Tag Archives: featured

Latin American Navies and Antarctica

The Southern Tide

Written by W. Alejandro Sanchez, The Southern Tide addresses maritime security issues throughout Latin America and the Caribbean. It discusses the challenges regional navies face including limited defense budgets, inter-state tensions, and transnational crimes. It also examines how these challenges influence current and future defense strategies, platform acquisitions, and relations with global powers.

“The security environment in Latin America and the Caribbean is characterized by complex, diverse, and non-traditional challenges to U.S. interests.” Admiral Kurt W. Tidd, Commander, U.S. Southern Command, before the 114th Congress Senate Armed Services Committee, 10 March 2016.

By W. Alejandro Sanchez and Brittney J. Figueroa

Latin American governments have a strong presence in Antarctica, with two countries, Argentina and Chile, formally claiming Antarctic territories while several others carry out annual scientific expeditions (apart from having research bases there). Regional navies are of paramount importance in these operations as they are the spearhead of their respective nations’ expeditions and security initiatives in Antarctic waters. In fact, in recent months, there have been new developments that signal a greater Latin American naval presence in the Antarctic in the near future: Peru has commissioned its new oceanographic vessel while Chile has commenced the construction of a new icebreaker.

Antarctic geopolitics will only increase in importance due to climate change and the upcoming year 2048 when the Antarctic Treaty will be open for review. Hence it is important that Latin America, broadly speaking, takes steps to maintain a continuous presence in Antarctica in order to have a voice when the frozen continent’s future is decided. Increasing budgets in order to modernize or replace aging vessels and expanding already successful scientific and security programs will play a critical role in regional navies’ future Antarctic operations.

Antarctica as a National Interest

The importance of Antarctica in Latin American security and defense strategies, as well as more comprehensive foreign policy concepts, cannot be overemphasized. One example of this is Antarctica’s frequent and prominent mentions in regional White Papers. For example, Argentina’s 2015 White Book repeatedly references Antarctica, and explains how “the Ministry of Defense considers of the upmost importance the upgrade [of military platforms] necessary for the scientific development, international cooperation and preservation of the Antarctic environment” (P. 43). Similarly Peru’s 2005 White Book mentions how the “Ministry of Defense, via the armed forces, has a fundamental role in the logistical support and the scientific research that encompasses the Peruvian presence in Antarctica” (P.42). Finally, Chile’s 2010 White Book has an extensive chapter on the Chilean Antarctic, explaining how the armed forces aim to “have a permanent presence, even during winter, in the Antarctic continent and its islands” and to carry out oceanographic scientific research in the region (P. 51 & 52).

These three different White Books exemplify Latin American nations’ interests in having a strong Antarctic presence and how militaries, particularly navies, are regarded as the tip of the spear of Antarctic operations.

Vessels and Patrols

Argentina and Chile possess several platforms that operate in Antarctic waters for expeditions, patrols, and to support their Antarctic bases. Argentina has the icebreaker ARA Almirante Irízar (Q5) and in 2014, Buenos Aires acquired four Russian Neftegaz-class multipurpose vessels to support its Antarctic bases. Meanwhile, Chile has the icebreaker Almirante Oscar Viel (AP46), and several other vessels capable of operating in Antarctic waters.

Additionally, the two countries set aside their differences—overlapping territorial claims in the Antarctic—to create the Joint Antarctic Naval Patrol (Patrulla Antártica Naval Combinada: PANC) in 1998. Via the PANC, naval platforms from the two countries come together during the Antarctic Summer months (November-March) to patrol Antarctic waters, assist vessels in need (e.g. the tourist vessel M/V Explorer in 2007), respond to oil spills, and visit and support various bases.

A picture taken by the Chilean Air Force shows the Explorer, which struck an iceberg in the Antarctic Ocean. (Fuerza Aerea de Chile via European Pressphoto Agency)

The PANC’s navies pride themselves on being prepared to safeguard the lives of those who work in and travel to the region, and are prepared for search and rescue missions along with other various emergencies at sea. The creation and success of the PANC should not be underestimated as it exemplifies the possibilities of collaborative naval efforts in the Antarctic. It is worth stressing that neither PANC country is a military power, and they do not have the same naval capabilities as some of their wealthier Antarctic counterparts, thus putting them at a great disadvantage (especially when considering each nation’s capabilities alone). However, despite the older vessels in their fleets, their partnership over the past two decades has proven to be effective both to patrol Antarctic waters, and also as a confidence-building mechanism.

Non-claimant nations also have important Antarctic programs. Peru, for example, recently received BAP Carrasco (BOP171), constructed by the Spanish Freire shipyard in 2016. Jane’s 360 explains that “the steel-hulled ship has a length of 95.9 m, a 6,000-tonne displacement, has a streamlined and raked superstructure with a meteorological sensor platform at the forward end,” which will be of great help for Peru’s future operations in the Antarctic. In addition, Brazil has a varied presence in the region that consists of the Almirante Maximiano (H-41), an ice breaker, the Ary Rongel (H-44), an oceanographic support ship, and several C-130 Brazilian Air Force (FAB) aircraft that are utilized to transport essential equipment and personnel to the Brazilian Antarctic Program (PROANTAR) facilities.

Regarding Chile, it has commenced the construction of a brand-new icebreaker as part of its Antarctica I project. Thanks to information provided to the authors by ASMAR, (Astilleros y Maestranzas de la Armada) Chile’s state-owned shipyard that has partnered with the Chilean Navy since 1895, we know that the new platform, an over $210 million project, will be capable of longer Antarctic missions in part due to its design which allows it to operate at temperatures as low as -30 Celsius. Additionally, the icebreaker will be equipped with modern, state-of-the-art scientific equipment in its microbiological and chemical laboratories. Construction commenced on 9 May at ASMAR’s Talcahuano facilities. The new vessel will be operational by the 2022-2023 season, and will greatly support Chile’s Antarctic operations.

As for Colombia, the navy has refitted one of its oceanic patrol vessels, ARC 20 de Julio (PZE-46), so it can better operate in Antarctic conditions. The vessel has already carried out two expeditions. 

Uruguay’s presence in Antarctica since 1985 is also worth noting. The ROU 26 Vanguardia is the small South American country’s primary platform used for scientific research and to support Base Artigas and Station Ruperto Elichiribehety. The Vanguardia, named Otto Von Guericke at the time of its construction, was built in Poland for East Germany in 1976. The vessel was purchased by Montevideo in 1991 and was then given its current name. It has a length of 72.62 m, displaces 1872 tons, and a maximum speed of 14.5 knots. Other ships that participate in the country’s Antarctic activities are ROU 04 Artigas and ROU 22 Oyarvide. Unlike the PANC, which focuses on patrolling and safety activities, Uruguay’s main operations in the continent take place via the Uruguayan Antarctic Institute, a national agency under the supervision of the Ministry of Defense that focuses on scientific, technological, and logistic activities.

The Chilean icebreaker ‘Veil.’ (EFE/Chilean Navy)

Finally, it is worth stressing the general spirit of camaraderie in the Antarctic among South American navies. The PANC is a security-related initiative of two navies coming together in spite of historical differences and ongoing territorial claims in the Antarctic. Similarly, Uruguay has shared the results of some scientific studies with Chile and Argentina. In addition, Uruguay’s Mobile Marine Meteorological Station Project (Proyecto Estacion Meterologica Movil Marina) is an ongoing project that provides real-time information such as wind direction and speed, atmospheric and barometric pressure; and wave period, height, and type to Argentine and Chilean stations. This is a prime example of Latin American navies and scientific centers coming together to build upon each other’s successes in Antarctica.

Slow Improvements

While the aforementioned developments clearly demonstrate how Latin American navies are growing Antarctic capabilities, they should not be overestimated as there are also troubling shortcomings, particularly due to budget issues. For example, while Argentina’s icebreaker Irízar recently commenced sea trials and will likely return to operational duty by the 2017-2018 season, it has taken a decade-long reconstruction effort to repair the platform after it was ravaged by a fire in 2007. Similarly, budget issues have affected Argentina’s recent Antarctic operations, best exemplified by the recent summer 2016- 2017 season, in which the government had trouble figuring out how to resupply its Antarctic bases.

As for other nations, platforms that are too old to continue operating safely are eventually replaced by other vessels, which is not the same as expanding a fleet in terms of numbers. For example, Peru’s Carrasco will replace BIC Humboldt, which was constructed in the late 1970s and has gone through extensive overhauls to extend its operational life. Similarly, the new Chilean icebreaker will replace Viel, which was constructed in the late 1960s. Other naval platforms utilized for Antarctic operations, including the PANC, will soon become outdated. For example, Chile deployed ATF Lautaro (67) to the 2016-2017 PANC mission, a vessel constructed in 1973, while Argentina deployed ARA Islas Malvinas (A24), constructed in the 1980s. While replacement platforms are always welcome, expanding fleets by acquiring newly constructed ships would be more practical as their operational lives would last much longer than repurposed, older vessels.

Map of Antarctica (NASA)

The aforementioned Argentine Almirante Irízar illustrates the benefits of a stronger commitment by regional states toward their Antarctic programs, including their naval platforms. While its post-fire reconstruction was extensive and lengthy, the Argentine government’s investment has made the vessel one of the 10 biggest icebreakers in the world, as well as one of the most capable. In a recent navigational test, the ship surpassed expectations, and showed no signs of the various previous problems it had when it first made its way to the Antarctic from Finland in 1978. Not only does the ship have improved navigation capabilities, but it is also now multipurpose, housing eight top-of-the-line scientific laboratories, and an overall scientific investigation sector six times larger than that of its original construction. Despite the lengthy timeline of the repair, the Argentine government’s decision to allocate scarce resources in revamping the Irizar is a Cinderella Story of sorts, as it exemplifies the benefits that could come from a bigger budget committed to Antarctic maritime operations. Obtaining a new vessel would have probably taken less time than repairing the Irizar, nevertheless, if reports are to be believed, this modernized vessel will be of great help for Argentina’s Antarctic operations for the foreseeable future.

Final Thoughts

Navies are usually viewed through the prism of defense and security; however they also play a critical role in Antarctic programs. Certainly other military services, government departments, and scientific institutions are other necessary pillars of any vibrant and robust Antarctic program, but navies are a sort of spearhead as they employ the primary platforms that deploy to this frozen continent. Hence it comes as no surprise that navies are prominently mentioned in the White Papers of several regional countries regarding Antarctic operations as they are engaged in various operations ranging from scientific activities to providing emergency assistance.

Countries like Peru and Chile are working on obtaining new platforms for Antarctic use while Colombia has refitted one of its navy’s vessels for these operations. Meanwhile, the Argentine and Chilean navies have come together to create a joint Antarctic naval patrol that has helped vessels and Antarctic bases in need. Finally, Uruguay’s scientific program and projects are also notable as they provide data that allows the multifaceted work of the Latin American countries in the region to continue operations safely and effectively.

The importance of Arctic and Antarctic geopolitics will increase due to climate change and the approaching year 2048, when the Antarctic Treaty is up for revision. The modernization of polar-capable vessels, such as Argentina’s Alimirante Irizar, if not the acquisition of newer ones like Peru’s Carrasco, will help Latin American navies increase the reliability and projection of already successful missions in Antarctica thereby fortifying Latin America’s presence and increasing its voice in regards to the future of the frozen continent.

For further info, see: “Reinvigorating Peru’s role in Antarctic geopolitics” (The Polar Journal, 2015) and “Argentina, Chile and the Joint Antarctic Naval Patrol: a successful confidence building mechanism” (The Polar Journal, 2017).

W. Alejandro Sanchez is a researcher who focuses on geopolitical, military, and cyber security issues in the Western Hemisphere. Follow him on Twitter: @W_Alex_Sanchez.

Brittney J. Figueroa is a recent graduate from the University of California, Santa Barbara with a Bachelors degree in Global Studies, and a Minor in Latin American Iberian Studies.

The views presented in this essay are the sole responsibility of the authors and do not necessarily reflect those of any institutions with which the authors are associated.

Featured Image: Chilean icebreaker in Brandy Bay, Antarctica. (Wikimedia Commons)

Beijing’s Views on Norms in Cyberspace and Cyber Warfare Strategy Pt. 1

By LCDR Jake Bebber USN

The following is a two-part series looking at PRC use of cyberspace operations in pursuit of its national strategies and the establishment of the Strategic Support Force. Part 1 considers the centrality of information operations and information war to the PRC’s approach toward its current struggle against the U.S. Part 2 looks at the PRC’s use of international norms and institutions in cyberspace, and possible U.S. responses.

Introduction

A recent article noted a marked shift in Chinese strategy a few short years ago which is only now being noticed. Newsweek author Jeff Stein wrote a passing reference to a CCP Politburo debate under the presidency of Hu Jintao in 2012 in which “Beijing’s leading economics and financial officials argued that China should avoid further antagonizing the United States, its top trading partner. But Beijing’s intelligence and military officials won the debate with arguments that China had arrived as a superpower and should pursue a more muscular campaign against the U.S.”1

The nature of this competition is slowly taking shape, and it is a much different struggle than the Cold War against the Soviet Union – however, with stakes no less important. This is a geoeconomic and geoinformational struggle. Both U.S. and PRC views on cyber warfare strategy, military cyber doctrine, and relevant norms and capabilities remain in the formative, conceptual, and empirical stages of understanding. There is an ongoing formulation of attempting to understand what cyberspace operations really are. While using similar language, each has different orientations and perspectives on cyberspace and information warfare, including limiting structures, which has led to different behaviors. However, the nature of cyberspace, from technological advancement and change, market shifts, evolving consumer preferences to inevitable compromises, means that while windows of opportunity will emerge, no one side should expect to enjoy permanent advantage. Thus, the term ‘struggle’ to capture the evolving U.S.-PRC competition.

The PRC recognized in the 1990s the centrality of information warfare and network operations to modern conflict. However, it has always understood the information space as blended and interrelated. Information is a strategic resource to be harvested and accumulated, while denied to the adversary. Information warfare supports all elements of comprehensive national power to include political warfare, legal warfare, diplomatic warfare, media warfare, economic warfare, and military warfare. It is critical to recognize that the PRC leverages the American system and its values legally (probably more so than illegally), to constrain the U.S. response, cloud American understanding, and co-opt key American institutions, allies, and assets. In many ways, the PRC approach being waged today is being hidden by their ability to work within and through our open liberal economic and political system, while supplemented with cyber-enabled covert action (such as the OPM hack).

To support their comprehensive campaign, the PRC is reforming and reorganizing the military wing of the Communist Party, the People’s Liberation Army (PLA), posturing it to fight and win in the information space. Most notably, it recently established the Strategic Support Force (SSF) as an umbrella entity for electronic, information, and cyber warfare. Critical for U.S. policymakers to understand is how the SSF will be integrated into the larger PLA force, how it will be employed in support of national and military objectives, and how it will be commanded and controlled. While much of this remains unanswered, some general observations can be made.

This reform postures the PLA to conduct “local wars under informationized conditions” in support of its historic mission to “secure dominance” in outer space and the electromagnetic domain. Network (or cyberspace) forces are now alongside electromagnetic, space, and psychological operations forces and better organized to conduct integrated operations jointly with air, land, and sea forces.2

This change presents an enormous challenge to the PLA. The establishment of the SSF disrupts traditional roles, relationships, and processes. It also disrupts power relationships within the PLA and between the PLA and the CCP. It challenges long-held organizational concepts, and is occurring in the midst of other landmark reforms, to include the establishment of new joint theater commands.3 However, if successful, it would improve information flows in support of joint operations and create a command and control organization that can develop standard operating procedures, tactics, techniques, procedures, advanced doctrine, associated training, along with driving research and development toward advanced capabilities.

While questions remain as to the exact composition of the Strategic Support Force, there seems to be some consensus that space, cyber, electronic warfare, and perhaps psychological operations forces will be centralized into a single “information warfare service.” Recent PLA writings indicate that network warfare forces will be charged with network attack and defense, space forces will focus on ISR and navigation, and electronic warfare forces will engage in jamming and disruption of adversary C4ISR. It seems likely that the PRC’s strategic information and intelligence support forces may fall under the new SSF. The PLA’s information warfare strategy calls for its information warfare forces to form into ad hoc “information operations groups” at the strategic, operational, and tactical levels, and the establishment of the SSF will save time and enable better coordination and integration into joint forces. The SSF will be better postured to conduct intelligence preparation of the battlespace, war readiness and comprehensive planning for “information dominance.”4

The establishment of the SSF creates a form of information “defense in depth,” both for the PLA and Chinese society as a whole. The SSF enables the PLA to provide the CCP with “overlapping measures of electronic, psychological, and political deterrents.” It is reasonable to expect that there will be extensive coordination and cooperation among the PRC’s military, internal security, network security, “commercial” enterprises such as Huawei and ZTE, political party organizations, state controlled media both inside and outside China, and perhaps even mobilization of Chinese populations.

Chinese Information Warfare Concepts and Applications

Recent Chinese military writings have stressed the centrality of information to modern war and modern military operations. Paying close attention to the way the West – principally the U.S. – conducted the First Gulf War and operations in Kosovo and the Balkans in the 1990s, the PRC has been aggressively pursuing a modernization and reform program that has culminated in where they are today. Indeed, there is close resemblance to PLA and PRC aspirational writing from the 1990s to today’s force structure.

In many ways, the PLA understanding of modern war reflects the American understanding in so much as both refer to the centrality of information and the need to control the “network domain.” “Informatized War” and “Informatized Operations” occur within a multi-dimensional space – land, sea, air, space and the “network electromagnetic” or what Americans generally understand as “cyberspace.” The U.S. has long held that the control of the network domain provides a significant “first mover advantage,” and the PRC is well on the way toward building the capability for contesting control of the network domain. Its writings consistently hold that the PLA must degrade and destroy the adversary’s information support infrastructure to lessen its ability to respond or retaliate. This is especially necessary for “the weak to defeat the strong,” because most current writing still suggests that the PLA believes itself still inferior to American forces, though this perception is rapidly changing. Regardless, the PRC understanding of modern war supposes a strong incentive for aggressive action in the network domain immediately prior to the onset of hostilities.6 These operations are not restricted geographically, and we should expect to see full-scope network operations worldwide in pursuit of their interests, including in the American homeland.7

There are three components to a strategic first strike in the cyber domain. The first component is network reconnaissance to gain an understanding of critical adversary networks, identifying vulnerabilities, and manipulating adversary perception to obtain strategic advantage. Network forces are then postured to be able to conduct “system sabotage” at a time and place of the PRC’s choosing. When the time is right, such as a prelude to a Taiwan invasion or perhaps the establishment of an air defense identification zone over the South China Sea, the PRC will use system sabotage to render adversary information systems impotent, or to illuminate the adversary’s “strategic cyber geography” in order to establish a form of “offensive cyber deterrence.” The PRC could take action to expose its presence in critical government, military, or civilian networks and perhaps conduct some forms of attack in order to send a “warning shot across the bow” and give national decision-makers reason to pause and incentive to not intervene.8

Indeed, unlike the American perspective, which seeks to use cyberspace operations as a non-kinetic means to dissuade or deter potential adversaries in what Americans like to think of as “Phase 0,” the PLA has increasingly moved toward an operational construct that blends cyberspace operations with kinetic operations, creating a form of “cyber-kinetic strategic interaction.” The goal would be to blind, disrupt, or deceive adversary command and control and intelligence, surveillance, and reconnaissance (C4ISR) systems while almost simultaneously deploying its formidable conventional strike, ballistic missile, and maritime power projection forces. The PLA envisions this operational concept as “integrated network electronic warfare,” described by Michael Raska as the “coordinated use of cyber operations, electronic warfare, space control, and kinetic strikes designed to create ‘blind spots’ in an adversary’s C4ISR systems.”9 

The PLA has recently described this as a form of “network swarming attacks” and “multi-directional maneuvering attacks” conducted in all domains – space, cyberspace, ground, air, and sea. The Strategic Support Force has been designed to provide these integrated operations, employing electronic warfare, cyberspace operations, space and counter-space operations, military deception and psychological operations working jointly with long-range precision strike, ballistic missile forces and traditional conventional forces.

Essential to these concepts are China’s ability to achieve dominance over space-based information assets. PRC authors acknowledge this as critical to conducting joint operations and sustaining battlefield initiative. This includes not only the orbiting systems, but ground stations, tracking and telemetry control, and associated data systems. We can expect full-scope operations targeting all elements of America’s space-based information system enterprise.

Important to all of this is the necessity of preparatory operations that take place during “peacetime.” China understands that many of its cyberspace, network, electronic and space warfare capabilities will not be available unless it has gained access to and conducted extensive reconnaissance of key systems and pre-placed capabilities to achieve desired effects. We should expect that the PRC is actively attempting to penetrate and exploit key systems now in order to be able to deliver effects at a later date.

Chinese Understandings of Deterrence and International Law in Cyber Warfare

China recently released the “International Strategy of Cooperation on Cyberspace.”10 Graham Webster at the Yale Law School made some recent observations. First, it emphasizes “internet sovereignty,” which is unsurprising, since the CCP has a vested interest in strictly controlling the information space within China, and between China and the rest of the world.  This concept of “internet sovereignty” should best be understood as the primacy of Chinese interests. China would consider threatening information sources outside of the political borders of China as legitimate targets for cyber exploitation and attack. In the minds of the CCP, the governance of cyberspace should recognize the sovereignty of states, so long as the Chinese state’s sovereignty is paramount over the rest of the world’s.

Second, the strategy suggests that “[t]he tendency of militarization and deterrence buildup in cyberspace is not conducive to international security and strategic mutual trust.” This appears to be aimed squarely at the U.S., most likely the result of Edward Snowden’s actions. The U.S. seems to also be the target when the strategy refers to “interference in other countries’ internal affairs by abusing ICT and massive cyber surveillance activities,” and that “no country should pursue cyber hegemony.” Of course, the PRC has been shown to be one of the biggest sources of cyber-enabled intellectual property theft and exploitation, and China’s cyber surveillance and control regimes are legendary in scope. Immediately after decrying the “militarization” of cyberspace, the strategy calls for China to “expedite the development of a cyber force and enhance capabilities … to prevent major crisis, safeguard cyberspace security, and maintain national security and social stability.” These broad, sweeping terms would permit China to later claim that much of its activities that appear to violate its own stated principles in the strategy are indeed legitimate.

The strategy seeks to encourage a move away from multi-stakeholder governance of the Internet to multilateral decision-making among governments, preferably under the United Nations. This would certainly be in China’s interests, as China continues to hold great sway in the U.N., especially among the developing world. After all, China is rapidly expanding its geoeconomic and geoinformational programs, leveraging its state-owned enterprises to provide funding, resources, and informational infrastructure throughout Africa, Asia, Europe, and the Americas. As more countries become dependent on Chinese financing, development, and infrastructure, they will find it harder to oppose or object to governance regimes that favor Chinese interests.

Naturally, the strategy emphasizes domestic initiatives and a commitment to a strong, domestic high-tech industry. This would include the “Made in China 2025” plan, which has received a great deal of attention. The plan seeks to comprehensively upgrade and reform Chinese industry, with an emphasis on information technology.11

When considering deterrence in the Chinese understanding, it is important to remember that China approaches it from a different context than the United States. Jacqueline Deal noted that China’s basic outlook proceeds from the premise that the “natural state of world is one of conflict and competition, and the goal of strategy is to impose order through hierarchy.”12 While Americans understand deterrence as a rational calculation, the Chinese approach emphasizes the conscious manipulation of perceptions.

Indeed, the Chinese term weishe, which translates as “deterrence,” also embodies the idea of “coercion.” We might see examples of this understanding by China’s historic use of “teaching a lesson” to lesser powers. In the 20th Century, Chinese offensives against India and Vietnam – thought by many in the West to be an example of tragic misunderstanding and failed signaling of core interests – might be better thought of as attempts by China to secure its “rightful” place atop the regional hierarchy. It is a form of “lesson teaching” that has long-term deterrent effects down the road.

We can expect therefore that cyberspace would become one means among many that China will use in support of its “Three Warfares” (public opinion, media, legal) concept in support of its larger deterrent or compellence strategies. It will likely be much broader than the use of PLA SSF forces, and could include cyber-enabled economic strategies, financial leverage, and resource withholding.

LCDR Jake Bebber is a cryptologic warfare officer assigned to the staff of Carrier Strike Group 12. He previously served on the staff of U.S. Cyber Command from 2013 – 2017. LCDR Bebber holds a Ph.D. in public policy. He welcomes your comments at: jbebber@gmail.com. These views are his alone and do not necessarily represent any U.S. government department or agency.

1. Available at: http://www.newsweek.com/cia-chinese-moles-beijing-spies-577442

2. Dean Cheng (2017). Cyber Dragon: Inside China’s Information Warfare and Cyber Operations. Praeger Security International.

3. Cheng 2017.

4. John Costello and Peter Mattis (2016). “Electronic Warfare and the Renaissance of Chinese Information Operations.” in China’s Evolving Military Strategy (Joe McReynolds, editor). The Jamestown Foundation.

6. Joe McReynolds, et. Al. (2015) “TERMINE ELECTRON: Chinese Military Computer Network Warfare Theory and Practice.” Center for Intelligence Research and Analysis

7.  Barry D. Watts (2014) “Countering Enemy Informationized Operations in Peace and War.” Center for Strategic and Budgetary Assessments

8. Timothy L. Thomas (2013) “China’s Cyber Incursions.” Foreign Military Studies Office

9. See: http://www.atimes.com/article/chinas-evolving-cyber-warfare-strategies/

10. See: http://news.xinhuanet.com/english/china/2017-03/01/c_136094371.htm

11. See: https://www.csis.org/analysis/made-china-2025

12. Jacqueline N. Deal (2014). “Chinese Concepts of Deterrence and their Practical Implications for the United States.” Long Term Strategy Group.

Featured Image: The Center for Nanoscale Materials at the Advanced Photon Source. (Photo: Argonne National Laboratory)

Hunters and Killers

Norman Polmar and Edward Whitman, Hunters and Killers: Volume 1 and Volume 2. Annapolis, Naval Institute Press, 2015/2016, $44.95.

By Joe Petrucelli

In their two-volume work, Norman Polmar and Edward Whitman have written the first comprehensive history of Anti-Submarine Warfare. As the authors note in their preface, there are histories of ASW campaigns as well as  both adversary and U.S. submarine operations, but no one has examined the discipline of ASW from its humble beginnings. Polmar and Whitman do just that in these two volumes, starting with the rudimentary ASW operations of the American revolution through the massive campaigns of the First and Second World War and finishing with the nuclear revolution and post-Cold War implications. Through their analysis, one can discern four factors that make ASW campaigns effective throughout history: numbers, technology, intelligence coordination, and organizational integration and concepts.

The most important conclusion that can be drawn from Polmar and Whitman’s analysis is that in ASW, numbers matter. While acknowledged as important, most navies do not appear to consider ASW as one of their most important capabilities and invest in it accordingly. Thus, during the interwar period, Polar and Whitman observe that the U.S. and Royal Navies drastically cut their ASW platforms both in absolute and relative terms, preferring to expend limited resources on larger, more prominent line combatants. Unfortunately, all the successful ASW campaigns they examined required presence over a large open-ocean area and a small number of highly capable combatants were not necessarily helpful, leaving the Allies to suffer severe losses until embarking on emergency building programs. To emphasize this point, in 1940 none other than Winston Churchill observed that large surface combatants (even if equipped with ASW weapons and sensors) were not effective escorts because they were valuable enough to become targets themselves. The most effective force structure during the ASW campaigns they examined consisted of long-range patrol aircraft and a large number of small, relatively expendable escorts.

The history of ASW is one of technological innovation by both submarines themselves and ASW forces. Polmar and Whitman do an excellent job explaining these complex technical developments in ASW (i.e. sound wave attenuation, convergence zones, etc) and translating them into layman-ese. However, it is important to note that they do not present technology as the solution for ASW dominance, but rather as a never-ending balance between offensive and defensive technologies. As ASW forces developed new technical capabilities such as depth charges, radar, and sonar, submarines countered with technologies such as snorkels, longer-range torpedoes and air-independent and nuclear propulsion. In the end, technology provided necessary tactical capabilities for an effective ASW campaign, but by itself was not sufficient to practice effective ASW.

Additionally, the authors explores the role of intelligence and cryptology in ASW, a vital factor in historical ASW campaigns. Allied cryptology efforts, known as ULTRA during WWII, were vital to cueing ASW forces and helping convoys avoid known U-boat patrol areas, while HF/DF capabilities deployed on escort ships gave ASW forces more tactical-level cueing. Polmar and Whitman describe a similar cueing role for U.S. undersea surveillance assets during the Cuban Missile Crisis. However, it was not just intelligence and cryptology capabilities by themselves that gave ASW forces an advantage, but the fusion of intelligence capabilities into operational forces. By devising employment schemes to utilize intelligence and cryptology windfalls in the short time window that they were relevant, the Allies gained critical advantages in the ASW fight.

Underlying all of these factors and capabilities is the awareness that ASW is a team sport. Integrating ASW platforms from multiple services, intelligence/cryptology sources, and new technical capabilities into an effective campaign required new organizations and employment concepts. The most well known ASW concept, one that was initially resisted during both World Wars, was the convoy system. While convoys probably had the biggest impact in reducing the effectiveness of enemy submarines, German submarines were able to at least partially adapt to it with their own “wolfpack” concept.  Other operational concepts that proved crucial to effective ASW included the development of hunter-killer groups (including escort carriers) to reinforce the convoys and the creation of dedicated ASW organizations (such as the WWII U.S. Tenth Fleet).

USS Providence (SSN-719) snorkeling at her berth in Groton, CT before having honors rendered by the Sloop Providence. (Source)

Although these volumes are a history of ASW and do not explicitly present policy recommendations, there are some lessons from Polmar and Whitman’s work that seem increasingly relevant today. First, reliance on a breakthrough technology to turn the oceans “transparent” is a risky proposition, as the Royal Navy discovered during World War II when their planned reliance on ASDIC (or active SONAR) for ASW proved not nearly as effective as hoped. Additionally, numbers matter, and effective ASW requires a force structure we lack today – namely small surface combatants and escorts (admittedly the LCS is small, but in this reviewer’s opinion it lacks range, combat capability, and is not designed as an escort). Lastly, ASW requires organizational integration in a way that has not been stressed in recent years. While the U.S. Navy (and close allies) have maintained ASW organizations and periodically exercised those capabilities since the end of the Cold War, convoys were last utilized during Operation EARNEST WILL in the Persian Gulf while the last ASW convoys appear to have been during World War II. It is not clear if we have truly exercised convoy tactics (much less having the merchant shipping in the current era to string together a convoy system) or have war-gamed a theater level war against dozens of commerce raiding submarines.

Overall, Polmar and Whitman’s two volumes are an amazingly comprehensive history of Anti-Submarine Warfare. This reviewer’s only complaint is that the analysis largely ends with the end of the Cold War. While the intensity of ASW operations declined at this time and more recent issues are admittedly difficult to research due to classification issues, there are a number of public ASW incidents that would have been worthy of including, from the 2007 incident where a Chinese submarine surfaced inside a U.S. carrier battle group to the 2009 deployment of a Russian Akula SSN in the Western Atlantic. These recent incidents, as well as changes in technology and command structures, would better complete their description of ASW. Despite that one critique, this is a very readable and informative set of books and one that should be required reading for every naval officer serving with surface combatants, submarines, maritime patrol aircraft, and undersea surveillance organizations.

Joe Petrucelli is a former submarine officer and current Naval Reserve officer. He is a PhD student at George Mason University and a Student Fellow at the school’s Center for Security Policy Studies. His opinions are his own and do not reflect the positions of the Department of Defense or his employer.

Featured Image: An allied ship is seen sinking through the periscope of a German U-Boat in WWII. 

Standing Up the NIWDC with CAPT John Watkins

By Sally Deboer

CIMSEC was recently joined by Captain John Watkins, the first commanding officer of  the Naval Information Warfighting Development Center (NIWDC). Read on to learn about this new command’s role in shaping the U.S. Navy’s information warfighting skills and capabilities.

SD: We are joined by CAPT John Watkins, the first commanding officer of the newly opened Naval Information Warfighting Development Center. It is truly an honor to have you here. Before we begin, can you share a bit about yourself and your background?

JW: Thanks first and foremost for having me, it’s an honor for me as well. I came into the Navy in 1992 as a Surface Warfare Officer and completed various tours in engineering. I did that for roughly five years and really enjoyed it, but subsequent to those tours I attended the Naval Postgraduate School in Monterey, California where I achieved a Master’s degree in IT Management during which time I laterally transferred into the space and electronic warfare community. A few years transpired and that community was subsumed into the information professional community that we know of today, which comes with the 1820 designator.

Since being an IP, I’ve had multiple operational and staff tours, to include XO of USS Coronado, serving as N6 and Information Warfare Command on Expeditionary and Carrier Strike Group Staffs, and as the N6 on a Numbered Fleet staff. Staff tours have included time on the OPNAV and SURFACE FORCES staffs. I’ve been very fortunate and blessed to have had multiple command tours including NAVCOMTELSTA San Diego, Navy Information Operations Command Texas, and now just recently, my assignment here at the Naval Information Warfighting Development Center.  

SD: Let’s kick off by introducing our readers to your new command. Initial operating capability for the NIWDC was declared on 27 March 2017. Could you please explain the role of this warfighting development center, and specifically the mission of the NIWDC within the information domain?

JW: Like the other warfighting development centers (WDC), we are all focused on four primary lines of operation. First, we’re concerned with enhancing advanced level training. As you can imagine, in terms of NIWDC, that entails all of our information-related capabilities. The advanced level training for our units and forces in the fleet occurs at the latter stages of the optimized fleet response plan (OFRP). We’re heavily invested in that along with our fellow WDCs.

The second line of operation is the development of doctrine that allows us to achieve that advanced level of proficiency – doctrine including tactics, techniques, and procedures (TTPs), standard operating procedures (SOPs), higher level Concepts of Operation (CONOPS), or as necessary, revisions to Naval Warfare publications.

The third line of operation is to cultivate and develop a subject matter expertise known throughout all the WDCs as a ‘warfare tactics instructor’ or WTIs. Other WDCs have WTIs in place today, for example, the model that has been around longest is the Naval Aviation WDC, “Top Gun,” associated with advanced tactics for jet fighting, air-to-air combat, etc. What we want to do here at NIWDC is to build out our own WTI pipeline, which I think of as the “Information Warfare Jedi Knights” of the future; we’ll have quite a few WTI pipelines, as we have a broad spectrum of capabilities.

Last but not least, we’ll have an organic assessments capability built into the command which allows us to, in an OODA loop fashion, assess our advanced level training capabilities, our TTPs and SSPs, and our doctrine as we bake it into our training pipeline and processes, ensuring it is delivering optimal IW warfighting effects. Those are the four lines of operation that were promulgated to the WDCs, directed by the Chief of Naval Operations, in 2014.

SD: The traditional warfare Type Commanders (Air, Surface, Undersea) have established their own warfare development centers, as you mentioned. Given that IW is a critical enabler of other warfare areas, how do you envision the NIWDC interacting with the other warfare development centers? What key IW concepts and understandings should be incorporated by other communities?

JW: That’s a fantastic question. NIWDC just achieved IOC designation in late March, and the good news is that while we are the last WDC to be stood up, we already have IW community professionals, both enlisted and officer, arrayed across the other WDCs today, totaling about 150 people, who are working Information Warfare expertise into Naval warfighting. Even as we’re building up to this capability, our folks that have been embedded throughout the other WDCs have done a remarkable job laying the groundwork and foundation for us to come to fruition as the NIWDC. This is significant because the information-related capabilities that we bring to bear are so ingrained in all the other mission warfare areas of the Navy that we have to be interlinked with the other WDCs and visa-versa.

As we build up our capabilities here, we’d like to see the reciprocal detailing back and forth – where ideally we’ll have Surface Warfare Officers, Submariners, Aviators, etc., embedded and billeted to the NIWDC. That’s the future, and it’s absolutely imperative that we get to that point – to have that common back and forth day in and day out as we’re contemplating modern day warfare – it’s essential for us to understand the other warfare areas, their requirements, how our systems are interdependent, and how we have to operate in real time to optimize our overarching warfare capabilities.

SD: You recently stated, “a key objective of the NIWDC is to provide hard-hitting, fleet-relevant information warfighting effects…” Can you outline what some of those effects might be and what specific mission areas within Information Warfare (IW) they support? 

JW: I think the best way I can answer that question is to describe how we’re building out the command here today. We’ve established a headquarters staff that will manage seven core Mission Area Directorates, or what we refer to as “MADs.”

Those Mission Area Directorates include an Assured command-and-control and CyberSpace Operations MAD, a Space Operations MAD, a Meteorology MAD, an Intelligence MAD, a Cryptology MAD, an Electronic Warfare MAD, and an Information Operations MAD. Laying that all out, we can generate information warfare effects from any of those Mission Areas—but when combined, it becomes extremely optimal. It’s the traditional ‘sum of the parts’ principle.

As we develop our organization here, another big effort we’re putting into play in the larger Navy is the Information Warfare Commander construct, which is an organization led by a fully board-screened senior Information Warfare Community Captain (O-6). I’ll describe the construct at the tactical level for now because I think it will be the best way to articulate where we’re headed in employing our model. On a Carrier Strike Group (CSG) staff, for example, we have the Information Warfare Commander (IWC)—again, that board-screened IW Community Captain, who is providing leadership and oversight on core IW mission areas run by the N2 Intelligence Officer, the N39 Cryptologic Officer, the N6 Communications officer, and to the extent where we can get it into play, the Meteorological officer, who at the end of the day, all work for this O-6 IWC. The entire IWC organization works for the Carrier Strike Commander similar to a Destroyer Squadron or Carrier Air Group Commander.  

Where the synergistic effect really comes in is in information operations planning. If you think across typical phased wartime planning scenarios, the folks that are sitting down at the table in the IWC organization bringing their skills and attributes to the team while enabling holistic planning across all phases of warfare, achieve tremendous synergy and total awareness of the  interdependencies and linkages across their mission areas. This powerful effect cannot be overemphasized. Planning in individual stovepipes, i.e. within traditional N Head silos like the N2, the N39, N6 or Meteorology, is counterproductive in today’s modern warfare continuum. It’s essential that planning along these lines factors in and accounts for the coordination and integration of needs and requirements of our fellow Composite Warfare Commanders. When done correctly, we give our collective Navy team every advantage possible to win when we need to. Suffice it to say, I’m very excited about where we’re headed and how we’re going to make our phenomenal Naval warfighting prowess even better!

SD: There seems to be growing agreement that in future conflict, naval forces will not enjoy undisputed access to the electromagnetic spectrum. How will naval information warfare capabilities enable distributed operations when the spectrum required for C4ISR is being, denied, degraded, disrupted and subject to deception operations?

JW: That’s another great question that we are constantly focused on. We all acknowledge the fact that in modern warfare scenarios, the likelihood that we will have denied or degraded communications is a given. Frankly, it’s almost no longer an assumption—it’s reality. Simply put, we need to be able to retain organic capabilities as much as possible wherever we are, so that if we lose the link back to the beach, we can still function and fight.

To that end, we’ve got to be able to train, operate, and be proficient in fighting in those types of scenarios. We’re all about getting at that advanced level of necessary training here at the NIWDC.

SD: How do you propose addressing the acquisition and fielding of new information technology (cyber/EW/IW) and developing TTPs under the current DOD acquisition system?

JW: Acquisition is an evolving process, and I think acquisition reform surfaces quite frequently anytime we talk about the dynamics of advancing IT. The rate of advancement in technology is astounding, and the acquisition process needs to be agile enough to keep pace. To that end, we’ve looked for creative and innovative ways within our acquisition process to accelerate and expedite systems that facilitate IW warfighting effects and we need to continue doing so. NIWDC participates in many experimentation and innovation venues that help facilitate that speed-to-fleet dynamic and we’re excited to be a partner in those efforts.    

To your question about the TTPs and SOPs – when we introduce new tech to the fleet, it is important that we have TTPs and SOPs built into them from day one. We’ve got to be able to deliver a product that comes with robust training behind it so that when it’s delivered to the fleet, our sailors can put it into immediate effect. The TTPs and SOPs that accompany that capability need to be solid enough out of the gate so that we achieve immediate success from day one of fielding.  

On top of that, what I want to achieve at the NIWDC is the ability to refine and tweak TTPs and SOPs at a high rate – what I call the “wash, rinse, repeat” approach. There’s no reason we can’t take those TTPs and SOPs, have sailors put them into effect, provide their feedback to us if they’re not quite right and suggest course corrections, then update those on a continuous, OODA-loop basis until we have delivered optimal doctrine.

SD: Our adversaries approach the information space (IW/EW/cyber) holistically, blending electronic and information warfare with cyberspace operations, psychological operations, deception – and conduct these operations across all elements of national power (diplomatic, economic, legal, military, information). What steps are you taking to ensure the Navy is developing information warfare strategies, operational concepts, and TTPs that cut across all elements of national power?

JW: I’ll give you an example – that’s the best way I can answer this question – it’s a great question, but one you could spend an hour answering. Earlier in our discussion, we talked about the IWC construct. I’m a firm believer that if we get that instituted correctly and make it a robust organization with the goal of delivering those optimal IW effects that it will serve as the bedrock going forward across the Navy enterprise. We’ll look to institute that construct, as applicable, by using that optimized model at the tactical level and building out from there to implement at the operational and strategic levels.

Back to the point about our adversaries – when they’re exploiting all this goodness and delivering their effects, they are planning across the DOTMPLF (doctrine, organization, training, materiel, leadership and education, personnel and facilities) spectrum. We must do the same thing with our IWC Construct. At the NIWDC, in partnership with IFOR, this is one of our tasks – to perform this DOTMPLF analysis that will codify the IWC construct. We’ve been tasked by Fleet Forces Command and PACFLT to do just that – this will be one of our top objectives in the first years here at the NIWDC – to ensure we’re setting ourselves up for success for decades to come.

SD: Last but not least – if our listeners are new to information warfare, can you suggest any resources or reading materials that could help the less tech-inclined among us become more familiar with the domain and more ready to address its unique challenges?

JW: There are so many great reference materials, but perhaps the quickest way to answer that is to recommend your readers and listeners go to our command website and InfoDOMAIN, or our Navy News Web page or Facebook page. We have a lot of good products posted there – that would be a great start. We have some items posted there that are specific to the NIWDC, so if your readers want more information or a summary, they can find it there as well.

SD: Thank you so much for your time today, CAPT Watkins. It’s truly been an honor speaking with you, and we thank you for taking time out of your busy schedule to help educate us on your new command and the role of IW in the Navy and DoD going forward. We hope you’ll join us again sometime. 

Captain John Watkins is a native of California, where he went on to graduate from the NROTC program at the University of San Diego obtaining his commission in 1991. He joined the Naval Information Warfighting Development Center as the commanding officer in March of 2017.

Sally DeBoer is an Associate Editor with CIMSEC, and previously served as CIMSEC’s president from 2016-2017. 

Featured Image: Chief Fire Controlman Daniel Glatz, from Green Bay, Wisconsin, stands watch in the combat information center aboard the Arleigh Burke-class guided-missile destroyer USS John S. McCain (DDG 56). (Alonzo M. Archer/U.S. Navy)