JPRS ID: 8967 WEST EUROPE REPORT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP82-00850R000200030008-8
Release Decision:
RIF
Original Classification:
U
Document Page Count:
78
Document Creation Date:
November 1, 2016
Sequence Number:
8
Case Number:
Content Type:
REPORTS
File:
Attachment | Size |
---|---|
CIA-RDP82-00850R000200030008-8.pdf | 4.89 MB |
Body:
APPROVE~ FOR RELEASE= 2007/02/08= CIA-R~P82-00850R000200030008-8
~ � � ~
S ; ~ 68i ? i OF i
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFIC(AL USF ONLY
JPRS L/8798
5 December 1979 ~
West E u ro e R e o rt
p p
CFOUO 68/79)
FBIS FOREi~GN BROADCAST INFORMATION SERVICE
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
NOTE
JPRS publications contain information primarily from foreign
newspapers, periodicals and books, but also from news agency
transmissions and broadcasts. Materials from foreign-language
sources are traaslated; those from English-language ~ources
are transcribed ~r reprinted, with the original phrasing and
other characteristics retained.
Headl.ines, editorial reports, and material enclosed in brackets
a.re supplied by JPRS. Processing indicators such as [TextJ
or [Excerpt] in the first line of each item, or following the
last line of a brief, indicate how the original informaticn was
processed. Where no processing indicator is given, the infor-
mation was summarized or extra:cted.
_ Unfamiliar names rendered phonetically or transliterated are
enclosed in parentheses. Words or names preceded by a ques-
tion mark and enclosed in paxentheses were not clear in the
- original but have bQen supplied as appropriate in conte:ct.
Other unattributed parenthe~ical notes with in the body of an
item ori.ginate with thE source. Ti.mes within items are as
- given by source.
The contents of this publication in no way represent the poli-
cies, views or at.titudes of the U.S. Government.
For further information on report content
call (703) 351-2811 or 351-2501 (Greece,
_ Cyprus, Turkey).
y
COPYRIGHT LAWS AND REGULATIONS GOVERNING OWNERSHIP OF
MATERIALS REPRODUCED HEREIN REQUIRE THAT DISSEMINATION
- OF THIS PUBLICATION BE RESTRICTED FOR OFFICIAL USE ODILY.
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
JPRS L/ii'798 -
5 December 1979
WEST EUROPE REPORT
-,FOUO 68/79)
CONTENTS PAGE
,
THEATER NUCLEAR FORCES
F~DERAL REPUBLIC OF GERMANY
FRG Role in U.S., Soviet Relations, SALT Negotiat ions
(Raymond Aron; L'EXPRESS, 27-pct-2 Nov 79) 1
FRANCE
.
Politico-Military Rale of Nuclear Force Viewed ~
(Alfred Grosser; L'EXPANSION, 21 Sep 79) 4
Brezhnev Proposals Aimed at NATO'S December TNF Decisions
(Georges Buis; LE NOUVEL OBSERVATEUR, 15 Oct 79).... 7
UNITED KINGDOM
' TI~3 TIMES' : NATO Nhzst Continue Plugging Defense Gaps
(Editorial; THE TIMES, 25 Nov 79) 11
COUNTRY SECTION
FRANCE
Rolet of Leftwing CERES Faction in PS-PCF Relati ons
( Thierry Pfister; LE NOWF,~, OBSERVATEUR, 15 Oct 79 13
Realine~nt of Eurocommunist Pa.rties Toward Moscow
(Editorial, Jean-Francois Revel; L'EXFRESS, ~
15-21 SeP 79) 17
Antisubmarine Warfare Weapor~s, Tactics Against Nuclear Subs
(Rene Besnault; S7.'RA~.'~7(',IQUE, Mar 79 ) , , , , , , , , , , , , , , , 20
- a - [III - WE - 150 FOUO] -
FOR OFFICIAL U~E ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
~
1'Vlt Vl'1'1V.1f1L VUL' V1YL1 ~
CONT~N`1':; ( Can i, i r?uc:d ) P+~~e
Function of DTCN Outlined, Explained
(Jean Touffaic; ARMEES DTAUJOURD'HUI, Oct 7~).. 59
Minister of Industry Giraud Interviewed
(Andre Giraud Interview; L'EXPANSION, 21 Sep 79) 62
Duties, Activities of Technical Research C�nters Noted
( Paul Talboutier; ARMEES D'AUJOURD' HUI, Oct 79 65
- ITALY
Considerations for Renewal of the Mezzogiorno Law
( Roma.no Prod.i; CORRIF~E DEI,I,A S~A, 15 Oct 79 70
TURKEY ~
Business Groups Seek &~.nk Ownership
(THE MIDDLE EAST, Nov 79) 73
�
- b -
FOR OI'FICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
THEATER NUCLEAR FORCES FEDERAL REPUBLIC OF GERMANY
FRG ROLE I~N U.S., SOVIET RELATIONS, SALT NEGOTIATIONS
Paris L'EXPRESS in French 27 Oct-2 Nov 79 p 124
[Article by Raymond Aron: "German Unity"]
[Text] Ge,rman unity is once again on the agenda. On the fron~ page of
OBSERVER, a journalist reveals to us, according to Yugoslav sources, that
Leonid Brezhnev will propose a progressive unification of Germany to the
FRG in return for neutrality. In POLITIQUE ETRANGERE, Michel Jobert analyzes
Bonn's palicy and scolds the French commentators, "comfortably in$talled in
their journals and their con�ormism," who consider it incongruous to bring
up the subject of reunification.
There is nothing incongruous about bringing up the subject of reunification.
In any case, it is necessary to analyze the diplomacy of Helmut Sclunidt which
is differe~t in terms of its inspiration from that of Konr~d Adenauer although
it does retain the two ma~or elements, that is, thE American alliance and
the European Community.
~ In 1969, 10 years ago, Chancellor Brandt took the decisive step in going into
negotiatio~s with the Soviet Union and the other countries of the East leading
to treaties with Moscow, Warsaw, Prague and Pankow. Instead of basically
. rejecting the situation such as it really was, the government in Bonn recog-
nized the borders and renounced the idea of altering them by force. It re-
served for itself the possibility of a peaceful revision, particularly re- ~
garding th~ reunification of Germany.
The Westerp~ Allies would have been rather ill advised to criticize the
Chancellor's moves because thP Chancellor was following the example and the
advice of f~eneral de Gaulle. Willy Brandt and his a.ides had the feeling that,
for the first time since 1945, Germany was again becoming an autonomous actor.
In Washington, as Kissinger tells us in his memoires, the first reaction to
the Chancellor's initiatives was not at all enthusiastic. After thinking
about it, the Americans did not oppose Brandt's action and officially approved
it, even in practice.
~ B.efor.e and right after the treaty with Bonn, rhe GDR leaders had come out with
the slogan of "Ai~enzung" [drawing the line], a word difficult to translate
1
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
although it means something like strengthening the border. This slogan had
no effect on events. Millions of Germans in tfie FRG, traveling as tourists
or otherwise, each year cross the dividing line between the two republics _
of German nationality; every night, most of the "socialists" in the GDR ~iatch
television from the "capitalist" system. The two populations know each other
better and have stopped moving further away from each other--on the contrary.
Helmut Schmidt now believes that maintaining good relations with Moscow is in
the national interest. Having become the most resolute advocate of dQtente,
he is conducting his campaign for the ratification of SALT II; he deplores
the sudden rise of anti-Sovietism in Washington; thanks to detente, he says,
he is securing eacfi year the return of thousands of Germans to the FRG from
thp USSR or Po~and.
A fraction of the SPD jGerman socialist party], the Chancellor's own party,
_ is going even further. Bahr, the arcfiitect of Bonn's Eastern policy, H.
Wehner, the head of the socialist fraction in the Bundestag [Lower House] _
are only too happy to visit the capitals of the socialist countries and, in
return, ou~line tfie somewhat longer-term prospect of a vast socialist
community in which the two Germanies would gradually be united.
Neither the administration, nor the opposition subscribe to the Bahr-
Wehner doctrine. But the opposition itself is no longer fighting against
the pol~.cy that led to the treaties with $erlin and Warsaw. It also considers
"Ostorientierung," that is, the orientation toward East, as one of the com-
ponents of German diplomacy.
Relations between Bonn and Washington have been deteriorating. Like the other
- NATO countries (with the exception of Portugal), the FRG in 1973 refused to
let American transport aircraft, wfiich were carrying weapons and ammunition
to Israel, use its airports. The German~-Srazilian Accord on the nuclear ' l:
industry has triggered acrimonious excnanges between Bonn and Washington.
But, having noted this, we must not exaggerate the significance of this te~n-
sion. The FRG is conducting a Gaullist-style policy. It benefits from
American guarantee and at the same time tries very hard to promote its own '
interests. It was not Helmut Schmidt who rejected tfie idea for stationing
neutron bombs; it was President Carter himself. He approved the stationing
of inedium-range missiles on the soil of the FRG, on the only condition that 1
at least one other member of the Atlantic Alliance do tfie same.
In 1952, prior to the rearmament and entry of the FRG into the Atlantic
~ Alliance, the Soviet Union, in a rather equivocal manner, by the way, proposed
a unified Germany that would pledge itself to be neutral. But those proposals
were not exactly aimed at unity: A confederation in which each of the two
states would retain its institutions? Withdrawal of American troops and
Soviet troops? Even today it seems inconceivable to me that Moscow is
envisaging the "de-Sovietization" of the GDR.
2
� FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
According to OBSERVER, the Soviets supposedly would offer tfie evacuation of
the GDR and Hungary, pulling out Soviet troops from rhere, in return for
- FRG neutrality with the promise of reunification within 2Q years. Assuming
that such a plan would be conceived in Moscow, it would involve the return
of the American troops to the United States, the shift of Soviet troops
~ toward Cze~fioslovakia and Poland: Severa~ thousand kilometers against 3ust
a few hundred. Certainly an unequal trade.
~ The Soviet Union is forced neither ~y the Chinese menace, nor by the Chinese- _
Ja~anese economic agreements, nor by the economic power of the FRG to plunge
into a diplomatic adventure, in other words, to bring up the entire issue
of the F.uropean status quo all over again. TFie pres~nce of Soviet divisions
in the center of Europe assures it not only of security but also of a means
for exertiflg pressure. The Soviet divisions in the GDR, the most modern
ones, create a permanent peril for Western Europe--a Damoclean sword which
must not fall but which reminds the Europeans of their vulnerability.
I do not wish to suggest that the Soviets are not preparing for big'diplomatic
maneuvers. They are hoping to paralyze the effort of the Westerners who
want to reduce their military inferiority in Europe. The Americans and the
Germans are starting the dialogue and are asking Brezhnev for the precise
meaning of wfiat he has to say. Does this mean reducing the number of SS-20
missiles deployed or withdx.awing the old missiles, the SS-4 missiles, for ~
example? The dialogue, which in itself is inevitable, does nut lend itself
to critici~m, except under one condition: That the Westerners do not re-
nounce the rearmament measures which they are contemplating. If, under the
pretext of starting negatiations, ~he Westerners renounce their undertakings,
they will go to the negotiating table wit:hout any bargaining chips. The
Soviets would, in exchange for medium-range missiles planned by the Westerners,
not have conceded a fraction of tlieir current force but a fraction of the
~ supplementary force which they fiave tfie intention of deploying.
At the end of those negotiations, the Westerners would be in the same situation -
of inferiority which they have tfie firm intention of correcting now.
~
COPYRIGHT: 1979 s.a. Groupe E~press
5058
~ CSO: 3100
a
- 3
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
rva~ virivicaa, uuu VL\L1
THEATER NUCLEAR FORCES FRANCE
POLITICO-MILITARY ROLE OF NiTCLEAR FORCE VIEWED
Paris L'EXPANSION in French 21 Sep 79 pp 133, 135
[Article bv Alfred Grasser: "France, the Bomb, and Europe"J
- [Text] The current debate in this country over Germany's possible parti- ;
� cipation in the French nuclear force is strange indeed: Everybody engaged
in it seems to be be=t on deliberately ignoring some important hard
facts. ~
The first such fact is that the Federal Republic of Germany has neither
the desire nor the right ta be part of this force. This lack of desire ~
was demonstrated once again during the transatlantic dialog on the neutron
bomb. Consulted by the U. S. president about production and deployment ~
of this bomb, Chancellor Schmidt commented guardedly about its production
and categorically refused to commit himself on its deployment because ~
he felt his country had no business garticipating, even in an advisory
- capacity, in a decision relative to production of this kindt of weapon. ,
Gprmar~y has no right because on 28 November 1~69 it signed the Nuclear ~
~ Nonproliferation Treaty which im~oses severe restrir.tions on its sover-
eignty, or to be more exact, Gerniany imposes such r.strictions on itself.
, Who, therei'ore, on the French side would want to urge the FRG to denounce
that tr~aty? Especially since the French nuclear force was actually
developed not only to hold a possible enemy in check but also to gain
political weight vis-ri-vis our allies, particularly vis-a-vis the ,
Germans: They have no atomic weapons and they have Hitler in their past;
this offspts our industrial inferiority:
French cabinet ministers and politicians also mention from time to time
the obligations and limitations imposed on the Federal Repub lic of Germany
by the Paris Agreements of 23 October 1954, agreements that sti11 consti- ~
tute our neighbor's international charter. But why is no mention ever ;
made of one particular article of those agreements, the one that binda
us the most? In fact, the Paris Agreements renewed, revised, and com- ~
pleted the Brussels Treaty by making provisions for Germany and Italy to
accede to that treaty. Article 4 of the Brussels Treaty of 1948 automati- '
cally commits France as follows: "If any of the High Contracting Powers ,
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
should be the object of an armed attack in Europe, the other High Contract-
ing Powers will afford the party so attacked all the military and other
aid and assistance in their.power."
_ It's just as simple as that. In other words, any assumption that we
would defend on France proper, while the Soviet Army was advancing in
Germany would imply a violation of our treaty obligations. The North
Atlantic Treaty allows a nation a choice of action. Th~ Paris Agree-
ments do not. And even if we leave aside our contractual obligations,
who really believes France can stand aloof from a conflict taking place
in Germany? Communists and (pro-Chirac) Gaullists became indignant when
the minister of defense, a Gaullist, said that "participation in the de-
fense of Europe is one of the essential missions of the French Armed
.Forces, a mission directly linked to the security of our territory." Yes,
but what, in f act, had Chirac said in 1975 when as prime minister he
officially turned Pluton tnissiles over to those units responsible for
their employment if and when required? "Realizing that its fate is
linked to the fate of Europe, France intends to play a role commensui-
ate with its capabilities in t:^.:e defense of th;: continent to which it
belongs. To do this, we ca~ot be content to 'sanctuarize' our own ter-
ritory. We mus t loo?c beyond our borders. In this respect, because our
weapons are French and also genuinely European on our territory, they
contribute to the defense of Europe by their very existence, a contribu-
tion wliose scope our allies--and we ourselves--have not yet exactly
measured."
Commonsense words that were little noted at the time and have continued
to be unnoticed ever since then, because the French approach to the Ger-
mans up to now has been to tell them, in substance: "Do not trust in
the Americans: in case of danger, they will not defend you. Trust in
~ us. Having said that, we shall not defend you. But when the Russians
are in your cities, we shall no doubt destroy them there:"
At the present time, the Germans do, in fact, have less confidence in the
American commitment. Such a level-headed daily as the SiiDDEUTSCH~ ZEITUNG
described this situation as "a minimum of confidence and a maximum of fear."
But to counterbalance the USSR's superpower, there is no alternative solu-
tion to the American "umbrella." At very best, we can hope for a united
Europe whose political force could use the military resources of all its
' members, including the British and French atomic force. To compel the
United States to raise the ante. To convince the USSR that European
_ determination can influence the United States, in other words, to give
the American deterrent greater credibility. As a matter of fact, for the
- moment American. credibility is declining without ours being on the rise.
For despite our subma.rines, who believes our president is really prepared
to risk the country's total destruction in retaliation for our ha?ing
launched destructive rockets against a few Soviet cities? De Gaulle was
, more credible b ecause it could be assumed he would act irrationally:
5
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE QNLY
There is no need for integration or an impracticable Franco-German
nuclear force. There is ~need, however, for us to state quite clearly
that we are well and truly members of a bloc, that this bloc includes
Western Europe and the United States, and that it is precisely for that
reason that our atomic force has a politico-military role to play.
_ COPYRIGHT: S.A. Groupe Expansion -
8041
CSO: 3100
6
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
,
FOR OFFICIAL USE ONLY
TiTEATE~ NUCLEAR FORCES r^RANCE
$1tEZHNEV PROPOSALS AIMED AT NATO'S DECEMBER TNr DECISIONS
' Paris LE NdfJVEL Q$SERVATEUR in French 15 Oct 79 pp 65-66
[Article by retired General Georges Buis: "Leonid Brezhnev's Sk'illful
- Anger" ] .
[Text] How happy would both Soviet and A.meri.can strategists be if Western
Europe were to be swallowed one nice morning by the combined waters of tne
North Sea, [he Atlantic, and the Mediterranean! How much more easy it
woutd then become to divide terror and, therefore, security! What a major
obstacle would disappear in the pursuit f.or and success of the various SAL-T,
strategic afmament limitation talks which have become a sort of permanent
- detente council of the two superpowers!
Tnitiated in 1969, the purpose of the SALT was to enable both powers to
con[rol armaments considered "strategic"--i.e., armaments which enable
- either one of them to hit the other from his own country or from a submarine.
The initial phase of the discussions r~sulted in the signing of SALT I xn
Moscow, in ~972. The second and longer round, lasting six years and in-
- cluding some 300 meetings, has been more difficult because of the speed of.
technological progress. It was completed last June, in Vienna, with an
exchange of signatures between Jir~my Carter and Leonid Br.ezhnev. :lowever,
the SALT II treaty must be ratified by the American senate which is dragging
its feet. Meanwhile Moscow is becoming impatient.
This is bec~use the Soviets want SALT. Far from having the unlimiCed
facilities ascribed to them all [oo generously, and suf.fering a severe lag
in the precision ai~ing area, in the field of the limitation of. strategic
armaments i~ appearsquite clearly that it i.s they, above all, who ar'e the
requesters. This explains thE.ir� irritation at tie sight of the problem of.
European security--brutally postponed this year by the Europeans and the
Americans--coming to complicate and delay their nice agreement with the
United Stat~s. This also explains Leonid Br.ezhnev's great anger. On th~
subject of the plan for the deployment in Europe of a new "intermediary"
m'issile, denounced, on 1 Octo'oer in i~loscow, "those who would tike to rurn
1. IRBM: Intermediate Range Ballistic Missile
7
FOR OFFICIiw USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED F~R RELEASE: 2007102/08: CIA-RDP82-00850R000200030008-8
rux Urrll:lAL ua~: UNLY
Western Europe in[o a launching p~d f~r American weapans directed ~~gninst
the USSR."
_ To understand the naturc of those threats formulated on 1 October against `
the Europeans, repeated in Ber.lin on the 6th, and taken up this time against
the Americans, in a TASS communique, dated 9 October, we $hould consider
the current state of the balance of forces in Europe. For the pas[ two
years thc Soviets have been deploying in their zone a new weapon not can-
sidered "strategic," for it cannot reach the United States: The SS 20, an
intermediate range missile (4,500 kitometers), whose precision is estimated
in terms of tens of ineters, and which could carry one to three nuclear war-
heads, and whose launcning pad is mobile and, therefore, cannot be located
- before firing. This weapon can cover atl of Europe and the Mediterranean.
It has turned this area in[o a"gray zone," which means that, in the case
of an attack, it would not have the guarantee of automatic retaliation by
the American striking force. Therefore, the USSR could launch its SS 20
over Europe without the theoretical risk of a retaliatory strike against
Soviet territory; since NATO would have no retaliation facilities.
This situation has not been ignored by the NATO Europeans who, three years
ago, began to shriek loudly, justifiably believing that they were in the _
way of converting from the stage o� "conventional hostages" to that of
"nuclear hostages." However, regardless of the shouting, the Americans were
not in a hurry to abolish this "gray zone" by establishing a balance of
= facilities. The reason for which they were so reZuctant to change the
existing balance was the fact that the SALT II talks were underway and tha[
the Soviets were already becoming terribly touchy on the problem of "advance
~ase forces (ncaclear)," already installed: French and Briti~h, and European
b~ses of Ameri~an nuclear submarines and commerce. Why would the ~wo super-
powers compromise the results of laborious efforts, carried out f.or six
years, for the sake of Europe, labors whose first and absolute result, as
the Europeans must realize, is, first of all, to establish betwe2n the two
of. them acceptable modus vivendi?
~
_ The Umbrella Goes Away
Yet, in the summer of 1979 the Americans woke up and, all of a sudden,
bacame very noisy on the subject of an intermediate weapon to be deployed
_ in Europe: the Pershing 2, with a 1,800 kilometer range, which would
become operational between 1983 and 1985. At the beginning of August, in
_ Brussels, Zbibigniew Brzezinski stated that the United States had the
obligation to provide NATC with this weapon or with any other weapon
capable of performing the same mission.
Paradoxically, this announcement came at a time when a doubt as to the
advantages of such an American gift had developed in the minds of many
Europeans. On the one hand, it appears that the detected Soviet SS 20 are
almost virtually deployed toward China. On the other, the presence _
$ -
FOR OI~FICIt~,�, USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
~
FOR OFFICIAL USE QNLY
_ in Europe of an intermediate American weapon would provide an additional
_ step in the eventual defensive escalation and would thus contribute to
" remove, rather than bring closer to Europe, the real "American umbrella."
- 3let, it seems clear that the American government, by suggesting the
"Pershing 2," aimed, ab~ve all, t~ appc,~sc the scruples of sen~t~rs who
' were conccsrned about "abandoning Europe," and to encourage them to ratify
SAL'C II without further delay.
Non Nego[iable Superiority
AC that time Brzezinski's declaration did not trigger any efficial Soviet
reaction. Nosaever, neither Europeans nor Americans profited fr~~,m this: .
The exptosion occurred in October. After his hard 1 October warning, on
the 6th in Berlin, on the accasion of the~ 30th anniversary of the GDR,
Brezhnev stated that the deployment uf American intermed~ate missiles in
Lurope "would brutally change the strategic situation on the continent,"
and woutd force the Soviets to "strengthen their own security." Turning to
the West Germans, he warned them that "it woutd be difficult to imagine the
_ consequences to them of .*.he deployment of such weapons on their soil."
On 9 Octo~er PR4VDA attacked the Americans directly: The deptoyment of
Pershing 2 missiles in Western Europe would "turn the continent into a
_ dangerous powder keg;" '~The efforts la~nched by the leading circles of the
tJnited States to impose upon Weste-n Europe a new round of armaments in
terms of nuclear missiles risks to te:~ow back the detente process." The
word detente led to the SALT refrain: PRAVUA condemned "the efforts under-
taken ~y ~'he American senate to undermine the ratification of the SALT
agreemet~ts," as well as "the irresponsible manner with which inf.tuential
= circles in the United States treat detente."
The purpose of these threats is double. On the one hand, they aim at
impressing the NATO coun~tries whose representatives are to meet mid-aecember
to decide ~ahether or not to accept, or whether or not to demand, the deploy-
ment of iritermediate American missiles on their soil: The severe Soviet
statements must hover over the conference. However, the Soviets atso intend,
through the li~�etiness o~ their reaction, to remind the American sena[ors of
the very speciai na~ure of "adversary-partnership" relations which link
Moscow with 4/ashington, and urge them to ratify the SALT agreements as
rapidly as possible, and, if possible, before the December ~ATO meeting.
Behind t~:i~s insistence one can even see a clear appeal, to the extent to -
which [he ;SALT II agreements include the pledge to immediately begin
SALT III, in the course of which the problem so far avoided of "advance
forces" ~aould be taken up. Brezhnev told the senators, "Therefore, sign
the SALT II quickly so that we may be able to settle as soon as possible
and togethcr the matter of the Pershing 2 and other 'cruise missiles'."
Yet, it is doubrful that this call has been heard. In effect, even if it
' has deployed its SS 20 above all against China, the USSR has always in-
dicateo that it intended to preserve its advantages gained in ~urope and
9
FOR OFFICIIw USE ONLY .
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
cvw vrri.~Lew u~c v?ri.i
that this superiority was totally non negotiable. A.discussion of the -
reduction of armaments in Europe was acceptable. However, as to the arma-
ments [hemselves. on 6 October Brezhnev confirmed [his, emphasizing
that, deploying its SS 20, the USSR had not changed in the least the
~ numerical importance of its nuclear armaments. As early as 9 Octaber
President Carter replied that Brezhnev's suggestions were nat "constructive,"
and [hat the Europcans should "modernizc their defense" before negotiating.
We shall mention merely as a reminder, for it has nothing to do with the
substance of the debate, [he suggestioR made by Brezhnev on 6 October of
withdrawing unilaterally 20,000 men and 1,000 tanks from the zone of deploy-
ment of Soviet forces in the GDR. Perhaps the East ~ermans may have be~n
touched by this anniversary gift. However, the Western general staffs
would find it hard to see in~this a serious gesture, particularly in a ,
country in which the USSR l~~eps 20 divisions, 10 of which armored, or a
total of 400,000 men. The promotion of detente cannot be accomplished with
these 20,000 soldiers and 1,000 tanks.
COPYRIGHT: 1g79 "le Nouvel Observateur"
~
5157
CSO: 3100
'
;
10
FOR OFFICIAL USE ONLY
I
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
THEATER NUCLEAR FORCES UNITED KINGDOM
'THE T1MES': NATO MUST CONTINUE PLUGGING DEiFENSE GAPS
LD261153 London THE TIMES in English 26 No~ 79 p IO LD
[Editorial: "NATO's Nu~clear Cover"]
[Textj The Kussians have been trying very hard to discourage NATO from
~iodernizin~ its medium range nuclear weapons in Europe. Mr Brezhnev had
~ an array of sticks and carrots in his sp~ech of 6 October, and Mr Gromyko
has just been in Bonn to reinforce the message, threatening dire conse-
quences for' political relati.ons in Europe if NATO goes ahead. So far NATO
has been standing firm, though the Dutch have been wobbly, so it seems
reasonably.,certain that the decision to modernize will be taken at the
ministeria$ meeting in Bi-ussels in mid-December. At the same time NATO is
putting together a packag~e of proposaZs on arms control to match those of
Mr Brezhnev, so there is just a chance that by the time the new weapons are
rEady for deployment (in three years, perhaps) they will not be needed.
This two-pronged atproach is clearly the right one. No sane person wants
to exacerb~te tension in Europe or to arm inore than necessary. It would
be folly to' pass by even the slimmest chance of negotiation. But there
is not enough in Mr Brezhnev's offer to justify putting off modernization
in the hope' that the need for it can be negotiated away. If negotiations
failed--and they probably would if the stimulus for them were removed--the ,
military. iuibalance in Europe would become even wurse than it is now and the
political risks of trying to restore it would become greater.
The ~hilitary case for modernization is very strong. NATO strategy is based
on the doctrine of flexible response. This means having the ability to
~iake a controlled response to any level of threat from the smallest border
- incident to full-scale intercontinental warfare. In recent years a gap
has been op~enirig in the middle range of the scale. The Soviet Union has
been deploying a new generation of nuclear weapons for the European theater,
notably the SS-20, which is an accurate, mobile missile with three warhe~ds,
and tfie "b~ckfire" bomber. Both these systems have ranges of over 3,000
miles and cbuld reach Western Europe from the Urals. Yet they themselves
cannot be reached from Western Europe except by obsolete and increasingly
vulnerable aircraft. They have a sort of sanctuary status, uncontrolled
by the SALT agreement and out of reach of European weap~.ins.
11
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY ~
Tn an escalating conflict Europe could, tl~crefore, find Itself I~~zving to
jump straight from battlefield nuciear weapons to intercontinental
annihilation. While this could frighten the Russians it could also tempt
- them to calculate that the United States would not risk its own cities for
the sake of Europe. Dr Kissinger confirmed in a recent speech that this
miglit not be a wholly irrational calculatton.
Hence the NATO plan to depZoy 108 Pershing II missiles and 484 ground-
launched cruise missiles in Europe. Naturally the Russians try ta prevent
a decision as they have tried to avert every important NATO decision over
the past thirty years, but they are wrong to depict it as a new threat ~
emanating from West Germany. The weapons will remain under American control
and are no more than a response to Soviet modernization. Ir is important
that the Russians should not come to think that they have a veto over NATO _
decisions. Yet Mr Brezhnev's speech of 6 October deserves examination--
- Mrs Thatcher's initial reaction was far too brusque. He announced the
unilateral withdrawal of up to 20,000 Soviet troops and 1,000 tanks from
East Germany and offered to reduce the number of inedium range weapons in
the western part of the Soviet Union. He also proposed extending the
confidence-building measures of the Helsinki final act relating to the
_ notification of troop movements and maneuvers. Clearly his immediate aim
_ was largely tactical and propagandist. His proposals were not tabled in ~
negotiations, and Western governments were not given the normal advance
warning. Moreover in their present form the proposals do not amount to
very much. The Soviet Union has about 400,000 troops in East Germany, so
it would not miss 20,000. Nor would it be any weaker for removing obsolete
missiles--the International Institute for Strategic Studies calculates that
with 120 SS-20s already in place only another 140 are needed to do the
work of the 590 SS-4 and SS-5 missiles still deployed; and SS-20s are coming
in at the rate of SO a year.
Nevertheless, if the Russians are genuinely worried about the nuclear
confrontation in Europe they must be given a chance to prove it. Their
proposals fall naturally into categories already covered by existing or
imminent negotiations--SALT 3(which could in fact start even if SALT 2 ~
is not ratified by the U.S. Senate), the Vientia talks on troop reductions, '
and next year's second review of the Helsinki final act. If the Russians
really have something to offer, these negotiations will give them oppor-
tunities to show it. Meanwhile NATO must continue to plug the gap in its
defences. After all, it was only the prospect of a NATO decision that
prodded Mr Brezhnev into action. '
COPYRIGHT: Times Newspapers Limited, 1979
CSO: 3120
12
FOR OFFICIAL USE ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
COUNTRY SECTION FRANCE
ROLE OF LEFTWING CERES FACTION IN PS-PCF RELATIONS
Paris LE NOUVEL OBSERVATEUR in French 15 Oct 79 pp 55-56
/Article bq Thierry Pfister: "Jean-Pierre Chevenement's Mistake"/
/Text~ When Jean-Pierre Chevenement was still only the leader of the minority
in the PS %Socialist Part~/, Francois Mitterrand, meditating in Latche, on
his estate in the Landes region, seemed eager to talk to his visitors
"Jean Elleinstein ought to be a member of the Socialist Party and Chevenement,
a member of the Comuunist Party." From the rostrum at numerous meetings of ~
the PS, the first secretary often took the opportunity to make similar remarks,
whether he ~as calling the CERES /Cpnter for Socialist Studies, Research and
Education/ a"cou~unist-leftist potpourri," or de~cribing it as "a false
Communist Party, made up of lower middle class." When it was pointed out
to him that Chevenement and Elleinstein were more useful to the left with
each of them in their pr~sent jobs, Francois Mitterrand answered with a
smile: "No, because it isn't the same thing, Elleinstein does not sit on
the Central Committee of the PCF /French Communist Part~/."
- This differ.ence has, since then, become more important because Jean-Pierre
Chevenemen~:has once again become a member of the national secretariat of the
PS and in addition Francois Mitterrand needs the votes of the CERES to retain
a majority within his own party. So, Che deputy from Belfort and his friends
remain faithful to the analyses and to the methods which the first secretary
used to makie fun of. There has just been a new illustration of this in the
- interview granted on 6 October to OUEST-FRANCE by Jean-Pierre Chevenement.
"Is it by chance that the break of 1977 came about over the subject of the
nationalizations -which the PS had instructed Michel Rocard to carry out?"
the head of the CERES wondered, not very innocently. According to him, the
deputy from Yvelines "is responsible to a large extent for the failure of
the left."
This stateme~t stirred up deep feelings within the Socialist Party. If the
friends of Michel Rocard have tried to avoid public controversy, the minority
faction, led by Pierre Mauroy, has reacted sharply. As for Daniel Percheron,
the first secretary of the powerful Pas-d~.~--Calais federation, he even called
- for the resi~nation of Jean-Pierre Chevenement as national secretary of the PS. -
13
FOR OFFICIAL USE ONLY
�
:,t, .t. .
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR ~FriCIAI, US[. OM.Y
Actuallv, the idea expressed by the head of the CERnS is not new. Chevenement
has always thought, since the presidential election of 1974, that the rapproche-
ment between the PS and the faction led by Michel Rocard, as well as by
Edmond Maire, was undermining the union of the left. He was all the more
hostile to this turn of events since it provoked the "marginalization" of
the CERES. The experience of the campaign of Francois Mitterrand in 1974
h~d, if that was necessary, opened his eyes. HF, and his friends had been
carefully kept away by the common candidate of the left. Mitterrand had
preferred to use new economic teams, headed by 3acques Attali and Michel
Rocard. And it is true that the platform prese.nted at that time by the -
candidate was affected by this change. The neo-Marxist logie of the CERES,
which is close to that of the communists, was replaced by new views, which .
- were hardly c~mpatible with the system of economic thought of the PCF.
And the change since then has become more pronounced.
Important Ambiguities
Nevertheless, when the PCF chose to make the break in 1977, it was based on
- an evaluation of the whole of the political and institutional balance of
power. Before making the issue of the nationalizations an area of confronta-
tion with the PS, the leadership of the PCF had planned to stress other ,
subjects. If this one was finally decided upon, it was certainly because
of its symbolic value but also because, at the time of the negotiations
over the "Cocm~?on Program" in 1972, the discussions on this subject had left _
major ambiguities unresolved. First of all, the future of thP j~~hsidiaries
of the groups scheduled for nationalization. And, at that time, the socialist
negotiator was Jean-Pierre Chevenement.
Although he admits that his statemeit in OUEST-FRANCE "could have been more
polite," the head of the CERES is guilty however not of a slight error but
of a serious mistake. And from trao points of view.
1.--With respect to the Communist Party, Jean-Pierre Chevenement is j ustifying
after the fact the campaign led by the communists and aimed at holding the -
PS solely responsible for the split in the union of the left. The PCF ~
leadership was not fooled and by 7 October, Charles Fiterman was stressing
the fact that the declarations of the socialist leader expressed "a point
of the greatest importance, which each worker, each democrat should note: ~
the communists were right." Rene Andrieu drove home the point 3 days later
in his editorial in L'HUMANITE. '
The argument over who was responsible may, at first glance, ~eem secondary.
Nevertheless, it could become decisive in the context of the competition,
within the left, between socialists and communists. The PCF has prided
itself for 30 years on having a single will which permitted it to broaden
noticeably its zone of influence, while the socialists, on the contrary, w~re
suffering from the memory of their past compromises. If the mythology of
unity could be appropriated by the socialists to the detriment of the PCF,
the rebalancing of the left, which was achieved by Francois Mitterrand,
would be solidly anchor~ed. On the contrary, if the image of the PS once
14 ~
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY '
;+~;;iin h~~c�~,m~~s rl~~u~y, IF ehere ar~ dc~nhtti r;iitiect about its datiirc for an .iJl irin~~e,
tlie communists can hope to reconquer, in time, the grocnd they have loet
over the last 8 years. Through his declaration, Jean-Pierre Chevenement .
has contributed to placing in doubt the real intentions of the socialists. ~
This is not the first time that the head of the CERES, by entering the
territory of the PCF, has placed his~own party in the wrong. Right after
the failure to put the "Co~non Program" into action, and while Georges Marchais
was constantly appearing on television, asking for tre soc~alists to "take
a step forward," and Erancois Mitterrand was trying to hald his positions ~
Jean-Pierre Chevenement in November 1977 had proposed new conc:essions to the
national convention of the PS. Something which, the next day, was well
appreicated by the editorialist from L'HUMANITE.
On the shape of Euro~e, as an Southeast Asia, on the vents in Portugal earlier,
as on the analysis of the Soviet Union today, the CERES continues to take
public positions which are merely justifications of the criticism of the PS
by the PCF.
2.--With respect to the Socialist Par~. One of the dangers facing the PS
is changing itself into a giant PSU /Unified Socialist Part~/. Francois
Mitterrand has often warr~ed his friends to be on guard against this, in recent
- years. He was thinking especially of Michel Rocard, an expert, it is true,
in this area, since he is a former national secretary of the PSU. Tt~e "PSU-
ization" (as the socialists call it) of a political groups, what does that
mean? Intertaal quarrels as complicated as they are unremitting, which alienate
public opinion and tire out the militants. In fact, that is ~ust what is
_ happening in the PS. Its sections are already losing members, while its
strength at the polls has stopped growing.
W~11 Trained Supporters
Fatigue and ~liscouragement are natural, as soon as a party subordinates its
political stance to internal problems and analyses the society that it claims
to lead only as a function of the balance of power between the tendencies
running thro�gh ir.. That is what "PSUization" is. And that is exactly what
is ~oing on aow in the PS.
The Metz congress had already offered an illustration of this. Jean-Pierre
Chevenement ~onfirms this drift. Right after the call to order--and to calm--
made by the Executive Bureau of the PS, on 10 October, and under the pretext
of explaining himself, he returned to the charge. According to him, the -
criticism he is receiving has as its goal modifying the objectives of the
"Socialist Program." By refocusing the controversy on this text, of which
he is the pr~.ncipal author, the head~of the CERES is revealing his concern
that a gene~al agreement, even a mer:e broadening of the ma~n�ity of the
PS, might come about Lhrough this text. As soon as Francois Mitterrand,
because of the broadening of the majority, no longer needed the votes of
~the CERES, the influence of Jean-Pierre Chevenement could be blocked. An
1.5
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
influence which is expressed not only in the texts, but also on the militant
level because the supporters of the CERES, who have been active for a long
time, work within the PS more effectively than those that Paul Quiles is
trying desperately to make us of on behalf of the first secretary.
COPYRIGHT: 1979 "le Nouvel Observateur"
8956
CSO: 3100
.
; -
16 ~
FOR OFFICIAL USE ONLY '
. i
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
COUNTRY SECTION FRANCE
REALINEMENF OF EUROCOMMtJNIST PARTIES TOWARD MOSCOW
Paris L'EXFRESS in French 15-21 Sep 79 p 104
[Edi~orial tiy Jean-Francois Revel: "Normalization All-Around"]
[Text] The~one-eyed observation of the various communist parties, that is -
to say their observation in an exclusively national context, and not in the
internatiortal context that is theirs, prevents us from seeing the massive
phenomenon of these last months: the clear realinement of western communist
parties toward Moscow. Th3s is new proof that we cannot understand anything
about the ~vo~lution of the different communist parties if we analyze them in
term4 of exclusively internal politics while refusing to see the simultaneous
nature of ~hanges in several countries at the same time.
Enrico Berlinguer, the commander in chief of the "Euro-communist" parties,
after havittg taken his vacation in the USSR, for the first time since he became
secretary general of the PCI, has ~ust been solemnly and officially received
in Moscow by Leonid Brezhnev in the presence of the CPSU chief ideologist
Mikhail Suslov. The joint communique published at the conclusion of the
meeting constitutes the pure and simple cancellation of previous Italian
- pronouncem~nts on the "autonomous roads" toward socialism and on a certain
freedom of criticism with regard to the Soviet model. In 1979 the chief
of the PCI salutes, indeed, "the successes of the Soviet people in the
economic, scientific, cultural and social fields." He admits that anti-
sovietism and anticommunism are again synonymous, atill according to this same
communiquef~from which has disappeared, moreover, all reference to the
"Italian rdad towardg socialism." We read there instead, this infinitely
less autondmist pror~ouncement: "Berlinguer expressed the ideas of the
Italian cotmnunists on the problem of the struggle for socialism." At the
same time, in an article from the journal RINASCITA, published with great
fanfgre as a new wanifesto of the PCI, Berlinguer forcefully reaffirms the
perennialify of the sacrosault Leninist "democratic centralism," that is to
say, the abaolute power of the party's bureaucracy, and especially of its
king, the gecretary general.
17
FOR OFFICIAL USE ONLY -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
i�vi~ vrLi~.icw u.~t; VLYLl
One notes a similar rehardening on the part of a communi , party geographically
far distant from Europe--the ~aranese Communist Party, which, in the spring, -
also signed a joint communique with the CPSU saluting the success of "efforts
_ undertaken to reach a normalization of relations between the two parties."
We see this word "normalization" figuring in the communist texts themselves.
It is notably weighted with meaning in the case of the Japanese C~mmunist
Party, in which Moscow had tried openly to provoke a split (as in the Spanish -
party) and which, as a result, had suspended all relations with the
Russians. Moreover, at the very moment that Georges Marchais himself
was on very bad terms with the Russians, he had paid homage to the Japanese
Communist Party.
Today we are very far removed frou~, these icy relations. We are familiar
with Marcliais' emphatic remark about the "globally positive picture" of
~ Soviet communism, to be placed parallel to the Italian Gian Carlo Pajetta's
statement that the USSR is "really socialist," which, alas, is ~
doubtlessly true. L'HUMANITE has published this year a spatt of laudatory
articles about the USSR. Gne of the last ones (5 September) is titled:
"Permanence of Economic Growth." At a time when the USSR is again in full
crisis over its food products, this is quite amusing. Let us not forget
that Georges Marchais has just revealed, at the Festival of L'HUMANITE,
his admiration for a well-known humorist, the late ~~'ernand Raynaud. ,
Just as Berlinguer had refrained from making any visits to the USSR except ;
for one in January 1976; Jean Kanapa, former chief of the PCF's international
section (who passed away in September 1978), had, in the same way, avoided
during the last two years of his life meeting face to face with Boris
Ponomarev (in charge of the "fraternal parties" in the Kremlin). That i.s
not the case with his successor, Maxime Gremetz, who appeared in the USSR
this summer to confer with the very same Ponomarev. There again was a
_ joint communique, in which the two no longer speak of "differences," without
returning, nevertheless, to the old "complete identity of views," but content
themselves with "expressing the points of view of their respective parties."
The "complete identity of views" between Soviet and French communists is ~
nevertheless evident in an important area and even the most important area
of all: foreign policy. Rarely had the role of guardian of Soviet interests
in western Europe and defender of Soviet imperialism been assumed by the PCF
with so much flaming vigilance.
For instance, to point out the weakening of western defense and the
corresponding ascent of Soviet military power is called by the PCF "resurgence '
of an armed Europe." To want to better coordinate the defenses of
western nations, to refuse a future Soviet protectorate, is to become
enmeshed in "European cog-wheels." "An extensive press campaign," writes
- Rene Andrieu in his 12 September editorial in L'HUMANITE, "supports this
project, as bear witness especially the distressing publicity in LE MONDE
about the unleashing of the third world war by the Soviets, and Jean-Francols
Revel's editorial in L'EXPRESS, which evokes the Soviet 'menace' with the
18
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
latest arguments prompted by the Pentagon." In short, everything that can
drain Western Europe's defenses and sr.rengthen the pseudo-nationalist myth
of an absolut~ independence and of a total refusal of international cooperation
of French d~fenses is consecrated bread for the Soviets and the gospel
for the schemers of the reactivated PCF, as it is for the simpletons of
deter.iorated Gaullism.
Finally, just as Moscow normalized the opposition from Georges Marchais, he
normalized the opposition from the PCF's intellectuals. And how useful and
well-manage~ was this cardboard opposition after the treason of the split
in the Union of the left! How this opposition kept the public entertained,
with the weil-timed connivance of the "bourgeois" press, and succeeded in
creating diversion by eluding the issue of the causes of that treason in
order to su~stitute hazy speculations about the coming democratization! Certain
of these dissenters were, surely, honest and sincere. Let us not confuse
them with the old campaigners, blusterers of manipulated opposition, become
the puppies of normalized obedience. Once more, they have sold well the
cure-all magic potion of eternal democratization.
When L'HUMANITE, the day after its Festival, runs the simple and
mysterious headline "Le Million" (The Million), it cannot have anything to
do with the sale of the newspaper, (less than one-tanth of this figure),
- nor with the number of inembers in the party (less than half that figure); it
can only de~l with the number of times that the party made believe that
it had comu~nced its democratization.
COPXRIGHT: 1979 s.a. Groupe Express
9545
CSO: 3100
~ -
19
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
COUNTRY SECTION FRANCE
ANTISUBMARINE WARFARE WEAPONS, TACTICS AGAINST NUCLEAR SUBS
Paris STRATEGIQUE in French Mar 79 pp 51-98
[Article by Admiral Rene Besnault, F'rench Navy retired: "Origin, Activi-
ties, and Survival of the SNLE (Conclusion)"]
[Text] The author's first experience with his subject
was obtained at the height of the Battl,:~ of the Atlantic
- ~ [in World War fI] and then along the Norwegian coast.
His postwar assignments in the French Navy ..~nvolved "
mainly sea duty. He is a graduate of the French Naval
War College where he Zater served as instructor and then
dean of studies. He is also a graduate of the 'Naval
Staff College, ~reenwich, England, and served on the
staff of the French Institute for Advanced National
Defense Studies. Admiral Besnault retired from active
duty in 1978.
Enemies of the SNLE [Fleet Ballistic Submarine, SSBN)
To measure the vulnerab ility of SSBN's, one has to know more than simply .
_ how they can be destroyed. It is necessary also to have a much more com-
prehensive picture of how they may be prevented from accomp3ishing their -
mission, what means may be used against them, and how these means may be
emFloyed. To obtain this complete picture, one has to consider the SSBN
weapon system as a wnole. In fact, failure of one link in the chain is
sufficient to break the chain. We are, therefore, compelled to take
into consideration those means that are used not against a single SSBN
or even against a nation's entire SSBN fleet, but against the facilities
that condition their operations, either immediately, such as command and
control systems, or ultimately, such as logistical support facilities.
In adda.tion, as a general rule, certain components of the weapon system,
and mainly the SSBN at sea, have to be accurately located just before
they are attacked. Consequently surveillance forces and equipment must
be included among the SSBN's enemies. All things considered, the list
of its enemies may be drawn up as follows: surface surveillance forces
and equipment, strategic nuclear forces, other means of attacking the _
20
FOR OFFICIAL USE ONLY
; . t.... . _ , -
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
~
FOR OFFICIAL USE ONLY
SSBN on and above tt?e surface, underwater geographic surveillance or
interdiction systems, air and surface ASW [antisubmarine warfare] forces,
and subiqarines employed in the ASW role.
_ Surface Surveillance Forces and Equipment
Photographic air reconnaissance very quickly assumed an important intelli-
gence role. This form of reconnaissance became systematic during World
War II when advances in cameras, photographic techniques, and photo inter-
pretation made it one of the most important, most reliable, and most
accurat~ sources of military intelligence. The American U-2 shot down
over Sverdlovsk in 1960 and photographs of Soviet installations in Cuba
published in 1952 drew public attention at the time to this type of recon-
naissance. But the use of satellites was a big step forward in air
reconnaissance, even though less publicized.
The latter are the "spy" satellites employed by the United States, the
Soviet Union, and probably China. Naturally, all of their capabilities
are not public information, and statements made about them are rarely
- comgletely candid. Nevertheless, it is not impossible to form a critical
opinion of these satellites: First, by using the scientific or commer-
cial information released about them; secondly, by noting the decisions--
satellit~ launches, treaties, ~Ic~~'i.plomatic actions, etc.--the major powers
are comg~elled to make public concerning basic facts they otherwise try
to conceal. It is certain that both the Russians and the Americans can
photograph, measure, and count installations on the earth's surface.
Hundreds of photographs taken by satellites have been published. On some
there is enough distinguishable detail to draw. for example, an accurate ,
map of t~e space center at Cape Canaveral. On others, one can see ice-
bergs, oil slicks on the ocean surface, etc. There have been reports
of objec~s of a few decimeters in 1eng~h or width being visibTe on
su.ch photographs. These reports are hased on accurate technical data:
film of exceptional grain, sensitivity, and speed, and cameras with a
focal length of several meters. Without claiming to replace reconnais-
sance by aircraft, the satellite does have the advantage of being able to
fly over any territory in peacetime and cover immense surface areas within
a reasonable period of time.
Wheth~r ~.t be by aircraft or satellite, it is common practice to operate
on several wave lengths of visible light or infrared by means of colored
" filters, ~1~ thereby making it possible to detect or identify new details.
Wi.th this technology, it has been possible to determine ocean areas rich
in plankton, or chart the course of a river pxtending into the sea.
Photos taken at night bring out in sharp relief those objects with highe~
external temperatures. With such satellites, it is possible to detect
heat sou;rces of a certain intensity on the earth's surface. Hence no
rocket launching can escape their notice. Certain infrared rafl iations
are detectable at night, in all kinds of weather, and even through cloud
Iayers.~2) Televisian has now been added to the range of techniques
21
FOR OI~FICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
- FOR OFFICIAL USE ONLY
commonly employed in air reconnaissance. Aircraft equipped with high-
_ resolution cameras (945 lines in one known case) are capable of trans-
_ mitting images in real time. The same is true with pilotless airc~ait,
missiles with command guidance or homing guidance systems, and also
satellites such as the first Tiros (observation satel?ites with tele-
- vision and infrared capabilities). '
- As we can see, there are many ways of observing what is happening above
= or near th e surface, and there is no do ubt that remarkable results are
_ obtained. Nor is th~re any doubt that these various techniques have
their limitations. They are limited first by the requirement for more or
less favorable weather, propagation, or other conditions; secondly by
the quality of the meChods ~nd equipment employed; and lastly by the
existence of countermeasures. Consequently there is no assurance that
satellite imagery will always be up to rated performance standards. Suc-
cessful imagery through several hundred kilometers~3~ of the earth's ~
atmosphere requires specific conditions: clear, dry, or calm weather,
contrast, etc. From a geometric standpoint, development has gone as far
as the current state of the art permits in increasing the photographic
scale--minimal altitude, maximum focal length--but at the same time,
coverage has been reduced. The same situation applies to photographs
taken from aircraft: by descending lower, certain constraints are
avoided 3nd the scale is increased, by the surface area covered is reduced.
Furthermore, there are always more or less lengthy intervals of time
between two successive observations and, as a result, a fleeting or moving
phenomenon is likely to escape detection. Th~ probability of detection,
and simultaneously the capability of identification, can be enhanced,
of course, by submitting an area to several complementary types of obser-
vation. But this requires more resources and greater expendii:ures, so that,
in practice, it is impossible for one country, even a very powerful country,
_ to maintain surveillance of everything a11 the time and by every means.
This is why on certai.n critical occasions the Soviets have launched an
increased number of satellites. For instance, during the Indian-Pakistani
war of 1971, eight Cosmos satellites, six of them photographic, were
launched within a period of 3 weeks. And during the Arab-Israeli war
of ~973, eight Cosmos satellites were launched in 2 weeks. The fact that
t'ie United States did not step up its satellite launchings on those two ,
occasions does not invalidate these examples. Actually the United States
uses much larger satellites which it generally does not have to recover
to collect their data, because either their imagery is transmitted in
the form of radio signals or the exposed film is returned to earth, upon
command, in jettisonable capsules.
These different methods focus attention on one important point, namely ~
the time it takes before the information obtained can be put to practical
use. For instance, while it does take time to bring a satellite back to
earth or even to recover film capsules, the tran~mission of imagery by
electrical signals is much faster. A phota reconnaissance aircraft has
to return to a suitable base, but this is no longer necessary for a guided
1 22
, FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
missile or remotely piloted vehicle transmitting live television pictures
th~~ can be r.etransmitted great distances by relay satellites. These
examples are suff icient to give one an idea of the great variety of
possible methods. Nevertheless, apart from limited tactical uses,
there is always a lapse of time between the observation of an event and
its exploitation, and it may range from a few minutes to several days.
- American early warning satellites would need at least 90 seconds to
detect a rocket firing, but this information still has to be transmitted
and exploited.
The first countermeasure employed against air reconnaissance was camou-
flage. At the present time, use is being made of synthetic materials
that exhibit for infrared film the same characteristics as the ambient
medium or environment: it is the surface of an object that reflects
solar energy within the "photographable" bands of visible light and
close infrared light. Beyond these wavelengths, radiometers or spectro-
meters can detect, within the limits of the atmospheric windows, infrared
radiation emitted (and not reflected) by the surface of warm objects and
solely by their surface.~4) Generally speaking, the methods mentioned
here--visual, photographic, and television--are limite3 to the vicinity
of the surface and are liable to such countermeasures as camouflage and
decoys. It is possible, in particular, to saturate, to blind infrared
cameras or infrared sensors by deliberate emissions in appropriate wave-
lengths. The best proof of the inadequacies of observation is that
American-Soviet arms limitations agreements apply to only certain types
of equipment. For instance, the number of silos may be verified but
not the ~}umber of missiles. The possible effectiveness of counter-
measures is acknowledged in that each of the parties "promises not to
- interfere with the other's national technical facilities." The trans-
mission of televis ion signals by relay satellites furnishes another illus-
tration. Advances made in this field could enable ordinary television
receiver$ to pick up broadcasts throughout the world. This would mean
internationalization of news programs, propaganda, etc. The USSR had the
United N~tions impose controls on direct television braadcasting by
satellite. On that occasion, the USSR hinted at possible countermeasures,
including some in space. In plain language, this means the ~jamming of
broadcasts and possibly the destruction of relay satellites. In fact,
it is common knowledge that interceptor satellites have been tested.
Such satellites are capable of destroying, or inspecting, other satellites
in orbit.
Radio and radar transmissions are subjected to very close monitoring on .
the su.rface of the globe. They are intercepted and the position of their
transmitters is located. They are analyzed and recorded not only by
satellites but also by a great number of aircraft, ground stations, and
ships. The most famous of such ships is probably the U. S. Navy's
Pueblo which was seized and impounded by North Korea in 1968. This
u:isadventure should not make anyone overlook the presence of Soviet
23
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICI~~'L, USE ONLY
intelligence trawlers that continuously crisscross the seas of the world.
Above all, it must not make anyone overlook the fact that many of these
methods are not limited to ~ust a few nations, but that warships and
combat aircraft possess, at least at the tactical level, observation,
si~rveillance, reconnaissance, and countermeasures capabilities that
make the surface of the oceans a highly active area in this respect. -
Such activity may include detection, position finding, gathering informa-
tion carried by radio waves and radar signals, or determining the very
nature of those waves and signals so as to know how to counter them
effectively at the proper time. These two aspects, radio and radar of
electronic warfare were covered in sufficient detail [in a previous
article] from the submarine standpoint~5) that here we need only recall
- how the submarine can shield itself from electronic warfare measures -
by submerging, and also the risks it takes when indiscreetly surfaced.
It should be noted, in this connection, that the Russians and American ~
have ocean surveillance satellites equipped with radars, infrared and
other types of radiometers which enable them to plot ocean currents,
determine sea conditions, etc.
The United States and the USSR are currently the only co untries employing
methods and equipment quant~tatively and qualitatively adequate to infortn
them, before other countrles, of what is happening all over the world.
These two powers will detect, sooner or later, any fairly large ground
installation and any activity of some duration. Even though ~ther countries
have lesser capabilities in ~this field, they can still detect any breach
of security discipline by a surfaced SSBN, indeed even when it is submerged
near the surface. Yet the thicker the layer of protective water, the lower
the risk. In fact, it does appear that, as things now stand, an SSBN run-
ning deep completely avoids detection by the surveillance methods men-
tioned herein, methods applicable mainly to phenomena in the atmosphere
or on the earth's crust. This does not mean, quite the contrary, that
one should disregard their underwater penetration capabilities. It
would be inaccurate, however, to say that they have made the great ocean
bodies transparent. It would be even rash to say that advances made in
these metlhods will necessarily be detrimental to the SSBN weapon syetem.
- Strategic Nuclear Forces
The SSBN weapon system is not safe a priori from ballistic missiles or
strategic bombers. The range of SLBM's [Sea-Launched Ballistic Missile],
destructive power, accuracy, velocity, and number were discussed earlier
[in a previous article]. Still it may be useful to note that the United
States and the Soviet Union have more than 1,000 ICBM`s, not to mention
~ their shorter-range strategic missiles. Th.e bomber is the only one of the
triad's three delivery means whose number has decreased. But there are
still hundreds of long-~r medium-range bombers in service: more than ~
400 American, approximately 800 Russian, plus the 48 British Vulcans. .
Some of their performance characteristics are noteworthy: the B-52 has
a(maximum) effective operating range of Z0,000 kilometers and the Tupolev
Backfire is said to have a maximum speed of Mach 2.5.
24
FOR OFFICIAL USE ONLY
~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
Are strategic nuclear forces capable of preventing an enemy SSBN from -
_ firing? This obviously raises the question of the second strike capability
of SLBM's, a question whose terms vary greatly depending on the component
of the weapon system targeted by the FNS [Strategic Nuclear Forces).
Apart from the case of a sort of preemptive bombing of a geographical
area, a case to be discussed later, the target's position has to be -
known with a certain accuracy. This accuracy is more difficult to obtain
when the target is mobile: communications between the intelligence
services locating the SSBN, the command authority making the decision to
destroy it, and those forces assigned the destruction mission, all take
a certain amount of time that is likely to cause some uncertainty about
the target's actual position. Admittedly the integration of technical
facilities or the delegation of responsibilities can reduce this amount
of time, but it appears impossible to eliminate it completely. An SSBN's
vulnerability can differ greatly depending on its location, in other
work, whether it is in port, at sea, on the surface, submerged, etc. The
weapon system's shore-based installations should be easy targets, ho~ever,
although a distinction must be made between large, conspicuous support
facilities and certain small, interchangeable, and indeed mobile facili-
ties. It is certain that installations handling communication between
the high command and the submerged SSBN are among likely FNS targets, as
is also the high command itself, because their destruction or neutraliza-
tion would affect the system's functioning. An operational research study
has been made of the nuclear bombing of a vast and deep o~ean area.~6~
From this study it emerges that 60 27 megaton bombs "would be sufficient"
to cover the Barents Sea and Kara Sea, lethally destroying the submarines
submerged therein. Regardless of what one may think of this possibility,
it does have the merit of drawing attention to a few of the SSBN's
essential vulnerability factors: necessary number of SSBN's, dispersion
of their firing positions, selection of patrol areas and transit rout~s. "
Moreover, no possibility should be excluded without thorough examination,
even the possibility of employing SLBM's against enemy SSBN's.
Other Means of Attacking On and Above the Surface
In addition to strategic nuclear forces, there are numerous other means -
of attacking the SSBN weapon system on or above the surface: nine
warfare and electronic warfare, Iand-based or carrier-based forces capa-
ble of sabotage and destruction with such means as guns,missiles, or
bombs, without excluding tactical nuclear weapons. The targets remain
the same as those attacked by strategic nuclear forces. There is one
basic dif�erence, however, namely that it becomes possible to defend these
targets by means adapted to those employed by the attacker and related to
- the security of installations and forces and no longer to the strategy
of deterrence. Even if this security is not total, it may be deemed
satisfactory as long as the SSBN`s nuclear strike capability remains
secure. -
25
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
A second difference stems from the fact that in order to counter the
weapon system's miss ion it is not necessary to attack the system with
weaponry. Electronic countermeasures are sufficient, mainly the jamming ,
of signals transmitted to SSBN's. The technical capabilities of jamming
are well-known and th e armed forces of certain powers have highly elabor-
ate equipment: mobile radio direction-finding stations, airborne ~ammers,
- etc. Some of these devices have the capability of both locating and
destroying a transmitter, or jamming its emissions. There are also
counter-countermeasures: mobility of transmitters, changing frequency
or modulation, attacking jammers, etc. These are the oldest and pro-
bably the best known tactics of electronic warfare.
The means examined here are designed in principle for targets on land
or on the ocean surface. They have very little chance of being employed
in directly attacking an SSBN out of part.
Although still effective on an SSBN leaving port or on one that has
involuntarily surfaced, these means give way to specialized ASW forces
and equipment the moment the submarine has submerged.
Fixed Underwater Surveillance or Interdiction Systems
It is relatively easy to submerge, even in deep water, hydrophones
linked to a central shore-based station where the acoustic signals
received are processed and e.cploited. The noisemakers thus detected
can be tracked, and to some extent, identified by their acoustical
"signature." It is possible in this way to establish surveillance
networks covering geographical areas within which the subsurface traf-
fic situation is known at all times. If the source of the sound is strong '
enough, the submarine noisy enough, the hydrophones can pick it up at a
range of tens of nautical miles depending on propagation conditions.
Much greater ranges can be obtained via favorable sound channels that
have to be sought frequently at great depths. At such distances, however,
the source of the noise may probably not be accurately located. Geographi-
cal underwater surveillance networks stretch ~Icno the ccasts of the United
- States and extend beyond them to Canada, the Bahamas, and probably el~e-
where. The United States has been spending large sums on such systems '
for years now. There are similar systems in the Barents Sea, a strategic
area of prime importance to the Russian Navy. Others of a more localized
or point character are probably installed in various appropriate spots,
such as the mouth of the River Clyde, for example. These systems are
subject to various limitations. Their scope is restricted somewhat by
the distance of the hydrophones from the shore data-processing stations.
That is why in the United States these networks have been augmented by ,
mobile systems. These are "passive linear systems" towed under water by
surface vessels. Their detection data is processed by the shore station
in the same way as data from the other systems. Furthermore, the systems
have limited power of discrimination: it is relatively easy to distinguish
a submarine from another noisemaker, but it is more difficult to
26
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
distinguish between two classes of submarines of nearly similar displace-
ment and design. Lastly, hydrophones are not insensitive to bad weather,
to countermeasures (decoys, explosions, etc.) and their performance in
shallow waters is considered mediocre.
~
On the other hand, shallow waters are mine warfare's privileged domain:~~~
ground mines, moored mines, magnetic mines, acoustic mines, pressure mines,
and contact mines can be laid so as to make certain areas dangerous or
else bar narrow passages. In this latter role, mines can be associated
with obstructions, barrier nets, etc. In shallow waters it is also
possible to lay magnetic detection loops linked to shore stations to
which they reprot the passage of any ship with~sufficient magnetic
' field.
At the Law of the Sea Conference held in Caracas in 1974, Mexico proposed
a ban on the installation of military devices by foreign countries on
another country's continental shelf. Regardless of what may become of
this particular proposal, the extension of fixed underwater surveillance
systems will most likely be subjected to political constraints. It will
be recalled, in this connection, that the ~.reaty banning nuclear weapons
�rom the seabed does not apply to SSBN's. _
All things considered, it is certain that a country has the right to
prohibit subsurface navigation within its territorial waters and is
entitled to detect offenders and even bar them from the shallow part of
those waters by permanently installed devices. It is equally certain
that a country can keep itself quite accurately informed about subsurface
_ traffic by fixed surveillance systems well beyond the customary 12-nauti-
cal mile limit of its territorial waters. Moreover, it can legitimately
assert, for ~conomic reasons, the rtght to maintain surveillance of the
- contiguous sea area out to 200 miles from its shores, but th~ qualiCy
and accuracy of this information declines with distance until it is
ultimately reduced to merely a few random and inaccurate detections.
ASW Weapon Systems Carried by Surface Ships
5urface combat ships contribute to barring submarines access to ocean
areas by employing radars and radar detectors, radio monitoring facili-
ties and visual surveillance, and the threat of guns and missiles. At
the same time, some of these ships, ASW destroyers (or destroyer escorts
and frigates) endeavor to seek out and sink submerged submarines by means
- of weapon systems combining a sonar unit and a weapon as a bare minimum.
Like submarines,~8) ASW destroyers generate various noises which surface
turbulence tends to intensify and make more frequent: movement of the
helm, variations in the speed of propellers, and erratic flow of the water.
_ 27 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
Since destroyers have rather noisy propulsion systems--reciprocating
engines, diesels, or steam turbines--and, moreover, are visible on the ~
surface, the tendency was to ignore noise and security discipline and
make unrestricted use of active sonar. The search for increased sonar
ranges ultimately led to the use of 1ow frequencies and higher transmit-
ting power. Present-day sonar units are readily capable of using resurg-
ing sound waves far from the ship and some very powerful units resort to
waves reflected from the ocean bottom. Active sonar range depends on
the perceptible dimensions of the target and varies considerably with
propagation cond~itions, and to such an extent that any figures claimed ~
for this range are highly debatable. It is not entirely false, however,
_ to say that high-frequency hull-mounted sonar equipment has a normal .
range of 2,000-3,000 meters on a submarine sound while low-frequency
sonars have ranges of 6-7~,~000 meters, and under favorable conditions, _
1~,000 or more meters. Lastly, the powerful range of a low-frequency ~
_ sonar can extend the 20-30 nautical miles in a resurgence, and much
further for certain units using reflections from the ocean floor.
Mounted under the hull--as is still generally the case--the sonars of
ftSW destroyers follow the hull's frequently abrupt movements, remain
~ close to shipboard noises, and are subjected to propagation conditions
within the thermal layer. To free the sonar from these disadvantages,
it was decided to tow its transducer at a certain depth. Furthermore,
propulsion systems are changing: variable-pitch propellers, gas tur-
bines, low compression ratio diesel engines, and nuclear reactors have
already made their appearance. Lastly, movement of the platform has
been reduced by mechanical stabilization equipment,'thereby enabling
the destroyers to employ certain weapon systems. But the introduction ,
of towed linear surveillance systems apparently promises to orient the
detection eff.ort, and perhaps submarine warfare itself,~in a new direc-
~ tion. These systems are passive sonars consisting of a long towed
array of hydrophones strung out at some distance--several hundred meters--
behind the ship and under water at a depth.that has not been made public
but which, in any case, keeps them away from the wake and the surface.
In this way, it is possible to pick up very weak acoustic signals,
including those in sternward directions that are generally unfavorable
in this respect. Range depends naturally on the noise generated by
_ the submarine, but it is definitely a matter of miles, and under
exceptional propagation conditions, of tens of nautical miles. These
- ranges depend also on the noise generated by the destroyer itself.
Hence it is reasonable to assume research will be directed to deveiop-
ing quieter ASW destroyers, thus permitting them to make still further
use of passive detection eqt~ipment.
Detection is not sonar's only function, nor is range its only interesting ~
characteristic. Identification is another of its functions. Not only
the quality and displ~~cement of the echo can contribute to identification,
28 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
but also the submarine's tell-tale noises--propeller's beat, sound
spectrum's characteristics--that can furnish a sort of acoustic signa-
ture. After identification comes the attack. Again the sonar must
furnish the course, speed, and depth if possible, of a target that is
never visible. On the basis of this information, a fire direction center
will then prepare firing orders and data Eor the weapons.
A certain uniformity is necessary between the range of the sonars and
the range of their associated weapons: depth charges, ror_k~ts, and
torpedoes. Conventional explosive depth charges are launched out to
distances of 1,000 to 2,500 meters, depending on the mortars (launchers). -
After a slow descent, they explode at a preset depth. They have a"kill"
radius of approximately 200 meters. In an effort to increase these
ranges and reduce time to target, and consequently surprise the submarine,
rockets (air hrnning) were employed, and then ASW torpedoes. Some of these
so-called "heavy" torpedoes are fired directly from ASW destroyers. Their
ranges are generally 10,000, 20,000 and even 30,000 meters, with speeds
of 30, 40 and even 50 knots. The shorter ranges obviously correspond to
the higher speeds. Given the fact that a submarine can travel at 30
knots and hear a torpedo coming from afar, the torpedo is not really
dangerous unless f ired at close range. Hence it is necessary, once
again, to shorten the time to target if the submarine is to be surprised.
To accomplish this, navies are employing light torpedoes, carried to a
position directly avove the submarine by either a helicopter or a missile,
at times supersonic, with a 6 to 10-nautical mile range. Both the heavy
and light ASW torpedoes have active acoustic homing guidance, a small
- sonar designed to lock on to the submarine when arriving near it and then
guide the torpedo to the submarine despite the latter's evasive action.
A good ASW torpedo ought to be able to track any submarine down to its
maximum operating depth, a capability that apparently only the most modern
torpedoes possess. The United States and the USSR also have nuclear depth
charges with an estimated submarine kill radius of 2-3 nautical miles.
Such depth charges are a way of eliminating the need to know a submarine's
exact location, but their employment remains subject to tactical and meteo-
rological restrictions, and much more so to political constraints. These
nuclear depth charges would be launched by~a long-range missile: ASROC
[U.S. Antisubmarine Rocket], SS-N-14(?) [Soviet cruise or winged missile]. _
Countermeasures can, of course, be *aken against ASW weapon systems:
silence, decoys, and anti-echo coatings effective against sonars, and
evasive action against weapons.
ASW destroyers do not have either the speed or endurance of their~nuclear
adversaries. Furthermore, the limited room they have and their instabi-
lity are such that their sonars do not perform as well as fixed hydrophon,e
systems. Yet, in addition to their ability to take action above,the sur- -
face, they have subsurface acoustic detection and attack capabilities that ~
are generally well integrated into one or more systems. Their value stems
29
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
from the grouping of all these capabilities upon a single mobile, rugged
_ and durable platform, and the resultant rapidity of action. There are
numerous ASW weapon systems carried by an extreme variety of ships~ and
all navies have not reached the same stage of achievement or eveil know-
how in this field, much of which is kept secret. It appears reasonable
to believe the United States is ahead of all other countries in detection
~ capabilities as well as in weaponry. From a quantitative standpoint there '
are hundreds~9~ of surface ships with an ASW capability: cruisers,
frigates, corvettes, gunboats, destroyers, and destroyer escorts of which--
_ the heavier ones--are exclusively or primarily ASW-oriented. Naturally,
the two superpowers lead all others, but Japan and Great Britain, with
some 60 ASW destroyers, and France, with some 40, have a significant
number.
ASW Aircraft
Naval aircraft--maritime patrol aircraft, ASW helicopters, and carrier-
based ASW aircraft--also have many means of taking action on the surface.
But at least two devices permit them to penetrate the subsurface medium.
namely sonobuoys and magnatic anomaly detectors (MAD).
Dropped from a helicopter or airplane, the sonobuoy separates into two
parts: a float and a sonar unit. The float carries the radio transmitter
that relays signals detected by the sonar to the aircraft. The sonar is
connected to the float by cable and descends to a preset depth. Generally
there are two possible depths: one is 15~20 meters against submarines at ~
periscope depth, the other is several hundred meters, so as to get below '
the thermal layer. This active or passive sonar is not disturbed by
noises generated by the float, but its small size ~10~ limits its per-
formance, particularly in hea~.~}~ seas. Another method consists in having
the aircraft drop an explosive charge whose sound wave is reflected back
from the submarine and is detected by a suitalile buoy. Sonobuoys are
usually employed in groups either to track a fast submarine or to place
a barrier in its path.
The MAD is essentially a magnetometer whose sensor element is mounted in
the tail of the aircraft or skims along the top of the water, dr~wn by a ~
helicopter. At the present state of the art, it does not function in ;
seawater. It is considered to have a short range~ll~ which depends, of
course, on the intensity of the "anomaly." For a medium~sized submarine,
this detection range is probably a matter of hundreds of ineters rather
than thousands of ineters. ~
Maritime patrol (PATMAR) aircraft are heavy land~based aircraft, but
specialized in naval warfare. Capable of remaining in the air for very ~
long periods-~20 hours in some cases~-they can operate at great distances
from their coastal bases, 600 or even 1,000 nautical miles~ The electronic '
warfare equipment, missiles, bombs and mines they carry, enable them to
fully participate in surveillance of maritime areas. They are also armed
30 .
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
.
with specific ASW wea ons--depth charges and torpedoes--associated with
MAD and sonobuoys.~12~ Throughout the world there are some 700 to 800
PATMAR aircraft: Breguet Atlantique, Lockheed Orion, Ilyushin-38, -
H~wker-Siddeley Nimrod, and the Soviet Rertev 12 r~nd .Tapnnese PS-1
l~i~ri~rlrini~~i. 'I'lii~ Irir},~~ril niiu?h~~r� Irr~lun}.; t~~ Il~t~ uu~~l~~n~' ~?~iw~�?'fi: 'tl)1)w/illll l~~
the Unlted States, about 200 to the USSR, some 4~ to France, and about
30 to Great Britain. The United States can also employ an additional
~ 100-150 ASW aircraft from carriers. Although they are lighter and have
less endurance, carrier-based aircraft do have the carrier's mobility,
thereby enabling them to operate in areas unaccessible to PATMAR aircraft.
Helicopters are relatively slow and have limited operating range when
compared to aircraft. Their advantage, however, is that they can operate
from smaller ships, such as helicopter carriers designed specifically
for that purpose, or even regular destroyers. In addition to MAD and
sonobuoys, ASW helicopters carry a sonar they can submerge while hovering,
and such associated weapons as depth c'~arges or torpedoes. -
Despite tiie stabilizers on certain ships and the imposing size of the large
aircraft carriers,~13~ the operation of carrier aircraft may occasionally
be impeded by sea conditions. Such is the price---admittedly small--paid
for extreme strategic mobility. Carrier-based or not, ASW aircraft and
helicopters have short or unreliable subsurface detection ranges. But
vis-a-vis the submarine, they do have great s eed and~ with the present
status of weaponry, almost total impunity~~14~
Submarine in the ASW Role
The submarine's first role was attacking warships. It was quite natural
that this role be extended to encompass enemy submarines whenever they
- laid themselves open to attack on the surface or even by simple lack of
periscope discipline. Attacking completely submerged submarines was an
altogether different story, and it was not until the development of sonar
that simple tracking became possible. During World War II, certain sonar-
assisted attacks were made but there apparently was never any claim made
of a successful attack achieved solely by use of sonar. What would this
situation be today?
Because it can choose, within certain limits, its depth and avoid the
doubly detrimental turbulence of the surface, the submarine is predisposed
to passive sonar. And there are passive sonars~ of the "towed linear
system" type, designed for use by submarines and capable of being employed
- when completely submerged. These systems and other more widely-used passive
sonars, such as the French acoustic range�inder, make it possible to
obtain, at least under certain conditions, the noisemaker's range at the
same time as its bearing, and also determine its nature, if not identify
it. It is plain to see that the submerged submarine can, without a breach
of security discipline, obtain accurate information on what is happening
in the liquid medium surrounding it. It should also be noted that the
noice generated by the submerged submarine may well be detected by another
31 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
rux urr~lc:lAL USL UNLY
submarine without the noisemaker's knowledge. It is in each submarine's
interest, therefore, not only to improve its use of sonar but also to re-
duce its own noise. Besides it is much easier to listen when one's own
submarine is silent.
The torpedo, the submarine's favorite weapon, has acquired unquestionable
ASW capabilities. The most remarkable of the submarine-launched ASW
torpedoes~15~ is the American Mark 48 previously mentioned as part of the
SSBN's self-defense a.rmament. But for most torpedoes currently in service,
it seems reasonable to count on much more modest capabilities. A"medium-
changing" air-water nuclear missile has been added to the arsenal of
American and Russian submarines: the American SUBROC [Submarine RocketJ
and the Soviet SS-N-15. SUBROC is launched from the submerged submarine's
regular torpedo tube, emerges from the water, maintains a supersonic,
inertially-guided rocket trajectory until it reaches the target area where
it releases its nuclear warhead that then descends into the water to a
predetermined depth and explodes. This missile is equipped with a BQQ~2
or BQQ-5 sonar system and has a 30-~mile range. These weapons--torpedoes
and air-water missiles--are designed to be fired against a noisemaking
submarine, because all firing data--bearing, range, course, and speed--
are obtained solely by sonar.
Even though the problem of identifqing the noisemalcer is probably not
completely solved, we may assume that, from a technical stanc'.point, combat
between totally submerged submarines is now possible. In the absence of
individual identification, it is relatively easy for the superpowers to
separate friendly and enemy submarines geographically, since each power
knows the location of its own submarines, l;ut such separation is tantamount
to barring its own and also third-party submarines from certain areas.
"Be quiet and listen cloaely to others." Such appears to be the golden
rule for submerged submarines, no matter who they or their adversary may be.
Because the conventional submarine spends a significant part of its'time
recharging its batteries with its diesel engines, thereby making it both
noisy and deaf, it has no hope of winning in this game. Yet, there are
still many conventional submarines in service throughout the world, nearly
150 of these in the USSR, and their anti-SSBN employment cannot be ruled
out, particularly in waters not too far from their own bases. On the
other hand, nuclear attack submarines (SSN) appear to be perfectly suited
to the anti-SSBN role. SSN's have all the qualities of the nuclear sub-
marine. They can carry the same detection gear and approximately the
same ASW armament. The SSN has lesser displacement (4,000-7,000 tons),
though the trend is to increase this tonnage. At the same time, however,
the more recent SSBN's have a displacement of 10,000 tons. In a face-to-
face confrontation between two submarines, large displacement is certainly
not an advantage.~16~ It offers a bigger and less maneuverable target.
The SSN is reportedly faster than the SSBN as a general rule. How do
their silent-running speeds compare? The answer, if it were known, would
32
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
~ FOR OFFICIAL USE ONLY
_ vary with the adversaries compared. In fact, there is no longer much in ~
common, in this respect, between the first SSN's--the American Nautilus
or the Soviet N--and the very recent Los Angeles. It may reasonably be
estimated that the Americans are in advance of the others in sonar and A3W
Corpedo dFVelo~ment. It must be not~d nlso that all. SSN'g are not deaifin~d
Eor the same primary mission. For instance, 45 of the 85 Russian sub-
marines of this type carry SS-N-3 or SS-N-7 cruise missiles as thei�r
primary weapons, and are, therefore, not predisposed to ASW, despite the
torpedoes they also carry.
All things considered, while it is possible to conclude that the SSN
represents a dangerous adversary for the SSBN, it cannot be said that one
has assured superiority over the other. A great deal depends on the class
of each of the opposing vessels and in a more general way, on the circum-
stances of their encounter. In any case, it can be said that in a battle
between two nuclear submarines, neither one would enjoy the advantage
their co~mmon character gives them over surface ships and conventional
submarines. With the exception of China, which has only one SSN about
which little is known, only three countries are capable of marshaling
SSN's: the United States, the USSR and Great Britain.~l~)
Cooperation Between the SSBN's Different Enemies
Maritime patrol aircraft and carrier-based aircraft and helicopters have
the mission of working with ASW ships. All have the equipment--radio,
radar and navigational�--necessary to cooperate effectively and fully.
_ ASW aircraft, helicopters, and destroyers constitute a wide range of
_ more or less complementary combat means, whether it be when responding
to different incidents or when reinforcing each other in the same
incident. As a result, the overall effectiveness of an ASW group of
naval aircraft and surface ships is certainly greater than the sum of
the effec.tiveness of each of its components. Tt is relatively easy, by
marshalling these means lnto a well~balanced unit, to obtain a highly.-
integrated ASW instrume�:zt capable of searching, dete~ting, locating,
tracking, and attacking a submarine, with continuity, and should the
occas~on ~arise, by capitalizing on its lack of noise and security
di~~ipline on the surface. ihe undersea areas thep reconnoiter are ~
rather limited, but thanks to the instrument'~s mobility, these forces
can concentrate on choice localities.
Air and sea ASW forces are the normal instrument for the exploitation of.
information obtained by fixed underwater surveillance systems, Such
cooperation is made possible by modern high~-speed data acquisition and
transmission equipment, and would be most imperative in the event of a
crisis or war~ But ASW forces thus employed would be more o~ less restrict~
ed to the surveillance system's geographical area.
The submarine in its ASW role, as in its otfier roles, c.an also benefit
fram information obtained from other sources. The submarine itself can
also furnish information, despite the fact that its air communications -
33
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL JSE ONLY
links lack security. But do these links permit it to cooperate tactically
with ASW destroyers? Nuclear power has certainly given it sufficient
speed to do so. Acoustic transmissions are certainly possible, but are
dangerously lacking in security for the submarine and are of uncertain
range,~1.8~ with the result that the presence of a friendly submarine in
the vicinity of an ASW force still appears to be a source of mistakes that
. are difficult to avoid. ~
There are other fortns of normal or possible cooperation between the SSBN's
different enemies. For instance, the strateg;c nuclear forces normally
receive some of the data they need thanks to surface surveillance systems.
But how is it possible to go beyond any necessary coordination when the
parties involved, for example, the tactical forces and the strategic
nuclear forces, are designed for profoundly different basic missions: the
tactical forces are combat forces while the strategic nuclear forces tend
to avoid combat? Obstacles to operations above the surface and operations
below the surface are of a different kind. At times, the means are per-
fectly integrated, as is the case on board ASW destroyers and aircraft.
And at times, difficulties arise in communications, respective tasks, or
simply specialization.
Without wishing to exclude desirable types of cooperation, it must be said
that the threshold of nuclearization, on the one hand, and the refractive
surface separating the air and sea mediums, on the other, are symbols,
each in its own way, of a certain compartmentalization between the
enemies of the SSBN weapon system.
Comprehensive View .
From this survey of the different forces and equipment capable of obstruct-
ing operations of the SSBN wea~on system, one gets the impression that
the old dispute about submersibles is indeed out~of-date: even the pure
submarine is allowed very few incursions outside its own proper realm,
namely the ocean depths, a realm now threatened by the encroachment of
fixed underwater detection systems. But generally speaking, there is a
certain incompatibility between distance and sonar accuracy. It also
seems that developments in ASW, still mainly acoustical, prompt the
destroyer as well as the submarine to maintain increasingly greater silence .
and move towards greater use of passive sonar. Possible advances in
- certain technologies such as magnetism and lasers,~19~ for example, must
not be underestimated. But at the present time and within a strategic
space that remains extremely vast, the SSBN's secrecy and concealment
appear assured, starting at a certain depth, from all of its enemies
except the SSN.
Once detected, however, the SSBN is exposed to extremely effective weapons.
It itself has just as effective weapons against surface forces and other
submarines, the SSN~s included. But it is currently,incapable of
attacking its air enemies. As for strategic weapons, rhey obviously ~ ~
merit being discussed separately and within tfie context of the system
as a whole.
. 34
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
Lastly, it is clear that SSBN's, like the rest of the weapon system for
which they se~ the pace, approach confrontation under conditions that vary
greatly with their nationality: geographical condiCions and the quantity
and quality of forces and equipment obviausly influence any confrontation.
Confrontations
Each one of the enemies of the SSBN weapon syatem has its own specific
characteristics that have enabled us to define its potential threat to
this or that link in the system. But the activities of an SSBN follow
a def inite cycle during which it is placed in a number of highly different
situat ions from a vulnerability standpoint: stay in port, departure from
port, in transit--part of it on the high-seas--to its patrol area, in its
high-seas patrol area, possible course through narrow passage, and lastly~�-
- for it must be considered---the launching of its missiles. To obtain a
comprehensive view of the system's vulnerability, it is necessary to
consider the SSBN's confrontation with its enemies in each one of these
situat 3ons, and without thereby overlookiieg its shore-based support
facilities. During these confrontations, it may be necessary to picture
different politico-+military conjunctures because these do govern in great
measure the nature of the friendly and enemy forces capable of contributing
to the missi~n's success or failure and the geographical conditions of their
intervention.
Vulnerability of SSBN's in Port and of Their Logistical Support Facilities
In port, a submarine loses everytliing that had given it secrecy, It is
vis~ble on the surface, deprived of its mobility, and sub~ect to air
reconnaissance in the same way as the logistical support facilities
surrounding it. In port, an SSBN is generally engaged in repair, main-
tenance, and resupply tasks that can be performed in only a sma11 number
of naval bases, a l~st of which can be easily compiled. On the basis
of this imformation, its location can be accurately determined despite
precautions which its size and the activity surrounding it make rather
futile. It is possible, of course, to disperse SSBN's in uncustomary
anchorages, provided these are available. But even in this case, there
is little chance that they will remain unnoticed for long.
Once its location is known, the SSBN in port is altogether vulnerable to
attack by strategic nuclear forces. Protecting it against nuclear explo-
sions appears to be even more difficult than protecting~an ICBM in its
silo or a bomber in its hardened shelter, It can be considered a normal
counterforce nuclear strike target in the same way as other components
of the system: navy yards, navy bases, weapons storage sites, logistical
and administrative support facilities, etc. Such a situation is related
to the general strategy of deterrence, and only the success of that
strategy ean provide valid protaction for the SSBN in this situation.
Furthermore, it should be pointed out that since these are coastal
installations, the threat could more likely come from an enemy SSBN
on station a short distance away, with the advantages of accuracy and
35
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OF'FICIAL USE ONLY
surprise such proximity gives its SLBM's. In fact, in attacking SSBN bases,
it is not necessary to resort to ICBM's or strategic bombers refueled in
flight. Medium-range bombers or IRBM's would be adequate in many instances.
For example, the Soviet Petropavlovsk SSBN base is less than 1,800 kilo-
meters from Chinese territory and 900 kilometers (500 nautical miles)
from the American island of Attu in the Aleutians. The British-American
- Holyloch base at the mouth of the River Clyde and the Russian Polyarnyi base
at the mouth of the Murmansk River are 2,500 kilometers apart via the great
circle.
Against nonnuclear forces, the number, dispersion, and protection of SSBN's
in port, the multiplicity of their bases, all regain their full importance,
because it takes a certain number of such forces to assure success against
- a suitably armed and manned defense. In this case, a great deal depends
on the respective strength of the opposing forces~
Because their position is known and fixed, SSBN's in port and their logis-
tical support facilities enjoy no advantage and are no different, in this
respect, fram other "persons" of the triad. They depend for their security
on either the overall nuclear deterrent or special security measures taken
in their behalf. The fact that this state of affairs is not specific to
the SSBN weapon system must not stop us from considering it here to the
extent that it affects that system's vulnerability. Indeed any attack
on the SSBN's themselves~ or on their repair, maintenance, and supply
installations would likely have an impact on the nuclear strike capability
in the short or long run. On the other hand, their destruction, even
total destruction, would not immediately interrupt this nuclear strike
- capability. The country attacked could, in effect~ under certain conditions,
retain use of its SSBN's at sea for weeks and even months. We have
already~20) seen that the SSBN exercises its deterrent power fully and
directly only when on patrol. We now know that it enjoys no special
privileges when in port. Its employment is curbed when in this position.
Vulnerability of Command and Control System
Another component of the SSBN weapon system is the command and control
system. Like the SSBN logistical support system, it encompasses land~
based facilities. But from a vulnerability standpoint, it differs
fundamentally from the logistical support system in that its destruction
might well immediately interrupt the weapon system's strike capability,
SSBN's on patrol are actually at the end of a communications net for the
issuance of orders. This net originates with those top-level officials -
who have sole authority to approve the use of nuclear weapons, and then
extends through transmitting stations to the submerged submarine~ Any ,
break in the net would make it impossible for the SSBN to receive the order
to fire. At worst, interruption of all communications with all SSBN's
at sea would be tantamount to crippling the entire system, at least
temporarily. -
_ 36
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
It is difficult but not impossible to camouflage, bury, alter~ in short,
keep a comman:i post site secret. On the othar hand, it is ~.mpossible to
mask the existence of fixed long- and very lon~~ wave antennas, some of
them several hundred meters high. The same is true about antennas suspended
from tethered balloons and erected only as needed. In contrast, mobile
transmitters like those installed in aircraft-~U.S. Navy C-130's--can
pass relatively unnoticed among other aircraft and move all over the world.
They can even compensate for their lower transmitting power by flying close
to SSBN patrol areas (with sufficient precautions so as to avoid giving
any clues on the location of these areas). Long-wave transmissions are
not the only ones a submerged submarine can receive. By raising an -
antenna above the surface of the water,~21~ it can also receive short~-wave
transmissions, though possibly with less reliability. A short-wave trans-
mitting facility is samething mur_h less elaborate, less expensive, and
easier to conceal than long-wave transmitters. It is not much more
_ discreet or unobstrusive, however, the moment it begins transmitting.
Once their location is known, command, control, and communications installa-
tions are far from being invulnerab~.e to a nuclear attack. But they can
be hardened, buried deep underground equipped with retractable antennas and
- underground wire communications, etc. It must also be noted that the
Russians and Americans have agreed by treaty to each have two defensive
nuclear antiballistic missile sites: one for retaliatory weapons and one
for the national capitol, the preeminent command and decision-making center.
Providing it is limited to a few areas, which is the case, this defense can
be effectively maintained by the two superpowers~ In any case, the keen
_ desire to preserve deterrence is apparent in this agreement, Admittedly
the agreement is a commitment made solely by two powers to each other,
but even if one country deliberately wanted to launch a first strike
denying another country any retaliatory capability, it would have to
destroy all of the target country's communications or all of its command
centers simultaneously. This simultaneity appears to be quite diff icult
_ to achieve if the command centers are numerous and interchangeable, if the ,
communications systems are made redundant and separate by their frequencies,
circuits and kind of procedures, in short, if the overall system's
structure is not like that of a single line that can be cut at any one
spot, but like a flexible and unpredictable grid. As an example, the
United States and the USSR each operate some 10 ultra long-wave trans~
mitters on their territory, to which must be added the U.S. Navy's 14, -
_ known, airborne transmitters.
Command and control systems are not only liab':e to strategic nuclear attacks
but are also threatened by "other means": raids, bombing, sabotage,
jamming, etc. A defense can be organized against such means and the stakes
involved are so high that a considerable effort in that direction is
warranted. This is a priority matter that transcends the SSBN weapon
system and applies to the strategic nuclear forces in their entirety and
to all those persons and installatio~ts capable of putting those forces
into action. Yet, even if the funds and effort allotted to securing
installations and persons were inadequate, the attacker would still not
37
FOR OFFICIAL USE ONLY
`
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
Ue sure of actiieving simultaneous destruction. How can comb.zt operations
whose outcome is inevitably uncertain be coordinated between themselves
and also with the operati.ons of the strategic nuclear forces in such a
way as to obtain total success everywhere? Jamaning, even when co�ipled
with the use of diY~ection-finding equipment to locate the transmitting
stations,.is also plagued with problems. Ja~ing long-wave and short-wave
transmissions are two different things. Transmitting powers involved are
on the arder of 1 to 100, wave propagations are different, and distances
from receiver to transmitter to ~ammer are important factors. The trans- -
mitter, far from taking no action, can change frequency, a~tenna, relay
transmitters, etc., while the "jammer" must try to find the transmission
once again and then adapt itself, as it were, to the transmission, with
all the time this entails. It does seem, therefore, that whether it be
attacks tir jamming, the defender is in a better position than the attacker
who, for his part, is obliged to obtain flawlessly successful results.
AlI things considered, each command, control, and communications facility
taken separately seems highly vulnerable. In view of its importance in
the dialectic of deterrence and of the fact that it must retain its
capability of transmitting the order to fire~ thi5 complex of installations
and persons merits priority attention from the standpoint of security
and ability to survive a first strike. In particular, it is obviously
necessary to multiply, disperse, differentiate, and make more flexible
through mobility and agility, the circuits of a network from which it
orould thus be impossible to sever all links in one fell swoop.
Vulnerability of SSBN When Leaving Port -
It was no doubt necessary to recall and groupx as we have done, a certain ,
number of basic facts about the vulnerability of land-based facilities `
and the SSBN's themselves when in port, but the cycle of deterrent opera~
tions really begins when these submarines leave the port. The SSBN must
keep its position secret, in other words, dive and begin its transit run
to its operational area without allowing anyone to track it. Its
necessary surface run to its dive point inevitably includes a shallow~ ~
water section in which it is liable to the enemy's offensive mines. This
section is more or less lengthy depending on the port and the course taken. ;
For example, ~n SSBN outbound from Polyarnyi reaches waters 200 meters
deep before it has even left Soviet territorial waters. Contrariwise, '
- an SSBN leaving Holyloch, at the mouth of the Clyde, has to cover
approximately 150 miles of water less than 200 meters deep, part of which
is outside British territorial waters. In all cases, a mine warfare
effort has to be made, including minesweeping, reconnissance of the seabed,
mine clearing and disposal. These operations are easier when conducted
above one's own continental shelf. Seyond the 200--meter depth level, the
danger from mines can be said to decrease significantly,
The SSBN now has to get to a point suitable for its dive, in other words, -
a point that is unpredictable by the enemy, safe from pryin~ eyes, and ~
38
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
_ removed from excessive commercial shipping traffic, a paint beyond which
the SSBN will find great freedom of movement in three dimensions. Because
the SSBN can be spotted in port, its departure will be noticed within a
more l.ess short period of time. Even though the time of its departure is
not known, the place is. It is tempting, therefore, to concentrate detec-
tion and tracking forces and equipment at that place: spy ships, ASW forces, -
or other means. During its surface run, the SSBN is sub~ected to the same
surveillance measur~s as in port, but in coping with all of its enemies,
it now has a certain latitude in choosing the opportune moment. To mask `
its presence, it can make use of favorable weather, light, and other condi-
tions, ruses, course changes, false departures, etc.~ while constantly
maintaining extreme communications security. The SSBN makes its departure
in its own waters with which it is very familiar, waters close to friendly
bases. It is easy, therefore, to position the forces required to keep
it informed of the location of oCher forces, to employ the most effective
countermeasures, such as radar and sonar among others, ro simulate or
dissimulate its presenee. Besides it is perfeetly lawful, even under
ordinary circumstances, apart ~rom any aeute crisis, for a country to
purely and simply exclude foreign air or naval forces from its territorial
waters. It is equally legitimate to demonstrate' beyond territorial
waters, its determination to oppose any attempt to shadow the SSBN. The
escort forces needed to express this determinatton in concrete fashion
must, therefore, be l:ept ready to intervene. Under these conditions~ no
enemy surface ship or aircraft can reasonably hope to escape notice or
avoid countermeasures.
The same is not true with regard to a submerged enemy submarine, particu-
larly an SSN, whose detection is much more uncertain, and which could,
thanks to its lack of noise,.attempt to fo11oW the SSBN by sonar without
the latter being aware of it~ But tlie approacfies to a strategic naval
base are most suitable sites for the installat~ion of underwater surve311ance
systems and obstructfon likely to keep a foreign submarine away. The
effectiveness of these systems can, of course, be reduced by counter--
measures, but in addition, the enemy submarine may be subjected to intense
sound transmissions, to maneuvers dangerous to it, and even to depth
charges. Such conditions are altogether explainable within the traininq
or test areas that surround naval tiases in all countries of the world.
7'he SSN is not~ however~ necessarily tfie SSBN~s enemy. It can be employed
in support of the SSBN~ as a decoy~ ar even in an extreme case, to get
rid of an adversary.
There is a definite benefit to be derived from shadowing an SSBN, because
the latter would then be threatened and would thereby lose most of its
de~errent power. Let us assume, therefore, that, in spite of all the
difficulties involved, a country does decide to initiate such a shadowing
operation at the outlet from a foreign base. To do this, it has to
_ maintain a Fertain number of aircraft and ships on permanent lookout. The
SSBN's necessary travel from its base to its operational area is frequently
~9
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FUR OFFICIAL USE ONLY
very l.ong, in any case it is measured in thousands of miles. This requires
an increased number of lookout aircraft and ships. In addition, for this
shadowing dectsion to really affect the opposing weapon system, it must
be applied to all combat-ready SSBN's, with each one havinR to be either
shadowed at sea or watched for at the outlet to its base. When we consider
that the United States has 41 SSBN's and the USSR 68, and that a high
percentage of nuclear powered submarines are combat ready, we can~gauge
what an effort this would mean for a navy compelled thereby to operate far.
from its bases. The "defender," on the contrary~ operates in close proximity
to its logistical support facilities and its air and naval bases where it
is free to regroup its forces as and when necessary. It is the attacker
who is likely to be the first one to grow weary of a contest that is much
more costly to him than to his opponent and offers him no real assurance
of success in exchange. We cannot, however, rule out the possibility that
a major power might openly block the exit from an SSBN base. This would
create a"Cuban" type crisis and it~must be acknowledged that the nuclear
threshold would be reached the moment the attacked country had committed
to this conflict all of the suitable forces it possesses.
It should be noted that the SSBN leaving its base is a perfect target for
a counterforce strike because it eonstitutes a strategic nuclear capa.- '
bility which, to all appearances, is combat ready. But given its mobility
and consequently the uncertainty about its exact position, it would have
to be attacked with a massive nuclear strike. This option is not consistent
with the concentration of friendly air, naval or other forces in the same
area. Consequently, the SSBN can be confronted with only one or the other
of the two threats at a given moment.
As we have seen, the SSBN makes its way out of port under highly varied
and very special conditions but the one common aspect every departure
operation fias is the change i~ must make in the SSBN's situation: the
_ passage from the "known" to the "secret," the capability of beginning its
transit without being tracked. Except for extreme cases in which there
would be a risk of triggering nuclear escalation, the success of this
operation seems to be wi.thin the capabilities of even a medium-sized '
naval power. '
Vulnerabflity of the SSBN on the High Seas , ;
Once out of port, the SSBN dives and thereby loses, temporarily at least, !
the detectability it had in its previous situation. It may be assisted �
for an additional period of time by friendly forces who will continue to -
discourage possible pursuers or deceive them about the course it has
taken. But it soon finds itself left essentially on its own with a mission
to perform. It must first get to a patrol area within a specified time, ~
_ with the course and speed requirements this entails. Sometimes it has
to move through narrow passages which place it in a dangerous position.~22~ ,
At the end of this transit run, the SSBN arrives in an area where it
must remain for weeks, ready to receive the order te fire and carry it
out properly, wfi ich means proceeding rapidly to a precise launch po3nt~
40 ~
FOR OFFICIAL USE ONLY ~
. i
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
In t}~e course of this patrol, the SSBN wi.tl come up aKainst a c.~~rtain
number c~f devices and forces qualiEicd to aearch for it, track, id~ntirv,
or attack it: surface and seabed surveillance systems, ASW air, sub-
marine or surface forces, and also strategic nuclear forces. Moreover,
it will be furnished only indirect support by friendly forces with whom -
it has no convenient communications and from whom it can normally expect
only information relayed to it by the land-based command authority.
Its Detection . ~
An SSBN on patrol can usually stay sufficiently removed from underwater
geographic~l surveillance networks so as to run only an extremely small
risk of being detected by those systems. Actually it is relatively easy
to determine their location and their capability decreases with the dis-
- tance from the coast to which they are linked. Without ruling out long-
range detection, the effect of a surveillance system is primarily to
restrict the SSBN's field of action and thus move it away from its land
targets and deprive it of entire compartments of the ocean. These systems
_ can be deafened, saturated, and deceived by explosions or other acoustic
signals caused or generated in the open sea within international waters
outside the coastal power's sovereignty, and cnnducted systematically
enough or r�andomly enough so that no correlation can be established with
the SSBN's movements. Tlie best way, however, for SSBN's to regain at
least part of their fiel.d of action is to be as silent as possible. In
this way, they actually irreparablq lessen the effectiveness~ range and
coverage of a costly and camplex system,
The SSBN cannot operate in the same way in coping with surface surveillance
systems and methods. Its breacfies of security discipline relative to the
latter stem from two sources: the need to recheck its navigation daily
and to climb to a minimal submergence depth periodically to receive radio
transmissions. The navigational cfieck requires a very brief raising of
periscope or receiving antenna. The SSBN's exposure above the surface
is,consequently, minor because of its duration, geometric dimensions,
and passive character. Nevertheless, on these occasions the SSBN does
remain at a minimal submergence depth for a few minutes. It, therefore,
runs a certain risk of detection in which weather conditions are a most
important factor. Calm seas and clear skies are favorable to reconnaissance.
Bad weather, fog, haze, mist, precipitation and wind favor the submarine.
At any give`n moment, these conditions are what they are, but the SSBN can
to some extent choose its own time. It can, for example, wait until night.
Furthermore, meteorological conditions are a factor considered in select-
ing the patrol area. It does seem that as things now stand such limited
exposure must escape high-altitude observation including the advanced
detection techniques of satellites. The situation is quite different with
respect to aircraft, helicopters and ASW ships. In a calm sea or at ~
very short 'range, they can detect a periscope that is out of the water. ~
A certain number of procedures--passive sonar, radar signal intercept~-
whose employment is prompted by the characteristics of the opposing forces,
enable the submarine to, if not totally eliminate this type of surprise,
4~
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY ;
at least make it an extremely rare occurrence. To monitor long-wave trans-
missions, the submarine does not have to surface, even to a slight degree.
All that is required is raising the treceiving loop antenna to within some
dozen meters of the surface with the submarine remaining much deeper.
To receive shorter-wave transmissions, however, the submarine has to
show an antenna on the surface. It is, therefore, placed in a position
similar to the one for its daily navigational check. The only difference
is that this listening operation is likely to take more time. For this ~
reason, it should remain an exceptional and emergency procedure strictly
for the purpose of improving the reliability of communications in the.
extreme case of an enemy attack on command installations. In handling
these systematic exceptions to security discipline, there is a broad ~
range of ineasures and countermeasures that must be taken. The submarine
commander has to make a thorough estimate of the situation, weighing the ~
need for such exceptional action against the risk involved in a specific ~
set of circumstances. This risk is usually quite small because of the ~
brevity, rarity and dimension of the breach of security discipline and
the vastness of the areas in which it can occur. Nevertheless, it is a
risk that must be weighed in an effort to reduce to an even greater extent. _
'Phe SSBN on the high seas, whether it be in transit or on patrol~ is sub~
ject to subsurface search operations conducted by ASW destroyers, aircraft
and helicopters. As long as such operations are conducted by no3sy -
destroyers or escort ships--noise made by the ship per se and its active
sonar---it can be assumed that the SSBN's passive sonar will give it -
sufficient warning to take F:vasive action before being detected, action it
can take by submerging without exceeding its quiet speed~ The situation
would be quite different for a noisy SSBN against a silent or perhaps
even stopped destroyer conducting their search operations solely by passive
sonar. The area covered by search vessels in this case is very small. -
It is possible, however, for an ASW group to extend its search sector .
considerably without increasing its noisiness. It need simply employ its
aircraft and helicopters that are practically inaudible under the surface.
Passive sonobuoys and MAD can be used by a plane or helicopter without the
SSBN even being aware of the threat hanging over its head. The SSBN
has no antiaircraft weapons and its answer to this threat continues to be
silence. Such silence can reduce the small dete~:tion capability of passive
airborne sonars while enhanr_i;~g :.~s own listening. The risk of acoustic
or magnetic detection ir.;:urred by the SSBN also depends on sea conditions -
that may impede destroyers and buoys, on acoustical propagation conditions,
on the compete:zce and number of the ASW forces engaged in the search opera-
tions, and also on the timeliness of the SSBN's maneuvers and the informa-
tion it receives. Admittedly, in this connection too, the choice of patrol
- area is important, because such choice is made with full knowledge of ~
' weather and propagation conditions, and the proximity of enemy forces.
The fact remains, however, that detection of an SSBN under the sea is
totally uncertain.
42
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY .
The risk of detection by an ASW submarine, an SSN as a rule, is also dif-
ferent. Neither of the two opponents starts out with any advanta~e in
this game.of hide-and-seek. The winner should be the one who best
combines the most efficient,lietening with the greatest silence. Though
the SSBN and SSN, as nuclear submarines, do have many characteris~ics
in common, their respective primary missions are basically different.
While the SSBN must play dead most of the time and rlee if necessary~ its
opponent, the SSN, is required to search. In performing its search
mission, the SSN has the choice of employing either active sonar or passive
sonar. In the first case, its emissions will be heard from a very great
= distance by the SSBN which, t~anks to this warning, will be able to flee
in time. But since it is already making noisp, the SSN can increase its
speed insofar as this improves its chances of detection and lessens the
warning t~.me furnished the SSBN. This makes things especially diff.icult
for the latter, in that its evasive action taken by submerging now has
much fewer chances of success than against a destroper. In the second
case (passive sonar), the SSN will have to remain silent, otherwise it wi11
be heard first. Its search operations will, consequently, cover very
little space and~it can count only on the SSBN's possible lack of security -
and noise discipline when attempting a high--speed escape from a destroyer.,
or when passing by at a noisy speed. The SSN can, of course, employ the
two methods alternately in hopes that its in~.tial use of active sonar
will be within detection range. In any case, it is up to the SSN, as the
hunter, to take the risks.
Some comparisons might prompt someone to attempt to calculate the risk of
detection incurred by an SSBN on the high seas. First, for instance, a
comparison between the duration and dimension of the breaches of security
discipline and the permanence and sensitivity ~f the surface surveillance
forces and equipment; then between the volume covered by the underwater
search means and the extent of the available area in which the SSBN ~an
take advantage of its mobility. But these comparisons vary with such
weather conditions as state of the sea, visibility, etc., with propagation
conditions, and more so, with the nature of the opposing forces, their
number, capabilities, and tactics. Hence, it is apparently difficult to
calculate.the risk, even though there is no lack of quantitative data.
But, in all cases, detection of an SSBN on the high seas does seem to be
highly problematic. As a matter of fact, except in the case of a mal~
function or damage compelling it to surface, the SSBN can choose, within
certain limits, its own time for its breaches of security discipline on .
the surface and reduce them to very little significance by suitable
maneuvers. Under the sea, its capability to remain silent and listen is
apparently the most necessary element, because this enables it, in most
cases, to be the first to hear and, therefore, take evasive action.
Alongside these very favorable factors for the SSBN, mention must be -
made of the constraints affecting its freedom of action: whether it be in
transit or on patrol in the vicinity of its launch point, it cannot deviate
therefrom in any direction indefinitelyg since it must not inordinately
~+3
FO12 OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
r~uK Ur~r~lc:lAL USE UNLY
delay its navigational check or the reception of orders meant for it, it
also cannot remain at the most favorable depth indefinitely. The im-
portance of a judicious choice of patrol area is obvious. In addition to
the distance from underwater surveillance networks, and the seasonal
_ meteorological and acoustical conditions, there are other Eactors~ such
as the distance from bases, a factor that determines how rapidly ASW
forces can intervene. The risk of detection can also vary greatly with the
opposing countries, because of their respective geographical positions
as well as their forces and equipment(satellites, for example). Nevertheless,
every SSBN has one established advantage that is opposable to any of its
enemies. That advantage lies in the very nature of its mission which
directs it to hide.
Tracking the SSBN
If a detected SSBN manages to slip away and avoid action, then the contact--
a fleeting radar echo, a distant noise--will have been merely a momentary
sign of limited value. To capitalize on this initial successful contact,
the SSBN has to be tracked and then identified.
The generally discontinuous character of high-altitude observations is
well-known. They are also mainly limited to what is happening on the
surface or its immediate vicinity. After running the risk of having been ~
spotted by such observations, the obvious th3ng for the SSBN to do is
_ to slip away immediately in three dimensions.
In contrast, fixed underwater surveillance systems are capable of more :
continuity in tracking and even in identification. Their range, however, ~
- is geographically limited and this fact allows the SSBN to stay clear of ~
them.
,
The situation is different with mobile forces~ The ASW submarine, the
SSN, can continue its initial detection without a break. Being within
the same medium, it is the ideal tracker. Their capabilities above and ~
below the surface put ASW groups of destroyers, destroyer escorts, air- :
craft and helicopters in an excellent position to exploit.any lack of
security discipline. Hence, the SSBN is in danger of being shadowed
during its patrol and thereby losing the best part of its deterrent power.
When conducted by an SSN, such a trailing operation could remain secret
and consequently trigger no support action in favor of the SSBN. TJhen
shadowed by destroyers, however, the SSBN will try to break contact with
them by, for example, forcing them to take a difficult course: into a -
head wind or heavy cross seas~ This assumes that prevailing conditions
lend themselves to such tactics but does not apply to aircraft whatever
the conditions. To escape, the SSBN will have to increase its speed, with
all of the noise this generates. Yet, in breaking contact, it can descent
to a depth where it finds a protective layer, and shielded by that layer _
it can resume a quiet speed, after having launched a few decoys. It
� will be noted that, with the exception of the decoys, not one of these _
- maneuvers will hinder a hunter (or killer) submarine: no difficult course
~+4
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
~
FOR OFFICIAL USE ONLY
because of sea conditions, no layer where it cannot follow the SSBN, and the
noise generated by the latter at high speed would be a stroke of luck for
the huiiter suhmarine. To qual3fy this advantage somewhat, it must also be
pointed out that a friendly submarine (the hunter) operating nearby is a
soi~rce of confusion for the ASW deqtroyers and aircraft.
It is obvious, all things considered, that an initial detection or contact
is not enough and that subsequent tracking of the SSBN presents a few
problems for the pursuers. It is equally obvious that on the basis of
this initial detection, promptly and properly implemented surveillance
procedures and a concentration of ASW forces will track the SSBN with
better chances of success. From that point on, everything depends on the
forces and equipment the "detecting" country wants or can allocate to the
pursuit operation, and ultimately on the forces and equipment the SSBN's
country wants or can allocate to its support. Strictly ~~peaking, the
question is no longer one of the SSRN's vulnerability but of a confronta-
tion between two navies.
Identification of the SSBN
It is not impossible to arrive at an estimate of the number of submarines
on the high seas at a given time in a situation free of any ma~or crisis.~23~
The SSBN figure is relatively easy to determine because of the permanence
of the deterrent. On Lhe British-American side there are 41 + 4= 45 SSBN's
which we will consider as a single fleet. Given their endurance and two
crews, half the fleet can always be at sea. A(previously mentioned)
unofficial American study shows in most convincing fashion that the deter-
rent effect upon the USSR increases very rapidly up to the first 20 SSBN's
but hardly at all above that number: 20 is,therefore, the figure we will
use for the British-American SSBN's in firing position, a fi~;ure that would
have to be slightly increased to account for those submarines in transit.
- The Soviets apparently do not use the dual-crew system, Hence we wi11
reduce the number of comba.t-ready SSBN's in their fleet to 68 by SO percent,
thereby giving the USSR 17 submarines at seo at all times. The Soviets
also have 22 conventional submarines armed with SLBM's. Recause of their
propulsion system, their combat readiness is quite reduced: three or four
at sea at all times, This gives the Soviets a total of some 20 submarines
at sea, or the same number as the British-American opposition. Of course~
the conclusions of the study on the deterrent effect of American SSBN's
upon the USSR cannot be transposed offhandedly to the reverse situation.
It can be noted, however, that the wlneratiility of the United States to
a nuclear strike against cites is manifestly greater, that some Russian
SSBN's have only a small number of missiles, and lastly, that Russian SSBN~s -
are generally subjected to geographical cflnstraints.~24) All thin~;s con~
sidered, it is not unreasonable to assume that the USSR is making maximvm
use of its deterrent potential, in other,words some 20 submarines,
].7 SSBN's plus 4 conventional submarines, to be specific. Counting the
two French SSBN~s, we obtain a total of at least 40 SSBN's at sea at all
times.
- ~+5 -
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
F6R OFFICIAL USE ONLY
The So>>iet Navy has 66 cruise missile submarines whose apparent primary
role is to attack surface naval forces: 48 are nuclear-powered (SSGN), a
figure that would allow some 10 of these to be at sea at all times, plus
, a possible 4 or 5 conventional cruise missile submarines (SSG). This
capability oC approximately 15 (SSGN + SSC) is probal~ly not fully em-
ployed. First, inasmuch as they are not part of the deterrent, there is '
therefore, not the same imperative reason for keeping them permanently
at sea. Furthermore, statements by top NATO officials would indicate a
lower number: 10, to be specific, including 9 nuclear. The U.S. Navy
has 73 nuclear attack submarines (SSN). This enables it to maintain
approximately 15 at sea at all times, a number equal to the number of
Soviet SSBN's at sea. According to some reports, the 15 American SSN's
are charged with maintaining surveillance of the 15 Soviet SSBN's. (It
- would be rash, however, to see a perfect correlation between these two
figures.) A reasonable estimate would place 8 of the 40 Soviet SSN's ~
and 2 of the 10 British SSN's at sea at all times. It is much more
difficult to estimate the number of conventional submarines carrying no ~
missiles (SS) that the different countries maintain on the high seas. '
It can be noted, however, that a large part of the 300 submarines in this
category are employed almost exclusively in a very localized defensive
role, because either they were t~uilt for coastal operations or their
country's policy keeps them employed in this role. This is the case with
the Swedish and Polish submarines that generally stay in the Baltic, or
with the Bulgarian submarines that remain in the Black Sea, without
excluding a certain number of Soviet submarines in both of these seas. ~
This is why the number of these submarines on tlie high seas should be
considered very small on the average, two or three dozen perhaps~
Except for those fi ures r '
g pertaining to Western SSBN s, the figures given
above are obviously by no means hard and fast~ but they do serve to
illustrate the point that normally and at alI times there may be a~ood '
100 submarines on the high seas, three-fourths of them nuclear-powered,
and among the latter, a good 40 SSBN's. There may also be a great deal
more than 100 submarines at sea, in a crisis situation particularly.
These numbers highlight the problem of identifying an SSBN. The fact
that the latter has been detected and is being tracked does nbt mean it
has been identified. Analyzing an acoustic signature is not within the ~
capabilities of just anybody, or even of ~ust any country. Submarines '
- of nearly similar design, ].ike the jAmerican) Lafayette and the jSoviet]
Yankee class, may have nearly similar signatures. Now one of the important '
aspects of a submarine's identity is its nationality, but for the super~
powers, the number of units among which such discrimination must be made
is very low. Uf the estimated probable 100 submarines on the high seas
at any given moment, nearly 40 are American and nearly 50 are Russian.
Statistically,~the odds are high that the submarine detected by one
country belongs to the other~ In addition, the area in which it is
detected may be conclusive indication of its n~,tionality: for instance,
outlets into the Atlantic from the Barents Sea~ I~astly, the position of '
submarines is not always secret: some could not exit "incognito" from
~+6
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
a closed sea (Baltic, Black Sea), others belong to a military alliance.
For the superpowers, therefore, uncertainty subsists in only a vQry few
c:~ses. In the event of a ma~or crisis between theae powers, each could
;u~turilly refr~iin Fr~m any ~siibmarine o~er~~tiona in c~rtatn arens where--
the few interested neutrai countries liaving been duly informed--any auh-
marine detected would be considered as belonging to the~opposing party.
Knowing a submarine's nationality is not enough to identify it as an
SSBN, and the latter point is most important from the deterrence stand-
point. While it is possible for a wEll~organized and well-balanced air
and nava~ group to shadow a conventional submarine until it surfaces or
at least shows its snorkel, the same procedure cannot be applied to a
nuclear submarine. Escorting it, while it is submerged, back to its
~ own territorial waters would not only constitute a de facto act of anti-
submarine warfare but also a political act that might involve the deterrent
capability of the country owning the submarine.
Attacking an SSBN
An armed attack on an SSBN is so serious that no country would deliberat~ly
risk mis~akenly identifying such a submarine. Tn any case~ such an attack
would immediately raise the conflict to the nuclear threshold. Once over
that threshold, as long as the enemy maintains contact with the SSBN,
the latter runs a high risk of being destroyed by a nuclear depth charge
or torpedo. But it can employ its own weapons against the destroyers,
- and why not do so first if it detects the destroyers first? In such
situations, its risk of destruction largely depends on the characteristics
of the opposing forces, their weapons, speed, depth and the yield of
their warheads. And all navies are certainly not on an equal footing
where these capabilities are concerned, But even if it can sink a few -
destroyers or an SSN, avoid a helicopter, and dodge a plane, the SSBN,
regardlegs of its nationality, is not likely to escape a concentration
of these ships, aircraft and SSN`s. And it~may no longer be able to
count on support from friendly forces,
The poss~ble impact of strategic nuclear forces on the risk an SSBN incurs -
on the high seas must also e onsidered~ On this particular point,
it was pointed out earlier ~25~ that except for a sort of preemptive ,
bombing of an ocean area, these forces cann~~: carget an SSBN before havirig
located and identified it. Th3s procedure takes time during which
unerring contact must be maintained if valid firing data is to be obtained.,
At the present time, the ability to Tnaintain tfiis contact appears to be
limited solely to air and naval forces that are well~equipped for ASW
operations. These forces must also have necessary communications with the
high command, We are familiar with the difficulties strategic nuclear
forces and tactical forces have in coordinati~ng with each other, particu*-
~ larly during the time of flight of an incoming ballistic missile, 15 minutes
possibly, Furthermore, the uncertainty about the SSBN~s exact position
may be as much as 6-7 nautical miles, tfiereby requiring explosive power
47
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY ~
incompatible with the nearness of friendly forces. Under these conditions,
why not assi~n the mission of attackin~ the SSBN to air and naval forces
in contact with the latter and equipped with nuclear depth char~es and,
in any case, with ASW weapons?
~ These remarks obviously make no claim to settling a debate that should
encampass, inter alia, such factors as developments in high-altitude
tracking capabilities and the accuracy of strategic arms in general. They
do indicate that, currently and apart from very special cases,~26~ i.t is
apparently difficult for strategic nuclear forces to attack a deeply
submerged SSBN, whereas ASW forces--destroyers, aircraft, helicopters and ;
submarines--are well=suited to this task.
Partial Conclusions ~
The restrictions imposed on an SSBN on the high seas are very limited. Its ~
"indiscretions" near the surface lnust be very few and brief. It must re-
main relatively close to its firing point. A few precautions in selecting
its patrol area, in maintaining secrecy, and especially in controlling '
noise, are enough to make its detection very doubtful. Accurately fixing
its position and, above all, identifying it, necessitate, almost compul- '
sorily, maintaining contact for a certain length of time. This can be done
providing suitable forces intervene rapidly, These forces would also be ;
capable of attacking it and possibly destroying it. The importance of the .
initial�detection and the next few minutes are clearly most important.
That is when the SSBN on the high seas is liable to find its deep security
compromised, a security based on secrecy. ;
A navy's destruction capability increases with the number of SSBN's in
firing positiori. Simultaneously, the wlnerability of the weapon system
as a whole diminishes, providing the system's elements have been discreet-
ly dispersed, The truth is that under such conditions it becomes more and
more difficult to destroy all the SSBN's and especially to destroy them
~ at the same time. For this reason, a nation`s second strike capability,
and consequently the overall credibility of ~ts deterrent, i.ncreases with '
the number of. SSBN's it has on the high seas, This number has been
estimated to be about 20 for tfie United States and the Soviet Union, and '
2 for France, It may vary with the political situation--crash return to
sea duty in~a crisis situation, attrition of submarines at sea in the case
of prolonged escalation-~but only to a very limited extent. ,
Vulnerability of the SSBN 3n Narrow Passages !
In proceeding to ~.ts patrol area, an SSBN may possibl,y be obliged to sail
through narrow passages between shallow waters or foreign coasts, thereby
giving tfie enemy an exceptional opnortunity to concentrate its forces on
this passage.
For this reason, a greater special effort may be made to assign su~rface
surveillance systems to narrow passages, partficularly those systems
48 '
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
capabl.e of cc~ntinu~us uperation, sucl~ ~ti :;hip and aircraft radar:; or
monitoring stations installed along the sides of the passage, Provided
strict surveillance is continuously maintained the.re is a high probability
of detecting the slightest manifestation of the SSBN above the surface. .
On the other hand, the SSBN can quite easily refrain f rom any indiscreet
action of this kind for the limited duration of its movement throuRh the
passage. Its navigational check or ascent to receive radio messages can
be postponed to a more favorable time. It can, therefore, stay at the
most favorable depth allowed by hydrographic conditions. In so doing, .
it foils the surface surveillance effort.
As we have seen, subsurface detection systems can cover only relatively
limited areas. This is true with respect to fixed networks that cover
specific geographical regions, and true also for surface, air, and under-
water naval forces whose effective detection zones are small. But the
probability of detection increases very rapidly as the size of the search
� area diminishes. This is what happens in narrow passages~ It is also
possible, providing the sides of tfie passage are in friendly hands, to
install obstructions in shallow waters and even hydrophone networks in
deep waters. The surface area to be watched by mobile ASW forces is
limited thereby and the risk of detection incurred by the SSBN in transit
is increas~d proportionately, without the searcher having to pay dearly:
continuous presence of destroyers and aircraft, systematic sonobuoy
barriers, SSN stationed at the exit from the surveillance network~ etc.
As for the SSBN, the most complete silence is not suff icient to protect it
from active sonar detection, especially since it is liable not to find a
protective layer because the depth to which it can submerge is likely to
- be limited. It is true that propagation conditions are often capricious irt -
shallow waters and that poor surface weather can impede search operations,
but there are factors over which the SSBN has no control~ Nor can it
wait indefi,n3tely for such con~~itions to favor it, beca~se it is bound
by the requirement to reach its patrol area on schedule, Many conditions
affect the possibility of detecting an SSBN in a passage: len~th and
width of the strait, depth, climate, countries tiordering the passage,
etc. The impact of these cond itions is well illustrated by certain actual
situations. For example, a Soviet SSBN sailing out of Polyarnyi to take
up station in the Atlantic has to go through two narrow passages: the
Barents Cha'nnel between North Cape and Svalbard (S itsbergen), and the
channel between Iceland and the Faeroe Islands,~27~ The first channel
is 300 nautical miles wide, but the Svalbard archipelago extends southward
in waters less than 200 meters deep to beyond Bear Island. Tn the re-
maining 200 nau~ical miles, ~ammed with ice at ~imes, the average depth
is 400 meters and the two coastlines bordering the passage belong to _
Norway, a NATO country~ (It is true that Russians are mining coal on
Svalbard, under the terms of the 1920 Treaty of Paris, and that there are
more Russians there than Norwegians.) As for the passage between Iceland
and the Faeroe Islands, it is about 230~nautical miles wide, but narrows
to 150 miles between tfie 200-~meter deptfi lines~ Soundings tfiere are rarely
below 500 meters and ice is no problem, Tfiere are American bases in
4g
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007102/08: CIA-RDP82-00850R000200030008-8
rvn vrstl.ttil, UJC upLi
Iceland, and the Faeroe Islands are a dependency uf Denmark, a NATO country,
like Iceland. Another example can be furnished by an American SSBN leaving
Rota near Cadiz [Spain] to take up station in the eastern Mediterranean.
Undoubtedly undetected, it will pass through the deep Strait of Gibraltar
not far from its base. It will then have tc move through the channel of
Sicily which is 80 nautical miles wide and where it is difficult to avoid
depths of less than 200 meters, but whose northern shore belongs to a
NATO country. Geographical conditions also have an impact on the active
countermeasures that can be taken against the essentially acoustical detec-
tion systems concentrated within narrow passages. These countermeasures
nearly always require support from naval.forces, and with their help an SSBN
could attempt to pass through undetected. ~
I
An SSBN detected inside a narrow passage does not enjoy the same freedom I
of action it has on the high seas, and as a result, it will probably be i
easier to track. Its presence in that passage is sometimes an indication i
of its nationality. On the other hand, its attack by str.ategic nuclear
forces is subjected to an additional restriction because the proximity
of friendly or neutral shores.
It is evident that the probability of an SSBN being detected in a narrow
passage can be extremely high. If all of a country's SSBN's could be
spotted in this way and then shadowed to their firing positions, this ~
would have a serious effect on the system's deterrent capability. In
addition, in the event of war, even nonnuclear war~ some of these passa~es, '
including some in international waters could be blocked, or barred by
force of arms. The advantages of avoiding any narrow passage are obvious.
They can be gained either by using a base that is more favorably situated
from this standpoint, c+r by establishing a new base, The United States ~
established forward bases in Guam, Holyloch and Rota, but it did this
probably to reduce transit time to firing positions more than to avoi~d '
narrow passages~ It must also be noted that it is not absolutely neces-
sary for an American SSBN to pass through the channel of Sicily. It is
already within range of Moscow when on station in the western Mediterranean,
and even in the northern Tndian Ocean. The situation is much more difficult -
for the Soviet Union which actually sorely lacks outlets to the oceans,
The port of Petropavlovsk is better situated in this respect than the
Arctic ports, because it provides a direct outlet to the vast expanses
and deep waters of the Paciffc Oc~an. It does,.nevertheless, have the
disadvantage of being icebound"part of the time~ On the other hand, the
existence of a forward base on Novaya Zemlya does not seem improbable.
That island is far from any foreign base and well situated, at least during
some periods of the year, for operations under the ice cap where waters
reach a depth of several thousand meters, Navigation undPr the ice cap
does, of course, present some.difficulties, but it also provides definite ~
assuranc~~s of invulnerability. The SSBN is practically shielded from its
enemies, except the SSN and strategic nuclear forces. It can launch its
SLBM~s from points clear of ice, Tf such points are :~ot available, it can
move out to a launch point on the edge of the ice cap. Consequently~ _
a Delta~class SSBN carrying SS~N-~8 SLBM`s is free to take up ~tation under
the ice cap within range of the urban and industrial centers of the -
; Great Lakes region.
50
- FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02148: CIA-RDP82-00850R040240030008-8
FOR OFFICIAL USE ONLY .
Vulnerability oF SSBN When L:iunching ICs SLBM's
The firing of an SSBN's missiles is envisaged in this analysis only in case
. deterrence f.ails. But the fact is that ior this deterrence to exist, firing
these missiles must be possible. It must be demonstrated beforehand, in
other words, before hav~ng tu employ them, that their destruction capa-
bility is real. How vulnerable then would an SSBN be in this very special
- situation qf firing its SLBM's? Without discussing the antiballistic
missile defense, it must be pointed out that the SLBM holds an advantage
by keeping the deterred party uncertain as ta its launch point. Also
~ worthy of ~ote is the fact that should advances in the antiballistic
missile defense require it, the SSBN could move closer to its target at
the very last moment so as to make int~rception more difficult. At that
moment, the SSBN's vulnerability is viewed in a new light: it is no
- longer a question of survival, but indeed, for once, of making sure it
fires.
There is no doubt that the SSBi3 could be detected once its first missile
leaves the water, by different surface surveillance means: satellites
with infrared sensors, airborne or shipborne radars, etc. On this basis,
is it possible to destroy the launcher quickly enough to stop it from
firing? The interval between the launch of two SLBM's is known to be less
than 1 minute (,~xcept perhaps for the older versions)~ For an SSBN armed
with 16 mi~siles~--the most prevalent numher per SSBN---total elapsed firing
time is, therefore, less than 15 minutes, From the defender's viewpoint,
however, this time must be further reduced, because if the defender were
to use all of it, that would mean attacking an SSBN after it had already
launched its missiles. Moreover, in a city-busting strategy, rhe first
missilFs are the most important ones, because they threaten the most
"victims~" In fact~ an SSBN capable of launching its first three SLBM's
is extremely deterrent and leaves its adversaries only 2 minutes to destroy
it. To prevent it from launching half of its~missiles, the defender has
even less than 7 minutes, The SSBN could, zn principle, c.ease firin~
after having launched a few missiles, and then run and hide, Given the
post--launcl} submergence attitude difficulties and the time~ even very
limited, to get up to escape speed, it would probably take the SSBN not
less than 10 minut2s to be 3 miles away from the launch point, the order
of magnitude of a nuclear depth cnarge`s radius of destruction, At this
- escape speed, the SSBN would be audible at a great distance, As a result,
- its security would not necessarily be improved when it be~;an its second
series of launches, The real solution would appear to be to increase
its rate oP fire instead, Even a reduction in the number of SLBM's carried
by each SSBN must not be ruled out, The figure 16 was arrived at on the
- basis of a variety of considerations that are revisable,
At all events, the total firing time of tlie SLBM"s is very short, and
that is why the strategic ballistic missile, which is certainly the fastest
_ of the SSBN's e~emi.es, may also tie the most plausiLle~ Assuming the _
SSBN is 2,000~3,000 kilometers from enemy "counterbatteries"-~by no means
51
F~R OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
excessive, considering the ran~e of modern SLBM~s--the time of flight is ~
on the order of 10 to 15 minutes. To this, must be added the time it takes
- the enemy strategic nuclear forces to receive the information (launch ~f
the first SLBM), plus the time needed to compute firing data. It is
evident that all SLBM's will have been launched before the first counter-
battery missile reaches the launch point. Rut couldn't an enemy SSBN
ba assigned this mission, thereby reducing the time of fl ight? Even though
the SSBN's primary mission does not militate for this solution, it must
not be ruled out offhand. Tt is hard, however, to imagine the launching
of the first SLBM being immediately detected and fired upon by an enemy
SSBN. Communications with an intelligence activity seem necessary. This
would take an irreducible period of time that would leave little time for
the missile's time of flight. All things considered, tha chances of
strategic nuclear counterbattery fire appear very slim,
Naval forces could, for one reason or other, be a short distance from the
SSBN at the moment it fired, close enough to compensate for their rela.*..ive
slowness. Assuming that a destroyer heads for the launcher's positiun as =
soon as the information is received: at a speed of 30 knots, it will have ~
covered 5 nautical miles in 10 minutes, In thF same period of time, a
torpedo traveling at 45 knots covers 7,5 nautical miles, a distance which,
at this speed, is not far from its maximum range. An ASW aircraft already
airborne and traveling at a speed of 400 knots will have covered more ~
than 60 nautical miles at 400 knots. A supersonic missile of the SUBROC ~
type has a range of only some 30 nautical miles~ It is obvious, therefore,
- that for one reason or the other, speed or range, these naval forces would
have to be extremely close to the SSBN at the moment of its first launch
to have any chance of intervening before its last SLBM is fired.
1 The reaction time allowed enemy forces of all types is apparently very
short. Yet, the SSBN~s vulnerability while firing depends greatly on
another set of circumstances~ I:f the SSBN is unleashing;a first strike~
the odds are that the enemy will be completely surprised~ Tf, on the other
hand, it is launching a second strike, tfie launcher of tbe first strike,
aware of the danger it is in, can definitely be expected to tske active .
measures to seek and destroy the SSBN's before they fire, These measures
will include: centralization and extremely rapid redissemination of
intelligence data and reports, advance delegation of authority to fire,
and the most judicious deployment of all available forces~ 7n short~ -
_ reaction times will be reduced by every possible means. Tt is obvious -
that under these conditi,ons, an aircraft carrying a nuclear depth charge,
for example, would const~.tute a real dan~er for the SSBN, Tt must be
admitted, however, that at this stage in the "proceedings," all forces
would be engaged and the SSBN's would be benefiting from the actions of
their own forces while simultaneously subjected to those of the enemy.
Lastly, it should be noted, with reference to the effect of the strategic
nuclear forces, that the enemy, having launched the first strike, has -
already expended at least part of its counterforce capabity on other
.
~ 52
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
targets. This reduces the threat to SSBN second.-strike launches accordingly,
The number of SSBN's is also a factnr in this connection. But, whether
it be launching a first or second strike, the SSSN that has not L~een de~
tected beforehand has some time between the launeh of its first SLBM and
the arriv~l of enemy weapons. It can, therefore, fire at least its first
missiles, the most deterrent ones, and the impurtance of destroying it
lessens with each of the subsequent missiles.
Conclusions-Prospects
From the different confrontations we have described between elements of
the SSBN weapon system and its enemies, it follows that the SSBN on the
high seas is in a very special and favorable position against the strategic
nuclear forces as well as the other forces. In fact, shore installations,
SSBN's in port, leaving port, in narrow passages, or while firing, are
- located or are seriously liable to be. Contrariwise, detection of an
SSBN on the high seas is highly problematic. As long as it is not located, ~
it enjoys an exceptional degree of safety. It is not a possible tar~et
_ for strategic nuclear forces, except in a very special case. A~;ainst
other forces, it survives through secrecy, and in a way that is largely
independent of the balance of forces. This part of the weapon system,
in this situation, is especially difficult to destroy in that it normally
includes more tinan one SSBN in firing position, and that all of them
would have to be destroyed simultaneously: of what use would it be, from
a wiSe deterrent standpoint, to knock out one of them, if the other
- SSBio'~~28) still remained capable of striking a death blow?
To have such a capability, however, one other condition has to be satisfied.
All the time they are in the privileged situation of being undetected on
the high se~s, the SSBN's continue to depend, for their firing, on a
~ command and control system that does not offhand enjoy the same advantages,
That is w~hy this link in the chain must be made as secure so the SSBN's,
a goal that can be achieved at the price of some effort.
One part of the weapon system--its logistical support facilities and the
SSBN in port�.--is very vulnerable to strategic nuclear forces. It must
be emphasized, however, that even its total destruction would not
immediately incapacitate the system, because the SSBN's on the high seas
would continue to m~intain the nuclear strike capability, providing they
remained in communication with their command authority. Another note-
worthy point is that even in narrow passages, even when firing their
missiles, and even when detected or~ the high seas, the SSBN's are not
very vulne�rable to strategic nuclear forces. As a result, the system's
ability to survive a first strike is particularly good. In any event,
it is much better than the,survivability of ICBM's or strategic bombers
whose locations are hard to conceal. Of course, the latter are not devoid
of all mobility. Striking proof nf this was given by the American
_ strategic bombers that were kept on continuous airborne alert for several
years. The United States then abandoned this practice in favor of more
~ 53
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
effective and less costly procedures, so that its strategic bombers are
now based on a certain number of well~scatteredt well.-protected airfields~
but in easily known locations liable to a first strike. Even the ICBM's
are not devoid of all mobility: on rails, highways, cross-country
vehicles, and even in trenches. But this mobility is very limited and
generally obtained at the expense of direct protection. The SSBN's, in
contrast, can find in the greater part of tfie world the few hundred ~
meters of ocean water that are sufficient to protect them and at the same ~
time keep them secret. This confirms their special qualification--
suggested earlier~29)--for use in the second strike, and consequently
their importance to maintaining the general credibility of the deterrent.
Yet what good would it be for an SSBN to escape any nuclear strike only ~
to then be destroyed by other forces? So much depends on the circumstances--
number and quality of weapons and detection capabilities in different
countries, more or less judicious employment of forces and equipment,
geographical, oceanographic, and meteorological conditions~~that it is ~
impossible to overlook the risk, even if it is small, of its being detected ~
at sea~ and then tracked, identified and ultimately destroyed or prevented
from firing. The only eventuality that can currently be dismissed as being
very unlikely is that a certain number--sti11 to be determined--of the
SSBN's of one country will all be simultaneously prevented from firing.
Sooner or later, an SSBN will have to return to base and then leave it ,
again so as to maintain the deterrent`s continuity. At that time, certain
factors outside of its control, such as the balance of forces, number '
and geographical location of bases, will have an impact on its safety. :
Lastly, the importance of obligatory passages must not be underestimated. '
Here also the balance of forces and even more so the respective strategic
positions play a major role. Patrol areas themselves depend on these -
basic considerations to a certain extent. This is why it would be wrong
and dangerous to even think of laying down as a principle that the SSBN is
invulnerable. Far from exploiting the weapon's system's exceptional
qualities as if they were situational benefits, it is absolutely necessary
to seek to maintain them and, if possible, expand them, in spite of
adverse circumstances and the course of events.
Lastly, to judge the weapon system's deterrent capacity, it does seem ,
_ necessary to put oneself in the position of the party being deterred. ~
To do this, confrontation has to be carried to its ultimate point. For
this purpose there is a"logic of deterrence" accepted by at least two
countries--the United States and the USSR--in their negotiations. This
logic, or if you prefer, this dialectic, is knpwn to everyone because the -
two protagonists openly resort to it, even in discussions with "supporting
role" countries. According to this logic, the attacker must eli.minate
his opposite number~s strike capability, completely and in one fell swoop.
If really necessary, the attacker could m~rely weaken that capability
enough so that the damage it could still inflict upon him would be ~
tolerable in his opinion. But he would inevitably be unaware of certain
basic facts of the situation that depend largely on the adversary~
Consequently in this type of assessment of the situat,ion, rhe attacker
5~+
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
would have a tendency to retain a safety margin to compensate for this lack
of information: how could he possibly envisage with detachment the risks
of a nuclear strike? Indeed there does appear to be a very high probability
. tt~at a few SSBN's will be able to launch a few missiles. There may he
varyin~; views on just how high or even low this probability is, but before
he makes his decision, the attacker would have to have a zero probability,
or one that is very nearly zero, because those few missiles threaten -
millions of human lives. SSBN's do possess certain invulnerability factors
that contribute considerably to the weapon system's deterrent character.
It is this aspect that makes the installation of nuclear ballistic missiles
on nuclear submarines a ma3or achievement,
The SSBN's qualities of inwlnerability--extreme mobility, the secrecy
and protection it en~oys when submerged, tfie conditions the weapon system
as a whole must abide by~ number, reliability of coimnunications~ etc � the
_ basic facts of the strategic situation, balance of forces, respective
geographical position--~are all so many essential elements of information
necessary to make an assessment of the system's deterrent power or to ~
determine the kind of forces one country needs to deter another. It is
also possible to project these elements of information into the future so
as to analyze, with less uncertainty perhaps, the risks that confront
any development as a result of technological, strategic and political
changes, ahd draw the ium~ediate conclusions therefrom: urgent requirements
relative to research, manufacturing capacities and budgetary 3ecisions.
55
FOR OFFICIAL USE ONLY.
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
o~ ~
r~ ~
~ .
~ ,
cd 1~ N ~G O ~r1 v1 00 f~ ~t1
J-~ r~ N ~7 N N f~ OG r-I O
01 H ~ ~--I ~t N u'1 00
r-I .
O
P~+
c~ ~
a.i y '
~ ~
O 3~+ ~
a o � o 0 0 ~ ~ ~ ~ ~n
0 0 0
O U er1 M
9,
.a
,
Cl G! !
a u
~ ~
?~s+ ~ o 0 0 0 ~ ~ s oc .
Ur ~ n1 N N
w
b
~ '
~
3 ~ ~ o 0 0 0 ~ ~
~ r-I r-I r1 r-I c~1
.C ~ . ,
~ ~ ~op N~ ~D O r-1 O u1 N I~
~ ~ ~O N ~7' N ~t N U1 ~D r-1
r-I ~--I r-I M .
H
N
U �
~ ~ O O O t+1 O ~T p .7
~ ~
f~ ~-1 ~--I r-I N
~ p y
fA
L�. ~ ~ 4! ~ Ul
~rl ~ C~~i
N r-I rl ~ t,~j ~ ~ ~
~ cd a~ ~ ~ ~ c~d ~ ~ ~ r-i vJ
~ (A - F+ ~ ~ Gl ~ ~ cd ~--1
ctl N p~q u~ r~l ~ U tq y~ C+ R! ~
W~ q H C~
i c~'d r~-1 1~ C! ~ y y ~ O
~ o ~ N eJ rl ~ ~ ~ aG ~ .~C H � ~
Gl ~ 'G+' ~ i~.l U f~A ,f"~,, Ul 1.~1 U 1~-~ r-I � .
~.L .n P~i W O ~ C7 ~~rl C9 O~rl Z 1~ i~ U ctl
~7 C-~i v~i ai c~n N u g ~ co ~ Rf ~ o
~ Z U C9
N y
~ ~
c0 1 m
~ ~ ~
H ~ ~ ~ m t~d ~ t~A ~ +
z ~ ~~ow� ~
u ;
q u 'n ~ v~i cuc ~ ct1 ~ '
U N `b0 G! 00 H b0 q c~U !
"~oo~ ~~a~i ~v~ia`~i ~a,~
~ v a~ x w u :x u ac a v u,
~ u s~ u ~ u u ~
0o cda w~o ~u~o cd,~cd cd ~
- a ~ ai~ ~ ~w ~ cow ~ ~nw ~
~ ~ ~ H
56
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
FOOTNOTES
l. A~reen Pilter is conducive to penetrating water~
_ 2. The corresponding bands of the spectrum are called "atmospheric
windows."
3. Minimum satellite altitude is generally considered to be
160 kilometers. -
4. This does not preclude an internal phenomenon, a change in temperature, -
for example, from reacting upon the surface, This explains the
occasional reference to the detection of submerged submarines by
= their "thermal wake," a method which thus far does not,seem to offer
any promise.
5. See seetion entitled "Submerged Operatior?" [in previous article
of this series].
6, Robert Kuenne, "The ~~laris Missile Strike~" Ohio State University
Press, 1966.
7. The usP of mines in deep water is not ruled out, but results are
much r~,~re uncertain.
8. See discussion on acoustics in sectipn entitled "Submerged Operation"
[in previous article of this series].
9. Exclusive of small coastal vessels.
10. Total weight of an (active~ sonobuoy is 15-25 kilograms.
11. The distortion in the magnetic field caused by the metal of the
submarine decreases with the cube of the distance.
12. PATMAR aircraft can carry several tons of equipment for airdrop~
13. The big American aircraft carriers are more than 300 meters long
and have a displacement of 90,000 tons.
14. The British Navy, however, does have a small antihelicopte~: missile-- -
Sarbacane--capable of being visually launched from submarines. -
15. Can also be employed against surface ships.
16. See paragraph on large deplacement tonnages in section entitled
"Ballistic Missiles"[in previous article of this seriesJ.
57
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
17. See Table 4 at the end of this article~
18. Lasers may possibly contribute something in this field,
.19. Laser emissions into the blue and green bands of the visible spectrum
have reportedly already made some penetration of the liquid mass
possible, but to an extent that is still insufficient for the
detection of submarines.
20. See section entitled "Employment of SSBN's" [in previous article of
this series].
21. This condition is likely to make the weapon system lose part of the ~
vulnerability it is meant to have, That fs why this problem will be
reexamined in a~ubsequent section dealing with the SSBN's vulner-
ability on the high seas,
~
22. See subsequent section entitled "~*ulnerability of the SSBN in Narrow
Passages."
23. Table 4 at the end of this article will help in making such an estimate,
24. See following section on "Narrow Passages."
- 25. See paragraph on strategic nuclear forces in this article's opening
section entitled "Enemies of the SSBN."
26. See subsequent section entitled "Vulnerability of SSBN When Launching
Its SLBM's."
27. Other possible passages between the Faeroes and Shetland Islands, the I
Dernnark Strait, etc., appear less favorable. ~ �
28. Plus naturally other strategic nuclear forces: ICBM's~ bombers, etc.
29. See section entitled "Employment of SSBN's" [in previous article of
this series]. '
COPYRIGHT: 1979 STRATEGIQUE
8041 ~ .
CSO: 3100
58
FOR OFFICIAL USE ONLY
. ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
. COUNTRY SECTION FRANCE
FUNCTION OF DTCN OUTLIN~D~ I~XPLAINID
Paris ARME~S D~AUJOUR~`�HUI in French Oct 79 pp 46-47
[Article by General Jean Touffait]
[Text] Among the activities of the Technical Directorate for Naval Con-
struction (DTCN) xhich ax~e performed for the national navy the activity
of "new construction~" the production of combat ships, is certainly the
best knoxn or in any case is that activity upon which the organization's
reputa.tion is essentially besed.
The importance of maintenance activities should not be forgotten hoxever~
the maintenance of the SNIE [missile-launching nuclear submarine], surface
vessels, a.nd attack sub~uasines.
The particular place of new conatruction is xorthy of eiaphasis hoKever
since it represents on the one hand the end result of all of the pre-
liminary studies on materials and equipment ar~d on the other hard. the
o~igin of maintenance activities xhich xill be all the more easy to carry
out if the construction has been done ~+ell.
Operational Management
In its constzvction activities as xell as its research activities the DTCN
acts as the General Delegation for Arniament's operational manager resp-
onsible for the conduct of reseax~h and develepment and the manufacture of
~ materials~ aircraft, tanka, armament syste4s, ships...aquipping our forces,
In ma,tters of nex construction the rale of the DTCN is in pMnciple similar
to that of t,he DTAT (Technical Directozate for Ground Armament) since both
of these diract,orates have their oiru resources for reaearch and large-scale
msuufa~ture. The DTCA (Technical Directorate for Aeronautical Construction)
and the DTB (Technical Directorate for Missiles) on the other hand relq
completely on induatry for the manufacture of materials for Khich they are
responaible,
This hiereschical attachment of the D't~CN in the accomplishment of its taak
and in the definition of its reeponsibilities does not exclude it from
close and continuing relations xith the naval genere~l staff insofar as
59
FOR OFFICIAI. USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFiCIAL 1JSE ONLY
product definition is concerned. But the funda,mental decisions are made
wi.thin the DTCN. The "customer," the El~i (Naval General Sta,ff), is not the
exclusive grantor of "orders." The "contract" that ties it to the DTCN,
the "supplier~" is the responsibility of the minister of defense with the
minister as final arbiter ard the genera.l dalegate for armament responsible
for ca,rrying out these decisions.
A Long and Collective Job
Numeroua services provided by the DTCN become involved during the four
successive phases of conception~ construction~ and placing in service of
a particular type of combat vessel.
- A preliminary proposal is repared by the Technical 5ervice for Naval
Constxvction and Ordnance ~STCAN] in response to a military need~ ex-
pressed by the EMM~ for a certain effectivenesa characterized by a
particular level of perPorn~ance. The authors of the preliminary propcsa,l, ~
assisted by a teain of specialists~ formulate the technical solutions xhich
Will achieve the sought after perfonnance and, estima.te the costs involved.
The cost effectiveness aspect of the study xill later influence govez7unental
authoMties in their final decision.
After the initial selection is atade the proposal that has been chosen ~s
then given exhaustive study by the sae~e xell-equipped team at STCAN with
assista.nce fram the const~ction yard, if knoxn. At t~e conclusion of this
phase it is possible to prepa,re a descriptive document running to hundreds
of pages accompanied by plans a,n,d schematics, called "genere,l specifications,"
which reveal the axchitecture,l coherence of the pro3ect and specify its
performance chare,cteristics. Of course the "estimate" for the work is aleo
preparad during this phase. ,
Constzuction begina as soon as the first program authorizations are re-
leased.. Directed by a STCAN engineer Who is the program direct,or it
mobilizes the resources of= 3TCAN, where the epecifications for the
'"installations" are xritten= DCAN [expsnaion nnisnoxn] at the port of
constniction (for further inforaation on this dub~ect eee the article
about the head engineer Tret,out)~ and numerous auppliers (the cost of.
,aaterials supplied represents from 50 to 70 percent of the cost of the
ship) on coatracts issued either by the specialized departments of 5TCAN
or by the construction yard. The ECAN at Indret, for the pro~ulsion
system, and t,he ECAN at Ruelle for miscellaneous equipment~ are also
involved as suppliers. (Both are organizations subordinate to the DTCN).
The placing of the ship in service is marlced by txo dates~ that of the
- official presenta.tion for official tests ~ the sta.rt of the official sea
trials, and the completion of armament, the end of responsibility for
new construction and the beginning of responsibility for the fleet maint-
ena.nce service. Engineers from the DTCN are member~ of the permanent
testing commission as well as local testing commisaions and participate
actively in this xork.
JO
FOR OFFICIA;. USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY -
Of course the complexity of a project such as building a Karships the
necessity for constructing a prototype Whose equipment is not outmoded
by the time it goes in service and which muat be made operetional as
rapidly as possible, result in tha four phases described above overlapping
each other somawhat. Cor~atruction usually begins befora all the elements
~ithin the gensral specifica.tions have been drexn up and even after the
ship is completely armed there xill remain some unfinished xork before _
some equipment~ specifications for xhich may have run exceptionally late~
can be made o~erational.
The construction of a combat vessel., and ~icularly that of a series
prototype (never very important otheririse is thua the collective xork
of ma~y branches of the DTCN xith the aid of numerous industrial firms.
Among all those personnel involved~ a,~d without any attempt to minimize
theiic merits, I must enrphasize the paxticularly important part played by
the two engineers who xork very closely together:
The program director (at STCAN) is in charge of the government coordinatlon
and of Iiaison with the general staff~ study of the proposal an~d the
esta.blishment of specifications, responsible xithin the DTCN fnr the
management of expenditures, the handling of delays, overall industrial
coordination~ and the taking of preparatory steps for maintenance.
The "charge engineer" at DCAN~ the shipyazd contrsctor~ providea for
coordfna.tlon of construction~ assembly, scheduling of installations, a.nd
assembling ~;:~qether of a11 of the materials for armament a.nd replacements.
He deals xith the designated commander and the ax~mament team and actively
participa.tes in the organization of an~d conduct of teats carried out at
dockside and at sea.
General engineer Jean Touffait, born in 1924, is a former studebt of the. -
Ecole Polytechnique and the Ecole Nationale Superieure for Ma,ritime ~
Ma.nagement. His caseer has been tota.lly devoted to submariness enginear
in chazge of construction~ research, ar~d plang, aad then head foreman at
Coelacanthe until 1976 When he xas named technical director for naval
constzuction.
COPYRIGHT: 1979 - Rewe des forces axmeea franca.ises "Armees d'Au3ourd'hui"
7779
cso: 3100
~1 -
- FOR OFFICIlu. USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL IISE ONLY ~
(:(1lIN'I'ItY SI;C'I'.IUN I~I~ANCIti .
'
MIMSTER OF INDUSTRY GIRAUD INTERVIEWED
Paris L'EXPANSION in French 21 Sep 79 p 23
[Interview with French Minister of Industry Andre Giraud--date and
place not given]
[Textj [Question] On 24 September you presided at the opening of an
international symposium on the subject of "Computer Science and Society."
The president of the republic said a few words. Most certainly the
subjece is important, but why must the state organize a.debate on the
subject?
[Answer] Because exchanging ideas is essential. Our society will be
profoundly transformed by the entry of computer science in practically
all our human activities. It is necessary for all our fellow citizens to
h ave at their disposal all necessary inforniation to enable them to use
_ their own jud~nent. We must not enter gropingly into this new era; we
must light and beacon the way. The aymposium called "c anputer science and
society" replies to this objective.
[Question] The average man feels that canputer science threatens his
employment. Are there any precise views on the net result of computer
science in France?
[Answer] The balance-sheet is incontestably positive. Today.computer
science in France employs more than 320,000 people of which 72,000 are in
the hardwa~ and software industry. This is far superior to the number of
jobs abolished by computer science. Between now and 1985, in a rathex
pessimistic hypothesis, 120,000 new joba should be created, of which 17s000
should be with contractors and service canpanies. ,
It is difficult to evaluate the reduction in ecnployment due to tha use
of computer science. In fact, in most cases, the gains in productivity '
which it engenders are compensated by the growth in service needa and
the increase in competition between the enterprises which use it.
[Question] And what of the threat to free~om? Computer science will ~
_ effectively increase the powers of the state. Is good power necesarily
weak pawer? Or does c anputer science entail intrins~c risks?
62
FOR OFFICIAL USE ONLY
.
_ . . . . _ _ I
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
[Answer] The notion oF "good power" is so vague.... Yes, computer science
entails risks. As a matter of fact that is why the good options must be
taken. This applies exactly the same as for all tools with which a nation
or society can be equipped; everything depends on its use. Let us illustrate
the above: Will computer science be used to accentuate the centralization
of power, or, on the contrary, to increase or strengthen its decentralization?
It allows either one or the other of these options:
How to protect man from possible excesses from unbridled computer science?
On an important point, that of individual freed an, an answer was given by
the law voted in Parliament in 1977, whereby every citizen has a right
to question and rectify the computer data which concerns hi.m. France is
_ the f irst one to have enacted this legislation, which many states have
imitated since then.
[Question] What is the present place of French industrial computer
science in the world?
[Answer] In turnover (15.3 billion francs in 1978) France is fourth
behind the United States, the Federal Republic and Japan. It is second
in terms of exports as regards services. Among world-wide ~roups CII-Honey-
well-Bull is, with its partner Honeywell, in second position. SEMS
(expansion unknown), fourth in this field. Einally, the first three
European sprvice companies are French.
[Question] Can France be usefully represented in all the fields of computer
_ science ir~dustry? Or must a choice be made? Which are our good points
and which are our weak points?
[Answer] France is one of the five countries in the Western world which
possesses a c anplete computer science capacity, including the production
of large and medium computers. Only these five countries can be represented
in the markets of computer science and teleprocessing systems. The panoply
will now have to include the space segment, and there we will also be
represented by Ariane and our satellites.
For us this is a matter of having a definite purpose supported by a long-term
financial, technical and industrial effort, which, however, is within our
reach .
Certainly, we still have our weak points: integrated circuits, large
magnetic memory, "time-sharing" data-handling system, intercepted data.
We are trying to reduce them, but we must support and exploit our good
points: logician, numerical, telecommunication ystems, new teleprocessing
services.
~t~uestionJ Taking this data into account how is France's industrial
policy oriented?
63
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
[Answer] We help our industrialists become cognizant of new products,
new techniques at an early date, promote innovations loosen restraints
which t?amper growth. Facilitate the acclimatization of new applications
of computer science to the French market, informing, trai.ning and helping
the users to master the computer science tool. Make the French market
- a luunching ptiitform Cor the conquesl of the international m~rkeC, which ie
_ a vital condition for the existence and prosperity of this industry.
[Question] If you were asked to replace the expression "computer science
and society" by a verb, which one would you choose?" i
[Answer] I would say "Computer science makes society progress."
COPYRIGHT: S. A. Groupe Expansion
7993
CSO: 3100
64
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ODTI.Y
~ COUNTRY SECTION FRANCE
DUTIES, ACTIVITIES OF TEC,'dNICAL RESEARCH CENTERS NOTED -
Paris ARMEES D'AUJOURD'HUI in French Oct 79 pp ~2-53
LArticle by Chief Armaments Engineer Paul Talboutier: "Choose Today To Be
able To Fight Tomorrow"/
/Text/ Chief ArmamenS.s Engineer Paul Talboutier, who entered the Polytechnical
School in 1949 and graduated xrom the school of maritime engineering in 1954,
has devoted 23 years of his career, first to the construction and testing,
and then to the designing of submarines. He was successivel~ responsible at
DCAN /Central Directorate for Naval Weapons and Shipbuilding/ in Cherbourg
for the "Narval" ty~e submarine, for the Submarine Testing Center, and -
finally for the "Redoutable" ~~e strategic nuclear submarines. Deputy,
= and then Chief of the STCAN /Tzchnical Service for Naval Construction and
Ordnance/ submarine section, he assured the technical coordination of
_ strategic submarine research, took part ~n thE design of the Agosta attack
submaz~ines, and finally directed the "Provence" attack type nuclear submarine -
desiQn and definition studies. He is now deputy director of research at
_ DCAN in Toulon. `
The sur�ace or submarine combar,, vessel, a true moving fortress, must be able
to navigate far from its base for long periods of time in a naturally hostile
environment, while always keeping intact the capacity to fight and the `
immediate availability of its crew, material, equipment, and armament systems
for the executiori of its mission.
The vessel must be designed for a large defense capacity against both military
and environmental atta.cks, and it must contain or support a~.1 the materiel
and installations to guarantee propulsion, piloting, navigation, security,
the crew's safety, diving (in the case of submarines), radio communications
, to the outside, detection (electromagnetic, acoustic, infrared, etc.) and
. identification of all moving things (surface, air, and su.bmarine) present in
its vicinity, processing and presentation of the tactical information gathered
~ by the detection, and assistance in command decision-making and so-called
offensivn or defensive~combat actions (armament systems: artillery, missiles,
torpedas, etc.). ~ -
65
- ' FOR OFFICIAL USE ONLY ~
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY .
The Necessity of Technical Research...
- .
This means that the techniques and technology used in the design and
construction of warships are extremely diverse and cover a very vast domain
of expertise. Moreover, it must bE said that a warship's definition results
inevitably from an architectural compromise between the performance require- _
ments, from the viability and maintainability of the various components.
This is a difficult compromise because of the numerous constraints of weight,
- volume, and cost which the designer must consider. With the aim of making
the best possible compromise, it is necessary to call upon the latest
techniques and technologies in use and accessible when the design of the ship
is conceived. On the other hand, the designers and builders of warships
and naval war materiel must always conduct research or have research conducted
in all the concerned technical areas, so to have at their disposal a sufficiently
advanced "state of the art" when the ship':s design is approved; to respond
with the best chance of success to the operational requirements of the
military program of a ship which will be put to sea 4 to 6 years later and
- which will have a life expectancy of 20 to 30 years!
In parallel with these warship construction and design activities, DCTN r
/Technical Direction of Naval Construction/, either by its own means or by
, encouraging outside public or private organizations, conducts research
activities in numerous technical areas, doing basic research in areas which
are particularly pertinent to it, ssch as hydrodynamics, submarine acoustics,
and living under prolonged confined conditions.
...In the Most Diverse Disciplines
The following list gives only a general idea of the areas covered:
--suitable materials for naval construction, assembly and fabrication ~
procedures; -
--protection against marine corrosion, marine paints;
--resistance of structures to forces encountered at sea in regular ser~ice
and in combat situations;
--hydrodynamics (propulsion, maneuverability, sea worthines~);
_ --propellers (screws, etc.) and propulsion systems using fossil fuel or
nuclear energy;
- --naval electrotechnics;
--running noise levels of ships (ways in which propulsion and machine
running noises are generated and transmitted to the water and research on
their reduction);
66
FOR OFFICIAL USE ONLY �
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
--submarine acoustics (propagation, emission transducers, reception
hydrophones, electronic systems for extraction and treatment of acoustical
- signals);
--!aarine applications of radioelectric transmissions (propagation, transmitters
and receivers, optimum installation of on-board antennas, long-wave reception
under water, discretion);
--electromagnetic detection applied to the aeromarine environment (watch
and pursuit radars, radar signal processing);
- --application to the aeromarine environment of new means of detection and of
the pursuit of targets (infrared, laser, television);
--electronic countermeausres (radar detection and jamming, and interfering
radio transmission);
_ --systems for processing and presenting tactical information and for assisting
the command in making decisions;
--automatic systems for pursuit and for weapons control;
~ --navigation instruments, vertical positioning, marine inertial powerplants;
--marine pyxotechnics (marine munitions, flares, and light signals, military
charges for submarine arms, awareness of the electropyrotechnic devices ~
used aboard ships, etc.);
---submarine weapons, particularly torpedos and mines;
--guidance and launching devices for torpedos;
--devices far launching strategic and tactical missiles from submarines;
--living under prolonged confined conditions (control and regeneration of
the atmosphere in submarines, psychological effects of atmospheric pollutants).
General Organization and Methods
Technical research conducted by DTCN is programmed and directed by STCAN,
an agency which is attached to the central administration in Paris, and
which is also in charge of design and definition studies for the various
- types of warships and weagons systems (in the broader sense of the term)
which equip them, conforming to the following organizational chart.
_ The principal directions of research and the corresponding directives are
defined by the various STCAN technical groups, each group retaining its
own responsibilities for research techniques, project development, the
direction of "ships" and "systems" programs, and for regulation in its own
technical area. General research coordination is done by a special STCAN
group.
67
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
The research, according to its nature or special requirements, is awarded ,
to either public or private agencies under STCAN's control (by way of
contracts or market research), or internal agencies of DTCN and apportioned
among its various centers (either at the main level: laboratories for
material resiatance and structures, STCAN's underwater hull testing basin,
technical section of the marine planning center; or in the provinceE).
1
Cherbou
\ ~
Brest
Lor ient
3 Indret
4
5 Ruelle -
Toulon Saint-Tropez
7
. I
The following are the research agencies installed in the arsenals around
the.counCry:
1. DCAN Cherbourg: Cherbourg center for testing techniques and evaluations
(CETEC), devoted to submarine research;
- 2. DCAN Brest: Atlantic submarine research group (GESMA) devoted to the
study of mines and submarine acoustics;
6a
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
3. DCAN Lorient: study and research group for ballistic weapons and
munitions (GERBAM);
4. ECAN Indret: test facilities and the laboratory of the study and
control of materials (LECM) attached to the sub-directorate for tests and
studies, doing research on propulsion devises and naval electrotec'hniques;
5. ECAN Ruelle: engine research group;
- 6. DCAN Toulon: research sub-directorate, comprising five research agencies:
research group for telecommunictions and weapons systems (GESTA), research
group for pyrotechnics (GERPy), research group for torpedo tubes and launching
techniques (GETEL), research group for submarine detection (GERDSM), research
group for submarine technology (CERTSM);
7. ECAN Saint-Tropez: research sub-directorate for all torpedo research.
So the work force devoted to technical research, outside STCAN, is about
2,500 people, of whom 450 are engineers and military. Particular mention
must be made of the research sub-directorate at DCAN Toulon, which comprises
about 2,100 people, including 200 engineers and military. Its location allows
it to work closely with EMM's applied studies commission to define the naval
materials use policy, thus insuring the adequacy of the research for operational
needs.
Hence, DTCN always prepares the warships of tomorrow in cooperatior. with those
who will be the future users.
COPYRIGHT: 1979 Revue des forces armees francaises "Armees d'Aujourd'hui"
9374
CSO: 3100
69
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
COUNTRY SECTION IT~Y
d~
CONSIDERATIONS FOR RENEWAL OF THE MEZZOGIORNO LAW
Milan CORRIERE DELLA SERA in Italian 15 Oct 79 p 1
[Article by Romano Prodi: "Business Leaders Looking Toward South"]
[Text] With the approach of the termination of the Mezzogiorno Law, discussion
is again being revived.on what has been accomplished in the last few years
and what should be done in the future. A conference organized by the
Democratic League in Erice recently pointed the way for new discussion on
the South, a discussion which will be at the center of attention during
the next few months. This renewed discussion is quite timely in that the
problem of the South has changed before our eyes, even though it is still
quite serious both from the quantitative and qualitative aspects.
Let us consider a few basic: statistics. The figures tell us that the level
of unemployment in Italy is now 7.3 percent of the work force. This intormation
is of no real significance in that for males the unemployment level is 2.8
percent in the North, 4.9 percent in the central area and 7.2 percent in the
South. For females the figures become slightly less than 10 percent in the
North, 12.8 in the central area and 17.9 in the South.
As is obvious, the figures show a very high rate of employment of males in
the North to the point of requiring an increasing influx of foreign workers,
whereas the situation is ~ust the opposite when it comes to the women and
the South. It would be idiotic to use the same economic policy in the face
of such variable data.
A second consideration is the following: despite the unemployment levels,
there are increasingly fewer people leaving that area. Confusing earned
income with pensians and income of other types and having difficulty in
finding housing in the North have in fact caused a great decrease in the
migratory flow. As expected, the result is the necessity of making a
renewed effort to locate economic activities (industrial and service-type)
more toward the South. And this in a period of slow industrial development
inasmuch as the availability of worker personnel in the country's southern
areas is tending and will tend still more to decrease and therefore be
insufficient for the demand.
70
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
r vn ur r 1l:lAL USE ONLY
y The preblems encountered by southern firm~ which migrated to the South and
the expectations of companies planning to go there in the near future are
described in a well-prepared study made in Emilia by the Regional Federation
of Industry. It contains valuable lessons for the future stated in simple
language. In the first place, the companies interviewed (nearly all small
and medium-sized) relocated in the South to be near market outlets for
their products and, frequently, because they were forced to do so by a
short labor supply or a shortage of industrial sites in the vicinity of
corporate headquarters. However, tfie role of financial incentives was
less effective than anticipated; they helped to some extent but did not
result in any great relocation to the South. Moreover, it might seem down-
right incredible that 34.7 percent of Emilia firms operating in the South
did not even request the financial incentives provided for by the law:
wasted time and timidity in the face of public administration and all the
red tape involved caused more than a third of the companies to reject the
pillar on which the policy of the South was based up to now. The lesson
is clear: automatic incentives are worth a hundred times more than those
which must be obtained through a long series of negotiations. However,
what is of greater importance is the difference in the cost of borrowing
money, which is unfavorable to the South, and the absence or lack of
information regarding the existence of subsidiary firms operating on behalf
of third parties.
Business organizations, like peoples or animal herds, do not move about by
themselves but rather in groups, because they live by helping each other.
This is also a worthwhile lesson. Moreover, we must say that more than two
thirds of the companies are satisfied with the initiative taken and would
do the same in the future, while 60 percent even have plans for expansion.
Therefore, let us not be influenced only by cases of bankruptcy, which are ~
plain for everyone to see; many fires have glowed under the ashes. To be ~
sure, there is another side of the coin which is evidenced by 30 percent
of the firms which encountered maddening obstacles of a material nature
but, more particularly, of a human nature. In such instances, it seems
that special effort was made to make life impossible for the firms. However,
in general, the lack of specialized personnel is the greatest obstacle to
development in the South; this is true to the extent that radical change can '
be achieved only by an overall revamping of professional instructions at ~
all levels, from the most elementary to the most sophi~ticated. This must
be the starting point of the South of the 1980's.
I
The last consideration concerns the regions in which the firms have located
or intend to locate in the future: the Adriatic strip from the Southern Marches I~,
to Apulia constitutes the lion's share, with two-thirds of the decisions. This I
is only partially explained by the region's proximity to the North; the true ~
explanation is that in the Adriatic strip there are fewer influences of a
political and social nature. That is, the firms, although wanting to live in '
groups, are free animals and do not reproduce in captivity. Moreo~er, it
~ 71
FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
must be noted that the number of companies which have plans to invest in
the South (with programs already established) has grown considerably in
the last few years and is still growing. Therefore, new deciaions regarding
Ghe South ehould be based on the simple premise that busineases heading in
- tiiat direction should adopt foreseeablc and rational modes of behavior. New
legislation must also be rational, automatic and transparent. It is on these
characteristics and not on the liberal dispensing of incentives that the
f uture development of the South should be based.
COPYRIGHT: ~979 Editoriale del "Corriere della Sera" s.a.s.
8568
CSO: 3104
72
_ FOR OFFICIAL USE ONLY
APPROVED FOR RELEASE: 2007/02/08: CIA-RDP82-00850R000200030008-8
APPROVED FOR RELEASE: 2007/02108: CIA-RDP82-00850R000200030008-8
FOR OFFICIAL USE ONLY
COUNTRY SECTION TURREY
BUSINESS GROUPS SEEK BANK OWNERSHIP
London THE MIDDLE EAST in English Nov 79 p 125
[Text] ~n paper tti~e Banlc of Afyon eculi~rs, f~:n~l Ak.w~~. tiub:mi. Under the amendment,
appears like a bank which one KOC ~ nearest cumpetit