All posts by Guest Author

The U.S. Navy Needs AWNIS for Mine Warfare

Mine Warfare Topic Week

By LT Colin Barnard, USN

Earlier this year, General Scapparotti, former Commander of U.S. European Command and Supreme Allied Commander Europe of NATO forces, sounded the call for a greater U.S. Navy presence in the Euro-Atlantic region to counter Russian aggression. The U.S. Navy has been increasing its presence in the region since Russia’s illegal annexation of Crimea in 2014, most notably conducting patrols in the Baltic and Black Seas. More recently, the U.S. Navy reestablished U.S. Second Fleet in Norfolk, Virginia, the commander of which will also head NATO’s new Joint Force Command in the same location, and is providing the flagship for Standing NATO Maritime Group 1 for all of 2019, one of four groups that make up NATO’s Standing Naval Forces.

Despite these increases, General Scapparotti was correct to say that an even greater U.S. Navy presence in the region is needed. However, greater U.S. Navy presence in Europe means greater involvement in NATO; and greater involvement in NATO requires greater use of NATO doctrine, some of which is not currently practiced by the U.S. Navy.

One such doctrine is the Allied Worldwide Navigational Information System, or AWNIS, which is crucial for conducting military operations at sea, especially mine warfare, while minimizing disruption to merchant shipping. This crucial doctrine can help modify and reroute sea lines of communications as they become threatened and endure combat operations. But unfortunately, the U.S. Navy knows very little about this system, its processes, or its merits.

What AWNIS Is

AWNIS is not a technical system but rather “instructions for the promulgation of navigational dangers during times of war,” as the first NATO Military Committee document described it in 1952. AWNIS is necessary to conduct operations at sea while minimizing disruption to the maritime domain because it provides the procedures to promulgate Safety and Security of Navigation (SASON) information on navigation hazards that result from military operations—e.g. sea mines—fulfilling legal obligations specified in international humanitarian law and conventions such as Safety of Life at Sea (SOLAS).

To accomplish this, AWNIS collates inputs from tactical units—e.g. mine countermeasure (MCM) forces—then disseminates the information to merchant and military ships based on classification level. To promulgate the information to merchant ships, AWNIS uses the existing civilian Worldwide Navigation Warning System (WWNWS) architecture to transmit Navigation Warnings (NAVWARNs). To promulgate the information to military ships, AWNIS uses the Q-Message system. More information on AWNIS processes can be found in the primary AWNIS publication, Allied Hydrographic Publication 01 (AHP-01). The Q-message system is specified in a classified supplement to AHP-01.

AWNIS’ Origins

The British Royal Navy, in conjunction with what is now called the U.K. Hydrographic Office (UKHO), developed the AWNIS doctrine in response to lessons learned during WWI and WWII. During WWI, Central Powers sank more than 5,000 allied and neutral merchant ships in the North Atlantic Ocean with projectiles, torpedoes, and mines, creating navigational dangers for all seagoing vessels, including submarines. However, there was no procedure in any navy at the time to track the shipwrecks and sea mines, or disseminate their locations while taking into account operational security. Additionally, mine clearance and salvage operations take time, as do chart corrections.

Without a procedure in the military to identify and share information about navigational hazards during the war, civilian institutions had to locate and mitigate these hazards when the war ended. To this day, shipwrecks from the wars of the 20th century and, more dangerously, sea mines, are still being discovered in the waters around Europe. Germany placed over 40,000 mines around the British Isles during WWI alone. A key part of the AWNIS doctrine is post-conflict stabilization, which ensures all hazards to navigation that emerge during a conflict are tracked, then declassified and shared with civilian institutions to ensure restoration after the conflict is over.

AWNIS and Mine Warfare

In NATO, the AWNIS doctrine facilitates Mine Danger Areas (MDAs) and Q-Routes, in addition to other threats to safety and security of navigation. AWNIS Officers embarked with MCM forces draft MDA requests to the AWNIS lead, known as the Safety of Navigation Information Coordinator (SONIC), who is co-located with the MDA establishing authority, usually the Maritime Component Commander.

While it is crucial that MDAs be reported to all friendly naval forces, this detailed information is classified and cannot be shared with merchant shipping. If merchant shipping were told where MDAs are established, the enemy responsible for laying the mines would know which mines have been found. Thus, the details of an MDA are classified and distributed via the Q-Message system only. To fulfill the legal obligation to inform merchant shipping of the mine threat, NAVWARNs are used to establish Areas Dangerous to Shipping (ADS), which can cover a wider area than actually affected in order to maximize the safety of the merchant mariner and, ideally, freedom of maneuver for naval forces. Similar to a Maritime Exclusion Zone, which is also established by NAVWARN, an ADS should be carefully planned in order to ensure the least disruption to the maritime domain. Another doctrine exists in NATO and works closely with AWNIS in this effort—Naval Cooperation and Guidance for Shipping (NCAGS).

AWNIS and NCAGS

More than 50,000 merchant ships sail the world’s oceans, carrying more than 90 percent of the world’s trade. Conversely, only 1,500 warships sail the world’s oceans, of which approximately 200 are at sea at any given time, the rest remaining in port for maintenance and training. While vastly outnumbered, what warships do at sea can greatly affect merchant shipping, potentially disrupting its free movement and thus the global economy. AWNIS and NCAGS work in concert to reduce this potentiality.

While the AWNIS doctrine is responsible for managing the environment on which both military and merchant ships sail, the NCAGS doctrine provides the procedures for military forces to cooperate with and guide merchant shipping, effectively assisting shipping to travel from point A to B safely, i.e. freedom of navigation. This can be accomplished using basic routing guidance like Sailing Information, or through more tactical measures like group transit and lead-through operations. NCAGS relies on the AWNIS overview of the environment to accomplish this task. In the event of lead-through operations, NCAGS also relies on Q-Routes, which are pre-planned channels and routes surveyed during peacetime. Utilizing the Q-Message system, Q-Routes are activated as needed to ensure access to ports or other areas of operational importance for military and merchant ships.

AWNIS and SLOC Protection

In addition to closely cooperating with mine warfare and NCAGS, AWNIS also collates information necessary for the Maritime Component Commander to efficiently position assets to protect sea lines of communication (SLOCs). When navigational hazards like minefields and shipwrecks caused by mines, torpedoes, or missiles are plotted, the Maritime Component Commander is able to visualize the battlespace and the threats to SLOCs. Overlay the operational intelligence picture of the adversary’s naval and anti-access capabilities, especially coastal missiles, and the picture becomes mostly complete.

NCAGS officers have the means to recommend routes for both merchant shipping and strategic sealift around these threats, effectively establishing a SLOC. This also aids in the deconfliction of military activity from merchant shipping. For example, during a scenario in which merchant ships must sail from the U.K. to Norway during a major conflict, NCAGS would rely on AWNIS to show where all recent missile and mine strikes have occurred at sea or in ports, all MDAs, and activated Q-Routes in order to accurately advise the ships where to sail. NCAGS officers deployed in ports or on merchant vessels would be used to communicate sensitive information such as the details of a Q-Route.

AWNIS and Hybrid Warfare

The AWNIS doctrine is increasingly relevant in the context of an aggressive Russia that is openly challenging the laws of the sea through hybrid maritime activity. In November 2018, Russia closed the Kerch Strait to innocent passage, first by promulgating a false NAVWARN, then by placing a merchant vessel under the Crimean Bridge to block the strait. More recently, Russia has been promulgating NAVWARNs for naval exercises in the Black Sea that cover larger areas than necessary, seemingly with the intent of disrupting freedom of navigation. In most cases, the Russian Federation Navy (RFN) does not fully use these exercise areas.

While the RFN is ultimately responsible for the safety of merchant vessels passing in or near these exercise areas, accidents are possible. Even worse, it is difficult to foresee how the international community would respond to such an accident, especially if there were indications the accident was intentional, e.g. to disrupt the passage of a merchant vessel bound for a Ukrainian port. Regardless, as long as Russia continues to abuse the international systems in place for disseminating SASON information, the international shipping community would be right to distrust information promulgated by and for the RFN. Conversely, the U.S. Navy and NATO need to take care to always use these systems correctly, which the AWNIS doctrine seeks to ensure. In peacetime, crisis, and conflict, the U.S. Navy and NATO stand ready to be recognized as trusted brokers of SASON information.

Practicing the AWNIS Doctrine

The U.S. Navy should look to other NATO navies in order to establish AWNIS expertise for its own purposes. The already well-established U.S. Navy NCAGS community, part of the Reserve Component, should become the primary AWNIS expertise for the U.S. Navy. This is how the navies of the U.K., Norway, the Netherlands, and Belgium manage the system. As AWNIS and NCAGS are inseparable in practice, the majority of reserve officers with warfare backgrounds in the U.S. Navy NCAGS community should be trained in both. From this new U.S. Navy AWNIS and NCAGS community, every numbered fleet commander should be assigned a Staff AWNIS and NCAGS Officer, acting as the principal adviser on SASON and ready to act as the SONIC in the event of an operation. If MCM forces are involved, reserve officers should be ready to support them with AWNIS expertise.

The central location for AWNIS and NCAGS expertise in NATO is the NATO Shipping Centre (NSC), part of NATO Maritime Command in Northwood, U.K. Though tasked with wider maritime situational awareness responsibilities, the NSC should play a role in establishing AWNIS expertise in the U.S. Navy, bearing in mind that AWNIS is not only relevant to the littorals of Europe. The mine threat is equally existential, if not more so, in the Strait of Hormuz and Taiwan Strait.

With the AWNIS organization in place, military units at sea and merchant shipping could be confident in the U.S. Navy’s ability to manage SASON information during crisis or conflict. More importantly, the Joint Force Commander could be confident in the Maritime Component Commander’s ability to protect SLOCs and help both merchant shipping and strategic sealift make it to their destination, whether to support the civilian population or the Land Component Commander.

AWNIS is not the only NATO doctrine the U.S. Navy needs to practice, but it is fundamental. No longer can the crew of a destroyer wait until they “chop” under NATO operational control to dust off the NATO publications on the back shelf. As recently argued by VADM Lindsey and members of his staff at NATO’s Combined Joint Operations from the Sea Center of Excellence (CJOS-COE), U.S. Navy knowledge gaps in NATO doctrine need to be identified and filled to ensure successful integration and interoperability with NATO forces. The U.S. Navy’s mine warfare community is already ahead of other warfare communities in this endeavor, through participation in NATO exercises like DYNAMIC MOVE. Adopting AWNIS is a natural next step.

Lieutenant Barnard is serving as a staff operations and plans officer at NATO Maritime Command in Northwood, U.K. He was previously gunnery officer onboard USS ARLEIGH BURKE (DDG 51) and weapons officer onboard USS FIREBOLT (PC 10), and he was recently selected to be a foreign area officer in Europe. He graduated from the University of St. Andrews in Scotland with a master’s in terrorism studies and holds a bachelor’s in political science from Abilene Christian University in Texas. His views are his own and do not represent the views of the U.S. Navy or Department of Defense.

Featured Image: HMCS St. John’s performs manoeuvres with other members of Standing NATO Maritime Group One while on Op REASSURANCE in the Baltic Sea, March 21, 2018. (Photo: CPL TONY CHAND, FIS)

Meeting the Mine Warfare Challenge with Unmanned Systems

Mine Warfare Topic Week

By Andrea Daolio

“We have lost control of the seas to a nation without a navy, using pre-World War I weapons, laid by vessels that were utilized at the time of the birth of Christ.” –Rear Admiral Allen E. “Hoke” Smith

Mine warfare and anti-submarine warfare share many features, from the fact that both are very difficult and time-consuming tasks (often akin to finding a needle in a haystack). And despite how both submarines and mines achieved tremendous wartime success in the past, the peacetime effort and resources dedicated toward countering them are usually far less than what is required. By harnessing unmanned systems and machine learning, the U.S. Navy can bridge the gap between its own mine countermeasures capability and the growing mine warfare threat.

Historical Successes of Mine Warfare

During World War II, Operation Starvation which mined Japanese home waters severely disrupted Japanese maritime traffic and sunk more than 1.2 million tons of shipping for the loss of only 15 airplanes, while demanding only 5.7 percent of the XXI Bomber Command’s total sorties. Yet a few years later the U.S. Navy was unprepared when it had to face enemy mines itself in the Korean War, resulting in the delay of the amphibious landing at Wonsan. At the end of the war, the mine countermeasures forces, which accounted for less than two percent of all UN naval forces, had suffered 20 percent of naval casualties.

The 1987-1988 and 1991-1992 Gulf crises once again showed how deadly mines can be even for a totally superior force, damaging the USS Samuel B. Roberts (FFG-58), the flagship for Airborne Mine Countermeasures operations USS Tripoli (LPH-10) and the USS Princeton (CG-59). Since World War II, mines have damaged or sunk four more times more US Navy ships than all other weapons.

U.S. Navy mine casualties chart. (From “21st Century U.S. Navy Mine Warfare” Program Executive Office Littoral and Mine Warfare – Expeditionary Warfare Directorate – US Navy 2009)[Click to expand]
These events have been studied in detail by the Chinese People’s Liberation Army and other potential adversaries of the U.S. like Iran and North Korea, and all those nations have significant mine arsenals. China has a fleet of 33 mine warfare vessels and over 50,000 mines (some put the estimate as high as 80,000 or even 100,000), consisting of over 30 varieties of contact, magnetic, acoustic, water pressure and mixed reaction sea mines, remote control sea mines, rocket-rising and mobile mines.1

Russia has a fleet of 47 Mine Warfare vessels and inherited an arsenal of “upwards of 250,000” mines from the Soviet Union, while Iran is estimated to have between 3,000 and 20,000 mines and North Korea is said to have 50,000 mines.2 As if these numbers were not threatening enough, Iraq was able to damage two U.S. Navy ships by deploying only around 1,000 mines, many of them old types dating back to before World War I that can be replicated cheaply (contact mines cost as little as $1500) even by third world nations. More than 30 countries produce and more than 20 countries export mines, and even highly sophisticated versions of the weapon are available in the international arms trade.

Chinese mine depot with warshot and training mines. The bands on the ninety-eight mines on the left side of the image indicate that they are exercise shapes, and could support a robust exercise program. The solid colors on the similar number of mines to the right suggest that they are warshots. (From Chinese Mine Warfare: A PLA Navy ‘Assassin’s Mace’ Capability by Andrew S. Erickson, Lyle J. Goldstein, and William S. Murray, China Maritime Studies Institute at the U.S. Naval War College, 2009)

NATO on the other hand has the largest MCM fleet in the world with 149 ships (as of 2016), but those ships are becoming old and obsolete (many are second-hand vessels retired by their original owner and then sold to smaller NATO countries). And only 7 percent of these vessels are part of the U.S. Navy. The need to renovate and enlarge this force is immediately apparent.

Countering the Threat

Mines can be put in place by aircraft, surface ships, pleasure boats, submarines, and combat divers and even from pickup trucks crossing bridges. They can be found from the surf zone to deep water (greater than 200 feet) and can be of many different and increasingly capable types. These range from simple contact mines to more complex magnetic, acoustic or pressure mines; from advanced mines that are a combination of the preceding types to computerized mines that can be even set to be detonated only by some specific ship type.

Mines are increasingly difficult to detect. The underwater environment is already a difficult medium to search through, as the currents, differences in salinity and temperature, and seafloor clutter (which is often littered with a vast array of debris) impede search. Meanwhile, mines are becoming even more elusive as stealthy mines made of fiberglass can be extremely difficult to detect. Furthermore, modern sonars are hardly capable enough to find advanced types of mines buried under the seafloor.

Types of naval mines: A-underwater, B-bottom, SS-submarine. 1-drifting mine, 2-drifting mine, 3-moored mine, 4-moored mine (short wire), 5-bottom mines, 6-torpedo mine/CAPTOR mine, 7-rising mine. (Wikimedia Commons)

But even if mines have always had an advantage over mine countermeasures, new technologies are emerging that will be able to greatly reduce or even eliminate this advantage.

Once in the water, mines are difficult to detect, but even if mines can sometimes remain deadly for an extended period of time (such as how fishermen still get injured or killed in the Baltic Sea by leftover mines from the world wars), the damaging effects of the marine environment (from corrosion to marine growth) mean that mines can’t be reliably set in the sea for long periods of time.

Therefore an adversary will likely have to deploy mines shortly before a confrontation, and that will give the U.S. a golden opportunity to stop mines before they are deployed via a more favorable preventative strategy.3

Satellites and High-Altitude Long-Endurance (HALE) drones will be able to detect signs of the major logistical efforts necessary to take mines from ammunition depots to the ports and then load them onto platforms, offering military and diplomatic opportunities to halt the mining operation.

Even if an enemy wants to place only a few mines, persistent surveillance (such as through satellites or unmanned systems with a long endurance capabilities) can monitor the area for signs of strangely behaving ships (the capture of the Iranian-improvised minelayer Iran Ajr is a good example of American forces stopping a mining operation before the mines are deployed).

Using unmanned aircraft for the task will ensure that the area will be monitored for long periods of time at a fraction of the cost and without risking lives. Machine learning and AI systems are already used for guiding military and civilian UAVs4 and even for monitoring,5 therefore these systems can be implemented in the software of an UAV to automatically tell the signs of suspect behavior of enemy assets without humans having to painstakingly watch hours of video feed and thus reducing the workload of the crew. Likewise, a fleet of small Unmanned Underwater Vessels (UUVs) can loiter in the suspected area and identify telltale signs of mining operations to stop it before it is too late. Similarly, underwater hydrophone arrays like those of the DADS and the Autonomous Off-Board Surveillance Sensor (AOSS) programs,6 even if intended to track quiet diesel-electric submarines, are capable of detecting airplanes, ships, and submarine mine-laying operations and monitor the water entry and the bottom impact of mines.

If these systems fail to stop the deployment of mines, once these are in the water, then the task gets more difficult and dangerous. Yet, unmanned systems and new technologies can greatly help the U.S. Navy in the task. Knifefish UUVs and Fleet-class USVs (Unmanned Surface Vessels) are already part of the MCM module of LCS ships and are a great step forward for mine countermeasures.7 The Knifefish has an endurance of up to 16 hours and uses onboard synthetic aperture sonar to detect floating or buried naval mines, identify them thanks to an onboard database and analytical computer, and mark them for the successive removal.

Various types of mines. (Image from “21st Century U.S. Navy Mine Warfare”. Program Executive Office Littoral and Mine Warfare – Expeditionary Warfare Directorate – US Navy 2009)

Machine learning and algorithms can also improve the ability of a UUV to recognize mines and identify objects on the seafloor. The NATO Science and Technology Organisation,  Centre for Maritime Research and Experimentation (STO CMRE) of LaSpezia (Italy) has recently developed an advanced algorithm that will automate the time-consuming task of mine identification and disposal and further advances in this field will greatly improve MCM operations.8 Moreover, adding an advanced lightweight hydrophone array to UUVs will improve the capability to detect and localize underwater objects (and will give the UUV an improved secondary ASW capability).9

Likewise, unmanned systems can greatly help MCM operations in the air and on the surface. The experience gathered by DARPA with the ASW Continuous Trail Unmanned Vessel (ACTUV) could be used to create an advanced and completely autonomous MCM ship. Using powerful sensors, advanced automation software and MCM gear, an MCM ACTUV will be able to take many of the tasks now given to the Avenger-class minesweepers. A fully autonomous large fleet of inexpensive unmanned UUVs and USVs could sweep large portions of the sea while avoiding all risk to sailors.

While ships, USVs, and UUVs are the best platforms to neutralize mines, airplanes and helicopters are the fastest platforms to sweep the sea. The laser-based ALMDS (Airborne Laser Mine Detection System) and the unmanned COBRA (Coastal Battlefield Reconnaissance and Analysis System) have recently entered service, but more systems can be deployed in the future.10 UAVs are the perfect choice for persistent reconnaissance and can be adapted for the MCM task and augmented to field the COBRA and ALMDS systems.

While the Navy arguably gives less attention to mine countermeasures than it deserves, it gives even lesser attention to its own offensive mining capability. If the U.S. Navy wants to maintain a solid deterrent against rivals then it should improve and expand its own mine arsenal. The new Hammerhead mine and the Clandestine Delivered Mine (CDM) are a good step in the right direction and more should follow.11 But the vast majority of U.S. mines are Quickstrike mines converted from general-purpose bombs. Dedicated bottom and buried advanced mines (similar to the advanced British Stonefish mine) should be developed and the number of platforms able to deploy mines should be expanded to include UAVs, USVs, and UUVs. Moreover, air-launched mines should get extended-range winged kits similar to those employed by the HAAWC High Altitude ASW Weapons Concept torpedo to give launching aircraft the ability to deploy the mine much further away from enemy positions.12

U.S. Air Force employees calibrate MK62QS MOD3 naval mines at Barksdale Air Force Base, Louisiana, July 10, 2018. (U.S. Air Force photo by Master Sgt. Ted Daigle/released)

Conclusion

“Hoke’s right: when you can’t go where you want to, when you want to, you haven’t got command of the sea. And command of the sea is the rock-bottom foundation of all our war plans. We’ve been plenty submarine-conscious and air-conscious. Now we’re going to start getting mine-conscious—beginning last week.” –Admiral Forrest P. Sherman, USN Chief of Naval Operations October, 1950

Until recently the task of minesweeping has been extremely dangerous for sailors, but with new technologies such as unmanned systems and machine learning, it is time to invest heavily in these avenues of capability and convert a greater part of the U.S. Navy to fully autonomous and unmanned MCM operations.

The importance of mine warfare and of mine countermeasures for any modern Navy can never be stressed enough. Given how mining can achieve great results and inflict huge losses with relatively low risk and cost argues for greater investment in these weapons and the means to counter them.

Andrea Daolio, from Italy, has an engineering background and a longstanding passion for wargaming and for geopolitical, historical, and military topics. He has been a finalist in New York’s MTA Genius Transit Challenge. He is currently collaborating with video game developer Slitherine on the popular wargame Command: Modern Air/Naval Operations. His views are his own.

References

[1] Andrew Erickson, Chinese Mine Warfare, http://www.andrewerickson.com/wp-content/uploads/2017/09/China-Maritime-Study-3_Chinese-Mine-Warfare_Erickson-Goldstein-Murray_200906.pdf

[2] Sydney J. Freedberg jr., Minefields At Sea: From The Tsars To Putin

[3] Sydney J. Freedberg jr., Sowing The Sea With Fire: The Threat Of Sea Mines

[4] Marcus Roth, AI in Military Drones and UAVs – Current Applications, https://emerj.com/ai-sector-overviews/ai-drones-and-uavs-in-the-military-current-applications/

[5] Luis F. Gonzalez , Glen A. Montes , Eduard Puig , Sandra Johnson , Kerrie Mengersen  and Kevin J. Gaston , Unmanned Aerial Vehicles (UAVs) and Artificial Intelligence Revolutionizing Wildlife Monitoring and Conservation, https://www.mdpi.com/1424-8220/16/1/97/htm

[6] Naval Mine Warfare: Operational and Technical Challenges for Naval Forces, https://www.nap.edu/catalog/10176/naval-mine-warfare-operational-and-technical-challenges-for-naval-forces

[7] Sydney J. Freedberg jr., From Sailors To Robots: A Revolution In Clearing Mines

[8] NATO CMRE, Autonomous Naval Mine Countermeasures, https://www.cmre.nato.int/about-cmre/fact-sheets/1292-autonomous-naval-mine-countermeasures-1/file

[9] Venugopalan Pallayil, Ceramic and Fibre Optic Hydrophone as Sensors for Lightweight Arrays – aComparative Study, https://arl.nus.edu.sg/twiki6/pub/ARL/BibEntries/venu_oceans_anchorage17.pdf

[10] Captain Danielle George, U.S. NAVY Mine Warfare Programs, https://www.navsea.navy.mil/Portals/103/Documents/Exhibits/SNA2019/MineWarfare-George.pdf?ver=2019-01-17-133139-817

[11] Joseph Trevithick, US is betting big on Naval Mine Warfare with these Sub-launched and Air-dropped types, https://www.thedrive.com/the-war-zone/25235/the-u-s-is-getting-back-into-naval-mine-warfare-with-new-sub-launched-and-air-dropped-types

[12] MK 54 Lightweight Torpedo and High-Altitude Anti-Submarine Warfare Capability (HAAWC), https://www.dote.osd.mil/pub/reports/FY2017/pdf/navy/2017mk54.pdf

Featured Image: September 22, 1987  Contact mines partially covered by a tarpaulin on the deck of the captured Iranian mine-laying ship Iran Ajr (PH3 Cleveland, U.S. National Archives)

Aviation as the Key to Navy-Marine Integration

By Carl Forsling

Marine Aviation Needs to Enhance Naval Integration

The Corps has drifted away from the Navy over the last two decades, and it didn’t need the Navy in Iraq or Afghanistan. Shortages of amphibious shipping combined with a need to justify force structure gave birth to shore-based SPMAGTFs. This trend has led to less-than-seamless integration between the Marine Corps and Navy. In the future fight, this gap leaves amphibious forces more vulnerable and less deadly than they should be. 

The new Commandant of the Marine Corps, General David Berger, said in his planning guidance, “…there is a need to reestablish a more integrated approach to operations in the maritime domain.” By virtue of their range and speed, aviation assets are inherently able to bridge gaps. Amphibious forces usually take this as meaning between the sea and the land, but it also bridges gaps between forces at sea.

Amphibious ships can no longer serve merely as transportation for their embarked Marines. In the future anti-access/area denial (A2/AD) environment, they have to be part of the open-ocean kill chain. If the naval services are to enhance their survivability and lethality against the medium- and high-threat fights of the future, they have to combine their efforts and their assets. The keystone of that effort will be the aviation assets of the Marine Expeditionary Unit (MEU) and Expeditionary Strike Group (ESG). They must be reconfigured to better exploit aviation platforms such as the V-22 and F-35B, and turn the Corps into a force for sea control.

The strength of the Navy and Marine Corps team is the use of seaborne mobility to achieve effects on land. New aviation platforms can reinvigorate this for the 21st century, making both the Navy and Marine Corps more survivable, deadly, and integrated.

Ospreys Enable Naval Distributed Operations

In Marine parlance, “distributed operations” mean small units scattered throughout a given ground commander’s area of responsibility. In Navy parlance, distributed maritime operations are those within a naval commander’s area of responsibility. Rarely are the two domains intertwined, but now they need to be.

Marines routinely practice distributed operations within the ships of an Amphibious Ready Group (ARG) – performing “split-ARG” ops at widely separated locations. But this is much less common among the ships of the larger Expeditionary Strike Group, which adds attached surface combatants and often a submarine. 

It is virtually unheard of to detach Marines to other ships, such as those in a carrier strike group. The ARG typically does not integrate much with the rest of the Navy, but in the future, it will need to in order to survive. To that end, why are Ospreys tethered to ships at all, much less particular ships? Ospreys are easier to maintain on land. With the two KC-130Js normally assigned to the MEU, they can reach anywhere in most theaters within hours. 

SPMAGTF-CR-AF’s Ospreys can reach much of the 6th Fleet area of operations on one tank of gas from Moron, Spain. They could reach even further from a centrally located base like Sigonella. SPMAGTF-CR-CC can reach most of the CENTCOM AOR from its base in Kuwait. The Pacific isn’t quite as easy to traverse, but the Osprey has proven itself unique among rotorcraft in covering those distances, having already transited from Hawaii to Australia for the Marine Rotational Forces in Darwin.  

The tiltrotor squadron assigned to SPMAGTF-CR-CENTCOM and the half-squadron with SPMAGTF-CR-AFRICOM are burning out aircraft and people for little operational benefit. By making the MEU MV-22s and the tiltrotor company land-based, the SPMAGTFs are made redundant. Eliminating those would save six deployed MV-22s in the Mediterranean and 12 in CENTCOM. That would strengthen the VMM community and allow it to better support the MEUs. 

Instead of having a SPMAGTF in a given theater in addition to MEU assets, the MEU VMM, tiltrotor company, and KC-130Js would shadow the MEU from shore instead. In Europe, for example, they might primarily work out of Sigonella, but could move to Djibouti to support operations in the Horn of Africa or Romania to counter Russian moves in the Balkans. 

If the rest of the MEU is needed, the tiltrotor-borne unit could be a rapidly deployable advance element, or conversely, remain in strategic or operational reserve. The base tiltrotor squadron, KC-130J detachment, and tiltrotor infantry company would essentially be an airmobile split ARG, capable of independent action, but rejoining the MEU main body when necessary. They could immediately take spots on the air plan ferrying Marines ashore, recovering aboard ship, or to an airfield as the situation dictates. 

For many missions, there is no need to commit the entire Amphibious Ready Group (ARG) or ESG when V-22s can take Marines almost anywhere in theater. It saves these warship formations from having to steam for days. It also affords another way to split the MEU besides just between the ships in the ARG, increasing flexibility and the MEU’s ability to respond to multiple contingencies. In certain threat environments, staging Marines from ships other than amphibious platforms may be the most survivable option, offering greater distribution and putting a greater number of the enemy’s shore bases at risk of amphibious assault. The enemy will never be entirely sure which vessels present that threat, complicating their threat analysis.

Once the MEU doesn’t have to be in one place, or even two, options expand. Amphibious ships aren’t the only vessels Marines can stage from. Ospreys can land on many other naval vessels, even if they can’t support sustained flight operations. The Ospreys could embark, or they might just deliver a contingent of Marines, by alternate insertion means (FAST rope, hoist, etc.) if necessary. Then the ship’s organic air and surface assets would come into play.

With the right preparation, much of the Navy’s fleet could become staging areas for Marines. 

Aircraft carriers are certainly capable of supporting MV-22s. CVNs typically carry two squadrons of H-60s and will soon have their own CMV-22s Ospreys, so have a robust organic insertion capability. They also have sufficient billeting for any GCE Marines. If MV-22s deliver Marines to destroyers or cruisers, those also often have their own helicopters. While they typically carry the MH-60R, not optimized for troop transport, Marines could still use those ships as lilypads for certain missions. Those ships could also deploy small craft with Marines aboard. That would typically be for naval missions like interdiction and counterpiracy, but could also include going ashore for embassy reinforcement or humanitarian assistance. In permissive environments, even USNS vessels could provide staging areas for a small GCE. 

Strike – A Primary Mission

Moving the Ospreys and the tiltrotor company off the ship or distributing these assets across more ships frees up plenty of space above and below deck. This allows for other assets that are more dependent on shipboard space compared to more flexible aviation assets. Those can bring new capabilities such as increased lethality.

Given the number of active theaters today, the 11 big-deck carriers are not enough. However, with the F-35B amphibious strike capability is no longer just providing bomb trucks for low-threat sideshows new amphibious assault formations can strike targets in high-threat environments.

The F-35B is not just a replacement for the AV-8B. It is a 5th generation multirole fighter, capable of penetrating integrated air defenses. But six F-35s per MEU is not sufficient. Due to the situational awareness the F-35 provides pilots, its preferred maneuver element is a division of three or four aircraft, vice the sections of two that AV-8Bs typically employ. Given 75 percent availability, eight aircraft are required to make two light divisions, and thus support sustained combat flight operations. With eight F-35Bs, both the strike and counter-air capabilities of the MEU are dramatically improved. Having a baseline detachment of eight F-35s per MEU will enable a full spectrum of missions, especially a fairly robust offensive and defensive counter-air capability, which the AV-8B was only able to perform in relatively permissive environments. 

Having more F-35s doesn’t just mean more bombs on target. F-35s make every other combatant around them more effective. For example, F-35Bs are capable of directing SM-6 intercepts, HIMARS strikes, and providing in-flight retargeting support to other networked munitions. The SM-6 is not only a capable SAM, but can also be used to engage surface targets. The HIMARS is not limited to working ashore, but can also be fired from a ship’s deck, filling the long-neglected gap in naval gunfire support. Ship-launched HIMARS could also provide amphibious platforms with a powerful new anti-ship capability without requiring launch cells, further expanding the high-end mission set to include sea control.

The F-35 links the ships of the ESG together into something far more deadly and survivable than before. Big-deck amphibs can become formidable strike platforms, reaching out not just with the F-35Bs themselves, but also with their networking support for other shooters distributed across the battlespace.

HSC to VSC?

If LHAs and LHDs are to be legitimate strike and counter-air platforms, they are going to need greater logistics and search-and-rescue (SAR) capability. The current Navy SAR detachment aboard the LHD/LHA is only capable of relatively short-range recovery in secure areas, generally overwater “planeguard” duty. But soon the Navy will be fielding its own enhanced variant of the MV-22, the CMV-22.

A CMV-22 detachment would enhance the capability of both the Navy and the Marine Corps team. With CMV-22s aboard, the Navy could reclaim the long-range SAR mission. This is key if amphibs are going to routinely serve as strike platforms and perform a greater role in sea control. With the right equipment and personnel, this could provide a capability well up the SAR decision matrix, making a VSC detachment valuable as a joint theater personnel recovery asset.

Using more F-35Bs means using more engines, including those the CMV-22 is uniquely suited to carry, not to mention the additional bombs and missiles a “lighting carrier” would need. This is in addition to the benefits of being able to conduct longer-range resupply in general, especially at the distances involved in the Indo-Pacific. The CMV has an 1150nm range, roughly 300nm greater than an MV.

That is not a small investment on the part of the Navy. Replacing the expeditionary MH-60S with CMV-22s would require 22 aircraft, assuming that the squadron and the ship keep similar deploy-to-dwell ratios. With additional Fleet Replacement Squadron, pipeline, and attrition aircraft, the ultimate requirement would be 25 to 30 CMV-22s to sustainably outfit all the big-deck amphibs. That said, the MH-60S is starting to come up on the point when recapitalization is necessary. With the CMV-22 already being purchased for COD, expanding that community to include the gator Navy offers a huge increase in capability for a marginal increase in cost.

In exchange for that investment, the Navy and Marine Corps can make a leap from a marriage of convenience in their rotorcraft fleets to a truly synergistic and integrated partnership.

Room to Grow

Even with the addition of F-35Bs and trading MH-60Ss for CMV-22s, there is still significant room for adding capability.

One of the recurring complaints about the MV-22 is that it is too large for certain missions, such as VBSS (Visit Board Search and Seizure). While the UH-1N was not able to do significant troop lift, the UH-1Y can. That means the aviation combat element (ACE) needs at least four, not the typical three aircraft. At a readiness rate of 75 percent, that would allow a section of UH-1Ys to be devoted to assault support, especially in support of special missions and hard hits. The third would be able to perform any other tasks in the utility mission set. The Marine Corps has already purchased attrition aircraft over its T/O requirement that could be used to fill this need immediately. If this employment proves useful, additional UH-1Ys could be purchased to preserve this capability into the future.

There are normally four AH-1Zs assigned to the ACE. With a typical four aircraft to make three, the addition of that extra UH-1Y would allow an extra mixed section of skids to provide CAS and FAC(A) when shooting becomes the priority. The Yankee brings significant CAS capability, including Precision Guided Munitions – for now just APKWS rockets, but in the future, likely Hellfire missiles as well. 

Unmanned Systems 

The Marine Corps and the Navy are working past each other when it comes to UAS. The Marines field small tactical platforms and the Navy seeks to enhance sea control with larger systems. Neither of those efforts reaches the other, nor provides top cover for the critical period when Marines transition ashore.

The Marine Corps has begun the MAGTF Unmanned Expeditionary program (MUX), looking to acquire a large UAS capable of vertical takeoff. For CAS and persistent ISR, it requires a Group 5 UAS, a huge asset in normal MEU operations. Just as importantly, a VSTOL UAS with a reconfigurable payload and long endurance would make every platform around it, both Navy and Marine, more capable.

Currently the ESG does not have an Airborne Early Warning (AEW) capability. Its organic sensors are limited by line-of-sight from just above the waterline, or at best from the radars of MH-60Rs from surface combatants, which can provide coverage for only a few hours at a time, even if they are near enough. Sea-skimming threats traveling below the radar horizon would pose a considerable threat, making an organic AEW capability fundamental for awareness and survivability in a high-end threat environment.

Currently an LHD or LHA flight deck is able to support only eight to twelve hours of flight operations a day. A long-endurance UAS would extend this coverage greatly, staying in the air even when ships aren’t at flight quarters. With two, ideally three, AEW-equipped units, MUX would enable almost continuous coverage.

AEW would allow the F-35Bs to stay on the deck in an alert status appropriate for the threat, vice burning hours overhead performing the same AEW function. MUX could also detect and cue air or surface targets for other shooters. Long-range weapons like Tomahawk and the Long Range Anti-ship Missile (LRASM) work best when standoff observation and in-flight retargeting support is readily available, and where unmanned aviation platforms can be more readily risked to provide time-critical networking support.  

Marines are still Naval Infantry

In the future, we can’t assume that we will possess uncontested sea control, whether in the objective area or in transit. The ESG may have to fight its way there. Every asset aboard every ship, including manned and unmanned aircraft, whether they have “Marines” or “Navy” painted on the side, must work in concert. We need to move beyond the construct where the Navy exists only to move Marines to an objective, into one where elements of both are a cohesive fighting team from embarkation to debarkation.

With V-22s, every ship can have access to a Marine detachment when needed. We do not always need CVNs for strikes if we have F-35B-capable amphibious ships. With additional UH-1Ys, the ACE can execute more direct action missions and CAS, relieving other high-demand assets. And with the right UAS providing overwatch, the ESG should never be surprised.

Once we stop thinking of the Navy and Marine Corps as operating in distinct domains, the survivability and lethality of the ESG and the MEU, and even carrier strike groups and surface action groups will be increased. Employed correctly, emerging Marine and Navy aviation platforms, such as the F-35B, CMV-22, and MUX, combined with the assets of the MEU, ARG, and ESG, will make the integrated Navy-Marine team more capable and deadly. 

Carl Forsling is a retired Marine officer and pilot with multiple deployments flying the CH-46E and MV-22B as well as advising Afghan security forces. He currently works in the aerospace industry and is a senior columnist at Task&Purpose. He is a graduate of the University of Pennsylvania and Boston University. He is married with two children and lives in Arlington, Texas.

Featured Image: BAB EL-MANDEB STRAIT (Aug. 18, 2019) The amphibious assault ship USS Boxer (LHD 4) transits in formation through the Bab el-Mandeb Strait. (U.S. Marine Corps photo by Lance Cpl. Dalton S. Swanbeck/Released)

Black Hat 2019 and DEFCON: Leveraging Private Sector Talent for Cyber Capability

By Christian Heller

The U.S. defense complex is looking to private industry and civilian research to gain an advantage on the battlefield as advanced technologies push warfare in new directions. In cyber capabilities especially,the U.S. and its naval services lean on civilians, contractors, and independent cybersecurity companies to gain a competitive national edge. Every year these groups descend upon Las Vegas, Nevada for back-to-back information security and hacking conventions dubbed Black Hat USA and DEFCON. The Department of Defense follows in step to search for best practices, advanced insights, experimental tools, and new talent.

The 2019 editions of Black Hat and DEFCON held plenty for national security analysts to ponder. Dino Dai Zovi, the head of mobile security at the credit card processing company Square, spoke of the need for security software with effective user interfaces which keeps pace with advances in technology. Security programs must be built for “observability” to better “understand if the protections are working and also perform anomaly detection.” Such a requirement is not only necessary for the Navy, but finds a strong historical precedent. The Navy has a long history of simplifying advanced technologies into easier, usable forms for better employment by young sailors.

Identity intelligence, one of the most utilized capabilities of U.S. forces during the past two decades of counterinsurgencies, has also been a main effort for Chinese military and government development. Researchers from the Chinese firm Tencent demonstrated the ability to spoof biometric authentication devices with common eyeglasses. They did so not by convincing the systems that the user was a different person, but rather that the user was a photo instead of a living person. Low budget defenses against identity intelligence tools may prove just as frustrating to U.S. forces in future stability operations as space blankets did against early UAVs.

Major tech leaders like Apple and Microsoft announced new measures to search externally for IT security support through the use of rewards. Apple, which normally treats its technology and systems with close-hold protections, will now award upwards of $1 million to hackers who identify critical vulnerabilities in Apple technology. Microsoft is also offering up to $300,000 to hackers who identify exploits in its Azure cloud technology systems. To facilitate this outside support, Microsoft is creating Azure Security Labs where participants can experiment on Azure networks without affecting the existing customer base.

These bounty programs have already benefited organizations like the Marine Corps which may lack the capacity or skillsets to facilitate internal network testing. At last year’s conference, the Marine Corps hosted a hacking program to test the durability of its public websites and the Marine Corps Enterprise Network, or MCEN. One hundred ethical hackers spent nine hours testing the Marine Corps’ systems and found 75 vulnerabilities in return for $80,000 in combined prize money. Though the payment pales compared to private industry awards, these events are an important way for defense agencies to engage with community experts who are willing to support the military while gaining valuable organizational knowledge in the process. The Pentagon has hosted hacking projects since 2016 and recently leveraged three security firms – Bugcrowd, HackerOne, and Synack – via contract to conduct sustained network testing. Additionally, if data scientists and cyber specialists are going to play a pivotal role in the future Navy and Marine Corps, engaging with non-traditional audiences at events like Black Hat and DEFCON help to expose the hacking world to the armed services.

The Air Force is embracing conferences like DEFCON to leverage technical expertise and open up the service to these communities. It hosted two events at this year’s conference. One challenged hackers to gain entry into an airbase, and the other tested data transfer hardware for the F-15 fighter. The Trusted Aircraft Information Download Station, or TADs, is an independent subsystem of the F-15 which helps collect sensor inputs like images. Next year the Air Force wants to bring an entire F-15 aircraft to the convention and host a hacking event involving a live satellite.

This year’s events also pointed toward the changing battlespace in which U.S. forces will operate. Harvard lecturer and fellow Bruce Schneier discussed “hacking for good,” a movement which is becoming more prevalent throughout the world. Just as military forces found themselves operating around civilians and non-governmental organizations (NGOs) in Iraq and Afghanistan, the future cyber battlespace may be filled with hacktivists trying to do good or “grey hat” operators taking advantage of disorder to pursue alternative motives.

Hacktivist campaigns have occurred in almost every recent global crisis including Sudan, Venezuela, Pakistan, and Libya. Hacktivist campaigns usually involve unsophisticated denial of service attacks to take down websites and servers which achieve mixed results. However, as cyberspace conflict between great powers becomes routine, such groups are sure to increase operations and become regular actors in the same competitive spaces in which government agencies and militaries interact.

Another feature of the changing cyber battlefield is internal competition between state actors. Kimberly Zenz, a senior official with the German cybersecurity organization DSCO, explained at Black Hat that Russia’s intelligence agencies and hacking organizations should be viewed as individual groups competing for influence with one another. This competition can lead to chaos and risk-taking in cyberspace as groups minimize coordination amongst one another and compete to showcase their abilities to senior officials. The results could be similar to the $10 billion dollars in damages caused by the NotPetya malware.

An information graphic depicting the dangers of cyber attacks. (U.S. Navy graphic/Click to Expand)

For the Navy, Marine Corps, and Department of Defense, the consequences of these foreign internal rivalries could be sporadic and disproportionate cyber attacks. Leaders may struggle not only to determine which actor initiated the attack, but what the target, intentions, and overall scale truly are. From the defender’s point of view, probes and attacks which could seem like a coordinated and widespread operation may instead be many. They may also be part of a concerted “persistent engagement” strategy with long-term but subtle objectives. In this case, a defender’s response could be disproportionate to what the attacker intended. These factors make deterrence in cyberspace an elusive goal for policymakers.

One final takeaway from the 2019 conventions is the intention and ability of nefarious actors to target defense users and systems outside of official government channels. Agencies may spend millions to harden networks, but users, such as service members at home, may be the greatest vulnerability in the system. They are often the softest target for foreign powers and criminal groups to exploit with simple techniques. One presenter demonstrated a fully-functioning, charging-capable Apple USB which contains a Wi-Fi implant and allows nearby hackers to access the connected computer. Another speaker showed how she used information from common online subscription services such as Netflix and Spotify to access bank accounts and personal financial data. Using common talking points, customer service helplines, and classic identity theft techniques, she was able to get access to private account information at major financial institutions without any advanced technology. A separate group, Check Point Research, demonstrated the ability to hack digital cameras to spread malware through home networks and hold personal information for ransom.

The military’s efforts to increase information technology security in the workplace may need to extend to personal services and education for service members to prevent workforce distractions, blackmail, or the further spread of malware throughout units and networks. Currently, the individual Soldier, Sailor, Airman, or Marine is the easiest objective for hostile cyber actors to target, whether for criminal, intelligence, or military purposes. The main lessons from Blackhat and DEFCON may be that nowhere is safe, and the services should explore a wider range of protection services for the users they rely on to carry out missions.

Christian Heller is a graduate of the U.S. Naval Academy and University of Oxford. He currently serves as an officer in the United States Marine Corps. Follow him on Twitter, @hellerchThe opinions represented are solely those of the author and do not represent the views of the United States Marine Corps, the Department of Defense, or the United States Government.

Featured Image: DefCon attendees gather in Las Vegas to learn about new technology vulnerabilities and cyberattacks. (AP Photo/Jae C. Hong)