Suppression of enemy air defenses (SEAD)1 is a mission based on recognizing that air defenses have become increasingly lethal, effective, and must be suppressed in order to allow air operations to be conducted with dramatically reduced loss rates. SEAD has evolved since WWII as a direct result of lessons learned in combat. It has established doctrine, established tactics, specialized force structure, specialized weapons, and trained and experienced personnel that plan and execute the mission. The U.S. Navy now faces a similar situation as the result of the dramatic increase in the numbers and sophistication of anti-ship cruise missiles (ASCMs). The situation is summarized in the 2017 Center for Strategic and Budgetary Assessments (CSBA) fleet architecture study as follows:
“To support deterrence by denial or punishment, American naval forces will need to operate and fight in proximity to the adversary. As described above, U.S. surface forces will face large numbers of enemy anti-ship missiles in these areas and thus require high-capacity air defenses to survive long enough to conduct their offensive missions. Active defenses may, however, be insufficient to win the ‘salvo competition’ between the enemy’s weapons systems and U.S. defenses. To reduce enemy salvos to more manageable levels, U.S. naval forces will also need to deny or degrade the enemy’s ability to find and target ships.”2
The nation that has the offensive capability to suppress an enemy’s intelligence, surveillance, and reconnaissance (ISR) through physical destruction, deception, disruption, and corruption will have the critical edge – that of superior situational awareness, a significantly reduced threat of attack, and the all-important capability to target and attack enemy ships. While one ASCM hit will severely damage or disable most surface ships, anti-ship missiles are a threat only when an enemy ship has been detected, classified and identified, located and tracked, and targeted (e.g. allocated to a land site or an air, surface or subsurface launch platform). This extended kill chain is dominated by information from ISR systems which can be destroyed or disrupted.
To prevail in the salvo competition, the U.S. needs a robust offensive capability for Suppression of Enemy Intelligence, Surveillance, and Reconnaissance (SEISR). Like SEAD, this offensive capability has a preplanned and reactive component. The preplanned component achieves the greatest suppressive effect, but it has to be followed by a reactive component focused on suppression of any remaining or reconstituted ISR capacity. This component can be planned in great detail based on comprehensive intelligence analysis of the adversary’s land, air, space, undersea, and maritime surface ISR capabilities. This includes their associated communications, command and control, and intelligence analytical infrastructures. The reactive component requires current intelligence focused on enemy remaining or reconstituted ISR capabilities in order to plan and execute reactive SEISR operations. The complexity of a near-peer nation’s ISR capabilities suggest that SEISR will require a complex joint service response supported by multiple agencies to achieve the objective of reducing the ASCM threat to levels that are manageable for fleet defenses.
Building on the intelligence foundation, the mission will require an additional level of analysis to identify and assess the wide variety of possible kinetic and non-kinetic options for suppressing the wide range of enemy ISR capabilities. This analysis of suppressive options includes not only the effects of operational capabilities, but also, the identification of opportunities and the definition of requirements for new capabilities. The intelligence and effects analytical capabilities required to support the pre-planned and reactive SEISR missions will require the establishment of dedicated analytical cells that have the depth of knowledge of all aspects of enemy ISR systems and of available kinetic and non- kinetic alternatives for achieving the desired suppressive effects.
Suppression has to include a reactive component focused on suppression of enemy efforts to reconstitute or field new capabilities as the conflict evolves. Like SEAD, after the preplanned options are executed, SEISR will have a strong tactical component that drives a new near real-time intelligence and effects analytical focus, and SEISR capabilities that can be applied without delay when opportunities are presented by the enemy. SEISR will have to be animated by a forward-leaning, tactical mindset to keep up with or anticipate changing enemy ISR capabilities and methods throughout the conflict.
If effective, SEISR will reduce the ASCM threat to levels manageable by fleet non-kinetic and kinetic defenses. The non-kinetic component, often referred to as Counter ISR, will be focused on countering enemy ISR platforms and sensors, and countering launch vehicle and ASCM target acquisition systems. These non-kinetic methods range from tactics such as emissions control (EMCON) to deny detection, deception to confuse, and electronic attack against RF systems. Success is heavily dependent on having technical intelligence on enemy ASCM systems; and, the land, air, surface and subsurface ASCM launch complexes or platforms, and their surveillance, reconnaissance, and target acquisition systems, associated communications, and data links.
The key to tactical success in the defense against ASCM attack is directly dependent on the battlegroup tactical commander and his or her subordinate warfare commanders having the situational awareness that enables them to make better tactical decisions faster than the enemy. This situational awareness will be the result of the automated integration of information that is relevant to the specific commander with respect to geography, content, and timeliness.
SEAD has evolved over the past 70 years. The DoD and Navy do not have 70 years to organize and prepare for conflict against a nation with near-peer ISR and target acquisition capabilities. The SEISR mission will require an institutional focus, the rapid evolution of concepts and tactics, focused intelligence and target study support, and the development of personnel with a tailored commitment to the Counter-ISR missions.
Richard Mosier is a retired defense contractor systems engineer; Naval Flight Officer; OPNAV N2 civilian analyst; OSD SES 4 responsible for oversight of tactical intelligence systems and leadership of major defense analyses on UAVs, Signals Intelligence, and C4ISR.
References
[1] Suppression of Enemy Air Defenses — Activity that neutralizes, destroys, or temporarily degrades surface-based enemy air defenses by destructive and/or disruptive means. (JP 1-02)
[2] Center for Strategic & Budgetary Assessments (CSBA) study, titled Restoring American Seapower: A New Fleet Architecture for the United States Navy , Bryan Clark, Peter Haynes, Jesse Sloman, Timothy Walton, dated 9 February 2017.
Featured Image: PHILIPPINE SEA (June 9, 2019) Marines with Marine Medium Tiltrotor Squadron 265 (Reinforced) aboard the USS Wasp (LHD 1) work on an F-35B Lightning II fighter aircraft during night time flight operations. (Official U.S. Marine Corps photo by Lance Cpl. Kenny Nunez Bigay)
The U.S. Navy is faced with several big challenges in maintaining undersea warfare dominance – the domain of the fast attack nuclear submarine or “SSN.”
These challenges include the reemergence of a near peer naval threat that is a direct challenge to the entire U.S. Navy, including our SSN force. The current and growing undersea threat includes both advanced technology attack submarines (including nuclear, diesel-electric, and air independent propulsion variants) with advanced torpedoes and cruise missiles, and much increased numbers of adversary submarines, particularly in the Indo-Pacific theater. Another challenge comes from the rapidly escalating procurement and sustainment costs of ever-larger and more complex U.S. SSNs since the end of the Cold War.
These two challenges have resulted in a very large immediate deficit in U.S. SSN numbers,1 if not capabilities, that is expected to continue for decades. The Navy’s current planned way out seems to be to simply hope for the best, that the funding will materialize to build many more of today’s very large and expensive SSNs. That plan is increasingly seen as unlikely if not impossible given existing serious constraints on U.S. defense spending.
This situation is not unique to the submarine force. The Navy’s overall force structure assessment (FSA) is undergoing a significant revision due for release later this year.2 Navy leaders including outgoing CNO ADM John Richardson and VADM Bill Merz have stated on multiple occasions that the surface fleet is going to evolve with many more small surface combatants, with enhanced capabilities, and many fewer large surface combatants. Admiral Merz stated:
“You may see the evolution over time where frigates start replacing destroyers, the Large Surface Combatant starts replacing destroyers, and in the end, as the destroyers blend away, you’re going to get this healthier mix of small and large surface combatants.”
What is driving this mix to an overall surface fleet weighted toward smaller vessels? Cost. The cost to build, and then the cost to operate and maintain vessels is necessitating this shift from the current generation of surface warships dominated by large surface combatants. The same cost factors also inhibit submarine construction and operations, too. This is in fact a rebalancing in the age-old naval argument of capability versus capacity. The rebalancing is made possible by emerging technologies that allow the Navy to package enhanced capability into smaller hull forms, and to take advantage of new capabilities in cheap yet capable unmanned vessels. Yet today, the U.S. Navy still has no “small subsurface combatant” – just the very large Virginia-class SSNs that are evolving into even larger and more expensive hulls with the Block 5 and subsequent block versions.
The U.S. has relied on its total undersea dominance for nearly three decades since the collapse of the Soviet Union, but that dominance is already fading, and is projected to flip upside down within the next decade. While perversely, due to the projected retirement of the rest of the aging Los Angeles-class SSNs, U.S. submarine forces will continue to fall over the same period, from 51 boats today to a projected 42 within a decade. The principle reason for the inability to build and operate the much larger SSN fleet of 66 subs that the Navy now says it needs is lack of funding. Some suggest that the answer is extending the service lives (SLEPing) of the Los Angeles-class boats, but that is not a practical solution, even in the short term, let alone the long term, since the maintenance burden for very old submarines is much higher than for new vessels. SLEPing old SSNs would only exacerbate the existing near-crisis of maintaining our these SSNs in operable condition.
Some say our small SSN fleet size is also due to a lack of “industrial capacity,” but the ability of the United States of America to ramp up its industrial capacity in times of severe military need is clearly proven in actual U.S. history throughout both World War Two, and during the long Cold War. If the funds to build all the subs that we need are actually made available, American industry will almost certainly respond, and ramp up accordingly, as proven time and time again. Make the construction dollars available on a predictable, multi-year contracting basis, and existing yards will open new lines, and/or new yards will be built, workers trained, and supply chains expanded.
In the 1960s through the mid-1970s there were six U.S. shipyards building SSNs and SSBNs, and in just 13 years of production the yards produced 39 boats, an average of three per year while at the same time producing 31 boats in multiple classes of Polaris and Poseidon SSBNs over just a five-year period. That came to on average of more than nine nuke submarines delivered per year at its peak in the mid-1960s.
As to the dollars needed for an expanded SSN fleet, the current full construction cost of a Virginia-class Block 5 SSN with Virginia Payload Module (VPM) stands at $3.2 billion in 2018 dollars. For comparison, the Sturgeon class-SSNs were built in the late 1960s for approx. $130 million each – in 2019 dollars that would be approximately $726 million – about a fourth of the cost of a Block 5 Virginia boat.
These behemoth Block 5 Virginia SSNs, at approximately 10,000 tons submerged, are more than twice the displacement of Cold War SSNs in the Skipjack-class, Permit-class, and the numerically large Sturgeon-class boats (4,300 tons submerged displacement). And to make matters more challenging, current naval plans for the next generation SSN, now dubbed “New SSN”3 suggest an even larger attack submarine, perhaps 12,000 tons and likely to cost $4 billion to $6 billion or more in 2018 dollars (and not entering the fleet for a decade or more) to build, and similarly expensive to operate. The Seawolf-class of SSNs were of approximately the same displacement, and the very high cost associated with building and operating the Seawolf SSNs encouraged limiting the class of boats to three hulls after the end of the Cold War.
The attack submarine Seawolf (SSN-21) conducts her first at-sea trial operation, following her early morning departure 3 July 1996, from the Naval Submarine Base, Groton, Conn. (General Dynamics photo)
Note that not only does raw displacement drive up the construction cost of a SSN (the rule of thumb is you pay for ships by the ton), but it also drives up the lifetime operating costs of the SSN. Manning a Block 5 Virginia-class SSN with its 42 vertical launch cells requires a crew of approximately 140 officers and sailors, as compared to the 99 officers and sailors of a Sturgeon-class SSN.
So why are the current class American SSNs so large?
The answer includes land attack – the new mission assigned to SSNs by the Navy in the aftermath of the end of the Cold War, with the virtually overnight disappearance of its main naval adversary, the Soviet Navy. By the early to mid 1990s the U.S. Navy was busy retiring aged-out Cold War boats by the dozens and was still building as replacements the last Los Angeles-class SSNs. These boats were larger than their predecessors, primarily to make them faster and capable of keeping up as escorts with CVN carrier battle groups and later on, carrier strike groups. Such high cruising speeds were not a requirement for anti-shipping warfare (both ASW and anti-surface ship) and ISR – the two primary missions of Cold War era SSNs.
Later on, the more advanced Virginia SSNs – as a smaller, cheaper, and slightly reduced capability version of the small class of Seawolf SSNs – came along by the mid-2000s, adding length, tonnage, and vertical launch tubes capable of putting up as many as 12 Tomahawk missiles (a similar vertical launch tube arrangement by then had also been added to some of the last Los Angeles-class boats). However, those post-Cold War Tomahawks on SSNs were not, like their Cold War predecessors, equipped to engage moving naval targets as long range anti-ship missiles, but instead were Tomahawk Land Attack Missiles (TLAM), capable only of engaging fixed land targets. The Navy was also busy deploying large numbers of TLAMs on large surface combatants, both Ticonderoga-class cruisers and Arleigh Burke-class destroyers, for the same deep strike land attack mission the Navy had taken on in the 1990s and beyond.
The latest Block 5 Virginias add a new “Virginia Payload Module” that adds yet another 84-foot section to the hull aft of the sail containing four more vertical launchers carrying as many as 28 additional TLAMs for land attack. The stated purpose of the VPM was to attempt to make up for the planned retirement of four SSGNs (converted Ohio-class SSBNs that were “denuclearized” per the START strategic nuclear arms reduction treaty). But of course that conversion of SSBN to SSGN was a “make work” solution for the resulting excess Ohio SSBNs above treaty limits, which has now begat a “make work” mission for SSNs. All of which bloats the boat itself and makes it much more expensive to build and operate.
Adopting the deep strike land attack mission was an understandable response to the drastic and virtually overnight elimination of a significant near peer naval threat in the 1990s. Thus the Navy and its supporters in Congress converted the navy virtually overnight to a deep strike land attack force in order to become more relevant to evolving national security interests, but at the expense of full-spectrum competence. Otherwise, naval leaders and proponents feared an even more drastic fleet reduction than the 50 percent cut that was actually made after the end of the Cold War.
This “keep the Navy relevant in the Post Cold War era” mindset was also aided and abetted by the Intermediate Range Nuclear Forces (INF) Treaty of 1987 limits on “land based” intermediate range cruise missiles (IRCM) that strangely did not apply to “surface launched” (i.e., naval platforms). (Both the U.S. and Russia have now withdrawn from this treaty, effective later this year.) In any event, INF encouraged both the Russian and U.S. navies to deploy large numbers of land attack cruise missiles on surface warships.
Clearly a lot has changed since the Post Cold War-era began. The U.S. military today is no longer simply tasked with combating low-capability insurgent forces in various and sundry developing nations often situated well inland, nor does the INF treaty apply as of this year either.
With the well-documented fast growing maritime threat posed especially by China (whose fleet of attack submarines is currently estimated to number over 70 vessels, and is expected to continue to grow at a rapid rate thereafter), as well as a resurgent Russian Navy, the world of naval warfare has now transformed from a low threat environment into a serious challenge to U.S. naval dominance. The U.S. Navy now has a clear and overriding mission – to deter and if necessary fight and win a naval war against capable near peer forces. Projecting sea power ashore continues as a U.S. Navy mission, but that mission is best and most cost-effectively performed by naval aircraft (both carrier-based and land-based), not by submarines. Given all of the above factors, then, and the fact that naval shipbuilding budgets are constrained, including demands to simultaneously recapitalize aging CVNs and Ohio-class SSBNs, the Navy must go back to the drawing boards.
Chairman of the Joint Chiefs of Staff Adm. Mike Mullen visits the Chinese People’s Liberation Army-Navy submarine Yuan at the Zhoushan Naval Base in China on July 13, 2011. (DoD photo by Mass Communication Specialist 1st Class Chad J. McNeeley/Released)
The Navy should consider designing a new SSN that is smaller and cheaper, and focused entirely on the anti-shipping and ISR roles – the historic roles of the SSN throughout the Cold War – with particular attention paid to building and operating many more new boats at a far faster build rate.
Size as measured in tons displacement, however, is not the only requirement and means of controlling cost – there is also the matter of modernization and capability. Obviously the technologies available today are far more advanced compared to those available in the 1960s and 1970s when the bulk of our Cold War era SSN fleet was built. For example, the later generations of U.S. submarines incorporated new propulsors – pump jets, rather than the older and noisier seven-bladed open screws on the Cold War era boats. Better sensors are also going into today’s boats, both sonars and “above the water” sensors, with photonic masts rather than periscopes, which allows more efficient interior hull design and better distribution of sensor data to various locations within the crew area. Better electronic warfare capabilities are also part of today’s fleet, and cyber warfare is increasingly a key area of focus in the 21st century.
Better weapons are also available today, although advancements in deployed submarine-launched weaponry have clearly lagged behind both our adversaries and even of USN surface forces and naval air wings in recent years. Existing SSNs are still using the old Mk 48 ADCAP 21-inch torpedo first deployed in the mid-1970s, though significantly upgraded over the decades. But as of today the only submarine-launched anti-ship cruise missile available is still the old Harpoon Block 1C that was developed in the 1970s, and as of today only one of our existing SSNs has even re-integrated the Harpoon, as of last year. A new “Maritime Strike Tomahawk” refit kit is slated to become available in 2021 which will provide a new very long range ASCM capability to both submarines and surface warships with VLS. Perhaps other existing ASCMs such as the new Naval Strike Missile, now slated for deployment on LCS and FFGX, can and may also be integrated onto U.S. submarines, along with LRASM in the coming years.
Additionally, it should also be recognized that for purposes of anti-submarine warfare which was the primary role of the Cold War SSN, and which is now becoming a priority again, the Mk48 ADCAP torpedo is likely “overkill” for use against submerged submarines. The power of a 650 pound warhead on the Mk 48 certainly is helpful for attacking large surface ships, with the ability to literally break a ship in half when detonated under the keel. Submerged submarines, however, do not require such explosive power because of the effect of submergence sea pressure.
The lightweight ASW torpedoes such as the Mk 46 and Mk 54 (12.75 inches diameter by 8 feet 6 inches long, and weighing just 508 pounds vs. 21 inches, 19 feet, and 3,695 pounds respectively for a Mk 48) have for decades been in use by the US Navy and our NATO allies deployed on surface warships and ASW aircraft. The lightweight torpedoes have warheads with weights of slightly less than 100 pounds – demonstrably sufficient to sink a submerged submarine. Indeed, one of the most effective ASW weapons in WWII, the “hedgehog,” had a much smaller warhead of just 35 pounds of TORPEX. It was demonstrated that typically only one or two hedgehog detonations were needed to sink a submerged submarine.
An exercise Mark 54 Mod 0 torpedo is launched from the U.S. Navy Arleigh Burke-class guided-missile destroyer USS Roosevelt (DDG-80). (U.S. Navy Photo by Mass Communication Specialist 2nd Class Justin Wolpert)
Therefore, the Navy needs to give strong consideration to adapting existing lightweight ASW torpedoes to our next generation of SSNs. Doing so would facilitate the ASW capability of our SSNs while significantly increasing the sub’s capacity to store and deploy much smaller torpedoes. Not as a total replacement for the Mk 48, but rather, as a supplement to the Mk 48 to enable much larger total magazine depth without increasing the displacement of the submarine, to accommodate the ability to attack both surface ships and submarines. Instead of just four 21-inch torpedo tubes on a Virginia-class boat, a combination of 21 inch and 13 inch horizontal tubes optimized for a typical mission profile could work very well.
Finally, whatever combination of horizontal tubes and torpedoes is determined optimal, the weapons themselves need to continue to be updated to the latest technological capabilities as to sensors, self-contained computing (and artificial intelligence) as necessary to track and target submarines and defeat enemy countermeasures, and improved warheads. Hard kill anti-torpedo torpedoes as well as other torpedo countermeasures are also a prime area of development that needs to continue, despite a recent setback with the CAT weapon systems deployed on CVNs.
Nuclear propulsion technology is also advanced today over the old Cold War power plants. The latest generation of naval nuclear reactors as used on the new Ford class CVNs known as the A1B reactor are much more automated and simplified than the previous plants, allowing the highly trained and certified nuclear plant operator crew size to be cut in half as compared to the 1960s era reactors of the Nimitz class CVNs.4 Even more revolutionary nuclear power plant designs are going to be available to submarine designers in the next decade.
Similar technological opportunities abound to more heavily automate every work process throughout the next generation submarines, including artificial intelligence capabilities, and thus can significantly reduce overall crew manning requirements in a submarine. This has already been achieved on the latest surface combatants including the Ford CVNs and the Zumwalt DDGs, which respectively achieved overall manning reductions of 33 percent and 50 percent over their predecessor classes. A similar reduction in SSN crew size also ought to be achievable using the same design approaches and modern automation technology. Reductions in crew size also lead to reductions in hull volume.
Additional technology “insertions” are also available in other areas of submarine design that should be able to create significant impacts in both cost reduction as well as improving the capabilities of our next gen SSNs.
Conclusion
In consequence of all of the considerations described above, it is clear that NAVSEA needs to undertake a project to re-engineer the next generation of SSNs. Navy leadership has publicly stated its intent to reconfigure the surface fleet to significantly reduce the ratio of large surface combatants (LSCs) to small surface combatants (SSCs). The Navy now needs to similarly reconfigure the SSN fleet in favor of smaller boats optimized for sea control over long-range land attack. They must reject the bloated SSN(X) concept which is more of the same, but bigger and more expensive, and go for a new class of SSN that is far smaller and cheaper and thus affordable in much larger numbers than currently planned submarines.
Mr. Truitt is a veteran Cold War-era SSN sailor, qualified nuclear reactor operator, and civilian nuclear test engineer. He is also a degreed civil engineer, environmental scientist, and civil/environmental project manager with extensive experience at both naval and civilian nuclear facilities as well as military and civilian facilities development. His interest today as an author is in forward-looking military preparedness and improvements in both capacity and capability of U.S. naval forces.
Notes
1. USNI News, Ben Werner, March 27, 2019: “Indo-PACOM Commander Says Only Half of Sub Requests are Met”
2. USNI News, Megan Eckstein, April 8, 2019: “Navy Sees No Easy Answer to Balance Future Surface Fleet”.
3. USNI News, Megan Eckstein, May 13, 2019: “Virginia Block VI Subs Will Focus on Special Operations, Unmanned”
Featured Image: YOKOSUKA, Japan (Sept. 3, 2010) The Virginia-class attack submarine USS Hawaii (SSN 776) transits Tokyo Bay on the way to Fleet Activities Yokosuka, marking the first time in the history of the U.S. 7th Fleet that a Virginia-class submarine visited the region. This is Hawaii’s first scheduled deployment to the western Pacific Ocean. (U.S. Navy photo by Lt. Lara Bollinger/Released)
A recent independent reviewof the Navy’s cybersecurity posture, completed in March 2019, was predictably harsh on our Navy’s current culture, people, structure, processes, and resourcing to address cybersecurity.1 For many of us within the Information Warfare discipline, much of this report does not come as a shock, but it does lay bare our cultural, structural, and procedural problems that the Navy has been struggling with since the turn of the century.
The 76th Secretary of the Navy, Richard V. Spencer, should be applauded for enabling open and honest dialogue on the key issues of this report by releasing it for public comment and professional discourse. The review found that the Navy was not “optimally focused, organized, [nor] resourced” for cyberwar.2 Such transparency has been the hallmark of the naval service for centuries, and is largely the reason why such robust professional forums such as the United States Naval Institute (USNI) and the Center for International Maritime Security (CIMSEC) continue to thrive.
The report was particularly critical of the Navy’s culture, stating that the Navy is “preparing to win some future kinetic battle, while it is losing the current global, counter-force, counter-value, cyberwar.”3 The report goes on to recommend that the highest levels of Navy leadership adjust the service’s cultural landscape to become more information-centric, rather than platform-centric. This excerpt is particularly vexing:
“Navies must become information enterprises who happen to operate on, over, under, and from the sea; a vast difference from a 355 ship mindset.”4
In truth, the Navy that acts as an information enterprise and the Navy that pursues the tenants of traditional naval warfare as laid out by naval doctrine are not mutually exclusive. Our drive toward a bigger, better, and more ready Navy, aligned to the National Defense Strategy, requires a naval culture ready for high-end conflict but active and engaged in all levels of conflict below lethal combat. The adoption of information enterprise core principles certainly has a place in our doctrine; in fact, it’s already there but lacks proper execution and widespread cultural adoption as a core competency across all warfare communities. Navy culture can be adapted to better fit the information age, but it will take the entire Navy to do it and not just a single community of effort.
Information is Already in our Doctrine, but Prioritization Must Improve
The 31st Chief of Naval Operations (CNO), Admiral John Richardson, released a Design for Maintaining Maritime Superiority shortly after assuming his role, and recently released an update (Design 2.0) to compliment the 2018 National Defense Strategy. The CNO put information warfare at the center of his strategic thinking, and challenged the Navy’s operational and resourcing arms to “adapt to this reality and respond with urgency.”5 But this change in the security environment wasn’t new to this CNO, in fact, it was foreseen decades ago by thinkers like CAPT (ret.) Wayne P. Hughes, a venerated naval tactician and professor emeritus at the Graduate School of Operations and Information Sciences of the Naval Postgraduate School. Early versions of Hughes’ Fleet Tactics and Coastal Combat, required reading in graduate-level naval officer training, placed information, rapid adoption of technology, and intelligence at the forefront of effective maritime operations in the modern age.6
If we’ve valued information in warfighting all along, then why are we failing to adapt our naval culture to the Information Age? The Cybersecurity Readiness Review cuts straight to the point: “… cybersecurity continues to be seen largely as an ‘IT issue’ or ‘someone else’s problem.’”7 In our haste to stand up a community of practice to do all the cyber things we, as a Navy, failed to make the necessary cultural changes that should have accompanied it.
Why hasn’t the growth of the Information Warfare Community focused the Navy’s culture appropriately? After all, creating such specialized warfare communities has always worked well in the past, as any aviator can attest to. Truthfully, the problem is bigger than just one community; the subsequent decades saw the rise of global information technology as central to nearly everything we do, and every Sailor now uses the network as a primary on-the-job resource. The loss of email, web browsing, and support systems that handle tasks from personnel to logistics can and does result in work stoppage; any assertions to the contrary, that workarounds or manual methods still exist, do not accept the reality of the situation.
Cultural change is long overdue, and just like a Marine or Soldier learns how to handle their weapon safely and effectively from day one, we must now train and mentor our Sailors to use the network in the same vein. No more can we flippantly say “we have people for that” when faced with information management and cybersecurity problems, putting effort into modernizing complex systems and enhancing Information Warfare’s lethality, while ignoring the power a single negligent user could wield to bring it all down. It’s all hands on deck now, or the Navy faces the very real possibility of fumbling the opening stages of the next kinetic fight.
Security is Already an Inherent Part of Navy Culture
The good news is that information security is already an intrinsic part of being a member of the armed forces, uniformed or civil service. Security clearances, safe handling procedures for classified information, and cryptography practices like two-person integrity have been trained into the workforce for decades. Protecting information is as much a part of our culture as operating weapons systems or driving warships.
The Navy’s training machine should find ways to leverage this existing culture of compliance to incorporate dynamic and repetitive ways to reach all Sailors at all stages of development – from boot camp to C school, from initial officer training to graduate school, focused on making each Sailor a harder target for information exploitation. Each engagement should be tailored to fit the environment and to complement subject matter: initial user training should teach how to report spear-phishing, practice OPSEC on social media (and how to spot adversarial attempts to collect against them), and recognizing unusual activity on a network workstation. A more senior Sailor in C-school might learn how to look at cybersecurity from a supervisory perspective, managing a work center and a group of network assets, and how to spot and report insider threats both malicious and negligent. An officer in a naval graduate program, such as at NPS or the Naval War College, would take advanced threat briefings on adversarial activity targeting rank-and-file users on the network, and how to incorporate such threat information into wargaming to inform the strategic and operational levels of war.
Some of these actions are already in the works, but the emphasis should be on how to engage Sailors in multi-faceted, multi-media ways, and repetition is critical. Seeing the same concept in different ways, in different case studies, reinforces better behavior. The Navy is no stranger to this training method: we are masters at repetitive drills to train crews to accomplish complex actions in combat. Reinforcement of this behavior cannot come fast enough. Incidents attributed to negligent network users are on the rise, and cost organizations millions of dollars a year.8 The Navy is no exception: category-4 incidents (improper usage) are too common.
Ultimately, the objective should be a Sailor who understands cyber hygiene and proper use of the network as a primary on-the-job tool, just as well as any Soldier or Marine knows his or her rifle. Sailors go to sea aboard complex warships with integrated networked systems that run everything from Hull, Mechanical, and Electrical (HM&E) systems to combat systems and weapons employment. The computer is our rifle, why shouldn’t we learn how to use it more safely and effectively?
Keys to Success
Cultural change is hard, but lessons learned from our past, best practices from the private sector, and good old fashioned invasive leadership (the kind the Navy does very well) can adjust the ship’s rudder and speed before we find ourselves much further in shoal water.
Top level leadership must set the conditions for success, but they have to believe in it themselves. Our Sailors can easily tell when a leader doesn’t fully commit to action, paying lip service but nothing beyond it. They are also hungry to follow a leader who has a passion for what they do. To effect change, passionate leaders need to take center stage with the authority and resources necessary to translate change into action at the deckplate level. When a Sailor sees a top-level message about a desired change, then sees that change actually happening in their workspace, it becomes real for them. Let’s also trust them to understand the threats, rather than keeping the “scary” threat briefs at the senior levels.
Successes must be celebrated, but failures must have real consequences. It’s time to get serious about stopping insider threats, specifically negligent insiders. Too often the conversation about insider threats goes to the criminal and malicious insiders, ignoring the most common root of user-based attack vectors. Our Sailors must be better informed through regular threat briefings, training on how to spot abnormal activity on the network, and clear, standardized reporting procedures when faced with phishing and other types of user-targeted attacks. Those who report suspicious activity resulting in corrective action should be rewarded. Likewise, those who blatantly ignore established cyber hygiene practices and procedures must face real consequences on a scale similar to cryptographic incidents or unattended secure spaces. This will be painful, but necessary to set our user culture right.
Effective training begets cultural change. We must take advantage of new and innovative training methods to enrich our schoolhouses with multimedia experiences that will reshape the force and resonate with our new generation of Sailors. The annual Cybersecurity Challenge should be retired, its effectiveness has been questionable at best, and replaced with the same level of rigor that we used to attack no-fail topics like sexual assault prevention. With the stand-up of a Director of Warfighting Development (N7), and the lines of effort within the CNO’s Design 2.0 rife with high-velocity learning concepts, the near-future landscape to make this sea change looks promising.9
Conclusion
The Navy has spent the better part of 30 years struggling to adopt an information-centric mindset, and the good news is that operational forces have come a long way in embracing the importance of information in warfare, and how it permeates all other warfare areas. Yet our culture still has a long way to go to break the now dangerously misguided notion that information management and cybersecurity are something that “we have people for” and doesn’t concern every non-IW Sailor. The IW Community has come a long way and can do a lot to further the Navy’s lethality in space, cyberspace, and the electromagnetic spectrum, but it can’t fix an entire Navy’s cultural resistance to change without strong assistance.
Secretary Spencer, in his letter introducing the public release of the 2019 Cybersecurity Readiness Review, noted that “the report highlights the value of data and the need to modify our business and data hygiene processes in order to protect data as a resource.”10 He highlighted that cross-functional groups were already underway to address the findings in the report, and surely the machinations of the Navy Headquarters are more than capable of making the necessary changes to the Navy’s “policy, processes, and resources needed to enhance cyber defense and increase resiliency.”11 But culture, that’s all of us, and we must be biased toward change and improvement. We are the generation of naval professionals who must adapt to this reality and respond with urgency.
Lieutenant Commander Howard is an Information Warfare Officer, information professional, assigned to the staff of the Chief of Naval Operations in Washington DC. A prior enlisted IT and Surface Warfare Officer, his last operational assignment was as the Combat Systems Information Officer aboard USS ESSEX (LHD 2) in San Diego, CA.
References
[1] The Hon. Michael J. Bayer, Mr. John M. B. O’Connor, Mr. Ronald S. Moultrie, Mr. William H. Swanson. Secretary of the Navy Cybersecurity Readiness Review (CSRR), March 2019. https://www.navy.mil/strategic/CyberSecurityReview.pdf
[2] Ibid
[3] Ibid
[4] Ibid
[5] Chief of Naval Operations, December 2018. Design for Maintaining Maritime Superiority, Version 2.0. https://www.navy.mil/navydata/people/cno/Richardson/Resource/Design_2.0.pdf. p. 3
[6] Wayne P. Hughes, 2000. Fleet Tactics and Coastal Combat. Annapolis, MD: Naval Institute Press.
[7] Bayer, et al., CSRR 2019, p. 12
[8] Security Magazine, Apr 24, 2019. “What’s the Average Cost of an Insider Threat?” https://www.businesswire.com/news/home/20180424005342/en/Research-Ponemon-Institute-ObserveITReveals-Insider-Threat
[9] CNO, Design 2.0, p. 13
[10] Secretary of the Navy, 12 Mar 2019. Letter accompanying public release of the CSRR 2019. https://www.navy.mil/strategic/SECNAVCybersecurityLetter.pdf.
[11] Ibid.
Featured Image: U.S. 7TH FLEET AREA OF OPERATIONS (Oct. 16, 2015) Operations Specialist 1st Class Keith Tatum, from Americus, Georgia, stands watch in the Combat Information Center (CIC) aboard the guided-missile cruiser USS Normandy (CG 60) during an air-defense exercise as a part of the joint exercise Malabar 2015. Malabar is a continuing series of complex, high-end warfighting exercises conducted to advance multi-national maritime relationships and mutual security. Normandy is deployed to the U.S. 7th Fleet area of operations as part of a worldwide deployment. (U.S. Navy photo by Mass Communication Specialist 3rd Class Justin R. DiNiro/Released)
“Maritime security.” The phrase, and the nebulous set of missions that loosely fall underneath it, came into expanded use in the decades after September 11, including in U.S. strategic documents. Even during the height of interest in maritime security, however—say, around 2007 and the publication of A Cooperative Strategy for 21st Century Seapower—it was not clear how those missions could or should be prioritized with respect to other strategic challenges. As the Department of Defense, and the Navy with it, reorients to great power competition, it will only become easier for those questions to slide into the background. And yet, as we will see below, historical trends and emerging patterns will conspire to keep the littorals at the forefront of policymaker’s minds. Alongside the renewed focus on traditional adversaries, therefore, operations in green and brown waters driven by unconventional threats will likely play an enduring role in U.S. foreign policy.
In his book Out of the Mountains, counterinsurgency strategist David Kilcullen sets out a compelling argument for taking the littorals seriously. Kilcullen’s argument is focused on events ashore, but his articulation of the global drivers shaping the littorals can be made equally valuable for the seaward end of the domain. The premise underlying these drivers is based on one simple principle: conflict happens where people are.1 So, where are the people?
In response, Kilcullen identifies four “megatrends” of demography and economic geography that suggest where we will find most of the world’s population in the coming decades. “Rapid population growth, accelerating urbanization, littoralization (the tendency for things to cluster on the coastlines), and increasing connectedness” all suggest that populations are concentrating in networked, urban, dense, littoral communities.2 UN estimates project that by 2050 at least two-thirds of the global population (which is projected to reach 9.8 billion) will likely live in cities, a great many of whom will end up in slums (where about a billion people already call home). Moreover, much of this urban expansion—most of which will be coastal—will take place across the global South, often where governments are least prepared to receive it. The populations of the Caribbean and Latin America could grow by more than 130 million people; Africa may see its population expand by more than a billion; and Asia will see a growth of at least 800 million according to mean estimates from the United Nations.
To give an indication of scale, consider the following. In one generation, the world’s poorest cities will absorb most of a population increase equal to all the population growth ever recorded in human history through the year 1960.3 That is sure to produce astounding institutional strains, ones that will inevitably stress already fragile municipal governments. And we need not wait for 2050 to see these statistics in action. Today, half of the world’s population lives within about thirty miles of a coast, and three-quarters of large cities are on the water. To those and other cities, nearly 1.5 million people migrate to every week, which explains why urban areas are soon expected to absorb almost all new population growth.4
But how is demography dangerous? The answer comes from how urban communities respond to the pressures of these trends. Research suggests that when a city doubles in size, it produces, on average, “fifteen percent higher wages, fifteen percent more fancy restaurants, but also fifteen percent more [HIV/AIDS] cases, and fifteen percent more violent crime. Everything scales up by fifteen percent when you double the size.”5 In cities already straining their respective systems, cities like Lagos or Mumbai or San Pedro Sula, the consequences of a 15 percent spike in crime or HIV/AIDS rates act on preexisting stressors like poverty, climate change, and political violence, which can precipitate disorder. In the most extreme cases, the impact of these magnified stressors might even cause a metropolis to turn “feral.” In the Naval War College Review, Richard Norton defines a feral city as “a metropolis with a population of more than a million people in a state the government of which has lost the ability to maintain the rule of law within the city’s boundaries yet remains a functioning actor in the greater international system.”6 John Sullivan and Adam Elkus describe the feral city as a place without any meaningful presence of legitimate authority, where “the architecture consists entirely of slums, and power is a complex process negotiated through violence by differing factions.”7 Norton noted at the time that only Mogadishu truly exemplified his criteria of a feral city. Yet, several cities then contained feral pockets characteristic of Norton’s theory. In such pockets, segments of an urban sprawl may exist outside the reach of the government. A Proceedings article by Matthew Frick as well as a New York Times piece both cite São Paulo, Mexico City, and Johannesburg (the Times also adds Karachi) as examples of modern cities with components that could be described as feral.8 Frick even explicitly links these feral cities to maritime security by arguing that they are echoes of the pirate havens of the 18th century, when raiders similarly leverage ungoverned spaces as bases of operation. In feral cities or pockets, the legitimate governing fabric of the urban area erodes as the stress of an oversized population pushes it past the ability to cope with the pressures of crime, poverty, and health. Such violence perpetuates the cycle of urban exclusion that created it, precipitating yet more political, social, economic, and infrastructure neglect.9
The collapse or erosion of local governance creates a power and services vacuum. That power vacuum creates disorder from which people naturally crave a reprieve. In turn, the local actor that can produce a sense of order and stability is frequently adopted as a surrogate government. Inevitably, these surrogates are not peaceful neighborhood watch groups. Kilcullen’s concept of “competitive control” posits that the surrogates most likely to survive in these environments are those that can act across a spectrum of power ranging from soft to coercive.10 Without soft power, the allure of an institutionalized set of normative community rules, the population is denied the sense of order it demands. Under such a rules-based system, a neighborhood is likely to tolerate a measure of violence because it can be predicted and avoided. Without violence, a competitor will find it easy to supplant the surrogate. What we are left with is a void filled by organized gangs, terrorists, militias, or criminal networks that manipulate a feral city’s disorder to establish fortifications within neighborhoods that often come to depend on them. In Kingston, Jamaica, garrison neighborhoods offer one such example where these districts are made loyal to gang leaders because of their dominant role in the local informal justice system and economy.11 We are left facing an amorphous hybrid threat, what John Sullivan calls “criminal insurgents,” or the melding of criminal syndicates with the direct political control of territory.12 When such groups offer residents enough of a sense of fair and predictable order, many are willing to tolerate their presence.
So far, however, violent nonstate groups and feral cities would appear a danger largely within their own neighborhoods, far from concerning the United States, and certainly not U.S. maritime services. What brings these groups and populations into the international maritime orbit is Kilcullen’s final megatrend—connectedness. Crowded, poor, coastal zones may turn feral, but feral regions do not implode. Instead, they remain connected with the world around them through the Internet, ports, airports, diaspora communities, and other connective tissues. Thus, with all the implications of such connectedness, even a feral region remains a dynamic, strategic, and significant actor in the international arena. This connectedness allows the feral elements of a community to interact with licit and illicit trade and information flows, offering local actors the capacity to directly impact events across the country and, potentially, the globe.13 The same pathways that facilitate normal trade and migration likewise enable illicit transfers such as the smuggling of narcotics, people, and weapons; human trafficking; terrorism; and piracy. This connectedness is what gives rise to the potential for actions a world away, events like protests or acts of political violence, to have a rapid and meaningful consequence across domains, from cyberspace to the sea. September 11 was a dramatic example of the extreme consequences of this networked, globalized connectivity of local violence to the international system. What we have increasingly seen in the intervening two decades, thanks in part to the explosive growth in technologies that connect all of us, is that this ladder between local and international is only strengthening. As a result, in the sphere of nonstate threats, “the distinction between war and crime, between domestic and international affairs” almost disappears.14
As the line blurs between war and crime, the capacity for the return to great power competition to focus minds on a singular, important challenge may simultaneously make it more attractive for strategists to circumvent planning for these opaque, nontraditional challenges. History, however, suggests that would be a mistake. What is remarkable about the pattern of unconventional conflict is its irreverence for the preferences of policymakers.15 Lyndon Johnson was eventually subsumed by a troop escalation in Vietnam despite his clear domestic policy agenda. Bill Clinton, after reluctance to act in the Balkans and Rwanda, ultimately sent troops to Bosnia, Kosovo, Macedonia, Haiti, and Liberia. While candidate George W. Bush dismissed interest in stability operations, President Bush launched two prolonged, large-scale counterinsurgency campaigns and led NATO into its largest stabilization mission ever.16 As President Obama initiated his pivot to Asia, he was still negotiating the drawdown of two land wars while conflicts simmered (and flared), inter alia, in Syria, Yemen, Somalia, Iraq, Mali, Nigeria, and the Congo. Now President Trump, despite obvious isolationist impulses, has struggled to extricate U.S. forces from Afghanistan and Syria in practice. “American policy makers clearly don’t like irregular operations, and the U.S. military isn’t much interested in them, either,” but as the demographic and economic geographic trends discussed above suggest, they will likely continue to present policymakers with difficult choices.17
Any attempt to predict the exact nature of a future threat or conflict is a fool’s errand. To borrow a metaphor from Kilcullen, much like how climate modeling cannot say whether it will rain or snow next week, the projections above say little about the near-term conflict forecast. Yet, just as with climate models, such forecasts “do suggest a range of conditions—a set of system parameters, or a ‘conflict climate’—within which [future] wars will arise.”18
These projections illustrate trends. And while those trends do not say much about what happens tomorrow or the day after, they speak volumes about the forces steadily reshaping our world. These forecasts are unequivocally telling us that dense, networked, and littoral communities are an emerging global force. How maritime forces meet (or fail to meet) the challenges associated with that rise will be dictated by their attentiveness to the unique constraints of securing muddy waters.
[1] David Kilcullen, Out of the Mountains: The Coming Age of the Urban Guerrilla (London: Hurst, 2013), 239.
[2] Ibid., 25.
[3] Ibid., 29.
[4] Ibid., 29.
[5] Ibid., 247.
[6] Richard Norton, “Feral Cities,” Naval War College Review 56, no. 4 (2003): 98.
[7] John Sullivan and Adam Elkus, “Postcard from Mumbai: Modern Urban Siege,” Small Wars Journal, February 16, 2009, 8.
[9] Kilcullen, Out of the Mountains, 40.
[10] Ibid., 114.
[11] Ibid., 89, 93.
[12] Sullivan and Elkus, “Postcard from Mumbai.”
[13] Kilcullen, 45.
[14] Ibid., 99.
[15] Ibid., 24.
[16] Ibid., 24.
[17] Ibid., 24.
[18] Ibid., 27.
Featured Image: A Republic of Singapore Navy Littoral Mission Vessel (background, far left), and the Police Coast Guard’s patrol interdiction boat (at right) intercepting a mock terrorists’ speedboat in Singapore waters off Changi Coast Road during a demonstration for Exercise Highcrest. (PHOTO: LIANHE ZAOBAO)