Category Air Warfare

The Battle of Britain Data Base

The Battle of Britain data base came into existence at the request of OSD PA&E (Office of the Secretary of Defense, Program Analysis and Evaluation). They contacted us. They were working with LMI (Logistics Management Institute, on of a dozen FFRDCs) to develop an air combat model. They felt that the Battle of Britain would be perfect for helping to develop, test and validate their model. The effort was led by a retired Air Force colonel who had the misfortune of spending part of his career in North Vietnam.

The problem with developing any air campaign database is that, unlike the German army, the Luftwaffe actually followed their orders late in the war to destroy their records. I understand from conversations with Trevor Dupuy that Luftwaffe records were stored in a train and had been moved to the German countryside (to get them away from the bombing and/or advancing armies). They then burned all the records there at the rail siding.

So, when HERO (Trevor Dupuy’s Historical Evaluation Research Organization) did their work on the Italian Campaign (which was funded by the Air Force), they had to find records on the German air activity with the Luftwaffe liaison officers of the German armies involved. The same with Kursk, where one of the few air records we had was with the air liaison officer to the German Second Army. This was the army on the tip of the bulge that was simply holding in place during the battle. It was the only source that gave us a daily count of sorties, German losses, etc. Of the eight or so full wings that were involved in the battle from the VIII Air Corps, we had records for one group of He-111s (there were usually three groups to a wing). We did have good records from the Soviet archives. But it hard to assemble a good picture of the German side of the battle with records from only 1/24th of the units involved. So the very limited surviving files of the Luftwaffe air liaison officers was all we had to work with for Italy and Kursk. We did not even have that for the Ardennes. Luckily the German air force simplified things by flying almost no missions until the disastrous Operation Bodenplatte on 1 January 1945. Of course, we had great records from the U.S. and the UK, but….hard to develop a good database without records from both sides. Therefore, one is left with few well-documented air battles anywhere for use in developing, evaluating and validating an air campaign model.

The exception is the Battle of Britain, which has been so well researched, and extensively written about, that it is possible to assemble an accurate and detailed daily account for both sides for every day of the battle. There are also a few surviving records that can be tapped, including the personal kill records of the pilots, the aircraft loss reports of the quartermaster, and the ULTRA reports of intercepted German radio messages. Therefore, we (mostly Richard Anderson) assembled the Battle of Britain data base from British unit records and the surviving records and the extensive secondary sources for the German side. We have already done considerable preliminary research covering 15 August to 19 September 1940 as a result of our work on DACM (Dupuy Air Combat Model)

The Dupuy Air Campaign Model (DACM)

The database covered the period from 8 August to 30 September 1940. It was programmed in Access by Jay Karamales.  From April to July 2004 we did a feasibility study for LMI. We were awarded a contract from OSD PA&E on 1 September to start work on the database. We sent a two-person research team to the British National Archives in Kew Gardens, London. There we examined 249 document files and copied 4,443 pages. The completed database and supporting documentation was delivered to OSD PA&E in August 2005. It was certainly the easiest of our campaign databases to do.

We do not know if OSD PA&E or LMI ever used the data base, but we think not. The database was ordered while they were still working on the model. After we delivered the database to them, we do not know what happened. We suspect the model was never completed and the effort was halted. The database has never been publically available. PA&E became defunct in 2009 and was replaced by CAPE (Cost Assessment and Program Evaluation). We may be the only people who still have (or can find) a copy of this database.

I will provide a more detailed description of this database in a later post.

The Use of the Two Campaign Data Bases

The two large campaign data bases, the Ardennes Campaign Simulation Data Base (ACSDB) and the Kursk Data Base (KDB) were designed to use for validation. Some of the data requirements, like mix of personnel in each division and the types of ammunition used, were set up to match exactly the categories used in the Center for Army Analysis’s (CAA) FORCEM campaign combat model. Dr. Ralph E. Johnson, the program manager for FORCEM was also the initial contract manager for the ACSDB.

FORCEM was never completed. It was intended to be an improvement to CAA’s Concepts Evaluation Model (CEM) which dated back to the early 1970s. So far back that my father had worked with it. CAA ended up reverting back to CEM in the 1990s.

They did validate the CEM using the ACSDB. Some of their reports are here (I do not have the link to the initial report by the industrious Walt Bauman):

https://apps.dtic.mil/dtic/tr/fulltext/u2/a320463.pdf

https://apps.dtic.mil/dtic/tr/fulltext/u2/a489349.pdf

It is one of the few actual validations ever done, outside of TDI’s (The Dupuy Institute) work. CEM is no longer used by CAA. The Kursk Data Base has never used for validation. Instead they tested Lanchester equations to the ACSDB and KDB. They failed.

Lanchester equations have been weighed….

But the KDB became the darling for people working on their master’s thesis for the Naval Post-Graduate School. Much of this was under the direction of Dr. Tom Lucas. Some of their reports are listed here:

http://www.dupuyinstitute.org/links.htm

Both the ACSDB and KDB had a significant air component. The air battle over the just the German offensive around Belgorod to the south of Kursk was larger than the Battle of Britain. The Ardennes data base had 1,705 air files. The Kursk data base had 753. One record, from the old Dbase IV version of the Kursk data base, is the picture that starts this blog post. These files basically track every mission for every day, to whatever level of detail the unit records allowed (which were lacking). The air campaign part of these data bases have never been used for any analytical purpose except our preliminary work on creating the Dupuy Air Campaign Model (DACM).

The Dupuy Air Campaign Model (DACM)

This, of course, leads into our next blog post on the Battle of Britain data base.

The Cold War Roots of the Integrated U.S./Japan/NATO Air Defense Network

Continental U.S. Air Defense Identifications Zones [MIT Lincoln Laboratory]

My last post detailed how the outbreak of the Korean War in 1950 prompted the U.S. to undertake emergency efforts to bolster its continental air defenses, including the concept of the Air Defense Identification Zone (ADIZ). This post will trace the development of this network and its gradual integration with those of Japan and NATO.

In the early 1950s, U.S. continental air defense, designated the Semi-Automatic Ground Environment air defense system or SAGE, resembled a scaled-up version of the Dowding System, pioneered by Great Britain as it faced air attack by the Luftwaffe in 1940. SAGE was initially a rudimentary and analog affair:

The permanent network depended on each radar site to perform GCI [Ground Control & Intercept] functions or pass information to a nearby GCI center. For example, information gathered by North Truro Air Force Station on Cape Cod was transmitted via three dedicated land lines to the GCI center at Otis AFB, Massachusetts, and then on to the ADC Headquarters at Ent AFB, Colorado. The facility at Otis AFB was a regional information clearinghouse that integrated the data from North Truro and other regional radar stations, Navy picket ships, and the all-volunteer GOC [Ground Observer Corps]. The clearinghouse operation was labor intensive. The data had to be manually copied onto Plexiglas plotting boards. The ground controllers used this data to direct defensive fighters to their targets. It was a slow and cumbersome process, fraught with difficulties. Engagement information was passed on to command headquarters by telephone and teletype. At Ent AFB, the information received from the regional clearinghouses was then passed on to enlisted airmen standing on scaffolds behind the world’s largest Plexiglas board. Using grease pencils, these airmen etched the progress of enemy bombers onto the back of the Plexiglas board so that air defense commanders could evaluate and respond. This arrangement impeded rapid response to the air battle.

It is hard to imagine an air defense challenge of the magnitude that potentially faced the U.S. and USSR by 1955. The Strategic Air Command (SAC) bomber fleet peaked at over 2,500 in 1955-1965, with 2,000 B-47s (range of 2,013 statute miles) and 750 B-52s (range of 4,480 statute miles). The range of U.S. bombers was extended considerably by the ~800 KC-135 aerial re-fueling tanker aircraft fleet as well.

In spite of the much publicized “bomber gap,” taking Soviet production numbers (and liberally adding aircraft of shorter range or unavailable until 1962…) produces an approximate estimate for a Soviet bombing fleet:

  • M-4 “Bison” (range of 3480 statute miles) = 93
  • Tu-16 “Badger” (range of 3888 statute miles) = 1507
  • Tu-22 “Blinder” (range of 3000 statute miles) = 250-300
  • Tu-95 “Bear” (range of 9400 statute miles) = 300+

That gave the U.S. an advantage in bombers of 2,750 to ~2,200 over the Soviets. Now, imagine this air battle being conducted with manual tracking on plexiglass with grease pencils…untenable!

Air Defense and Modern Computing

However, the problem proved amenable to solutions provided by the pending computer revolution.

At the Lincoln Laboratory development continued on an automated command and control system centered around the 250-ton Whirlwind II (AN/FSQ-7) computer. Containing some 49,000 vacuum tubes, the Whirlwind II became a central component of the SAGE system. SAGE, a system of analog computer-equipped direction centers, processed information from ground radars, picket ships, early-warning aircraft, and ground observers onto a generated radarscope to create a composite picture of the emerging air battle. Gone were the Plexiglas TM boards and teletype reports. Having an instantaneous view of the air picture over North America, defense commanders would be able to quickly evaluate the threats and effectively deploy interceptors and missiles to meet the threat.

The SAGE system was continually upgraded through the mid-to-late 1950s.

By 1954, with several more radars in the northeast providing data, the Cambridge control center (a prototype SAGE center) gained experience in directing F-86D interceptors against B-47 bombers performing mock raids. Still much development, research, and testing lay ahead. Bringing together long-range radar, communications, microwave electronics, and digital computer technologies required the largest research and development effort since the Manhattan Project. During its first ten years, the government spent $8 billion to develop and deploy SAGE. By 1958, Lincoln Laboratory had a professional staff of 720 with an annual budget of $22.5 million, to conduct SAGE-related work. The contract with IBM to build sixty production models of the Whirlwind II at $30 million each provided about half of the corporation’s revenues for the 1950s and exposed the corporation to technologies that it would use in the 1960s to dominate the computer industry. In the meantime, scientists and electronic engineers in the defense industry strove to install better radars and make these radars invulnerable to electronic countermeasures (ECM), commonly called jamming.

The SAGE development effort became one of the foundations of modern computing, giving IBM the technological capability to dominate for several decades, until it outsourced two key components: hardware to Intel and software to a young Microsoft, both of which became behemoths of the internet age. It is also estimated that this effort brought a price tag which exceeded that of the Manhattan Project. SAGE also transformed the attitude of the USAF towards technology and computerization.

Current Air Defense Networks

In the 1950s and 60s, the U.S. continental air defense network gradually began to expand geographically and integrate with NADGE and JADGE air defense networks of its NATO allies and Japan.

NATO Air Defense Ground Environment (NADGE): This was approved by NATO in December 1955, and became operational in 1962 with 18 radar stations. This eventually grew to 84 stations and provided an inter-connected network from Norway to Turkey before being superseded by the NATO Integrated Air Defense System (NATINADS) in 1972. NATINADS was further upgraded in the 1980s to include data from the E-3 Sentry AWACS aircraft (AEGIS (Airborne Early-warning/Ground Environment Integrated Segment); not to be confused with the USN system with the same acronym.)

Base Air Defense Ground Environment (BADGE): This was the automated system, in the same fashion as SAGE, which replaced the manual system in place with the JASDF since 1960. The requirement was stated in July 1961, and was actually modeled on the Naval Tactical Information System (NTDS), developed by Hughes for the US Navy. This was ordered in December 1964, and operational in March 1969. This was superseded by Japan Aerospace Defense Ground Environment (JADGE) in July 2009.

Japanese Air Defense and the Cold War Origins of Air Defense Identification Zones

Air Defense Identification Zones (ADIZ) in the South China Sea [Maximilian Dörrbecker (Chumwa)/Creative Commons/Wikipedia]

My previous posts have discussed the Japanese Air Self Defense Force (JASDF) and the aircraft used to perform the Defensive Counter Air (DCA) mission. To accomplish this, the JASDF is supported by an extensive air defense system which closely mirrors U.S. Air Force (USAF) and U.S. Navy (USN) systems and has co-evolved as technology and threats have changed over time.

Japan’s integrated air defense network and the current challenges it faces are both rooted in the Cold War origins of the modern U.S. air defense network.

On June 25, 1950, North Korea launched an invasion of South Korea, drawing the United States into a war that would last for three years. Believing that the North Korean attack could represent the first phase of a Soviet-inspired general war, the Joint Chiefs of Staff ordered Air Force air defense forces to a special alert status. In the process of placing forces on heightened alert, the Air Force uncovered major weaknesses in the coordination of defensive units to defend the nation’s airspace. As a result, an air defense command and control structure began to develop and Air Defense Identification Zones (ADIZ) were staked out along the nation’s frontiers. With the establishment of ADIZ, unidentified aircraft approaching North American airspace would be interrogated by radio. If the radio interrogation failed to identify the aircraft, the Air Force launched interceptor aircraft to identify the intruder visually. In addition, the Air Force received Army cooperation. The commander of the Army’s Antiaircraft Artillery Command allowed the Air Force to take operational control of the gun batteries as part of a coordinated defense in the event of attack.

In addition to North America, the U.S. unilaterally declared ADIZs to protect Japan, South Korea, the Philippines, and Taiwan in 1950. This action had no explicit foundation in international law.

Under the Convention on International Civil Aviation (the Chicago Convention), each State has complete and exclusive sovereignty over the airspace above its territory. While national sovereignty cannot be delegated, the responsibility for the provision of air traffic services can be delegated.… [A] State which delegates to another State the responsibility for providing air traffic services within airspace over its territory does so without derogation of its sovereignty.

This precedent set the stage for China to unilaterally declare ADIZs its own in 2013 that overlap those of Japan in the East China Sea. China’s ADIZs have the same international legal validity as those of the U.S. and Japan, which has muted criticism of China’s actions by those countries.

Recent activity by the Chinese People’s Liberation Army Air Force (PLAAF) and nuclear and missile testing by the Democratic People’s Republic of Korea (DPRK, or North Korea) is prompting incremental upgrades and improvements to the Japanese air defense radar network.

In August 2018, six Chinese H-6 bombers passed between Okinawa’s main island and Miyako Island heading north to Kii Peninsula. “The activities by Chinese aircraft in surrounding areas of our country have become more active and expanding its area of operation,” the spokesman [of the Japanese Ministry of Defense] said.… “There were no units placed on the islands on the Pacific Ocean side, such as Ogasawara islands, which conducted monitoring of the area…and the area was without an air defense capability.”

Such actions by the PLAAF and People’s Liberation Army Navy (PLAN) have provided significant rationale in the Japanese decision to purchase the F-35B and retrofit their Izumo-class helicopter carriers to operate them, as the Pacific Ocean side of Japan is relatively less developed for air defense and airfields for land-based aircraft.

My next post will look at the development of the U.S. air defense network and its eventual integration with those of Japan and NATO

The Japanese Aerospace Industry

A schematic rendering of Japan’s proposed F-3 fighter [Tokyoexpress.info]

In my previous post, I discussed the progression of aircraft in use by the Japanese Air Self Defense Force (JASDF) since World War II. Japan has also invested significant sums in its domestic aerospace manufacturing capability over this same time period.

Japanese aircraft manufacturing has long been closely tied to the U.S Air Force (USAF) and U.S. aerospace majors offering aircraft for sales, as well as licensed production. Japanese aerospace trade groups categorize this into several distinct phases, including:

  • Restarting the aircraft business – starting in 1952 during the Korean War, Japanese aerospace firms like Mitsubishi and Kawasaki reacquired aircraft manufacturing capability by securing contacts with the USAF for maintenance, repair and overhaul (MRO) of damaged USAF aircraft, including the F-86 Sabre, considered by the Americans to be the star aircraft of the war (although many believe its opponent from the Soviet side, the MiG-15 to have been superior.) There was little doubt, then, that the JASDF would purchase the F-86 and then license its domestic production.
  • Licensed production of US military aircraft – “Japan has engaged in licensed production of U.S. state-of-the-art fighter planes, from the F-86 to the F-104, the F-4, and the F-15. Through these projects, the Japanese aircraft industry revived the technical capabilities necessary to domestically manufacture entire aircraft.”
  • Domestic military aircraft production – Japanese designed aircraft, while independent, unique designs, also leveraged certain Western designed aircraft as their inspiration, such as the T-1 and eventual F-1 follow-on and the clear resemblance to the British Jaguar. This pattern was repeated in 1987 with the F-2 and its clear design basis on the F-16.
  • Domestic Production of business, and civil aircraft – “Japan domestically produces the YS-11 passenger plane as well as the FA-200, MU-2, FA-300, MU-300, BK-117, and other commercial aircraft, and is an active participant in international joint development programs with partners such as the American passenger aircraft manufacturer Boeing.”

Mitsubishi Heavy Industries (MHI) won a contract to build the wing for the Boeing 787, a job that Boeing now considers a core competency, and is unlikely to outsource again (they kept this task in house for the more recent 737 MAX, and 777X aircraft). This shows MHI’s depth of capability.

Also in the previous post, I could not help but include the “F-22J,” a hypothetical fighter that has been requested by the Japanese government numerous times, as the air power threat from the Chinese People’s Liberation Army Air Force (PLAAF) has grown. The export of the F-22, however, was outlawed by the Obey amendment to the 1998 Defense Authorization Act (a useful summary of this debate is here). So stymied, the JASDF and supporting Ministry of Defense personnel conducted a series of design studies in order to establish detailed requirements. These studies clarified the approach to be taken for the next aircraft to put into service, the F-3 program, ostensibly a successor to the F-2, although the role to be played is more of an air superiority or air dominance fighter, rather than a strike fighter. These studies concluded that range, or endurance is the most important metric for survivability, a very interesting result indeed.

Airframe developers…appear to have settled on something close to the 2013 configuration for the F-3 that emphasized endurance and weapons load over flight performance… That design, 25DMU, described a heavy fighter with a belly weapons bay for six ramjet missiles about the size of the MBDA Meteor. The wing was large and slender by fighter standards, offering high fuel volume and low drag due to lift but penalizing acceleration.… The key factor was that the high-endurance design provided more aircraft on station than would be available from an alternative fleet of high-performance fighters. – (Aviation Week & Space Technology, February 15-28, 2016)

I am curious about the air combat models that reached the conclusion that endurance is the key metric for a new fighter. Similar USAF combat models indicated that in a conflict with PLA armed forces, the USAF would be pushed back to their bases in Japan after the first few days. “In any air war we do great in the first couple of days. Then we have to move everything back to Japan, and we can’t generate sufficient sorties from that point for deep strike on the mainland,” according to Christopher Johnson, former CIA senior China analyst [“The rivals,” The Economist, 20 October 2018]. (History reminds us of aircraft designed for range and maneuverability, the Mitsubishi A6M “Zero,” which also de-emphasized durability, such as pilot armor or self-sealing fuel tanks … was this the best choice?) Validation of combat models with historical combat data seems like an excellent choice if you are investing trillions of Yen, putting the lives of your military pilots on the line, and investing in a platform that will be in service for decades.

Given this expected cost, Japan faces a choice to develop the F-3 independently, or with foreign partners. Mitsubishi built and flew the X-2 “Shinshin” prototype in April 2016. The JASDF also issued an RFP to existing aircraft manufacturers, including the BAE Eurofighter Typhoon, the Boeing F-15 Eagle, and the Lockheed Martin F-22 Raptor. In October 2018, the Typhoon and the Eagle were rejected for not meeting the requirements, while the Raptor was rejected because “no clear explanation was given about the possibility of the U.S. government lifting the export ban.” The prospect of funding the entire cost of the F-3 fighter by independently developing the X-2 also does not appear acceptable, so Japan will look for a foreign partner for co-development. There is no shortage of options, from the British, the Franco-Germans, or multiple options with the Americans.

Evolution of the Roles and Missions of the Japanese Air Self Defense Force (JASDF)

[Sources: IHS Jane’s All the World’s Fighting Aircraft, Wikipedia, militarymachine.com, author’s estimates}

In my previous posts, I explored impact the political aftermath of the Pacific War on Japan and the gradual restoration of sovereignty had on its air power policy. During this time, aircraft and air defense technology changed rapidly and the roles and mission of the Japanese Air Self Defense Force (JASDF) evolved rapidly as well.

The JASDF has been closely tied to the U.S. Air Force (USAF) since its inception. This was true in terms of missions, doctrine, technology and equipment. The primary role of the JASDF has been air defense and the protection of Japanese sovereignty (Defensive Counter Air, DCA), since 1958 when this mission was transitioned back from the USAF. The 1978 National Defense Program Guidelines (NDPG) mandated this, and also prohibited mid-air refueling and precision-strike munitions. These missions were gradually permitted as the threat environment evolved. (See this thesis for a good summary.)

The role of offensive air power (i.e. Offensive Counter Air or OCA; attacking enemy airbases, missile launch sites and similar military facilities) has traditionally been reserved for the USAF due to legal limits on the possible missions by the JASDF. Specifically the U.S. Armed Forces, Japan, 5th Air Force is a considerable force, including the 18th Wing at Kadena, Okinawa with four squadrons of F-15s, and the 35th Wing at Misawa in Northern Japan with four squadrons of F-16s, among other support squadrons to tankers, AWACs, etc.

This posture and division of responsibilities between the JSADF and USAF has gradually changed over time, or “emerging as it really is”:

  • In the early 1980’s, the F-1 attack aircraft had a strike capability against shipping with the ASM-1 and ASM-2 missiles.
  • In the late 1990’s, the F-4EJ upgraded “Kai” version added ground attack and the ability to strike with the ASM-1 and ASM-2 missiles.
  • In the early 2000’s, the F-2 aircraft was introduced, with ground attack with precision-guided munitions and the ability to strike with the ASM-2.
  • Currently, as the F-35A is adopted, it will have state-of-the-art precision strike capabilities, and likely use the Joint Strike Missile (JSM).

Nonetheless, the primary mission of the JASDF remains air superiority and interception. The data visualization above illustrates the different types of air superiority aircraft in service with the JASDF over time. This chart is based on six quantitative measures of analysis, and has a moderate level of information density:

  1. Service Year – on the horizontal axis; when was this type introduced into service by the JASDF? This is often significantly after the similar type was introduced into service with the USAF. In some cases, this is an estimate, or in the case of the hypothetical “F-22J”, alternative history (aka wild speculation).
  2. Aircraft Type – each bubble represents an aircraft type.
  3. Range SMI (statute miles) – the color of the bubble, with darker being longer range; this is a the combat range of the aircraft type, often with optional drop tanks.
  4. Max Speed MPH (statute miles per hour) – the size of the bubble represents the maximum speed of the aircraft, measured from a base of 100 MPH. This is typically at high altitude.
  5. Rate of Climb FPM (feet per minute) – this is the ability of the aircraft to climb to altitude, and a key metric for an interceptor with a mission to rise to bombers which have violated the airspace of a nation.
  6. Thrust to Weight Ratio – this measures the ability to propel the aircraft compared with the loaded weight of the aircraft. This is often used to express the capability to climb, for when an aircraft has a high angle of attack, thrust becomes lift, so when an aircraft has more lift than weight, it can climb, and even accelerate while moving straight up.
  7. Wing Loading LBS/SquareFoot – this measures the size of the wing (and thus by proxy the lift generation capability) as compared to the weight of the aircraft, it is typically used to indicate the ability to turn quickly (i.e. change in degrees per second).

A few insights become clear when visualizing the data in this way. First, the F-104J in the role of interceptor was a huge leap in capability over the F-86 Sabre types. In many ways the F-104J set the standard to which later aircraft would match. Next, the linear progression between 1960 and 1980 of aircraft performance capability reached an apex with the F-15J, with a period of upgrades reflected in the “Kai” versions. Also, with some knowledge of these airframes, it can be seen that the Japanese market for military aircraft has been dominated by the Americans as opposed to the Europeans (or Russians). There are many aspects of these aircraft which are not captured in this chart, including weaponry, sensors, and stealth. I have discussed the relevance of these metrics in previous blog posts.

Today, the JSDF operates a wide range of aircraft, specialized in missions ranging across the spectrum of domains, with modern air force capabilities. A list of aircraft currently operated by force, and with numbers is presented in the annex, based upon the most current authoritative sources, but also updated for recent decisions by the Japanese government on procurement.

An “F-22J” is included as an “alternative history” in the chart above since the Japanese government has repeatedly sought to purchase this aircraft from Lockheed Martin for the JASDF. They have been stymied by the Obey amendment to the 1998 Defense Appropriations Act, which specifically forbade the export of the F-22 in order to protect the secrecy of its advanced technology.

Really the End of Stealth?

This blog reported in July that the end of stealth might be near.  Further evidence comes with Aviation Week’s interview with Fred Kennedy, the lead of the Tactical Technology Office (TTO) at the Defense Advanced Research Projects Agency (DARPA) reveals key elements of the debates within the US defense community, specifically about stealth.

“We have been doubling down on the miracle of stealth for forty years. … There are diminishing returns to using the same tactic.  I don’t think there is a lot of advantage to going further into this particular tactic of stealth.”  Rather, DARPA suggests what they call “un-deterable air presence. … You’re going to see me coming, since I won’t be stealthy, and you’re going to shoot at me, but you’re not going to hit anything.  An example is hypersonics.”

Meanwhile, Air Force Chief of Staff General Dave Goldfein is looking at the network approach, sometimes called combat cloud.  ”When you look at — through the lens of the network — and you look at air superiority as a mission, as a family-of-systems approach, you can see why you don’t hear me talking a lot about a replacement, A for B.”

This indicates that several programs which are underway to consider building new stealth aircraft might be facing an uphill battle to convince the Air Force, DARPA and Department of Defense (DoD):

  • Next Generation Air Dominance (NGAD)
  • Penetrating Counter Air (PCA)
  • F/A-XX

So, does this mean that stealth is near its end? A few key facts illustrate otherwise:

  1. Significant investment in new stealthy platforms, worldwide.
    1. US F-117 – in service from 1983 to 2008
    2. US B-2 – in service since 1997
    3. US F-22 – in service 2005-Dec, first combat 2014-Sep
    4. F-35 Programfirst combat by Israeli Air Force, 2018-May
    5. US B-21 Program – expected to enter service by 2025
    6. British Tempest – concept announced 2018-July
    7. Franco-German Future Combat Air System (FCAS)
    8. Japanese X-2 Shinshincostly, but may proceed with partners
    9. Korean & Indonesian KF-X – expected by 2032
    10. Turkish & British TF-X – first flight by 2023 ?
    11. Chinese J-20 – in serial production since 2017-Oct
    12. Chinese J-31 – improved version, first flight 2016-Dec
    13. Chinese H-20 – strategic stealth bomber, planned for 2025
    14. Russian Su-57 – in service, combat evaluation in Syria
    15. Russian PAK DA Program – bomber planned for 2025-2030
  2. Research projects by DARPA that leverage existing stealthy platforms.
    1. Gremlins – semi-disposable, air launch and recovery UAVs
    2. Software – System of Systems approach (SoSITE)
  3. Evidence that stealth capabilities by potential adversaries are overstated.
    1. India Air Force claims Su-30MKI tracked Chinese J-20
    2. Russia cancels mass production of Su-57

Clearly then, stealth is a capability that is here to stay, and many new aircraft with incorporate it into their design. The point that DARPA’s Kennedy makes is that potential adversaries know this tactic, and they are investing in ways to counter it.  Stealth is no longer a source of technological surprise, it is mainstream.  It was original and likely the source of significant surprise in 1983!

Drones: The People’s Weapon?

The DJI Matrice 600 commercial drone for professional aerial photography. Available for $4,600, a pair of these drones were allegedly used in an assassination attempt on Venezuelan President Nicolás Maduro in August 2018. [Wired]

Last week, the Russian Ministry of Defense claimed that its military air defense assets had shot down 45 drones in attempted attacks on Khmeimim Air Base, the main Russian military installation in Syria. The frequency of these attacks were increasing since the first one in January, according to Major General Igor Konashenkov. Five drones had been downed in the three days preceding the news conference.

Konashenkov asserted that although the drones appeared technologically primitive, they were actually quite sophisticated, with a range of up to 100 kilometers (60 miles). While the drones were purportedly to be piloted by Syrian rebels from Idlib Provence, the Russians have implied that they required outside assistance to assemble them.

The use of commercial off-the shelf (COTS) or modified off-the-shelf (MOTS) aerial drones by non-state actors for actions ranging from precision bombing attacks on combat troops, to terrorism, to surveillance of law enforcement, appears to be gaining in popularity.

Earlier this month, a pair of commercial drones armed with explosives were used in an alleged assassination attempt on Venezuelan President Nicolás Maduro. Daesh fighters in Syria and Iraq have been using drones for reconnaissance and to drop explosives and bombs on opposition forces.

According to Kathy Gilsinan in The Atlantic,

In 2015, Reuters reported that a protester flew “a drone carrying radioactive sand from the Fukushima nuclear disaster onto the prime minister’s office, though the amount of radiation was minimal.” Mexican cartels have used drones to smuggle drugs and, in one instance, to land disabled grenades on a local police chief’s property. Last summer, a drone delivered an active grenade to an ammunition dump in Ukraine, which Kyle Mizokami of Popular Mechanics reported caused a billion dollars’ worth of damage.

Patrick Turner reported for Defense One that a criminal gang employed drones to harass an FBI hostage rescue team observing an unfolding situation outside a large U.S. city in 2017.

The U.S. Defense Department has been aware for some time of the potential effectiveness of drones, particularly the specter of massed drone “swarm” attacks. In turn, the national security community and the defense industry have turned their attention to potential countermeasures.

As Joseph Trevithick reported in The Drive, the Russians have been successful thus far in thwarting drone attacks in Syria using air defense radars, Pantsir-S1 short-range air defense systems, and electronic warfare systems. These attacks have not involved more than a handful of drones at a time, however. The initial Syrian rebel drone attack on Khmeimim Air Base in January 2018 involved 10 drones carrying 10 bomblets each.

The ubiquity of commercial drones also raises the possibility of attacks on non-military targets unprotected by air defense networks. Is it possible to defend every potential target? Perhaps not, but Jospeh Hanacek points out in War on the Rocks that there are ways to counter or mitigate the risk of drone attacks that do not involve sophisticated and expensive defenses. Among his simple suggestions are using shotguns for point defense against small and fragile drones, improving communications among security forces, and complicating the targeting problem for would-be attackers. Perhaps the best defense against drones is merely to avoid overthinking the problem.

Air Combat And Technology

Any model of air combat needs to address the effect of weapons on the opposing forces.  In the Dupuy Air Combat Model (DACM), this was rifled bullets fired from machine guns, as well as small caliber cannon in the 20-30 millimeter (mm) class.  Such was the state of air combat in World War II.  This page is an excellent, in-depth analysis of the fighter guns and cannon.  Of course, technology has effects beyond firepower.  One of the most notable technologies to go into active use during World War II was radar, contributing to the effectiveness of the Royal Air Force (RAF), successfully holding off the Wehrmacht’s Luftwaffe in the Battle of Britain.

Since that time, driven by “great power competition”, technology continues to advance the art of warfare in the air.  This happened in several notable stages during the Cold War, and was on display in subsequent contemporary conflicts when client or proxy states fought on behalf of the great powers.  Examples include well-known conflicts, such as the Korean and Vietnam conflicts, but also the conflicts between the Arabs and Israelis.  In the Korean War, archives now illustrate than Russian pilots secretly flew alongside North Korean and Chinese pilots against the allied forces.

Stages in technology are often characterized by generation.  Many of the features that are associated with the generations are driven by the Cold War arms race, and the back and forth development cycles and innovation cycles by the aircraft designers.  This was evident in comments by Aviation Week’s Bill Sweetman, remarking that the Jas-39 Grippen is actually a sixth generation fighter, based upon the alternative focus on maintainability, operability from short runways / austere airbases (or roadways!), the focus on cost reduction, but most importantly, software: “The reason that the JAS 39E may earn a Gen 6 tag is that it has been designed with these issues in mind. Software comes first: The new hardware runs Mission System 21 software, the latest roughly biennial release in the series that started with the JAS 39A/B.”

Upon close inspection of the DACM parameters, we can observe a few important data elements and metadata definitions: avionics (aka software & hardware), and sensor performance.  Those two are about data and information.  A concise method to assign values to these parameters is needed.  The U.S. Air Force (USAF) Air Combat Command (ACC) has used the generation of fighters as a proxy for this in the past, at least at a notional level:

[Source: 5th Generation Fighters, Lt Gen Hawk Carlisle, USAF ACC]

The Fleet Series game that has been reviewed in previous posts has a different method.  The Air-to-Air Combat Resolution Table does not seem to resonate well, as the damage effects are imposed against either one side or the other.  This does not jive with the stated concerns of the USAF, which has been worried about an exchange in which both Red and Blue forces are destroyed or eliminated in a mutual fashion, with a more or less one-for-one exchange ratio.

The Beyond Visual Range (BVR) version, named Long Range Air-to-Air (LRAA) combat in Asian Fleet, is a better model of this, in which each side rolls a die to determine the effect of long range missiles, and each side may take losses on non-stealthy units, as the stealthy units are immune to damage at BVR.

One important factor that the Fleet Series combat process does resolve is a solid determination of which side “holds” the airspace, and this is capable of using other support aircraft, such as AWACS, tankers, reconnaissance, etc.  Part of this determination is the relative morale of the opposing forces.  These effects have been clearly evident in air campaigns such as the strategic bombing campaign on Germany and Japan in the latter portion of World War II.

Dealing with this conundrum, I decided to relax by watching some dogfight videos on YouTube, Dogfights Greatest Air Battles, and this was rather entertaining, it included a series of engagements in aerial combat, taken from the exploits of American aces over the course of major wars:

  1. Eddie Rickenbacker, flying a Spad 13 in World War I,
  2. Clarence Emil “Bud” Anderson, flying a P-51B “Old Crow” in European skies during World War II, flying 67 missions in P-51Ds, 35 missions in F-80s and 121 missions in F-86s. He wrote “No Guts, No Glory,” a how to manual with lots of graphics of named maneuvers like the “Scissors.”
  3. Frederick Corbin “Boots” Blesse, flying a F-86 Sabre in “MiG Alley” in North Korea close to the Chinese border,
  4. Several engagements and interviews of aces from the Vietnam War:
    1. Steve Ritchie, who said “Surprise is a key element.” Previously discussed.
    2. Robin Olds – a triple ace in both WWII (P-38 and P-51) and Vietnam (F-4), and the mastermind of Operation Bolo, a fantastic application of deception.
    3. Randy “Duke” Cunningham and William P “Irish” Discol, flying an F-4 Phantom, “Showtime 100”, and up against North Vietnamese MiG-17s.

An interesting paraphrase by Cunningham of Manfred von Richthofen, the Red Baron’s statement: “When he sees the enemy, he attacks and kills, everything else is rubbish.”  What Richthofen said (according to skygod.com), was “The duty of the fighter pilot is to patrol his area of the sky, and shoot down any enemy fighters in that area. Anything else is rubbish.” Richtofen would not let members of his Staffel strafe troops in the trenches.

The list above is a great reference, and it got me to consider an alternative form of generation, including the earlier wars, and the experiences gained in those wars.  Indeed, we can press on in time to include the combat performance of the US and Allied militaries in the first Gulf War, 1990, as previously discussed.

There was a reference to the principles of aerial combat, such as the Dicta Boelcke:

  1. Secure the benefits of aerial combat (speed, altitude, numerical superiority, position) before attacking. Always attack from the sun.
  2. If you start the attack, bring it to an end.
  3. Fire the machine gun up close and only if you are sure to target your opponent.
  4. Do not lose sight of the enemy.
  5. In any form of attack, an approach to the opponent from behind is required.
  6. If the enemy attacks you in a dive, do not try to dodge the attack, but turn to the attacker.
  7. If you are above the enemy lines, always keep your own retreat in mind.
  8. For squadrons: In principle attack only in groups of four to six. If the fight breaks up in noisy single battles, make sure that not many comrades pounce on an opponent.

Appendix A – my own attempt to classify the generations of jet aircraft, in an attempt to rationalize the numerous schemes … until I decided that it was a fool’s errand:

  • Generation Zero:
    • World War II, 1948 Arab Israeli conflict
    • Blue: Spitfire, P-51 Mustang,
    • Red: Bf-109, FW-190, Mitsubishi Zero/George
    • Propeller engines, machine guns & cannons
  • First Generation:
    • Korean War, China & Taiwan conflicts
    • Blue: F-86 Sabre,
    • Red: MiG-15, Me-262?
    • Jet engines, swept wings, machine guns & cannons, early air-to-air missiles
  • Second Generation –
    • 1967 and Cuban Missile Crisis
    • Blue: F-100, F-102, F-104, F-5, F-8
    • Grey: Mirage III, Mirage F1
    • Red: MiG-19, MiG-21
    • Multi-mach speeds, improved air-to-air missiles, but largely within-visual range (WVR), early radar warning receivers (RWR), early countermeasures.
  • Third Generation:
    • 1973 Arab Israeli Wars, Vietnam War
    • Blue: F-4 Phantom, F-111 Ardvark, F-106?
    • Grey: Mirage III
    • Red: MiG-23, MiG-25, Su-15
    • Look-down/Shoot-down capability, radar-guided missiles, Beyond Visual Range (BVR), Identification Friend or Foe (IFF), all-aspect infrared missiles.
  • Fourth Generation:
    • 1980’s Cold War, 1990 Gulf War, 1982 Lebanon, 1980-88 Iran-Iraq War
    • Blue: F-15 Eagle, F-16 Viper, F-14 Tomcat, F/A-18 Hornet
    • Grey: Mirage 2000
    • Red: MiG-29, MiG-31, Su-27/30
  • Fourth Plus Generation:
    • 2003 Gulf War, 2011 Libiya
    • Blue: F/A-18E/F Super Hornet, F-15 improved (F-15E, F-15I, F-15SG, F-15SK…)
    • Grey: Eurofighter Typhoon, Rafale
    • Red: Su-35S
  • Fifth Generation:
    • Marketing term used by aircraft producers
    • Blue: Adanced Tactical Fighter (ATF) = F-22 Raptor, Joint Strike Fighter (JSF) = F-35 Lightening II
    • Grey: Grippen?
    • Red: PAK-FA Su-57, J-20
  • Sixth Generation – the current frontier
    • Blue: Next Generation Air Dominance (NGAD) program, UAS ?
    • Red: ?
    • Grey: Two seat, Twin tail “drone-herder”?

General McInerney

Lt. General Thomas McInerney has been in the news lately, mostly for saying things that are getting him kicked off of news shows:

https://en.wikipedia.org/wiki/Thomas_McInerney

It is my understanding that he was the person who was responsible for making sure that DACM (Dupuy Air Combat Model) was funded by AFSC. He then retired from the Air Force in 1994. We completed the demonstration phase of the DACM and quite simply, there was no one left in the Air Force who was interested in funding it. So, work stopped. I never met General McInerney and was not involved in the marketing of the initial effort.

The Dupuy Institute Air Model Historical Data Study

The Dupuy Air Campaign Model (DACM)

But, this is typical of the problems with doing business with the Pentagon, where an officer will take an interest in your work, generate funding for it, but by the time the first steps are completed, that officer has moved on to another assignment. This has happened to us with other projects. One of these efforts was a joint research project that was done by TDI and former Army surgeon on casualty rates. It was for J-4 of the Joint Staff. The project officer there was extremely interested and involved in the work, but then moved to another assignment. By the time we got original effort completed, the division was headed by an Air Force Colonel who appeared to be only interested in things that flew. Therefore, the project died (except that parts of it were used for Chapter 15: Casualties, pages 193-198, in War by Numbers).

Our experience in dealing with the U.S. defense establishment is that sometimes research efforts that takes longer than a few months will die……because the people interested in it have moved on. This sometimes leads to simple, short-term analysis and fewer properly funded long-term projects.