Tag Archives: featured

The Role of Cruisers in Promoting Russian Presence and Deterrence in Peacetime

The following is a two-part series on the role cruisers played in the Soviet and Russian Navy. The first part examined historical inspiration for developing a cruiser-focused force, concepts of employment, and strategic rationale. Part II will focus on how cruisers shaped the environment through forward presence during the Cold War, and how the nature of presence may evolve into the future. 

By Alek Clarke

The Multi-Layered Approach of Presence

“Naval losses are hard to make good. Therefore, each defeat inflicted on an enemy means not only the achievement of the goal of the given combat clash but the creation of favorable conditions for quite a long time for solving the next task.” Admiral Sergey Gorshkov1

It was not of course all about the cruisers. Even with two ‘levels’ of construction the Soviets would not have been able to devote enough resources to the construction of cruisers to sustain the number of hulls required to maintain the level of visibility that is a requisite of presence. In simple terms they hit the same problem the Royal Navy (RN) of the 1920s faced. The pre-WWI Fisher reforms sold off all the old ships which had been used as presence vessels2 – in the phraseology of that period, gunboats,3 so what to build as new build vessel for presence?

The RN in the 1920s focused on light cruisers, ships of 6,000 tons and a main armament of six to eight six-inch guns.4 Yet, still even in that period when defense budgets were able to call on far larger proportions of national funds than they can today, the RN was not able to acquire enough (even discounting the artificial strictures imposed by the arms limitations treaties5) to maintain the visibility portion of presence with only these ships. The Soviet solution to this problem was not that different to Britain’s in the 1920s; to focus efforts on the more useful ships where they could be of most benefit, and to make use of other ships to achieve the visibility aspect of the presence mission elsewhere.6

This visibility mission, often characterized as ‘Showing the Flag,’7 really started again for the Soviet Union after a 14-year hiatus that included the WWII years with a visit by a Sverdlov-class cruiser to Britain to take part in Queen Elizabeth’s 1953 Coronation Review.8 This visit was the harbinger of a busy future, and four years later another Sverdlov-class vessel, accompanied this time by a destroyer, made the first visit by a Soviet Union vessel to Latakia, Syria;9 a naval relationship which has continued to have an impact on world events to this day. The growing use of naval diplomacy by the Soviet Union in the early to mid-Cold War era is highlighted by the numerical increase in port visits: over a fourteen year period (1953-66) 37 port visits were made, 21 of which were to developed countries, yet over the next ten year period (1967-76) 170 port visits were made, of which only 30 were to developed countries,10 and 108 or 77.6 percent of which involved two or more vessels.11

What reveals more is the theater the visits were focused on: 69 went to the Indian Ocean –the highest number. Of these visits though, 29 took place during a two-year period, 1968-9, while the Soviet Navy was settling on which Indian Ocean ports to use as either a primary or secondary operational hub to support the Indian Ocean Squadron (the second forward deployed squadron the Soviet Union created), in the region.12 These visits were arguably more about testing the port facilities of allies, although they were also important for presence. In the retreating colonial atmosphere where the traditional power, Britain, was withdrawing and the new powers, America and the Soviet Union, were still integrating themselves – these visits served to foster relationships and grow connections.  

The second largest was the Atlantic, followed by the Mediterranean (which was the home of the first Soviet Union forward deployed squadron), and then the Pacific.13 The visits were very much focused at the ‘southern flank,’ and nations which belonged to NATO. They served to highlight the reach and capability of the Soviet Union to these nations in a very visible and of course ‘peaceful’ way.

Soviet Port Visits 1967-76. Source: Soviet Naval Diplomacy.14

Alongside the visibility of presence gained from port visits, these visits also provided the opportunity to build relationships and gather human as well as electronic intelligence. Whilst of course this is true of both the visitor and host, the initiation of the visit by the visitor, and rules of diplomatic etiquette (if followed by both sides), will usually serve to give the visitor an edge. This can be crucial in providing knowledge to the capability and capacity (i.e. how many ships/units can be actually made available at any time for operations) of potential opponents and allies.

Electronic intelligence and human intelligence are factors which are widely discussed,15 but still need to be highlighted. Even a ship outfitted with a moderately capable Command, Control, and Communication (C3) setup can provide significant listening capability whilst just passing through an ocean. Many nations put in far more basic equipment. This variance in electronic equipment outfit can often be a significant explanation as to the cost differences between procurements of similar vessels for different countries.

These passive sensors are nothing though compared to the turning on of more active sensor systems as both capability sets provide governments with the ability of proactively observing events within an area so that they have as much and as accurate information as possible. This capacity, when combined with the relationships that are built by ongoing diplomatic and military interaction, can provide interested nations with the ability to more accurately predict the possibility, as well as take advantage, of events or opportunities.

The Soviets at many times, but most notably in the 1975 Angolan Crisis,16 were able to build upon forces already in the area, use local knowledge, as well as on-the-spot presence to react to events. The reinforcements were carefully managed to present a deterrent to the threatened increased American involvement – which never actually materialized. Although there existed the presence of two carrier battle groups, based around the USS John F. Kennedy and the USS Saratoga in the Gibraltar/Atlantic area at the time, such involvement was a significant possibility.17

The presence of the ships combined with the airlift of mainly Cuban military personnel and Soviet equipment for which those ships provided cover secured the installation of the Popular Movement for the Liberation of Angola (MPLA) in power, rather than the American- or Chinese-backed organisations.18 While the warships never directly took part in combat operations, their presence allowed the Soviets to keep a very close eye on the situation.

This success is the capability which presence is an auger for. The vessel that is seen serves as a symbol and warning for all the force that might be dispatched. While there, the ships can provide more tangible benefits in terms of gathering intelligence and building relationships which could make a larger deployment unnecessary. If such larger deployments do become necessary, the information already gathered enables governments to refine and focus any such deployment to achieve the aims they desire more effectively and efficiently.

These successes were ultimately why the Soviet Navy eventually chose to procure aircraft carriers, as well as cruisers.19 It was not the pursuit of German-style ‘Risk Fleet’ strategy,20 but a realization that adding another level of presence would give them more diplomatic and operational flexibility. With the addition of aircraft carriers to its cruiser force the Soviet government was able to maintain ongoing presence within regions and raise the level of commitment if warranted, but always building upon the foundation of presence that was the ongoing feature of their policy. It was their ability to magnify the presence of Soviet forces by the addition of an organic sea-based fixed-wing component (giving the options for overflight, like the British achieved in Belize/British Honduras vs Guatemala with the Ark Royal in 197221) that was their peacetime selling point.

Future Possibilities

“The best lack all conviction, while the worst are full of passionate intensity.”-W.B. Yeats, The Second Coming. 23

The primary question that will undoubtedly feature in future presence discussions is whether manned or unmanned systems are better value for money. Whilst those who are budget-minded will no doubt seek to replace manned with the unmanned, in reality the more sensible idea would be to consider the lessons of the past, and perhaps even the principle foundation of presence itself. It is a standard of presence that the small vessel that is seen is an active emblem for the far larger fleet that can be sent. This idea has been built upon. Helicopters have been used along with a detachment of marines/infantry to give an impression that a far larger ground force was available – as well as demonstrating their ability to appear anywhere. From all of this, there is therefore a successful precedent, whereby smaller/lower presence units are used to magnify the presence/area of effect of a higher impact unit. This is most likely to be the best option for unmanned systems, that they be part of a larger manned system or work in tandem with one so that the human side of presence is involved, while the unmanned aerial and surface systems would serve to magnify its impact.

It is as such a probability that the utility of small vessels for presence effect missions will grow; yet they will always depend, as the Russians and Soviets demonstrated, upon the strength of will encapsulated in their orders, the quality of their crew, and the foundation provided by the capable vessels they represent. This could be a basis for the promulgation of a two tier naval force, one with a strong core of warfighting vessels (aircraft carriers, destroyers, amphibious ships and submarines) kept at a high level of training and readiness, but which are deployed rarely – except to the most dangerous areas that require something more.

The second tier would be a larger number of presence/flotilla vessels, which would be almost continually forward deployed to show the flag, provide maritime security, and demonstrate interest around the world.24 Such an idea is not new:25 in fact it was the foundation of Soviet naval diplomacy and of the British Empire’s maritime policy for most of the 19th, and early 20th centuries. However, in an age where the complexity and advanced technology of weapons systems (and warships in particular) seems to be a major selling point for their procurement, such a premise may be difficult to sell.

Many countries possess both a Coast Guard and a Navy, and in the case of the U.S., the size, level of armament, and general sophistication of the Coast Guard cutters means that they are in many ways just as useful as USN ships in providing presence. This is not the case with most nations, but Britain as a nation which has a longstanding maritime history is an example of this.

In fact, Britain possesses not only a Coast Guard, but also a Border Force; both of which operate ships. Although the vessels are capable in localized maritime constabulary roles (and two of the Border Force vessels were deployed with HMS Bulwark to help with the 2015 Mediterranean Crisis26) – they are not as capable in the presence role as the River-class OPVs or minesweepers the RN currently uses for its small ship missions.

This does not mean though these Coast Guard and Border Force ships are not useful, just that they cannot be considered interchangeable with the RN ships. The British Government, which is currently procuring three more River-class vessels27 and has made an announcement to procure two further vessels, might wish to look again at the this very useful and adaptable class and see what more can be achieved from its design or could be gained by further increasing numbers in a presence context.

Conclusion

Presence matters. Events are decided by those who care enough to show up28 – not by those who sit back on the sidelines. The Soviet Navy, and to a large extent the modern Russian Navy, was not built on its wartime missions; but rather its peacetime roles – in contrast to Western navies that have prioritized warfighting constructs.

This focus is understandable when considering the constricting budgets these navies face and requirements that war would undoubtedly place on them. However, while the last year that British forces were not in action was 1968, wars which require naval forces to do more than support land forces are not that common – in fact the 1982 Falklands War was it for Britain. This does not mean the capabilities are not needed, as when they are needed they are really needed; but it does mean that in order to justify themselves navies need to be more engaged with peacetime possibilities and roles. They need to be engaged with the full role of the cruiser, the peacetime ambassador and bobby on the beat, and the warrior.  

Lack of focus on peacetime roles weakens navies in the political sense, as in a democracy the leaders respond to the public and media, who in turn largely respond to what is most visible, most immediate – not having the time to really consider the long term before the next thing comes along. This weakness was of course less of a problem for the Soviet Navy, and to an extent the Russian Navy, which has to impress a small number of stakeholders. Western navies however need to be in the public debate in order to justify the expense, whether it is for warfighting or for peacetime.

This is not because democratic governments do not care about defense, but because the nature of democracy means that that the more visible the department of government, the more it shows its relevance to the public and the harder it is to cut. The Soviet Navy (admittedly working in a less democratic national governance model) managed to build a fleet for war by mastering and building recognition from the missions of peacetime.

This is not to say that western navies need to build flotilla vessels, although they could be useful as presence and force multipliers;29 the Soviets went down that route as an offset strategy. For the carrier-centered western navies, whilst a small increase in major surface combatants would no doubt be of use to provide flexibility of presence; for pure presence missions, vessels of OPV or corvette size would be more appropriate. These vessels are often cheaper, and as with the Soviet choice of cruisers in the Cold War, would not carry the risk of provoking an arms race, and would provide the hulls necessary for nations to have presence where they need it to be.

This is important, because if countries wish to be actors more often than reactors, they need to have as accurate as possible understanding of what is going on and be able to act quickly. A small ship may not have the status of a larger vessel, but its presence as the vanguard of the larger can enable it to have an impact out of all proportion.30 Events which are caught early can often be resolved more quickly by what is already there – thus according the situation less possibility for escalation. Presence can serve to increase predictability and stability which are always good for helping to maintain peace.

Dr. Clarke graduated with a PhD in War Studies from KCL in 2014, the thesis of which focused upon the Royal Navy’s development of naval aviation and aircraft carrier design in the 1920s and 1930s. He was supervised during this by Professor Andrew Lambert. Alongside this he has published works on the 1950s with British Naval History, and has also published on current events with European Geostrategy and the Telegraph online as part of the KCL Big Question series. He has maintained an interest in digital history, and is organizing, hosting, and editing a series of Falklands War veterans interviews for the Center for International Maritime Security and Phoenix Think Tank. Recent research outputs include presenting a paper at the National Maritime Museum’s 2016 conference on the ASW capabilities of the RNAS in WWI, and will be presenting a paper on the design & performance of Tribal Class Destroyers in WWII at the  forthcoming BCMH (of which he is a member) New Researchers Conference.  

Archival Sources

TNA: ADM 1/8672/227. 1924. “Light-Cruisers Emergency Construnction Progrmme.” Admiralty 1/8672/227. London: United Kingdom National Archives(Kew).

TNA: ADM 116/4109. 1940. “Battle of the River Plate: reports from Admiral Commanding and from HM Ships Ajax, Achilles and Exeter.” Admiralty 116/4109. London: United Kingdom National Archives (Kew).

TNA: ADM 116/4320. 1941. “Battle of the River Plate: British views on German pocket battleship Admiral Graf Spee in Montevideo harbour; visits to South America by HMS Ajax and HMS Achilles.” ADM 116/4320. London: United Kingdom National Archives (Kew).

TNA: ADM 116/4470. 1940. “Battle of the River Plate: messages and Foreign Office telegrams.” ADM 116/4470. London: United Kingdom National Archives (Kew).

TNA: ADM 223/714. 1959. “Translation of the 1949 Russian Book “Some Results of the Cruiser Operations of the German Fleet” by L. M. Eremeev – translated and distributed by RN Intelligence.” ADM 223/714. London: United Kingdom National Archives(Kew), 02 September.

TNA: ADM 239/533. 1960. “Supplementary Naval Intelligence Papers relation to Soviet & European Satellite Navies: Soviet Cruisers.” ADM 239/533. London: United Kingdom, National Archives (Kew), November.

TNA: ADM 239/821. 1959. “Particulars of Foreign War Vessels Volume 1: Soviet & European Satelite Navies.” ADM 239/821. London: United Kingdom National Archives (Kew), January.

TNA: DEFE 6/51/104. 1958. “Requirement for Cruisers East of Suez.” DEFE 6/51/104. London: United Kingdom National Archvies (Kew), 21 August.

TNA: FO 371/106559. 1953. “Soviet ships off the Shetlands; visit of Soviet cruiser Sverdlov to Spithead for the Coronation. Code NS file 1211.” FO 371/106559. London: United Kingdom National Archives(Kew).

TNA: PREM 11/1014. 1955. “Reconnaissance of Soviet cruisers by HMS Wave and RAF aircraft.” PREM 11/1014. London: United Kingdom National Archives(Kew).

References

1. Sergey Gorshkov (1980), p.229

2. Lambert (2008)

3. Cable, Gunboat Diplomacy 1919-1979, Political Applications of Limited Naval Force (1981)

4. TNA: ADM 1/8672/227 (1924) provides a good example of this, but for quick reference then Norman Friedman’s work British Cruisers; Two World Wars and After (2010) is also excellent 

5. Signatories of the Washington Naval Limitation Treaty (2005)

6. Dismukes & McConnell (1979), p.93 & 96

7. Dismukes & McConnell (1979), pp.88-114 –this is Chapte 3, written by Charles C. Peterson, who credits much of the information used to the work of Anne Kelly Calhoun

8. TNA: FO 371/106559 (1953), and Dismukes & McConnell (1979), p.89

9. Dismukes & McConnell (1979), p.89

10. Ibid, pp.89-90

11. Ibid, p.94

12. Ibid, pp.91-2

13. Ibid, p.94

14. Ibid, p.100

15. Aldrich & Hopkins (2013), and Herman (1996)

16. Dismukes & McConnell (1979), pp.144-53

17. Ibid, pp.147

18. Ibid, pp.144

19. Rohwer & Monakov (2006), Polmar (1991), and TNA: ADM 223/714 (1959)

20. Massie (2005)

21. White (2009)

22. Pocock (2015)

23. W.B. Yeats The Second Coming

24. Cable, Gunboat Diplomacy 1919-1979, Political Applications of Limited Naval Force (1981)

25. Clarke, Protecting the Exclusive Economic Zones – Part I & Part II (2014), & Clarke, October 2013 Thoughts (Extended Thoughts): Time to Think Globally (2013)

26. Ministry of Defence & The Rt Hon Michael Fallon MP (2015), and Naval Today (2015)

27. BAE Systems (2015)

28. President Bartlet (Sorkin, 2000)

29. A. Clarke, Europe and the Future of Cruisers (2014)

30. Cable, Gunboat Diplomacy 1919-1979, Political Applications of Limited Naval Force (1981)

Featured Image: Soviet Navy Kirov-class cruiser. (Public Domain)

Sea Control 133 – Hacking for Defense with Chris Taylor

By Matthew Merighi

Join the latest episode of Sea Control for a conversation with Professor Chris Taylor of Georgetown University to talk about the Hacking for Defense (H4D) movement. Pioneered by Stanford Professor Steve Blank, H4D is bringing Silicon Valley’s innovation ethos to combat national security challenges. Chris takes us through the defense innovation ecosystem, the partnerships which support it, and how H4D is becoming a fixture in university classrooms.

For those interested in learning more about H4D and the Silicon Valley principles which guide it, Chris recommended the following resources:

Download Sea Control 133 – Hacking for Defense with Chris Taylor

The transcript of the conversation between Chris Taylor (CT) and Matthew Merighi (MM) begins below. Special thanks to Associate Producers Roman Madaus and Ryan Uljua for helping produce this episode.

MM: As I mentioned at the top I’m here with Professor Chris Taylor of Georgetown University and a member Hacking for Defense. Professor Taylor, thank you very much for being with us on Sea Control today. Now as is Sea Control tradition, Professor Taylor, please introduce yourself tell us a little bit about your background and how you got to be where you are right now.

CT: I spent 14 years in the Marine Corps as an enlisted infantryman and force recon. I finished undergrad at night. I went to night school my last three years. I left the Marine Corps and went to business school at the College of William and Mary where I earned an MBA and worked for five years after that. I went back to school at the Harvard Kennedy School where I earned an MPA in political economy and international security. I’m a two-time defense industry CEO and as you mentioned I’m an adjunct professor of national security studies at Georgetown University.

MM: You obviously have a very broad array of different experiences both in the military, outside of it, leading businesses, but also a very diverse educational background. What were the key decision points in your life as you were building your career and your educational background that guided you on the path which you eventually went down?

CT: I spent 14 years in the Marine Corps. I wanted my bosses’ job at the time I was a staff sergeant. My boss was a Major. When I did the reverse math, I would have had to have spent 10 more years to get promoted to Major just to have that job. As I evaluated all of the fantastic experiences that I had in the Marine Corps and what it had done to develop me as a leader, I thought maybe there was a different way and I wanted a way to push my Marine Corps experience through some sort of framework. I chose business school. I don’t regret that at all, it was fantastic. I loved every minute of my 14 years in the Marine Corps but I loved business school. I had a fairly easy transition to school, I got out, worked for five years in the private sector and then decided with the same formula; I had five years of experience and I didn’t know what framework to push it through to get the most of out it or contribute the most with it. So I went back to grad school at the Kennedy School. I was very fortunate. I had fantastic classmates, fantastic professors. Secretary Ash Carter was actually my adviser. So I had access to brilliant national security minds helping me think through how my experience would allow me to contribute further. That led me to leading some businesses that were successful and now I’ve dipped my toe into the teaching part of life to see how my experiences could help push forward the next few generations of national security leaders. That’s how we got to be on the phone today.

MM: Let’s talk a bit about the educational piece. I have here on the hacking4defensegu.com general info page a class titled “SEST-701 Hacking for Defense: Solving National Security Issues with the Lean Launchpad,” which I kind of understand as a man with a security and startup background. Walk us through this title. What exactly is Hacking for Defense and why is the Lean Launchpad a part of solving national security issues?

CT: Hacking for defense was a name that came along with the package when I was first asked to participate. Most people when they hear it only think it’s about cyber; that’s not true. Think about it in the way you’d think of life hacks: easy and quick ways to get things done which result in great benefit. The Lean Launchpad is a class that legendary Silicon Valley entrepreneur Steve Blank has been teaching which is basically about how to create and run a startup. It came through a series of conversations that happened out at Stanford where Steve was teaching this with Pete Newell who is a retired Army Colonel and Joe Felter, also a retired Army Colonel. The thought was “how do we apply the Lean Startup methodology to national security challenges?” MD5, which is the national security technology accelerator at National Defense University run by [Adam] Jay Harrison, is the U.S. government proponent for the entire education program. I’ve known Pete and Joe for a number years and when they decided they were going to syndicate the class to universities across the country I raised my hand and said I wanted to bring it to Georgetown. We’re about to close out our first Hacking for Defense class on May 1.

MM: So this is just the first iteration of it?

CT: It’s the first iteration at Georgetown. Stanford begun their second iteration. There are others at U.C. San Diego, Boise State, University of Pittsburgh, and James Madison University.

MM: So the model is proliferating across different universities but it is still very new. Now that you are finishing your first session, from the feedback you’ve gotten from Professor Blank and the other institutions, how has the course been going so far? What have been the things that you expected and what has surprised you?

CT: First and foremost, the most exciting thing is that I have nothing but complete confidence in our graduate students across the country to solve national security problems going forward. Our class has been nothing less than stellar. They are smart, they are committed, they work well in teams, they’ve been doing lots of discovery. And they’ve been doing a lot to solve problems. It’s fantastic. The second thing is that what we’ve learned is that when you allow students to self-organize into diverse teams around a problem, you get exponentially better results than if you assigned them to a team and then assigned them a problem. We’re very clear that self-organization leads to the best outcomes. One of the amazing things about the Hacking for Defense class is that it’s actually a team of teams. The center is the student. Surrounding them are the teaching team: myself and Army Lieutenant Colonel Matt Zais, who is the Deputy Director of the Strategic Initiatives Group at U.S. Army Cyber Command, and my teaching partner.

Then we have a series of corporate partners. Companies like SAIS, Amazon Web Services, SAP National Security Solutions, and many others come every class to support the student teams if they get to a point where their problem-solving requires a specific resource, an engineering resource for instance, an instance in a cloud environment, or mentoring for how to think about a problem. We also have mentors who bring experience in the national security ecosystem and in business that they contact to discuss their problems and think differently. And then we have military and intelligence community liaisons. These are active duty military and people currently serving in the intelligence community who can ensure that these teams can reach out to people within the organizations they are working with, which we call their problem sponsors, to elicit as much information as they can to help solve the problem they have.

This semester, we are working on four problems. One is from Special Operations Command: it’s a cross-domain solution. The next is how to use augmented reality to help military and intelligence personnel see bad guys in unstructured crowds. The next one is a social media problem: how do we use social media from an information warfare perspective to better understand what our adversaries might be doing with social media against us. We also have a counter-drone problem. It’s all the rage; everyone is writing about counter-drone. We have a team that’s working on how to use low-cost solutions to counter drones, particularly drones you might see ISIS flying.

MM: That’s a really broad array of different topics. You mentioned at the top that this isn’t just about cyber but a very broad set of challenges. I’m curious about the people who are self-organizing in these teams, since I imagine this is offered through the Security Studies Program, correct?

CT: That is correct. The Security Studies Program (SSP) is where I teach. Bruce Hoffman and Dave Maxwell have given us exceptional support to continue doing this.

MM: In terms of the students who are in these teams, do they have technological backgrounds? Are they primarily ex-military or current intelligence officers? What are the demographics of the people participating in this?

CT: All of the above. We have tech folks. We have former and current military folks. We have data analytics folks. We have linguistics folks. We have policy folks. And then of course we have the SSP folks. The course is open to all schools and all programs across Georgetown University and next year we’re going to open up Hacking for Defense to all graduate schools and graduate programs in the National Capital Region. So instead of solving four problems next year we’re going to solve 40 problems. A bit ambitious and it keeps us moving but if we want to start to develop the capability to solve problems quickly, effectively, and cost-effectively, then there is no better group of talent than America’s graduate students to be able to help us do that. That’s why we are trying to expand it the way that we are.

MM: So this course will be open to everyone in the National Capital Region starting next year which, as a person who currently works in academia, I know that getting even simple things like cross-registration agreements handled can be a challenge, so best of luck to you as you navigate those minefields on the bureaucracy side; but it’s really exciting that so many people are getting engaged. The other method of engagement that I’ve noticed is that you livestream all of the lectures for this course, correct?

CT: Every class session is livestreamed on Twitter @h4dgussp and also on our Facebook Hacking4DefenseGeorgetown. Every week we put it out there. It’s kind of like our own national security reality TV show. We put it out there because we want people to see the quality of students that we’re attracting to this class and the difficulty of some of the problems that they’re working on because, quite frankly, for many of these students this is a 13-week job interview. Many of our corporate partners have reached out to our students and said “look, when this is done I’d really like to speak to you about this” and that’s because they’re doing it well. They’re digging in, they’re becoming better problem solvers, they’re becoming better team members, and they’re leveraging everything that they’ve learned in graduate school and everything they haven’t learned yet. They are learning on the fly to solving the particular problem they are working on.

MM: So you’ve seen firsthand the positive feedback loop of the organizations supporting the course wanting to continue getting access to the students and looping them into their own work.

CT: I just spent last Friday with one of our sponsors, OGSystems in Chantilly, Virginia where the CEO and two other executives sat us down and said “we want to be part of this forever.” And the reason is because we get to see some of the problems plaguing national security but the most interesting thing is that the talent sitting in that classroom is unbelievable. We have not seen that in any other classroom environment and so they, admittedly selfishly, want to find out how to hire the very best students out of Georgetown to become part of their companies. We’re ecstatic about that.

MM: Definitely. That’s always the concern, as a recent grad school graduate; the top of mind concern for those going through their final exams right about now. I’m curious that you have OGSystems and all of these other corporate partners and the military and intelligence liaisons. How did you go about building this diverse, multi-stakeholder team? It couldn’t have been easy to sell organizations, especially ones that aren’t as used to working with the military or with Georgetown in getting involved with this very ambitious, very unique program.

CT: It was a little bit of everything. A lot of it came from my own personal network from being involved in the business of national security for so long. Certainly the folks at Stanford at Hacking for Defense Incorporated (H4DI) were very helpful in introducing us to different folks who wanted to be involved. I’ve gotta be honest with you: it’s not a difficult sell. This is the coolest class being taught. If you’re any type of international relations, national security, diplomacy, government, or business geek at all this is the coolest class being taught anywhere. So it’s not a hard sell. But we want to get the right people involved because there are investors in the classroom as well. At the end of the day, if there’s a “there” for the solution that the student teams have come up with, either the government will give them some money to continue their work or they’re going to start a company and they’re going to get venture money to get it going. There’s nothing else like this happening around the country right now.

MM: What is the next step for Hacking for Defense, the course you in particular are teaching, besides expanding it to the other schools in the National Capital Region? What do you see as the vision for where you want this very unique and clearly very successful business model to go?

CT: I’m involved on the education side, so I want to continue working with the Hacking for Defense and H4DI folks out in Palo Alto and also with MD5 to make sure we can leverage all of the talent in the National Capital Region. There’s 16 different universities in the National Capital Region consortium and we want to take advantage of all of that graduate school talent across all of the schools and programs against the hard problems our problem sponsors are giving us. What we’re coming to find is that now there’s international interest. Oxford University has interest in forming a partnership at Georgetown. I know that the NATO representative at the Pentagon for Strategic Transformation, General Imre Porkoláb, is all over trying to bring this to NATO. From an education perspective, Georgetown will play a role in the National Capital Region. From an enterprise-wide perspective, a company out in Palo Alto called BMNT has the lead on bringing the Hacking for Defense methodology into government offices, corporations, and friendly and allied militaries. So there’s a corporate and commercial side to this with BMNT and there’s an education side and that’s H4D.

MM: And for the people who are out there, whether they are currently in the Fleet or listening to our partners at the University of Kiel in Germany or down in Australia, what would you recommend for ways for those people to get involved or to learn about your organization?

CT: First, I’m glad you mentioned Australia. One of our mentors for Hacking for Defense at Georgetown is a gentleman by the name of Jamie Watson and he is an Australian military liaison for innovation and technology. He’s actually helped bring Hacking for Defense to the Australian military already. So if you’re out in Australia, we’re coming to a base near you. BMNT is bringing it out there. If you are a member of the military or intelligence community and you have a particularly difficult problem and you don’t have the capacity to solve it yourself, they should go to H4DI.org and register as a problem sponsor. Darren Halford who runs H4DI.org will help them curate the problems and then get it in to the hands of the right university who can help them solve the problem. We want as many problems as the national security ecosystem can give us and we want to put as many talented graduate students against them as we can. But it has to start with a problem. So for anyone who has a challenge they want looked at, they should go to H4DI.org and start the process.

MM: Obviously the program sponsors and liaisons are very helpful for building this Hacking for Defense system but there are other innovation initiatives happening within the defense community or outside of it. What other organizations have you been working with and what sort of support, whether it’s financial or advocacy or guidance, have you been getting from outside the Hacking for Defense Initiative?

CT: Everyone has been supportive. [Defense Innovation Unit: Experimental] DIUx has been fantastic to us. The Defense Innovation Board has been very involved; Josh Marcuse and Aaron Schumacher from the Defense Innovation Board have been exceptionally supportive of us. The Defense Entrepreneur’s Forum (DEFx), run by Jim Perkins and Ben Taylor, have been all over us. They serve as mentors for us, they get the word out to the innovation community. They very much welcome this new thing into their innovation meadow and we all try to help each other make progress together. I can’t say enough about the Defense Innovation Board, DIUx, the Defense Entrepreneurs Forum, and the Vice Chairman of the Joint Chiefs of Staff General Selva’s office has been exceptionally supportive. And of course our friends at MD5: Jay Harrison, Joe Schuman, and Libbie Prescott have been fantastic to us, as has everyone out at Stanford. It’s a rockstar crew and we couldn’t be happier to be working with all of them.

MM: As you approached these organizations for the first time, were they receptive right off the bat and wanting to work on partnerships and provide support or was it something that you need to sell?

CT: It was not a difficult sell but I’ll tell you what sold everybody is inviting everybody to our opening class at Georgetown. We had 20 students but 113 people in the classroom. And they were all curious about how this Hacking for Defense program was going to work. At the end of the class, everyone was on board. We have routinely 80 people in the classroom every week for 13 weeks working on helping us get better. The corporate partners are fantastic, too. They step up every time. Once the different islands of innovation, like DIUx and Defense Innovation Board, saw it? Sold. It was kind of like finding a kindred spirit in the national security innovation wilderness.

MM: It’s very interesting what you’re working on but we’ve started to reach the end of our interview. As is Sea Control tradition, from time to time, I want to know more about what you’re reading. What things have you been reading recently that will either help the audience learn the ideas behind Hacking for Defense or even unrelated topics?

CT: Since we’re still in the semester, I am focusing on the books that we are using for Hacking for Defense. One of them is called Value Proposition Design by Alex Osterwalder. Steve Blank’s book The Startup Owner’s Manual is one of our texts and it is fantastic. His other book, Four Steps to the Epiphany, is also great. As I mentioned before, it’s important for students to understand how to better have conversations and elicit information so Talking to Humans is a great book. Personally, I just finished Ed Catmell’s book Creativity, Inc which was just amazing to me. I thought it was one of the best books on not only business management but also on how to think through problems. For national security stuff, I’ve become addicted to the Cypher Brief. They do really smart stuff by really smart people. It’s different from what everyone else is doing. I read it every morning.

MM: Everything you’re working on is wonderful. It’s exciting to me personally. I may go down the hall tomorrow when everyone is back to work after Patriot’s Day and talk to the people at the Security Studies Program at Fletcher about maybe trying to start a course like this. Thank you very much for the work you’re doing on behalf of the nation and world security. Thanks for being on Sea Control today.

CT: It’s absolutely my pleasure. Thank you.

Chris Taylor, a global business leader and entrepreneur, is a two-time national security industry CEO. A veteran of 14 years in the Marine Corps, he has an MBA from the College of William & Mary and an MPA from the Harvard Kennedy School of Government. Chris serves as an adjunct associate professor of national security studies at Georgetown University’s School of Foreign Service Security Studies Program where he teaches “The Business of National Security” and “Hacking for Defense.”

Matthew Merighi is the Senior Producer for Sea Control. He is also Assistant Director of Maritime Studies at the Fletcher School at Tufts University and CEO of Blue Water Metrics.

Call for Articles: North Korea

By Dmitry Filipoff

Week Dates: May 29-June 2, 2017
Articles Due: May 24, 2017
Article Length: 1000-3000 words 
Submit to: Nextwar@cimsec.org

North Korea’s ongoing ballistic missile development program and nuclear testing has continued unabated despite international sanctions and pressure. A highly-secretive state with thousands of tons of chemical weapons, a populace cut off from the world, and over a million men under arms, North Korea poses a grave challenge for any attempting to shape its behavior or contain its potential collapse.

How could a military contingency unfold and what are its considerations? How does the U.S.-China relationship affect North Korea? How could North Korea resolve its strategic predicament? Submissions can answer these questions and more to help understand and mitigate the threat North Korea poses.

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Nextwar@cimsec.org

Featured Image: A flag with a portrait of North Korea’s late leader Kim Il Sung is displayed as soldiers march during a massive military parade at Kim Il Sung Square in Pyongyang, North Korea, Wednesday, April 25, 2007, to mark the 75th anniversary of the Korean People’s Army. (AP Photo/Korean Central News Agency via Korea News Service) 

Join Us at the CIMSEC Forum for Authors and Readers (CFAR) 2017 on May 1

On  May 1 CIMSEC will host the third annual CIMSEC Forum for Authors and Readers (CFAR), an event for our readers and the public to engage our contributors on their work and topics of interest. Thanks to the generous support of CNA and the U.S. Naval Institute we are pleased to offer a professional workshop on a range of maritime security issues.

The evening will provide a chance to engage your favorite CIMSEC contributors on their work over the preceding year, hear their thoughts on how their pieces have held up, and explore predictions for the coming year. For the first time CNA will also participate in the proceedings (more on that coming soon).

Videos from last year’s event here

Event Details:
Date: May 1st.
5:00pm-6:00pm: Pre-Event Reception (Details upon RSVPing)
6:00pm-6:15pm: Welcome
6:15pm-8:00pm: Author Discussions and Q+As
Location: CNA, 3003 Washington Boulevard, Arlington, VA 22201

Speakers

—-CIMSEC Category—-

Is Sea Shepherd a Navy? A CIMSEC Debate
Chris Rawley, Claude Berube, and Ryan Mewett

Terrorists on the Ocean: Sea Monsters in the 21st Century
Robert N. Hein

Naval Strategy Returns to Lead the POM
Steve Wills

—-CNA Category—-

The Future of U.S.-India Naval Relations
Nilanthi Samaranayake, CNA

Naval Coercion and Escalation Control in South Asia
Ryan W. French, CNA

—-Other Top Vote-Getters—-

Other Than War: HA/DR and Geopolitics
Joshua Tallis

Becoming a Great Maritime Power: A Chinese Dream
Mike McDevitt, CNA

Farsi Island: Surface Warfare’s Wake-up Call
Alan Cummings

Riding A New Wave of Professionalization and Militarization: Sansha City’s Maritime Militia
Conor Kennedy and Andrew Erickson

Click here for information about applying for free CIMSEC membership

CFAR 2017 Timeline
– Nominations: 24 March-03 April
– Voting: 08-14 April
– Winners Announced: 17 April
– CFAR 2017: 01 May

To RSVP to the event, fill out the form at this link