Tag Archives: featured

Black Hat 2019 and DEFCON: Leveraging Private Sector Talent for Cyber Capability

By Christian Heller

The U.S. defense complex is looking to private industry and civilian research to gain an advantage on the battlefield as advanced technologies push warfare in new directions. In cyber capabilities especially,the U.S. and its naval services lean on civilians, contractors, and independent cybersecurity companies to gain a competitive national edge. Every year these groups descend upon Las Vegas, Nevada for back-to-back information security and hacking conventions dubbed Black Hat USA and DEFCON. The Department of Defense follows in step to search for best practices, advanced insights, experimental tools, and new talent.

The 2019 editions of Black Hat and DEFCON held plenty for national security analysts to ponder. Dino Dai Zovi, the head of mobile security at the credit card processing company Square, spoke of the need for security software with effective user interfaces which keeps pace with advances in technology. Security programs must be built for “observability” to better “understand if the protections are working and also perform anomaly detection.” Such a requirement is not only necessary for the Navy, but finds a strong historical precedent. The Navy has a long history of simplifying advanced technologies into easier, usable forms for better employment by young sailors.

Identity intelligence, one of the most utilized capabilities of U.S. forces during the past two decades of counterinsurgencies, has also been a main effort for Chinese military and government development. Researchers from the Chinese firm Tencent demonstrated the ability to spoof biometric authentication devices with common eyeglasses. They did so not by convincing the systems that the user was a different person, but rather that the user was a photo instead of a living person. Low budget defenses against identity intelligence tools may prove just as frustrating to U.S. forces in future stability operations as space blankets did against early UAVs.

Major tech leaders like Apple and Microsoft announced new measures to search externally for IT security support through the use of rewards. Apple, which normally treats its technology and systems with close-hold protections, will now award upwards of $1 million to hackers who identify critical vulnerabilities in Apple technology. Microsoft is also offering up to $300,000 to hackers who identify exploits in its Azure cloud technology systems. To facilitate this outside support, Microsoft is creating Azure Security Labs where participants can experiment on Azure networks without affecting the existing customer base.

These bounty programs have already benefited organizations like the Marine Corps which may lack the capacity or skillsets to facilitate internal network testing. At last year’s conference, the Marine Corps hosted a hacking program to test the durability of its public websites and the Marine Corps Enterprise Network, or MCEN. One hundred ethical hackers spent nine hours testing the Marine Corps’ systems and found 75 vulnerabilities in return for $80,000 in combined prize money. Though the payment pales compared to private industry awards, these events are an important way for defense agencies to engage with community experts who are willing to support the military while gaining valuable organizational knowledge in the process. The Pentagon has hosted hacking projects since 2016 and recently leveraged three security firms – Bugcrowd, HackerOne, and Synack – via contract to conduct sustained network testing. Additionally, if data scientists and cyber specialists are going to play a pivotal role in the future Navy and Marine Corps, engaging with non-traditional audiences at events like Black Hat and DEFCON help to expose the hacking world to the armed services.

The Air Force is embracing conferences like DEFCON to leverage technical expertise and open up the service to these communities. It hosted two events at this year’s conference. One challenged hackers to gain entry into an airbase, and the other tested data transfer hardware for the F-15 fighter. The Trusted Aircraft Information Download Station, or TADs, is an independent subsystem of the F-15 which helps collect sensor inputs like images. Next year the Air Force wants to bring an entire F-15 aircraft to the convention and host a hacking event involving a live satellite.

This year’s events also pointed toward the changing battlespace in which U.S. forces will operate. Harvard lecturer and fellow Bruce Schneier discussed “hacking for good,” a movement which is becoming more prevalent throughout the world. Just as military forces found themselves operating around civilians and non-governmental organizations (NGOs) in Iraq and Afghanistan, the future cyber battlespace may be filled with hacktivists trying to do good or “grey hat” operators taking advantage of disorder to pursue alternative motives.

Hacktivist campaigns have occurred in almost every recent global crisis including Sudan, Venezuela, Pakistan, and Libya. Hacktivist campaigns usually involve unsophisticated denial of service attacks to take down websites and servers which achieve mixed results. However, as cyberspace conflict between great powers becomes routine, such groups are sure to increase operations and become regular actors in the same competitive spaces in which government agencies and militaries interact.

Another feature of the changing cyber battlefield is internal competition between state actors. Kimberly Zenz, a senior official with the German cybersecurity organization DSCO, explained at Black Hat that Russia’s intelligence agencies and hacking organizations should be viewed as individual groups competing for influence with one another. This competition can lead to chaos and risk-taking in cyberspace as groups minimize coordination amongst one another and compete to showcase their abilities to senior officials. The results could be similar to the $10 billion dollars in damages caused by the NotPetya malware.

An information graphic depicting the dangers of cyber attacks. (U.S. Navy graphic/Click to Expand)

For the Navy, Marine Corps, and Department of Defense, the consequences of these foreign internal rivalries could be sporadic and disproportionate cyber attacks. Leaders may struggle not only to determine which actor initiated the attack, but what the target, intentions, and overall scale truly are. From the defender’s point of view, probes and attacks which could seem like a coordinated and widespread operation may instead be many. They may also be part of a concerted “persistent engagement” strategy with long-term but subtle objectives. In this case, a defender’s response could be disproportionate to what the attacker intended. These factors make deterrence in cyberspace an elusive goal for policymakers.

One final takeaway from the 2019 conventions is the intention and ability of nefarious actors to target defense users and systems outside of official government channels. Agencies may spend millions to harden networks, but users, such as service members at home, may be the greatest vulnerability in the system. They are often the softest target for foreign powers and criminal groups to exploit with simple techniques. One presenter demonstrated a fully-functioning, charging-capable Apple USB which contains a Wi-Fi implant and allows nearby hackers to access the connected computer. Another speaker showed how she used information from common online subscription services such as Netflix and Spotify to access bank accounts and personal financial data. Using common talking points, customer service helplines, and classic identity theft techniques, she was able to get access to private account information at major financial institutions without any advanced technology. A separate group, Check Point Research, demonstrated the ability to hack digital cameras to spread malware through home networks and hold personal information for ransom.

The military’s efforts to increase information technology security in the workplace may need to extend to personal services and education for service members to prevent workforce distractions, blackmail, or the further spread of malware throughout units and networks. Currently, the individual Soldier, Sailor, Airman, or Marine is the easiest objective for hostile cyber actors to target, whether for criminal, intelligence, or military purposes. The main lessons from Blackhat and DEFCON may be that nowhere is safe, and the services should explore a wider range of protection services for the users they rely on to carry out missions.

Christian Heller is a graduate of the U.S. Naval Academy and University of Oxford. He currently serves as an officer in the United States Marine Corps. Follow him on Twitter, @hellerchThe opinions represented are solely those of the author and do not represent the views of the United States Marine Corps, the Department of Defense, or the United States Government.

Featured Image: DefCon attendees gather in Las Vegas to learn about new technology vulnerabilities and cyberattacks. (AP Photo/Jae C. Hong)

Vote in CIMSEC’s 2019-2020 Officer Elections

CIMSEC’s officer elections are here! Please vote on the next round of volunteers who will continue advancing CIMSEC’s priorities of shaping the discourse on maritime security and building a community of engaged thinkers. 

See the voting form and candidate bios below. Elections will close on Thursday,  October 17. 

Jimmy Drennan

Lieutenant Commander Jimmy Drennan is a surface warfare officer and has served as president of the Center for International Maritime Security since early 2019.

Michael Madrid

Lieutenant Michael Madrid graduated from the U.S. Naval Academy in 2014 and joined the Surface Warfare community, serving his first tour on USS MUSTIN (DDG 89) homeported in Yokosuka, Japan. After two years across the Western Pacific, he served another tour in the Forward Deployed Naval Forces (FDNF), with USS DONALD COOK (DDG 75) homeported in Rota, Spain. He currently works at the Office of Chief of Naval Personnel Support. He has served as CIMSEC’s Director of Membership since 2018.

Dmitry Filipoff

Dmitry Filipoff graduated from the University of California, Merced in 2013 with a B.A. in Political Science. He has served as CIMSEC’s Director of Online Content since June 2015. 

David van Dyk

David Van Dyk is an associate editor with the Center for International Maritime Security and a copy editor/page layout designer at The News & Advance, an award-winning newspaper in Central Virginia. He holds a Bachelor of Science in Communication Studies and a Master of Arts in International Affairs. He is currently a Ph.D. student at the Helms School of Government at Liberty University studying foreign policy. He completed studies in international law at United Nations University for Peace and enjoys reading about naval warfare, maritime security and international criminal law. 

Steph Umbert

Steph Umbert recently completed his Master of International Affairs (MIA) program at Columbia University’s School of International & Public Affairs (SIPA) in New York, where he Concentrated in International Security Policy and Specialized in East Asian Studies and International Conflict Resolution. His graduate studies at SIPA built on academic foundations in Economics and Political Science, in which he holds a double major Bachelor of Arts (BA) degree, and Legal Studies, in which he holds a Diploma, laid prior in DC and Florida where he studied at George Washington University, the University of Miami, and American Heritage School. He also has experience in legislative politics, track-two diplomacy, and political analysis gained on Capitol Hill and on Manhattan. From his earliest days he has held and pursued, among other things, an intense interest in history, including military history, and in the broad spectrum of military affairs, from the development of technological capabilities and doctrines to the deterioration of veteran relations and regimes. He is a native of Florida born to naturalized immigrant parents and he has traveled extensively across both the Western Hemisphere and Eurasia.

Mark Jbeily 

Lieutenant (j.g.) Mark Jbeily is  currently in the naval aviation training pipeline in Kingsville, Texas. Prior to flight school, he graduated from the University of Texas and subsequently the University of Oxford with a masters in international relations. He has written for the U.S. Naval Institute Proceedings and his article entitled “An Ace For All Seasons” won first prize in the 2017 Emerging and Disruptive Technologies essay contest.

Adam Humayun

Lieutenant Adam Humayun is a native of Madison, New Jersey,  and graduated summa cum laude from The George Washington University with a B.A. in International Affairs (Conflict and Security Studies) in 2012. He commissioned in December 2013 from the U.S. Navy Officer Candidate School in Newport, Rhode Island. Onboard USS SHILOH (CG 67). He has served as CF Division Officer and Turbines Officer, and onboard USS MUSTIN (DDG 89) as Fire Control Officer.

 

Working with Dulles: An Insider’s Account of the Taiwan Straits Crisis

This article originally featured in The Foreign Service Journal and is republished with permission. Read it in its original form here.

By Marshall Green

Diplomatic biographer Sir Harold Nicolson once wrote that the worst kind of diplomatists are zealots, lawyers, and missionaries; the best kind are humane skeptics. In his first years as secretary of state, John Foster Dulles seemed to fall clearly in the first category. He was a dyed-in-the-wool lawyer with Cold War missionary zeal. For him, Soviet aggressive moves toward the West invited “massive retaliation”; neutrals were “immoral”; and his policies and acts gave rise to a new term in diplomacy: “brinkmanship.” He was also associated in the minds of many Foreign Service officers with Senator McCarthy and his ilk, who pilloried the Foreign Service and hounded out of office several of our best China specialists whose only “crime” was the accuracy of their reports out of China during World War II, predicting the decline of the Chinese Nationalists under Generalissimo Chiang and the rise of Mao’s Communists.

I came to see a rather different Dulles when I was his working-level action officer during the Taiwan Straits crisis of 1958. My involvement in China policy dates back to 1956, when I was assigned as regional planning adviser in the Bureau of Far Eastern Affairs, which was then headed by Walter Robertson. Robertson was the quintessential Virginia gentleman, a banker by profession, who had powerful connections in the administration and Congress. His overriding interest in world affairs was to uphold the position of Generalissimo Chiang Kai-shek as president of all of China, even though the “Gimo” and his forces had fled the mainland in 1949 to take refuge on Taiwan, China’s island province. For several months in 1958, I had chaired a small working-level interagency task force (State, Defense, and CIA) established by the White House to examine U.S. capabilities to cope with two or more simultaneous military crises in various parts of the world. One of the task force scenarios related to a Chinese Communist (Chicom) aerial or artillery interdiction of the Quemoy island group, held by one-third of the Nationalist forces, though located just a few miles off the shore of mainland China.

When, in fact, an artillery interdiction was launched against the Quemoy and Matsu islands on August 23, 1958, I was able that same day to have on Deputy Assistant Secretary Jeff Parson’s desk our agreed task force recommendations on U.S. countermeasures. These recommendations called for a cautious escalation of U.S. naval and air support operations, as necessary, to protect Taiwan from a Communist takeover. Parson and Robertson approved the recommendations, which were forwarded to Dulles. However, Robertson commented to me, the United States would, of course, never make first use of nuclear weapons. I found this remark rather astonishing, coming from one of our leading hawks.

Dulles, flying down from his vacation retreat on Duck Island in the St. Lawrence River, immediately called a meeting in his office. He had read our recommendations, but his first concern was legal. What were U.S. defense obligations toward Quemoy and Matsu? What restrictions applied to the involvement of U.S. forces in their defense?

These small offshore islands were not included in the U.S.-Republic of China Mutual Defense Treaty’s definition of the treaty area, but a subsequent joint resolution of Congress in January 1955, at the time of the first Taiwan Straits crisis, had authorized the president to employ U.S. armed forces in the protection of not just Taiwan and the Pescadores but also “related positions and territories in that area.”

Dulles had no difficulty in making a legal case that the joint resolution covered the offshore islands in this crisis, since Peking, in attacking them, announced that its objective was Taiwan. The president and congressional leaders agreed. Establishing rules for the engagement of U.S. forces was more difficult. The Quemoy group was so close to mainland shore batteries that they could be blanketed with enemy shells, although there was no evidence of any impending Chicom landing operation against the islands. In fact, the shelling occurred immediately before the typhoon season, when amphibious operations would have been most precarious. It was fairly clear that Peking did not want to take the islands unless, in doing so, it brought down the government in Taiwan.

Peking’s evident intent was interdiction of the offshore islands: to prevent provisions, including food and ammunition, from reaching the defenders, thereby wearing them down to the point of surrender which in turn would precipitate a collapse of morale on Taiwan and a takeover from within by the Communists. The problem therefore came down to one of resupplying the embattled Quemoy group, a task that was beyond the capability of the Nationalist navy, which was not only poorly led at that time but had to contend with incessant bombardment, rough seas, and alleged 27-foot waves in landing supplies on the islands. Thus it was arranged that the U.S. Navy would escort Chinese resupply convoys to a point three miles offshore from Quemoy but would not enter Quemoy’s territorial waters. Nationalist vessels had to cover the last three miles on their own, loaded with supplies including shells for Quemoy’s howitzers.

Dulles, acting under President Eisenhower’s instructions, decided against U.S. air operations in the Taiwan Straits and reached agreement with Taipei that U.S. and Nationalist planes would not overfly mainland China, thereby ruling out air attacks on Chicom shore batteries. One important reason for this decision was that there was no way of silencing these batteries short of nuclear weapons or extensive air-drops of napalm bombs, actions President Eisenhower strongly opposed, as did Dulles. It was also increasingly apparent that Chicom air capability was being used with great restraint, there being no bombing of any Nationalist-held territories.

Our limited rules of engagement also reflected awareness of the lack of support in the United States for getting involved in a war over distant islands that “weren’t worth the life of a single American boy.” Nor did we have international support beyond that of the Republic of China on Taiwan, South Korea, and South Vietnam. Governments of key nations allied to the United States, such as Great Britain and Japan, were correctly restrained in their criticisms, but public opinion in these countries was highly averse to U.S. involvement.

Secretary Dulles accordingly was bent on finding some diplomatic course of action to bring the fighting to a halt. He set little store by what the periodic U.S.-People’s Republic of China ambassadorial-level talks in Warsaw could achieve on this issue, though he appreciated that public awareness of these talks forestalled criticisms that the United States was out of diplomatic contact with the Peking government on this and other issues.

Very early on the morning of September 7, I received a phone call from Dulles, who had evidently had a restless night. He suggested that it might be best for the United States to take the issue to the United Nations, since the General Assembly would be reconvening the following week. Dulles mentioned the possibility of having the British and French introduce a resolution in the UN Security Council calling for a UN-supervised cease-fire and neutralization of the offshore islands. I was strongly opposed to this suggestion, which both Peking and Taipei would reject out of hand. It would impose great strains on our relations with Taipei, which in turn might strengthen the case for Peking occupying China’s seat in the UN.

However, I said nothing about all this to Dulles over the phone but replied that he would have our bureau’s reactions as soon as possible. I immediately prepared a memorandum, approved by Jeff Parsons and signed by Robertson, pointing out the negative factors entailed in the secretary’s suggestion and alternatively recommending that we ask the British and French to introduce a UN resolution welcoming Washington’s and Peking’s discussions of this issue at Warsaw and urging that Peking and Taipei resolve this issue without further resort to force. Also included in Robertson’s memorandum was a suggestion that our side might at some point in the near future take unilateral and unannounced moves, such as shifting our regular Taiwan Straits patrols farther away from Chicom territorial waters, with the Nationalists suspending artillery fire from Quemoy, to see whether this invited any reciprocal moves from the Communist side.

However, before any of these strategies could be pursued, our attention focused on the immediate, urgent issue of Quemoy running out of supplies. The daily consumption of supplies by the 80,000 troops and 45,000 civilians on Quemoy was estimated at 700 tons and yet, since August 23, only 125 tons had been delivered. This appalling record was ascribed to all the usual reasons—bad weather, tidal conditions, heavy shelling—but it also occurred to some in Washington that Taipei was deliberately holding back, or providing us with false figures, in an effort to get the United States more involved in the islands’ defense.

Our Joint Chiefs of Staff could see no reason why, with the exercise of guts and ingenuity, the Nationalists, under existing rules of engagement, could not off-load up to 1,000 tons of supplies a day under favorable weather conditions. Admiral Burke recommended new ways of delivering supplies, including floating them ashore. Over the next two weeks there was some improvement in deliveries but not enough to prevent an alarming diminution of food and ammunition on the Quemoys. By September 28, Taipei reported that only a few days of supplies remained. Cables from the U.S. embassy in Taipei were full of dire warnings.

At this point Secretary Dulles decided to go to New York to take the issue to the UN along the lines he had suggested over the phone on September 7. However, the very day he left for New York, I received word from the CIA that a reliable report had just been received from Quemoy stating that its supply situation was nowhere near as desperate as we had been led to believe. There were several weeks of supplies on hand in the extensive network of tunnels on Quemoy.

Robertson asked me to deliver this information in person to Acting Secretary Christian Herter, who immediately called a meeting in his office. There it was decided that I should go to New York to bring these developments to the attention of Dulles, with a recommendation from Herter that the secretary might wish to postpone any UN initiative.

I was met in New York by UN Ambassador Philip Crowe, who took me early the following day to the secretary’s suite in the Waldorf. When Dulles heard our reports, he canceled scheduled meetings with the British and French ambassadors to the UN, returned to Washington, and called a meeting that evening at his house. There, Admiral Burke was very upbeat on prospects for resupplying the Quemoys, mentioning for the first time in my hearing the fact that two of the Navy’s huge landing ship docks (LSDs) were about to arrive in the Taiwan Straits. These could contain dozens of amphibious landing craft, manned by trained Nationalist crews, which would run up on the shores of Quemoy with supplies.

Meanwhile, spirits on Taiwan had been lifted by the deadly effectiveness of several Nationalist fighter aircraft on patrol, whose U.S.-provided Sidewinders downed five MIG-17s. It was against this background that Peking radio announced on October 6 that it was temporarily suspending its bombardment of the offshores, emphasizing that its action was taken to spare the lives of Chinese compatriots inhabiting those islands. Our side immediately reciprocated by suspending U.S. convoy activities and modifying our naval patrol routes in the Taiwan Straits.

The outlook remained unclear. When Dulles departed on October 20 for Taipei, via Italy and England, Peking announced the end of its cease-fire on the alleged grounds that one of our LSDs had intruded into the territorial waters of Quemoy. On October 25, following the issuance of a joint U.S.-ROC communique at the conclusion of Dulles’s visit to Taipei, Peking announced its intention to observe a cease-fire on the offshore islands on odd-numbered days. Taipei retaliated by firing on Chicom vessels from batteries on Quemoy.

This curious arrangement left each of the Chinese governments with the satisfaction that it was master of the situation, but we had no idea of how long this arrangement would continue. Thus, when Dulles returned from Taipei, his first concern was to preserve the relative calm, while doing everything he could to get the bulk of Chiang’s forces off the offshore islands. But we felt we had to be careful in handling this effort, lest sharp open differences between Washington and Taipei tempt Peking to renew bombardment.

I well recall Secretary Dulles’s comments on his return to Washington: “If nothing is done now, and then a year or so hence the Chicoms again attack the offshores, it will be extremely difficult for us to give the ROC any military support. Already we have had to strain our relations with Congress and foreign governments to the breaking point. Our experience with the offshores was agonizing enough in 1955. It is worse today. We can’t go through this a third time.”

Our efforts to effect a drastic reduction in the garrisons on the offshore islands never succeeded. Eventually, there was a reduction, but meanwhile we came to appreciate that the Chinese in their own particular way had found a solution by turning their hot war into an endless propaganda battle—of propaganda shells, blaring loud speakers, and balloon-delivered leaflets. Peking also issued a long series of “serious warnings” to the United States every time one of our naval patrols in the Taiwan Straits came within Chinese mainland territorial waters, as defined by Peking but not by Washington. The serious warnings had reached the thousand mark by the time President Nixon’s trip to China was announced. Thereafter the warnings ceased.

In retrospect, I have often wondered whether Moscow had any hand in Peking’s decision to halt the heavy bombardment of Quemoy. We know that almost all of the 580,000 shells fired on the islands were produced in the Soviet Union, and that the first signs of serious Moscow-Peking differences appeared soon after the Soviets launched Sputnik in 1957, about a year before the 1958 Taiwan Straits crisis. However, we assumed during that crisis that Peking had Moscow’s unqualified support. Moscow said nothing to suggest otherwise. In fact, Khrushchev warned on several occasions that any use of nuclear weapons would not go unanswered by the USSR. (Peking exploded its first nuclear weapon in 1964.)

Finally, a few comments about Secretary Dulles’s handling of the crisis. I was deeply impressed by his excellent working relations with President Eisenhower as well as with his associates in State, Defense, and CIA (headed by his brother, Allen). On several occasions, near the conclusion of meetings in his office, Dulles would pick up the secure phone and tell the president of our conclusions and solicit his comments or, where relevant, his approval. Dulles thus made it clear to all present that he was acting under Eisenhower’s orders. That, in turn, strengthened Dulles’s position with all his associates.

I was also impressed by the way Dulles took charge of the problem, making it his personal responsibility to work out a peaceful solution, losing many hours of sleep in the process. Yet he sought advice from his associates. I recall how Gerard Smith, at that time director of the Policy Planning Staff, used to argue almost instinctively against the emerging consensus of several of our meetings. Dulles seemed to welcome the ensuing debate, which helped to fine-hone the final decisions. John Foster Dulles may be remembered by history as one of our most zealous, hardline secretaries of state, especially in his dealings with Moscow and Peking, but, from my vantage point during the last year of his life, he appeared as a man of moderation and reason, an able practitioner of diplomacy as well as of law.

Marshall Green served as ambassador to Indonesia and Australia and as assistant secretary for East Asia and the Pacific. This account, based on diary and other personal material, commemorated the 30th anniversary of Secretary Dulles’s death in May 1959.

Featured Image: A Chinese propaganda poster depicting warships, warplanes, and guns, and referring to the metal needed for the war effort with a depiction of a vat of molten metal being poured onto the island of Taiwan, during the Second Taiwan Strait Crisis of 1958. (Archive Photos/Getty Images)

Confederate Sea Denial and Tactics of Asymmetric Naval Warfare

By LCDR Jason Lancaster, USN

Introduction

Today the U.S. faces renewed global competition, and conventional and asymmetric naval threats. The future U.S. way of war must innovate beyond the Second World War strategy of out-producing adversaries, since the U.S. has fewer shipyards and its rivals may have greater industrial capacity. Luckily, U.S. history offers examples of the U.S. as both a dominant power as well as an underdog. The Confederate States Navy provides an excellent example of an under-industrialized innovative underdog struggling to defend itself against an industrial juggernaut.

Naval Asymmetries in the U.S. Civil War

During the “War Between the States,” also known as the American Civil War, the Union Navy held as close to permanent general sea control for the duration; but the Confederate Navy waged an effective campaign to deny sea control in the littorals of key port cities. Maritime strategist and theorist Julian Corbett divided the concept of sea control between local or general, temporary or permanent. Sea control means controlling the sea lines of communications (SLOCs) one side needs to maintain while fighting to deny that control to the adversary. One does not need to control the sea to deny it to an adversary. Sea control does not mean that the enemy will not be able to raid SLOCs, but rather those raids will not have a decisive impact on the war.1  

The Confederate Navy is considered a failure by popular belief because the Southern fleet was unable to break the Union blockade. The navy designed by Confederate Secretary of the Navy Stephen Mallory was not built to break the blockade, but for “desperate and unequal battle to protect land against sea.”This battle began poorly. The Union Navy waltzed into Port Royal, South Carolina, steamed past the Confederate guns at Fort Hatteras, and took control of the North Carolina sounds. Both ports were defended by guns that were out-ranged by the Union Navy. 

The Confederate Navy needed a new plan, and with limited resources only a few places could be adequately defended. Secretary Mallory and General Robert E. Lee compiled a list of priority ports. Union leaders of the Blockade Board did the same. Interestingly, both concurred that the key Southern ports were Norfolk-Richmond, Wilmington, Charleston, Savannah, Mobile, New Orleans, and Galveston.

In order to defend these ports Secretary Mallory focused his limited resources on denying sea control by increasing the survivability of warships through iron armor and improved anti-access weapons such as accurate long-range artillery and mines. When established together, this Confederate three-pronged approach successfully defended key Confederate ports. The new Confederate Navy was built to deny sea control near key Confederate ports to enable blockade runners to continue to supply the South, so that the army could continue to resist ashore. Charleston, Wilmington, and Richmond were not conquered by naval invasion but rather fell to the Union army advancing from the rear or, like Mobile, required weakening the Union blockade of Charleston to mass the forces required to invade. This trident approach enabled the South to maintain local sea control in the vicinity of key ports to keep those ports open.

The theory was that mines and narrow channels limited the maneuverability and fighting effectiveness of ships operating in littoral waters. Well-placed minefields forced ships within range of coastal defense artillery which increased the accuracy and damage of the Confederate Brooke rifles.4 Damaged vessels that got past the mines and coastal defense artillery would have to face the ironclads. This system successfully defended Charleston, Wilmington, and Richmond.

A map of the American Civil War. (Wikimedia Commons, Click to Expand)

However, the Battle of Mobile Bay demonstrated the inherent weakness of the system. The bold and innovative Union commander Admiral Farragut was not deterred by the mines. He placed anchor chains along his ships’ sides as improvised armor and steamed past the forts with their heavy guns to swiftly attack the single heavily outnumbered ironclad. CSS Tennessee’s steering system was outside the protective armor. Once the steering chains had been shot away, Tennessee was unable to maneuver and was overwhelmed by superior numbers.5 

Ironclads

From the beginning, it was clear that the South was at a distinct disadvantage in terms of shipbuilding. With little maritime tradition, few shipyards, and a meager industrial base she could not out-build the Union. Secretary Mallory knew ironclads were the answer. Before the Confederate capital had even moved to Richmond, Secretary Mallory was planning an ironclad navy. On April 26, 1861, Secretary Mallory wrote to the chairman of the House Committee on Naval Affairs:

“I regard the possession of an iron-armored ship as a matter of the first necessity… Inequality of numbers may be compensated by invulnerability; and thus not only does economy but naval success dictate the wisdom and expediency of fighting with iron against wood, without regard to first cost.”6

In Norfolk, Lieutenant John M. Brooke and Chief Naval Constructor John Porter cooperated on a design for a casemate ironclad built on the hull of the frigate Merrimack. With modifications, the basic design became the standard for Confederate ironclads. Richmond and Charleston each completed three ironclads, along the rivers of North Carolina, four were completed, and Savannah and Mobile each completed one. More ironclads were under construction along the Mississippi and other cities. But construction was hampered by material shortages and transportation issues. Throughout the war, 50 ironclads were laid down and 22 of them were commissioned.

However, most Confederate ironclads had maneuverability issues resulting from under-powered engines and deep drafts. Engineering plants were under-powered because the South lacked the capability and expertise to build new plants and used whatever old systems could be salvaged.7

Congressional appropriations and civic societies, including women’s ironclad societies, raised money in major cities to support construction of ironclads like CSS Chicora and Palmetto State in Charleston. Both congress and the citizenry had an expectation that the ironclads would go to sea and break the blockade. Congressional pressure often forced untimely offensives that resulted in disaster. For example, CSS Atlanta was captured by Union forces after she sortied from Savannah in an ill-advised attempt to break the blockade of Savannah against the recommendation of her captain. She ran aground at low tide in the river and was forced to capitulate.   

The USS Cairo photographed in the Mississippi River area during 1862, with a boat alongside her port bow, crewmen on deck and other river steamers in the background. (Wikimedia Commons)

In Charleston, Chicora and Palmetto State conducted a sortie to attack the inshore blockading squadron. They damaged USS Mercidta and USS Keystone State. The Union blockading fleet abandoned the inshore blockade for several weeks until it became clear the two ironclads would not continue patrolling offshore.8

In North Carolina, the Albemarle sailed into the sound and sank the Miami and Southfield, and took part in the liberation of the cities of Plymouth and Washington. She was supposed to rendezvous with the Neuse to support the Confederate Army’s attack on New Bern, but was delayed. The Albemarle struck such fear into the Union fleet that they abandoned the North Carolina sounds. Albemarle was eventually sunk by Union Lieutenant William Cushing in a daring raid up the Roanoke River. Lieutenant Cushing used a steam launch equipped with a spar torpedo to destroy the ironclad.9

Richmond demonstrated the effectiveness of the fleet-in–being, behind obstructions, mines, and powerful artillery. The large Union fleet could not force the obstructions. In January 1865, Secretary Mallory wrote to Captain John Mitchell, commander of the James River Squadron, “If we can block the river at or below City Point, Grant might be compelled to evacuate his position.”10 On January 23-24, 1865, the Confederate fleet sortied, while Union ironclads of the James River Squadron were hundreds of miles away attacking Wilmington. This attack was defeated by the shallow depth of the James River and the Confederate commander’s caution. After a series of groundings, the Confederate fleet returned to its defenses. General Grant understood how close the Confederate Navy had come to raising the siege of Petersburg. If a Confederate ironclad got to City Point, it could destroy the Union supply ships that supported the Union Army besieging Petersburg. Despite frantic telegraphs, the Union James River Squadron did not steam to support the Union batteries. General Grant was lucky that Captain Mitchell had been spooked by the groundings and worried about the impacts of losing his fleet on the defense of Richmond.11 

Coastal Defense Artillery

The War Between the States is often used as a demonstration that the adage, “a ship’s a fool to fight a fort” was dead. It was assumed that advances in naval artillery meant that the ship would always win. If one examined the first few disasters of the war, this might be the case. Bold Union attacks in Hatteras, North Carolina, Port Royal, South Carolina, and Galveston, Texas showed the weakness of Confederate artillery early in the war. The Confederacy needed heavy guns. In addition to his work on the Virginia, Lieutenant John M. Brooke also developed a new artillery piece, the 6.4 inch Brooke Rifled Gun, which was outfitted on the Virginia for its contest with Monitor. The Union Parrot Rifled Gun had a single reinforcing iron band around the breech, but the Brooke Rifle had multiple reinforcing iron bands increasing the strength of the gun and enabling it to use more powder to give projectiles greater range.12 The 7 inch Brooke Rifle’s maximum-range of 7,900 yards easily out-sticked the range of Union Parrot Rifles and Dahlgren guns.13 In addition to developing this new gun, Lieutenant Brooke also developed new bolts to fire from the guns. On 26 October 1862, he wrote in his journal that one of these new bolts pierced three two-inch plates and cracked the wood backing.14 These new guns would play a decisive role in preventing the Union Navy from repeating the easy victories of 1862. 

While Lieutenant Brooke developed the Brooke Rifle, Lieutenant Catesby ap Roger Jones was tasked with the manufacturing. In Selma, Alabama, the Confederate Navy created a foundry to turn out these guns. Through their resourcefulness, a successful, efficient foundry was created from nothing. Throughout the war, over 70 Brooke Rifles were cast in Selma and an almost equal number cast at Tredegar Ironworks in Richmond. These guns were vital to Secretary Mallory’s layered defense of Southern ports and armed both the forts and ironclads.

Norfolk was captured after Union troops landed near modern day Chix Beach far from Confederate defenses. Local Confederate leadership panicked as Union troops advanced on Norfolk. Unable to evacuate CSS Virginia, the Confederate Navy blew her up to prevent capture.

The road to Richmond seemed open. In May 1862, the Union Navy attempted to steam up the James River to capture the city. The Union force had two non-ironclad ships and three ironclads: USS Monitor, USS Naugatuck, and USS Galena. They were surprised by the Brooke Rifles at Drewry’s Bluff that caused massive damage to Galena and Monitor. Galena was hit over 45 times and was badly damaged, including suffering 25 casualties. The guns at Drewry’s Bluff bought time for the Confederate Navy to obstruct the river with mines and ironclads. The James River defenses would not be challenged again until 1865.15

In March 1863, Union Admiral Farragut attempted to run up river past the guns of Port Hudson on the Mississippi with his fleet of seven non-ironclad ships. Restricted room to maneuver, the strong current, and heavy Confederate shore-based gunfire caused havoc in the Union fleet. Only two of Admiral Farragut’s ships succeeded in passing the batteries. Every ship ran aground at some point in the engagement. Admiral Farragut’s ships were lashed together in pairs to minimize the risk of ships being disabled by gunfire and left to their own devices. USS Hartford and USS Albatross led the fleet upriver and were the only two ships to reach their objective. The second pair ran aground, and the shock of the grounding broke them loose of each other, damaging their engines and causing them to drift down river. Shot from the batteries damaged the boilers on USS Richmond, while her partner, USS Genesee, couldn’t make headway against the current and drifted down river. The lone ship in the rear, USS Mississippi caught fire after being hit with heated shot that exploded when the fire reached her magazines.16 In April 1863, Admiral DuPont attempted to force his way past the forts and batteries of Charleston with a fleet of ironclads. After several hours of bombardment, he failed. His force sustained massive damage. Three ironclads were put out of action for weeks, and one, USS Keokuk, sank from damage sustained during the fight.17

These guns not only heavily damaged ships that tried to force the passage, but their large range kept the blockading ships at bay, increasing the ability of blockade runners to enter the port. Wilmington’s geography provides an excellent example of the impact of heavy guns. Fort Fisher was constructed of sand at the tip of Cape Fear, protecting the two inlets into the Cape Fear River. Because of the distance between the two inlets, the Union Navy had to blockade both entrances which required more ships. The heavy guns of Fort Fisher included a 150 pound Armstrong gun, Blakely and Brooke rifles, eight and ten-inch Columbiads, and several 32 pounders. The 150 pound Armstrong gun and Brooke Rifles out-ranged the weapons of the blockading fleet by over a mile, forcing the ships farther offshore and increasing the number of successful blockade runners.18

Mine Warfare

Admiral Farragut’s famous quip to, “damn the torpedoes, full speed ahead” may be considered rash. He lost one of his ironclads, USS Tecumseh to Confederate mines (which were known as torpedoes at the time) at Mobile. If the mines had not become waterlogged, he might have lost more ships. Throughout the war, Confederate mines sank 29 Union ships and damaged 14 more.19

Mines struck fear into the hearts of Union sailors and impacted operations for commanders less daring than Admiral Farragut. Commander Matthew Fontaine Maury and Brigadier General Gabriel Rains led the Navy and Army torpedo research and production teams. Commander Maury’s experiences as a scientist and with electricity and transatlantic telegraph cable led to the development of the electrically detonated underwater mine. General Rains’ experience came from creating landmines and explosive booby traps during the Seminole Wars. While mines were a success, they were not perfect. Confederate manufacturing and new technology meant many became waterlogged duds and did not detonate, saving many more Union ships from a watery grave.

Mines were a controversial weapon in the 1860s; many thought mines lacked chivalry. Admiral Farragut said, “Torpedoes are not so agreeable when used by both sides; therefore, I have reluctantly brought myself to it. I have always deemed it unworthy of a chivalrous nation, but it does not do to give your enemy such a decided superiority over you.” Confederate Secretary of War George Randolph thought they should be used as a means to defend rivers and ports, but not just to kill the enemy. The Confederate Navy created offensive mines called the spar torpedo, a mine attached to a pole controlled from a ship.

The CSS Hunley, one of the world’s first submarines, and the first to sink an enemy vessel in combat, sank the USS Houstonatonic on blockade duty off Charleston in 1864. In addition to submarines, the Confederates developed the David-class torpedo launch. They were not true submarines, but their low profile made them challenging to spot at night. Throughout 1863, CSS David conducted attacks on USS New Ironsides, Wabash, and Memphis. The submarines and torpedo launches forced the Union blockade to remain farther offshore from Charleston to minimize the risk of submerged torpedo attack.

CSS Hunley (Conrad Wise Chapman via Wikimedia Commons)

Mines were effective by striking fear into the hearts of sailors and shaping the battlespace through deterrence. The presence of mines often persuaded Union admirals to not attack, earning effective sea denial for the Confederacy. Admiral Farragut’s famous line stands out because most admirals did not go full speed ahead – they stopped and sent boats to sweep for mines first or simply remained offshore.

Conclusion

Secretary Mallory’s Navy succeeded in its desperate struggle to defend land against sea. The Confederate trident approach succeeded at denying the Union Navy local sea control in the vicinity of key port cities and forced ships to often remain farther from the coast. The Confederate layered defenses enabled Confederate ports to remain open until the final collapse of the Confederacy. 

Despite an ever tightening blockade, the port of Wilmington blockade runners brought 3.5 million pounds of meat, 1.5 million pounds of lead, 2 million pounds of saltpeter, 500,000 pairs of shoes, 300,000 blankets, 50,000 rifles, and 43 cannon from Europe in the latter half of 1864. The Army of Northern Virginia and the Army of Tennessee received new uniforms and equipment that enabled them to continue the struggle. Fort Fisher, the gateway to Wilmington, was captured in January 1865 after two amphibious landings. The Army of Northern Virginia capitulated four months later.20

Today, the U.S. Navy is the largest in the world. However, it finds itself in another technological revolution similar to the rise of the ironclad. While it has the ships and assumes it has permanent sea control, rivals have heavily invested in the spiritual successor to the Brookes Rifle, the anti-ship cruise missile.

The U.S. Navy must learn from the Confederate example and create its own trident of technologies and tactics to out-compete rival advances. The U.S. Navy should rapidly construct new long range anti-ship cruise missiles (ASCMs) that out-range opponents, improve and revive mine-warfare forces, and think hard about what evolution flows from the modern range and defense of the aircraft carrier. In addition, these advances should be shared with allies, such as Japan and the Philippines, who could utilize new American-developed sea mines and ASCMs to deny an adversary sea control near their littorals. Mobile long-range ASCM batteries on the islands of Luzon and Palawan could close the entire South China Sea to an adversary, much like Russian coastal defense cruise missile sites in Crimea can contest much of the Black Sea.

Great power rivals understand that a fleet-on-fleet engagement against the U.S. Navy is incredibly risky and have developed alternatives, just like the Confederate Navy developed alternatives to a fleet-on-fleet engagement with the Union. Now it is the U.S. Navy’s turn to learn from history, and develop its own counter-punch to ensure it maintains permanent sea control and open sea lines of communication.

LCDR Jason Lancaster is an alumnus of Mary Washington College and has an MA from the University of Tulsa. He is currently serving as the N8 Tactical Development Officer at Commander, Destroyer Squadron 26. His views are his own and do not necessarily reflect the official position of the U.S. Navy or Department of Defense.

Endnotes

1. Corbett, Julian, Some Principles of Maritime Strategy, pp 125-127.

2. Luraghi, Raimondo, A History of the Confederate Navy, pg 4.

3. Simson, Jay, Naval Strategies of the Civil War, pp 129-131.

4. Ibid. pg 131.

5. Still, William N. Jr, Iron Afloat: The Story of the Confederate Armorclads, pg 210.

6. Ibid, pg 10.

7. Sims, pp 227-228.

8. Browning, Robert M. Jr, Success is all that was expected: The South Atlantic Blockading Squadron during the Civil War, pp 137-140.

9. Still, pp 212-213.

10. Coski, John M., Capital Navy, The Men, Ships, and Operations of the James River Squadron, pg 196.

11.Ibid, pp 202-205.

12. Brooke, George, Ironclads and Big Guns of the Confederacy, pg 127.

13. Drury, Ian and Gibbons, Tony, The Civil War Military Machine, pp 77-80.

14. Brooke, pg 115.

15. Coski, pg 46.

16. Page, Dave, Ships Versus Shore: Civil War Engagements along Southern Shores and Rivers, pp 316-319.

17. Browning, pg 140.

18. Drury, pp 79-82.

19. http://www.navalunderseamuseum.org/civilwarmines/ accessed 15 April 2019.

20. Stephen R. Wise, Lifeline of the Confederacy (Columbia, University of South Carolina Press, 1988), pg 1.

Extended Bibliography

Coski, John M. Capital Navy: The Men, Ships, and Operations of the James River Squadron. New York: Savas Beatie, 2005.

Gibbons, Ian Drury & Tony. The Civil War Military Machine. New York: Smithmark, 1993.

Jr, George M. Brooke. Ironclads and Big Guns of the Confederacy: The Journal and Letters of John M. Brooke. Columbia, SC: University of South Carolina Press, 2002.

Jr, Robert M. Browning. From Cape Charles to Cape Fear: The North Atlantic Blockading Squadron During the Civil War. Tuscaloosa, AL: University of Alabama Press, 1993.

—. Success is All That Was Expected: The South Atlantic Blockading Squadron during the Civil War. Washington DC: Potomac Books, inc, 2002.

Jr, William N. Still. Iron Afloat The Story of the Confederate Ironclads. Columbia: University of South Carolina Press, 1985.

Luraghi, Raimondo. A History of the Confederate Navy. Annapolis: Naval Institute Press, 1996.

Page, Dave. Ships versus Shore: Civil War Engagements Along Southern Shores and Rivers. Nashville: Rutledge Hill Press, 1994.

Simson, Jay W. Naval Strategies of the Civil War. Nashville: Cumberland House Publishing inc, 2001.

United States Naval Undersea Warfare Museum. http://www.navalunderseamuseum.org/civilwarmines/. 2019. http://www.navalunderseamuseum.org/civilwarmines/ (accessed April 15, 2019).

Waters, W. Davis. Gabriel Rains and the Confederate Torpedo Bureau. El Dorado Hills, CA: Savas Beatie, 2014.

Wise, Stephen R. Lifeline of the Confederacy Blockade Running During the Civil War. Columbia, SC: University of South Carolina Press, 1988.

Featured Image: “The Giant of Mobile Bay, CSS Tennessee” by Tom Freeman