General of the Army Valeriy Gerasimov, Chief of the General Staff of the Armed Forces of the Russian Federation and First Deputy Minister of Defence of the Russian Federation [Wikipedia]
Maxim A. Suchkov, the Russian coverage editor for Al-Monitor, provided an English-language summary on Twitter.
THREAD: 1. (Almost) Everything you wanted to know about #Russia‘s military operation in #Syria. Rus Chief of General Staff Army Gen. Valery Gerasimov reveals sensational details @kpru. I summarized major points in ENG: pic.twitter.com/QQblAwOJlX
While Gerasimov’s comments should be read critically, they do provide a fascinating insight into the Russian perspective on the intervention in Syria, which has proved remarkably successful with an economical investment in resources and money.
Gerasimov stated that planning for Russian military operations used Operation Anadyr, the secret deployment of troops and weapons to Cuba in 1962, as a template. A large-scale deployment of ground forces was ruled out at the start. The Syrian government army and militias were deemed combat-capable despite heavy combat losses, so the primary supporting tasks were identified as targeting and supporting fires to disrupt enemy “control systems.”
The clandestine transfer of up to 50 Russian combat aircraft to Hmeimim Air Base in Latakia, Syria, began a month before the beginning of operations in late-September 2015. Logistical and infrastructure preparations took much longer. The most difficult initial challenge, according to Gerasimov, was coordinating Russian air support with Syrian government ground forces, but it was resolved over time.
The Russians viewed Daesh (ISIS) forces battling the Syrian government as a regular army employing combat tactics, fielding about 1,500 tanks and 1,200 artillery pieces seized from Syria and Iraq.
While the U.S.-led coalition conducted 8-10 air strikes per day against Daesh in Syria, the Russians averaged 60-70, with a peak of 120-140. Gerasimov attributed the disparity to the fact that the coalition was seeking to topple Bashar al-Assad’s regime, not the defeat of Daesh. He said that while the Russians obtained cooperation with the U.S. over aerial deconfliction and “de-escalation” in southern Syria, offers for joint planning, surveillance, and strikes were turned down. Gerasimov asserted that Daesh would have been defeated faster had there been more collaboration.
More controversially, Gerasimov claimed that U.S.-supported New Syrian Army rebel forces at Al Tanf and Al-Shaddidi were “virtually” Daesh militants, seeking to destabilize Syria, and complained that the U.S. refused Russian access to the camp at Rukban.
According to Russian estimates, there were a total of 59,000 Daesh fighters in September 2015 and that 10,000 more were recruited. Now there are only 2,800 and most militants are returning to their home countries. Most are believed heading to Libya, some to Afghanistan, and others to Southwest Asia.
Gerasimov stated that Russia will continue to deploy sufficient forces in Syria to provide offensive support if needed and the Mediterranean naval presence will be maintained. The military situation remains unstable and the primary objective is the elimination of remaining al Nusra/Hay’at Tahrir al-Sham (al Qaida in Syria) fighters.
48,000 Russian troops were rotated through Syria, most for three months, from nearly 90% of Russian Army divisions and half of the regiments and brigades. 200 new weapons were tested and “great leaps” were made in developing and using drone technology, which Gerasimov deemed now “integral” to the Russian military.
Gerasimov said that he briefed Russian Defense Minister Sergei Shoigu on Syria twice daily, and Shoigu updated Russian President Vladimir Putin “once or twice a week.” All three would “sometimes” meet to plan together and Gerasimov averred that “Putin sets [the] goals, tasks, [and] knows all the details on every level.
ISIL fighters are able to move through parts of Syria that they (the international coalition) is unable to target (meaning Syrian government controlled areas).
There is an estimated 1,000 – 2,000 ISIL fighters are left fighting around the desert between the Iraqi and Syrian border.
Maj. Gen. Gedney warned that as ISIL lost control of the territory it held in Syria and Iraq, it will try to “vanish” in the population, before transforming itself into a more traditional insurgency (just to state the obvious).
It will be a little bit before the F-35 is capable of shooting down North Korea ballistic missiles. There are some “slight tweaks” that have to be done.
There is THAAD, which in a recent test the system in Alaska intercepted a U.S. ballistic missile fired over the Pacific.
There is GMD, which according to Atlantic magazine is 55% effective. Last May it did intercept an ICBM that was launched from 4,200 miles away.
They could develop drones with lasers
“Of North Korea were to launch only one missile at us, we could probably shoot it down…But their new missile could carry some very simply decoys, and it’s not certain that the missile we send out will be able to tell the difference between debris, decoys and a real warhead.”
There are several interesting links in the article.
The blog now consists of 545 posts and we have 366 comments (that we did not consider to be spam). That comes out to 259 posts and 104 comments last year and 286 posts and 262 comments this year.
The question is…where do we go from here. Right now, our answer is the same as last year, which is to keep-on-keeping-on. Pretty much just keep doing what we are doing. Now, there is much more we could do with the blog, but, any major improvement requires an investment of time and money, and…….
We have considered bringing in more bloggers, having a paid employee posting daily defense news (so we can compete with the other blogs and news services), and having a paid blogger do more military history material (which we know this is of interest to a number of our readers)…but…this means our primary business during the day would be maintaining and developing the blog. Our interest is in study and analysis, not journalism. We think there is still a severe shortage of good fact-based analysis of defense affairs. We do not think there is a shortage of journalists and news sites. So for this next year, it does appear that this will continue to be a “not-to-interfere” effort while we pursue our various writing, marketing and analytical efforts.
Hope you all a happy New Year and hope that 2018 will be a great year for you all.
Just as a quick easy test, I decided to find out which of The Dupuy Institue (TDI) reports are on the Defense Technical Information Center (DTIC). Our report list is here: http://www.dupuyinstitute.org/tdipub3.htm
We are a private company, but most of these reports were done under contract for the U.S. government. In my past searches of the DTIC file, I found that maybe 40% of Trevor Dupuy’s HERO reports were at DTIC. So, I would expect that a few of the TDI would be filed at DTIC.
TDI has 80 reports listed on its site. There are 0 listed on DTIC under our name.
There are a significant number of reports listed based upon our work, but a search on “Dupuy Institute” yields no actual reports done by us. I searched for a few of our reports by name (combat in cities, situational awareness, enemy prisoner of war, our insurgency work, our Bosnia casualty estimate) and found four:
This was four of eight reports we did as part of the Capture Rate Study. So apparently one of the contract managers was diligent enough to make sure those studies were placed in DTIC (as was our Kursk Data Base), but since then (2001), none of our reports have been placed in DTIC.
Now, I have not checked NTIS and other sources, but I have reason to believe that not much of what we have done in the last 20+ years is archived in government repositories. If you need a copy of a TDI report, you have to come to us.
We are a private company. What happens when we decide to close our doors?
Basements appear to be very important in the world of studies and analysis. That is where various obscure records and reports are stored. As the industry gets grayer and retires, significant pieces of work are becoming harder to find. Sometimes the easiest way to find these reports is to call someone you know and ask them where to find it.
Let me give a few examples. At one point, when we were doing an analysis of Lanchester equations in combat modeling. I was aware that Bob McQuie, formally of CAA, had done some work on it. So, I called him. Turns out he had a small file he kept of his own work, but he had loaned it to his neighbor as a result of a conversation he had. So…..he reclaimed the file, two of our researchers drove over to his house, he gave us the file, and we still have it today. Turns out that much of his material is also available through DTIC. A quick DTIC search shows the following: https://publicaccess.dtic.mil/psm/api/service/search/search?site=default_collection&q=mcquie
Of particular interest is his benchmarks studies. His work on “breakpoints” and comments on Lanchester equations is not included in the DTIC listing because it was published in Army, November 1987. I have a copy in my basement. Neither is his article on the 3:1 rule (published in Phalanx, December 1989). He also did some work on regression analysis of historical battles that I have yet to locate.
So, some of his work had been preserved. But, on the other hand, during that same casualty estimation methodologies study we also sent two researchers over to another “gray beard’s” house and he let our researchers look through his basement. We found the very useful study called Report of the Model Input Data and Process Committee, reference in my book War by Numbers, page 295. It does not show up in DTIC. We could not of find this study without a visit to his basement. He now lives in Florida, where they don’t have basements. So I assume the remaining boxes of materials he had have disappeared.
I am currently trying to locate another major study right now that was done by SAIC. So far, I have found one former SAIC employee who has two volumes of the multi-volume study. It is not listed in DTIC. To obtain a complete copy of the study, I am afraid I will have to contract someone else and pay to have it copied. Again, I just happen to know who to talk to find out what basement it is stored away in.
It is hard to appreciate the unique efforts that go into researching some of these projects. But, there is a sense at this end that as the “gray beards” disappear; reports and research efforts are disappearing with them.
Today’s edition of TDI Friday Read asks the question, how do we know if the theories and concepts we use to understand and explain war and warfare accurately depict reality? There is certainly no shortage of explanatory theories available, starting with Sun Tzu in the 6th century BCE and running to the present. As I have mentioned before, all combat models and simulations are theories about how combat works. Military doctrine is also a functional theory of warfare. But how do we know if any of these theories are actually true?
Well, one simple way to find out if a particular theory is valid is to use it to predict the outcome of the phenomenon it purports to explain. Testing theory through prediction is a fundamental aspect of the philosophy of science. If a theory is accurate, it should be able to produce a reasonable accurate prediction of future behavior.
In his 2016 article, “Can We Predict Politics? Toward What End?” Michael D. Ward, a Professor of Political Science at Duke University, made a case for a robust effort for using prediction as a way of evaluating the thicket of theory populating security and strategic studies. Dropping invalid theories and concepts is important, but there is probably more value in figuring out how and why they are wrong.
Trevor Dupuy and TDI publicly put their theories to the test in the form of combat casualty estimates for the 1991 Gulf Way, the U.S. intervention in Bosnia, and the Iraqi insurgency. How well did they do?
Dupuy himself argued passionately for independent testing of combat models against real-world data, a process known as validation. This is actually seldom done in the U.S. military operations research community.
However, TDI has done validation testing of Dupuy’s Quantified Judgement Model (QJM) and Tactical Numerical Deterministic Model (TNDM). The results are available for all to judge.
I will conclude this post on a dissenting note. Trevor Dupuy spent decades arguing for more rigor in the development of combat models and analysis, with only modest success. In fact, he encountered significant skepticism and resistance to his ideas and proposals. To this day, the U.S. Defense Department seems relatively uninterested in evidence-based research on this subject. Why?
David Wilkinson, Editor-in-Chief of the Oxford Review, wrote a fascinating blog post looking at why practitioners seem to have little actual interest in evidence-based practice.
The problem with evidence based practice is that outside of areas like health care and aviation/technology is that most people in organisations don’t care about having research evidence for almost anything they do. That doesn’t mean they are not interesting in research but they are just not that interested in using the research to change how they do things – period.
His explanation for why this is and what might be done to remedy the situation is quite interesting.
Strachan’s lecture, “The Changing Character of War,” proceeds from Carl von Clausewitz’s discussions in On Waron change and continuity in the history of war to look at the trajectories of recent conflicts. Among the topics Strachan’s lecture covers are technological determinism, the irregular conflicts of the early 21st century, political and social mobilization, the spectrum of conflict, the impact of the Second World War on contemporary theorizing about war and warfare, and deterrence.
This is well worth the time to listen to and think about.
Men of the U.S. Army 369th Infantry Regiment “Harlem’s Hellfighters,”in action at Séchault on September 29, 1918 during the Meuse-Argonne Offensive. [Wikimedia]
Davis also mentions AirLand Battle and “blitzkrieg” as examples of tactical and operational approaches to limiting the ability of enemy forces to mass on the battlefield. To this he adds “more recent operational concepts, New Generation Warfare and Multi Domain Battle, [that] operate in the air, electromagnetic spectrum and cyber domain and to deny adversary close combat forces access to the battle zone.” These newer concepts use Cyber Electromagnetic Activities (CEMA), Information Operations, long range Joint Fires, and Robotic and Autonomous systems (RAS) to attack enemy efforts to mass.
The U.S. Army is moving rapidly to develop, integrate and deploy these capabilities. Yet, however effectively new doctrine and technology may influence mass in combined arms maneuver combat, it is harder to see how they can mitigate the need for manpower in wide area security missions. Some countries may have the strategic latitude to emphasize combined arms maneuver over wide area security, but the U.S. Army cannot afford to do so in the current security environment. Although conflicts emphasizing combined arms maneuver may present the most dangerous security challenge to the U.S., contingencies involving wide area security are far more likely.
How this may be resolved is an open question at this point in time. It is also a demonstration as to how tactical and operational considerations influence strategic options.