Toward The End of Force Projection? I. The Anti-Access Threat
Toward The End of Force Projection? I. The Anti-Access Threat
Toward The End of Force Projection? I. The Anti-Access Threat
______________________________________________________________________
Corentin Brustlein
July 2011
The Institut franais des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a nongovernmental, non-profit organization. As an independent think tank, Ifri sets its own agenda, publishing its findings regularly for a global audience. Using an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. With office in Paris and Brussels, Ifri stands out as one of the rare French think tanks to have positioned itself at the very heart of the European debate.
The opinions expressed in this text are the responsibility of the author alone.
ISBN: 978-2-86592-892-7 Ifri 2011 All rights reserved All requests for information, reproduction or distribution may be addressed to: [email protected].
Ifri 27 rue de la Procession 75740 Paris Cedex 15 FRANCE Tel : +33 (0)1 40 61 60 00 Fax : +33 (0)1 40 61 60 60 Email : [email protected]
Ifri-Bruxelles Rue Marie-Thrse, 21 1000 Bruxelles BELGIQUE Tel : +32 (0)2 238 51 10 Fax : +32 (0)2 238 51 15 Email : [email protected]
Website : www.ifri.org
Focus stratgique
Resolving todays security problems requires an integrated approach. Analysis must be cross-cutting and consider the regional and global dimensions of problems, their technological and military aspects, as well as their media linkages and broader human consequences. It must also strive to understand the far reaching and complex dynamics of military transformation, international terrorism or post-conflict stabilization. Through the Focus stratgique series Ifris Security Studies Center aims to do so, offering new perspectives on the major international security issues in the world today. Bringing together researchers from the Security Studies Center and outside experts, the Focus stratgique alternates general works with the more specialized analysis carried out by the team of the Defense Research Unit (LRD or Laboratoire de Recherche sur la Dfense).
The author
Corentin Brustlein is a research fellow in Ifris Defense Research Unit. He is also the deputy editor the Proliferation Papers, and blogs at Ultima Ratio.
Editorial Board
Editor: Etienne de Durand Deputy-Editor: Marc Hecker Translator: Alice Pannier Editorial assistant: Marie-Charlotte Henrion
Table of Contents
Abstract
Force projection has become a general posture and a fundamental dimension of the influence Western powers intend to exert over the world by means of their armed forces. However, for the last fifteen years, Western states adoption of expeditionary postures has encouraged the proliferation of certain technologies. The latter favor strategies based on naval and air interdiction, and threaten to render foreign interventions too costly. This article thus seeks to provide some clues for understanding and assessing the threat anti-access strategies pose to Western, and especially European, force projection capabilities. In order to illustrate in a concrete way the potential problems regional adversaries can pose, this article will focus on assessing the Iranian anti-access threat.
Introduction
orce projection capacity has historically been a criterion distinguishing great powers from other states. Most countries are able to use force to maintain internal order or defend their borders, but very few have the possibility to impose their will on their adversary by resorting to force several thousand kilometers away from their national territory. Therefore, the command of the commons oceans, air, and space by certain states used to be a unique feature in the confrontations between great powers. 1 As was proved by the two World Wars, securing and exploiting the command of seas and air was likely to have a decisive impact on the outcomes of land campaigns and wars in general. Once the long parenthesis of the two World Wars was closed, the West became, again, the main beneficiary of the command of the commons, and took advantage of this asset to carry out a number of armed interventions. Due to the protection offered by nuclear deterrence since 1945 and the absence of territorial threats after 1990, Western countries have moved from a logic of total war to one of limited war. As a consequence, they have developed power-projection capabilities and their armed forces have focused on quality rather than quantity. Some operations that occurred during and after the Cold War, such as the Suez crisis, the takeover of the Falklands or the Gulf War, exemplify this development. More than a specific type of military operation, force projection has become a general posture and a fundamental dimension of the influence that great powers, in this instance the West, intend to exert over the world by means of their armed forces. Yet, this situation could experience a historical reversal. For the past 15 years, a growing number of experts have observed that Western states adoption of expeditionary postures has encouraged the proliferation of certain technologies. The latter favor strategies based on naval and air interdiction, and threaten to render foreign interventions too costly. 2 Thus, systems such as submarines, naval mines, cruise and ballistic missiles, and surface-to-air missiles (SAM) are at the heart of a complex problem posed to most Western military operations. The anti-access threat became an issue in the United States following Operation Desert Storm and in the midst of a debate on the future of the US armed forces. However, this issue
Barry R. Posen, Command of the Commons: The Military Foundation of U.S. Hegemony, International Security, Vol. 28, No. 1, Summer 2003, pp. 5-46. 2 Anti-access strategies do not include piracy, which is less a strategy aimed at weakening the enemys forces than a criminal practice targeted against trade and tourist activities.
1
has seldom been studied in France, with a few exceptions. 3 Unsurprisingly, the most far-reaching studies on this topic do not look at the threat facing France and Europe, nor do they assess those countries ability to counter this threat. One of the aims of this study is thus to provide the first elements of an assessment of the anti-access threat to Western forces as a whole. In the United States, the issue of anti-access emerged in the 1990s, but only after the 2001 Quadrennial Defense Review (QDR) and Donald Rumsfelds military transformation plans did it get a tangible impact on US defense policy. The topic was subsequently put on the back burner by the US administration while it was grappling with insurgencies in Iraq and Afghanistan, but reappeared in American debates over the last few years. Obviously, this renewal is not fortuitous. It is rather a side effect of the strategic debate initiated around two questions: defining the future orientations of the American defense apparatus, and striking the right balance between preparing for future conflicts and supporting current operations. The United States, as the dominating military player today and as an insular power, is the first to be concerned by the severe military and political challenges facing force projection. 4 Such an evolution looming over the worlds first military power is necessarily problematic for France. Although it does not claim to be an enforcer of the international order, France has set ambitious targets for itself through its White Paper on Defense and National Security (Livre blanc sur la dfense et la scurit nationale, LBDSN), namely:
France will possess the skills inherent in the critical phases of a major operation, whether at the launch phase, i.e. for its forces to have force entry capability, or during the transition from a coercive operation to a stabilization operation, then to one of peace 5 consolidation.
French military power is thus directly concerned by the emergence of anti-access capabilities. This is all the more true as the constrained defense budgets of middle-sized powers require an even more careful balance between their capacity for build-up and the capabilities needed for
See for instance Etienne de Durand, LAmrique et lAlliance, Paris, Notes de lIfri, No. 23, 2001, pp. 43-44; Bruno Gruselle, Missiles de croisire et stratgies danti-accs, Paris, Fondation pour la recherche stratgique, 2006; Laurent e Murawiec, La guerre au XXI sicle, Paris, Odile Jacob, 2000, pp. 11-12. For a history of the concept, see Roger Cliff et al., Entering the Dragons Lair: Chinese Antiaccess Strategies and Their Implications for the United States, Santa Monica, RAND Corporation, 2007, pp. 3-11. 4 Among most recent documents illustrating this American concern, see the Quadrennial Defense Review Report, 2010, pp. 31-34; John T. Bennett, Pentagon Crafting Anti-Access Concept, Defense News, 25 January 2010, p. 3; Andrew F. Krepinevich, Why AirSea Battle?, Washington, Center for Strategic and Budgetary Assessments, 2010; Abraham M. Denmark and James Mulvenon (eds.), Contested Commons: The Future of American Power in a Multipolar World, Washington, Center for a New American Security, 2010. 5 The French White Paper on Defense and National Security, Paris, Odile Jacob La documentation franaise, 2008, p. 202.
3
-8-
irregular warfare. For this reason, it becomes particularly difficult to maintain some specific know-how, for instance in the field of mine countermeasures. This article thus seeks to provide some clues for understanding and assessing the threat anti-access strategies pose to Western, and especially European, force projection capabilities. To that end, two weaknesses of the US debate must be underlined and rectified: the first one is the recurring tendency to evaluate the threat only on the basis of the adversarys antiaccess capabilities, without taking into account forcible entry capabilities; the second is the fact that although it plays an essential part, the political dimension of this issue has more often than not been overlooked. This study is comprised of two parts, published separately: the first one which is the focus of the present article intends to present the relationships between anti-access and force projection postures, and looks at the various existing anti-access capabilities and strategies. The second part, published in another issue of the Focus stratgique series, seeks to set the issue of anti-access back in its strategic dimension, by taking into account potential responses to this threat (forcible entry capabilities), and by reasserting the paramount nature of the political dimension of the problem. Understanding and assessing the threat posed by anti-access assets and postures first requires looking at force projection as a central but fragile element of Western states strategic postures. This fragility is compounded by modus operandi and capabilities pertaining to anti-access that seek to prevent or disrupt force projection operations through harassment and interdiction. Even though anti-access is a fundamentally strategic issue, understanding it requires being cognizant of its operational and technical dimensions, as this type of posture often relies on the diffusion of certain key technologies. In order to illustrate in a concrete way the potential problems that regional adversaries can pose to Western states, and especially to Europe, and whereas most analyses on this theme have been devoted to Chinese capabilities and approaches, this article will focus on assessing the Iranian anti-access threat.
-9-
n anti-access strategy is first and foremost a defensive strategy. Using military and political means, it aims to disrupt or prevent or even discourage, when it entails a deterrent dimension a force projection operation. As such, anti-access capabilities would not be, in themselves, a threat to Western countries, were their strategic postures not depending on foreign interventions justified by overseas security interests. Such postures are, by their very nature, complex and vulnerable. It would thus be wrong to think that the issue of anti-access emerged as a result of post-Cold War trends. The issue burst into the strategic debate during this period, but the concept conveys older operational and strategic realities.
Inherent Weaknesses
Force projection is the capacity of a state to employ land, air and naval units in a distant theater of operations. To do this requires a range of specific equipment and know-how in order to gather, move over several thousand kilometers and reorganize units representing hundreds of thousands of tons of materiel and thousands of individuals sometimes in emergency situations. The expeditionary posture adopted by present Western armies implies extremely complex missions of projection and, as a consequence, suffers from a number of significant inherent weaknesses and vulnerabilities. These weaknesses are twofold: on the one hand, there are physical vulnerabilities within the logistical system of force projection missions and, on the other hand, the strategic vulnerabilities that characterize these operations and foreign interventions in general. The physical characteristics of force projection operations tend to create a significant number of vulnerabilities. The required naval and air maneuvers follow a course whose predictability, clumsiness and slowness have been observed and criticized in the past. 6 Sea shipping is the only way to transport the volume of materiel necessary to carry out large operations, but it is vulnerable to varying degrees all along the journey toward a distant area. Depending on the territory where the assembly
6
For an overview of the logistical complexity of force projection operations, see Michael E. OHanlon, The Science of War. Defense Budgeting, Military Technology, Logistics, and Combat Outcomes, Princeton, Princeton University Press, 2009, pp. 141-168.
points are located, they can be subjected to terrorist attacks, 7 or mere demonstrations which could hamper planning and embarkation. Cyber attacks can also target logistical information management systems essential to reduce the equipments deployment and employment time . As far as the journey is concerned, there is a risk of harassment by small boats (potentially loaded with explosives and maneuvered by terrorists), submarines, aircraft and anti-ship cruise missiles (ASCM), as well as naval minefields. The convoy is even more vulnerable when it crosses chokepoints (such as the Suez and Panama canals, or the straits of Hormuz, Malacca, Gibraltar and Bab-el-Mandeb), the surroundings of which cannot be perfectly controlled. The narrower the waterway, the shorter the range needed to strike the convoy, thus providing a wider choice of possible hostile actions. Finally, the debarkation and landing points and gathering areas, whence the forces are brought together into the theater of operations, are often located in less controllable and more exposed environments, be it only due to the adversarys increased proximity. Facilities located in these zones can be the target of acts of sabotage or terrorism, ballistic missile strikes or long-range artillery firing, all kinds of means paving the way for blackmail attempts toward the host state. 8 Strategic airlift is, as a whole, less vulnerable to attacks perpetrated during the transfer, but the departure and arrival runways remain exposed to bomb attacks, special operations forces, cyber attacks, MANPADS, etc. A ground intervention intended to defend or liberate an allied country requires constituting a deployment base. To do so requires that adequate seaports, airfields and land facilities are made available. 9 These facilities should enable the unloading of equipment, the debarkation of combatant and noncombatant personnel, and the settling and organization of the forces in one or several locations called gathering and waiting areas. The sea and aerial ports of debarkation (SPOD or APOD) should be suitable for the volume of materiel transported, which means that they must be big enough to contain the largest strategic airlift aircraft (C-5 type) or the cargoes and roll-on/roll-off ships transporting the heaviest equipment. More generally, many of the difficulties facing force projection postures result directly from the offensive nature of this type of operation. Preparing or engaging in a distant conflict implies waging offensive warfare at the operational or strategic level. Offensive is the only way for the belligerent to impose its will on an adversary, but it is, by nature, a vulnerable posture. Defensive postures, on the contrary, enjoy a number of significant advantages. The superiority of defense over offense, as
One can think, for instance, of the attack against the American destroyer USS Cole in 2000, while it was anchored in the port of Aden. 8 Geoffrey Till, Seapower: A Guide for the Twenty-First Century, Abingdon, Routledge, 2009, pp. 237-238. 9 In the US as well as in NATO, the terms Aerial Port of Debarkation (APOD) and Sea Port of Debarkation (SEAPOD or SPOD) are used.
7
- 12 -
underlined by Clausewitz and later by Mao, can be attributed to various factors. First, the defender has a better knowledge of the terrain, and usually has had time to prepare it so as to ward off enemy attacks. Second, it can rely on stronger support from the local population. Finally, it is closer to its supply bases and hence enjoys shorter communication and supply lines. Conversely, the attacker progresses within an area it knows poorly and moves away from its bases as it pulls ahead, thereby making its logistics more complex and vulnerable. 10 This disadvantage has an impact at the tactical and technological levels: the attacker is the one coming to the fore to strike the defenders, thus becoming more vulnerable to defensive assets taking full benefit of concealment techniques and dispersion. These very systems are all the more dangerous due to their low costs: when protecting the surroundings of a territory, very long range weapons are not indispensable, and cheaper capabilities with a shorter range can be acquired in higher numbers. 11 The unbalance between offense and defense shows clearly through force projection operations: Western armies suffer from their position of attackers, while their adversaries take advantage of their defensive postures. Such difficulties, inherent to these kinds of operations, exemplify the loss-of-strength gradient, according to which a states military power declines as its forces move away from the national territory. 12 The sheer volume of vehicles, systems, and equipment to be deployed, along with ammunition needs, constitute an increasing logistical burden. One major political and strategic datum adds to the weaknesses of the offensive at the operational level: what is at stake in a conflict is more likely to be given greater importance by the defender, who is by definition local, than by the distant attacker. As its interests are greater, the defender can sustain a more intense and enduring effort, while at the same time tolerating heavier human and financial costs than its adversary. 13 It should be noted that armies do not adopt defensive postures to protect only a states vital interests, and have not always managed to benefit from such a moral advantage. Nonetheless, the asymmetry of stakes in a conflict tends to favor the defender, especially in the case of force projection operations because they take place very close to its territory, if not within it. Force projection, in that it consists in sending combat units into distant theaters so as to influence an adversarys policy or subdue it, is an inherently vulnerable and difficult posture. Despite its weaknesses, force
Every attack loses impetus as it progresses, Carl von Clausewitz, On War, Princeton, Princeton University Press, 1976, p. 71. See also pp. 363-366, 527, 566-573. For Maos writings, see for example Mao Tse-Toung, Ecrits militaires de Mao Tse-Toung, Pkin, Editions en langues trangres, 1964, pp. 115-116 and 265-269. 11 Posen, Command of the Commons, op. cit., pp. 22-24. 12 Kenneth Boulding, Conflict and Defense: A General Theory, New York, Harper & Brothers, 1962, pp. 78-79. 13 Clausewitz, On War, op. cit., pp. 90-99.
10
- 13 -
projection has always been closely linked to great power status and remains today one of the means by which great powers protect their strategic interests overseas and, more generally, help to maintain a certain form of international order.
century: Greater competition between European powers in oceanic trade, maritime control and colonial acquisition outweighed any transoceanic struggle with non-European powers []. A shift in military capability heralded the decline of some non-European forces and the start of a new European-dominated power balance, remaining in part to the 16 present day.
Supported by the technological and organizational progress driving the military revolution, in particular by the increase in lethality resulting from the improvement of firearms of all calibers, great powers were able to conquer new continents with almost complete impunity with consequences still perceptible today. Force projection has come back to the forefront of Western powers strategic concerns since the end of the Cold War. Along with this tendency, the structures, doctrines and equipment of European and American armed forces have evolved, driving some of them to transition from conscription to professional armies. Although European and American armed forces now both consider force projection a key mission, the reasons why they do so, their capabilities and their field experience in this domain, clearly differ. Europes transition toward armies that gave greater prominence to overseas interventions is above all a consequence of the reorientation that followed the disappearance of the Soviet threat. While Europes territory
Williamson Murray, Operational Issues of Sea Basing In the Twenty First Century, in Defense Science Board Task Force on Sea Basing, Washington, U.S. Department of Defense, 2003, pp. 138-140. 15 Geoffrey Parker, The Military Revolution: Military innovation and the rise of the West, 1500-1800, Cambridge, Cambridge University Press, 1996, p. 103 and following. 16 Jeremy Black, War and the World: Military Power and the Fate of Continents, 1450-2000, New Haven, Yale University Press, 2000, p. 60.
14
- 14 -
and vital interests no longer seemed to be at risk, the Persian Gulf War served as a reminder of the existence of security interests in distant theaters. Hence, Operation Desert Storm illustrated the persistence of regional threats, but also revealed to all coalition members the costs and difficulties associated with force projection operations. European armies are, however, far from equal in this regard: France and the UK gave foreign interventions a specific importance even before the end of the Cold War. The 1990s only enshrined this position by decreasing the relative importance of border defense missions and putting the stress on the armed forces qualitative developments required for foreign interventions. 17 Unlike many of its allies, the United States has always been an expeditionary military power and will remain one so long as it chooses not to revert to an isolationist posture. The insular position the US enjoys and the absence of territorial threats on the American continent have always offered Washington the privilege to opt either for isolation or for involvement in global affairs a freedom simply inaccessible to most states. The US major and continuous involvement in foreign affairs started when it entered the war in 1941 and has lasted up to the present day. 18 As a consequence, the US has early on needed the ability to reach other continents, especially Eurasia. Although America has, since then, maintained an expeditionary posture, the constraints inherent to this orientation and under which it has had to operate have evolved since the time of East-West confrontation. 19 During the Cold War, US armed forces benefited from a constant and massive physical presence on their European and Asian allies territories aimed at countering a clearly identified threat from the East. The current period is characterized by a diminution of military deployments and, above all, a shifting of threat toward other regions, especially the arc of crisis extending from Maghreb to Central Asia. 20
- 15 -
So, anti-access capabilities emerged in the 1990s as a mainly American concern, sometimes supported by analyses underlining the necessity of certain armament programs above others. 21 Still, several factors compel us to go beyond the superficial idea that the anti-access threat could be no more than a fantasy of the American military-industrial complex: the vulnerabilities of force projection postures observed on many occasions throughout the past two decades of interventions, along with the diffusion of certain technologies, require taking into account the diversity and complexity of the anti-access threat. The course of the Gulf War and the passivity of the Iraqi adversary contributed to the birth of a predominantly American debate on the methods of force projection and the growing constraints facing this type of operation. Thus, the crossing influences of changing threats and new opportunities were to bring about the evolution of the force projection function. In terms of threats, a retrospective analysis of the coalitions achievements in the Gulf reminded Western armies of or even revealed the vulnerabilities of their posture and practices, and of the operational choices that a less inactive, more imaginative, or luckier adversary could have made. As adversaries drew lessons from Saddam Husseins fate, it seemed unlikely that Western armies would ever again be as fortunate as they retrospectively seem to have been on that occasion. 22 The future looked dark for force projection as it faced potential adversaries such as Iraq (before 2003), North Korea, Iran and the Peoples Republic of China. More broadly, this type of operation could be a disadvantage for any state having a correct knowledge of its own plans strengths and weaknesses, as well as those of Western military practices, which were unveiled so many times in the past years, provided they possessed relevant weaponry (SAM, anti-ship and ballistic missiles, naval mines, etc.). Parallel to these growing vulnerabilities, more and more military analysts sometimes the same who underlined the weaknesses of force projection identified, in the course of operations, evidence that Western powers military advantage could be maintained thanks to technological progress. They could thus continue to intervene in distant theaters with impunity. Indeed, the achievements of F-117 stealth bombers that contributed to neutralizing Iraqi air defenses during the night from 16th to 17th of January 1991, along with AWACS, JSTARS, Tomahawk missiles and electronic warfare aircraft, gave a glimpse of what was then coined a
The experts of the analysis center of Northrop Grumman, an American company in charge of the construction of the B-2 bomber, were very active in this debate: http://www.northropgrumman.com/analysis-center/. 22 Among the most glaring illustrations of the coalitions good fortune, there is the example the Iraqi Al-Hussein missile (an extended-range SCUD-B) that sunk only a few hundred meters from the coalitions ships and ammunition stored in the open air on a pier of Al Jubayl port. See Adam B. Siegel, Missile Defense at the Waterfront: Implications of the SCUD Missile Attack on Al Jubayl Port, 15-16 February 1991, Defense & Security Analysis, Vol. 19, No. 1, 2003, pp. 15-33. For examples of this type of analyses of the Gulf War, see Thomas G. Mahnken, Americas Next War, The Washington Quarterly, summer 1993, pp. 171-184.
21
- 16 -
Revolution in Military Affairs (RMA). 23 Based on information technologies, the RMA was supposed to offer a clear advantage to those armed forces that took the full benefit from them. The arrival of Donald Rumsfeld as head of the Pentagon turned the issue of access into a high potential threat, as illustrated in the Quadrennial Defense Review (QDR) of 2001. 24 The anti-access threat is, by definition, a fundamentally naval and aerial topic. Its occurrence in the QDR notably illustrates how influential the US Navy and Air Force had been in proving their usefulness to the political power and justifying the budget necessary to the development and procurement of transformational capabilities. Transformation and anti-access then strongly influenced American capacity choices during the first mandate of the Bush administration. Although the wars in Afghanistan and Iraq somewhat put this issue on the back burner, the anti-access threat continues to affect the way the American defense apparatus prepares for the future. Its recent reappearance in strategic debates illustrates inter-services rivalries when it comes to funding priorities. In that context, this topic has again become the intellectual and thus budgetary war-horse of the Navy and Air Force, against the COINdominated defense and political decision-making circles. When Western strategic postures are considered, anti-access appears as an important challenge which cannot be seen as the sole product of a US inter-services bureaucratic rivalry. However, taking into account this very specific organizational factor sheds light on an essential characteristic of the debate on the anti-access threat: why it focused on the military dimension of the problem.
On the first hours of Operation Desert Storm, see Williamson Murray et al., Gulf War Air Power Survey: Volume 2, Part. I: Operations, Washington, U.S. Government Printing Office, 1993, pp. 120-124. 24 Some analyses differentiate anti-access from area denial: If [anti-access] strategies aim to prevent US forces entry into a theater of operations, then [areadenial] operations aim to prevent their freedom of action in the more narrow confines of the area under an enemys direct control i.e. its own territory. We shall not use this distinction in the present article where the whole of the capabilities concerned are gathered around the generic term anti-access. Andrew Krepinevich, Barry Watts et Robert Work, Meeting the Anti-Access and Area-Denial Challenge, Washington, Center for Strategic and Budgetary Assessments, 2003, p. 5.
23
- 17 -
efense experts analyses present the anti-access threat primarily as a consequence of the diffusion of advanced technologies. Diffusion benefits many actors allies, neutral states, as well as potential adversaries of Western countries. It goes without saying that anti-access capabilities vary greatly depending on the states concerned: they range from rudimentary capabilities, unable to cause harm unless used against unprotected facilities or units, to conventional ballistic missiles with terminal guidance, like those currently being developed by the Chinese Peoples Liberation Army. In order to provide a concrete illustration of this tendency by looking at a particular case, this study will analyze recent developments in Iranian defense posture, especially in regards to its capacity to block the Strait of Hormuz and to strike neighboring countries in the Persian Gulf. Iran is currently trying to assert its power on the regional scale, in areas located near present and future Western interests. Therefore it probably is the most serious case of anti-access threat that the European and French armies could someday confront.
On most occasions, Western defense communities saw war from a distance typified by the aerial phase of Desert Storm as a revelation of the decisive advantage that a modern informational army could mobilize against an industrial adversary. 25 Precision-guided munitions (PGMs),
Alvin and Heidi Toffler, War and Antiwar. Survival at the Dawn of the 21st Century, New York, Little, Brown and Co., 1993.
25
employed in limited numbers in 1991, progressively came to make up an ever-bigger share of the projectiles employed in air campaigns. 26 However, although they still hold a clear advantage in this domain, Western forces are not the only beneficiaries of the progress made in terms of precision of strikes, in particular in regards to land-attack (LACMs) or anti-ship cruise missiles (ASCMs). The slowness of the fleets renders them particularly vulnerable to ASCM strikes, as was proved by the cases of the Israeli destroyer Eilat sunk by Egyptian Styx missiles in 1967, the Sheffield sunk by an Argentinean Exocet in 1982 or the Israeli corvette Hanit hit by a C-802 ASCM fired by Hezbollah during the war of summer 2006. The number of states possessing anti-ship or LACMs of any ranges does not seem to have increased exponentially between 1992 and 2006. 27 Nonetheless, this number remains significant and is increasing, which seems all the more worrying considering the substantial improvement of these means of delivery (range, precision, speed, and even stealthiness) as well as the growing share of force projection missions for Western armed forces. Furthermore, the relative stability of the number of states possessing cruise missiles of any kind should not overshadow the fact that new states such as China, Taiwan, South Korea and India started LACM programs in the 1990s. 28 Certain potential theaters of intervention, like the Persian Gulf (for Europe and the US) or the China and Japan Seas (for the US) face an intensification of the threat posed by potential adversaries such as Iran, North Korea or the PRC, who acquire increasingly varied means of delivery. The diffusion of strike capabilities provides its beneficiaries with the opportunity to aim for effects superior by far to the relatively limited damage that Iraq inflicted upon the coalition by this means in 2003. On the one hand, the extended range of missiles means that one can threaten targets that were, until then, out of reach. On the other hand, the enhanced precision of weapons now makes it possible to hit with the desired physical effect facilities such as command and communication centers, radars,
PGMs accounted for 9% of projectiles fired during Desert Storm, 29% during Allied Force, 60% during Enduing Freedom and 68% during Iraqi Freedom. See Benjamin Lambeth, Air Power Against Terror. America's Conduct of Operation Enduring Freedom, Santa Monica, RAND Corporation, 2006, p. 252; T. Michael Moseley, Operation Iraqi Freedom - By the Numbers, USCENTAF, 30 April 2003, p. 11. 27 Seth Carus listed around 60 states possessing cruise missiles in 1992 and David Tanks 81 in 2000, a figure that was used in 2008 by the Congressional Research Service. W. Seth Carus, Cruise Missile Proliferation in the 1990s, Westport, Praeger, 1992, pp. 126-140; Paul Kerr, Nuclear, Biological and Chemical Weapons and Missiles: Status and Trends, Congressional Research Service, RL30699, February 2008, p. 19; David Tanks, Assessing the Cruise Missile Puzzle: How Great a Defense Challenge?, Washington, Institute for Foreign Policy Analysis, 2000, p. 3. 28 Dennis M. Gormley, Missile Contagion. Cruise Missile Proliferation and the Threat to International Security, Westport, Praeger Security International, 2009, p. 196.
26
- 20 -
points of debarkation or ammunition dumps. The increasing precision of certain ballistic missiles and, above all, the deployment of supersonic cruise missiles, also render the fleets more vulnerable. 29 The defense capabilities of fleets and land facilities against ballistic and, to a lesser extent, cruise missiles may be growing steadily, as was proved by the 2003 Iraq War, but the capacity to inflict saturation strikes, the diversity of the threat and the combination of cruise and ballistic means of delivery render the task of interception infinitely more complex and expensive. 30
Hampering the Fleets Freedom of Action
Cruise and ballistic missiles are not the only means a state can employ in an attempt at regional blackmailing, or when defending the naval surroundings of a theater of operations: submarines, naval mines or fast patrol boats can slow, disrupt, or even impede force projection operations from the sea. States like China can even adopt a posture of layered indepth naval defense. The fact that they remain submerged for very long periods gives nuclear attack- and ballistic missile submarines formidable stealthiness. However, for now they remain the privilege of a very small number of countries. The same does not hold true for diesel submarines such as the Kilo-class ships built in Russia which have been sold to the PRC, Iran, India and Algeria. 31 In addition, the armament of these conventionally powered submarines has substantially improved in the past years: more and more often, they carry ASCMs whose range can reach 250 kilometers (SS-N-27 Clubs equipping certain Kilo-class ships). The development of submarine-launched strike capabilities is coupled with perceptible progress in terms of quietness: in this field, the characteristics of the Kilo-class submarines are nothing new but confirm an existing trend, also illustrated by the improvement of Chinese Song-class submarines. One of them recently managed to surface in the midst of an American carrier battle group without having been noticed beforehand. 32
Theodore Gaillard, Cruise Missile Sector Facing Supersonic Challenge, SpaceWar, 11 October 2007, available at: http://www.spacewar.com/reports/Cruise _Missile_Sector_Facing_Supersonic_Challenge_999.html. 30 Ballistic and cruise missiles are liable to be the long-range weapons of choice, given their capabilities to threaten land and sea targets from afar. The accuracy and lethality of such systems will increase significantly between now and 2025, even for the delivery of conventional ordnance. The competition between missile developments and defensive systems will be a key operational challenge over the next several decades. Large-scale missile attacks will be able to overwhelm defensive systems, despite considerable improvements to them. American bases abroad will become vulnerable to these weapons, The United States Commission on National Security/21st Century, New World Coming: American Security in the st th 21 Century Supporting Research and Analysis, 15 September 1999, p. 52. 31 James Clay Moltz, Global Submarine Proliferation: Emerging Trends and Problems, Nuclear Threat Initiative, March 2006, available at: http://www.nti.org/e_research/e3_74.html. 32 On this incident, see for instance Bill Gertz, China sub stalked U.S. fleet, The th Washington Times, 13 November 2006, available at: http://www.washingtontimes. com/news/2006/nov/13/20061113-121539-3317r/.
29
- 21 -
These evolutions are all the more worrying because in littoral combats the properties of the environment (surrounding noises, water temperature and salinity, etc.) make it even harder to carry out littoral anti-submarine warfare (ASW) missions. 33 Besides, maintaining the know-how related to these missions has tended to become a lesser priority for Western fleets since the end of the Cold War. 34 In addition, submarines also strengthen another disrupting factor for force projection operations: mining. Naval mines have several advantages for those belligerents who pursue anti-access strategies: the most basic versions are cheap, and there is a great variety of models (moored or drifting) and triggering systems (contact or influence mines magnetic, acoustic, etc.). 35 Existing procedures and equipment for mine warfare are constantly improved, but as of today there is no quick way to clear minefields. 36 Minefields combining several types of devices in a single zone among which certain complex models possess several types of detonators compel mine clearance units to be prudent and in turn slow the pace of the operations. Another element can further increase the time and cost of such operations: because the defender has a good knowledge of the seabed, it can maximize the mines effects or the difficulty of minesweeping. Coastal defense units (ships, submarines, ASCMs, aircraft, artillery, etc.) can also protect the minefield and disrupt minesweeping operations. 37 This whole posture can take the shape of a defense in successive and complementary layers, in which the efficiency of each element is reinforced by the others.
Increasingly Sophisticated Surface-to-Air Threats
One last factor must be added that further complicates naval projection operations: enemy air defenses. Western armed forces have gotten used to enjoying air superiority above theaters of operations and taking full advantage of this asset by constantly observing the battlefield and the adversarys defense posture. They could also take benefit of air superiority to use airspace freely for tactical or strategic mobility or, of course, in order
On improvements in submarines stealth, see Office of Naval Intelligence, The Peoples Liberation Army Navy: A Modern Navy with Chinese Characteristics, August 2009, pp. 20-23. 33 Till, Seapower, op. cit., p. 239. 34 On the United States see, for instance, Owen R. Cote and Harvey Sapolsky, Antisubmarine Warfare After the Cold War, MIT Security Studies Conference Series, June 1997, available at: http://web.mit.edu/ssp/Publications/confseries/AS W/ASW_Report.html; Keith W. Edmunds, ASW Current and Future Trends, Defense & Security Analysis, Vol. 16, No.1, April 2000, pp. 73-87; see also Martin th Sieff, ASW Dangers Part I, UPI.com, 12 June 2008, available at: http://www.upi.com/Business_News/Security-Industry/2008/06/12/Defense-FocusASW-dangers-Part-1/UPI-74581213308031/. 35 According to Hoyt, the price of some basic mines is approximately $1,000. Timothy Hoyt, The Next Strategic Threat: Advanced Conventional Weapons Proliferation, in Henry Sokolski and James M. Ludes (eds.), Twenty-First Century Weapons Proliferation: Are We Ready?, London, Routledge, 2001, p. 40. 36 James Dunnigan, How to Make War? A Comprehensive Guide to Modern Warfare in the Twenty-first Century, New York, Harper, 2003, pp. 229-236. 37 Till, Seapower, op. cit., p. 239.
- 22 -
to strike the adversary quickly and with increased precision. Today, opposing forces remain unable to contest Western air superiority. However, they do attempt to procure assets that would enable them to exploit the third dimension for offensive purposes using cruise or ballistic missiles, or unmanned air vehicles (UAVs) and also for defensive purposes, by building integrated and multi-layered air defense systems. Indeed, after the Gulf War, American intelligence services observed a growing demand in SAM systems capable of intercepting stealth aircraft or cruise missiles. 38 Whereas the coalition had achieved impressive successes against Iraqi defenses during Operation Desert Storm, NATO discovered eight years later that neutralizing Serb SA-3/SA-6 systems missile batteries and radars was extremely difficult if these were employed using so-called noncooperative tactics, and concealed by terrain and vegetation. 39 This incapacity of NATOs air forces did weigh on the conduct of the operations as it dissuaded their aircraft to fly below 15,000 feet, thus reducing their tactical effectiveness and increasing the risk of collateral damage. 40 But this significant capacity to cause harm especially because the first versions of some of these SAM systems were deployed in the 1960s was nothing compared to the threat posed by the most recent models of long-range SAMs exported by Russia, in particular S-300 variants. Modern systems have progressed in terms of the number of targets that the radars can follow and engage simultaneously and also in terms of the interception range and the nature of the targets that can be intercepted among them cruise missiles, anti-radiation missiles, or even apparently stealth aircraft. 41 Today, a dozen European and Asian states, among them China and India, own variants of the S-300, and many other countries possess systems that are as recent but with a shorter range. Syria and Iran repeatedly displayed their willingness to buy S-300s, but no acquisition was ever confirmed, and contradictory information is regularly issued about the Iranian attempts. 42
Patrick J. Garrity, Why the Gulf War Still Matters: Foreign Perspectives on the War and the Future of International Security, Los Alamos National Laboratory Center for National Security Studies, July 1993, p. 76. 39 This surprising phrase are tactics ever cooperative? refers to certain practices consisting in using search radars so as to provoke the launch of an antiradiation missile that would be unable to reach its target. Operators turn the radar on so as to be targeted by the coalitions HARM missiles and turn it off as soon as the missile is launched. Once it lost its signal, the missile could no longer maintain its trajectory and went astray. 40 Posen, Command of the Commons, op. cit., pp. 24-30. 41 See Operations in Kosovo: Problems Encountered, Lessons Learned and Reconstitution, Hearing before the Military Readiness Subcommittee of the Committee on Armed Services, House of Representatives, 26 October 1999, pp. 4 2-43, available at: http://www.fas.org/man/congress/1999/has299030_0.htm; Owen R. Cote, Jr., Assuring Access and Projecting Power: The Navy in the New Security Environment, MIT Security Studies Conference Series, April 2002, Chapter 3, available at: http://web.mit.edu/ssp/Publications/navy_report/demands.p df. 42 Christopher Bolkcom, Military Suppression of Enemy Air Defenses (SEAD): Assessing Future Needs, Congressional Research Service, RS21141, 5 June 2006, p. 2; S-300P (SA-10 Grumble), Missile Threat, available at: http://www.missilethreat.com/missiledefensesystems/id.50/system_detail.asp.
38
- 23 -
Unconventional Options
One final conceivable option for anti-access strategies is to resort to antisatellite (ASAT) weapons, WMDs, and offensive cyber warfare. To complicate or even deter force projection operations, ASAT and cybernetic weapons could be used to target contemporary armies information systems and flows extending the anti-access threat to the immaterial domain. Because modern armies rely increasingly on their C4ISR systems (for positioning, observation, target acquisition, data transfer, strike precision, etc.), unconventional assets tend to become the options of choice for states willing to oppose Western projection forces. However, acquiring an ASAT capacity requires mature ballistic capabilities and advanced guidance systems. As a result, for now, only the most militarily advanced potential adversaries can access these systems, such as China, Russia, or potentially adversaries supported by these two countries. 43 In the field of WMDs, psychological, disrupting or destructive effects could be sought by using chemical, biological, radiological or even nuclear weapons (depending on the political and military contexts considered). The number of courses of action available is, in theory, infinite; but the most destructive options, such as nuclear strikes, could not be opted for without incurring the risk of a devastating retaliation from interventionist powers, of which the main three (United States, United Kingdom, France) possess modern nuclear weapons and means of delivery. Nonetheless, should the threat be indirect and targeted against a host-state protected by an extended deterrence posture, the situation would be more complex and delicate. This raises the question of which options are available to interventionist powers when it comes to limiting wars and avoiding escalation against an enemy proliferator. 44 Conversely, with the revival of the nuclear industry throughout the world, the related risks of radioactive material being stolen, and the relative availability of chemical and biological agents, we can imagine various scenarios of resorting to WMDs that would remain under the Western deterrence threshold. 45 For instance, one could think of strikes or, above all, terrorist attacks, involving radioactive materials or persistent but not highly lethal chemical or biological agents that could contaminate
Armies and societies reliance on satellites contributes to encourage the development of boost- and ascent-phase missile defenses and offers possibilities to fight against ASAT. 44 For an analysis looking at this type of hypotheses, see for example Barry R. Posen, U.S. Security Policy in a Nuclear-Armed World, or What If Iraq Had Had Nuclear Weapons?, in Victor A. Utgoff (ed.), The Coming Crisis: Nuclear Proliferation, U.S. Interests, and World Order, Cambridge, MIT Press, 2000, pp. 157-190. 45 Michael Moodie, Dangerous Weapons in Dangerous Hands: Responding to the Challenges of Chemical and Biological Terrorism, Proliferation Papers, No. 28, Summer 2009, available at: http://www.ifri.org/downloads/PP28_Moodie_Summer2 009.pdf.
43
- 24 -
potentially large areas (APOD and SEAPOD in particular) and durably paralyze a significant part of the operation. 46 Far from favoring only Western and interventionist powers, technological progress also benefits potential or actual regional powers against which military interventions could have to be planned in the future. Iran holds, in this regard, a particular place, as it currently tries to assert itself as a regional power and attempts to build up military forces matching this status. The combination of its ambitions, capabilities and geographical location close to current and future Western allies and interests make Iran a particularly interesting case study of anti-access strategies for France and Europe.
46
Cliff et al., Entering the Dragons Lair, op. cit., p. 8; for a detailed study of the threat posed by chemical and biological agents to the US Air Force, see Brian G. Chow et al., Air Force Operations in a Chemical and Biological Environment, Santa Monica, RAND Corporation, DB189-1, 1998, pp. 10-54. It is worth noting that, in a scenario where a logistical node would get paralyzed, the importance of other nodes would be increased. As a result, the whole system would be weaker and the incentive to disorganize or neutralize logistical nodes would be greater. Each bottleneck would thus create a new vulnerability. 47 Garrity, Why the Gulf War Still Matters, op. cit., p. 99.
- 25 -
well as on the assumed casualty aversion of Western forces. 48 This naval strategy forms part of a general posture aimed at providing the country with the capacity to absorb the first adversary conventional strike. Indeed, this capacity appeared as a top priority following the Gulf War, and can only remain one so long as an attack scenario against Iranian nuclear facilities cannot easily be ruled out. When applied to Tehrans naval capabilities, resilience should be made possible by dispersing assets; avoiding direct confrontation with the adversarys fleet; reinforcing coastal defenses; and exploiting opportunities offered by littoral zones to conceal them. 49 In order to prevent its defenses from being neutralized too quickly, Iran also seems to have engaged in the decentralization of its command structure, so that each element can keep fighting despite coordination and command centers having been neutralized by adversary air strikes. 50 Mine warfare is also developing in the country. In 2010, the Iranian naval forces supposedly possessed three to four thousand naval mines of different kinds, ranging from moored contact mines to drifting influence mines. 51 Naval mines can be laid by specialized ships, civil ships and boats, midget submarines and Kilo-class submarines, which Iran bought from Russia at the beginning of the 1990s. 52 These submarines, famous for being among the quietest diesel vessels in the world and able to carry 24 mines in place of their torpedoes, could easily constitute a minefield unnoticed. 53 According to a recent estimate, Iranian naval forces could, without much trouble, manage to lay a minefield of 700 units in the Strait of Hormuz before their mining assets were neutralized. 54 In view of the slowness of recent mine clearance operations, as well as the possibility that Iranian mines could mix several types of triggers, the minesweeping operation that should allow the clearing of a relatively secure corridor along the strait would take some time. 55 This is all the more likely as the minefield would probably be protected by harassing anti-ship missiles and commandos.
Office of Naval Intelligence, Irans Naval Forces: From Guerilla Warfare to a Modern Naval Strategy, Autumn 2009, p. 11. 49 Office of Naval Intelligence, Irans Naval Forces, op. cit., p. 9, pp. 21-22; Steven R. Ward, Immortal: A Military History of Iran and its Armed Forces, Washington, Georgetown University Press, 2009, pp. 314-316. 50 Office of Naval Intelligence, Irans Naval Forces, op. cit., pp. 7-9. 51 Frank Hoffman, The Maritime Commons In a Neo-Mahanian Era, in Denmark et al., Contested Commons, op. cit., p. 59. A recent Pentagon memo estimated the number of Irans naval mines at 3,500: Unclassified Report on the Military Power of Iran, April 2010, p. 5, available at: http://www.fas.org/man/eprint/dod_iran_2010. pdf. 52 Fariborz Haghshenass, Irans Asymmetric Naval Warfare, Washington Institute for Near-East Policy, Policy Focus, No. 87, September 2008, pp. 13 and 16. 53 Anthony Cordesman and Martin Kleiber, Irans Military Forces and Warfighting Capabilities: The Threat in The Northern Gulf, Westport, Praeger Security International, 2007, p. 114; Hoyt, The Next Strategic Threat, op. cit., pp. 39-40; Office of Naval Intelligence, Irans Naval Forces, op. cit., p. 16; Caitlin Talmadge, Closing Time. Assessing the Iranian Threat to the Strait of Hormuz, International Security, Vol. 33, No. 1, Summer 2008, p. 89. 54 Talmadge, Closing Time, op. cit., p. 93. 55 Caitlin Talmadge considers that such operations would take approximately one month. Ibid., p. 97.
48
- 26 -
56
The Iranian Revolutionary Guards Corps Navy (IRGCN), in particular, adopted this indirect style based on naval guerilla. The Iranian fleet is split between the IRGCN and the Islamic Republic of Iran Navy (IRIN), the former being responsible for the Persian Gulf and the Strait of Hormuz, and the latter being in charge of the Gulf of Oman. 57 Iran seems to be preparing itself for a naval asymmetric war with the help of fast patrol boats equipped with torpedoes or anti-ship missiles, and aimed to harass civil or military traffic near the Strait of Hormuz. 58 Harassment can also be undertaken from the islands of Abu Musa and the Greater Tunb, where Iran recently reinforced its military installations. The islands are respectively located on the southern flank of the channels used by supertankers, and between those two channels (see map 1). 59
Credit: University of Texas Libraries: http://www.lib.utexas.edu/maps/middle_east_and_asia/hormuz_80.jpg. 57 Office of Naval Intelligence, Irans Naval Forces, op. cit., p. 11. 58 Ibid., pp. 13-14; Ward, Immortal, op. cit., pp. 314-6. 59 David Hartwell and Allison Puccioni, Island Fortresses: Abu Musa and the Greater Tunb, Janes Intelligence Review, Vol. 21, No. 9, 14 August 2009, pp. 3335.
56
- 27 -
To back up these tactics, anti-ship missiles can be launched from the batteries positioned on the northern bank of the strait. As of today, there must be around thirty ASCM batteries capable of striking across the whole breadth of the strait, deployed over a part of Iranian territory equivalent to three times the size of Kosovo. 60 The missiles likely to be used for such attacks are increasingly sophisticated and make interception ever more difficult. Indeed, HY-2/C-201 Silkworm missiles are progressively replaced by more recent systems of Chinese conception C-801s and C-802s which, although they cruise at subsonic speeds, are characterized by shorter delays of employment, extended range, enhanced precision, and lower flight paths, making interception more difficult. 61 Consistently with its need for cover and concealment, Iran seems to favor small and mobile launch platforms. Allegedly, it has also planned to deploy fake ASCM fire units along the shore. 62 Iran also seems to have managed to acquire a small number (a dozen at most) of KH-55s Russian missiles illegally sold by Ukraine in the early 2000s. With its 2,500-kilometer range, this cruise missile could potentially be a major qualitative leap for Iran, compared to the systems currently deployed in its arsenal. However, the missile is unlikely to have been integrated into Iranian units, but might rather be analyzed for the purpose of reverse engineering. 63 Finally, Iran could, within a few years, possess Kilo-class submarines capable of launching ASCMs with a 200-kilometer range: the first of its three vessels is currently being modernized to that aim. 64 An Iranian strategy aimed at impeding access to the Persian Gulf or increasing sharply its cost should then logically be supported by defenses against its adversaries air superiority (especially the US and Israel). As of today, Iranian capabilities in this field still appear to be relatively weak; it can defend specific points, or maybe zones, against air strikes but lacks a complete cover of its territory. 65 Iran is supposed to possess a great diversity of surface-to-air assets to defend against Western forces air strikes, but they remain overall rather inefficient. The only long-range SAMs deployed in Iran are SA-2s and SA-5s, both old and fixed systems of limited potential. These systems currently seem to concentrate around Tehran, seaports and nuclear facilities. 66 Besides, Iran also possesses a great number of short- and medium-range SAM systems of Western origin (such as Hawks procured under the Shah) or built by the Soviet Union or Russia,
60 61
Talmadge, Closing Time, op. cit., p. 104. Office of Naval Intelligence, Irans Naval Forces, op. cit., p. 17. 62 Talmadge, Closing Time, op. cit., p. 101; Ward, Immortal, op. cit., p. 315. 63 Cordesman and Kleiber, Irans Military Forces and Warfighting Capabilities, op. cit., pp. 154-155; Gormley, Missile Contagion, op. cit., p. 100. 64 Modernization should enable Kilo submarines to launch YJ-1 or Novator Alfa ASCMs. However, it seems that Iran is experiencing difficulties to pursue this, as it is reluctant to send its submarines to Russia. Cordesman and Kleiber, Irans Military Forces and Warfighting Capabilities, op. cit., p. 114; Office of Naval Intelligence, Irans Naval Forces, op. cit., p. 18; Submarine Proliferation. Iran Import Behavior, Nuclear Threat Initiative, available at: http://www.nti.org/db/subma rines/Iran/import.html. 65 Cf. Unclassified Report on the Military Power of Iran, op. cit., p. 6. 66 Cordesman and Kleiber, Irans Military Forces and Warfighting Capabilities, op. cit., p. 97.
- 28 -
but they do not currently appear to pose a real threat to modern aircraft supported by electronic warfare and Suppression of Enemy Air Defense (SEAD) assets. Iran is conscious of its weaknesses. As a result, it has, over the past years, favored a decentralized approach of its surface-to-air defense. Hence, Iran relies on a greater autonomy of command, on mobile assets (SA-15s and SA-22s), and takes advantage of the mountainous terrain. 67 This current situation could evolve depending on Irans future equipment. Numerous sources have underlined the existence of a Russo-Iranian agreement for the supply of S-300 SAMs (V/PMU2) whose capacities are far superior to the defenses Western armies have been facing until today. For now, the sale has been suspended, apparently due to pressures from the US and Israel, but the possibility that Iran will end up acquiring such capabilities in the long run either as a retaliatory measure from Russia, or through other channels such as Belarus cannot be ruled out. 68 Syria bought Russia around fifty SA-22 / Pantsir S-1, of which a dozen will probably be transferred to Iran. The latter already owns around thirty SA-15 / Tor-M1. Their short ranges (20 and 15 kilometers, respectively) do not make SA-22s and SA-15s highly threatening to modern air forces that can fire their missiles from a safe distance, beyond these ranges. However, their mobility and the modernity of their components may protect them from many anti-radiation capabilities, except for the most recent ones. 69 Lastly, Iran possesses a large spectrum of assets to strike APODs, SPODs and theater bases. Such attacks could be carried out as part of an interdiction strategy, were previous actions to fail to prevent enemy fleets from entering the Persian Gulf. Iran could use threats to blackmail a neighboring country and discourage it from allowing Western forces on its territory, or even try to alter its behavoir by a limited use of force. The sole existence of these anti-access and strike capabilities may suffice to favorably alter neighboring countries behaviors. 70 The Iranian ballistic arsenal comprises of means of varied ranges, from rockets firing at several dozen kilometers to Shahab-3 and Sejjil-2 medium-range ballistic missiles. The extension of the missiles reach and the transition to solid-fuel propellants (Sejjil-2), more stable and faster to prepare for launch than the liquid-propelled Shahab, typify the fact that Iranian ballistic mediums globally tend to improve. For now, according to available estimates of their precision, Iranian ballistic missiles do not appear as a credible threat for targets such as runways, which would be vital for the success of any operation against Iranian forces. 71 On the contrary, the greater surface of seaport facilities and, especially, assembly and storage areas, make them more exposed to such strikes. It should be noted that, to be politically
Iranian air defences, Jane's Intelligence Digest, March 2007. Ibid. 69 About the transfer of the Pantsir system, see Military Balance 2009, London, IISS, 2009, p. 275; Abdullah Toukan and Anthony H. Cordesman, GCC - Iran: Operational Analysis of Air, SAM and TBM Forces, Center for Strategic and International Studies, 20 August 2009, p. 57. 70 Ward, Immortal, op. cit., p. 316. 71 Toukan and Cordesman, GCC - Iran, op. cit., pp. 123-124.
68 67
- 29 -
effective, an attempt to convince the Gulf regimes not to allow a Western military presence on their territory would not necessarily need to be supported by a highly credible military threat. Theoretically, Iran could also try to disorganize the process of force projection on the ground by using proxies to disperse appropriate chemical and biological agents. As of today, however, we do not know with certainty what Irans capabilities in this field are. There is little doubt that Iran possesses the know-how and facilities necessary to run offensive chemical and biological programs, but there seems to be no tangible evidence that Iran did initiate such programs. 72 Moreover, even if successful limited strikes against facilities hosting Western forces could momentarily, or even continuously, hamper their action, the political consequences of such an attack could be devastating for Iran.
*****
The study of Irans capabilities that could potentially be used as part of an anti-access strategy illustrates the multidimensional character of the threats that Western projection forces could be confronted with. Nonetheless, analyzing the Iranian anti-access threat in the Persian Gulf should not be limited to the study of the assets developed and deployed by Tehran and which it may be putting forward as a deterrent. Beyond the diffusion of advanced technologies, which the Islamic republic of Iran typifies in a concrete way, one can assess the scope of the challenge posed to Western projection forces only by setting these capabilities in a strategic perspective. This requires first to take into account the capabilities that interventionist powers could mobilize in order to defeat anti-access strategies. Secondly, it appears necessary to understand the political and strategic context of these operations, as it would be fundamental in determining the belligerents respective capabilities. 73 This will be the focus of a future issue of the Focus stratgique series that will be published in Fall 2011, taking forward the analyses developed in the present article.
Cordesman and Kleiber, Irans Military Forces and Warfighting Capabilities, op. cit., pp. 157-168. 73 The bibliography gathering the references mentioned in this article appears in the issue No. 21 bis of the Focus stratgique series.
72
- 30 -
Should you be interested in other publications in this series, please visit our website: www.ifri.org/ The latest issues of Focus stratgique are: Etienne de Durand, Benot Michel and Elie Tenenbaum, La guerre des hlicoptres. Lavenir de laromobilit et de larocombat , Focus stratgique, n 32, juin 2011. http://www.ifri.org/downloads/fs32aeromobilite.pdf Vivien Pertusot, NATO Partnerships : Shaking Hands or Shaking the System? , Focus stratgique, n 31, mai 2011. http://www.ifri.org/downloads/fs31pertusotnatopartnerships.pdf Pierre Chareyron, Hoplites numriques. Le combat dinfanterie lge de linformation , Focus stratgique, n 30, avril 2011. http://www.ifri.org/downloads/fs30chareyron.pdf Etienne de Durand, Francs-Tireurs et Centurions. Les ambigits de lhritage contre-insurrectionnel franais , Focus stratgique, n 29, mars 2011. http://www.ifri.org/downloads/fs29dedurand.pdf Guillem Monsonis, La posture stratgique indienne face au dfi pakistanais , Focus stratgique, n 28, fvrier 2011. http://www.ifri.org/downloads/fs28monsonis.pdf Marc-Antoine Prouse de Montclos, Les camps de rfugis et la guerre. Du sanctuaire lenfermement humanitaire ? , Focus stratgique, n 27, janvier 2011. http://www.ifri.org/downloads/fs27pdm.pdf Amaury de Fligonde, Caveats to Civilian Aid Programs in Counterinsurgency: The French Experience in Afghanistan , Focus stratgique, n 24 bis, dcembre 2010. http://www.ifri.org/downloads/fs24bisdefeligonde.pdf