A Cyber-Information Operations Offset Strategy for Countering the Surge of Chinese Power Pt. 2

The following is a two-part series on how the U.S. might better utilize cyberspace and information operations as a Third Offset. Part I evaluated current offset proposals and explores the strategic context. Part II provides specific cyber/IO operations and lines of effort. Read Part One here.

By Jake Bebber

Targeting China’s ability to control information is an efficient means to offset Chinese power. To be effective, the United States should adopt a “whole of government” approach, leveraging cyberspace and other information related capabilities that can hold China’s domestic internet filtering, censorship, and information dissemination capabilities at risk. This campaign should operate across the entire spectrum of conflict and engagement, from public diplomacy and strategic communication, to battlespace preparation, limited conflict, and if de-escalation is unsuccessful, full-spectrum military operations. It will likely require coordination and administration at the highest civilian leadership level. This will be a long-term campaign aiming to counter China during the critical window in the next ten to twenty years when Chinese economic and military power will surge, and then subside as demographic factors limit its growth causing China to enter into a period of decline and inherently shifts its focus inward to to maintain stability.

The United States will have to address three broad issues: access, authorities, and capabilities. Internet access into China is restricted from the outside, and it is reasonable to assume that during a period of rising tensions or even conflict, traditional means of accessing China’s “red space” (civilian, military, and government networks) will not be available. The U.S. will need alternative avenues into Chinese networks, which may take the form of radio frequency injection into wireless networks (Bluetooth, WiFi and WiMAX)[i] to other methods targeting the physical and logical network layers and cyber-persona layers[ii] of cyberspace for preplacement of access.

Figure 1. The Three Layers of Cyberspace[iii]
The Three Layers of Cyberspace [iii].

The authority of the U.S. government to operate in cyberspace crosses boundaries and jurisdictions, and largely depends on the function of the agency or entity. Traditional military activities conducted by the Department of Defense are covered under Title 10 of U.S. Code, with the principal being the Secretary of Defense. Other titles supporting cyberspace operations include foreign intelligence collection (Title 50), domestic security (Title 6), law enforcement (Title 18) and government information technology security and acquisition (Title 40).[iv] These authorities will have to be aligned and deconflicted.

The capabilities required run the spectrum. They can include fully attributable on-net operations, such as a Foreign Service Officer participating in an online forum or social network to communicate U.S. policy, to the development of tools and malware that can degrade and disrupt command and control networks. Other possibilities include the distribution of encrypted personal communication devices and unattributable social media and organizing applications that permit dissident groups within China to maintain situational awareness.

There have been attempts to respond to China’s growing Internet censorship capabilities by those in the telecommunications industry and by the U.S. government. The Global Network Initiative was started in 2008 by industry, civic organizations, and universities to “promote best practices related to the conduct of U.S. companies in countries with poor Internet freedom records.” In 2011, the President issued the “International Strategy for Cyberspace.” Its goals include “enabling continued innovation for increasing economic activity, increasing individuals’ ability to communicate with one another, safeguarding freedom of expression, association, and other freedoms, and enhancing both individual privacy and national and international security.” The U.S. Department of State includes Internet freedom as a part of its global human rights agenda. In 2006, State formed the Global Internet Freedom Taskforce which later became the NetFreedom Taskforce, to coordinate State Department efforts monitoring Internet freedom. Both the State Department and U.S Agency for International Development have received funding for the development of Internet censorship circumvention technologies, training of non-government organizations and activists, media assistance, and leading international policy formulation on Internet freedom.[v]

The Broadcasting Board of Governors, which oversees the Voice of America (VOA) and Radio Free Asia (RFA) programs, also supports counter-censorship and circumvention software development and distribution. The VOA sends daily emails to “8 million Chinese citizens … with international and domestic news stories as well as information about how to use proxy servers.” The RFA has implemented the Freedom2Connect program to “research, develop, and deliver online tools for Internet users in China to securely browse online and send secure e-mail.”[vi]

While important, the current response by industry and government lacks both the senior policy coordination required of a grand strategy or adequate funding to keep up with China’s growing Internet monitoring and censorship capabilities. They do not fully leverage other assets and tools at America’s disposal. The U.S. can and should be doing much more to attack China’s critical vulnerabilities in information control.

Lines of Effort

Public Diplomacy – At the interagency level, the United States should continue pursuing bilateral, multilateral, and international agreements such as those mentioned above which promote freedom of information, expression and freedom from government oversight and censorship. The U.S. should also continue to strengthen international regimes against cybercrime and intellectual property theft. Internet norms and rules should be standardized across political boundaries where practical. This diplomatic effort ties into longstanding American policy of supporting freedom of speech and protection of universal human rights.

Economic Policy and Trade – Here again, longstanding American policy supporting property rights and free trade legitimize the continued advocacy of international agreements and accords promoting freedom in cyberspace. At the same time, the U.S. must tighten technology export controls to nations like China that continue to restrict access. In the event of industrial espionage or even cyber-attack, the U.S. can impose real economic costs and sanctions. The U.S. can also move on the Global Online Freedom Act, which would, among other things, prohibit U.S. companies from cooperating with foreign governments that engage in censorship or human rights abuses, require the U.S. Trade Representative to report on trade-related issues that arise out of a foreign government’s censorship policies, and impose export controls on telecommunications equipment that can be used to carry out censorship or surveillance.[vii] Some of these provisions can be waived when it suits American interests. In other areas, the U.S. can also promote public cybersecurity regimes, such as international risk insurance tools and accreditation that encourage network protection and hardening in the private sector.

Strategic Communication – In modern war, the actions of a single Soldier, Sailor, Airman or Marine can have a far-reaching impact on national strategy. While this is often used to highlight the potential implications of an untoward or controversial event, the reverse also holds true. The actions of every member of the U.S. government, from Foreign Service officer, embassy staff and humanitarian assistance officer to those of the military can have an equally positive impact if the appropriate messages are coordinated and timed to unfolding events. The United States should expand strategic communication tools such as Radio Free Asia and Voice of America. Using new capabilities in cyberspace and in personal communications, a comprehensive program of unbiased news delivery and strategic messaging to the Chinese public on a much larger scale can, over time, provide alternatives to Chinese government propaganda. Not to be forgotten, approximately two million Chinese visit the United States each year as tourists[viii], and around a quarter of a million Chinese students attend college in the U.S.[ix] Each visitor and student represents an opportunity for engagement.

Cyberspace Operations – Being able to deliver effects in and through cyberspace to China is a question of both access and capabilities. China has one of the most robust and sophisticated information control systems in the world, with multiple internal security and military organizations and tens of thousands of Chinese working daily to censor communications and filter access within China and between China and the world. Network penetrations and preplacement access generation needs to occur now, during peacetime, and continue throughout in order to assure capabilities can be delivered when needed. The fact is that when tensions escalate and China erects more firewalls, penetration becomes that much more difficult, if not impossible. This leaves military commanders and policy-makers little choice but to revert to traditional kinetic tools to dissuade Chinese aggression – exactly the scenario they hope to avoid – and plays to China’s strengths. Developing multiple access vectors now with the capability to hold at-risk, at a time and place of our choosing, information control systems in the long run represent an efficient means of directly attacking China’s most critical vulnerability and holding the Communist Party’s political control at risk. This represents an asymmetric counter to China’s growing A2/AD capabilities, and is a far more efficient and economical alternative.

bebber1
A snapshot image of cyber attacks. Source: Norse Corp.

Cyberspace operations reside on a continuum, sometimes offensive, sometimes defensive and sometimes both simultaneously. At the same time the U.S. is developing access vectors and tools to exploit China’s information control systems, it must also harden its own military, government, and civilian critical infrastructure networks. Research suggests that improving cyber defenses limit incentives to infiltrate networks for espionage, intellectual property theft, or cyber-attack. A resilience model should be adopted. Instead of building “cyber walls” using a traditional warfare model, cyber defense should model biological systems that can adapt and recover. Systems can be designed to turn the table on intrusions, misdirecting them down false alleys or “sinkholing” them in so-called “honeypots” for study. This can even be effective in passing back false information or simply causing the attacker to waste time and resources chasing phantoms.[x] On the offensive side of the continuum, experts like retired Army Lieutenant Colonel Timothy Thomas see the development and fielding of 13 offensive cyber warfare teams as significant. According to him, the Chinese “now know we are ready to go on the offense. There’s something that’s been put in place that I think is going to change their view.”[xi]

Clandestine Action – Due to the difficulties in acquiring and maintaining access in closed networks, the United States will have to undertake clandestine efforts, both in cyberspace and through traditional means. Policy makers should be careful, however, not to be lulled by the lure of technologically-based cyberspace operations as the preferable alternative to traditional human intelligence operations. While the U.S. is right to continue to pursue advances in unmanned vehicles, radio-frequency and electro-magnetic operations, and space-based computer and communication operations, obtaining and maintaining access  in many cases will require mixed-mode penetration: human and cyber action. Cultivating human sources to gain insight into leadership intentions, network configurations, and potential areas of exploitation remain a critical part of a broad information operations campaign. As China continues to pursue clandestine operations against the U.S., both to gather traditional intelligence and to enable their own cyberspace operations, our own counter-intelligence and cyberspace defense capabilities will become that much more important.

These lines of effort will have to be synchronized in a mutually supporting effort. Public diplomacy and strategic communication can be enabled in and through cyberspace. Clandestine action may be required to obtain and maintain access to critical networks. Economic incentives, technology export controls and sanctions will play critical roles at times to advance America’s interests to degrade or disrupt China’s information control systems.

It will be necessary to develop options which degrade China’s information control capabilities incrementally while preserving significant reserves. Historically, this has been especially tricky. Past experience, such as the Vietnam War, suggests that the incremental application of force with too fine of control tends to condition the adversary rather than compel the adversary. The U.S. will need to be able to send “warning shots” that indicate to the CCP that we possess capabilities that will cause them to lose control entirely and threaten their hold on power, allowing the U.S. to prevail. Of course, given that many cyberspace and IO capabilities are perishable once used, the U.S. will need to maintain a host of capabilities able to be delivered across multiple vectors and times and places of our choosing.

One must be mindful that while China’s information controls systems are a critical vulnerability, they are not a gateway to the overthrow of the CCP and the establishment of a democratic government, at least not right away. Data suggests that the vast majority of the Chinese public who utilize the Internet and social media are quite happy with the amount and variety of content available. Only about 10 percent use the Internet for political purposes with the remainder, like their American counterparts, using it for entertainment and socializing.[xii] Therefore, strategic messaging will have to be much less overt and subtler.

We should utilize the natural advantages the U.S. has in the entertainment and public relations world to encourage the public to put pressure on the government gradually, perhaps not directly in the political sphere but rather on natural fissures and tensions already resident, such as corruption, mismanagement, ethnic strife, uneven development, environmental degradation, and the growing wealth gap in China. Consider the recent effort by the U.S. Department of State to publicly highlight air quality in Beijing, resulting in embarrassment as well as change in China’s environmental policies.[xiii] Similar efforts, both public or through providing covert support to internal groups in China, would hopefully have similar impact. The goal will be to keep the CCP looking inward, concerned about social stability, rather than outward, projecting power.

To be successful, it will be necessary to understand at the highest level of detail possible not only the technical aspects of China’s information control apparatus but also its command, control and communication pathways, chain of command, and decision making calculus. Technical intelligence requirements would include network configuration pathways, router and server equipment models, operating and surveillance software versions, administrative controls, wireless hot points and air gaps and fiber network systems. The U.S. will need to know which agencies and bureaucracies are responsible for various kinds of surveillance and what their resident capabilities, gaps and scope of responsibility is. It would be helpful to identify key personalities and understand the resource competition between them in order to exploit them. We need to know how commands are passed down from leadership to operators, and if it is possible to deny, degrade, and in some way get in the middle of those communication pathways. We will also need to know the decision calculus of the Central Standing Committee. What will cause them to want to tighten control, or perhaps better yet, what might they simply ignore? This is certainly not an exhaustive list of intelligence requirements, but gives a sense of the kinds of information that a successful strategy will require.

China’s Response

In war, the enemy gets a vote, so policy makers and military commanders must carefully consider and “wargame” China’s response to a U.S. effort threatening its information control systems. By doing so, the U.S. can better prepare courses of action that counter potential Chinese responses. Traditionally, planners will break down adversary responses into two categories: most likely and most dangerous.

China’s responses are naturally shaped by their historic understanding of their place in the world, and especially the recent “Century of Humiliation” and the role that historical grievance plays in this understanding.[xiv] Attempting to shape the CCP’s ability to control information within China has a direct impact on the regime’s need to mobilize popular support in times of crisis or even war. The CCP has come to realize that “it cannot simply demand compliance and access to materials, people or facilities” as it probably once could during the days of Mao Zedong. The CCP and the PLA have undertaken “a systematic attempt to plan for mobilization, integrating it into economic development.”[xv] This planning includes “information mobilization” due to the “central role of information and information technology, especially in the context of informationized warfare.”[xvi] The various activities proposed here to attack critical vulnerabilities in China’s strategy should be viewed by policy-makers on a continuum of escalation. Public information campaigns highlighting air quality in Beijing will annoy the CCP in a much different way than denying China the ability to filter Internet content or threatening regime legitimacy.

March 22, 2013: Staff members of the newly-merged State General Administration of Press, Publication, Radio, Film and Television pose for group photos during a ceremony to hang the new nameplate in Beijing (Photo Credit: Xinhua/Wang Zhen).
March 22, 2013: Staff members of the newly-merged State General Administration of Press, Publication, Radio, Film and Television pose for group photos during a ceremony to hang a new nameplate in Beijing (Photo Credit: Xinhua/Wang Zhen).

China’s most likely course of action will be to continue to “plug the gaps” that any U.S. program creates in their information control system. This is a beneficial byproduct since the Chinese will continue to expend time and resources with an inward focus, possibly diverting some of its effort away from cyber espionage, or change its focus of cyber espionage from intellectual property theft to countering U.S. efforts. It will continue to partner with “like minded” regimes such as Russia, Iran, and Venezuela, perhaps targeting U.S. allies in Asia, Africa, and the Middle East, to advance an alternative international rule set and standard. China’s “Internet Agenda” will continue to focus on international recognition of state sovereignty over cyberspace, a global internet regulatory scheme that targets cybercrime and terrorism (with sufficiently vague definitions of “crime” and “terrorism” to allow for maximum latitude), and the legitimate role of the state to remain the “gatekeeper” to their country’s access to the internet.[xvii]

We can surmise what effect this strategy might have by examining world events and how the PRC responded when it felt threatened by internal pressures. For example, China has had a difficult relationship with some Muslim nations due to persecution of Uighurs in Xinjiang province. The recent decision by Thailand to repatriate nearly 100 Uighurs back to China was met with harsh criticism from the United Nations Refugee Agency and the international non-governmental organization Human Rights Watch. Reporting suggests that Beijing may have pressured Bangkok, and Chinese persecution has strained relations with Turkey, which has both ethnic and religious ties to the Uighurs in Xinjiang.[xviii] In September of 2014, Ilham Tohti, an economics professor and member of the CCP, was sentenced to life in prison  by a Xinjiang court for “inciting separatism” and inviting “international opprobrium,” according to Georgetown University professor James A. Millward.[xix]

China’s continued crackdown on Internet access appears to be having a direct impact on business and foreign investment, according to surveys conducted by the European Union Chamber of Commerce in China and the American Chamber of Commerce. Respondents noted that foreign firms feel “less welcome,” poor air quality makes it harder for firms to recruit executives, and that recent regulatory enforcement campaigns “target and hinder foreign companies.”[xx]

These two examples – internal repression, censorship and the impact on international relations and foreign investment – expose vulnerabilities in how China chooses to stem threats, which come at a cost to China. Therefore, we have insight into how proposed information activities which parallel previous events might look and the anticipated costs. A Cyberspace/IO Offset targeting China’s information control systems can be expected to result in more extreme or diverse efforts to clamp down on information and economic exchange, perhaps ratcheting up internal dissent or imposing economic costs as foreign investment slows.

Conclusion

By targeting China’s information control system, the United States can directly attack China’s most critical vulnerabilities and weaken its center of gravity, the Chinese Communist Party. By placing these controls at risk, PRC leadership will come to believe that their hold on power and ability to maintain domestic harmony is in jeopardy. This will permit the United States to effectively and efficiently counter Chinese power during a critical window of the next ten to twenty years, when demographic and economic headwinds will cause China to enter a period of decline.

A whole of government approach is often advocated but exceedingly difficult to execute in our federal system. The strategy will require careful coordination and long-term vision, two capabilities that Western democracies are notoriously deficient in. Due to the nature of the strategy, lines of effort and operations can become quickly compartmentalized in classified channels, which will make coordination that much more difficult. Importantly, much like the policy of containment against the Soviets, it will require buy in from across the political spectrum, also no easy task.

Ultimately, a Cyberspace-IO Offset permits the United States to leverage its unique advantages, both technological and historically ideological, to attack China’s critical vulnerabilities asymmetrically. Despite the challenge this strategy poses, the U.S. has shown historic resiliency and proven adaptability in the past, and the present is no different.

LT Robert “Jake” Bebber USN is a Cryptologic Warfare Officer assigned to United States Cyber Command. His previous assignments have included serving as an Information Operations officer in Afghanistan, Submarine Direct Support Officer and the Fleet Information Warfare Officer for the U.S. Seventh Fleet. He holds a Ph.D. in Public Policy from the University of Central Florida. His writing has appeared in Proceedings, Parameters, Orbis and elsewhere. He lives in Millersville, Maryland and is supported by his wife, Dana and their two sons, Vincent and Zachary. The views expressed here are his own and do not reflect those of the Department of Defense, Department of the Navy or U.S. Cyber Command. He welcomes your comments at jbebber@gmail.com.

[i] George K. Kostopoulos,  Cyberspace and Cybersecurity. (Boca Raton, FL: CRC Press, 2013).

[ii] Joint Publication 3-12 Cyberspace Operations defines the Physical Network Layer as “comprised of the geographic component and the physical network components. It is the medium where the data travel;” the Logical Network Layer as consisting of “those elements of the network that are related to one another in a way that is abstracted from the physical network, i.e., the form or relationships are not tied to an individual, specific path, or node;” and the Cyber-Persona Layer as “the people actually on the network. Cyber-personas may relate fairly directly to an actual person or entity, incorporating some biographical or corporate data, e-mail and IP address(es), Web pages, phone numbers, etc. However, one individual may have multiple cyber-persona, which may vary in the degree to which they are factually accurate. A single cyber-persona can have multiple users.”

[iii] Joint Chiefs of Staff. Joint Publication 3-12 (R): Cyberspace Operations. (Washington, D.C.: Department of Defense, 2013).

[iv] Joint Chiefs of Staff. Joint Publication 3-12(R): Cyberspace Operations.

[v] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy.

[vi] Ibid.

[vii] Ibid.

[viii] Chen Weihua. “2.1 Million Chinese to Visit US This Year.” China Daily USA, May 23, 2014, accessed December 24, 2014. http://usa.chinadaily.com.cn/us/2014-05/23/content_17538066.htm

[ix] Institute of International Education. “Top 25 Places of Origin of International Students, 2011/12-2012/13.” Open Doors Report on International Educational Exchange. 2013.

[x] P.W. Singer and Allen Friedman. “Cult of the Cyber Offensive.” Foreign Policy. January 15, 2014, accessed Demcember 24, 2014. http://foreignpolicy.com/2014/01/15/cult-of-the-cyber-offensive/

[xi] David Fieth. “Timothy Thomas: Why China Is Reading Your Email.” The Wall Street Journal. March 29, 2013, accessed September 24, 2015 . http://www.wsj.com/articles/SB10001424127887323419104578376042379430724

[xii] Thomas Lum, Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy.

[xiii] David Roberts. “How the U.S. Embassy Tweeted to Clear Beijing’s Air.” Wired, March 6, 2015, accessed April 2, 2016. http://www.wired.com/2015/03/opinion-us-embassy-beijing-tweeted-clear-air/

[xiv] Zheng Wang. In China, History is a Religion. The Diplomat, June 16, 2014, accessed April 2, 2016. http://thediplomat.com/2014/06/in-china-history-is-a-religion/

[xv] Dean Cheng, Converting the Potential to the Actual: Chinese Mobilization Policies and Planning, in The People’s Liberation Army and Contingency Planning in China, Ed by Andrew Scobell, Arthur S. Ding, Phillip C. Saunders and Scott W. Arnold (National Defense University Press: Washington DC, 2015). P. 130-131.

[xvi] Dean Cheng, Converting the Potential to the Actual. p 111.

[xvii] John Jamison. “China’s Internet Agency.” The Diplomat, December 23, 2014, accessed December 28, 2014. http://thediplomat.com/2014/12/chinas-internet-agenda/

[xviii] Oliver Holmes. “Thailand forcibly sends nearly 100 Uighur Muslims back to China.” The Guardian, July 9, 2015, accessed September 24, 2015.. http://www.theguardian.com/world/2015/jul/09/thailand-forcibly-sends-nearly-100-uighur-muslims-back-to-china

[xix] James A. Millward.“China’s Fruitless Repression of the Uighurs.” The New York Times. September 28, 2014, accessed September 24, 2015.. http://www.nytimes.com/2014/09/29/opinion/chinas-fruitless-repression-of-the-uighurs.html

[xx] Calum MacLeod. “Foreign firms in China gripe about Internet, pollution.” USA Today, February 12, 2015, accessed Septmeber 24, 2015.http://www.usatoday.com/story/money/2015/02/12/china-internet-curbs-hurt-us-business/23283491/

A Conversation with G. William Weatherly, Author of Sheppard of the Argonne

By Sally DeBoer

CIMSEC Book Review coordinator Sally DeBoer interviewed G. William Weatherly (the nautical pen name for Captain George Jackson, USN Retired), author of the World War Two epic thriller Sheppard of the Argonne. Read the CIMSEC book review here.

SD: Sir, it is an honor to speak with you today. Before we get started talking about your book, could you provide some background on your career in the Naval service?

GWW: I commanded three submarines: the USS Shark, the USS Billfish, and the Pre-commissioning unit of the SSBN USS Rhode Island. After that I went the US Naval War College as Chairman of the Joint Military Operations department. I had about 2000 students that came through for the Joint Professional Military Education program.

SD: What audience did you intend for your work? Did you have a specific reader in mind when you were writing?

GWW: Yes and No. Clearly, it appeals to people who are interested in the Second World War and specifically the Navy. I wrote it to try to bring back to life the war at sea as we approach the 75th anniversary of some of the major battles. I wanted to incorporate more than would be allowed by historical fiction alone, so I took my main character and put him in command of a ship in a difficult operational scenario. Readers see interactions with submarines and aircraft, then eventually a big gun battle between capital ships, which was a very rare thing in the war.

SD: That was my next question! Sheppard of the Argonne is an alternative history, taking place in a world where the Five-Power Treaty (aka the Washington Naval Treaty) was never signed, leaving nations’ ability to develop their naval forces unhindered. Why did you choose to pursue an alternative history?

SheppardOfTheArgonne_MBWeb
Click on the image to learn more about Sheppard of the Argonne.

GWW: When I was in high school, I wrote a term paper on the Washington Naval Treaty and was enthralled with the idea of “what if?” What if it hadn’t been signed and the development of ships and technology, which had been proceeding very rapidly, was allowed to continue? This was the genesis of the idea of having an alternative history. I read a lot of history, looking for places where things could have occurred that were “almost, but not quite,” and analyzing what the downstream effects might have been. I have recently read a lot of books by Professor Marder, who has done a marvelous job of documenting the British admiralty between about 1900-1940 and the decisions that they made. There is a specific example of where the British had the right idea with the Dardanelles, but the admiral in charge was not forceful enough to act in a way that could have affected the outcome of the First World War.

SD: Your writing is very technical and detailed. From describing systems themselves to the engagements between forces, Sheppard of the Argonne paints extremely clear and accurate pictures. Why did you include this level of detail?

GWW: I am an engineer by training! I went to the University of Wisconsin and majored in nuclear engineering, thinking it would help me with Admiral Rickover, which turned out to be a very bad decision! He did not like people who had majored in his subject area. Somehow he managed to accept me and the rest, as they say, is history.

SD: Do you have any funny Admiral Rickover stories? I know he is quite an iconoclast.

GWW: He managed to give me quite a grilling and tried to set me up on a date with some of his secretaries, who came in to evaluate whether I was handsome or not. But the real Rickover story occurred several years later when I was serving on his staff. After interview days, I would debrief the candidates as they finished the interview with the admiral and scribble down their answers. At the end of the day I had to go down and describe to Admiral Rickover what had gone on that day. He usually just asked “did they complain?” (No.) But one day he asked “What did they say?” As you can imagine everything at Naval Reactors was quite literal…that meant I had to report to him all 66 pages of notes verbatim. I decided to start with what I presumed would be a “safe” comment, in which a candidate stated he now “had his Rickover story!” The admiral stopped what he was doing (never a good sign) leaned back in his rocking chair to ask me “Oh, what is a Rickover story?” So I had to explain to him what a Rickover story was. I think this was kind of a test to see how I would respond. After I had successfully defined what a “Rickover Story” was, he asked me if I knew any. Of course, I did (Yes, sir!) so I had to spend fifteen minutes telling Admiral Rickover “Admiral Rickover Stories.”

SD: Oh wow, I can imagine that was quite the challenge! This relates to my next question. Are any of the characters in Argonne inspired by individuals you met during your time in the service?

GWW: They are from the standpoint that the protagonist, Sheppard, is a compendium of all the great naval officers that I knew, and how they responded to leadership problems. He is also a flawed character as a result of what happened to him at the fictional battle of Pearl Harbor, where he lost many of his men. That has affected him greatly.

SD: The characters in Sheppard of the Argonne, particularly the protagonist, Capt. Sheppard McCloud, are well drawn and diverse. At times, Capt. McCloud faces situations in which there are no perfect answers. Is this reflective of your experience in command?

GWW: Yes. I think that every naval officer faces times when there are really no good answers, and you have to work your way through them. Sheppard is actually using operational planning in that he has a mission that has been assigned, and the main path through which he would accomplish that, the main battery, isn’t working. So he has to come up with something else using the capabilities that are under his control to accomplish his mission. His mission is not to sink the German fleet, only to stop them, so he is able to accomplish his mission by stopping them.

SD: We also see Captain McCloud face some unique leadership challenges; his men regard him in high esteem. For our readers in the Naval service, what lessons do you think they can draw from this example?

GWW: I think the best one that can be drawn is absolute honesty and treating everyone, regardless of their rank, with respect. All of the men that are working for him have risen to that. There are a couple of characters (from Sheppard’s previous command) who have made it their life’s work to take care of Sheppard. One character, Petty Officer Cruz, was the one who helped save an injured Sheppard on Shenandoah; he is bound and determined to take care of Sheppard. He sets up this really marvelous use of talent from the deck gang, maybe you’d call them “rednecks,” who are really good at shooting birds on the fly with a .22 Remington. Their skill with that leads to exceptional performance from Cruz’s 40mm mount. When you show people respect [like Sheppard does] and give them some latitude to exercise their initiative, the results can be really quite exceptional.

SD: That was something that really stuck out to me. About three quarters of the way through the book, the topic of micromanagement comes up. Something that really stuck out to me about Sheppard is that he lets his wardroom, chiefs, and crew do their jobs independent of his input, unless it is needed, and to Sheppard’s great benefit.

GWW: Yes, I deliberately put another character in command of the other battle cruiser that maybe didn’t deserve command but achieved it through political connections. His micromanagement style just creates one problem after another for him, beginning when they are leaving Norfolk and one of his sailors fails to cut in enough air when they start a boiler, creating a situation where a determined submariner knew they were coming.

SD: We always like to know what our authors are reading. What is the most recent book you’ve read, and can you recommend any “must reads” to our audience here at CIMSEC?

GWW: I don’t have any “must reads,” as I think everyone will gravitate toward their own interests. As I mentioned, I just finished reading Professor Marder’s books, there are six volumes right now. I just started “Billy Mitchell and his War Against the Navy,” which is pretty interesting, I learned some things about Billy Mitchell. He had some very good ideas but went about trying to get them accomplished via the wrong methods. Everyone knows about him bombing battleships but he was trying very hard to campaign for a unified air force modeled after the RAF after the end of the First World War.

SD: Finally, can we expect to read more about Sheppard McCloud soon? Might this be a series?

02850b9
Captain Jackson, a.k.a G. William Weatherly

GWW: The second book, which I am finishing up right now, is called Sheppard and the French Rescue. I allude to it in the book when Admiral Hamilton is giving the strategic perspective of Rommel having turned westward, inciting fear that the French colonies will soon be under Axis control. There is a French fleet near Oran in Algeria, and President Roosevelt (in the second book) decides that they have to save or incapacitate that fleet, because if the Germans get control of it, the allies will lose the war. The situation I set up is more of a difficult Atlantic naval war in addition to the war in the Pacific, [which in the stories] follows pretty much traditional lines. The third book is about half done and I have an outline for a fourth. I love to write and I think, fundamentally, I am a storyteller…at least good enough to be dismissed from Admiral Rickover’s presence without too much damage to my career!

SD: Yes I would say that’s about the toughest test any author could face! Is there anything else you’d like our readers at CIMSEC to know about your book?

GWW: In terms of WWII, DoD statistics show that about 16 million people served in the armed forces or related activities out of a population of 130 million. There were a great many veterans, and the thing that struck me was that they rarely if ever talked about their battle experiences. It hasn’t been until recently, as they have gotten much older, that they have begun to open up and done oral histories etc. One of the characteristics that I learned about PTSD is that it is actually a very common phenomenon. In the Second World War, anyone that showed the symptoms of post-traumatic stress was shunned or considered a coward. There was a very famous incident of Gen Patton slapping a soldier in Sicily that was suffering from PTSD. One of the things that I wanted to bring to light with this book was how post-traumatic stress affected people then, and how they had to deal with it in private. As the book alludes, the only person that knows something is wrong with Sheppard is his wife, Evelyn, but she really can’t do anything. Early in the book Sheppard has a flashback, and is also plagued by nightmares. He is desperately afraid of betraying his fears to his men while sleep talking…he does not want them to doubt his abilities as a leader.

SD: Thank you all for reading today and thank you, Captain Jackson, for taking time out of your schedule to talk with CIMSEC. If you would like to find out more about Sheppard of the Argonne, you can purchase a copy here.

Sally DeBoer is the Book and Publication Review Coordinator for CIMSEC.  She can be reached at books@cimsec.org.

Sheppard of the Argonne: Alternative History Naval Battles of WWII

Weatherly, William G. Sheppard of the Argonne. Herndon: Mascot Books, 2015, 324pp. $24.95

SheppardOfTheArgonne_MBWeb

By Sally DeBoer

How would the world be different if the Five-Power Treaty (also known as the Washington Naval Treaty) had never been signed, allowing unfettered naval rearmament by the world’s major military powers in the wake of World War One? Sheppard of the Argonne, the impressive debut effort by author G. William Weatherly (interviewed by CIMSEC here), the pen name for Captain George Jackson, USN (ret.), takes place in just such an alternative history. Opening at the beginning of the American effort in World War Two, Weatherly’s story intertwines his detailed, illustrative take on “what could have been” with faithfully rendered historical details and factual events. History buffs and naval enthusiasts alike will find something to enjoy in Sheppard, a novel with a diverse, carefully-drawn cast of characters and an eye for meticulous technical details. Indeed, it is the harmony between the men themselves and the machines they command and operate that makes Sheppard such a delight to read.

We meet our protagonist, Captain Sheppard McCloud of the United States Navy, shortly after the events of December 7th, 1941. In the immediate wake of Weatherly’s version of Pearl Harbor, Captain McCloud, then in command of Shenandoah,  makes a bold and fateful decision to pursue and attack the Japanese aggressors off the coast of Hawaii. The consequences of this decision weigh heavily on Sheppard; as a result of the engagement, a significant portion of Shenandoah’s crew lost their lives, while many more were severely injured, including Sheppard himself. Though he is hailed as a hero for his actions, the physical and mental scars of contact with the enemy are forever in the forefront of Captain McCloud’s mind. Reflective of the attitudes of the day, Sheppard feels he must carry this burden alone.

At the outset of Weatherly’s tale, an injured but resolute Sheppard is assigned command of Argonne, one of two Norfolk-based capital ships about to accompany two carriers into the increasingly dangerous Atlantic theater of World War Two. Under the larger command of Admiral Hamilton, Argonne and her sister ships have a simple but crucial mission: stop German naval forces from completely starving the British population and ending their war effort. Aboard Argonne, Sheppard is joined by a dedicated and diverse crew of officers and men, including, much to his delight and relief, some familiar faces from the Shenandoah. Upon leaving Norfolk harbor, Sheppard and his men must immediately rise to the challenge of their tasking.

G. William Weatherly’s background as a U.S. Navy captain shines in careful, detailed way Sheppard presents not only the naval engagements but also the technology itself in meticulous relief. Readers who are familiar with naval technology will be delighted by Weatherly’s explanations and renderings of the ship’s armament and technology complement. While much of the equipment and techniques are faithfully rendered in accordance with the time period, Weatherly has accelerated some developments as they might have been if the Washington Naval Treaty were never signed. Readers experience the full spectrum of naval warfare, from the cockpits of Argonne’s Kingfisher complement to German U-boats below the water’s surface. As Sheppard is a fast-paced and action packed tale, Weatherly does readers a great service by clearly illustrating naval tactics and procedures.  Even those who are unfamiliar with the intricacies of battle on the high seas will be able to follow along with the events of the novel as they transpire.

As any member of the naval profession will attest, the men who make up a ship’s crew determine its success or failure just as surely as its technology and design. So too is the case in Sheppard of the Argonne. Captain McCloud himself is a complicated but aspirational protagonist; every decision and action is influenced by his harrowing experience in the Pacific. In addition to her commanding officer, readers are introduced to Argonne’s department heads, junior officers, chiefs, and enlisted men. Sheppard’s presence and leadership style is among the novel’s most memorable aspects; naval professional’s will appreciate the care the author uses in developing relationships between the Commanding Officer and his crew. Further, Weatherly’s wide-reaching scope includes the perspectives of high leadership, Germans, and British officers. The result is a complete and engaging look at the many personalities and passions that make up the naval service.

Sheppard of the Argonne is a gripping alternative history that will surely appeal to a wide audience; historians, naval enthusiasts, and casual readers alike will enjoy following Captain McCloud and his crew into battle. G. William Weatherly’s realistic and faithfully rendered portrait of service at sea will be especially enjoyable to veterans of the sea services. As the saga continues, Sheppard McCloud and his men will surely continue to develop as a crew. Readers can look forward to hearing more about Sheppard and the men of the Argonne in the future; Weatherly will soon finalize the second novel in the series and work is well underway on the third.

Sally DeBoer is the Book Review Coordinator for CIMSEC. She can be reached at books@cimsec.org.

Sea Control 118 – ISIS Capabilities Against Civil Aviation

In the aftermath of the Brussels attacks, the world is now paying closer attention to airport security and the unique threat posed by ISIS. But what exactly is going on and how are countries responding?

Join Sea Control: North America for an interview with Max Leitschuh, an Aviation Security Analyst at iJet International, to discuss the ins and outs of ISIS’ recent attacks. During the course of the discussion, we examine ISIS’ capabilities against civil aviation, the specifics of their attacks in Brussels and Sharm el-Sheikh, and what governments can do to counter them.

DOWNLOAD: Sea Control 118 – ISIS Capabilities Against Civil Aviation

 

This episode of Sea Control: North America was hosted by Matthew Merighi and produced by Meaghan Tobin.

Fostering the Discussion on Securing the Seas.