You are on page 1of 44

AIR LAND SEA BULLETIN

Issue No. 2018-1 Air Land Sea Application (ALSA) Center Winter 2018

Approved for public release; unlimited distribution.


ALSA Staff

CONTENTS
Director
Col Brian Gross, USAF

Deputy Director
COL Matthew Ketchum, USA

Bulletin Editor
Director’s Comments...........................................................3
MAJ (P) Steve Padilla, USA
FEATURE ARTICLES
Editor
Ms. Patricia Radcliffe, Civilian, USAF
Capturing Counter-Improvised Explosive Device (C-IED)
Layout Artist/Illustrator
Ms. Laura Caswell, Civilian, USN Lessons Learned: The Case for Multi-Service Tactics,
Techniques, and Procedures for Countering Improvised
Publications Officer
Maj (P) Darin Lupini, USAF Explosive Devices (IEDs.....................................................4
Purpose: The ALSA Center publishes the ALSB two
times a year. ALSA is a multi-Service Department of Strengthening the Airlift-Airborne Team through Les-
Defense field agency sponsored by the US Army Train-
ing and Doctrine Command (TRADOC), Marine Corps sons from the Normandy and Corregidor Airdrops.....12
Combat Development Command (MCCDC), Navy War-
fare Development Command (NWDC), and Curtis E.
LeMay Center for Doctrine Development and Educa- Opening Engagement:
tion (LeMay Center). The ALSB is a vehicle to “spread
the word” on recent developments in warfighting con-
Look at Network Engagement..........................................18
cepts, issues, and Service interoperability. The intent
is to provide a cross-Service flow of information among
readers around the globe. This periodical is governed Forget the Hindenburg,
by Army Regulation 25-30. Let’s Maximize Global Agility...........................................23
Disclaimer: The ALSB is an open forum. The ar-
ticles, letters, and opinions expressed or implied The Critical Role Space (the Ultimate High Ground)
herein should not be construed as the official posi-
tion of TRADOC, MCCDC, NWDC, the LeMay Center, Plays in Enabling Command and Control (C2)............31
or ALSA Center.

Submissions: Get published—ALSA solicits articles


and readers’ comments. Contributions of less than IN HOUSE
5,000 words or less are ideal. Submit contributions,
double-spaced in MS Word. Include the author’s name,
title, complete unit address, telephone number, and Current ALSA MTTP Publications.................................38
email address. Graphics can appear in an article, but a
separate computer file for each graphic and photo-
graph (photos must be 300 dpi) must be provided. Future Air Land Sea Bulletins..........................................41
Send email submissions to alsadirector@us.af.mil.
The ALSA Center reserves the right to edit content to
meet space limitations and conform to the ALSB style ALSA Organization and Joint Working Groups............42
and format.

Reprints: The ALSA Center grants permission to re- ALSA Mission and Voting JASC Members....................43
print articles. Please credit the author and the ALSB.
Local reproduction of the ALSB is authorized and en-
couraged.
Online Access to ALSA Products....................................43

Cover Photo Information


Picture Top-Left: An A-10 Thunderbolt aircraft from Nellis Air Force Base, NV flies over the National
Training Center, Fort Irwin, CA May 13, 2016. (Photo by SPC Kyle Edwards, USA)
Picture Top-Right: Landing craft, air cushion (LCAC)-25 approaches Onslow Beach during Bold Al-
ligator, a training exercise at Camp Lejeune, NC, October 23, 2017. Bold Alligator 17, was designed
to allow the Navy and Marine Corps team to train with partner nations to refine and strengthen core
amphibious competencies critical to maritime power projection. (Photo by LCpl Scarlet A. Sharp,
USMC)

(continued on page 30)

ALSB 2018-1 2
DIRECTOR’S COMMENTS
Since 1975, the goal of the Air Land Sea tween airborne and airlift forces that drives
Application Center (ALSA) has been to pro- them towards shared understanding and a team
vide timely, relevant, and compelling doctri- mindset.
nal solutions to meet the needs of the joint The third article, “Opening Engagement:
warfighter. That goal not only remains in Look at Network Engagement”, is by Maj Scott
place, but has served to propel the men and Packard USMC (Retired). This article explores
women of ALSA to continually improve our network engagement as a tool for commanders
processes as we navigate through an increas- at all levels of conflict and throughout the en-
ingly complex warfighting environment. tire range of military operations. He argues for
We extend a special farewell to ALSA Di- a fundamental change in mindset from an as-
rector, Col Michael Kensick, United States Air sociation with the counter-IED and the insur-
Force (USAF), who retired after 24 years of gency fight, and toward expanded application of
faithful military service to our country. ALSA techniques across friendly, neutral, and threat
was very lucky to have “Fangs” Kensick at networks to prevent network engagement from
the helm and we thank him for advancing the becoming a marginalized concept.
ALSA traditions of continual improvement   The fourth article is “Forget the Hinden-
and excellence. We wish him and his family burg, Let’s Maximize Global Agility”, is by Lt Col
the best of luck on their future endeavors. Justin Dahman, USAF; LCDR Manuel Refugia
Also, the ALSA staff members welcome Jr., USN; and Mr. Randy Hall, Joint Task Force-
LTC James M. Grandy, United States Army Civil Support. This article discusses lighter-
(USA), to the team. than-air technology as a potential solution to
This Air Land Sea Bulletin (ALSB) is an increase logistical transportation mission resil-
open forum offering a wide mix of lessons iency, effectiveness, and access. It advocates for
learned, current statuses, and future consid- using hybrid airships as viable, agile resources
erations for warfighters. It contains a variety for conducting humanitarian and disaster relief
of articles that provide thought-provoking missions.
viewpoints and showcase the ingenuity and The fifth article, “Being Denied the Ultimate
flexibility of Department of Defense Service High Ground: The Critical Role Space Plays in
and civilian men and women. Enabling Command & Control”, is by LTC James
The first article is “Capturing Counter- T. Edwards, USA; LtCol Jeffrey A. Katzman,
IED [Improvised Explosive Device] Lessons USAF; and MAJ Robert P. Farrell, USA. This ar-
Learned: The Case for Multi-Service Tac- ticle argues that a recent overreliance on satellite
tics, Techniques, and Procedures (MTTP) for systems has made the US military command and
Countering IEDs”, by Marc Tranchemon- control mission potentially vulnerable to adver-
tagne, United States Navy (USN) (Retired) and saries. It advocates for the development of resil-
Alan Tompkins USAF (Retired). This article ient mitigating techniques to ensure future tech-
suggests that current joint and Service doc- nological advantages, which include an update
trine does little to capture lessons learned to to strategic policy, a prioritization of capabilities,
address how potential adversaries tactically adaptive training, and updated technology.
employ IEDs, and what tactics United States’ We invite you to seize opportunities to
(US’) forces can use to counter them. The arti- represent your Service and the joint com-
cle advocates for a MTTP publication to com- munity by sharing articles to be published
plement existing joint counter-IED doctrine. in future ALSBs and, also, participating in
The second article, “Strengthening the multi-Service tactics, techniques, and pro-
Airlift-Airborne Team through Lessons from cedures joint working groups. As we tackle
the Normandy and Corregidor Airdrops”, is the challenges ahead, your ideas matter now
by Maj Christopher “Creole” Martinez, USAF. more than ever. Your unique perspective can
This article examines the challenges and spark innovation for current and future joint
successes of the Normandy and Corregidor tactics, techniques, and procedures.
airdrops, and compares them with today’s
practices and tactics. The author argues that
while many lessons learned have developed
into sound doctrine, current doctrine should Brian J. Gross, Colonel, USAF
cultivate a culture of common purpose be- Director

3 ALSB 2018-1
CAPTURING COUNTER-IMPROVISED EXPLOSIVE
DEVICE (C-IED) LESSONS LEARNED: THE CASE FOR
MULTI-SERVICE TACTICS, TECHNIQUES, AND
PROCEDURES FOR COUNTERING IMPROVISED
EXPLOSIVE DEVICES (IEDS)

USAF SSgt Brian Vosper, explosive ordnance disposal technician assigned to the 379th Expeditionary Civil Engineer Squadron, operates a
compact metal detector to assess a potential threat during nighttime counter -improvised explosive device training at Al Udeid Air Base, Qatar,
October 21, 2017. (Photo by SSgt Patrick Evenson, USAF)

by CDR Marc Tranchemontagne, CURRENT LANDSCAPE OF C-IED


USN (Ret) and SMSgt Alan Tomp- DOCTRINE
The existing body kins, USAF (Ret) The existing body of joint and
of joint and Ser- Although a great many detection means, Service doctrine does not adequately
vice doctrine does ranging from intricate electronic devices address the tactical implications of
not adequately IEDs or provide practical guidance for
to specially trained dogs, have been de-
address the tacti- dealing with these weapons. Most of
veloped, experience has shown that an
cal implications
alert Marine, aware of what to look for the existing joint and Service C-IED
of IEDs or provide
practical guidance and where to look, is the most effective doctrine describes how to organize C-
for dealing with detection device. IED activities—defining C-IED lines of
these weapons. operation, identifying C-IED enablers,
Source: Fleet Marine Force Reference explaining intelligence processes, and
Publication (FMFRP) 12-43, Profession- describing various C-IED staff func-
al Knowledge Gained from Operational tions—useful and appropriate infor-
Experience in Vietnam, Mines and Boo- mation, but not tactical guidance.
bytraps Throughout joint and Service doctrine,
there is little to address how the enemy

ALSB 2018-1 4
employs IEDs tactically and what tac- the Army’s C-IED training circular, TC
tics US forces can use to counter them. 3-90.37, describes C-IED training but
A multi-Service tactics, techniques, provides little practical guidance for
and procedures publication for coun- countering IEDs. The Marine Corps
tering IEDs would complement exist- retains the Vietnam-era FMFRP 12-43
ing joint C-IED doctrine with practical and other historical Fleet Marine Force
guidance for forces operating in IED- publications in its doctrine library,
rich environments. but they are tied to a specific time and
place and are no longer considered au-
IEDs, mines, and booby traps
thoritative.3 Much of the joint and Ser-
trace their long history to the nonex-
vice C-IED doctrine guides special pur-
plosive traps used by ancient armies to
pose forces, like EOD and engineers, or
impede movement and attrite forces.1
task-organized enablers, like expedi-
They have been such vexing problems
tionary laboratories and site exploita-
that every modern conflict has gener-
tion teams. Little of the current C-IED
ated its own body of publications to
doctrine addresses the needs of the
address them. However, most of these
Soldiers, Sailors, Airmen, and Marines
technical manuals, training circulars,
who face IEDs during regular combat
handbooks, and identification guides
operations. An exception, however, is
were soon shelved after each conflict,
the recently published Tactical Convoy
leaving future generations to relearn
Operations, which has a very good C-
the same lessons in subsequent wars.
IED appendix.4
The 2007 version of Army techniques
publication 3-21.8, Infantry Platoon The joint community has yet
and Squad, for example, dedicated an to mine and distill the extensive body
entire appendix to countering IEDs; the of lessons from recent and histori-
2016 publication contains less than cal operations for use in tactical-level
two pages. A C-IED MTTP would help doctrine and tactics, techniques, and
to break this cycle by retaining tacti- procedures (TTP). The Center for Army
cal principles for countering IEDs in a Lessons Learned (CALL) has an excel-
single publication. lent collection of C-IED material, in-
cluding IED bulletins, unit lessons
Current joint and Service publi-
learned reports, unit standard oper-
cations provide the Service member lit-
ating procedures, and various special
tle tactical-level guidance for counter-
studies; but, lessons learned and best ... but, lessons
ing IEDs. Joint C-IED guidance exists
practices do not carry the same author- learned and best
in Joint Publication 3-15.1, Counter-Im-
ity as doctrine. Lessons learned leave practices do not
provised Explosive Device Operations,
users to decide which TTP are suitable, carry the same
related joint doctrine for site exploita-
feasible, acceptable, and doctrinally authority as
tion, joint explosive ordnance disposal doctrine. Les-
sound. Even though the CALL bins its
(EOD) and combat engineer doctrine, sons learned leave
“C-IED Products” together, the user
and similar Service issuances. Joint users to decide
must still sort through a large body of
doctrine, however, focuses on the the- which TTP are
material to find information relevant
ater-strategic and operational levels of suitable, feasible,
to the particular tactical problem. The
war. Service doctrine focuses on op- acceptable, and
Joint Improvised Threat Defeat Orga- doctrinally sound.
erational-level employment of Service
nization (JIDO) once maintained the
forces and organizing operational-level
Joint Knowledge and Information Fu-
C-IED activities. The Army and Ma-
sion Exchange (JKnIFE) portal as a
rine Corps have techniques publica-
source of C-IED training, unit after-
tions specifically for countering-IEDs,
action reports, and lessons learned.5
but they concentrate on command and
The portal is no longer available; so,
control and three C-IED lines of opera-
much of JKnIFE’s C-IED information
tion—attack the network, defeat the
is no longer easily discoverable. Simi-
device, and train the force.2 They pro-
larly, the C-IED joint task forces (JTF)
vide little advice on C-IED tactics. Even
in Iraq and Afghanistan, Troy and
5 ALSB 2018-1
Paladin, produced mountains of data. and bayonets left in conspicuous posi-
Much of the information was relevant tions”.7 World War II saw similar ex-
to detecting, defeating, and exploiting plosive hazards, including this insidi-
IEDs. With the deactivation of both ous ploy:
JTFs, their digital portals went offline.
While the information may still exist, In Italy, in 1943, British troops came
it is not readily available, discoverable, upon a highly desirable billet abandoned
or searchable. An MTTP publication by the retreating Germans, its front door
could capture this information in a invitingly half open. Entering cautiously
manner that is authoritative and com- through a window to avoid the likely
prehensive. booby trap, they approached the front
door from inside and found attached
No existing doctrine or TTP pub- to it the expected explosive charge, ap-
lication addresses countering IEDs in parently designed to function when the
the maritime environment. None of the door was moved. They left the house
current doctrine specifically address- and attached a line to the doorknob of
es enemy IED tactics in the maritime the front door. They retreated across the
environment or indicators of IED ac- road to a conveniently sited slit trench
tivities at sea. Recent Navy undersea and pulled the line. A second trap hid-
mine countermeasures TTP describes den in the trench and connected to the
improvised sea mines, and the most door exploded and killed them all.8
current edition of the JIDO and De-
In North Africa, German troops
fense Intelligence Agency-sponsored
even crept into US minefields to booby
IED Lexicon (not doctrine but widely
trap US mines with anti-lift devices to
accepted) adds terminology for char-
slow the American advance as troops
acterizing IEDs in the maritime envi-
cleared their own defensive mine-
ronment. Like IEDs used on land to
fields.9 In the Pacific, it was common
alter terrain, the enemy can seed IEDs
for the Japanese to booby trap their
in the littorals, inland waterways, nar-
dead, especially officers whose bodies
rows seas, archipelagic waters, and in-
would likely be searched for material of
ternational straits to interdict military
intelligence value.10 During the Korean
operations and disrupt commerce.
war, retreating North Koreans booby
trapped timber knowing that United
THE ENDURING THREAT
Nations forces would be scrounging for
The effectiveness of IEDs, firewood to stay warm.11 Regular forces
mines, and booby traps has ensured have, historically, booby trapped ar-
an enduring place for them in mod- eas as they withdrew to slow the en-
ern warfare. Though often associated emy’s advance, prevent him from using
with irregular warfare, these weapons abandoned stores, or deter him from
are just as common in traditional op- taking shelter in abandoned buildings
erations. An 1862 article in Harper’s and fighting positions, which leaves
Weekly describes Confederate impro- him exposed to the elements and en-
vised mines, “infernal machines,” as emy fires.12
pear-shaped, iron casks filled with
“grape, canister, and four eight-pound IEDs, of course, are a staple of
IEDs, of course,
shells, surrounded by about two bush- irregular warfare. A former Army tech-
are a staple of ir-
regular warfare. els of coarse powder,” which Union nical manual describes their utility in
troops had to render safe.6 The 1917 unconventional warfare, which also
Australian Army directive, German captures their appeal to guerrillas, in-
Ruses, warns troops of “traps” set by surgents, and terrorists:
withdrawing German forces, including
an admonition to beware of “attrac- Manufactured, precision devices al-
tively furnished dugouts” and “souve- most always will be more effective, more
nirs, such as helmets, shells, badges, reliable, and easier to use than impro-
vised ones, but shelf items will just not
ALSB 2018-1 6
be available for certain operations for ple, the Viet Cong sometimes marked
security of logistical reasons. Therefore, booby traps with sticks placed in an
the operator will have to rely on materi- arrowhead pattern.15 In Iraq and Af-
als he can buy in a drug or paint store, ghanistan, insurgents frequently used
find in a junk pile, or scrounge from mili- stacked rocks. Regardless of method,
tary stocks. Also, many of the ingredi- the enduring principle is that terrorists
ents and materials used in fabricating will mark IED locations, and a careful
homemade items are so commonplace observer, who knows what to look for,
or innocuous they can be carried with- can often spot these indicators. When
out arousing suspicion. The completed the former Joint IED Defeat Organi-
item itself often is more easily con- zation (JIEDDO) director Army LTG
cealed or camouflaged. In addition, the Michael Barbero said, “a well-trained
field-expedient item can be tailored for warfighter is our best C-IED weapon,”
the intended target, thereby providing he was echoing a 50-year-old observa-
an advantage over the standard item in tion captured in the FMFRP 12-43 epi-
flexibility and versatility.13 graph that an alert Marine is the best
It is worth remembering that IED detector.
Most IEDs are still
improvised does not necessarily mean Most IEDs are still detected vi- detected visually,
crude or less effective. Well-funded sually, so effective C-IED training re- so effective C-IED
terrorist organizations using modern mains essential. A 1973 study reached training remains
manufacturing processes have mass- the same conclusion, stating that “as essential.
produced standardized ordnance expected, a very high percentage of de-
items. The Provisional Irish Republi- vices were detected by visual means.
can Army, for example, developed fif- This would seem to indicate a need to
teen “marks” of hand grenades and emphasize additional training in vi-
sixteen versions of mortars.14 The Rev- sual detection to increase the potential
olutionary Armed Forces of Colombia of what is currently our most effective
manufactured Fantasma landmines, detection means.”16 Current Army in-
and the Taliban mass-produced re- fantry doctrine notes that “detection
productions of Soviet PMN-1 antiper- depends on two things: being aware of
sonnel land mines, using a variety of what might be trapped and why, and
explosive fillers. Aum Shinrikyo’s pro- being able to recognize the evidence
duction of Sarin nerve gas for its 1995 of setting.”17 Both depend on focused
Tokyo subway attack, illustrates the training which should be grounded in
potential manufacturing capability of sound tactical doctrine.
a well-funded terror group. Even con-
ventional militaries employ improvised Even when insurgents do their
devices, such as Syria’s use of barrel best to conceal an IED, ground sign,
bombs against antiregime militias in such as disturbed earth, often remains
2014. Many countries manufacture detectable. Burying an IED without
standard firing devices for use in boo- leaving a trace is hard (especially at
by traps, such as the US M142 mul- night, in a hurry, and without anyone
tipurpose firing device and M5 pres- noticing) and trying to erase signs of-
sure-release firing device. Often IEDs ten leaves a signature.18 Yet, very little
incorporate conventional ordnance in information about ground sign aware-
improvised ways or use military muni- ness is available in current doctrine
tions as the main charge. and Service TTP, though the subject
is taught in various training courses.19
Insurgents often mark their Even the Marine Corps’ excellent Com-
emplaced IEDs so they and their com- bat Hunter, which focuses on the field
rades—and sometimes locals—can craft of observation, tracking, and pro-
avoid the devices. In the case of com- filing, dedicates only a single sentence
mand-detonated devices, the mark- to booby trap, IED, and landmine in-
ings often provide an aiming point for dicators. A C-IED MTTP could insti-
the triggerman. In Vietnam, for exam-
7 ALSB 2018-1
tutionalize guidance on interpreting remnants of war, retrograde ammu-
ground sign. nition, bulk explosives, and captured
munitions are all useful for making im-
Combat Hunter does a com-
provised devices. In Vietnam, the Viet
mendable job discussing atmospher-
Cong stripped the explosives from dud
ics—“the environmental mood of an
aerial bombs and artillery projectiles to
area (i.e., how a place looks, sounds,
build IEDs.23 In 1950s Cyprus, Cypriot
tastes, feels, and smells relative to a
separatists salvaged munitions from
baseline). Changes in the atmosphere
sunken warships to obtain explosives
of a community or individual can indi-
for IEDs.24 Unexploded ordnance (UXO)
cate imminent hostile action, such as
should be cleared from the battlefield
an IED attack. The most obvious indi-
as units move forward. Captured mu-
cators are the sudden absence of reg-
nitions and ammunition supply points
ular routines, patterns, and attitudes
must be secured or destroyed.
of the local populace or the presence
of abnormal activity.”20 Environmental Insurgents use carelessly dis-
atmospherics, taken with other indica- carded ordnance of all sizes as the ex-
tors, can key troops to the presence of plosive elements in IEDs. Even a sin-
IEDs. Alertness to indicators of chan- gle round, ejected to clear a stoppage,
nelization, markers, ground sign, and is useful for constructing a cartridge
environmental atmospherics can help IED. Additionally, materials discarded
ground forces avoid an IED ambush. as trash or improperly destroyed (such
as rations, storage containers, batter-
US forces have come up with
ies, cases, and waterproof packaging
several tactical C-IED principles to as-
materials) provide the enemy a valu-
sist the warfighter in an IED-rich en-
able source of supply for fabricating
vironment that a C-IED MTTP could
IEDs and booby traps.25 The lesson to
capture. The 5Cs (check, confirm,
the force is the importance of destroy-
clear, cordon, control) guide actions
ing UXO to deny the enemy a source of
when encountering a suspected IED.
supply and policing friendly positions
Mounted patrols in IED-rich environ-
before moving out of an area.
ments perform 5–25–200-meter checks
during a halt. Route clearance guid- As the United States fields new
ance from a JIEDDO Smart Book - de- IED countermeasures, interdicts the
scribes the role of route clearance in provision of IED components, or adopts
assured mobility. It describes the rela- new C-IED tactics, enemies field new
tionship between the route clearance IED technologies and tactics of their
package (RCP) and supporting EOD own. The cycle of measure and coun-
formations; and describes how to vary termeasure is a hallmark of the IED
the RCP’s order of movement relative fight. It is part of what makes coun-
to the threat, terrain, and available re- tering IEDs so challenging and so re-
sources.21 Various identification guides source intensive. Commanders should
help troops recognize IEDs and compo- anticipate that, when they introduce a
Good operational nents, including homemade explosive new countermeasure, the enemy will
security and and chemical precursors. seek to defeat it. Good operational se-
sound TTP can curity and sound TTP can prolong the
One of the important lessons of
prolong the use- usefulness of a countermeasure; but,
Operation IRAQI FREEDOM was that
fulness of a coun- eventually, the enemy will find a way
termeasure ... unsecured munitions looted from cap-
to thwart US technology and tactics.
tured depots delivered the IED ma-
Insurgents in Iraq and Afghanistan, for
terial that fueled the insurgency.22
example, did not need to understand
Operational planners should ensure
electronic warfare to realize that some-
adequate EOD and engineering ca-
thing was defeating their radio-con-
pacity exists to secure and dispose
trolled IEDs and altered their tactics
of captured arms, ammunition, and
accordingly.26 The shelf life of counter-
explosives. Dud ordnance, explosive
ALSB 2018-1 8
measures also means that having well- in Beirut and 2000 attack on the USS
trained soldiers and sound C-IED tac- Cole—has proven highly effective for
tics is ultimately more important than insurgent groups and difficult for the
technological countermeasures. US to counter. Insurgents can conceal
suicide IEDs in ways that make the
Many other tactics are useful for
devices difficult to detect, even dur-
preventing employing IEDs. Emplace-
ing a manual search, especially when
ment denial activities can prevent IED
cultural sensitivities or biases limit
employment, but they are not covered
the scope of the search. Searches of
in joint doctrine and Service TTP. Cul-
women, children, and the elderly are
vert denial systems, T-walls, entry con-
often less rigorous than searches of
trols, lighting, persistent surveillance,
military-aged men. For example, a fe-
scout sniper teams, and aggressive pa-
male Liberation Tigers of Tamil Eelam
trolling are all effective tactics for de-
terrorist wearing a suicide vest was re-
terring IED emplacement. Patrol and
sponsible for the 1991 assignation of
explosive detection dogs are efficient
former prime minister of India, Rajiv
IED detectors. Honesty traces—using
Gandhi. Hashmat Karzai, the cousin of
Global Positioning System to create a
the former Afghan prime minister, was
digital record of a patrol’s movement—
assassinated by a suicide bomber who
can help units avoid setting patterns.
hid the device under his Pashtun tur-
Counterinsurgency practices ban. US doctrine should do more than
US doctrine
that engage the local population can merely identify the problem; it should should do more
encourage people to report emplaced provide guidance for solving it. than merely iden-
IEDs and caches of IED material. A tify the problem;
The enemy will use all manner
handwritten sign at a Marine combat it should provide
of hoaxes, ruses, and come-ons to lure guidance for solv-
outpost aptly illustrates this relation-
the unsuspecting into a trap. Insur- ing it.
ship, stating:
gents often use secondary IEDs to in-
Best counter to IEDs = #1 the Af- crease the lethality and psychological
ghan people, #2 ANSF [Afghan Nation- effect of an IED incident by targeting
al Security Forces] partners and then first responders, media, and curious
metal detectors, dogs, GBOSS [ground onlookers who have gathered in the af-
based operational surveillance system], termath of an explosion. Indeed, “this
airplanes, etc. 80% of our IED finds diabolical tactic of using one bomb to
have been the direct result of tips from drive panicked crowds into the path of
local nationals because of the respect another, even more deadly bomb would
that you show to the people—and be- be repeated in Belfast, Beirut, Bagh-
cause they’ve watched you ruthlessly dad, and Bali.”30 Similarly, insurgents
close with, and destroy the enemy.27 may set multiple IEDs to ambush a pa-
trol so that troops rushing to aid the
Tip lines and rewards for infor- wounded also trigger explosions.31
mation can further provide incentives
for cooperation.28 The local population With some noteworthy excep-
is often better than coalition forces at tions, such as the al-Qaeda attacks
spotting IED indicators; it is, after all, on the USS Cole and Iraqi offshore oil
their terrain. During the Vietnam War, platforms in 2004, the US has not suf-
for example, Kit Carson Scouts (Viet fered many IED attacks at sea. A va-
Cong defectors who worked as intel- riety of reasons may account for this
ligence scouts with Marine infantry (such as the special skills needed to
units) were highly regarded for their operate and navigate at sea and the re-
ability to recognize ground sign and lo- moteness of targets), but other armed
cate hidden devices, booby traps, and groups, including Somali pirates, have
tunnels.29 overcome those challenges. The LTTE
Sea Tigers developed a robust mari-
Suicide bombing—such as the time capability, which included suicide
1982 attack on the Marine barracks
9 ALSB 2018-1
bombers, and Viet Cong guerrillas had Improving home station train-
some success with limpet and IED at- ing is essential to saving lives in an
tacks against naval forces in Vietnam. IED-rich environment.32 A C-IED MTTP
Routine peacetime presence and multi- could distill lessons learned and best
lateral exercises place US forces within practices into the fundamental C-IED
reach of adversaries who might em- principles and TTP that would support
ploy IEDs. IEDs also give an enemy the tactical level, home-station training. It
means to disrupt the reception, stag- would prevent the loss of a perishable
ing, and onward integration (RSOI) of skillset and break the cycle the United
troops flowing into the theater. Some States falls into after each conflict, in
tentative guidance for countering IEDs which previous lessons become distant
at sea seems warranted. memories until casualties painfully
bring those experiences rushing back
COUNTERARGUMENTS to the forefront.
One may argue that the Servic-
es’ home-station, C-IED sustainment CONCLUSION
training is sufficient for imparting C- The abundance of C-IED lessons
IED TTP to the force. The argument US forces have learned and relearned
suggests that sustainment training over many decades drives the need for
can eliminate the need for an MTTP an MTTP publication on the subject.
publication while avoiding the admin- US doctrine must do more than mere-
istrative burden on the Services that ly define the problem; it must provide
At the tactical comes with absorbing new doctrine. the means to solve the problem. At the
level of war, the Some may suggest, “just in time train- tactical level of war, the enemy uses
enemy uses IEDs
ing” or in-theater RSOI training will IEDs to constrain US freedom of action,
to constrain US
freedom of action, temper the need for authoritative ser- counter US superiority of arms, and at-
counter US su- vice doctrine. trite US forces. The joint force should
periority of arms, provide tactical guidance for meeting
Recent experience suggests oth-
and attrite US the enduring threat that IEDs and boo-
erwise. In Iraq and Afghanistan, rapid
forces. by traps pose, especially in the coun-
equipping initiatives filled many ur-
terterrorism and counterinsurgency
gent operational needs, but much of
operations in which the US is current-
this equipment languished in storage
ly engaged. Irregular warfare theorist
because operators did not know how to
David Kilcullen notes, “...the IED has
operate it or integrate it into existing
now entered the standard repertoire of
tactics. Asking a Soldier, Sailor, Air-
irregular forces in urban areas across
man, or Marine to wait until arriving
the planet, and there are no signs this
in theater to digest tactical doctrine
threat is shrinking; on the contrary, it
or learn to operate new equipment is
seems to be growing.”34 A tactically-fo-
a massive disservice to the member.
cused C-IED MTTP publication would
There are just too many other demands
complement operationally-focused joint
on their time during RSOI to gain pro-
and Service doctrine and provide last-
ficiency or integrate new capabilities
ing guidance for Soldiers, Sailors, Air-
into operations. Being able to turn on
men, and Marines facing a persistent,
and field calibrate the latest mine de-
worldwide IED threat.
tector is nearly worthless if operators
do not know where they belong in a END NOTES
patrol formation under different con- 1
Mike Croll, The History of Landmines, (Barnsley, Great Britain:
Pen & Sword Books Ltd, 1998), ix, 4-5.
ditions, how they work with a patrol
dog and handler, and who is covering
2
Army Techniques Publication (ATP) 3-90.37, Countering
Improvised Explosive Devices, (Washington DC: Headquarters,
them while they stare at the ground. Department of the Army, 29 July 2014). Marine Corps Interim
Moreover, the individual Service’s pre- Publication (MCIP) 10-10Ci, MAGTF Counter-Improvised Explo-
sive Device Operations (Washington DC: Headquarters United
deployment and home-station sustain- States Marine Corps, 2 May 2016).
ment training programs are not equal 3
Its forward notes it is “published to ensure the retention and
in scope. dissemination of useful information which is not intended to

ALSB 2018-1 10
become doctrine...” IED Visual Detection Training Study: Summary, (Washington DC:
Center for Naval Analysis, January 2013), 3.
4
Air Land Sea Application (ALSA) Center, Multi-Service Tactics,
Techniques, and Procedures for Tactical Convoy Operations, 18
ATP 3-21.8, Infantry Platoon and Squad, (Washington DC:
(Langley AFB: ALSA, 22 February 2017), http://www.alsa.mil/ Department of the Army, 12 April 2016), H-36.
mttps/tco/. 19
Michael Yon Online Magazine, “Ground Sign Awareness: What
5
Its forward notes it is “published to ensure the retention and is it about?” 08 September 2012, https://www.michaelyon-
dissemination of useful information which is not intended to online.com/ground-sign-awareness-what-is-this-about.htm
become doctrine...” 20
For a good description of ground sign see: Improvised Explo-
6
The DoD’s previous name for JIDO was the Joint IED Defeat sive Device (IED) W3H0005XQ Student Handout, (Camp Barrett,
Organization (JIEDDO). Virginia: The Basic School). http://www.trngcmd.marines.mil/
Portals/207/Docs/TBS/W3H0005XQ%20Improvised%20Explo-
7
“Torpedoes at Columbus,” Harper’s Weekly: A Journal of
sive%20Device.pdf?ver=2016-02-12-073759-177
Civilization, Vol. VI, No 274, New York: Harper and Brothers) 29
March 1862, 202-203, available at https://archive.org/stream/ 21
Defense Intelligence Agency (DIA) and Joint Improvised Threat
harpersweeklyv6bonn#page/202/mode/2up. Also, Mike Croll, Defeat Organization (JIDO), Improvised Explosive Device (IED)
The History of Landmines, (Barnsley, Great Britain: Pen & Sword Technical Exploitation Lexicon, 5th Edition, (Washington, DC:
Books Ltd, 1998), 11. DIA and JIEDDO, 15 May 2017), 18.
8
General Headquarters (GHQ), German Ruses (1st Printing Co., 22
JIEDDO, Counter-IED Smart Book for Pre-Deployment and
R.E., GHQ, April 8, 1917), available at http://museumvictoria. Field Use, version 2.1, (Washington DC: IJEDDOJIEDDO, 2012),
com.au/collections/items/1955526/document-germanruses- 180-192.
13th-australian-field-ambulance-worldwar-i-1914-1918 23
GAO report 07-444, Operation Iraqi Freedom: DoD Should
9
Ian Jones, Malice Aforethought: A History of Booby Traps from Apply Lessons Learned Concerning the Need for Security over
World War One to Vietnam (London: Greenhill Books, 2004), Conventional Munitions Storage Sites to Future Operations
back cover, dust jacket. Planning, March 22, 2007.
10
Jones, 119. 24
FMFRP 12-43, 4.
11
Jones, 206. 25
Jones, 229.
12
Jones, 227. 26
FMFRP 12-43, 46.
13
Jones, 45. 27
Joint Publication 3-15.1, Counter-Improvised Explosive Device
Operations, (Washington DC: The Joint Staff, 9 January 2012),
14
Technical Manual (TM) 31-210, Improvised Munitions
I-5.
Handbook, (Washington DC: Headquarters, Department of the
Army), 5. 28
MCIP 10-10Ci, Figure 1-1. 2nd Marine Expeditionary Brigade,
Task Force Leatherneck, “Operation Enduring Freedom Afghani-
15
Chris Ryder, A Special Kind of Courage: 321 EOD Squadron—
stan May 2009–April 2010,” PowerPoint, https://ndiastorage.
Battling the Bombers (London: Methuen Publishing Ltd., 2006),
blob.core.usgovcloudapi.net/ndia/2010/expedition/Nicholson.
308.
pdf.
16
Fleet Marine Force Reference Publication (FMFRP) 12-43, 29
FMFRP 12-43, 12.
Professional Knowledge Gained from Operational Experience in
Vietnam, 1969, Special Issue, Mines and Boobytraps (Wash- 30
FMFRP 12-43, 13.
ington DC: Headquarters, United States Marine Corps, 20 July 31
Mike Davis, Buda’s Wagon: A Brief History of the Car Bomb,
1989), 26.
(London: Verso, 2007), 49-50.
17
Jeffery L. Maxey and George J. Magner, Technical Report 73- 32
FMFRP 12-43, 23.
12, A Study of Factors Affecting Mine and Boobytrap Detection:
Subject Variables and Operational Considerations, (Alexandria 33
Colonel Leo Bradley, USA, “71st EOD Group Lessons Learned
Virginia: Human Resources Research Organization, June 1973), AAR Presentation Transcript,” Reverse-Collection and Analysis
46. A 2013 Center for Naval Analysis Study reached the same Team (R-CAAT) Series VOL 40, CASCOM Directorate for Les-
conclusions about the importance of visual detection training son Learned/Quality Assurance and Center for Army Lessons
and noted that considerable training had been developed by Learned, September 2012, 21.
the Marines during Vietnam. See: Sarah A. Stevenson, Diane M. 34
David Kilcullen, Out of the Mountains: The Coming Age of
Vavrichek, Chris J. Michel, William D. Brobst, and Alan C. Brown, the Urban Guerrilla (New York: Oxford University Press, 2013),
290-291.

11 ALSB 2018-1
STRENGTHENING THE AIRLIFT-AIRBORNE TEAM
THROUGH LESSONS FROM THE NORMANDY AND
CORREGIDOR AIRDROPS

Soldiers from the 82nd Airborne Division load into a C-17 aircraft for an air drop as part of Exercise Swift Response, June 4, 2016. Air Mobility
Command (AMC) aircraft provided the 82nd Airborne Division tactical and strategic airlift support. In addition to providing airlift and aerial refu-
eling assets, AMC’s support of Exercise Swift Response enhances interoperability among high-readiness units. (Staff Sgt William A. O’Brien,
USAF)
By Maj Christopher “Creole” 92 percent of the paratroopers landed
Martinez, USAF on their drop zone.4 Although the two
On 5 and 6 June 1944, troop operations differ in many ways, the in-
carrier aircraft, transports equipped teraction of airborne and troop carrier
for dropping paratroopers and equip- personnel influenced the results.
ment, left fifteen locations in England During the Normandy operation,
headed to Normandy to begin the inva- a lack of cooperation between para-
During the Nor-
mandy operation, sion of Europe.1 The drops did not go troopers and aircrew contributed to
a lack of coop- as planned. Only one tenth of the air- poor drop results and added unneces-
eration between borne troops landed on this intended sary challenges. However, the airborne
paratroopers and drop zone.2 A much smaller operation and troop carrier personnel dropped at
aircrew contrib- took place in the Pacific Theater when Corregidor displayed a team mindset
uted to poor drop the 317th Troop Carrier Group dropped and shared understanding that eased
results and added the 503rd Parachute Infantry Regiment
unnecessary chal- planning and promoted success.
on Corregidor Island on 16 Febru-
lenges. Since World War II, troop car-
ary 1945.3 This mission differed from
Normandy in size and result as over rier aviation (now called airlift) has ad-
vanced rapidly through technological
ALSB 2018-1 12
developments and tactics and doctrine but little guidance existed for troop
adjustments. Air Force airlift uses big- carriers. World War II leaders added
ger, faster, and more capable equip- doctrine for the troop carriers as they
ment than its World War II equivalents. gained experience in North Africa, Sic-
ily, Salerno, and smaller-scale drops
Army airborne forces have also Army airborne
in the Pacific Theater of Operations.
advanced technologically, using mod- forces have
These experiences contributed to the
ern parachutes and weapons. The hu- also advanced
production of “Training Circular No. technologically,
man body, however, has not changed.
113”, which was created to spread les- using modern
This means that delivering paratroop-
sons learned for the troop carrier and parachutes and
ers still requires large aircraft to fly at
airborne force.8 With that document weapons.
slow, vulnerable speeds.5 Therefore,
and the lessons learned in operations,
most of the doctrinal principles devel-
the troop carriers went into Normandy
oped in World War II still apply. Les-
and Corregidor.
sons from the personnel airdrops per-
formed at Normandy and Corregidor In Normandy the IX Troop Car-
show that today’s practices are sound rier Command sent 822 C-47s and C-
in tactics, but a gap in current training 53s filled with 13,428 paratroopers into
and doctrine exists regarding the in- combat.9 The planners relied heavily on
teraction between joint airlift and air- lessons from other European airdrops
borne forces. as they built the operation.10 When fi-
nalized, the plan contained formation
The troop carrier pilots of World
flight, air assembly, low altitude, and
War II pioneered a form of combat avia-
threat-avoidance tactics very similar
tion and created tactics and doctrine
to those used by today’s airlifters.11
still in use. Their performance at Nor-
The troop carriers also worked hard to
mandy led them to develop improve-
integrate their plan with air and naval
ments, which were tested in later drops,
assets.12 This was partially done by in-
and became doctrine. At Corregidor
cluding a Royal Navy representative in
troop carriers adapted to a new situa-
the planning cell.13
tion and further enhanced doctrine. In
both operations, many of the lessons Most aspects of the troop carrier
learned concerning airlift tactics exist plan worked well and remain the meth-
in modern doctrine, but current doc- ods used today. Still, the most impor-
trine does not completely address les- tant part of the mission, the airdrop,
sons regarding joint operations and air did not go well. Weather and enemy ac-
integration. tion caused some formations to break
apart, leading to poor dispersion on
American troop carriers began
the drop zones.14 Also, in some cases
developing their theory for employing a
the airborne troops and troop carrier
new form of combat aviation by watch-
aircrews did not work together very
ing the German military’s invasion of
well.15 The outcome was that only ten
Crete using Fallschirmjäger (paratroop-
percent of the paratroopers landed on
er) tactics in May 1941.6 The Germans
their planned drop zone.16
never attempted another large-scale
parachute assault for the duration of Operations at Normandy put
the war due to the losses suffered, but the tactical advantages and risks of
It also showed
the success of the operation sparked night operations, low-altitude flight, the troop carriers
imaginations in the United States (US) and weather on display. It also showed the importance of
military.7 The Americans soon found the troop carriers the importance of creating a prop-
out for themselves how difficult this creating a properly integrated air plan erly integrated
type of operation could be to execute. and the necessity of support from other air plan and the
types of combat aircraft. Also, it dem- necessity of sup-
The Americans went to war with port from other
onstrated that teamwork and shared
some guidance for paratroop opera- types of combat
understanding must exist between
tions contained in field manuals (FMs), aircraft.
airborne and troop carrier personnel,
13 ALSB 2018-1
a lesson that was validated during the C-130H, and C-17 contain methods
drops at Corregidor. similar to those used in both World
War II examples. For example, they
Corregidor was very different
advise, “Low-level flight reduces the
from Normandy in scale, resources,
chance of visual, aural, and electronic
planning time, enemy resistance, and
detection.”22 This tactic was used in
geography. The troop carriers used
both missions.
the same published guidance as in
the Normandy operation, but it had to New technology also helps over-
be tailored to the island environment. come some of the factors that caused
Through innovation and creativity, poor performance at Normandy. Mod-
troop carrier and airborne personnel ern aircraft radars are vastly superior
developed a plan that accounted for to those used in Normandy, and air-
unusually small drop zones and high lift assets use equipment that enables
winds not addressed in airlift manuals precise formation flight in inclement
of the time.17 Although the geography weather. Furthermore, night vision
forced the aircraft into tactically un- goggles make night airlift employment
sound drop formations and extended much easier than during World War II.
time over the objective area, integra- Technological advances increase the
tion with naval and air assets succeed- accuracy of airdrops, making small-
ed.18 drop-zone targeting, like those on Cor-
regidor, less challenging. However,
The outcome on Corregidor
technology does not guarantee suc-
proved the effectiveness of their plan-
cess.
ning. The troop carriers delivered 2,000
The airlift AFTTP paratroopers with 92.5 percent accura- The airlift AFTTP are structured
are structured in cy on 344 passes over the drop zones.19 in a way that offers techniques and
a way that of- During the drops only ten aircraft and methods to approach each segment of
fers techniques one aircrew member were hit by enemy the mission. For example, they contain
and methods to fire, but all the aircraft were still flyable a chapter on airdrop and another on
approach each and the crewman was only wounded.20 formation. Then, they give different air-
segment of the
The results would, likely, have been drop types and formation geometries
mission.
much worse without joint cooperation within the chapters. Planners can use
and suppression of the enemy provided the guidance that fits a given situation.
by supporting forces. Furthermore, the This promotes flexibility and allows air-
trust and unity between the airborne lift planners to adapt to an unfamiliar
and troop carrier units enabled flexibil- situation as the troop carriers did at
ity, mutual understanding, and shared Corregidor. However, these documents
goals.21 do not offer ways to integrate planning
and execution with other air assets
The troop carrier mission to
and teach nothing about the airborne
Corregidor used tactics that are famil-
tactics or procedures.
iar to today’s airlift forces: formation,
low level, and adaptation to geographi- FM 3-99, Airborne and Air As-
cal and resource constraints. It served sault Operations, contains cross-do-
as a positive example of how joint ef- main information, but it is not detailed
fort between airborne and troop carrier enough to create shared understand-
units could impact results. Further- ing of methods and needs. It does a
more, it reinforced the importance of better job of stressing the importance
an integrated air plan. of coordinated planning between the
airlift and airborne communities than
Modern airlift doctrine contains
the AFTTP. Still, this manual and the
many of the lessons of Normandy and
AFTTP leave unaddressed integration
Corregidor. Air Force tactics, tech-
and teamwork lessons from Normandy
niques, and procedures (AFTTP) publi-
and Corregidor.
cations for employment of the C-130J,

ALSB 2018-1 14
Joint doctrine is written “to en- interaction and shorten planning time.
hance the operational effectiveness of
As important as the interac-
joint forces by providing fundamental
tion with other air planners is, an air-
principles that guide the employment
lift crew’s relationship with airborne
of US military forces toward a common
forces is more important. Today’s air-
objective.”23 However, Joint Publica-
lift begins at a disadvantage as com-
tion (JP) 3-17, Air Mobility Operations;
pared to the World War II troop carri-
and JP 3-18, Joint Forcible Entry Oper-
ers. Organizational changes have made
ations, do not address building a joint
the two communities less familiar with
team between airborne and airlift forc-
one another. Furthermore, today’s Air
es. Also, they do not address air plan
Force does not have the resources to
integration. They give broad guiding
maintain a community dedicated only
principles for airdrops similar to those
to tactical airlift. Airlifters cannot fo-
found in the FMs created before, and
cus solely on delivering and supporting
during, World War II. They also recog-
paratroopers because they have world-
nize certain considerations, such as
wide commitments to fulfill that are
the need for air superiority and drop
higher priorities than airborne sup-
zone selection factors.24 The JPs ex-
port. These factors make it imperative
plain the concept of airborne opera-
that doctrine exists to help bridge the
tions and familiarize high-level leaders
gap between joint partners.
with the use airborne forces.25 They do
not, however, advance the cross-Ser- Although leading up to the Nor-
vice understanding of practitioners of mandy drop, the troop carriers and
parachute insertion. airborne personnel worked closely to-
gether in rehearsals, there was inter-
Today’s doctrine captures the
personal conflict during the mission.26
many tactical lessons of Normandy
The disputes, caused by lack of trust,
and Corregidor. In fact, the overarch-
increased the stress of an already tense
ing principles driving the tactics re-
situation. In one instance, it lead to the
main unchanged. Broad airlift con-
loss of an aircraft.27 Normandy showed
cepts endure because technology has
how devastating it is when airlift and
not improved, over the past 70 years,
airborne forces are not in agreement.
the human ability to exit an aircraft.
Even with vast preparation, the two
Therefore, airlifters must fly slow
communities did not have the same vi-
enough to enable paratroopers to
sion of what a successful outcome en-
jump. This requires the aircraft to re-
tailed.
main slow, large, and vulnerable.
The troop carriers and para- The vulnerability
The vulnerability and unchang-
troopers at Corregidor displayed the and unchanging
ing characteristics of airlift also drive
opposite of Normandy. Their previous characteristics
the need for the protection of other
experiences working with each other of airlift also
friendly aircraft, as seen at Norman-
allowed a close, trusting relationship drive the need
dy and Corregidor. This requirement for the protection
between the two communities.28 This
is mentioned in modern doctrine, but of other friendly
started in planning, with joint briefs
there is little airlift guidance concern- aircraft, as seen
occurring until the operation launched
ing integrating with other aircraft. at Normandy and
even though there was a very short
Air integration starts with planning. Corregidor.
time from mission receipt to the actual
Therefore, airlift AFTTP can improve by
operation.29 The cooperation continued
adding common integration planning
during the drop, highlighted by the
factors. These should focus on infor-
leadership from both groups flying on
mation needed by supporting assets
the same plane and working in unison
and information needed from other air
to ensure a successful parachute in-
assets. By knowing what others need,
sertion.30 This type of teamwork should
airlift planners can begin coordination
be sought in every personnel airdrop.
with information to offer from the first

15 ALSB 2018-1
Promoting teamwork and unity communities’ roles that is often lack-
of effort between today’s airborne and ing during modern exercises. By un-
airlift forces begins with leadership cre- derstanding the other Service compo-
ating understanding between the forc- nent’s mission, both communities can
es. This takes cultural changes in both develop practices better suited to meet
communities, but doctrine can help their individual needs. Also, doctrine
By creating a doc- bridge the gaps. By creating a doctrine will reduce questioning the other Ser-
trine publication publication shared by airborne and vice’s methods, which often occurs to-
shared by air- airlift and written with input from both day. Instead of believing certain airlift
borne and airlift communities, the two forces can start maneuvers are performed with no tac-
and written with to appreciate each other’s concerns, tical necessity, airborne forces will un-
input from both methods, and limitations. derstand their purpose from the begin-
communities, the ning. Airlifters will also understand the
two forces can The manual should be a multi-
importance of certain requests from
start to appreciate Service tactics, techniques, and proce-
each other’s con- airborne forces. In the end, this should
dures publication focused on creating
cerns, methods, prevent misunderstandings like those
shared understanding between airlift
and limitations.. seen at Normandy when troop carriers
and airborne personnel. It should tar-
were told to leave the paratroopers in
get company and field grade officers
the combat area without highlighting
who are instrumental in creating the
the need for accurate drops.
needed team mindset. Also, it should
include standard planning and oper- The new American airlift doc-
ating procedures to decrease planning trine should endorse a culture of team-
time. This helps planners approach work by viewing the two communities
their tasks from a shared perspective as one force when operating together.
and launch missions quickly, thereby This aims to reduce the “us vs. them”
increasing the strategic capabilities of mindset that often occurs during joint
American airborne forces by reduc- exercises. Currently, if airborne and
ing the time it takes them to enter the airlift forces can avoid conflict and pre-
fight. vent misunderstandings, they can act
as one joint team working towards a
Cooperation between airborne
common purpose. If a future culture
and airlift communities, starting with
can be created in which the two com-
planning and continuing through en-
munities truly believe they are one
tire operations, is the overall goal of the
team, conflict and misunderstandings
proposed doctrinal additions. To en-
will be less likely to arise.
able this, the publication should pro-
mote more and better joint training. Further research is necessary to
The goal of the training is not only to develop the specifics of the proposed
gain repetition in joint procedures, but manual. It will require going beyond
it will also create trust. Mutual trust tactical concerns and addressing un-
builds by seeing the abilities of both comfortable concepts regarding leader-
communities and becoming comfort- ship and human nature. Also, it needs
able with another Service’s personnel. to address the cultural conflicts that
Trust then allows both communities to exist between airborne and airlift per-
believe that the intentions of the other sonnel. If it does so successfully, it can
are aimed at shared success. This will help bring the two communities to-
reduce friction between airlift and air- gether to improve teamwork, efficiency,
borne forces, as seen during the air- and effectiveness.
drops at Normandy.
Airborne and airlift personnel
Furthermore, doctrine should have the same mission, but they ap-
promote airborne and airlift person- proach it from two very different back-
nel attending both Service’s briefings, grounds and skillsets. Their common
as was done at Corregidor. This will purpose should drive them towards
help build the understanding of both shared understanding and a team
ALSB 2018-1 16
mindset. However, a lack of under- Operations of a Regimental Pathfinder Unit, 507th Parachute
Infantry Regiment (82nd Airborne Division) in Normandy, France
standing often inhibits their ability to 6 June 1944 (Normandy Campaign) (Personal Experience of a
cooperate efficiently and effectively. Regimental Pathfinder Leader)” (Monograph, Advanced Infantry
By using doctrine to create standard Officers Course, Fort Benning, GA, 1948), 19; John A. Kindig,
“The Operations of the 101st Airborne Division East of Ste.
procedures and promote a culture of Mere Eglise, 5–6 June 1944 (Normandy Campaign), (Personal
teamwork, airlifters and paratroopers Experience of an Assistant G-3)” (Monograph, Advanced Of-
ficers Course, Fort Benning, GA, 1947), 18; Salve H. Mathe-
can work towards fully grasping an son, “The Operations of the 506th Parachute Infantry (101st
important lesson from World War II. Airborne Division) in the Normandy Invasion, 5–8 Jun 1944
This should prevent another situation (Normandy Campaign) (Personal Experience of a Regimental
Staff Officer)” (Monograph, Advanced Infantry Officers Course,
like Normandy and increase instances Fort Benning, GA, 1950), 15.
of unified effort and teamwork as seen 14
Attached Image: C-47s in England, 1944 (Source: Folder GP-
at Corregidor. Furthermore, it will pre- 314-HI (TR. CARR) August 1944, Air Force Historical Research
pare the joint team to face current and Agency, Maxwell Air Force Base.)
future threats. 15
Debriefing Conference-Operation Neptune, meeting tran-
script, 13 August 1944, Fort Leavenworth, KS: Combined Arms
Research Library, N-12198, 1-2.
USAF Maj Christopher “Creole” Mar-
tinez is a student at the US Army John C. Warren, USAF Historical Studies: No. 97, Airborne
16

Operations in World War II, European Theater, (Maxwell AFB,


School of Advanced Military Stud- AL: Air University Press, September 1956), 33.
ies, Fort Leavenworth, KS. 17
Damberg, 1, 4.
END NOTES 18 John H. Blair, III, “Operations of the 3d Battalion, 503d
Parachute Infantry Regiment in the Landing on Corregidor, P.I.,
1
Ninth Air Force, “Ninth Air Force Invasion Activities,” after
16 February–2 March 1945 (Luzon Campaign)” (Monograph,
action report, 1944, Headquarters Ninth Air Force, Combined
Advanced Infantry Officers Course, Fort Benning, GA, 1950), 28.
Arms Research Library, Fort Leavenworth, KS, N-9469, 41–44;
Paul L. Williams, “IX Troop Carrier Command Report of Opera- 19
Damberg, 4-6.
tion (Neptune),” 13 June 1944, after action report, Folder 20
Ibid., 5.
546.452G 13 June 1944, Air Force Historical Research Agency,
Maxwell Air Force Base, 6. 21
Blair, 9.
2
John C. Warren, USAF Historical Studies: No. 97, Airborne Op- 22
Department of the Air Force, Air Force Tactics, Techniques,
erations in World War II, European Theater, (Maxwell Air Force and Procedures (AFTTP) 3-3.C-130J, Combat Aircraft Fundamen-
Base (AFB), AL: Air University Press, September 1956), 58. tals C-130J (Washington, DC: Government Printing Office, July
2016), 4-1. (U//FOUO) (Information extracted is unclassified.)
3
Carl A. Damberg, “Airborne Operation Corregidor,” after action
report, 1945, Headquarters 317th Troop Carrier Group, Com- 23
Joint Chiefs of Staff, Joint Publication (JP) 1, Doctrine for the
bined Arms Research Library, Fort Leavenworth, KS, N-11138, 3. Armed Forces of the United States (Washington, DC: Govern-
ment Printing Office, 2013), I-1.
4
Ibid., 5.
24
Joint Chiefs of Staff, Joint Publication (JP) 3-17, Air Mobil-
5
US Air Force, Air Force Instruction (AFI) 11-231, Computed
ity Operations (Washington, DC: Government Printing Office,
Air Release Point Procedures (Washington, DC: Headquarters
2013), IV-17-IV-18.
Air Force, August 2005), 128. Current drop speed for delivering
personnel is 130 knots, approximately 150 mph. While faster 25
Joint Chiefs of Staff, Joint Publication (JP) 3-18, Joint Forcible
than the World War II drop speed of 110 mph, this is still an ex- Entry Operations (Washington, DC: Government Printing Office,
tremely slow speed compared to speeds flown by other aircraft 2012), B-1.
in combat. 26
Debriefing Conference-Operation Neptune, 1-2; Warren,
6
James A. Huston, Out of the Blue: US Army Airborne Opera- Study No. 97, 21-26.
tions in World War II (West Lafayette, IN: Purdue University 27
Harrison Loesch, “Narrative Statement of the Crew of A/C
Studies, 1972), 48. #42-93002, 62nd TC Sq, 314th TC Gp, in Connection with Events
7
Ibid. of Bigot-Neptune #1,” 14 June 1944, Folder SQ-TR-CARR-62-HI
Jun 44, Air Force Historical Research Agency, Maxwell Air Force
8
US War Department, “Training Circular No. 113” (Washington,
Base, 1-2.
DC, Government Printing Office, October 1943), 1.
28
Blair, 9; Edward T. Flash, “The Operations of the 2d Battalion,
9
Williams, 2.
503d Parachute Infantry Regimental Combat Team in the Recap-
10
R. P. Carr, “Troop Carrier Planning for Operation Neptune, ture of Corregidor Island, 16 February–23 February 1945 (Luzon
England Feb-Jun 1944 (Cross Channel Invasion of Europe), (Per- Campaign)” (Monograph, Advanced Infantry Officers Course,
sonal Experience of a Troop Carrier Wing Representative on the Fort Benning, GA, 1950), 8.
Planning Staff)” (Monograph, School of Combined Arms Regular 29
Donald A. Crawford, “Operations of 503d Parachute Regimen-
Course Fort Leavenworth, KS, 1947), 7.
tal Combat Team in Capture of Corregidor Island 16 February–2
11
Ibid., 6-12. March 1945 (Northern Philippines Campaign)” (Monograph,
Advanced Infantry Officers Course, Fort Benning, GA, 1949), 14.
12
Ibid., 9.
30
Damberg, 3.
13
Ibid., 6.
14
Robert Abraham, “The Operations of the 508th Parachute
Infantry (82d Airborne Division) Normandy, France, 5-10 June
1944 (Normandy Campaign) (Personal Experience of a Regimen-
tal Demolition Officer)” (Monograph, Advance Infantry Officers
Course, Fort Benning, GA, 1948), 11; John T. Joseph, “The

17 ALSB 2018-1
OPENING ENGAGEMENT: LOOK AT
NETWORK ENGAGEMENT

Army CPT Chad Burnette (right), battery commander for Alpha Battery 5-3 Field Artillery (FA). from Joint Base Lewis-McChord, Washington,
shakes hands with Jordanian soldiers May 14, 2017 after a successful exercise. The Alpha 5-3 FA and the 29th Royal High Mobility Artillery
Rocket System (HIMARS) Battalion (not pictured) conducted a HIMARS live fire exercise outside Amman, Jordan. (Photo by SFC Steven
Queen, USA)
By Maj Scott Packard USMC, Ret. ent in the battlespace, across the range
military operations. This is not cyber
War is, fundamentally, a hu-
warfare, although cyber activities,
man endeavor, a contest of wills be-
standalone or as part of an integrated
tween combatants. In this contest,
information warfare operation, may be
an understanding of the motivations
included in the engagement of specific
of the adversary, as well as other key
individuals, groups, or networks. The
actors encountered in the operational
engaged networks are those relevant
The engaged net- environment, is an instrumental part
social networks critical to command-
works are those of success or failure. For this reason,
ers’ mission accomplishment.
relevant social in concert with the global demographic
networks critical trend of ever concentrating population Broadly, engagement comprises
to commanders’ density within urban centers, engage- the totality of interactions with indi-
mission accom- ment with individuals, groups, and viduals or groups intended to achieve
plishment.
populations, directly and indirectly, is a desired effect. Friendly, neutral, or
a skill commanders at all levels must threat, these engagements range from
master. One tool for doing this is net- benign cohesion-building efforts with
work engagement. United States (US) partners to lethal
measures designed to kill or destroy
Network engagement is focused
enemies. Key leader engagements, civil
on human networks—friendly, neutral,
affairs projects, military information
and threat1—that are universally pres-
support operations, specific personnel,
ALSB 2018-1 18
facilities, or equipment targeting for operations and fringe civil affairs ac-
destruction all fit within network en- tions.
gagement. It is this broad application
It is well past time to untether
of the term that many find difficult to
network engagement from JIDO. Si-
understand.
multaneously, the Services must move
Joint Improvised-Threat Defeat beyond a one-dimensional applica-
Organization (JIDO), formerly known tion directed solely towards counter-
as Joint Improvised Explosive Device ing groups that use IEDs or those who
(IED) Defeat Organization (JIEDDO), function within the context of coun-
popularized the phrase “Attack the Net- terinsurgency operations. The util-
work (AtN),” for advanced analysis and ity of comprehensively engaging all The utility of
fusion of intelligence with operational networks and groups encountered in comprehensively
data, when they added it as JIEDDO’s the operational environment is much engaging all
third pillar, after “Defeat the Device” greater than the limited arena where networks and
and “Train the Force.”2 The AtN moni- many have sequestered network en- groups encoun-
ker served as a bumper sticker to bring gagement, all the more so as US forces tered in the
attention to the proactive measures find themselves among the populace in operational envi-
used to neutralize groups for whom the dense urban areas.3 ronment is much
greater than the
improvised explosive device (IED) was
While portions of the interested limited arena
their weapon of choice, getting the US- where many
joint community have made the shift
led coalition “left of the boom” in Iraq. have sequestered
from an IED-centric tool to a broader
Those measures, beginning with a deep network engage-
application of network engagement,
understanding of the operational envi- ment ...
there remain entrenched elements tied
ronment, incorporated analytical tools
to legacy ideas. For example, there ex-
developed by law enforcement and ad-
ists a gentle back and forth between US
opted by the special operations com-
Army Training and Doctrine Command
munity to better understand the threat
and Forces Command over the moni-
network and the high-value individuals
kers “Attack the Network” and “Net-
within it to enable focused, but com-
work Engagement. However, there is a
prehensive, targeting, of both. How-
glimmer of hope for the future: Army
ever, that bumper sticker now hangs
Techniques Publication (ATP) 5-0.6,
around the Defense community’s neck
Network Engagement 19 June 2017, is,
like a lodestone, unintentionally limit-
conceptually, a step in the right direc-
ing the concept to counter-improvised
tion. It looks holistically at the variety
explosive device (C-IED) and stability
of networks and groups US forces are
operations or activities in the mind of
likely to encounter in the operational
many Service members.
environment: friendly, neutral, and
Ask any Marine or Soldier what threat. While the doctrine, essentially,
it means to “attack the network,” retains the AtN Framework,4 it goes be-
and the variety of answers will center yond the limitations of AtN.
around countering groups that employ
Helpfully, ATP 5-0.6 explains the
IEDs, less the occasional throw-away
limitations of ATN succinctly: “network
comment referring to cyber warfare.
engagement is an evolution of ATN.
This points to the superb job JIDO did
While ATN focused on neutralizing the
in marketing the concept. But JIDO’s
threat network, this focus often led
success has resulted in constrained
commanders to overlook friendly and
thinking about the usefulness of many
neutral networks.”5 Further, the addi-
of the tools and techniques familiar to
tion of the “engagement” warfighting
AtN efforts. Besides C-IED, the concept
function by the US Army is encourag-
is conflated with counterinsurgency
ing. Doing so elevates the concept as a
operations, a perception that unnec-
principal consideration in the military
essarily limits commanders and their
decision making process. While the Ma-
staffs to personality targeting, stability
rine Corps retains a traditional set of
19 ALSB 2018-1
warfighting functions, they have main- across all networks fails to receive full
tained a network engagement training attention. The squishy stuff (the diffi-
course for company- to regiment-level cult tasks like information warfare or
staff members of some kind since 2011. operations, operational culture, engag-
While the training effort has signifi- ing key leaders from the local popu-
cant momentum, the Marine Corps has lace) never get the staff’s full attention
struggled to produce a viable doctrinal during training or operations.
document on the subject. (The work has
One answer is to open the aperture.
recently garnered new life and some-
thing useful may result in the next year Commanders must devote sim-
or so.) There is, as yet, neither top-level ilar energy and staff effort to friendly
joint doctrine that structures network and neutral efforts. The intelligence of-
engagement across the spectrum of ficer must be attuned to collections and
friendly, neutral, and threat networks, analysis that give commanders a good
nor promotes the usefulness across the understanding of one of the key ele-
range of military operations. ments in the operational environment:
the often not-so-neutral populace.
Joint publication, JP 3-25,
Neutral networks demand nearly the
Countering Threat Networks,6 pub-
same staff rigor as the threat, not only
lished in December 2016, commits the
during stability operations but also in
very sin that ATP 5-0.6 warns against:
major combat operations or combined
focusing, principally, on those tech-
arms maneuvers. US’ adversaries will
niques a commander can bring to bear
use the ambiguity of operating among
to neutralize or destroy networks that
the local populace and restraint to-
pose a threat to the mission. As a sub-
wards civilian casualties against Amer-
set of network engagement, this pub-
ican warfighters. Further, the sophis-
lication provides a specific focus on
ticated propaganda campaigns waged
one aspect of the larger concept, with
against US forces are most effective
insight into the analytical techniques
when American warfighters’ poor un-
used to identify and target threats.
derstanding of operational culture
Commanders, naturally, want to de-
leads to ham-fisted engagements in
Commanders, vote their time and energy, and that
information operations. Often, warf-
naturally, want to of their staffs, to the threat. A com-
ighters are like Chevrolet Motors try-
devote their time petitive nature and combative mindset
ing to sell a model named “Nova” (in
and energy, and drive aggressive warfighters to want to
the 1960s and ‘70s) in South America
that of their staffs, smash things and kill bad people. The
to the threat. where “no va” transliterates to “does
trap here is that by singularly focusing
not go” in Spanish, which is certainly
on the threat, comprehensive targeting
Effect
Support Influence Neutralize
promote co-opt defeat
build inform destroy
partner shape kill
resource deter capture
train leverage mitigate
advise disrupt
assist isolate
disorganize
deceive
Friendly X X
Network Neutral X X
Threat X X
Table 1. Range of Effects on Various Networks

ALSB 2018-1 20
not a quality one wants in a new car. fied action partners that build trust and
The various groups on the battlefield confidence, share information, coordi-
may hinder or help operations to a de- nate mutual activities, and maintain
gree by withholding or providing infor- influence. Along with other warfight-
mation about the adversary, enabling ing functions, engagement enables the
or restricting movement through the commander to identify and organize re-
infrastructure, or encumbering or sup- sources that develop relationships and
porting sustainment. Understanding capacity with key unified action part-
the human aspects in the operational ners through persistent activities.”8
environment is key to success.
Forging cohesive bonds with co-
The Joint Concept for Human Aspects alition and alliance partners; engaging
of Military Operations capitalizes on “whole of government”; and leveraging
the lessons learned from 14 years of the comprehensive effort of intergov-
combat operations and encourages the ernmental, multinational, and nongov-
joint force to: ernmental entities in a meaningful way
that is perceived as genuine and non-
• Identify the range of relevant actors
manipulative, is difficult under the best
and their social, cultural, political,
of circumstances. An understanding of
economic, and organizational net-
the variances in organization culture of
works.
other Services, departments, and gov-
• Evaluate contextual, relevant actor ernment agencies; and knowledge of
behavior. ethnic culture when dealing with other
nationalities or international organi-
• Anticipate relevant actor decision- zations, is key to building an effective
making. friendly network.
• Influence the will and decisions of Often, despite US leaders’ best
relevant actors.7 intentions and efforts, their motives

These activities require resourc- are suspect. General Valery Gerasimov,
es and integrated staff effort across Chief of General Staff of the Russian
These activities
intelligence, maneuver, and fires disci- Army, paints an alternative perspec-
require resources
plines. Relevant actors are not artificial- tive of American efforts in the global and integrated
ly limited to only named adversaries. community. As Thomas Friedman con- staff effort across
All relevant actors must be identified, tends in his essay, “Betty Crocker in intelligence, ma-
evaluated, anticipated, and influenced. Dante’s Inferno”,9 Americans are often neuver, and fires
That influence is most effective when it encumbered with a naïve self-image disciplines.
occurs within the context of the larger and a failure to appreciate the depths
campaign; the tie between actions and of longstanding suspicion and hatred
message is inextricable. What warf- among various ethnic groups and na-
ighters do, and how they “market” tionalities. Misunderstood as a Russian
their actions, matters. This demands “how to” for hybrid or ambiguous war-
an understanding of the audience, not fare in Ukraine, General Gerasimov’s
so warfighters can put one over on the presentation in May 2014 offers a dis-
people, but so the intended message is mal portrayal of American exceptional-
the delivered message. ism and contends nefarious intent in
America’s motives and maneuvers on
With the consideration of adding an the global stage.10 How do warfight-
Engagement warfighting function, the ers counter such entrenched negative
US Army lends weight to the idea that views of their motivations and desired
engaging friendly networks is very im- objectives? Only through a nuanced
portant. application of messaging, actions, and
“Engagement tasks and systems engagement.
focus on routine contact and interaction
between US Army forces and with uni-
21 ALSB 2018-1
While many practitioners of net- Without a change in under-
work engagement agree with the idea standing and an accompanying shift
of engaging broadly across the friendly, in mindset, network engagement risks
neutral, and threat networks, there re- becoming a marginalized concept, with
An expanded ap- mains the stigma that the techniques the loss of many hard-won lessons. An
plication of the only apply in countering insurgency expanded application of the techniques
techniques across or IED emplacers. This is a mistake. across friendly, neutral, and threat
friendly, neutral, Network engagement is also applicable networks will make the joint force
and threat net- in large-scale combat. The techniques more effective in not only stability op-
works will make are applicable to individuals, groups, erations, but small-scale contingencies
the joint force and networks within the battlespace, and major combat operations, as well.
more effective ... across the range of military operations. The doctrine and training developed
Certainly, some techniques are more from it remains young, emerging from
applicable during different phases of under C-IED and counterinsurgency.
an operation. Just as the balance of of- For commanders with an eye for the
fense, defense, and stability activities nuanced application of force with lim-
changes through phases, the relative ited resources, network engagement
network focus similarly changes. For will remain an effective tool, regardless
example, before a conflict and in the of the type of operation. Although there
early portion of instability and con- is much that can be done at the op-
flicts, building partner capacity and erational level, it is at the tactical level
theater security cooperation are friend- where commanders meet face-to-face
ly-focused activities upon which com- with coalition partners, the local pop-
batant commanders expend consider- ulace, and the enemy. And it’s at the
able energy while maintaining baseline tactical level where the techniques are
threat and neutral network activities. most beneficial.
As an operation moves from threats to
END NOTES
lethal force, and phase 3 (Dominate), 1
It is important to recognize that these categories are not de-
the joint force increasingly focuses on finitive, static, or binary. An individual or group can be friendly,
the threat. The importance of the neu- neutral, or a threat depending on context, or may slide along
tral networks as sources of information the spectrum given changes in the operational environment or
their interactions with US or coalition/alliance forces.
and restraint on the full employment 2
Joint Improvised-Threat Defeat Organization website, jieddo.
of friendly weapon systems steadily in- mil/history.htm, accessed 29 March 2017.
creases until it peaks with stability ac- 3
Megacities and the United States Army: Preparing for a Com-
tivities and transition of responsibility plex and Uncertain Future; Chief of Staff of the Army, Strategic
to civil authorities. Subsequently, em- Studies Group; June 2014

phasis shifts, once again, to support- 4


Attack the Network Framework, Version 8, 20 June 2011. The
top tier of the hierarchy: Understand the Mission, Understand
ing friendly networks. the Operational Environment, Understand the Network, Orga-
nize for the Fight, Engage the Network, Assess.
The importance of neutral networks is 5
Army Techniques Publication 5-0.6 , Network Engagement, 19
not only influenced by timing within June 2017
an operation but, also, by the envi- 6
Joint Publication 3-25, Countering Threat Networks, 21 De-
ronment in which is conducted. High cember 2016
population density in urban areas will 7
Joint Concept for Human Aspects of Military Operations, 19
drive attention to engaging key leaders October 2017
and groups, mostly to encourage their 8
TRADOC Pam 525-8-5, US Army Functional Concept for En-
gagement, 24 February 2014, p. 9
support of US efforts while withholding
9
Friedman, Thomas; From Beirut to Jerusalum; Farrar, Straus,
it from the US’ adversary. However, en- and Giroux, 1 April 2010, 2nd Edition
gaging with the neutral populace, also, 10
Bartles, Charles; “Getting Gerasimov Right,” Military Review,
will be vital to mitigating the impact of January-February 2016, pp. 30-38
combat operations on their safety and
well-being.

ALSB 2018-1 22
FORGET THE HINDENBURG, LET’S MAXIMIZE
GLOBAL AGILITY

A US Navy MZ-3A manned airship, Advanced Airship Flying Laboratory, derived from the commercial A-170 series blimp is in Mobile, Alabama
Downtown Airport prior to take-off en route to assist the US Coast Guard with a Gulf of Mexico oil spill July 12, 2010. (Photo by Petty Officer
2nd Class Gina Routi, USCG)

By Lt Col Justin Dahman, USAF; on current technology, to facilitate


LCDR Manuel Refugia Jr., USN; this mission effectively. A lack of
and Mr. Randy Hall access, specifically in HA and DR
operations, highlights a critical ca-
INTRODUCTION
pability gap between those logistics
The Department of Defense’ delivery assets optimized for speed
(DOD’s) ability to efficiently re- (airlift) and those optimized for cost
spond to, and facilitate, humani- (sealift). The Chairman of the Joint
tarian assistance (HA) and disaster Chiefs of Staff, Capstone Concept
relief (DR) operations is paramount. for Joint Operations: Joint Force
Joint doctrine explicitly mentions 2020 highlights the need for joint
the time-sensitive necessity to pro- force innovation to “address the se-
vide resources for HA and DR capa- curity paradox we face” in HA and
bilities to ensure “rapid delivery to DR operations.2 Lighter-than-air
the point of need”. Lives depend on (LTA) technology, specifically the
it.1 hybrid airship, has the ability to
The current inventory of lo- bolster the joint logistics enterprise
gistical transportation depends on (JLEnt) to increase mission resil-
an archaic, multimodal concept iency, and access; thus, furthering
slaved to airports and sea ports the Chairman’s vision for innova-
that are not agile enough, based tion and global agility.
23 ALSB 2018-1
This technology already ex- explore the history and future use
ists and was approved by the Feder- of LTA in addition to how LTA tech-
al Aviation Administration (FAA) for nology, specifically the hybrid air-
development. In November 2015, ship, could have overcome HA and
Lockheed Martin introduced a pro- DR challenges of the JLEnt.
totype and plan to produce a hy-
Such airships may
brid airship capable of transporting A HISTORY OF LTA TECHNOL-
be capable of car- OGY
rying a complete 20 tons of cargo.3 “Research has
Army brigade shown this prototype is scalable LTA technology began as a
directly from “the and a larger version will be capable civilian venture and, later, it was
fort to the fight” ... of transporting up to 1,000 tons adopted for military applications.
across international distances”.
The first balloon flight took
Such airships may be capable of
place over two hundred years ago,
carrying a complete Army brigade
in 1783, on the outskirts of Paris,
directly from “the fort to the fight”,
France. It gave mankind its first
overcoming logistic choke points
taste of aviation, which fascinated
and mitigating the effects of limited
engineers and inventors alike as
forward basing.”4 More important,
they worked toward perfecting an
this technology can bypass airports
LTA craft.7 By 1790, 76 flights were
and sea ports by landing directly on
recorded in France. Ballooning be-
the water or unprepared surfaces.
came very popular in Europe and
They are suited for difficult-to-ac-
quickly spread to the rest of the
cess HA and DR situations where
world. Only three years later, the
a deep sea port may not be avail-
balloon and, more important, avia-
able or an airport has been dam-
tion made their appearance across
aged or destroyed. A Congressional
the Atlantic in Philadelphia, Penn-
Budget Office study stated, “Such
sylvania where the first balloon
airships could offer shorter time-
flight on American soil, was show-
lines for reception, staging, onward
cased. Ballooning flourished as a
movement, and integration … both
hobby and as an occupation, until
because cargo could be delivered
the Hindenburg.
closer to its final destination and
because airships have the potential The Hindenburg was the most
to efficiently carry troops with their notable of all balloons (or airships)
equipment, eliminating the need for in the first two hundred years of
personnel to marry up with equip- aviation. It was a rigid airship that
ment that has been transported on maintained its shape by means of a
a different platform.”5 For this rea- metal framework.8 Although it was
son, among others, hybrid airships designed to be filled with helium, it
are the way of the future when it was actually filled with highly-flam-
comes to global logistics. mable hydrogen due to export re-
strictions by the United States (US)
This essay advocates for hy-
against Nazi Germany. In 1936 the
brid airships to bolster the JLEnt’s
Hindenburg inaugurated a trans-
global agility, and access, to bet-
Atlantic commercial air service
ter conduct HA and DR operations.
scheduled to carry 1,002 passen-
“Many crisis response missions,
gers on ten round-trip voyages be-
such as foreign humanitarian as-
tween Germany and the US. How-
sistance and disaster relief opera-
ever, while landing at Lakehurst,
tions, require time-sensitive sourc-
New Jersey on May 6, 1937, before
ing of critical commodities and
the first of its trans-Atlantic cross-
capabilities, and rapid delivery
ings, the Hindenburg burst into
to the point of need. In these op-
flames. Thirty-six people perished
erations, joint logistics is often the
and the airship was destroyed. The
main effort.”6 This essay will briefly

ALSB 2018-1 24
fire was attributed to a discharge of 10,000 airship pilots, gunners and
atmospheric electricity in the vicin- mechanics took part in an estimat-
ity of a hydrogen gas leak from the ed 37,000 combat patrols, chalk-
airship.9 The Hindenburg disaster ing up nearly 400,000 flying hours
crystallized the dangers of airships while successfully protecting tens
in the minds of many, and effec- of thousands of friendly vessels
tively marked the end of that rigid from harm.”13 No doubt, US air-
airship era. ships contributed significantly to
the success of allied efforts in WW2,
Civilian developments and
but even more impressive is the fact
refinements to LTA technology, ul-
that only one US airship was lost. It
timately, led to aerial minded folks
also states a truism, “… history has
using the technology for military
largely forgotten the contributions
operations. The military balloon of
of the wartime airships.”14 Let’s not
choice for before World War I was Recent opera-
forget, historically, LTA is a proven
the Zeppelin. It was employed by tions in Iraq and
technology for intelligence, recon- Afghanistan have
Germany, and described as “… a
naissance, communications, and proven a healthy
rigid airship built by Count Zeppe-
attack. LTA technology was useful appetite for con-
lin”. It was chronicled that “… 20
throughout the last century and tinuous over-
such vessels gave Germany an ini-
has a unique niche in today’s oper- watch above the
tial military advantage at the start
ating environment. In the military, battlefield.
of World War I.”10
airships have started to gain a lot
The powered airship traveled of attention for their versatility and
42 knots per hour, and had two extended loiter time. Airships “have
15-horse power motors. Accord- been proposed as alternatives to
ing to a British Broadcasting Cor- some of the aircraft the DOD uses
poration (BBC) story titled, World today for two types of missions:
War One: How the German Zeppelin intelligence, surveillance, and re-
Wrought Terror, “The first raid took connaissance (ISR) and airlift.”15
place on the eastern coastal towns Although not the focus of this pa-
of Great Yarmouth and King’s per, it is prudent to highlight the
Lynn, on 19 January 1915.”11 The potential usefulness of airships in
Germans used the airships for ter- the ISR mission, in addition to its
ror, but they also were able to in- practicality in the airlift mission.
flict damage on Great Britain. The
Recent operations in Iraq and
BBC article described one such at-
Afghanistan have proven a healthy
tack this way: “London was ablaze,
appetite for continuous over-watch
buildings were ripped apart and by
above the battlefield. The demand
the time the attack was over, 22
for ISR grows exponentially. Be-
people were dead, 87 had received
tween 2001 and 2012, the demand
horrific injuries, and the Zeppelin
increased by nearly 600% while the
had escaped into the night com-
DOD invested nearly $67 billion.16
pletely unharmed.”12
A Congressional report stated, “ISR
The US military used air- platforms deployed to theater have
ships extensively in World War II increased by 238% since 2008,
(WW2), but LTA vehicles received and there are triple the number of
little notice from the war depart- platforms currently in Afghanistan
ment, which focused its attention than there were at the height of op-
on surface ships and, exceedingly erations in Iraq.”17 ISR is used in
faster, fixed-wing aircraft. A 2013 combat for good reason. The sys-
expose’ from Military History Now tems provide threat warning, target
titled, The Other “Silent Service”— acquisition, situational awareness,
US Navy Airships of World War and, in some cases, kinetic strike.
II (WW2), states: “Yet, more than It gives US troops an unmatched
25 ALSB 2018-1
battlefield advantage. tary sectors but none more promis-
ing than its ability to enable critical
With an extended loiter time,
access for HA and DR operations.
airships are well suited for opera-
tional ISR over-watch. Additionally, Each HA and DR scenario is
airships vary in size and mission. A unique, but common themes always
low-altitude ISR airship can main- arise. In addition to the urgent goal
tain up to 20,000 feet for nearly of saving lives and property, the
three-weeks (~500 hours). Whereas most common theme found across
the high-altitude variation can op- HA and DR situations is “the exist-
erate between 65,000 to 75,000 feet ing transportation infrastructure is
for up to 16 days (~400 hours).18 often degraded or overwhelmed.”21
Operations in and out of Iraq and Ports, runways, and roads will ei-
Afghanistan have also shown an in- ther be destroyed or degraded,
satiable hunger for mobility airlift, or lack the capacity needed for a
another mission well-suited for hy- large-scale HA and DR operation,
brid airships. That said, there are which will limit the response and,
plenty more applications for air- thus, limit the number of lives and
ships beyond military mobility and amount of property saved. This sit-
ISR. uation has played out all over the
world.
The Goodyear blimp is argu-
ably, the most well-known LTA ve- In the following section, the
There is much
hicle in history. The blimp not only HA and DR response to the devas-
potential for the
serves as a media hub for high- tating 2010 earthquake that de-
hybrid airship in
the civilian and definition television broadcasts, stroyed much of Haiti will be used
military sectors but is also a public relations hub. to examine the logistics challenges
but none more Some future concepts for LTAs, of HA and DR operations and how
promising than its like the blimp, include: cargo air- employing a hybrid airship could
ability to enable drop, advertising, a high-altitude alleviate common hardships asso-
critical access for radar platform, passenger travel, ciated with a degraded or destroyed
HA and DR opera- telecommunications relay, house- transportation infrastructure.
tions. hold goods movement, aerial fire-
fighting, and remote location ac- THE HAITI HA AND DR
cess (such as Alaskan oil fields). To On 12 January 2010, three
that end, airships are already mak- massive earthquakes consecu-
ing their way into industry. Hy- tively rocked the island of Haiti.
brid Enterprises, Limited Liability The first quake’s epicenter was 15
Corporation recently announced a miles outside the capital, Port-au-
strategic partnership between PRL Prince and, essentially, leveled the
Logistics, Inc. and Straightline Avi- city. The initial quake had a mag-
ation to operate Hybrid Airships in nitude of 7.0 and was shortly fol-
Alaska’s remote areas. Hybrid En- lowed by 5.9 and 5.5 magnitude
terprises claims, “Alaska is an ideal aftershocks.22 The destructive com-
location for the Hybrid Airship to bination of the three earthquakes
operate. The airship enables access killed nearly 300,000 people and
to Alaska’s most isolated regions.”19 displaced hundreds of thousands
They plan to base and operate the more. It was the largest combina-
airships from Kenai, Alaska. The tion of earthquakes to hit Haiti since
first aircraft is scheduled to arrive the 18th century. “It was estimated
in 2019 and promises to be capa- that some three million people were
ble of transporting 18 passengers, affected by the quake—nearly one
plus a crew, and 22 tons of cargo.20 third of the country’s total popula-
There is much potential for the hy- tion.”23 An immediate, large-scale,
brid airship in the civilian and mili- humanitarian crisis ensued.

ALSB 2018-1 26
“In the aftermath of the quake, ef- left about 33 million cubic yards of
forts by citizens and international debris in Port-au-Prince” of which
aid organizations to provide medical only two percent had been cleared
assistance, food, and water to sur- by mid-September 2010—eight
vivors was hampered by the failure months following the disaster.28
of the electric power system (which
In addition to the roads, a
already was unreliable), loss of com-
combination of urban areas and
munication lines, and roads blocked
sloped, mountainous terrain posed
with debris. A week after the event,
the third logistical relief challenge
little aid had reached beyond Port-
in Haiti. The lack of access and
au-Prince; after another week, sup-
maneuverability resulted in com-
plies were being distributed only
pounded difficulty for helicopters
sporadically to other urban areas.”24
and heavy equipment to facilitate
Access was the logistics chal- much of the rescue and cleanup ef-
lenge. The flow of logistics into an fort.29
HA and DR situation is a monu-
The fourth significant chal-
mental task and, when a rescue
lenge was the capacity of Haiti’s,
or aid organization faces the de-
single-runway airport with lim-
struction of entry ports and lines
ited ground space for on- and off-
of communication, it complicates
loading the humanitarian supplies
the already dire situation. Haiti is
from aircraft. “With as many as 180
an example of this level of HA and
planes per day cycling through the
DR complexity; “lines of communi-
airport, the facility is operating well
cation used to supply the capital
beyond capacity…approximately
with food and water were cut off or
1,400 planes are on a waiting list
severely disrupted. Without exter-
for landing.”30
nal sources of food, water, medical
help and other necessities, thou- The logistical access prob-
sands more people would have died lems HA and DR operations faced
in the weeks and months follow- in the aftermath of Haiti’s 2010
ing the earthquake.”25 A number of earthquake were devastating, but
challenges plagued the initial relief they were not unique. The response
effort in the aftermath of the earth- to Haiti, as with all other interna-
quake in Haiti. They include: dam- tional HA and DR operations, was
aged ports, blocked and damaged built on a multimodal concept,
roads, difficult terrain, and limited which requires critical access and
airport capacity.26 uses ports, runways, and roads.
Most of those same critical access Hybrid airships
The first challenge, damaged
points have a high potential to be offer the unique
ports, was the most significant.
destroyed or degraded or, sim- capability to
Haiti has two main shipping piers
ply, lack the capacity needed for a land on water
which account for nearly 90 per- and unimproved
large-scale HA and DR operation.
cent of the country’s import capac- surfaces.
The current JLEnt lacks the ability
ity. The two piers were submerged
to overcome challenges, like those
and much of the equipment need-
faced in Haiti, which inhibit access.
ed to offload ships was destroyed.
A solution that will fill this critical
The smaller of the two piers was
capability gap and bolster the glob-
cleared for limited operations on 21
al agility and required access of a
January, nine days following the
HA and DR operation is the hybrid
quake.27 In addition to the damaged
airship.
ports, many roads were damaged,
destroyed, or blocked by debris. LTA technology can pro-
Most roads remained impassible vide critical access because, when
months after the quake; “the quake it comes to sustaining lives, days

27 ALSB 2018-1
matter! ter provides significant military
value.”34 The capabilities of modern
When critical lifesaving sup-
airships lessen the impact that de-
plies are limited because of port,
graded, critical, choke points such
runway, and road destruction, the
as ports, lines of communication,
US Government must have an al-
and mountainous, or urban, ter-
ternate solution. Cargo hybrid air-
rain have on HA and DR operations.
ships can provide that capability
They also can alleviate the strain of
because they “minimize the reli-
an airport at maximum capacity by
ance on infrastructure to increase
opening an ad-hoc aerial port out-
throughput during the initial [HA
side the confines of an established
and DR] response.”31
airport. The simple fact is, today’s
In the case of Haiti, the nine cargo airships are suited to operate
critical days it took to reopen a sin- in degraded areas that lack infra-
gle seaport pier is unsatisfactory. structure, more so than air- and
With today’s technology, the dam- sea-going alternatives. They can fill
The capabili- aged port could be completely by- the critical gap to meet the Chair-
ties of modern passed. A hybrid airship could de- man’s vision for innovation while
airships lessen liver goods and support, or open, a bolstering the resiliency and global
the impact that HA and DR operation in a matter of access of the JLEnt.
degraded, critical, hours following a disaster. Hybrid
choke points such airships offer the unique capability CONCLUSION
as ports, lines of to land on water and unimproved The JLEnt’s primary means
communication, surfaces. Also, they can sling-load of delivery comes in the form of as-
and mountainous,
cargo, which provides unmatched sets optimized for speed (airlift) and
or urban, terrain
have on HA and flexibility to bridge the gap between those optimized for cost (sealift);
DR operations. more traditional aircraft and ships. however, both depend on airports
or sea ports. Once delivered, cargo
The cargo capacity of air- must travel via road or rail to get
ships provides the option to bring to the point of need. In HA and DR
offloading equipment and sup- operations, it is likely ports of en-
plies directly to the point of need. try and lines of communication are
In a joint study by United States either disrupted or destroyed. The
Transportation Command (US- technological solution that can fill
TRANSCOM) and Lockheed Martin this critical gap and deliver sup-
researchers looked at the feasibil- plies directly to the point of need
ity of using hybrid airships to al- has a rich historical precedent. It
leviate the logistical choke points of is the airship. LTA technology, spe-
HA and DR operations, specifically cifically cargo hybrid airships, will
in Haiti. The study claimed, hybrid bolster the global agility and access
airships do not require traditional of the DOD JLEnt’s ability to con-
“material handling equipment and duct HA and DR operations, while
other infrastructure.”32 The air- meeting the Chairman’s vision for
ship is a “means of delivering cargo innovation. This is the future of
that provides a useful alternative logistics delivery, but comes with
to complement current choices for limitations that can be overcome
intra-theater lift.”33 This statement through further development.
becomes especially true when op-
erating in the gap between an air- As with any platform or ca-
lift and sealift mission or when a pability, there are limiting factors
lack of infrastructure exists. An to employment; LTA is no different.
extreme HA and DR operation like Hybrid airships operate like a mari-
Haiti showcases the critical capa- time ship but have the crew com-
bilities “in which a small airship plement of an airplane. This leads
that performs like a large helicop- to a dilemma in how they employ.
ALSB 2018-1 28
They are designed for enduring op- will be the some of the most remote,
erations, much like an ocean-go- and inaccessible, terrain in Alaska.
ing vessel that would be underway
for days or weeks at a time.35 This This paper concentrated on
type of employment would require the hybrid airship’s ability to in-
a larger crew than typically would crease the agility and access of the
be assigned to an aircraft. It would JLEnt to support HA and DR op-
require necessary life support and erations. However, the areas for
quality of life equipment, such as a future use and study of hybrid air-
galley and berthing quarters. ship technology are limitless. As the
FAA continues to work with indus-
Another limitation is the po- try on certifying and implementing
tential scale of the largest variant hybrid cargo airships in Alaska,
for the airship. A massive airship and beyond, we are reminded of
capable of carrying 1,000 tons of the rich history of ballooning and
cargo would be approximately 1,000 airships. Nearly 240 years ago the
feet long and 450 feet wide—the civilian demonstration of the air-
length of more than three football ship inspired man to seek aviation
fields. This airship would be capa- and, within a decade, it was adopt-
ble of transporting an Army brigade ed for military operations. History
and its associated equipment from has a tendency to repeat itself. It is
a point of origin (a fort) directly to an exciting time for the JLEnt and
a destination (a foxhole). Although, the US Government’s civilian part-
upon arrival, it would likely over- ners are about to provide an impec-
whelm the receiving teams at the cable opportunity for the DOD to
point of debarkation.36 Addition- observe, and learn, the feasibility
ally, a single airship carrying such of LTA technology to operate and
cargo would likely be identified as a move cargo in austere locations.
strategic asset and become a high- The sky is the limit!
value target. It would require spe-
cial consideration, such as fighter Lt Col Justin T. Dahman, USAF.
escorts, to ensure unimpeded de- Lt Col Dahman is the Com-
livery.37 mander, 6th Operations Sup-
port Squadron, MacDill Air Force
A final issue pertains to a Base, Florida.
potential susceptibility to weather.
Airships are less maneuverable in, Mr. Randy Hall, USAF, Civilian.
and potentially more vulnerable to, Mr. Hall is the Deputy Division
severe weather (such as thunder- Chief, Training, Readiness and
storms). The high winds that may Exercises at Joint Task Force-
accompany a thunderstorm, for Civil Support.
example, could make the airship
difficult to control when near the LCDR Manuel Refugia, Jr., USN.
ground, during takeoff and land- LCDR Refugia is the Chief of
ing.38 All of that said, hybrid air- Staff, Defense Contract Manage-
ships, as with any new technology, ment Agency (DCMA), Manassas-
will be developed, rigorously tested, Chantilly, Virginia.
and employed in many different en-
vironments to establish the tactics,
techniques, and procedures that END NOTES
will optimize its safe employment. 1
Joint Logistics, Joint Publication 4-0 (The Joint Chiefs of
Despite the aforementioned hur- Staff, 2013), V-2.

dles, LTA technology will continue 2


“Capstone Concept for Joint Operations: Joint Force
2020” (The Joint Chiefs of Staff, September 2012), CCJO:
to rapidly develop and its first test Joint Force 2020, iii.

29 ALSB 2018-1
3
“Lockheed Martin Hybrid Airship Certification Plan for 19
“Lockheed Martin Hybrid Airships Are Coming To
Commercial Transport Approved by the FAA,” Private Alaska,” Private Organization, Hybrid Enterprises, (August
Organization, Lockheed Martin, (November 17, 2015), 2016), http://hybridhe.com/news-current/lockheed-mar-
http://www.lockheedmartin.com/us/news/press-re- tin-hybrid-airships-are-coming-alaska/.
leases/2015/november/lockheed-martin-hybrid-airship- 20
Ibid.
certification-plan-for-commercial-transport-approved-by-
the-faa.html. 21
Wade Stone, “(FOUO) Economic and Operational Con-
siderations for Military Use of Hybrid Airships,” USTRANS-
4
Christopher Bolkcom, “Potential Military Use of Airships
COM-Lockheed Martin CRADA (07-001) (Lockheed Martin,
and Aerostats,” Congressional Research Service (The
December 2011), 41.
Library of Congress: CRS Report for Congress, September
2006), 3. 22
Richard Pallardy, “Haiti Earthquake of 2010,” Education,
Encyclopaedia Brintanica, (August 2016), https://www.
5
“A Congressional Budget Office (CBO) Study, 24.”
britannica.com/event/Haiti-earthquake-of-2010.
6
JP 4-0, V-2. 23
Ibid.
7
Jennifer Rosenberg, “The History of Lighter-Than-Air 24
Ibid.
Craft: From a Hot-Air Balloon to the Hindenburg,” Private
Organization, About Education, (January 2016), http://his- 25
Stone, “(FOUO) Economic and Operational Consider-
tory1900s.about.com/od/flight/a/lighterthanair.htm. ations for Military Use of Hybrid Airships, 5.”
8
“Airships.net: A Dirigible and Zeppelin History Site,” 26
Ibid, 5.
Private Organization, The Graf Zeppelin, Hindenburg, US 27
Theodore Ritchie, “Haiti: The Logistics of Relief Ef-
Navy Airships, and Other, accessed October 27, 2016, forts,” Private Organization, STRATFOR, (January 2010),
www.airships.net. https://www.stratfor.com/analysis/haiti-logistics-relief-
9
“Hindenburg,” Private Organization, History.com, (2010), efforts?0=ip_login_no_cache%3D6ea871d75cfd74e41994
http://www.history.com/topics/hindenburg. 0be8891264dd, 2.
10
“Airships.net: A Dirigible and Zeppelin History Site.” 28
Tamara Lush, “Months after Haiti Earthquake, Cleanup
Has Barely Scratched Surface of Rubble Piles,” News
11
“World War One: How the German Zeppelin Wrought
Media, Associated Press, (September 2010), http://www.
Terror,” News Media, BBC, (August 2014), http://www.
cleveland.com/world/index.ssf/2010/09/months_after_
bbc.com/news/uk-england-27517166.
haiti_earthquake.html.
12
Ibid. 29
Ibid.
13
“The Other ‘Silent Service’—US Navy Airships of WW2,” 30
Ritchie, “Haiti: The Logistics of Relief Efforts, 2.”
Private Organization, Military History Now, (October
2013), http://militaryhistorynow.com/2013/10/23/the- 31
Stone, “(FOUO) Economic and Operational Consider-
other-silent-service-u-s-navy-airships-of-world-war-two/. ations for Military Use of Hybrid Airships, 41.”
14
Ibid. 32
Ibid, 23.
15
“CBO, 4.” 33
Ibid, 42.
16
House Permanent Select Committee on Intelligence, 34
Ibid, 26.
“Performance Audit of Department of Defense Intel- 35
“Lighter-Than-Air Vehicles” (Department of Defense,
ligence, Surveillance, and Reconnaissance” (House of June 2012), DOD Report, 21.
Representatives, April 2012), iv.
36
“A CBO Study, 12.”
17
Ibid, iv.
37
Bolkcom, “CRS, 6.”
18
“CBO, 8.”
38
“CBO, 10.”

COVER PHOTO INORMATION (CONTINUED)


Picture Bottom-Left: A Paladin M109 Alpha-6 Howitzer, Picture Bottom Right: Three F/A-18E Super Hornets,
fires an illumination round during a night fire exercise assigned to the Eagles of Strike Fighter Attack Squadron
in support of Eager Lion 2016 in Al Zarqa, Jordan, May (VFA) 115, fly in formation over the USS Ronald Reagan
23, 2016. Eager Lion 2016 is a bilateral exercise in the (CVN 76), USS Theodore Roosevelt (CVN 71), and USS
Hashemite Kingdom of Jordan between the Jordanian Nimitz (CVN 68) strike groups, and ships from the Re-
Armed Forces and the United States military, designed public of Korea’s navy as they transit the Western Pacific
to strengthen relationships and interoperability between October 14, 2017. The strike groups were underway and
partner nations when conducting contingency operations. conducting operations in international waters as part of a
(Photo by SPC Kevin Kim, USA) three-carrier strike force exercise. (MC3 Class Anthony J.
Rivera, USN)

ALSB 2018-1 30
THE CRITICAL ROLE SPACE (THE ULTIMATE HIGH
GROUND) PLAYS IN ENABLING COMMAND AND
CONTROL (C2)

United States Army National Guard Soldiers and Airmen move swiftly through the Cyber City area of operation as
Blue Team defenders during the Cyber Shield 2016 exercise at Camp Atterbury, IN, April 20, 2016. Cyber Shield
2016 is an Army National Guard cyberspace training exercise designed to develop and train cyberspace-capable
forces, including Army Reserve Soldiers, Marines, Air National Guardsmen, and members of other federal agen-
cies. (Photo by SGT Stephanie A. Hargett, USA)
By LTC James T. Edwards Jr, USA; faster than adversaries; and, ultimate-
Lt Col Jeffrey A. Katzman, USAF; ly, C2 the joint force (one of seven joint
MAJ Robert P. Farrell, USA functions essential to accomplishing
any mission).
INTRODUCTION
For more than 15 years, the Processing all associated data
American joint force has been involved and distilling it into actionable events
in perpetual conflict. During this pe- requires maintaining interconnected
riod, near-peer adversaries have been systems to enable these battlefield net-
watching, learning about, and ag- works, sensors, and weapons platforms
gressively closing the gap on United to power and preserve the US’ asym-
States’ (US’) asymmetric technological metric advantage. The US military is a
advantages (e.g., precision; stealth; or force that projects power globally and,
unmanned; cyber; and intelligence, when the US fights, it is, historically,
surveillance and reconnaissance). Fur- an “away game”. This requires the abil-
ther, US dominance across all phases ity to reach “over-the-horizon” and
of warfighting remains heavily reliant span across the tyranny of distance
on the ability to maintain situational for resourcing, sustainment, and op-
awareness (SA) for the joint force com- erational connectivity. Therefore, the
mander; execute a decision cycle much recent trend of the US military’s over
31 ALSB 2018-1
reliance on satellite-based battlefield bots), jammers, and cyber-attack.
systems has made its digitally inte-
Russia and China have already
grated C2 mission vulnerable. Since
demonstrated antisatellite (ASAT) mis-
access to space is never a guarantee,
sile technology. Russia developed a
preparing for future near-peer conflicts
system at the height of the Cold War
requires the joint force to develop re-
and declared it operational in 1973. In
silient, mitigating techniques now to
the early 1990s they tested the Naryad
maintain a critical advantage. It also
system, which is believed to have the
demands integrating the functionality
capability of intercepting satellites in
of untethered operations early into the
geosynchronous Earth orbit (GEO).
Department of Defense’s (DOD’s) next
China, for their part, received a great
technological evolution—the third off-
deal of international attention when
set.
they hit one of their own low-earth or-
THREATS TO SPACE-BASED CAPA- bit weather satellites in January 2007.
BILITIES By 2013, China also tested a missile
There are several treaties and that could reach Global Positioning
agreements intended to limit weapon- System (GPS) satellites and, potential-
izing space. The Outer Space Treaty ly, threaten US early warning sensors
of 1967 was the genesis of this effort, in GEO.
which placed legal limits on the abil- Lasers, or directed energy weap-
ity of nations to base weapons on the ons, are starting to show much of the
moon and other celestial bodies. Sev- promise prematurely assumed during
eral arms treaties added to this legal the 1980s, where the US, Russia, Chi-
framework, including the Treaty on na, and Israel are currently investing
the Reduction and Limitation of Stra- in and advancing the technology. While
tegic Offensive Arms (START I) and the much of this investment is focused on
Conventional Forces in Europe (CFE) creating effective air defense platforms,
Treaty, by introducing legal recourse the Russians are known to have the
for the use of weapons in space. capability to adapt this technology to
Using diplomacy and legal blind optics on reconnaissance satel-
mechanisms is important to reduce lites.
the risk of threats to US space assets; A “spacebot” is any satellite or
A “spacebot” is but, at the end of the day, they are spacecraft which can damage, bump, or
any satellite or only paper-thin if not enforced and nudge another satellite, and any nation
spacecraft which respected. Attacking US space ca- with satellite capability could threaten
can damage, pabilities could be a “decisive equal- US space assets by using them. In fact,
bump, or nudge izer” causing an immediate and dis-
another satellite,
“a spacecraft could simply approach a
ruptive impact to many US military satellite and spray paint over its optics,
and any nation
units by hindering their ability to manually snap off its communications
with satellite
capability could mobilize and respond effectively. Fur- antennas or destabilize its orbit.” Rus-
threaten US space thermore, near-peer adversaries of sia, in particular, is believed to be de-
assets by using the US have the ability to “deny, dis- veloping these types of sophisticated
them. rupt and degrade America’s hard-to- military satellites. They launched four
defend satellites” if they so choose. satellites in 2013 and 2014, which
One space leader, LTG David Buck, have maneuvered in suspicious man-
commander of the 14th Air Force, ar- ners by approaching or colliding with
gues that “there isn’t a single aspect other Russian spacecraft.
of our space architecture that isn’t at
risk.” This risk is best described in Jammers and cyber-attacks
five broad categories: missile attack, have the distinction of being threats
lasers that can blind or destroy recon- within the reach of adversaries far be-
naissance satellites, military satellites low near-peer to the US. These tech-
with offensive capability (e.g., space- nologies can be obtained off the shelf

ALSB 2018-1 32
and can have an outsized impact on US how it conducts C2. The military must
space assets. In the case of jamming, all take a proactive role, once the policy
satellites communicate wirelessly to a and guidance is updated, to self-assess
ground station and that link is vulner- and create TTP to continue operations
able. Similarly, cyberattacks do not re- when the ultimate high ground is de-
quire a large investment in technology nied or degraded.
or resources. US satellites could be de-
graded remotely through cyber means PLAN FOR RESILIENT SYSTEMS
in a variety ways, including receiving The near-peer threat is real.
an ordered shutdown, being feed false The US develops advanced asymmetric The US develops
coordinates, or being moved out of a systems that provide remarkable capa- advanced asym-
useful orbit, just to name a few. Evi- bilities to the joint warfighter, but rou- metric systems
dence exists that efforts like these are tinely fails to safeguard those “over-the- that provide re-
ongoing. For example, there are indica- horizon” links required to interoperate markable capa-
tions that China caused the National across the enterprise. Historically, the bilities to the joint
Oceanographic and Atmospheric Ad- US military leaders thought about this warfighter ...
ministration to shut down for two days issue with legacy equipment (e.g., De-
after hacking into its satellite network. fense Advanced GPS Receiver (DAGR)),
which had protected modes imbedded
RECOMMENDED NEAR-TERM MITI- in it, but with the new high-tech, com-
GATION TECHNIQUES mercially-available systems, they failed
Given the state of the world and the to integrate the same level of protection
potential for the next conflict to be and redundancy. There are companies
against a near-peer adversary, the US that can add simple hardware or soft-
military must take advantage of all ware solutions to military equipment
available time to mitigate gaps in train- and increase responsiveness when
ing and capability. All too often, DOD operating in a jammed environment.
officials assume away threats that im- “Space systems need enhanced resil-
pact US technological superiority, but iency to ensure performance of critical
significant near-peer threats already functions and overall mission opera-
exist. The following is a discussion of tions during a cyberattack.” Consid-
some changes that can improve Amer- ering long-term equipment use, while
ica’s resiliency and effectiveness in the partnering with the commercial sector
operating environment. These are im- early to identify and mitigate potential
provements the US military can make threats, will help ensure mission suc-
now and in the near-future. cess when space becomes contested,
congested, or degraded.
POLICY UPDATES
Policies provide the baseline REGIONAL BALLOONS
and authorities for military personnel There was an effort in the DOD
duties, actions, and responsibilities. to mitigate terrain impacting access to
As US leader try to protect its interests space with balloons. The Army assist-
in the global environment, the military ed in developing high altitude airships
must account for state and nonstate by testing their Long Endurance Multi-
actors who can affect space access. intelligence Vehicle (LEMV). “The foot-
Therefore, a revision to current, or con- ball field-sized hybrid airship's design
sideration of a completely new policy, requirements include the capability
needs to force the military to develop to operate at 20,000 feet above mean
tactics, techniques, and procedures sea level, a 2,000-mile radius of action,
(TTP) that can rapidly adapt to the loss and a 21-day on-station availability;
of space access. This policy will have provide up to 16 kilowatts of electri-
to be prescriptive to affect the required cal power per payload; be runway in-
changes necessary to transform the dependent; and carry several different
way the military fights and, specifically, sensors at the same time.” The LEMV

33 ALSB 2018-1
was cancelled in 2013, but it proved that require direction from geographi-
the concept of launching a balloon to cally separated operations centers re-
augment C2 capabilities when space lies heavily on space-based, tethered
access is degraded for communications connectivity. For the Army and Ma-
and surveillance missions. In other rine Corps, force integration to achieve
words, the user may not be able to em- combined arms will be challenging, as
ploy a primary communications link by space-based positioning, navigation,
bouncing off a space-based satellite, and timing (PNT) and communications
but the LEMV-like vehicle would still requirements drive synchronization
provide an “over-the-horizon” relay, al- and C2 to support “on-the-move” op-
lowing the joint warfighter to maintain erations. For the Navy, the maritime
battlefield SA and enable commanders fight is the most forgiving of the envi-
to conduct C2. ronments as Navy vessels have mitiga-
tion processes already in-place. Carrier
PRIORITIZATION strike groups and vessels underway
The military critically depends are able to disperse their forces more
on space to effectively impose its will effectively to get outside the footprint
upon the enemies of the US. While of jammed signals. Therefore, prioriti-
the military may not counter all the zation (based on key essential tasks)
threats to space access, it can counter should go to the units and commands
some, but that contested environment involved in the most critical phases of
will leave the US with considerably the operation. The prioritization can
The prioritiza- fewer capabilities to support other joint shift as the lines of effort shift, but the
tion can shift as goal should always remain the same—
warfighting functions during combat
the lines of ef-
operations. This would not inhibit op- uninterrupted access to space for the
fort shift, but
the goal should erations, but would require the US to most relevant elements in the fight.
always remain the prioritize what assets and resources
same—uninter- are required to support competing mis- TACTICAL TRAINING AND EXER-
sion demands. “While there are numer- CISES
rupted access to
space for the most ous satellites capable of supporting a Training and exercises may be
relevant elements requirement, higher-priority require- the most cost effective ways to com-
in the fight. ments will be satisfied first.” The mil- bat degraded space access. Each unit,
itary has priority lists for normal op- in every Service, participates in readi-
erations, but these need to expand to ness exercises where they are assessed
what services are required for C2. This against accomplishing their core mis-
deliberate action ensures services and sion-essential tasks. However, most
capabilities are available to continue exercise scenarios, from the Army’s
the mission. If done properly, the most National Training Center (NTC), to the
relevant units, commands, and opera- Air Force’s Red Flags, and even the
tions centers will maintain access to Joint Chiefs of Staff-sponsored events
space and have the greatest impact in (e.g., Pacific Sentry or Austere Chal-
the fight. In a near-peer engagement, lenge), focus on units prosecuting war-
there is no guarantee the US mili- fare in permissive environments. Some
tary will regain access promptly, but of these events, such as NTC and Red
if it has effective prioritization estab- Flag, have started to incorporate de-
lished—flexible, tailorable, and appro- graded environments into their scenar-
priately focused—it can maximize the ios; but thus far, the training audience
access available to take the fight to the requests to turn-off the simulated in-
enemy. terference, so they can continue to con-
duct their operations unconstrained.
However, each Service views Even though commanders wants to
prioritization differently. For the Air look their best at major exercises,
Force, the focus is on maintaining the training objectives must be adjusted
C2 of its air assets. This is no easy feat, to prove US forces’ readiness against
as the distance and number of forces nontraditional, disruptive near-peer
ALSB 2018-1 34
and nonstate threats. edge. This neutralized the credible de-
terrence model and drove the US to
Even at the tactical level, Servic-
identify and develop a second offset
es rarely train their units to identify,
strategy.
mitigate, and restore access to space
stemming from a contested environ- In 1973, the leaders of what lat-
ment. This training deficiency, ulti- er became Defense Advanced Research
mately, leaves joint forces a false sense Projects Agency (DARPA) recommend-
of security and ill-prepared to “fight ed a conventional weapons approach
tonight” against very capable adversar- to counter the anticipated attacks from
ies. The US Service leaders must take the Warsaw Pact. The idea was sim-
a hard look and determine what core, ple—near-zero misses or precision—in-
essential tasks are required to accom- tegrated around a system of systems.
plish the mission when space access is By developing a family of conventional
limited. Then they must develop TTP munitions with systematic accuracy,
to mitigate those effects, train Ameri- it was possible to achieve similar de-
can forces, and incorporate realistic structive effects to tactical nuclear
scenarios into large-scale exercises to weapons. A feat validated against So-
mature competent, space savvy troops viet equipment during the first Gulf
who will continue the mission. The War in 1991. Unfortunately, after 16
Army identified this need and, recently, years of persistent conflict since the
assigned Space Professions to NTC “in September 11, 2001 terror attacks, and
order to facilitate and integrate space adversaries studying US warfighting
related considerations and injects into capabilities, significant erosion to the
training exercises across the spectrum asymmetric, technological advantage
of operations”. Therefore, understand- is showing once again. Therefore, the
ing the significance of space access DOD is seeking a third offset strategy
and recognizing its vulnerability on C2 to maintain its competitive advantage
must be every commander’s responsi- and preserve its credible conventional
bility. It enables the Services to train deterrence.
the way we need to fight.
Unfortunately, most predict that
CONSIDERATIONS UNDER THE cornering the market of a technological
THIRD OFFSET advantage, such as stealth or precision,
The idea of an asymmetric tech- will no longer forge the staying power
nological advantage to give the joint (measured in decades) as the previous
force an edge in warfare is not new. two offsets once assured. Rapid ad-
The concept dates back to the Presi- vances in technology, with the ability
dent Dwight D. Eisenhower adminis- to globally interconnect and leverage
tration in the 1950s. Soon after World powerful, collaborative tools against
War II, it became clear that numeri- problem sets, can significantly shorten
cal superiority gave the Soviet Union a the expected service life of capabilities.
competitive advantage over the US and The DOD must consider alternate de- The DOD must
its North Atlantic Treaty Organization ployment methods and technological consider alternate
concepts to maintain its advantage. deployment meth-
allies. With military reductions and a
Some Services are already thinking ods and techno-
decreasing budget, Eisenhower looked logical concepts
for a way to “offset” this Soviet conven- along these lines. The Army’s high alti-
to maintain its
tional threat in Europe. The decision tude airship program, LEMV, provided
advantage.
was to capitalize on nuclear weapons methods to maintain C2 by outfitting
platforms since the US had an initial the balloon’s payload with the capabili-
advantage. It became the basis for the ties required to operate degraded. This
credible deterrence policy and first off- “modular, open systems architecture”
set strategy. The Soviets realized their approach is also the basis for the Air
weaknesses in capabilities and, by the Force plans to develop their next-gen-
1970s, were able to erode America’s eration, long-range strike bomber. That

35 ALSB 2018-1
platform, now dubbed the B-21, is ex- comes unavailable). Even simple policy
pected to rapidly upgrade its program- adjustments facilitating a more collab-
mable software and electronic suites to orative approach to battlespace SA can
tailor each mission against the expect- have a significant impact at the opera-
ed threat environment. Further, with tional and tactical levels regarding C2.
increased anti access area denial (A2/
AD) concerns and ASAT capabilities CONCLUSION
of near-peer adversaries, the B-21 is There can be little doubt that
envisioned to team humans with ma- the US relies on space-based sys-
chines by incorporating autonomous tems. They are often the first eyes on
platforms capable of being “unteth- the battlefield, and their importance
ered” from controllers in the US. The to C2 and synchronization cannot be
Navy plans to develop concepts that overestimated. But these systems are
capitalize on human-machine teaming inherently vulnerable. Orbital distance
as well. Their experimental unmanned renders most defensive techniques im-
system, currently labeled the Stingray, practical and the complexity of these
is being considered as a wingman for systems places them at risk.
F-35 pilots and a platform to “fuse”
sensor data to increase battlespace SA The US is not without recourse.
for the commander. In this paper, several techniques were
identified to mitigate the threat. The
However, knowing how near- primary technique is an update to stra-
peer adversaries can hold the US’ over tegic policy. It is critical. Also, there
reliance on space-based assets at risk, must be clear guidance on prepara-
the DOD must use the third offset as tion for operations in a degraded space
an opportunity to explore other meth- environment. Predetermined and clear
ods of providing critical C2 capabilities prioritization will help alleviate nega-
to the joint warfighter across isolating tive effects of degraded space opera-
distances. Some options already show tions by ensuring the remaining capa-
promise (e.g., human-machine team- bility is effectively allocated.
ing or high-altitude C2 relay platforms)
... training must but others require further funding and Also, training must adapt to re-
adapt to reflect research. Alternative concepts should flect the possibility of disruption or loss
the possibility of include PNT and communication nodes of space assets. Exercises and readi-
disruption or loss independent of space assets (such as ness events should incorporate train-
of space assets. ing in a degraded space environment.
sophisticated inertia-based systems
with imbedded atomic clocks for tim- In addition to this, near-term techno-
ing and navigation or an integrated logical solutions should be implement-
aerial mesh of unmanned autonomous ed.
systems for extending the communica- Space-based systems can be
tions network over-the-horizon for an made more resilient. Indeed, the US
area of operation). has built redundant modes into equip-
The third offset is not just about ment like the legacy DAGR; this ethic
technology; it is about innovative con- should be restored. Also, the continu-
cepts, as well. Some low-tech ideas in- ally developing and incorporating re-
tegrated with advanced tool sets can gional balloons would serve as a back-
be just as powerful. For instance, de- stop technology which can provide a
velop warfighting concepts less depen- closer, higher power relay to maintain
dent on centralized mission control or C2.
systems designed for continuous op- The final offset holds great prom-
eration despite losing their “always-on” ise in addressing space degradation is-
connection to the larger cloud environ- sues, but only if approached correctly.
ment (e.g., apps working on a smart Updated technology must integrate the
phone when wireless or cell service be- joint force commander’s ability to effec-

ALSB 2018-1 36
tively C2 in the event space capabili- War before Anyone Fires a Shot.” Newsweek Global, May 13,
2016, 12-16.
ties are lost. Development of a robust
7
Ibid.
system of autonomously operating ve-
hicles with secure cross-communica-
8
Ibid, 14-15.

tions would create a network of enor- 9


Strauch, Adam. “Still All Quiet on the Orbital Front? The
Slow Proliferation of Anti-Satellite Weapons. “Obrana a
mous resiliency. Such a system could Strategie (Defence and Strategy) DaS 14, no. 2 (2014): 61-72.
adapt to the disruption of a number of doi:10.3849/1802-7199.14.2014.02.061-072.
nodes and still provide the commander 10
Broder, PEARL HARBOR IN OUTER SPACE, 15-16.
a picture and C2, even without space 11
Ibid.
assets. 12
Billings, Lee. “Are We on the Cusp of War—in Space?” Scien-
tific American, October 2015.
The US’ advantage in space is a 13
Broder, PEARL HARBOR IN OUTER SPACE, 16.
true combat multiplier, and with prop- 14
Ibid
er care, it can be maintained into the 15
Sandria S. Alexander. “Achieving Mission Resilience for Space
future. Several distinct methods have Systems” Crosslink Magazine, 01 April, 2012, Accessed 06
been presented, and their implementa- November 2016. http://www.aerospace.org/crosslinkmag/
spring2012/achieving-mission-resilience-for-space-systems/.
tion will help ensure the US’ success in
16
“Long Endurance Multi-Intelligence Vehicle (LEMV) Agree-
space throughout the 21st century. ment Signed,” June 17, 2010, accessed October 18, 2016,
https://www.army.mil/article/41024/long-endurance-multi-
LTC James T. Edwards Jr., USA is the I intelligence-vehicle-lemv-agreement-signed.
Corps Space Support Element Chief at 17
Space Operations, JP 3-14, Joint Chiefs of Staff, Washington,
DC, 29 May 2013.
Joint Base Lewis-McChord.
18
Garcia, David M., “Fighting in a Contested Space Environ-
Lieutenant Colonel Jeffrey A. Katzman, ment: Training Marines for Operations with Degraded or Denied
Space-Enabled Capabilities.” Naval Post Graduate School, June
USAF is the Deputy Executive Officer 2015, 53.
to the Deputy Commander of United 19
Deputy Secretary of Defense Robert Work, “The Third US
States Central Command. Offset Strategy and Its Implications for Partners and Allies”
(speech, Willard Hotel, Washington, DC, January 28, 2015),
MAJ Robert P. Farrell, USA is an Infor- Defense.gov, http://www.defense.gov/News/ Speeches/
mation Operations Planner at US Stra- Speech-View/Article/606641/the-third-us-offset-strategy-and-
its-implications-for-partners-and-allies.
tegic Command. 20
Ibid
21
Ibid
END NOTES 22
Michael Green, Kathleen Hicks, Mark Cancian et al., “Asia-Pa-
cific Rebalance 2025: Capabilities, Presence, and Partnerships,”
1
Deputy Secretary of Defense Robert Work, “The Third US
Center for Strategic and International Studies (January 2016),
Offset Strategy and Its Implications for Partners and Allies”
accessed October 12, 2016, https://www.csis.org/analysis/asia-
(speech, Willard Hotel, Washington, DC, January 28, 2015),
pacific-rebalance-2025, 117.
Defense.gov, http://www.defense.gov/News/ Speeches/
Speech-View/Article/606641/the-third-us-offset-strategy-and- 23
Mackenzie Eaglen, “The New B-21 Bomber: Under Fire Before
its-implications-for-partners-and-allies. It Can Even Take Flight,” Real Clear Defense, September 18,
2016, accessed September 20, 2016, http://www.realclearde-
2
JP 3-0, xiv.
fense.com/articles/2016/09/18/the_new_b-21_bomber_un-
3
Deputy Secretary of Defense Robert Work, “The Third US der_fire_before_it_can_even_take_flight_110080.html.
Offset Strategy and Its Implications for Partners and Allies” 24
Richard Whittle, “Navy Refueling Drone May Tie into F-35s,”
(speech, Willard Hotel, Washington, DC, January 28, 2015),
Breaking Defense, March 22, 2016, accessed September 20,
Defense.gov, http://www.defense.gov/News/ Speeches/
2016, http://breakingdefense.com/2016/03/navy-refueling-
Speech-View/Article/606641/the-third-us-offset-strategy-and-
drone-may-tie-into-f-35s-f-22s.
its-implications-for-partners-and-allies.
25
Michael Green, Kathleen Hicks, Mark Cancian et al., “Asia-Pa-
4
International Legal Agreements Relevant to Space Weapons.
cific Rebalance 2025: Capabilities, Presence, and Partnerships,”
Accessed October 15, 2016. http://www.ucsusa.org/nuclear-
Center for Strategic and International Studies (January 2016),
weapons/space-weapons/international-legal-agreements#.
accessed October 12, 2016, https://www.csis.org/analysis/asia-
WAJ0cfnR_IU.
pacific-rebalance-2025, 142-144.
5
Ibid. 26
Ibid
6
Broder, Jonathan. “PEARL HARBOR IN OUTER SPACE Forget
ISIS—a Chinese or Russian Attack on US Satellites Could Win a

37 ALSB 2018-1
CURRENT ALSA MTTP PUBLICATIONS
AIR AND SEA BRANCH – POC alsaA@us.af.mil
TITLE DATE PUB # DESCRIPTION/STATUS

AOMSW Description: This publication consolidates Service doctrine,


ATP 3-04.18
Multi-Service Tactics, Techniques, and Proce- TTP, and lessons-learned from current operations and exer-
MCRP 3-25J
dures for Air Operations in Maritime Surface 15 FEB 16 cises to maximize the effectiveness of air attacks on enemy
NTTP 3-20.8
Warfare surface vessels.
AFTTP 3-2.74
Distribution Restricted Status: Current

AVIATION URBAN OPERATIONS ATP 3-06.1 Description: This publication provides MTTP for tactical-lev-
Multi-Service Tactics, Techniques, and Proce- MCRP 3-35.3A el planning and execution of fixed- and rotary-wing aviation
27 APR 16
dures for Aviation Urban Operations NTTP 3-01.04 urban operations.
Distribution Restricted AFTTP 3-2.29 Status: Current

Description: This publication provides the JFC, operational


DYNAMIC TARGETING ATP 3-60.1 staff, and components MTTP to coordinate, de-conflict, syn-
Multi-Service Tactics, Techniques, and Proce- MCRP 3-16D chronize, and prosecute dynamic targets in any AOR. It in-
10 SEP 15
dures for Dynamic Targeting NTTP 3-60.1 cludes lessons learned, and multinational and other govern-
Distribution Restricted AFTTP 3-2.3 ment agency considerations.
Status: Revision

Description: This publication is a single-source set of inte-


gration standards intended to enhance commonality when
FIGHTER INTEGRATION
MCRP 3-20.7 operating with multiple-mission design series or type, model,
Multi-Service Tactics, Techniques, and Proce-
16 JUN 17 NTTP 3-22.6 and series fighter aircraft during an air-to-air mission. It es-
dures for Fighter Integration
AFTTP 3-2.89 tablishes baseline intercept contracts with the associated
Classified SECRET
communications plan.
Status: Current

9 SEP 14
IADS Change 1 ATP 3-01.15 Description: This publication provides joint planners with
Change 1
Multi-Service Tactics, Techniques, and Proce- MCRP 3-25E a consolidated reference on Service air defense systems,
incorpo-
dures for an Integrated Air Defense System NTTP 3-01.8 processes, and structures to include integration procedures.
rated 5
Distribution Restricted AFTTP 3-2.31 Status: Revision
NOV 15

Description: This is a pocket sized guide of procedures for


JFIRE ATP 3-09.32
calls for fire, CAS, and naval gunfire. It provides tactics for
Multi-Service Procedures for the Joint Ap- MCRP 3-16.6A
21 JAN 16 joint operations between attack helicopters and fixed-wing
plication of Firepower NTTP 3-09.2
aircraft performing integrated battlefield operations.
Distribution Restricted AFTTP 3-2.6
Status: Project Assessment

JSEAD
ATP 3-01.4 Description: This publication contributes to Service interop-
Multi-Service Tactics, Techniques, and
MCRP 3-22.2A erability by providing the JTF and subordinate commanders,
Procedures for the Suppression of Enemy Air 15 DEC 15
NTTP 3-01.42 their staffs, and SEAD operators a single reference.
Defenses in a Joint Environment
AFTTP 3-2.28 Status: Current
Distribution Restricted

KILL BOX ATP 3-09.34 Description: This MTTP publication outlines multi-Service
Multi-Service Tactics, Techniques, and Proce- MCRP 3-25H kill box planning procedures, coordination requirements, em-
16 APR 14
dures for Kill Box Employment NTTP 3-09.2.1 ployment methods, and C2 responsibilities.
Distribution Restricted AFTTP 3-2.59 Status: Revision

SCAR
ATP 3-60.2 Description: This publication provides strike coordination
Multi-Service Tactics, Techniques, and Pro-
MCRP 3-20D.1 and reconnaissance MTTP to the military Services for con-
cedures for Strike Coordination and Recon- 31JAN 18
NTTP 3-03.4.3 ducting air interdiction against targets of opportunity.
naissance
AFTTP 3-2.72 Status: Revision
Distribution Restricted

SURVIVAL, EVASION, AND RECOVERY ATP 3-50.3 Description: This is a weather-proof, pocket-sized, quick ref-
Multi-Service Procedures for Survival, MCRP 3-02H erence guide of basic information to assist Service members
11 SEP 12
Evasion, and Recovery NTTP 3-50.3 in a survival situation regardless of geographic location.
Distribution Restricted AFTTP 3-2.26 Status: Revision

UAS Description: This publication establishes MTTP for UAS by


ATP 3-04.64
Multi-Service Tactics, Techniques, and Proce- addressing tactical and operational considerations, system
MCRP 3-42.1A
dures for Tactical Employment of Unmanned 22 JAN 15 capabilities, payloads, mission planning, logistics, and multi-
NTTP 3-55.14
Aircraft Systems Service execution.
AFTTP 3-2.64
Distribution Restricted Status: FY19 Rescind Approved

ALSB 2018-1 38
LAND BRANCH – POC alsaB@us.af.mil
TITLE DATE PUB # DESCRIPTION/STATUS

Description: This publication discusses how advising fits into security


ADVISING ATP 3-07.10
assistance/security cooperation and provides definitions for specific
Multi-Service Tactics, Techniques, and Procedures MCRP 3-33.8A
01 NOV 14 terms as well as listing several examples to facilitate the advising pro-
for Advising Foreign Forces NTTP 3-07.5
cess.
Distribution Restricted AFTTP 3-2.76
Status: Revision

Description: This publication provides guidance for operational com-


AIRFIELD OPENING ATP 3-17.2 manders and staffs on opening and transferring an airfield. It contains
Multi-Service Tactics, Techniques, and Procedures MCRP 3-21.1B information on service capabilities, planning considerations, airfield
18 JUN 15
for Airfield Opening NTTP 3-02.18 assessment, and establishing operations in all operational environ-
Approved for Public Release AFTTP 3-2.68 ments.
Status: Revision

BIOMETRICS ATP 2-22.85


Description: Fundamental TTP for biometrics collection planning,
Multi-Service Tactics, techniques, and Procedures MCRP 3-33.1J
integration, and employment at the tactical level in support of opera-
for Tactical Employment of Biometrics in Support of 6 MAY 16 NTTP 3-07.16
tions is provided in this publication.
Operations AFTTP 3-2.85
Status: Current
Approved for Public Release CGTTP 3-93.6

Description: This is a comprehensive reference for commanders and


CF-SOF FM 6-05
staffs at the operational and tactical levels with standardized tech-
Multi-Service Tactics, Techniques, and Procedures MCWP 3-36.1
niques and procedures to assist in planning and executing operations
for Conventional Forces and Special Operations 13 MAR 14 NTTP 3-05.19
requiring synchronization between CF and SOF occupying the same
Forces Integration and Interoperability AFTTP 3-2.73
area of operation.
Distribution Restricted USSOCOM Pub 3-33
Status: Revision

CORDON AND SEARCH ATP 3-06.20 Description: This is a comprehensive reference to assist ground com-
Multi-Service Tactics, Techniques, and Procedures MCRP 3-30.5 manders, subordinates, and aviation personnel in planning, training,
24 Aug 16
for Cordon and Search Operations NTTP 3-05.8 and conducting tactical cordon and search operations.
Distribution Restricted AFTTP 3-2.62 Status: Current

DEFENSE SUPPORT OF CIVIL AUTHORITIES Description: DSCA sets forth MTTP at the tactical level to assist the
ATP 3-28.1
(DSCA) military planner, commander, and individual Service forces in the em-
MCWP 3-36.2
Multi-Service Tactics, Techniques, and Procedures 25 SEP 15 ployment of military resources in response to domestic emergencies
NTTP 3-57.2
for Defense Suport of Civil Authorities in accordance with US law.
AFTTP 3-2.67
Approved for Public Release Status: Current

Description: This publication provides commanders and their units


EO ATTP 4-32.2
guidelines and strategies for planning and operating in an explosive
Multi-Service Tactics, Techniques, and Procedures MCRP 3-17.2B
15 JUL 15 ordnance environment while minimizing the impact of explosive ord-
for Unexploded Explosive Ordnance Operations NTTP 3-02.4.1
nance on friendly operations.
Distribution Restricted AFTTP 3-2.12
Status: Revision

Description: This is a single source, descriptive reference guide to


ATP 3-52.3
JATC ensure standard procedures, employment, and Service relationships
MCRP 3-25A
Multi-Service Procedures for Joint Air Traffic Control 18 APR 14 are used during all phases of ATC operations. It also outlines how to
NTTP 3-56.3
Distribution Restricted synchronize and integrate JATC capabilities.
AFTTP 3-2.23
Status: FY19 Rescind Approved

Description: This publication is a single source, descriptive reference


ATP 3-34.84 guide to ensure effective planning and integration of multi-Service
MILITARY DIVING OPERATIONS (MDO)
MCRP 3-35.9A diving operations. It provides combatant command, joint force, joint
Multi-Service Service Tactics, Techniques, and
13 FEB 15 NTTP 3-07.7 task force, and operational staffs with a comprehensive resource for
Procedures for Military Diving Operations
AFTTP 3-2.75 planning military diving operations, including considerations for each
Approved for Public Release
CGTTP 3-95.17 Service’s capabilities, limitations, and employment.
Status: Revision

Description: This publication provides a single-source, consolidated


NONLETHAL WEAPONS (NLW) ATP 3-22.40
reference on employing nonlethal weapons. Its intent is to make com-
Multi-Service Service Tactics, Techniques, and MCWP 3-15.8
manders and subordinates aware of using nonlethal weapons in a range
Procedures for the Tactical Employment of Nonlethal 13 FEB 15 NTTP 3-07.3.2
of scenarios including security, stability, crowd control, determination of
Weapons AFTTP 3-2.45
intent, and situations requiring the use of force just short of lethal.
Distribution Restricted CGTTP 3-93.2
Status: Revision

Description: This publication serves as a commander and staff guide


OP ASSESSMENT ATP 5-0.3
for integrating assessments into the planning and operations process-
Multi-Service Tactics, Techniques, and Procedures MCRP 5-1C
18 AUG 15 es for operations conducted at any point along the range of military
for Operation Assesment NTTP 5-01.3
operations.
Approved for Public Release AFTTP 3-2.87
Status: Project Assessment

PEACE OPS Description: This publication offers a basic understanding of joint and
ATP 3-07.31
Multi-Service Tactics, Techniques, and Procedures multinational PO, an overview of the nature and fundamentals of PO,
1 NOV 14 MCWP 3-33.8
for Conducting Peace Operations and detailed discussion of selected military tasks associated with PO.
AFTTP 3-2.40
Approved for Public Release Status: Revision

Description: This is a quick-reference guide for convoy commanders


TACTICAL CONVOY OPERATIONS
ATP 4-01.45 operating in support of units tasked with sustainment operations. It
Multi-Service Tactics, Techniques, and Procedures
22 FEB 17 MCRP 3-40F.7 includes TTP for troop leading procedures, gun truck employment,
for Tactical Convoy Operations
AFTTP 3-2.58 IEDs, and battle drills.
Distribution Restricted
Status: Current

39 ALSB 2018-1
COMMAND AND CONTROL (C2), CYBER AND SPACE BRANCH - POC: alsaC@us.af.mil
TITLE DATE PUB # DESCRIPTION/STATUS

Description: This MTTP publication is a tactical-level docu-


AIRSPACE CONTROL ATP 3-52.1
ment which synchronizes and integrates airspace C2 func-
Multi-Service Tactics, Techniques, and Proce- MCWP 3-25.13
09 APR 15 tions and serves as a single-source reference for planners
dures for Airspace Control NTTP 3-56.4
and commanders at all levels.
Distribution Restricted AFTTP 3-2.78
Status: Revision

Description: This publication covers theater-level, air-to-


AIR-TO-SURFACE RADAR SYSTEM EM-
surface radar systems and discusses system capabilities
PLOYMENT ATP 3-55.6
and limitations performing airborne command and control;
Multi-Service Tactics, Techniques, and MCRP 2-24A
10 NOV 15 wide area surveillance for near-real-time targeting and target
Procedures for Air-to-Surface Radar System NTTP 3-55.13
development; and processing, exploiting, and disseminating
Employment AFTTP 3-2.2
collected target data
Distribution Restricted
Status: Project Assessment

Description: This publication defines multi-Service brevity


ATP 1-02.1
BREVITY which standardizes air-to-air, air-to-surface, surface-to-air,
MCRP 3-30B.1
Multi-Service Brevity Codes 26 JUL 16 and surface-to-surface brevity code words in multi-Service
NTTP 6-02.1
Distribution Restricted operations.
AFTTP 3-2.5
Status: Revision

ISR Optimization Description: This publication provides a comprehensive re-


ATP 3-55.3
Multi-Service Tactics, Techniques, and source for planning, executing, and assessing surveillance,
MCRP 2-2A
Procedures for Intelligence, Surveillance, and 14 APR 15 reconnaissance, and processing, exploitation, and dissemi-
NTTP 2-01.3
Reconnaissance Optimization nation operations.
AFTTP 3-2.88
Distribution Restricted Status: Revision

TACTICAL CHAT Description: This publication provides commanders and


ATP 6-02.73
Multi-Service Tactics, Techniques, and Proce- their units guidelines to facilitate coordinating and integrating
MCRP 3-40.2B
dures for Internet Tactical Chat in Support of 24 JAN 14 tactical chat when conducting multi-Service and joint force
NTTP 6-02.8
Operations operations.
AFTTP 3-2.77
Distribution Restricted Status: Current

TACTICAL RADIOS ATP 6-02.72 Description: This is a consolidated reference for TTP in em-
Multi-Service Communications Procedures MCRP 3-30B.3 ploying, configuring, and creating radio nets for voice and
19 May 17
for Tactical Radios in a Joint Environment NTTP 6-02.2 data tactical radios.
Approved for Public Release AFTTP 3-2.18 Status: Current

Description: This publication promotes Service awareness


TAGS ATP 3-52.2 regarding the role of airpower in support of the JFC’s cam-
Multi-Service Tactics, Techniques, and Proce- MCRP 3-25F paign plan, increases understanding of the air-ground sys-
30 JUN 14
dures for the Theater Air-Ground System NTTP 3-56.2 tem, and provides planning considerations for conducting
Distribution Restricted AFTTP 3-2.17 air-ground ops.
Status: Revision

ALSB 2018-1 40
FUTURE AIR LAND SEA BULLETINS (ALSB)

Got a story? Air Land Sea


Want to tell it? Bulletin
Help us help you! Article
The Air Land Sea Application (ALSA) Center
Requirements
develops multi-Service tactics, techniques, and and Deadlines
procedures (MTTP) with the goal of meeting the
immediate needs of the warfighter. In addition
Submissions must:
to developing MTTP, ALSA provides the ALSB fo-
rum to facilitate tactically and operationally rel- • Be unclassified
evant information exchanges among warfighters • Be 5,000 words or less
of all Services. • Be publicly releasable
• Be double spaced
There is no better resource for information • Be in MS Word format
than the people doing the jobs. Personal experi- • Include the author’s name, unit
ences, studies, and individual research lead to address, telephone numbers, and
inspirational and educational articles. There- email address.
• Include current, high-resolution,
fore, we invite our readers to share their experi-
300 dpi (minimum), original
ences and, possibly, have them published in an photographs and graphics. Pub-
upcoming ALSB. lic affairs offices can be good
sources for photographs or
We want to take your expertise and lessons graphic support.
learned from recent operations or any other
multi-Service or multi-nation missions in which
Article and photo submission deadlines
you have been involved, and spread that knowl-
are below. Early submissions are highly
edge to others. Get published by sharing your encouraged and appreciated.
experiences and expertise.

You are invited to use this platform to share


your insights on topics that may not be covered
in doctrine or address an operational gap that Issue Deadline Point of Contact

highlights emerging needs for supporting multi- Summer 1 March alsaC@us.af.mil


Service publications. 2018 2018 (757) 225-0903

Please keep submissions unclassified and in Winter 1 October alsaA@us.af.mil


2019 2018 (757) 225-0967
accordance with the instructions in the require-
ments box on this page. Summer 1 March alsaB@us.af.mil
2019 2019 (757) 225-0964

41 ALSB 2018-1
ALSA ORGANIZATION
Joint Actions
Steering Committee
As of 1 January 2018
Director
Col Brian J. Gross, USAF

Deputy
COL Matthew F. Ketchum, USA
NCOIC Support Staff
SSgt Steven Warner, USAF Cheryl Parris, Admin Support Asst
Melissa Villanueva, Budget Analyst
Leila Joyce, Office Automation Asst

Publishing Staff
Patricia Radcliffe, Editor
Laura Caswell, Illustrator

Air and Sea Land C2/Cyber/Space


CDR Shannon Moore, USN LTC (P) Michael Wiser, USA Maj (P) Darin Lupini, USAF
Lt Col Lawrence Evert, USAF Lt Col Ian Boyd, USAF Maj Ryan Batchelor, USAF
Maj Craig Pachlhofer, USA LTC James Grandy, USA MAJ John Robertson, USA
Maj Mark Peckham, USMC MAJ (P) Steve Padilla, USA
Maj Brent Blandino, USAF MAJ Katherine Ogletree, USA

ALSA JOINT WORKING GROUPS


Date Publication Location Point of Contact
Joint Base Land Branch
20-23 Feb 18 Operations Assessment
Langley-Eustis, VA alsaB@us.af.mil
Joint Base Land Branch
26 Feb-2 Mar 18 ISR Optimization
Langley-Eustis, VA alsaC@us.af.mil
Air and Sea Branch
19-23 Mar 18 JFIRE Nellis AFB, NV
alsaA@us.af.mil
Joint Base Land Branch
25-29 Mar 18 ISR Optimization
Langley-Eustis, VA alsaC@us.af.mil
Joint Base Land Branch
3-6 Apr 18 Operations Assessment
Langley-Eustis, VA alsaB@us.af.mil
Joint Base Air and Sea Branch
Apr 18 AOMSW
Langley-Eustis, VA alsaA@us.af.mil
Air and Sea Branch
30 Apr-4 May 18 JFIRE Nellis AFB, NV
alsaA@us.af.mil
Joint Base Land Branch
14-18 May 18 (T) Biometrics
Langley-Eustis, VA alsaB@us.af.mil
Joint Base Air and Sea Branch
4-8 Jun 18 (T) JFIRE
Langley-Eustis, VA alsaA@us.af.mil
Joint Base Land Branch
18-22 Jun 18 (T) Biometrics
Langley-Eustis, VA alsaB@us.af.mil
All Dates are Tentative

ALSB 2018-1 42
ALSA MISSION

ALSA’s mission is to rapidly and responsively develop


multi-Service tactics, techniques and procedures, studies,
and other like solutions across the entire military spectrum
to meet the immediate needs of the warfighter.
ALSA is a joint organization governed by a Joint Actions
Steering Committee chartered by a memorandum of agree-
ment under the authority of the Commanders of the United
States Army Training and Doctrine Command, Marine Corps
Combat Development Command, Navy Warfare Develop-
ment Command, and Headquarters, Curtis E. LeMay Center
for Doctrine Development and Education.

VOTING JASC MEMBERS

Maj Gen Michael D. MG James J. RADM M. A. BGen (S) James H.


Rothstein Mingus Hitchcock Adams

Commander, Curtis E. Director, Mission Commander, Navy Director, Capabilities


LeMay Center for Command Center of Warfare Development
Doctrine Development Excellence Development Directorate, Marine
and Education Command Corps Combat
Development Command

ONLINE ACCESS TO ALSA PRODUCTS

ALSA Public Website


http://www.alsa.mil

ALSA SIPR Site


https://intelshare.intelink.sgov.gov/sites/alsa

JEL+
https://jdeis.js.mil/jdeis/index.jsp?pindex=84

43 ALSB 2018-1
ALSA CENTER

ATTN: ALSB

114 ANDREWS STREET

JOINT BASE LANGLEY-EUSTIS, VA

23665-2785

OFFICIAL BUSINESS

You might also like