AirSea Battle: A Point-of-Departure Operational Concept PDF Thumbnail
Additional Attachments

Operational Problems Posed By A2/AD Systems

In crafting an AirSea Battle concept, it is necessary to identify specific operational-level problems a robust A2/AD system would present over the planning horizon, which for DoD is typically the next ten to twenty years. This paper assumes that China will continue enhancing its A2/AD capabilities. Chinese military writings suggest that in the event of conflict, the PLA would conduct large-scale preemptive attacks designed to inflict severe damage on US forces based or operating in the WPTO; keep other US air and naval forces well out of range or unable to penetrate into the homeland; disrupt US command and control (C2) networks; and heavily constrain US operational logistics by destroying major supply nodes and the relatively few US logistics ships. The overall Chinese strategy appears designed to inflict substantial losses on US forces in a very short period of time, thereby lengthening US operational timelines and highlighting the United States’ inability to defend its allies. Once this is accomplished, China would assume the strategic defense and confront the United States with the prospect of either paying a very high (and perhaps prohibitive) cost for reversing its gains, or accepting Beijing’s fait accompli.

US ground, air and naval forces have long been accustomed to operating from sanctuary. Their main operating bases, ports and facilities have been largely invulnerable to serious conventional attack since World War II. Navy surface and carrier aviation forces are accustomed to operating from sanctuary at sea, enabled by the near-absence of hostile long-range detection and targeting capabilities and capable enemy navies. And US communications, ISR, and precision-guided munitions (PGM) are heavily dependent on high-bandwidth connectivity for command and control, target detection, precision strike, and post-strike battle damage assessment operations. This connectivity is highly reliant on long-haul space-based assets that have hitherto also been accorded sanctuary status, save for the occasional modest localized jamming. The same can be said with respect to cyberspace which, despite numerous and consistent probes by China and other states, and by nonstate entities and individuals, has never been seriously compromised. The growing Chinese A2/AD capabilities, to include its cyber weapons, threaten to violate these long-standing sanctuaries. As this occurs, the consequences for US forces would include:

  • Loss of forward sanctuaries in physical domains and virtual domains (including space, cyberspace, and the electromagnetic spectrum);
  • Denial of access to areas of operations; and consequently
  • Loss of strategic and operational initiative.

While the favorable, stable military balance that has existed in the Western Pacific for the last two decades is deteriorating, neither the Defense Department’s planning nor its defense program have been sufficiently modified to account for this fact. Thus DoD continues emphasizing investments that assume it will enjoy sanctuary status as described above, such as short-range rather than long-range strike systems; vulnerable communications satellites; and elaborate — but fragile — battle networks. This is done at the expense of investing in (among other badly needed capabilities) penetrating, long-endurance ISR and strike capabilities, aerial tankers, forward base hardening, the combat logistics force (CLF) and directed-energy weapons for missile defense.