Tag Archives: China

Counter Influence Activities to U.S. Posture in the Mediterranean and Persian Gulf

By Chad M. Pillai

The year is 2030, five years after the Joint Comprehensive Plan of Action (JCPOA) officially expired, and Iran has made its move to go nuclear. As the United States and its allies attempt to militarily respond, they face a new reality: assured access and freedom of movement (FOM) is no longer guaranteed due to Russian and Chinese counter influence activities in the Mediterranean and Persian Gulf Region. Should this scenario come as a surprise?  The answer is no, because the Russians and Chinese are putting the pieces in position now.  

Since the end of WWII, the most potent aspect of the U.S. military has been its forward posture consisting of a network of forces, footprints, and agreements. With Russia, China, North Korea, and Iran being identified as the four primary state challengers to the U.S.-led global order, the Defense Department is examining its global posture to ensure it has the means to assure allies, deter challengers, and if necessary defeat aggressors. However, Russia and China have not been sitting idle as the U.S. seeks to strengthen its position. In fact, they have studied our doctrine and are implementing their own global posture initiatives to secure their national interests and, if necessary, threaten our interests. Their focus has been around the three critical maritime chokepoints: the Suez Canal, the Bab-el-Mandeb, and the Strait of Hormuz.   

Russia

Russia has been the most visible in re-asserting itself in the Middle East with its military campaign to support the Assad Regime in Syria. Russia’s principal interest in Syria is ensuring its continued access to a warm water port in the Mediterranean. The U.S. and its western allies’ early attempts to prevent Russian support for Syria by denying the Russians the ability to ship helicopters in 2012 motivated Russia to reposition its naval forces in the area and build relationships with countries in the region.

Tartus naval base in Syria. (Google Earth, DigitalGlobe)
Tartus naval base in Syria. (Google Earth, DigitalGlobe)

Its reinforcement of advanced air-defense systems in Syria extended Russia’s Anti-Access/Anti-Denial (A2/AD) network from the Baltic region to the Eastern Mediterranean. Recent reports also indicate that Russia is seeking to re-establish its military presence in Egypt at a former air base abandoned in 1972. If Russia is able to establish a foothold in Egypt, its bases in Syria along with its fleet operating in the Eastern Mediterranean would pose a significant challenge to U.S. and allied forces in a potential future conflict while attempting to conduct strikes or move through the Suez.

China

When it comes to China’s military expansion, most observers focus on events in the East and South China Seas and its susceptibility to the “Malacca Straits” dilemma. Like Russia, China has not been idle in developing a “globalized security posture” to secure its interests abroad. The construction of China’s first military outpost in Djibouti is a clear manifestation of China’s global outlook. This is a worrying development for the U.S., which operates from Camp Lemonier, a military base not too far from where China is establishing their base. The future danger of a Chinese base in Djibouti is demonstrated by the recent attacks against U.S. ships off the coast of Yemen. While the U.S. is capable of defending itself and responding to untrained Houthi rebels in Yemen, it may find a more competent and better equipped Chinese force threatening access to the Bab-el-Mandeb a more difficult challenge.

A People’s Liberation Army Navy soldier stands guard as Chinese citizens board a Chinese naval ship at a port in Aden last year. Photo: Reuters
A People’s Liberation Army Navy sailor stands guard as Chinese citizens board a Chinese naval ship at a port in Aden last year. (Reuters)

Besides Djibouti, China is reaching out to Oman for access and has established an agreement with Pakistan to use the Port of Gwadar. While the Port of Gwadar is viewed by many as a means for China to challenge India’s influence in the region, it could also be used to challenge the U.S. Navy from operating in the region as well, especially to reinforce its position near the Straits of Hormuz. In a nutshell, China in partnership with Russia and Iran, could shut down three of the most important maritime chokepoints in the world.

Conclusion

General Dunford, the Chairman of the Joint Chiefs of Staff, recognizes the threat of Russia and China along with Iran, North Korea, and Violent Extremists in his 4+1 construct. However, our efforts to deter these actors individually could have the unfortunate consequence of drawing them closer together as an unholy alliance seeking to diminish U.S. influence. The scenario in the beginning is clearly possible if Russia and China in partnership with Iran choose to deny the U.S. assured access and freedom of movement. While the U.S. is developing numerous concepts to defeat various forms of A2/AD in the Pacific and Persian Gulf regions already, it must accept that for future operations against determined enemies who have studied our doctrine of warfare, the cost of winning will be considerably greater.  

Chad M. Pillai, an Army Strategist, is a member of the War on the Rocks (WOTR) Founders Club, the Military Writers Guild, and the U.S. Global Leadership Coalition (USGLC). He has previously published The Bear, Dragon, and Eagle: Russian, Chinese, and U.S. Military Strategies and India as the Pivotal Power of the 21st Century Security Order for CIMSEC. He has also contributed to the Strategy Bridge, War on the Rocks (WOTR), Infinity Journal, Small Wars Journal, Offizier, and Military Review. He earned his Masters in International Public Policy (MIPP) from the Johns Hopkins University School of Advanced International Studies (SAIS).  

Featured Image: Iranian naval ships conduct an attack on a mock U.S. warship in the Strait of Hormuz (Hamed Jafarnejad/AFP/Getty Images)

Countering Chinese Expansion Through Mass Enlightenment

By James E. Fanell and Ryan D. Martinson

From Newport to New Delhi, a tremendous effort is currently underway to document and analyze China’s pursuit of maritime power. Led by experts in think tanks and academia, this enterprise has produced a rich body of scholarship in a very short period of time. However, even at its very best, this research is incomplete—for it rests on a gross ignorance of Chinese activities at sea.  

This ignorance cannot be faulted. The movements of Chinese naval, coast guard, and militia forces are generally kept secret, and the vast emptiness of the ocean means that much of what takes place there goes unseen. Observers can only be expected to seek answers from the data that is available.

The U.S. Navy exists to know the answers to these secrets, to track human behavior on, above, and below the sea. While military and civilian leaders will always remain its first patron, there is much that USN intelligence can and should do to provide the raw materials needed for open source researchers to more fully grasp the nature of China’s nautical ambitions. Doing so would not only improve the quality of scholarship and elevate the public debate, it would also go a long way to help frustrate China’s current—and, to date, unanswered—strategy of quiet expansion. Most importantly, sharing information about the movements and activities of Chinese forces could be done without compromising the secrecy of the sources and methods used to collect it.

The Constellations are Visible…

The basic story of China’s maritime aggrandizement is printed in black and white, no need to read tea leaves. There exists a public life in China, even if highly circumscribed. Chinese journalists are paid to write articles that satisfy the urges of an inquisitive and patriotic public. Chinese scholars spend careers trying to understand the intentions and capabilities of their own country—like academics elsewhere, they banter back and forth in defense of “truth,” and bruised egos. Government agencies release reports that catalog their achievements, outline key objectives, and mobilize their personnel for the new tasks at hand. The Chinese military, communicating through service publications, seeks to inculcate a collective consciousness of what it does and why it does it. All of these sources are open to the foreign observer.

The available information provides important clues about the nature and extent of Chinese activities at sea. This is true for all three of the sea services: the coast guard, the maritime militia, and the PLA Navy.  

The movements of the Chinese coast guard are particularly amenable to open source analysis. China does not operate a single maritime law enforcement agency analogous to the United States Coast Guard. It instead funds several different civilian agencies, each with a different mission. Prior to the creation of the China Coast Guard in 2013, the agencies most active along China’s maritime frontier were China Marine Surveillance (CMS) and Fisheries Law Enforcement (FLE). Both agencies released surprising amounts of information through official newspapers, annual reports and yearbooks, and other channels.

In this Sept. 23, 2015, photo, provided by Filipino fisherman Renato Etac, a Chinese Coast Guard boat sprays a water cannon at Filipino fishermen near Scarborough Shoal in the South China Sea. A landmark ruling on an arbitration case filed by the Philippines that seeks to strike down China's expansive territorial claims in the South China Sea will be a test for international law and world powers. China, which demands one-on-one talks to resolve the disputes, has boycotted the case and vowed to ignore the verdict, which will be handed down Tuesday, July 12, 2016, by the U.N. tribunal in The Hague. (Renato Etac via AP)
Sept. 23, 2015. A Chinese Coast Guard boat sprays a water cannon at Filipino fishermen near Scarborough Shoal in the South China Sea. (Renato Etac via AP)

These sources include significant quantitative data. For instance, it is possible to track the expansion of CMS presence in disputed waters that started in 2006. In that year, CMS began to regularize its sovereignty—or “rights protection”—patrols, first in the East China Sea, then in the Yellow Sea and South China Sea. Each year, the State Oceanic Administration (SOA) published data on these operations. In 2008, CMS conducted a total of 113 sovereignty patrols. These missions, which covered more than 212,000 nm, established CMS presence in all of the waters over which China claims jurisdiction. Four years later, in 2012, the service conducted 172 sovereignty patrols (>170,000 nm) just in the South China Sea alone.

Qualitative data also abounds. Before 2014, both CMS and FLE regularly invited Chinese journalists aboard ships operating in disputed areas. These civilian scribes chronicled China’s campaign to reclaim “lost” land and sea. While primarily designed to inspire and titillate Chinese audiences, their work provides excellent source materials for the foreign observer. For instance the eight-part Chinese television documentary that aired in late 2013 showed extensive footage of CMS and FLE ships operating in the South China Sea, including during hostile encounters with Indonesian and Vietnamese mariners.

Chinese sources also provide raw materials for understanding the activities of the second major instrument of Chinese sea power—the maritime militia. This force is comprised of civilians trained to serve military and other state functions. In peacetime, a segment of the militia, mostly fishermen, constitutes an important tool in Chinese maritime strategy. It sails to disputed waters to demonstrate Chinese sovereignty and justify the presence of the Chinese coast guard and navy. The militia also harasses foreign vessels, and helps protect China’s own.

18 June 2016: Newly-built fishing vessels for Sansha City moored at Yazhou Central Fishing Harbor. Note the exterior hull reinforcements and mast-mounted water cannons. (Hainan Government)
18 June 2016: Newly-built fishing vessels for Sansha City moored at Yazhou Central Fishing Harbor. Note the exterior hull reinforcements and mast-mounted water cannons. (Hainan Government)

China’s maritime militia is particularly active in the South China Sea. The Chinese press eagerly covers their activities in disputed waters, often revealing ship pennant numbers and the names of key militiamen. Websites owned by provincial, municipal, and county governments also highlight their local contributions to the “people’s war” at sea. Using such sources, Conor Kennedy and Andrew Erickson have tracked the militia’s activities at places such as Mischief Reef and Scarborough Shoal, and deciphered its role in pivotal events such as the 2009 assault on the USNS Impeccable.

The PLA Navy also releases information about where, when, and how it is operating. Air, surface, and undersea deployments are called “combat readiness patrols” (zhanbei xunluo). Service publications regularly report on these patrols—including, perhaps surprisingly, those conducted by China’s “silent service.” For instance, one October 2014 article in People’s Navy recounts a story of Song Shouju, a submarine skipper from the PLA Navy South Sea Fleet (SSF), whose diesel electric boat was prosecuted by a foreign maritime patrol aircraft and a surveillance vessel during one combat readiness patrol. According to Song, his boat was subjected to 80 hours of active sonar, placing him on the horns of a dilemma. If he surfaced, it would mean a mission failure and “put Chinese diplomacy in an awkward position” (suggesting the submarine was not operating where it should have been). But if he remained below, the boat would risk the consequences of depleting its battery. In the end, the captain decided to stay submerged until the threat had passed, which it ultimately did.1

The PLA Navy is particularly forthcoming about patrols taking place beyond the “first island chain.” These are regularly reported in the Chinese press, both in English and Chinese. In May 2016, for example, six vessels from the SSF—including three destroyers, two frigates, and an auxiliary—completed a 23-day training mission that took them through the South China, the Indian Ocean, and the western Pacific by means of the Sunda Strait, Lombok Strait, Makassar Strait, and the Bashi Channel. At least one Chinese journalist was onboard to cover the 8,000 nm voyage. Again, the available data is not limited to the movements of surface combatants. For instance, a January 2014 People’s Navy article revealed that since 2009, 10 submarines and 17 aircraft from the ESF had traversed the first island chain to conduct “far seas” operations.2 Sources like these have enabled foreign researchers such as Christopher Sharman to trace the connection between Chinese actions and its declared naval strategy.

Chinese missile destroyer Haikou (171) is seen while docking in Hong Kong on April 30, 2012. (Aaron Tam/AFP/Getty Images)
Chinese missile destroyer Haikou (171) is seen while docking in Hong Kong on April 30, 2012. (Aaron Tam/AFP/Getty Images)

To follow Chinese activities at sea, one need not rely on Chinese sources alone. Foreign governments also sometimes release data. Often this information is associated with a particular incident. For instance, in mid-2014, the Vietnamese press published numerous articles in English covering China’s provocative deployment of an advanced new drilling rig (HYSY-981) in disputed waters south of the Paracel Islands. More recently, Indonesia released useful information about its response to illegal Chinese fishing and coast guard activities taking place near Natuna Island.

For its part, Japan systematically issues data on Chinese presence in the waters adjacent to the Senkaku Islands. Graphical depictions of these data vividly show Chinese expansion over time, from the inaugural intrusion of two CMS vessels in December 2008 to the regular patrols that started in September 2012 and continue today. Indeed, the quality and consistency of this data has enabled foreign analysts to use quantitative methods to test theories about shifts in Chinese diplomacy.

…But Darkness Still Prevails

The information described above, while useful, nevertheless presents many problems. This is true even in the case of data on Chinese coast guard operations, which are easily the richest available to the open source researcher. A “rights protection” patrol can mean anything from a two-day sweep of the Gulf of Tonkin to a several-month mission to the southern reaches of the Spratly Archipelago. Thus, while the available data unmistakably capture the broad trends of Chinese expansion, they lack the fidelity needed for closer examination of deployment patterns. With the creation of the China Coast Guard, all this is now moot. The Chinese government no longer publishes such data, and Chinese journalists are now seldom allowed aboard ships sailing to disputed waters.

The problem is much worse in the case of the maritime militia. No Chinese agency or department systematically tracks and releases information on militia activities. Because only a portion of fishermen are members of the militia, fishing industry data is a poor proxy. Thus, there is no way to scientifically track the activities of irregular forces operating along China’s maritime frontier. We generally only learn about particular incidents, remaining largely ignorant of the context in which they take place.

Consistent data on PLA Navy activities in disputed and sensitive waters is simply not available. We do know that in recent years the service “normalized” (changtaihua) its presence in the Spratly Archipelago, but Chinese sources provide no definition of what that term means. Thus, while it is clear that the PLA Navy has augmented its surface ship patrols to these waters, we have no means to gauge the scale of that augmentation.3 In the East China Sea, Chinese sources do speak candidly about hostile encounters with the Japanese Maritime Self Defense Force. However, the open source researcher has few options for gauging the extent of PLA Navy presence east of the equidistant line.

There is a more fundamental problem that must be reckoned with: in most cases, the foreign observer often lacks the means to validate deployment data found in Chinese sources. Ultimately, one must take the word of the Chinese government, which naturally considers political factors—both internal and external—when issuing such content. Information released by other governments can be valuable, but foreign statesmen have their own motives. Sometimes they seek to downplay differences. For example, it is likely that for many years China and at least some Southeast Asian states had a tacit agreement not to publicize incidents at sea.

In sum, the available open source data can account for only a tiny fraction of what Chinese maritime forces are doing at sea. Moreover, the validity of information that is available must be seen as suspect. This is where naval intelligence can help.

Sharing the Spotlight

Naturally, U.S. naval intelligence professionals, particularly those in the Pacific, pay close attention to the comings and goings of Chinese maritime forces. To this end, they employ a wide variety of sources, from highly sensitive national technical means to visual sightings made by U.S. and allied forces at sea. They also optimize other resources of the U.S. intelligence community to support their mission requirements.4 Suffice it to say, the naval intelligence community is well aware of the disposition of China’s naval, coast guard, and militia forces.

The foundation of this effort is the Pacific Fleet Intelligence Federation (PFIF), established in September 2013 by then United States Pacific Fleet Commander, Admiral Cecil Haney. The PFIF “provides direction for the organization and collaboration of the Pacific Fleet’s intelligence and cryptologic resources to support the maritime Operational Intelligence (OPINTEL) mission” of “tracking adversary ships, submarines and aircraft at sea.” It represents a level of focus and systematization not seen since the Cold War.

The PFIF is a true collaborative enterprise, involving “coordination from Sailors across multiple organizations at various echelons, afloat and ashore, working in unison 24 hours a day, seven days a week providing the most precise maritime OPINTEL to our afloat forces.”5 Efforts are “federated” across nodes in Japan, Hawaii, San Diego, and Washington D.C.6 Relevant data collected by regional allies are also included. The result is the adversary Common Operational Picture (RED COP). Through RED COP, the PFIF provides Fleet Commanders and deployed forces precise geo-coordinate level intelligence regarding the location of maritime platforms across the Pacific Fleet area of responsibility. It also contains a detailed pedigree of the sources used to identify the location of an adversary unit.

How might the USN translate RED COP into information that is valuable to the public  yet does not risk sources and methods? The answer lies in the format of the transmitted product. While American forces require the detailed information contained in the RED COP, the U.S. public does not. Therefore, the USN could issue a standardized series of PowerPoint graphics that contain generic depictions of PRC maritime force disposition across the Indo-Pacific region, if not the rest of the world. Since the technology used today by PFIF watch-standers can automatically produce this type of graphic, this would involve no new burden for naval intelligence professionals.

Some may argue that placing an adversary unit in a location where there is no “plausible deniability” could expose a source or method of intelligence collection. Four factors eliminate this risk. First, the generic placement of an adversary platform on a PowerPoint graphic would, by definition, not contain the level of fidelity required to determine the source of the contact. Second, as mentioned above, nearly all locations of maritime forces at sea are derived from multiple sources. This fact further complicates the task of determining any one particular source. Third, generic graphics would be published monthly, or biweekly at the most. This would dramatically reduce the potential risk to sources and methods. Fourth, and most importantly, there may be times when the Fleet Director of Intelligence (or higher authority) may deem the location of a particular ship, submarine or aircraft to be too sensitive. In such instances, they can simply remove the platform(s) from the briefing graphics. This would provide a final, fail-safe check against revealing any sensitive intelligence collection sources or methods. Together, these four factors would eliminate the possibility of compromising sources and methods, even with sophisticated algorithms of “pattern analysis.”

Such an initiative would not be entirely without precedent. The Office of Naval Intelligence (ONI) already produces the “World Wide Threat to Shipping” and “Piracy Analysis Warning Weekly” reports, which provide graphic and textual laydowns of the global maritime domain as derived from unclassified sources. The recommendations outlined in this essay would represent an expansion of current efforts under the auspices of ONI, using the PFIF’s all-source data as the primary source.

Office of Naval Intelligence (U) HORN OF AFRICA/GULF OF GUINEA/ SOUTHEAST ASIA: Piracy Analysis and Warning Weekly (PAWW) Report for 6 - 12 October 2016
10 Day Piracy small boat operations weather forecast from Office of Naval Intelligence (U) HORN OF AFRICA/GULF OF GUINEA/SOUTHEAST ASIA: Piracy Analysis and Warning Weekly (PAWW) Report for 6 – 12 October 2016.

The Rewards of Mass Enlightenment

Releasing such data would immediately benefit efforts to understand Chinese maritime strategy. It would open up whole new swaths of scholarship. Chinese actions could be directly correlated to Chinese words. Incidents could be placed in their correct context. Theories about China’s pursuit and use of sea power could be proposed and tested with new levels of rigor.

Better open source analysis would also benefit the intelligence community itself. The strengths of academic scholarship—such as understanding strategic and organizational culture—could be applied to the same questions that preoccupy USN analysts, perhaps yielding fresh insights. Efforts to contextualize the activities of China’s maritime militia, for example, would be especially welcome, given its peculiar social, cultural, and political roots.

While scholarship is valuable in and of itself, the ultimate purpose of such an initiative would be to improve the ability of our democracy to respond to the China challenge. Elected officials, who ultimately decide policy, take cues from public discourse. Thus, if wise policies are to be crafted, the broader American public must be fully aware of the threat that China’s pursuit of maritime power poses to American interests. This is especially important given that any proper response would require the whole nation to bear costs and accept risks. Unlike Russia, China’s actions are carefully calibrated not to arouse a somnolent American public. This places a very high premium on information about the actions that China is taking.  

To be sure, information is not an antibiotic. Ingesting it in the right quantities at the right frequencies may not cure the disease. Indeed, there is already enough data in the public domain for Americans to see the key trends. Yet there remain some very smart people who cannot, or will not, recognize the perils we face. Even so, the correct antidote to intellectual biases is ever more information; as data accumulates, the naysayers must either alter their theories or risk self-marginalization.

Sharing facts about Chinese activities at sea is not just good for democracy, it is also smart diplomacy. At this point, merely shining the spotlight on Chinese maritime expansion is unlikely to persuade China to radically alter its strategy. The China of Xi Jinping is less moved by international criticism than the China of Hu Jintao or Jiang Zemin. However, releasing detailed data on Chinese activities at sea would likely have an impact on foreign publics, who will use it to draw more realistic conclusions about the implications of China’s rise. Moreover, making such information widely available would help counter spurious Chinese narratives of American actions as the root cause of instability in the Western Pacific. Both outcomes are in our national interest.

To adopt the approach advocated in this essay would require a political decision. On matters of national policy, naval intelligence professionals must yield to civilian leaders.7 In the end, then, this essay is for the politicians. And so is its last word: share with the scholars.

James E. Fanell is a retired U.S. Navy Captain whose last assignment was the Director of Intelligence and Information Operations for the U.S. Pacific Fleet and is currently a Fellow at the Geneva Centre for Security Policy.

Ryan D. Martinson is a researcher in the China Maritime Studies Institute at the U.S. Naval War College. The views expressed are those of the author and do not reflect the official policy or position of the U.S. Navy, Department of Defense or the U.S. Government.

1, 周卓群, 李克一 [Zhang Yuannong, Zhou Zhuoqun, and Li Keyi] 潜航深海磨利刃 [“Sailing Submerged in the Deep Ocean to Sharpen Our Blade”] 人民海 [People’s Navy], 8 October 2014, p. 3.

2.  [Gu Caohua]   中抓建,造深蓝铁 [“Seize on Construction While in Action, Mold a Blue Water Iron Fist”] 人民海 [People’s Navy] 8 January 2014, p. 3.

3. 李唐 [Li Tang] 海化巡覆盖万里海疆 [“Normalized Naval Patrols Cover the Maritime Frontier”] 人民海 [People’s Navy] 23 June 2014, p. 1

4. James E. Fanell, Remarks at USNI/AFCEA conference panel: “Chinese Navy: Operational Challenge or Potential Partner?”, San Diego, CA, 31 January 2013.

5. James E. Fanell, “The Birth of the Pacific Fleet Intelligence Federation”, Naval Intelligence Professionals Quarterly, October 2013.

6. Ibid. James E. Fanell, “The Birth of the Pacific Fleet Intelligence Federation”, Naval Intelligence Professionals Quarterly, October 2013.

7.The authority for conducting an effort such as this would require approval from the Director of National Intelligence and the various “Original Classification Authorities” as outlined in Executive Order 1352. “Executive Order 13526- Original Classification Authority”, The White House Office of the Press Secretary, 29 December 2009, https://www.whitehouse.gov/the-press-office/executive-order-original-classification-authority

Featured Image: A sailor of the Chinese People’s Liberation Army Navy aboard the aircraft carrier Liaoning. (REUTERS/XINHUA)

Members’ Roundup: September 2016

By Sam Cohen

Welcome to the September 2016 members’ roundup. Throughout the month, CIMSEC members examined several international maritime security issues, including the successful testing of Raytheon’s SM-6 surface-to-air-missile by a Ticonderoga-class Aegis cruiser, developments surrounding the Littoral Combat Ship (LCS) program, the rise of non-state actors in international maritime security affairs, continued hostility between China and regional nations relating to the South China Sea maritime disputes, and the worsening of security tensions between American and Russian air and naval forces patrolling the Black Sea. 

Dave Majumdar, for The National Interest, discusses the Raytheon SM-6 Standard surface-to-air missile test that recently set a new record for the longest-range over-the-horizon intercept in naval history. The interceptor, which also has a long-range anti-ship variant, is a central component of the U.S. Navy’s Naval Integrated Fire Control – Counter Air (NIFC-CA) battle network. He highlights that the missile is effective against cruise missiles, aircraft, ballistic missiles, and enemy surface combatants while its range is estimated to be as great as 250 nautical miles. He also explains that the SM-6 interceptor is a major reason for why the U.S. Navy is confident in its ability to operate in highly contested environments, including regions where near-peer competitor powers have employed anti-access/area-denial weapons, such as the Baltics or the Western Pacific.

Bryan McGrath, for Scout Warrior, provides several recommendations for how the U.S. Navy should methodically approach future fleet architecture and force structure planning. He explains that developing the fleet to meet the challenges of great power competition should be central to this approach, largely because the capabilities this requires will allow for other critical security demands to be met as a byproduct, including control over trade routes, combating non-state actors, and enforcing maritime security. He also suggests that the relationship between the Navy and the Marine Corps should be funded as an asymmetric advantage unique to American seapower capabilities, while Congress should increase the overall resource allocation the Navy receives in order to meet the rigors of growing great power dynamics and the increasingly complex, multi-domain operational objectives associated with those adversaries.  

Steven Wills, for U.S. Naval Institute News, provides a review of the changes made to the Littoral Combat Ship (LCS) program and explains that although the ships’ new training procedures, modularity, and operational organization may seem revolutionary, these new features simply reinforce the ship’s core missions. He explains that the majority of the LCS force will be forward deployed in support of operational commander tasking while personnel swaps will be undertaken to keep the ships forward deployed for longer periods of time. He also adds that mission modules will be exchanged between different LCSs to meet strategic operational requirements. Although the LCS has received significant opposition from both military and political officials, he notes that the large numbers of LCSs planned for forward deployment will meet the fleet’s specific demand for 52 small combatant vessels, and more generally, the need for increased warfighting capacity across the force. 

Paul Pryce, for The NATO Association of Canada, discusses the rise of non-state actors across the international maritime environment, highlighting the People’s Liberation Army Navy (PLAN) and the Chinese Coast Guard’s training and funding of fishing militias to support China’s territorial claims in the South China Sea. He explains that the advent of these actors and their practices represent an overall increase in hybrid warfare on the oceans, a development which is likely to undermine regional security across the highly contested waters in the Asia-Pacific. With non-state actors offering plausible deniability for the states that support their activities, he suggests that states should seek greater cooperation in the enforcement of international maritime law by launching frequent and functional joint patrols as a means of building mutual trust between countries. He explains that this trust will increase constructive dialogue towards resolving ongoing disputes and will mitigate the tensions non-state actors and militias can induce between nations. 

Members at CIMSEC were active elsewhere during the month of September:

At CIMSEC we encourage members to continue writing, either here on CIMSEC or through other means. You can assist us by emailing your works to dmp@cimsec.org.

Sam Cohen is currently studying Honors Specialization Political Science at Western University in Canada. His interests are in the fields of strategic studies, international law and defense policy.

Featured Image: A P-8A Poseidon flying alongside a Lockheed P-3 Orion, close to Naval Air Station Patuxent River, Maryland, 2010 (U.S. Navy photo by Liz Goettee)

Members’ Roundup: August 2016

By Sam Cohen

Welcome to the August 2016 members’ roundup. Throughout the month of August, CIMSEC members examined several international maritime security issues, including an increasingly contentious undersea environment in the Asia-Pacific, monitoring and enforcing laws relating to maritime crime, the importance of the Littoral Combat Ship (LCS) to the future mine countermeasure capability of the U.S. Navy, the upgrades being made to the Philippine Coast Guard with the assistance from Japan, and finally, Vietnam’s decision to deploy mobile rocket launchers to islands in the South China Sea.

Lauren Dickey, John Schaus, and Andrew Metrick, at War on The Rocks, provide an overview of submarine forces and dynamics shaping undersea competition in the Asia-Pacific. Although Russia’s undersea capabilities in the Atlantic have historically been the primary challenge to U.S. technological primacy in the subsurface domain, the authors explain how Chinese, North Korean .and ten other Asian nations are not only increasing their proportion of active submarines in the Pacific, but are also significantly increasing investment in advanced capabilities. According to the authors, the growth of submarine fleets throughout the region combined with technologies that can limit U.S. operational effectiveness in the domain implies that regional states are hedging against a more competitive future security environment.

John Grady, for U.S. Naval Institute News, discusses the importance of awareness in the maritime domain and on land concerning the enforcement of laws pertaining to fisheries, the environment and crime on the oceans and in coastal waters. He references comments on the issue from fellow CIMSEC members Jerry Hendrix, Scott Cheney-Peters, and Claude Berube, who explain that non-governmental organizations, comprehensive security and monitoring networks, and enforcement practices from ports to blue ocean regions is critical for ending illegal fishing and other criminal activities.

Rick Berger and Mackenzie Eaglen, at War on The Rocks, provide analysis on the aircraft carrier shortage in the U.S. Navy and the implications this is having for U.S. presence in certain hot spot regions. The authors argue that politicians are not working creatively enough to get additional carriers into the fleet quickly, which is a vital first step towards addressing the current carrier presence gap. Their analysis focuses on how Congress and Pentagon civilian leadership jointly and cooperatively changed the process with which the Navy tests, procures and fields aircraft carriers, ultimately resulting in the current shortage. The authors recommend that Congress and the Pentagon should allow the Navy to field CVN-78 Ford by 2019, noting that the risk in pushing back full-ship shock trials to a later date does not outweigh the benefit of solving an immediate problem of too few carriers for too many missions.

Steven Wills, for U.S. Naval Institute News, discusses the need for expanded congressional support for the Littoral Combat Ship (LCS), highlighting the ships potential to become the most advanced platform with an effective and advanced mine warfare capability in the fleet. He explains that the U.S. Navy’s aging Avenger-class mine countermeasure ships are in need of replacement and that the LCS mine warfare mission module represents the most suitable option already within the acquisition system capable of rapidly improving the fleets mine countermeasure capacity. He recommends that Congress support and fund the LCS mine warfare module program as outlined by the Navy in the FY17 budget.

Dave Majumdar, for The National Interest, highlights the U.S. Navy’s decision to prioritize the improvement of its anti-submarine warfare (ASW) capabilities, noting the reemergence of Russian undersea capabilities and the continued growth of the Chinese submarine fleet as the principal reasons for doing so. Referencing an interview with U.S. Navy’s Chief of Naval Operations Admiral John Richardson, he explains that the future fleet’s ASW operations will combine air, sea, and undersea forces, emphasizing the need to ensure that the Navy’s attack submarine (SSN) force remains dominant in the subsurface environment. He also notes that although the Navy currently has about fifty-two attack submarines in its fleet against a requirement for forty-eight boats, the SSN force is set to shrink to forty-one by 2029, implying strategic advantage against adversaries in the North Atlantic and the Pacific is not possible without significant procurement adjustments.

Kyle Mizokami, for Popular Mechanics, reviews the debate centered on the future of the U.S. Navy’s aircraft carrier and the different factors influencing the discussion, including the massive financial investment the U.S. has already put into its next generation of flattops and the increasingly dangerous and real threat anti-access/ area denial strategies will pose to carrier operations in the conflicts of tomorrow. Although U.S. reliance on the aircraft carrier as the country’s primary tool of power projection is a notion that continues to draw contention in security and political circles, he notes that technological advancements in unmanned aerial vehicles, longer-ranged planes, or even altering the size and price tag of the carriers themselves may adapt the platform enough to make them useful for decades to come.

CIMSEC members were active elsewhere during the month of August:

At CIMSEC we encourage members to continue writing either here on CIMSEC or through other means. You can assist us by emailing your works to dmp@cimsec.org.

Sam Cohen is currently studying Honors Specialization Political Science at Western University in Canada. His interests are in the fields of strategic studies, international law and defense policy.

Featured image: A Chinese nuclear submarine on the ocean surface (credit: AsiaNews)