ROKN the Boat

Not as effective a guardian as a KDX III

From the Korean peninsula came news on Thursday that construction on a divisive Republic of Korean (ROK) naval base could proceed on Jeju Island. According to Stars and Stripes:

The South’s Supreme Court ruled Thursday that the controversial construction of a naval base on Jeju Island, south of the Korean peninsula, is lawful and may continue.

 

When finished in 2015, the base will be able to accommodate as many as 20 navy ships and submarines, not to mention the occasional cruise ship.

The island’s southern coast village of Gangejeong is an attractive location for a naval base. It will more easily allow the Republic of Korean Navy (ROKN) to project forces south to protect the shipping lanes on which the nation relies, and respond to ongoing territorial and natural resource disputes with China over a nearby contested reef.  Further, it will provide an appealing stopover for the visiting American naval vessels that regularly call at ports on the peninsula.

The island, once home to the ancient Kingdom of Tamna, also bears echoes of Okinawa. The people of Jeju consider themselves a separate people from mainland Koreans as Okinawans do of mainland Japanese. Many too fear shouldering a disproportionate share of the military burden, impacts to the island’s environment, and getting caught in the middle of clashing American and Chinese forces. Such qualms have led to boisterous protests and the just-resolved court case.

1–Yeonpyeong Island
2–Baengnyeong Island
A-Northern Limit Line
B-DPRK-claimed border

Meanwhile to the north, the ROK announced last week the construction of a much smaller new facility in the region just south of the contested maritime border with North Korea. This facility will be built on the island of Baengnyeong, one of five islands west of the peninsula in the area (though further north) that saw the sinking of the ROKN warship Cheonan and the shelling of the island of Yeonpyang:

One official with the South Korea Ministry of National Defense said the Baengnyeong facility will enable “a more stable management over the Northern Limit Line” that divides the two Koreas in the Yellow Sea.

 

The Baengnyeong Island facility reportedly will have accommodations for up to 100 troops and a dock for small warships by the time it is completed in 2014. Ministry of National Defense officials took issue Thursday with those calling it a “naval base.”

 

“To the public, it might be seen as a base,” one said. “But, it’s more of a mooring facility,” with accommodations for a military company.

 

Asked if the ministry fears making Baengnyeong Island a potential target for a North Korean attack, another ministry official said, “We have no fear putting it there at all. We’re just building a dock to improve our soldiers’ living conditions.”

Whether North Korea follows through with a sabre-rattling response to Baeongnyeong facility remains to be seen, but the DPRK has reportedly completed a base for troop-carrying hovercraft 31 miles north of Baengnyeong at Koampo.

LT Scott Cheney-Peters is a surface warfare officer in the U.S. Navy Reserve and the former editor of Surface Warfare magazine. He is the founding director of the Center for International Maritime Security and holds a master’s degree in National Security and Strategic Studies from the U.S. Naval War College.
 
The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy. 

Tubes: A Reason for Cyber-Optimism?

Not intelligent — yet. This visual representation of the Internet by the Opte Project is important for what it doesn’t show: the physical places which enable these connections.

It’s been quite a week for cyber issues in the news. CIMSEC’s own Matt Hipple has a must-read article in this month’s Proceedings about “Cloud Combat,” the coming blur between man and machine, and the rise of autonomous weapons systems. As a child of the ’80s, his writing couldn’t help but conjure in my mind the image of Governor Schwarzenegger in all his red-eyed glory as the Terminator. After reading Matt’s article, I skipped across cyberspace to Wired’s Danger Room, where I read about GPS spoofing and drones, a topic Matt also covers in his piece. Though the Wired post says that researchers only made a drone assume a crash course, it seemed all of a sudden that making drones take lives when we don’t want them to is more than plausible with today’s technology.

Autonomous weapons systems? Machines tricked into behaving badly? This common plot seems to be everywhere in our imagination: from Prometheus and the “Alien” franchise to Call of Duty: Black Ops II. In the world of the arts, drones, cyber attacks, and the loosening of man’s control over technology have constituted common plot elements throughout my lifetime. Now, it seems like technology is actually catching up with our imagination. It’s no wonder, then, that the military has placed so much emphasis on cyber warfare – it is an opaque medium. And we fear that which we don’t understand.

Fretting over the risks of modern technology, a pit of anxiety formed in my stomach as a dim memory from 2003 surfaced. Acting on it, I re-watched the last few minutes of Terminator 3. As autonomously-launched nuclear weapons decimate the human race, the character John Connor says the following lines:

By the time SkyNet became self-aware, it had spread into millions of computer servers across the planet. Ordinary computers in office buildings, dormitories – everywhere. It was software – in cyberspace. There was no system core. And it could not be shut down.

The Cloud! Nothing seems more threatening than this ethereal place, where all of our data resides to be taken or manipulated. And still more threatening code could reside there, as in the film. Members of my generation, I think, frequently think about these issues and feel powerless because the technology is already here. Pandora’s box has already been opened, so to speak, and we don’t know the awesome and potentially destructive implications of the rise of this technology. But… even though the new frontiers of technology are indeed threatening, there are many reasons to pause before buying all the bottled water you can find and speeding off to your bunker in the country.

Those of us living on the mid-Atlantic seaboard are still recovering from the so-called “Super Derecho” that felled trees and caused blackouts that for some are only being repaired now. As the Washington Post noted earlier this week, an Amazon data center was a casualty of the storm and the popular Netflix, Instagram, and Pinterest applications were all affected. Despite the fact that the Internet’s predecessors were specifically designed to be survivable, The Cloud, data feeds for our drones, and all of the other cyber-boogeymen we love to fear reside in physical places as vulnerable to real-world events as you or I.

This truth brings me to the title of the post: for those of you wishing to dispel some of your fears of our cyber-frontiers, the book Tubes: A Journey to the Center of the Internet is a great place to begin. The title is a riff on Sen. Ted Steven’s famous declaration that “the Internet is a series of tubes,” which rose to become a prominent internet meme. The author, Andrew Blum, essentially confirms Sen. Steven’s much-lampooned statement. Even in our wireless age, there is still a huge physical infrastructure supporting the internet – much of it tubes: fiber optics, transoceanic cables, and the like. This physical infrastructure needs power and cooling and is as vulnerable to fires, power outages and – most importantly – the destructive agency of man.

For a military reader, Tubes illustrates a useful lesson: as much as we talk about cyber warfare and the ability of malicious computer programs like the StuxNet virus to affect the physical world, the physical world’s affect on the cyber realm is equally as important. In fact, the structure of the Internet may be particularly vulnerable, according to scholars. A paper published by Doctors Cohen, Erez, ben-Avraham, and Havlin from 2000 says that the removal of a few key sites from some networks could bring them down entirely.

So, for the time-being, it makes sense to pierce the veil covering the Internet, machines, and what we’re doing with them and stop our hand-wringing over Judgement Day. Andrew Blum’s engaging writing and deft manner of illustrating complex issues simply are perfect for the layman who doesn’t know a TCP/IP protocol from a toaster. When it seems we’re a keystroke away from a technological armageddon, Tubes rises above the cacophony of fear-mongering and suspicion and reminds us that our technological creations are as vulnerable as we are — for now.

LT Kurt Albaugh, USN is President of the Center for International Maritime Security, a Surface Warfare Officer and Instructor in the U.S. Naval Academy’s English Department. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

Lego Combat Ship

What do kids do when they get new set of Legos? Immediately start construction. Maybe in the beginning they will follow the assembly instructions, but soon discipline breaks and creativity wins. LCS, thanks its modularity, resembles a Lego set in some respects. As Christopher Cavas noted on Information Dissemination:

Will some of the mission equipment not work well? Probably. Have something better? No problem. Change it. Bring stuff in and install it, ship stuff out, bring in different stuff.

While awaiting finalization of already defined mission modules, why not think about additional ones? For example, the SuW module has been designed to counter swarm attacks, based on experiences from Middle East operations. It would probably work well in Strait of Hormuz or even in Far Seas as defined by Dr. Andrew Erickson. But would it be as effective in China’s Near Seas? Later at Information Dissemination, Wayne P. Hughes summarizes his arguments in favor of distributed offensive power and risk. LCS is not conceptual like SeaLance, but installing Harpoons as a part of next SuW module could be a step in line with his reasoning.

ASW is another example. Although it stands for anti submarine warfare, is the conventional submarine the only underwater enemy of the future? If US Navy is pursuing autonomous robot projects, we should assume that our opponents are doing the same. The question arise what will be the best defense against future armed Bluefins or underwater gliders turned into intelligent mobile mines? Even if not armed, underwater robots are dangerous as scouts providing enemies with essential information. Will we need anti scouting module as well?

Recognizing all the challenges related to their development, inventing new modules seems to be unrealistic. Here our analogy could again be helpful. The inspiration for the whole concept of modularity came from Denmark, as did Legos. What Danes did with their StanFlex modules to minimize complexity and risk, was to take EXISTING systems and packed them into standardized container, a true Lego approach. So let us allow our creativity to wander, under subtle supervision of reason.

July 4th: Nation from a Navy

A year before Boston’s infamous “Big Dig” was started.

 

Before the Founding Fathers put pen to paper, formally declaring the independence of these United States, there was a navy. This is a nation birthed by a navy. Our vast nation started with the intrepid explorers, pilgrims, and entrepreneurs who first crossed the vast and often terrifying Atlantic to reach our shores. As the colonies developed, the journey became mainstream, the colonies plied an ever-growing trans-Atlantic trade network supported militarily and logistically by British Naval might .

I’m torn between my love of America, and my distaste for French Rococo.

Founded by sea, defended by sea, and nourished by sea, our Republic found its independence at sea. From the Boston Tea Party to the Continental Marine’s landing at Nassau and John Paul Jone’s raid of England proper, the colonists’ plucky determination to use their hard-won seamanship skills against the mighty Crown served as a source of great courage to the embattled freedom fighters. However, of even greater importance was the interference provided by the French and later Spanish navies. The very ocean that served as America’s source of wealth was also Britain’s greatest source of military strength and a direct link back to the Realm’s stores and armories. No amount of determination could, with that source of power unchecked, defend the colonists from the full might of Imperial disciplines.Indeed, the war itself was won at sea, the French putting the lid on Cornwall’s Yorktown coffin as the colonists hammered in the nails.

 

USS KEARSARGE (LHD-3) transits the Straits of Hormuz.

Here at CIMSEC, we celebrate the transformation from Jefferson’s colonial upstart to Hamilton’s commercial superpower. From the Barbary Wars to America’s modern steady-state Great White Fleet, America is now defined by its global position: an economic, political, military, and cultural presence fed by a world-spanning arterial network of ships both commercial and kinetic. America is a nation born by sea, raised by sea, and living by sea.

That was your obligatory Fourth of July post. Now get some BBQ and set off explosions.

Matt Hipple is a surface warfare officer in the U.S. Navy. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.