From these considerations it follows that we are able to group all naval operations in some such way as this. Firstly, on the only assumption we can permit ourselves, namely, that we start with a preponderance of force or advantage, we adopt methods for securing command. These methods, again, fall under two heads. Firstly, there are operations for securing a decision by battle, under which head, as has been explained, we shall be chiefly concerned with methods of bringing an unwilling enemy to action, and with the value to that end of the maxim of “Seeking out the enemy’s fleet.” Secondly, there are the operations which become necessary when no decision is obtainable and our war plan demands the immediate control of communications. Under this head it will be convenient to treat all forms of blockade, whether military or commercial, although, as we shall see, certain forms of military, and even commercial, blockade are primarily concerned with forcing the enemy to a decision.
Our second main group covers operations to which we have to resort when our relative strength is not adequate for either class of operations to secure command. In these conditions we have to content ourselves with endeavouring to hold the command in dispute; that is, we endeavour by active defensive operations to prevent the enemy either securing or exercising control for the objects he has in view. Such are the operations which are connoted by the true conception of “A fleet in being.” Under this head also should fall those new forms of minor counter-attack which have entered the field of strategy since the introduction of the mobile torpedo and offensive mining.
In the third main group we have to deal with the methods of exercising control of passage and communication. These operations vary in character according to the several purposes for which the control is desired, and they will be found to take one of three general forms. Firstly, the control of the lines of passage of an invading army; secondly, the control of trade routes and trade terminals for the attack and defence of commerce; and thirdly, the control of passage and communication for our own oversea expeditions, and the control of their objective area for the active support of their operations.
For clearness we may summarise the whole in tabulated analysis, thus:—
1. Methods of securing command:
(a) By obtaining a decision.
(b) By blockade.
2. Methods of disputing command:
(a) Principle of “the
fleet in being.”
(b) Minor counter-attacks.
3. Methods of exercising command:
(a) Defence against invasion.
(b) Attack and defence of
commerce.
(c) Attack, defence, and support
of military expeditions.
* * * * *
CHAPTER TWO
METHODS OF SECURING COMMAND
* * * * *