with unprecedented efficiency — that is, it did not require large support forces of air-to-air escort, ECM support jamming aircraft, and Wild Weasels carrying anti-radiation missiles, while its laser-guided bombs made it truly efficient in terms of targets destroyed per sortie.
The secret of Stealth: it controls its environment.
The F-117 can go anywhere its pilot commands, and it cannot be sensed by the enemy except visually, meaning that it flies only at night and/or during adverse weather. Though an enemy may be aware that an F-117 is present (he can, after all, see or hear bombs exploding), he cannot locate it with enough accuracy to shoot it down.
Stealth and supercruise will give the F-22 even greater control of the environment. With supercruise, F-22s will fly at supersonic speeds without using afterburner. Thus they can cruise at speeds above Mach 1 with their engines at fairly economical fuel flows. Flying that fast cuts down an enemy’s time for action once he detects you — and with Stealth, he will detect you very late in the game. Supercruise and Stealth also collapse the envelope for the employment of his weapons. An air-to-air missile shot from a tail aspect at a supersonic jet has a very small effective range, since the missile has to spend all its energy catching up.
With these advantages, F-22s will almost certainly achieve air superiority over enemy aircraft, and in turn this will permit the entire spectrum of the joint force’s non-Stealth aircraft to operate unhindered by enemy defenses.
? Another good way to control the environment is by using information warfare — the current hot topic in military circles, and for good reason.
Everyone talks about weirdo, geek computer hackers who break into heavily protected bank or military computer systems. But imagine using hacker skills for military purposes. For instance, imagine the military value of taking an enemy’s command-and-control system, and inserting a depiction of forces you want him to see, instead of the real-world situation. How about entering his air defense system and letting him “see” false attacks to the west, while your real attack comes from the east? Why not lead him to believe that your ground forces are located where they are not, so he will exhaust his artillery ammunition pounding barren land, while your force escapes unharmed? Or even make him believe the forces arrayed against him are so vast and dominating that he will sue for peace before the battle begins?
Information warfare can be conducted at all levels of conflict, and includes a defensive side as well.
Of all the nations of the world, the United States is the most vulnerable to computer attacks. We use computers everywhere. Our telephones are now simple computer entry pads. Our wristwatches are computers. We plan our days, operate our automobiles, and communicate with computers. Our military equipment is so advanced largely because computers aim our guns, fly our planes, and operate our ships.
Therefore, even as we do our best to control the inputs to an enemy’s computers and knowledge system, we must also protect the integrity of the knowledge systems we are using to prosecute the battle.
Most easily understood is the need to protect our own computer databases from corruption or other manipulation. Though private industry and the military have been working this problem for years, the threat has grown at a pace equal only to the raging change in computer capabilities worldwide. There are no longer “have” and “have not” nations when it comes to the capacity to access and manipulate computer databases and programs.
Meanwhile, most current users are in a state of denial about the vulnerability of their data systems, simply because they have some small protection — and the alternative is too terrible to contemplate.
For example, the banking industry loses millions of dollars each year to computer crime. They can afford to overlook that loss. But what if computer criminals learned how to attack the customer trust and confidence on which their industry is built and relies? Could they afford to overlook that? Other financial markets, such as stock exchanges, suffer the same vulnerability.
The military operates under far different expectations. Where the financial industry likes to operate in a precise world, down to the fourth decimal point, the military is used to operating in the fog of war, a world of uncertainty, and at levels of efficiency that might reach 5 or 10 percent — that is, a soldier has less than one chance in ten of hitting the enemy when he fires his rifle. Such levels of uncertainty mean that we in the military so overload our capacity to conduct warfare that a hacker who steals our secrets, inserts misleading information, or injects confusion will not cripple a military operation, only lower its efficiency.
Still, if the opposing military forces are somewhat close to parity, then computer attacks might spell the difference between victory and defeat in battle.
This is the good news. The bad news is that the U.S. military has an extensive capacity to fool itself.
We can talk ourselves into believing our own lies.
Imagine the situation I described earlier: We have entered the computer system associated with the enemy’s command and control for air defense, and have depicted a mythical raid in the western part of his country, while our Stealth bombers are in the east. Believing what he sees on his displays, he sends his interceptor forces to the west.
In the meantime, another echelon of U.S. command is secretly pirating the enemy air defense command- and-control data and feeding this information to our air defense units. However, owing to the classification of the computer insertion activity, some good guys don’t know what the other good guys are doing. As a result, the intelligence gatherers believe we are
This example is simplistic, yet it illustrates how complicated new forms of warfare can become, and how dangerous can be the failure to work as one force, one team. Control must be all-encompassing in every aspect of the conflict, and it must be coordinated both offensively and defensively. Modern warfare’s widespread communications, computer-assisted information systems, and surveillance of the battle space will dictate that the dominant forces have full knowledge of the battle and control of its environment.
They also mean that the victor will be the combatant who can act with the greatest speed.
SPEED
In future wars, the warring parties may not be equal in size or firepower, yet one side’s numerical advantages may be offset by a smaller opponent who acts rapidly, decisively, and accurately. Because any nation or group participating in organized warfare can now access computers, space systems, and commercial communications, any warring party can now act rapidly, decisively, and accurately. They can review and analyze data, decide to act, and then commit with such speed that their opponent is reacting to these actions rather than initiating actions that facilitate his own advantages.
This is the advantage of surprise and initiative: long prized by United States military doctrine, and exemplified by the German
In the future, rapid movement over strategic distances will be required if our military power is to be deployed in time to prevent a crisis from escalating to war or to halt an invasion. This is why American military forces so highly value our vast strategic fleet of airlift aircraft. Going one step further, imagine conventional-tipped intercontinental ballistic missiles, based in the United States but capable of delivering a crippling blow within thirty minutes anywhere in the world. Surely, in that future, the words of warning delivered by the United States ambassador to a dictator marshaling his forces on his neighbor’s border would be more carefully evaluated than was the case in 1990.
The essence of modern airpower is rapidity. It is truly the forte of the B-2. Though based in Missouri, it can reach anywhere on the globe in hours, with little preparation or support.
? For the United States military, “rapidity” has strategic as well as tactical implications.
The United States is blessed with good strategic location, safely tucked as it is between two large oceans on its east and west, and two friendly nations to its north and south. While it is subject to attack from the sea, air,