to armed combat if the opposing<br />

nation fails to comply with peace terms. In a modern<br />

sense, this would include disarmament agreements as well<br />

as agreements to discontinue weapons of mass destruction<br />

research. (Sun 154)<br />

Mao Zedong, a modern eastern military theorist,<br />

captured many of Sun Tzu’s beliefs in his writings on military<br />

theory. The primary difference between Mao and Sun<br />

Tzu’s military theories is Mao’s belief that the only just wars<br />

are revolutionary wars. Considering the communist context<br />

of Mao’s writings, he would have agreed that the only wars<br />

worth fighting are wars that contribute to the abolition of<br />

social classes. Before a discussion on Mao’s beliefs on why<br />

wars should be fought, it is important to present his definition<br />

of war must be presented. Mao describes war as the, “highest<br />

form of struggle, existing ever since the emergence of private<br />

property and social classes, for settling contradictions between<br />

classes, between nations, between states, or between political<br />

groups at given stages of their development” (Mao 177).<br />

Although there can be different types of struggles between<br />

factions, Mao states, “there are only two kinds of wars in history,<br />

just and unjust” (Mao 179). He believed that the sole<br />

purpose of just wars, or revolutionary wars, was to end war.<br />

In destroying the class system, Mao and other communists<br />

believed that all other struggles would be eliminated, and<br />

world peace can be achieved. Much of Mao’s military theory<br />

described tactical theory, like Sun Tzu’s theories, but elaborated<br />

on how to defeat the enemy through guerilla warfare.<br />

Essentially many of Mao’s theories on war’s purpose revolve<br />

around his communist beliefs making a comparison with Sun<br />

Tzu and the just war theory difficult. (Mao 179)<br />

Unlike eastern military theorists, just war tradition<br />

theorists have beliefs that are more general on why war is<br />

necessary. The just war theory does not only justify going to<br />

war but also the effects of war. According to just war theorists,<br />

“the harm of war can only be justified if it prevents an<br />

even greater harm of the same sort, because it is rare that any<br />

positive goals will exceed it in value” (Fotion 113). The just<br />

war theory specifies not only when a war is necessary, but also<br />

when ‘first strikes’ are appropriate. First strike theories were<br />

refined during the Cold War when nuclear attacks seemed<br />

99<br />

most imminent, but they are still applicable today as the<br />

threats of large scale nuclear, biological, and chemical warfare<br />

still exist. Military theorists Fotion and Elfstrom have<br />

distinguished circumstances justifying first strikes where, “it<br />

is extremely likely that war is imminent anyway; they will<br />

suffer great risks of destruction if they wait for the first blow;<br />

there are no other means available to avert the crisis; and<br />

their antagonist has no just cause for war” (Fotion 114). In<br />

a modern sense, Sun Tzu’s theory on when armed combat is<br />

necessary is in conjunction with the just war theory on first<br />

strikes and also with George W. Bush’s decision to strike Iraq<br />

first. George W. Bush, in his address to the <strong>United</strong> Nation<br />

General Assembly, stated,<br />

“We know that Saddam Hussein pursued weapons of<br />

mass murder even when inspectors<br />

were in his country. Are we to assume that he<br />

stopped when they left? The history, the<br />

logic, and the facts lead to one conclusion: Saddam<br />

Hussein’s regime is a grave and<br />

gather danger. To suggest otherwise is to hope<br />

against the evidence. To assume this regime’s good<br />

faith is to bet the lives of millions and the peace of<br />

the world in a reckless gamble. And this is a risk we<br />

must not take…The first time we may be completely<br />

certain he has nuclear weapons is when, God forbid,<br />

he uses one.” (Flippin 209).<br />

President Bush, in his speech, questions the assumption that<br />

Iraq has stopped pursuing weapons of mass destruction. Sun<br />

Tzu’s ideas coincide with this because he wrote, “never rely on<br />

the goodwill of others” (Sun 155). Furthermore, Bush identifies<br />

Iraq as a great threat because no one can confirm their<br />

disarmament. Following Iraqi leaders’ refusal to completely<br />

disarm, Sun Tzu would have probably advised military action<br />

because it revealed Iraq’s refusal to comply without the use of<br />

force. Sun Tzu mentions that a ‘wise leader’ should attack if<br />

a state is threatened by military action or possible danger to<br />

its citizens, which as stated by President Bush in his speech<br />

was the situation that the <strong>United</strong> <strong>States</strong> faced. The just war<br />

theory, like Sun Tzu’s theory, justifies an attack if a state risks<br />

great danger when it does not attack.<br />

The just war theory also takes into consideration<br />

foreigners’ circumstances because, “no nation can remain<br />

completely indifferent to the welfare of the citizens of other<br />

nations” (Fotion 115). A clear example can be drawn from<br />

the Jewish extermination in Europe during World War II.<br />

The international community neglected to identify the injustice<br />

happening to foreign peoples, thus permitting a terrible<br />

genocide. The just war theory considers the fact, “sometimes<br />

nations will have the obligation to initiate war on behalf of<br />

[endangered] citizens from other nations… [because] their


lives and well-being must matter to all” (Fotion 115). Neither<br />

Sun Tzu nor Mao’s military theories consider foreign nations’<br />

dispositions. Mao would probably have disapproved of most<br />

wars justified by the just war theory they are not of the revolutionary<br />

kind. Especially as communism seems to be dying<br />

throughout the world, it is rare to see war based on a working<br />

class fighting an upper-class to abolish the class system.<br />

Although Sun Tzu stressed military action in certain dangerous<br />

situations, he also, “stressed the vital necessity to avoid all<br />

engagements not based on extensive, detailed analyses of the<br />

situation” (Sawyer 154). Sun Tzu might perceive President<br />

Bush’s Iraqi engagement as precarious because the presence<br />

of weapons of mass destruction was likely, but still uncertain.<br />

Sun Tzu, if alive today, might disagreed with the just<br />

war theory and President Bush. He may have advised further<br />

analysis and research to determine whether or not there were<br />

weapons of mass destruction in Iraq. This hypothetical advice<br />

would be in accordance with his ideas on combat as a last<br />

measure and on the importance of reliable intelligence. However,<br />

weapons of mass destruction did not exist during Sun<br />

Tzu’s lifespan, and it is impossible to determine whether his<br />

theory would have changed with the consideration of these<br />

weapons.<br />

The Extent of War<br />

Sun Tzu is elaborate on how war should be carried<br />

out, but states, “the best policy is to take a state intact”<br />

(Sun 77). This would imply that Sun Tzu would disagree<br />

with the annihilation of a population through warfare. Sun<br />

Tzu also feels that one should not use all resources for the<br />

purpose of war because, “when your weapons are dulled and<br />

ardour damped, your strength exhausted and treasure spent,<br />

neighboring rulers will take advantage of your distress to act”<br />

(Sun 73). He would agree that nations involved in total wars,<br />

such as World War I, make themselves vulnerable to invasion,<br />

because these nations have practically exhausted all of their<br />

resources, including resources used for defense. Sun Tzu also<br />

emphasized war’s duration when he writes, “we have heard<br />

of blundering swiftness in war, we have not yet seen a clever<br />

operation that was prolonged” (Sun 73). The aforementioned<br />

war elements discussed by Sun Tzu revolve around his desire<br />

for efficiency in carrying out war.<br />

Although Mao’s theories on war’s permissible extent<br />

are very similar to that of Sun Tzu, Mao exchanges efficiency<br />

for effectiveness. Mao adjusted Sun Tzu’s theories to aide<br />

the effectiveness of guerilla warfare. He emphasized strategic<br />

defense and prioritized the survival of the guerilla faction.<br />

This sometimes means that retreat is acceptable, because it<br />

allows a force to, “conserve its strength and wait for an opportune<br />

moment for beating the enemy” (Mao 210). Unlike Sun<br />

100<br />

Tzu, Mao did not believe that speed or heavy damage were<br />

factors in warfare as long as victory was achieved. However,<br />

Sun Tzu’s theory on preventing maximum resource expenditure<br />

was found applicable for Mao in guerilla warfare, especially<br />

as resources were very limited. (Mao 210)<br />

Unlike the ideas of eastern military theorists such as<br />

Sun Tzu and Mao Zedong, the just war theory is ambiguous<br />

about a nation’s execution of war. According to military theorist<br />

Paul Ramsey, a just war, “must be a limited war,” and if in<br />

response to an attack it must be a war, “that mounts destructive<br />

power to match the increased power of attack, so long<br />

as this can be limited directly to the objective of defeating<br />

attack” (Ramsey 136). According to the just war theory, a war<br />

should be executed by proportionate means with noncombatant<br />

immunity and limited objectives. (Payne 45) Proportionate<br />

means in warfare characterizes when, “the weaponry<br />

or degree of force used [in war is] limited to what is necessary<br />

to secure a just peace” (Payne 42). A victory in a just war is<br />

achieved when peace is created, therefore the just war theory<br />

considers anything that causes war to continue after peace as<br />

extraneous.<br />

Influences on Military Theory<br />

The influences on Sun Tzu are heavily debated<br />

because it is uncertain when and where he originated. However,<br />

it is suspected that Sun Tzu lived between a period when,<br />

“rulers indulged in military adventures to satisfy a whim, to<br />

revenge a slight or an insult, or to collect booty,” and when,<br />

“war was no longer a regulated pastime, but the ultimate<br />

instrument of statecraft” (Tzu 9). This entire time span is<br />

considered one of China’s most chaotic historical periods,<br />

especially as war seemed unusually common. Warlords often<br />

skipped non-violent policy and immediately sought combat<br />

to resolve conflict. Sun Tzu most likely composed his theories<br />

to aide his king in a time when strategic warfare was still fairly<br />

new. (Sun 25)<br />

Mao Zedong’s major influences were Chinese military<br />

literature, especially Sun Tzu’s book, Art of War, where<br />

most of his military strategies were derived. Also, Mao’s communist<br />

training affected his ideas on military theory. As Mao<br />

was forced to employ forces of significantly smaller size than<br />

his enemy, he adapted military principles to fight a guerilla<br />

war. Military experience also influenced Mao when, “the Red<br />

Army failed to break up several of the enemy’s campaigns of<br />

encirclement and annihilation” (Mao 204).<br />

The just war tradition is by far the most evolved<br />

theory. Being of Christian origin, Saint Augustine constructed<br />

the just war tradition when he developed the Jus Ad<br />

Bellum or justified war theory. (Ramsey 16) St. Augustine<br />

gave justification to Christian warfare because Jesus instructed


man to, “Love each other as I have loved you” (Bible, John<br />

15.12). However, Saint Augustine also found it important<br />

that Christians were told, “Everyone must submit to himself<br />

to the governing authorities, for there is no authority except<br />

that which God has established” (Bible, Romans 13.1). Eventually,<br />

Saint Augustine concluded that,<br />

“Human government has been established by God<br />

and given the responsibility to exercise<br />

necessary force for keeping order, rewarding good,<br />

and punishing evil. God has not only condoned war<br />

in the past, he has also participated in it and promises<br />

to do so in the future. Since we know God is perfect,<br />

holy, and good, we cannot say that all wars are<br />

inherently evil. There must be a distinction between<br />

murder, which Scripture clearly condemns, and some<br />

forms of punishment—such as war, self-defense, and<br />

capital punishment.” (Payne 45).<br />

After separating war from inherent evil, the just war theory<br />

next considered when waging war was acceptable. Saint<br />

Augustine writes, “That law therefore, which for the protection<br />

of citizens orders foreign force to be repulsed by the<br />

same force, can be obeyed without a wrong desire” (Ramsey<br />

36). Retaliation for the sole purpose of protecting citizens<br />

of the state eventually evolved into the modern idea of just<br />

war. Modern military theorists have extended the just war<br />

concept to justify pre-emptive strikes because, “no proportionate<br />

reason can be assigned for permitting the extinction of<br />

the human race” (Ramsey 76). The extinction of the human<br />

race is a reference to the possible effect of weapons of mass<br />

destruction if they are allowed to be employed.<br />

Conclusion<br />

Coincidentally, the ideas of eastern military theorists<br />

such as Sun Tzu are not much different from those of the just<br />

war tradition. However, there are some notable differences<br />

in the two theories. The just war theory essentially considers<br />

modern circumstances, while Sun Tzu’s theories do not.<br />

The just war theory takes into consideration weapons of mass<br />

destruction, the welfare of foreign citizens, and terrorism as a<br />

threat to global communities, and Sun Tzu’s theories do not.<br />

It does not seem that time or geography caused a difference<br />

between Sun Tzu’s theories and the just war theory. However,<br />

Mao’s ideas on military theory seem to be radically different<br />

from the just war tradition mainly because of his communist<br />

views. In general, Sun Tzu would have agreed with President<br />

101<br />

George W. Bush’s method and reason used to strike first at<br />

Iraq. Both Sun Tzu and President Bush agree that an enemy<br />

nation’s goodwill should not be trusted, and that the only<br />

resolution to deal with a nation that refuses to cease its threat<br />

is in fact—military intervention.<br />

Works Cited<br />

Flippin, Royce, ed. The Best American Political Writing 2003.<br />

New York: Thunder Mouth’s<br />

Press, 2003.<br />

Fotion, Nicholas, and Gerard Elfstrom. Military Ethics.<br />

Boston: Routledge & Kegan Paul, 1986.<br />

Holy Bible: New International Version. Grand Rapids:<br />

Zondervan, 1984.<br />

Mao Tse-Tung. Selected Works. New York: International Publishers,<br />

1954.<br />

Payne, Keith B., and Karly I. Payne. A Just Defense. Portland:<br />

Multnomah Press, 1987.<br />

Ramsey, Paul. War and the Christian Conscience. Durham:<br />

Duke University Press, 1961.<br />

Sawyer, Ralph. The Seven Military Classics of Ancient China.<br />

Boulder: Westview Press, 1993.<br />

Sun Tzu. The Art of War. Trans. Samuel B. Griffifth.<br />

London: Oxford University Press, 1963.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!