A Sherman tank of the U.S. Army 9th Armored Division heads into action against the advancing Germans during the Battle of the Bulge. {Warfare History Network]
Successful defense requires depth and reserves. It has been asserted that outnumbered military forces cannot afford to withhold valuable firepower from ongoing defensive operations and keep it idle in reserve posture. History demonstrates that this is specious logic, and that linear defense is disastrously vulnerable. Napoleon’s crossing of the Po in his first campaign in 1796 is perhaps the classic demonstration of the fallacy of linear (or cordon) defense.
The defender may have all of his firepower committed to the anticipated operational area, but the attacker’s advantage in having the initiative can always render much of that defensive firepower useless. Anyone who suggests that modern technology will facilitate the shifting of engaged firepower in battle overlooks three considerations: (a) the attacker can inhibit or prevent such movement by both direct and indirect means, (b) a defender engaged in a fruitless firefight against limited attacks by numerically inferior attackers is neither physically nor psychologically attuned to making lateral movements even if the enemy does not prevent or inhibit it, and (c) withdrawal of forces from the line (even if possible) provides an alert attacker with an opportunity for shifting the thrust of his offensive to the newly created gap in the defenses.
Napoleon recognized that hard-fought combat is usually won by the side committing the last reserves. Marengo, Borodino, and Ligny are typical examples of Napoleonic victories that demonstrated the importance of having resources available to tip the scales. His two greatest defeats, Leipzig and Waterloo, were suffered because his enemies still had reserves after his were all committed. The importance of committing the last reserves was demonstrated with particular poignancy at Antietam in the American Civil War. In World War II there is no better example than that of Kursk. [pp. 5-6]
Dupuy’s observations about the need for depth and reserves for a successful defense take on even greater current salience in light of the probably character of the near-future battlefield. Terrain lost by an unsuccessful defense may be extremely difficult to regain under prevailing circumstances.
The interaction of increasing weapon lethality and the operational and human circumstantial variables of combat continue to drive the long-term trend in dispersion of combat forces in frontage and depth.
As during the Cold War, the stability of alliances may depend on a willingness to defend forward in the teeth of effective anti-access/area denial (A2/AD) regimes that will make the strategic and operational deployment of reserves risky as well. The successful suppression of A2/AD networks might court a nuclear response, however.
Finding an effective solution for enabling a successful defense-in-depth in the future will be a task of great difficulty.
The two large campaign data bases, the Ardennes Campaign Simulation Data Base (ACSDB) and the Kursk Data Base (KDB) were designed to use for validation. Some of the data requirements, like mix of personnel in each division and the types of ammunition used, were set up to match exactly the categories used in the Center for Army Analysis’s (CAA) FORCEM campaign combat model. Dr. Ralph E. Johnson, the program manager for FORCEM was also the initial contract manager for the ACSDB.
FORCEM was never completed. It was intended to be an improvement to CAA’s Concepts Evaluation Model (CEM) which dated back to the early 1970s. So far back that my father had worked with it. CAA ended up reverting back to CEM in the 1990s.
They did validate the CEM using the ACSDB. Some of their reports are here (I do not have the link to the initial report by the industrious Walt Bauman):
It is one of the few actual validations ever done, outside of TDI’s (The Dupuy Institute) work. CEM is no longer used by CAA. The Kursk Data Base has never used for validation. Instead they tested Lanchester equations to the ACSDB and KDB. They failed.
But the KDB became the darling for people working on their master’s thesis for the Naval Post-Graduate School. Much of this was under the direction of Dr. Tom Lucas. Some of their reports are listed here:
Both the ACSDB and KDB had a significant air component. The air battle over the just the German offensive around Belgorod to the south of Kursk was larger than the Battle of Britain. The Ardennes data base had 1,705 air files. The Kursk data base had 753. One record, from the old Dbase IV version of the Kursk data base, is the picture that starts this blog post. These files basically track every mission for every day, to whatever level of detail the unit records allowed (which were lacking). The air campaign part of these data bases have never been used for any analytical purpose except our preliminary work on creating the Dupuy Air Campaign Model (DACM).
U.S.-supported Philippine guerilla fighters led the resistance against the Japanese occupation of Luzon during World War II. [Warfare History Network]
U.S. Army Major Amos Fox has recently published the first two of a set of three articles examining nature of proxy warfare in the early 21st century and suggests some ideas for how the U.S. might better conduct it.
Proxy environments dominate modern war… It is not just a Russian, Iranian or American approach to war, but one in which many nations and polities engage. However, the U.S. Army lacks a paradigm for proxy warfare, which disrupts its ability to understand the environment or develop useful tactics, operations and strategies for those environments.
His examination of the basic elements of proxy warfare leads him to conclude that “it is dominated by a principal actor dynamic, power relationships and the tyranny of time.” From this premise, Fox outlines two basic models of proxy warfare: exploitative and transactional.
The exploitative model…is characterized by a proxy force being completely dependent on its principal for survival… [It] is usually the result of a stronger actor looking for a tool—a proxy force—to pursue an objective. As a result, the proxy is only as useful to the principal as its ability to make progress toward the principal’s ends. Once the principal’s ends have been achieved or the proxy is unable to maintain momentum toward the principal’s ends, then the principal discontinues the relationship or distances itself from the proxy.
The transactional model is…more often like a business deal. An exchange of services and goods that benefits all parties—defeat of a mutual threat, training of the agent’s force, foreign military sales and finance—is at the heart of the transactional model. However, this model is a paradox because the proxy is the powerbroker in the relationship. In many cases, the proxy government is independent but looking for assistance in defeating an adversary; it is not interested in political or military subjugation by the principal. Moreover, the proxy possesses the power in the relationship because its association with the principal is wholly transactional…the clock starts ticking on the duration of the bond as soon as the first combined shot is fired. As a result, as the common goal is gradually achieved, the agent’s interest in the principal recedes at a comparable rate.
With this concept in hand, Fox makes that case that
[T]he U.S. Army is ill-suited for warfare in the proxy environment because it mismanages the fixed time and the finite power it possesses over a proxy force in pursuit of waning mutual interests. Fundamentally, the salient features of proxy environments—available time, power over a proxy force, and mutual interests—are fleeting due to the fact that proxy relationships are transactional in nature; they are marriages of convenience in which a given force works through another in pursuit of provisionally aligned political or military ends… In order to better position itself to succeed in the proxy environment, the U.S. Army must clearly understand the background and components of proxy warfare.
These two articles provide an excellent basis for a wider discussion for thinking about and shaping not just a more coherent U.S. Army doctrine, but a common policy/strategic/operational framework for understanding and successfully operating in the proxy warfare environments that will only loom larger in 21st century international affairs. It will be interesting to see how Fox’s third article rounds out his discussion.
The second large campaign validation database created was the Kursk Data Base (KDB), done 1993-1996. I was also the program manager for this one and it ran a lot smoother than the first database. There was something learned in the process. This database involved about a dozen people, including a Russian research team led by Col. (Dr.) Fyodor Sverdlov, WWII veteran, author and Frunze Military academy; and ably assisted by Col. (Dr.) Anatoli Vainer, ditto. It also involved was the author Dr. Richard Harrison, and of course, Richard Anderson and Jay Karamales. Col. David Glantz helped with the initial order of battle as a consultant.
The unique aspect of the database is that we obtained access to the Soviet archives and was able to pull from it the unit records at the division, corps and army-level for every Soviet unit involved. This was a degree of access and research never done before for an Eastern Front battle. We were not able to access the Voronezh Front files and other higher command files as they were still classified.
The KDB tracked the actions of all divisions and division-sized units on both sides for every day of the German offensive in the south for 4 July 1943 to 18 July 1943. Kursk is a huge battle (largest battle of WWII) and consists of four separate portions. This database covered only one of the four parts, and that part was similar in size to the Battle of the Bulge and the air battle was larger than the Battle of Britain. On the German side were 17 panzer, panzer grenadier and infantry divisions while on the Soviet side were 37 rifle divisions and 10 tank and mechanized corps. There were 9 attacking German armored divisions versus 10 Soviet tank and mechanized corps at the Belgorod Offensive at Kursk. At the Battle of the Bulge there were 8 attacking (engaged) German armored divisions versus 9 U.S. armored divisions. The database design and what data was tracked was almost the same as the Ardennes Campaign Simulation Data Base (ACSDB). The stats on the data are here: http://www.dupuyinstitute.org/data/kursk.htm
The database was programmed in Dbase IV and is DOS based. Dbase IV has the advantage that it allowed text fields. Dbase III did not, so we were limited to something like 256 characters for our remarks fields. With Dbase IV, the remarks fields sometimes grew to a page or two as we explained what data was available and how they were used to assemble daily counts of strengths and losses. Sometimes they were periodic (vice daily) reports and sometimes contradictory reports. It was nice to be able to fully explain for each and every case how we analyzed the data. The Dbase IV version of the KDB is publicly available through NTIS (National Technical Information Service). The pictures in this blog post are screen shots from the Dbase IV version.
We also re-programmed the data base into Access and rather extensively and systematically updated it. This was in part because we took every single unit for every single day of the battle and assembled it into 192 different division-on-division engagements for use in our Division Level Engagement Data Base (DLEDB). This was done over a period of 11 years. We did the first 49 engagements in 1998-99 to support the Enemy Prisoner of War (EPW) Capture Rate Study for CAA (Center for Army Analysis), report E-4 (see http://www.dupuyinstitute.org/tdipub3.htm). Some of the other engagements were done later to support the study on Measuring the Value of Situational Awareness for OSD Net Assessment (Andy Marshall’s shop), reports SA-1. We (meaning me) then finished up the rest of the engagements in 2004 and 2009. In the end we had assembled an engagement record for every single division-on-division level engagement for the Belgorod Offensive. Added to that, in 1999 I began working on my Kursk book, which I had mostly finished in 2003 (but was not published until 2015). So over time, we rather systematically reviewed and revised the data in the database. This is not something we were able to do to the same extent for the ACSDB. The 192 engagements in DLEDB were then summarized as 192 separate “engagement sheets” in my Kursk book. There are also 76 of these engagement sheets available in my new Kursk book coming out in June: The Battle of Prokhorovka. This new book covers the part of the Belgorod offensive centered around the Battle of Prokhorovka.
The report was posted 6 March, even though it is dated 28 February. Always worth reading.
“In 2018, the United Nations recorded 22,478 security-related incidents, a 5 per cent reduction as compared with the historically high 23,744 security-related incidents recorded in 2017.”
“The Mission documented 10,993 civilian casualties (3,804 people killed and 7.189 injured between 1 January and 31 December 2018, the highest number of civilian deaths records in a single year since UNAMA began systematic documentation in 2009, and an overall increase of 5 per cent compared with 2017.”
“UNAMA attributed 63 percent of all civilian casualties to anti-government elements (37 per cent to the Taliban, 20 per cent to ISIL-KP and 6 per cent to unidentified anti-government elements, including self-proclaimed ISIL-KP), 24 per cent to pro-government forces (14 per cent to Afghan national defense and security forces, 6 per cent to international military forces, 2 per cent to pro-government militias, and 2 per cent to undermined or multiple pro-government forces), 10 per cent to unattributed crossfire during ground engagements between anti-government elements and pro-government forces and 3 per cent to other incidents, including explosive remnants of war and cross-border shelling.”
“Between 1 November and 10 January 49,001 people were newly displaced by the conflict, brining the total number of displaced in 2018 to 364,883 people.”
Security Incidences Civilian
Year Incidences Per Month Deaths
2008 8,893 741
2009 11,524 960
2010 19,403 1,617
2011 22,903 1,909
2012 18,441? 1,537? *
2013 20,093 1,674 2,959
2014 22,051 1,838 3,699
2015 22,634 1,886 3,545
2016 23,712 1,976 3,498
2017 23,744 1,979 3,438
2018 22,478 1,873 3,804
As I noted in my last post: “This war does appear to be flat-lined, with no end in sight.” I choose not to comment at the moment on the on-going peace negotiations.
Today’s edition of TDI Friday Read is a roundup of posts by TDI President Christopher Lawrence exploring the details of tank combat between German and Soviet forces at the Battle of Kursk in 1943. The prevailing historical interpretation of Kursk is of the Soviets using their material and manpower superiority to blunt and then overwhelm the German offensive. This view is often buttressed by looking at the ratio of the numbers of tanks destroyed in combat. Chris takes a deeper look at the data, the differences in the ways “destroyed” tanks were counted and reported, and the differing philosophies between the German and Soviet armies regarding damaged tank recovery and repair. This yields a much more nuanced perspective on the character of tank combat at Kursk that does not necessarily align with the prevailing historical interpretations. Historians often discount detailed observational data on combat as irrelevant or too difficult to collect and interpret. We at TDI believe that with history, the devil is always in the details.
Continental U.S. Air Defense Identifications Zones [MIT Lincoln Laboratory]
My last post detailed how the outbreak of the Korean War in 1950 prompted the U.S. to undertake emergency efforts to bolster its continental air defenses, including the concept of the Air Defense Identification Zone (ADIZ). This post will trace the development of this network and its gradual integration with those of Japan and NATO.
The permanent network depended on each radar site to perform GCI [Ground Control & Intercept] functions or pass information to a nearby GCI center. For example, information gathered by North Truro Air Force Station on Cape Cod was transmitted via three dedicated land lines to the GCI center at Otis AFB, Massachusetts, and then on to the ADC Headquarters at Ent AFB, Colorado. The facility at Otis AFB was a regional information clearinghouse that integrated the data from North Truro and other regional radar stations, Navy picket ships, and the all-volunteer GOC [Ground Observer Corps]. The clearinghouse operation was labor intensive. The data had to be manually copied onto Plexiglas plotting boards. The ground controllers used this data to direct defensive fighters to their targets. It was a slow and cumbersome process, fraught with difficulties. Engagement information was passed on to command headquarters by telephone and teletype. At Ent AFB, the information received from the regional clearinghouses was then passed on to enlisted airmen standing on scaffolds behind the world’s largest Plexiglas board. Using grease pencils, these airmen etched the progress of enemy bombers onto the back of the Plexiglas board so that air defense commanders could evaluate and respond. This arrangement impeded rapid response to the air battle.
It is hard to imagine an air defense challenge of the magnitude that potentially faced the U.S. and USSR by 1955. The Strategic Air Command (SAC) bomber fleet peaked at over 2,500 in 1955-1965, with 2,000 B-47s (range of 2,013 statute miles) and 750 B-52s (range of 4,480 statute miles). The range of U.S. bombers was extended considerably by the ~800 KC-135 aerial re-fueling tanker aircraft fleet as well.
In spite of the much publicized “bomber gap,” taking Soviet production numbers (and liberally adding aircraft of shorter range or unavailable until 1962…) produces an approximate estimate for a Soviet bombing fleet:
M-4 “Bison” (range of 3480 statute miles) = 93
Tu-16 “Badger” (range of 3888 statute miles) = 1507
Tu-22 “Blinder” (range of 3000 statute miles) = 250-300
Tu-95 “Bear” (range of 9400 statute miles) = 300+
That gave the U.S. an advantage in bombers of 2,750 to ~2,200 over the Soviets. Now, imagine this air battle being conducted with manual tracking on plexiglass with grease pencils…untenable!
Air Defense and Modern Computing
However, the problem proved amenable to solutions provided by the pending computer revolution.
At the Lincoln Laboratory development continued on an automated command and control system centered around the 250-ton Whirlwind II (AN/FSQ-7) computer. Containing some 49,000 vacuum tubes, the Whirlwind II became a central component of the SAGE system. SAGE, a system of analog computer-equipped direction centers, processed information from ground radars, picket ships, early-warning aircraft, and ground observers onto a generated radarscope to create a composite picture of the emerging air battle. Gone were the Plexiglas TM boards and teletype reports. Having an instantaneous view of the air picture over North America, defense commanders would be able to quickly evaluate the threats and effectively deploy interceptors and missiles to meet the threat.
By 1954, with several more radars in the northeast providing data, the Cambridge control center (a prototype SAGE center) gained experience in directing F-86D interceptors against B-47 bombers performing mock raids. Still much development, research, and testing lay ahead. Bringing together long-range radar, communications, microwave electronics, and digital computer technologies required the largest research and development effort since the Manhattan Project. During its first ten years, the government spent $8 billion to develop and deploy SAGE. By 1958, Lincoln Laboratory had a professional staff of 720 with an annual budget of $22.5 million, to conduct SAGE-related work. The contract with IBM to build sixty production models of the Whirlwind II at $30 million each provided about half of the corporation’s revenues for the 1950s and exposed the corporation to technologies that it would use in the 1960s to dominate the computer industry. In the meantime, scientists and electronic engineers in the defense industry strove to install better radars and make these radars invulnerable to electronic countermeasures (ECM), commonly called jamming.
The SAGE development effort became one of the foundations of modern computing, giving IBM the technological capability to dominate for several decades, until it outsourced two key components: hardware to Intel and software to a young Microsoft, both of which became behemoths of the internet age. It is also estimated that this effort brought a price tag which exceeded that of the Manhattan Project. SAGE also transformed the attitude of the USAF towards technology and computerization.
Current Air Defense Networks
In the 1950s and 60s, the U.S. continental air defense network gradually began to expand geographically and integrate with NADGE and JADGE air defense networks of its NATO allies and Japan.
NATO Air Defense Ground Environment (NADGE): This was approved by NATO in December 1955, and became operational in 1962 with 18 radar stations. This eventually grew to 84 stations and provided an inter-connected network from Norway to Turkey before being superseded by the NATO Integrated Air Defense System (NATINADS) in 1972. NATINADS was further upgraded in the 1980s to include data from the E-3 Sentry AWACS aircraft (AEGIS (Airborne Early-warning/Ground Environment Integrated Segment); not to be confused with the USN system with the same acronym.)
Base Air Defense Ground Environment (BADGE): This was the automated system, in the same fashion as SAGE, which replaced the manual system in place with the JASDF since 1960. The requirement was stated in July 1961, and was actually modeled on the Naval Tactical Information System (NTDS), developed by Hughes for the US Navy. This was ordered in December 1964, and operational in March 1969. This was superseded by Japan Aerospace Defense Ground Environment (JADGE) in July 2009.
We never seem to stop discussing validation at The Dupuy Institute even though it seems like most of the military operations research community only pays lip service to it. Still, it is something we encourage, even though it has only been very rarely done. A major part of our work over the years has been creation of historical databases for use in combat model validation, combat model testing, and combat model development. Over a series of posts, let me describe what databases are available.
First there are two big campaign databases. These are fairly well known. It is the Ardennes Campaign Simulation Data Base (ACSDB) and the Kursk Data Base (KDB). I was the program manager for both of them.
The ACSDB is a database tracking the actions of all divisions on both sides for every day of the Battle of the Bulge, from 16 December 1944 to 16 January 1945. That was 36 U.S. and British Divisions and 32 German Divisions and Brigades. It tracked the strength, equipment, losses, ammunition and oil for each of these units. The stats on the database are here: http://www.dupuyinstitute.org/data/ardennes.htm
The ACSDB was done from 1987 to 1990 at Trevor Dupuy’s old company, DMSI. There was around 16 or so people involved with it, including consultants like Hugh Cole and Charles MacDonald. We pulled up the units records for all the units on both sides from the U.S. Archives, UK Public Records Office, and the German achives in Freiburg. It was the largest historical database ever created (I do seem to be involved in creating some large things, like my Kursk book).
The database was programmed in Dbase III and is DOS based. The data base was delivered to CAA (Center for Army Analysis). It is publicly available through NTIS (National Technical Information Service). The pictures in this blog post are screen shots from the DBase III version. We do have our own corporate proprietary version re-programmed into Access and with some updates done by Richard Anderson (coauthor of Hitler’s Last Gamble).
Air Defense Identification Zones (ADIZ) in the South China Sea [Maximilian Dörrbecker (Chumwa)/Creative Commons/Wikipedia]
My previous posts have discussed the Japanese Air Self Defense Force (JASDF) and the aircraft used to perform the Defensive Counter Air (DCA) mission. To accomplish this, the JASDF is supported by an extensive air defense system which closely mirrors U.S. Air Force (USAF) and U.S. Navy (USN) systems and has co-evolved as technology and threats have changed over time.
On June 25, 1950, North Korea launched an invasion of South Korea, drawing the United States into a war that would last for three years. Believing that the North Korean attack could represent the first phase of a Soviet-inspired general war, the Joint Chiefs of Staff ordered Air Force air defense forces to a special alert status. In the process of placing forces on heightened alert, the Air Force uncovered major weaknesses in the coordination of defensive units to defend the nation’s airspace. As a result, an air defense command and control structure began to develop and Air Defense Identification Zones (ADIZ) were staked out along the nation’s frontiers. With the establishment of ADIZ, unidentified aircraft approaching North American airspace would be interrogated by radio. If the radio interrogation failed to identify the aircraft, the Air Force launched interceptor aircraft to identify the intruder visually. In addition, the Air Force received Army cooperation. The commander of the Army’s Antiaircraft Artillery Command allowed the Air Force to take operational control of the gun batteries as part of a coordinated defense in the event of attack.
In addition to North America, the U.S. unilaterally declared ADIZs to protect Japan, South Korea, the Philippines, and Taiwan in 1950. This action had no explicit foundation in international law.
Under the Convention on International Civil Aviation (the Chicago Convention), each State has complete and exclusive sovereignty over the airspace above its territory. While national sovereignty cannot be delegated, the responsibility for the provision of air traffic services can be delegated.… [A] State which delegates to another State the responsibility for providing air traffic services within airspace over its territory does so without derogation of its sovereignty.
This precedent set the stage for China to unilaterally declare ADIZs its own in 2013 that overlap those of Japan in the East China Sea. China’s ADIZs have the same international legal validity as those of the U.S. and Japan, which has muted criticism of China’s actions by those countries.
Recent activity by the Chinese People’s Liberation Army Air Force (PLAAF) and nuclear and missile testing by the Democratic People’s Republic of Korea (DPRK, or North Korea) is prompting incremental upgrades and improvements to the Japanese air defense radar network.
In August 2018, six Chinese H-6 bombers passed between Okinawa’s main island and Miyako Island heading north to Kii Peninsula. “The activities by Chinese aircraft in surrounding areas of our country have become more active and expanding its area of operation,” the spokesman [of the Japanese Ministry of Defense] said.… “There were no units placed on the islands on the Pacific Ocean side, such as Ogasawara islands, which conducted monitoring of the area…and the area was without an air defense capability.”
The cover of SPI’s monster wargame, The Campaign For North Africa: The Desert War 1940-43 [SPI][This post was originally published on 22 September 2017.]
Even as board gaming appears to be enjoying a resurgence in the age of ubiquitous computer gaming, it appears, sadly, that table-top wargaming continues its long, slow decline in popularity from its 1970s-80s heyday. Pockets of enthusiasm remain however, and there is new advocacy for wargaming as a method of professional military education.
Luke Winkie has written an ode to that bygone era through a look at the legacy of The Campaign For North Africa: The Desert War 1940-43, a so-called “monster” wargame created by designer Richard Berg and published by Simulations Publications, Inc. (SPI) in 1979. It is a representation of the entire North African theater of war at the company/battalion level, played on five maps which extend over 10 feet and include 70 charts and tables. The rule book encompasses three volumes. There are over 1,600 cardboard counter playing pieces. As befits the real conflict, the game places a major emphasis on managing logistics and supply, which can either enable or inhibit combat options. The rule book recommends that each side consist of five players, an overall commander, a battlefield commander, an air power commander, one dedicated to managing rear area activities, and one devoted to overseeing logistics.
The game map. [BoardGameGeek]
Given that a bingo clash review states that to complete a full game requires an estimated 1,500 hours, actually playing The Campaign For North Africa is something that would appeal to only committed, die-hard wargame enthusiasts (known as grognards, i.e. Napoleonic era slang for “grumblers” or veteran soldiers.) As the game blurb suggests, the infamous monster wargames were an effort to appeal to a desire for a “super detailed, intensive simulation specially designed for maximum realism,” or as realistic as war on a tabletop can be, anyway. Berg admitted that he intentionally designed the game to be “wretched excess.”
Although The Campaign For North Africa was never popular, it did acquire a distinct notoriety not entirely confined to those of us nostalgic for board wargaming’s illustriously nerdy past. It retains a dedicated fanbase. Winkie’s article describes the recent efforts of Jake, a 16-year Minnesotan who, unable to afford to buy a second-end edition of the game priced at $400, printed out the maps and rule book for himself. He and a dedicated group of friends intend to complete a game before Jake heads off to college in two years. Berg himself harbors few romantic sentiments about wargaming or his past work, having sold his own last copy of the game several years ago because a “whole bunch of dollars seemed to be [a] more worthwhile thing to have.” The greatness of SPI’s game offerings has been tempered by the realization that the company died for its business sins.
However, some folks of a certain age relate more to Jake’s youthful enthusiasm and the attraction to a love of structure and complexity embodied in The Campaign For North Africa‘s depth of detail. These elements led many of us on to a scholarly study of war and warfare. Some of us may have discovered the work of Trevor Dupuy in an advertisement for Numbers, Predictions and War: Using History to Evaluate Combat Factors and Predict the Outcome of Battles in the pages of SPI’s legendary Strategy & Tactics magazine, way back in the day.