AFA Transcripts
 

Air Force FIFTY
TWO DAY INTERNATIONAL AIRPOWER SYMPOSIUM
April 23-24, 1997...Las Vegas, Nevada


Dr. William Perry

"Changing National Strategy"

The day that I turned 17, I borrowed my Dad's car and drove down to Pittsburgh to join the U.S. Army Air Corps. I was accepted in their pilot training program and was put on a waiting list for entering the air cadet program. As I drove home, I found myself humming that song so well known to all of you, but in those days it had a different ending: "We live in fame or go down in flame, nothing can stop the Army Air Corps." What a difference 50 years makes.

You've gone from the Army Air Corps to the U.S. Air Force. We've gone from B-29s to B-2s. From propeller fighters to F-101s to Stealth fighters. We have seen amazing changes in technology, especially aerospace technology and computer technology. And we have seen equally amazing changes in geopolitics, especially in national security.

Today I will talk about the truly dramatic changes in our national security these past 50 years and the role that technology played in dealing with those problems. And, I will look to the future, how the dramatic new developments in technology now underway will be used to deal with the challenging new problems we face in national security.

Try to take your mind back 50 years. Fifty years ago, I was in the Army of Occupation in Japan. I saw first hand the devastation that had been wrought by the Second World War. Both Europe and Asia then were trying to recover from that devastation with nearly all nations having a shattered economy and an infrastructure in shambles. At his critical time in history, the United States took an action unprecedented in history. It offered major assistance to other nations, in Europe and Asia, friends and foes alike, to rebuild their economy. Indeed, it was just 50 years ago this June that George Marshall made his famous speech at Harvard where he proposed what came to be known as the Marshall Plan. All the Western European nations, Germany and Italy included, gratefully accepted this plan and the miraculous economic recovery of Western Europe was underway. But Josef Stalin turned down the Marshall Plan, not only for the Soviet Union, but also for the Eastern and Central European countries under his control. And so began the Cold War with an Iron Curtain drawn between Eastern and Western Europe for more than 40 years.

The Cold War was one of the most dangerous periods in our history. The Soviet Union continued to maintain a large and powerful army. They coerced the nations of Eastern Europe into joining them in an alliance called the Warsaw Pact and they invested enormous resources to try to equal or succeed America's capability in nuclear weapons. This military policy was coupled with an aggressive foreign policy designed to expand their influence throughout Europe and throughout the world.

For the first few decades of this period, the strategy of the Soviet Union enjoyed some success, but at the expense of impoverishing their people and crippling their economy, thereby unwittingly planting the seeds for their eventual collapse. The United States on its part was determined that this Soviet expansionism would not be successful. So we adopted a policy that came to be known as containment. An important part of this policy was forming military alliances, most notably NATO. At the same time, we were determined that we would not cripple our own economy by maintaining a huge standing army. So we adopted a policy of deterrence by which we built up an enormously powerful nuclear arsenal which could devastate any nation which attacked us or our allies. During the height of the Cold War, the Air Force became famous through its motto in the Strategic Air Command: "You can sleep tight tonight, your Air Force is awake."

Well, the Air Force was awake and nuclear deterrence did work. But the Soviet Union also challenged our interests with proxy wars, which required a response with conventional military forces, where they had an overwhelming quantitative advantage. So we also adopted what came to be known as the offset strategy. That is, we decide to maintain a qualitative advantage in our conventional military forces to offset the Soviet advantage in numbers.

We had three main strategies during that period: containment, deterrence and the offset strategy. The key to the offset strategy was the application of American technological superiority to our weapon systems. Thus the partnership between American technologists and our military, which began during the Second World War, was carried on in the Cold War. Each of the military services and a newly created organization called ARPA, developed technical teams to work with industry and universities to apply American technical know-how to military weapons. This led to military sponsorship of all the most advanced and innovative programs then underway in aircraft and missile design, computers and space communications, semi-conductors and material sciences. Indeed, it is not an exaggeration to say, that American leadership in aerospace, computers, communications and semi-conductors in the 50s and the 60s stemmed in the first instance from military support of R&D in these fields.

The results were spectacular, both technically and militarily. During this period, we developed super computers, used in decryption and the design of nuclear weapons and in the simulation of advanced missiles and aircraft. We developed new generations of military aircraft, culminated by the F-117 and the B-2, which essentially rendered useless the extensive and expensive Soviet air defense system. We went from the V-2 to the Peacekeeper, from the buzz bomb to the air-launched cruise missile, systems which completely outclass their counterparts during the Second World War. We developed military satellites for global communications, reconnaissance, and navigation. We developed ARPANET, the predecessor to the Internet. We flew one of the first integrated circuits on the Minuteman missile. And, we embedded many computers into weapon systems to give them an operational flexibility and a precision previously unimaginable. The Soviet Union, inspite of an extensive and expensive effort was simply unable to compete and their military fell far beyond in technical capability.

So, these strategies, containment, deterrence and offset strategy were the components of a broad holding strategy during the Cold War. I call it a holding strategy because it did not change the geopolitical conditions which led to the Cold War, but it did deter another World War and it did stem Soviet expansion in the world until the internal contradictions in the Soviet system finally caused the Soviet Union to collapse. The holding strategy worked.

Today, as a result, we are facing an entirely different situation. The Soviet Union has collapsed. The Warsaw Pact has dissolved. Russia, and the other successor states in the Soviet Union, are trying to form economic governments with free market economies. Europe is no longer threatened by a Soviet blitzkrieg. The world is no longer threatened by nuclear holocaust. But it is still a dangerous world.

The peaceful transition to democratic with free market economies is difficult and accompanied by turmoil. As the Italian philosopher Gromsky once said, the old has died, but the new has not yet been born. In the meantime, a great variety of morbid symptoms appear.

These morbid symptoms in Eastern European nations cause problems for them and for their neighbors. But the morbid symptoms in Russia pose a potential danger for the whole world, because Russian turmoil coexists with more than 20,000 nuclear weapons. Moreover, rogue nations -- Iraq, Iran, Libya, North Korea -- are trying to get nuclear weapons which would great add to the danger they already pose to their neighbors with their large conventionally armed military forces.

We live in a new era with new and very different security problems from those we faced during the Cold War. During the Cold War, we dealt with our security problems with the containment strategy, deterrent strategy and an offset strategy. What are our strategies for dealing with these new problems? And how will these strategies affect the Air Force as we go into the 21st century?

Today, instead of containment of the Warsaw Pact and the Soviet Union, we seek engagement with the newly independent nations formally in the pact. An example of our engagement policy is the Partnership for Peace in which all 16 NATO nations work together with 27 Eastern and Central European nations to demonstrate how the military can support democratic institutions. Another example is the effort to bring about a peace in Bosnia, where NATO nations worked cooperatively with 16 Eastern European nations, including Russia.

Similarly, instead of practicing deterrence, we practice preventive defense. Preventive defense is like preventive medicine. It is those actions which create the conditions for peace thereby preventing the need for military conflict. An example of preventive defense is the cooperative threat reduction program of the Defense Department, wherein we have spent more than a billion dollars of Defense funds to assist the nuclear states of the former Soviet Union to dismantle their Cold War nuclear legacy. In the last four years, this program has led to the dismantlement of 4,000 nuclear weapons formerly aimed at targets in the United States. It has led to the destruction of 800 launcher and total elimination of nuclear weapons in three former nuclear states.

While we have changed our policy of containment and deterrence, we have remained constant in our policy of maintaining military technological superiority. During the Cold War, we maintained technological superiority as a way of offsetting the numerical superiority of the Soviet ground forces. Fortunately, we never had to put this strategy to a test. But the high-tech weapon systems we developed for that purpose were put to a test in Desert Storm. There, we were fighting against a foe equipped with Soviet weapons but in about equal numbers to the allied force. The U.S. forces were equipped with the new weapon systems that had been developed during the 70s: advanced sensors to locate every target on the battlefield, precision guided weapons to strike those targets, and stealth technology to evade enemy defenses. As a consequence, we won quickly, decisively and with remarkably few casualties. The lesson from this is that when our technological advantage is not needed to offset superior numbers, it can be used instead to achieve a battlefield dominance over a foe with equal numbers. Having seen the results of battlefield dominance in Desert Storm, we decided that we liked it and that we wanted to keep it.

So today, our military strategy calls for maintaining battlefield dominance over any regional power over whom we might conceivably be engaged in conflict and to do that through our leadership in technology. In a sense this is the same strategy of technological superiority we had during the Cold War, but now, for a different reason. Now it is no longer an offset strategy, but a strategy of battlefield dominance. Not only has the reason has changed. So also has the way of achieving this technological superiority change.

During the 50s, 60s and 70s, the Defense Department was the principle support of R&D for the computer, communications and semi-conductor industries. Some of the most significant advanced were developed first for military systems: supercomputers, geosynchronous satellites, internets and integrated circuits all were developed first for military programs and industrys R&D was largely supported by the Defense Department. In effect, our nations commercial industry was riding on the shoulders of the Defense Department.

Today, that has all changed. The technological explosion in computers, communications and semi-conductors has led to an amazing new set of products for industry, businesses, school and home. Indeed, all of these different users are being tied together today by the world wide web in a way few could have predicted a decade ago. Commercial applications of computers are leading military applications in all of these fields and for computer companies, commercial revenues dwarf defense revenues. So today, defense is riding on the shoulders of our commercial industry. This has required a profound change in the way the Defense Department does business with industry and the way it supports R&D.

First and most importantly, defense can no longer support a unique defense industry isolated from the commercial industry. During the 80s, the Defense Department spent many years and many billions of dollars developing a family of defense-unique computers. By the time the military development cycle was completed, these computers were obsolete and were incompatible with the standards that had evolved in the computer industry. This example made it clear that our nation should have a single industry which supplies defense and commercial needs alike. This requires defense to give up its unique specifications and conform to industry standards and to give up its unique buying practices and employ best commercial buying practices.

Transforming our acquisition process is the linchpin of our military dominance strategy. Indeed is it required if we are to maintain the dominance of our military forces into the next century. That is why acquisition reform was a primary goal of mine when I returned to the Pentagon four years ago. Victor Hugo once wrote, "More powerful than the tread of might armies is an idea whose time has come." Four years ago, I told our acquisition team that after decades of false starts, acquisition reform was an idea whose time had come and that we really were going to transform the ways we specified and bought goods and services and that they should either get on the team or get out of the way. Most of them enthusiastically got on the team and we are already seeing the results. For example, we have a pilot program in acquisition reform called JDAMS, the Joint Direct Attack Munitions System, which most of you are familiar with. Essentially, it turns dumb bombs into smart bombs by employing global positioning satellite inputs. Using the new acquisition system under this pilot program, which employs commercial standards, commercial components and buying processes, we have reduced the cost on that program not 5 percent or 10 percent, but 70 percent. And commercial buying will save us $3 billion on that one program alone.

A more recent example is the Joint Strike Fighter program. Here also the program manager will be able to use commercial buying processes and components and, as the name implies, this is a joint program with 80 to 90 percent commonality of parts in the different service programs. Most importantly, the requirements for the Joint Strike Fighter were traded off against performance by a process action team which used cost as an independent variable and the costs considered were not just acquisition costs, but life cycle costs. As a result of these reforms, we expect to save tens of billions of dollars in acquiring the JSF and an additional tens of billions of dollars in operating it. The Joint Strike Fighter will truly be the flagship program of acquisition reform.

But acquisition reform is about more than saving money. It gives the Defense Department better and faster access to the new generation of computers, microchips, communications and satellites. In the past, our procurement process has put up a barrier to defense contractors using commercial components. These barriers prevented timely access to the information technology which was developing at a breathtaking pace in the commercial marketplace. Acquisition reform is breaking down those barriers, speeding up our access to information technologies by several generations. The acquisition reforms I've described are well underway and are truly revolutionizing our buying process.

But transforming acquisition process means much more than simply overhauling the way the Defense Department buys its goods and services. It means a tectonic shift in the way the Pentagon relates to the commercial sector of the American industrial base. It means a tectonic shift in the way we adopt and adapt technology from the commercial sector to the military uses. And it means a tectonic shift in the way we get that technology into the hands of our troops.

Our major weapon systems take 10 to 15 years to develop and then are in the inventory 20 to 40 years. But the computer technology that most influences our competitive advantage changes every few years. So we need to evolve a systems strategy that keeps major weapon systems in the field for several decades, but updates them every few years with new information technology whenever real military advantage is realized from the introduction of this new technology.

We have underway in all of the services today experimental programs to do just that. I am going to give you one example from the Army because I've just returned recently from a visit to Fort Hood and Fort Irwin where I saw this experiment underway. Army calls their experiment Force XXI, the digital battlefield of the 21st century. I witnesses two of these experiments and both hold promise to dramatically improve the way we adopt and adapt modern technology to military uses. The concept behind the first experiment was simple, insert appliqués of digital subsystems into our current weapon systems, thereby giving them a quantum increase in capability. In aggregate, these appliqués form a system of systems, an integrated network of powerful computers and high speed communications, in effect, a local area network or an internet out on the battlefield.

This system of systems transformed the way a commander and troops see and communicate on the battlefield. In the past, information was passed around the battlefield by radio conversations and type-written messages and the result was that commanders got only a fraction of the information they could really use in combat. With a system of systems, commanders have the ability to send and receive digital bursts of critical information about the location of all enemy and friendly forces, about the rate of usage of food, fuel and ammo, about the progress of current operations and the planning of future operations.

The effect on combat operations will be no less than revolutionary. Every commander will have a battlefield awareness, a constant complete 3-D picture of the battlefield. Every warfighter will have the information needed to carry out a commanders orders. And the joint operation will move as one, integrated battle system.

How does this actually work in practice? When an F-15 pilot spots an enemy target, he will have a choice: He could engage that target with the weapons on his F-15 or he can call in nearby attack helicopters, artillery, other strike aircraft or naval gunfire. Because of digital technology and the constant flow of battlefield information to all commanders, this other units can see exactly what the F-15 pilot is seeing and any one of them or any combination of them will be able to respond with equal precision in destroying the targets. As the combat is underway, the supporting logistics unit will be monitoring the ammunition usage so it will be able to conduct resupply at the time and amount needed, thereby reducing the huge logistics tail need to support combat operations. This system of systems is a brilliant application of information technology to achieve battlefield dominance without designing all new weapons platforms. This is the military of the future and it is not just on vu-graphs. It works.

We are succeeding in incorporating new information technology into existing weapon systems, but we must also develop the military tactics to get the most out of technology in a combat environment and develop the training so our warfighters can maximize the use of that advanced technology.

The challenge ahead of us is to develop the three "Ts" of force dominance: technology, tactics and training concurrently instead of sequentially. Trying to achieve this led to the second experiment at Fort Hood. Until now, we have created these three "Ts" sequentially. It has created long period of acquisition, test and evaluation, fielding and tactics development and finally, after decades, training. But if we can fuse the sequential process into an integrated concurrent process, we could cut years off the time between developing new technology and getting into the hands of troops. The answered at Fort Hood was to create a process action team composed of experts who developed the three "Ts", the acquirers, the requirers, the users and the builders, all work together on the same project action team. Against all odds and contrary to all tradition, this team is meeting with success and as a result of this project action team approach, the new equipment, tactical doctrine and troop training levels are all approaching combat-ready standards at the same time and in a realistic environment.

Just two weeks ago, one brigade of this 4th Infantry Division at Fort Hood was sent to Fort Irwin to meet the opposing force. No holds are barred. It went in there just like a combat-ready unit. They are treating this not just as an experiment, but as preparing the unit to fight a real war if it ever had to. This puts us years ahead where we would be if we were following the traditional sequential development process and for iithe first time shows us a way to get our military development cycle in sync with the development cycles in industry.

I saw how advanced information technology can serve the troops during my last visit to Bosnia in December. As I toured one of our base camps, a young soldier showed me a computer terminal hooked up to a satellite dish outside. Using this system, the troops download high resolution digital imagery of the Bosnian countryside. The imagery is routinely collected over Bosnia by satellites, reconnaissance aircraft, by drones. It is then fused and analyzed at Jack Mollsworth and then sent to the computer terminal in Bosnia within hours after it is collected. This imagery helps our troops see immediately any movement of heavy weapons in violation of the peace agreement, any gatherings of troops or mobs that could harass them on patrol. This system is just one demonstration of how information technology has been adopted and adapted to military uses. It also demonstrates why transforming our acquisition system is so important to me and why I am so proud at how far we have transformed this process during the last four years.

In sum, as we go into the 21st century, our security strategy must change to reflect the dramatic geopolitical changes of the last decade and the dramatic technological changes of the last few decades. We will proceed with a policy of engagement with our former adversaries during the Cold War. The highlight of this strategy will be the Partnership for Peace program. We will proceed with a policy of preventive defense to create the conditions for peace. The highlight of this strategy will be the cooperative threat reduction program for reducing the nuclear legacy of the Cold War. And, we will proceed with a policy of maintaining battlefield dominance of our forces by the timely application of advanced technology.

But to do this, in the face of the remarkable technological advanced being made in industry today, requires a complete transformation of the way the Pentagon has done business. That transformation has been underway for the last four years and has already met with significant success. Winston Churchill once said, "You can always count on Americans to do the right thing...after having first exhausted all other alternatives." (laughter) We have indeed made many false starts in the last few decades trying to transform the way we manage our Defense business, but this time, we are doing the right thing and this will allow the Air Force to lead, not to follow, the new information technology into the 21st century.


Return to Air Force FIFTY



 

 











AFA is a non-profit, independent, professional military and aerospace education association. Our mission is to promote a dominant United States Air Force and a strong national defense, and to honor Airmen and our Air Force Heritage. To accomplish this, we: EDUCATE the public on the critical need for unmatched aerospace power and a technically superior workforce to ensure U.S. national security. ADVOCATE for aerospace power and STEM education. SUPPORT the total Air Force family, and promote aerospace education.

SEARCH  |  CONTACT US  |  MEMBERS  |  EVENTS  |  JOIN AFA  |  HOME

The Air Force Association, 1501 Lee Highway, Arlington, VA 22209-1198
Design by Steven Levins | Some photos courtesy of USAF | AFA's Privacy Policy