All posts by Guest Author

Sea Control 143 – Cyber Threats to Navies with Dr. Alison Russell

By Matthew Merighi 

Join us for the latest episode of Sea Control for a conversation with Dr. Alison Russell of Merrimack College about navies and their relationship with cyber. It’s about the distinct layers of cybersecurity, how navies use them to enhance their capabilities, and the challenges in securing and maintaining that domain.

Download Sea Control 143 – Cyber Threats to Navies with Alison Russell 

This interview was conducted by the Institute for Security Policy at Kiel University. A transcript of the interview between Alison Russell (AR) and Roger Hilton (RH) is below. The transcript has been edited for clarity. Special thanks to Associate Producer Cris Lee for producing this episode.

RH: Hello and Moin Moin, Center for International Maritime Security listeners. I am Roger Hilton, a nonresident academic fellow at the Institute for Security Policy at Kiel University, welcoming you back for another edition of the Sea Control series podcast. Did any listeners read the news on twitter, message your friend on Facebook, or even do some mobile banking? Are you streaming this podcast for your enjoyment? If you did any of the above, like myself, you are dependent on the internet. So logically, based on this fact, it should come as no surprise that contemporary navies are as well. Naval technological capabilities and strategies have exponentially evolved from the nascent beginnings. Steam ships have been replaced by nuclear powered carriers while cannons have been substituted for intercontinental ballistic missiles. No doubt the power of modern navies is awesome, and as a result, their dependency and reliance on the cyber realm must not be overlooked.

Consequently, does this interconnectedness between hardware and software in fact leave 21st century navies more exposed to attacks from invisible torpedoes than actual physical ones? Here to help us navigate the minefield of the cyber threats facing both naval strategy and security is Dr. Allison Russell, she’s a professor of political science and international relations at Merrimack College in Massachusetts and a nonresident researcher at the Center for Naval Analyses. In addition, she’s the author of two books, Cyber Blockade and more recently, Strategic A2AD in Cyberspace. Dr. Russell, thanks for coming aboard today.

AR: It is great to be speaking with you Roger. Thank you for having me in your program today.

RH: Well, let’s get right into it. There’s no doubt that cyberspace and threats associated with it are hot topics today. While much of the news coverage on cyber threats is focused on hackers spreading disinformation, or even potentially gaining access to critical infrastructure, can you provide an initial overview of the role cyber plays in the contemporary maritime environment and as well as some of the menaces targeting the Navy?

AR: I would be glad to. As you pointed out, much of the attention on cyber threats focuses on hackers, data thefts, cyber espionage, and information or influence campaigns. And those are important. But these really are not the biggest threats in the maritime environment. The threats naval forces face in a maritime environment vary depending upon the part of cyberspace we’re talking about.

See, there are four levels in cyberspace: the physical, the logic, the information, and the user layers. The physical layer is the physical infrastructure, the hardware that underpins the global grid that is the basis of cyberspace. Although we tend to think of the internet and cyberspace as wireless or in the cloud, it is very much reliant upon physical infrastructure at its most basic level. Fiber optic cables including undersea cables, and satellites comprise some of the more prominent features of the physical layers of cyberspace.

The second layer is the logic layer. This is the central nervous system of cyberspace. This is where the decision-making and routing occurs to send and receive messages to retrieve files, really to do anything in cyberspace. The request must be processed through the logic layer. The key element of the logic layer are things such as DNS, the Domain Name Servers, and internet protocols.

The third level is the information level. This is what we see when we go on the internet: Websites, chats, emails, photos, documents, apps. All of that is the information posted at this level. But it is reliant on the previous two levels in order to function.

Lastly, the fourth level is the user level: the humans who are using the devices and are interacting with cyberspace. They matter because cyberspace is a man-made entity and its topography can be changed by people. Cyberspace is critical to modern naval strategy and security because it underpins the essential communications networks and capabilities of naval forces. And adversaries will seek to destroy or degrade those capabilities in the event of a conflict. Cyberspace enables robust command and control, battlespace awareness, intelligence gathering, and precision targeting, which are at the core of mission success. These days navies must defend and maintain their freedom to operate within cyberspace in order to be effective forces at sea.

RH: Thanks for the brief outline. As I mentioned earlier the identity of the navy has changed greatly since its original inception into conflict theaters. Accordingly, the advent of cyberspace has added an entirely different dynamic to the field. And you mention some of them as well. Consequently, what are some of the new responsibilities that have arrived with the integration of cyber to navies? And in general, what is the role the navy plays within a larger national security architecture?

AR: The cyber capabilities are really integrated at all levels at the naval mission. So, the core capabilities navies seek to provide are the blue-water capabilities of forward presence, deterrence, control, sea control, and power projection, as well as maritime security and humanitarian assistance or disaster response. All of these core capabilities are supported and enhanced by cyber capabilities. Thus, the full spectrum of naval operations and the corresponding naval strategy involve cyber capabilities today.

For more technologically advanced navies, these cyber capabilities are so integrated into weapon systems and platforms, that they’ve become essential to full spectrum warfighting operations. For the less technologically advanced navies, cyber capabilities can still play an important role in augmenting other capabilities by providing command and control and acting as a force multiplier in certain situations. In addition to their blue water role, naval forces are responsible for providing cyber capabilities to support combatant commanders’ objectives in defense of national information networks and for fleet deployment. They are force providers to joint and interagency operations. They are supporters of the national mission and blue-water warriors all at the same time. As a result, they must have a holistic, full spectrum understanding of the role cyberspace plays from tactics to operations to grand strategy.

RH: That was a great encompassing of it. As you can see it comes full circle when you compare conflict theatres to human assistance missions which is great you mentioned. At the same time Dr. Russell, you cite out naval strategies are in a period of transition at the moment. Could you elaborate on these implications with regard to how cyberspace is impacting the current formation of national naval strategies?

AR: Yes, naval strategies are in a period of transition with regards to cyberspace. Most navies acknowledge the importance of cyberspace as a critical enabler, but there’s emerging recognition that cyberspace is also much more than that. Ultimately, cyberspace is a game changer for naval forces and security forces in general. All phases of conflict now have a cyber dimension. From phase zero planning to phase five stabilization and reconstruction, cyberspace affects all levels of war, from strategic to the operational to the tactical. All types of conflict are affected by cyberspace including conflicts in the other four domains. For naval forces in particular, cyberspace enables new kinds of fires: Cyber-fires. It improves situational awareness and enhances command and control.

It has also opened the door to new threats. Anti-access and area denial operations, improved targeting capabilities by adversaries, and presenting more targets for attack in the form of cyber-attacks. As naval forces adopt next technologies to leverage the unique capabilities of cyberspace, reliable access to cyberspace is a necessity. Assuring access to cyberspace and confident C2 for deployed forces regardless of the threat environment is a top priority for the U.S. Navy as well as for many others.

RH: There’s no doubt based on your texts and some of the other content out there that reliable access seems to be driving naval strategy and security, especially among the technically advanced navies. So thank you for mentioning that to the listeners.

We spoke about technologically advanced navies and less technologically advanced navies. To demonstrate some of the diversity in strategy, can you provide a quick comparison about how some of the national strategies have integrated cyberspace in their doctrine?

AR: Yes, I think a comparison of the U.S. and Russia helps to illustrates this.

RH: You couldn’t have picked two better countries to compare at the moment, so thank you for that selection, Dr. Russell.

AR: (Laughs) Well, there’s a lot of interesting things happening there. The current U.S. maritime strategy, the 2015 Cooperative Strategy for 21st Century Seapower, has incorporated cyberspace and cyber power into that strategy in a very robust way. The strategy talks exclusively about all domain access and cross-domain synergy. By which it means, synchronizing battlespace awareness with all the layers and sensors and intelligence within that, and synchronizing that with the short access to networks. Offensive and defensive cyber operations, electromagnetic maneuver warfare, and integrated kinetic and non-kinetic fires. All of this is apparent in U.S. maritime strategy as essential elements in supporting the naval mission. And it’s all spelled out.

In contrast, there is very little information that is publicly available about how cyberspace effects the Russian maritime strategy. At last check, Russian maritime strategy does not directly address cyberspace and cyber security as a maritime or naval responsibility. But it does recognize the importance of what it calls information support of maritime activities for the maintenance and development of global information systems, including systems for navigation, hydrographic, and other forms of security. Most of the publicly available Russian cyber strategy in general focuses on information operations and disinformation campaigns. Despite having advanced cyber-capabilities, there’s not much information available on how that is being integrated into the Russian naval strategy.

RH: You know, it’s very unfortunate that there was no release of any new information recently in St. Petersburg, they celebrated national Navy day with President Putin visiting. But I guess we’ll have to stay on the lookout for any new information.

Before we even go up into the highly integrated platforms of navies in cyber, you reference very acutely the Kremlin’s use of synchronized fires. Can you briefly elaborate on what this concept is and if we can expect to see a similar pattern in future conflict theaters?

AR: Yes, without a doubt I think we can expect to see a similar pattern in the future. For those who don’t know, during the Russia-Georgia War of 2008, Russian forces assaulted Georgia on land, in the air, and from the sea, while at the same time Georgia was subjected to destructive distributed denial of service or DDOS attacks on the websites of Georgian government offices, financial services, and in news agencies. So, this was a synchronized attack in multiple domains on Georgia from Russia simultaneously.

In the Russia-Ukraine conflict, similarly Ukraine suffered multiple cyber attacks in conjunction with that conflict, including cyber attacks targeting infrastructure. I think that these synchronized integrated fires will likely continue and eventually become the norm in conventional conflict unless some action is taken, diplomatically or otherwise, to limit the use of cyber fires or restrict the number of quote unquote “legitimate” cyber targets.

RH: Again, that’s Russia picking on countries that are less developed, but it would be interesting to see moving forward against another more developed or modern adversary if it would be as effective a concept. When assessing operational level warfare, as well as tactical level warfare, how does cyberspace enhance their application?

AR: Starting with the operational level, cyberspace operations can be categorized in three ways: Offensive action, defensive action, and network operations.

Offensive cyberspace operations are designed to project power through the application of force in or through cyberspace. They’re cyber attacks. Defensive cyberspace operations are intended to defend national or allied cyberspace systems or infrastructure. Network operations design, build, configure, secure, operate, and maintain information networks and the communications systems themselves to ensure the availability of data, the integrity of the system, and confidentiality. So those all work together on operational level.

So, to give an example, we already talked about how cyberspace enables assured command and control, integrated fires, battlespace awareness, intelligence, as well as protection and sustainment. It also enables naval maneuvers, with positioning, navigation, and timing support. For sea-based power projection, in a landscape that is very often devoid of signposts and landmarks, the ability to have precise navigational information and over-the-horizon situational awareness is particularly critical. Cyber and satellite-based global positioning and navigational systems provide this capability. Beyond the navy itself, commercial and academic institutions that provide support to the fleet or the military in the form of design, manufacturing, research, and other products and services, are also part of the broader environment for naval security.

So, naval security and warfighting advantage depends in part upon thwarting attacks on military or government sites, as well as securing sensitive information from cyber theft or cyber espionage. Sensitive information in the wrong hands can of course undermine the operational effectiveness of the fleet by improving targeting of naval forces by adversaries and increasing the adversary’s knowledge of how forces man, train, and equip for warfighting.

Moving to the tactical level, naval commanders must incorporate the use of cyber technologies into their battlefield tactics. In practical terms, this means that defensive and offensive cyber capabilities will be integrated alongside kinetic action. This is the integrated fires. Cyberspace can increase the effectiveness of traditional kinetic fires through improved intelligence and targeting. But it also presents new challenges for defensive operations to protect these systems from cyberattack as well as kinetic fires.

Cyberspace and cyber capabilities play a particularly important role in supporting network-centric weapon systems, such as the tactical Tomahawk missile, which the U.S. launched into Syria in April. Tactical Tomahawks receive in-flight targeting data from operational command centers. Similarly, carrier aviation maintenance programs rely on cyberspace to enable them to provide mission ready aircraft.

There are alternatives and workarounds to overcome system failures, but the point is that reliable access to cyberspace is critical to the successful employment of these systems. Naval security also depends upon the protection of access and critical information whether it is classified or not. For naval forces, this process of protecting critical information means educating and training sailors in good cyber hygiene habits and having cyber security integrated into the life cycles of systems.

 

RH: Moving on, we’ve discussed how naval strategies revolve around the four key layers. It is clear that the structure of cyberspace begins with the physical layer. Sometimes users forget how hardware like fiber optic cables and satellites are hidden from view in our daily use of cyberspace. It looks to be a frightening future as you provided a few examples that confirm how vulnerable these physical elements are to tampering.

An appropriate contextualization for the listeners of this threat was on display in a 2015 New York Times article that describes increased Russian submarine activity and how the construction of unmanned, undersea drones related to fiber optic cables is rattling the Pentagon. According to Rear Admiral Fredrick Roegge, commander of the Navy Submarine fleet Pacific (COMSUBPAC) he was quoted as saying, “I’m worried everyday about what the Russians could be doing.” What is your take on the threat to the physical layer and is this threat explicitly exaggerated? Or is it a feature that national security policy makers should be more concerned with?

AR: That’s a great question, I don’t believe that it’s exaggerated. The cables carrying global business for more than $10 trillion per day and 95 percent of daily communications. They are very important to our global economic and political structure.

Back in the 70s before there was a system as robust and widespread as it is today, the U.S. was willing to take great risks to tap into the cables in Soviet waters to gain intelligence. Now these cables carry much more information and have much more value in the present context. The Russians are seeking to identify and potentially exploit infrastructure weaknesses of the US and the West. So, I think it is absolutely worth being concerned about.

RH: Can you comment a little bit on what would happen in the event of tampering and what the process of repair might look like moving forward?

 AR: Well, it’s a little hard to speculate on exactly what would happen, but somethings that could happen is, cables could be severed, they could be cut, which would cause a slowdown in the system, and it would be difficult to repair them, particularly because these cables lie along the ocean bed, the floor of the ocean. And so, there are a certain number of ships in the world that can go to these places and fix the cables and that can be a process that is expensive and is time consuming. That’s just one scenario where the cables are cut.

Another scenario is that they can be potentially tapped into somehow. That is, of course, what the U.S. did to the Soviet Union in Operation Ivy Bells in the 1970s, and that was used for espionage purposes. So, something along those lines could be done with these cables with information being stolen or simply recorded and copied, but then passed along so that nobody knows that someone else was listening in. So, there are a variety of different things and they would require different responses, but some of them would be difficult to detect and to identify that there was a problem, while others like a cut in the cable would be immediately apparent.

RH: In terms of the logic layer, do you think it’s conceivable that a Stuxnet-like attack could seriously damage naval operations? It is worth noting to our audience that even in the case of air-gapped networks, which is what Iran was using, infections from viruses are still possible.

AR: I think it is entirely possible that a cyber-attack could manipulate the logic layer of cyberspace in a number of ways which could cause it to malfunction or shut down completely in order to inhibit the flow of data, which could directly affect naval operations. You make a very good point that even air-gap networks are still at risk. The Stuxnet attack happened 10 years ago, but it successfully targeted highly sensitive protected air-gap systems. And the technology and cyberweapons have advanced quite a lot in the decade since then.

RH: It seems like a bit of an antiquated question, but in the event, that a Stuxnet attack hit a naval operation, what would the response of the Navy be? I mean, do they still know how to use compasses and work like they did back in the day?

AR: (Laughs) This is a good question. But there are workarounds. There are capabilities that are redundant that have resiliency built in. Things would not function perfectly, but most things would still continue to function, so they would still be able to get to where they were going, but they wouldn’t be as effective as they’re intended to be. And so, it would be problematic. Absolutely.

RH: Just as an example for listeners though, but again theoretically, if there was a Stuxnet attack on an operation, it could kill the ability of network-centric weapons to function, correct?

 

AR: It has that potential, or could cause them to malfunction. So, an object could appear to go on course  go off course, or not be able to function entirely or, if it’s ordnance, explode too early, something along those lines.

It can cause a variety of effects, depending on exactly what type of attack it is and what it’s designed to do. Because these attacks – we say attacks in cyberspace happen very quickly because they do in cyberspace – but they also typically take a very long time to develop.

So, that’s another thing where we can develop the cyberweapons and keep them until you’re ready to use them, they do take a while to actually develop. But once you deploy them they happen almost immediately.

RH: A lot of those symptoms you just mentioned earlier about, sort of, missiles veering off course or exploding too early, that’s also a good way to look at the early stages of the North Korean missile program, which unfortunately has evolved to a dangerous point right now. But that’s also maybe a good example if you would agree about the various difficulties that come with a Stuxnet like attack on any sort of cyber infrastructure.

AR: I think that’s an excellent sample.

RH: Drives people crazy in Pyongyang. We have an established the crucial role of cyber for naval strategies, and touched on the composition and structure. Against this backdrop, what are the main opportunities for naval forces and policy makers moving forward with cyber?

AR: Well, there are many potential opportunities but there are three that I think are the most important and exciting.

The first is improved battlespace awareness. Cyber capabilities allow naval forces to have a better understanding of the environment in which they are operating and that is very very good for them.

The second is that cyberspace presents new opportunities for modelling and simulation to help naval forces prepare and train for warfighting.

And then third, as a new domain, cyberspace presents opportunities for cooperation with partner nations for developing, maintaining, and protecting a domain to ensure things like reliable access for allies and partners. And limiting the adversary’s maneuverability within the domain.

So, the domain is essentially a blank slate for cooperation within the international community. That provides some really exciting and interesting opportunities.

RH: Despite these improvements in the maritime domain, it is safe to say that you still remain skeptical of the numerous challenges that threaten naval security. Can you identify and describe some of the major threats? To either advanced technological navies or less advanced navies.

AR: Yes, and there are many challenges, but again I’ll pick the top three that I consider to be the most dangerous or the most important:

First, anti-access and area denial operations in cyberspace are the most significant challenge to the basic goals of naval forces: To retain freedom of maneuvering in cyberspace and deny freedom of action to the adversaries. Cyberspace is essential to naval operations so therefore; the protection of cyberspace is also essential. It doesn’t matter how new or fancy your ships are, if they don’t have the capabilities you need because you can’t access cyberspace. So, I think the most important challenge is, maintaining access to the domain.

The second is significant challenge for naval forces is that offense has the advantage. Threats in cyberspace develop faster than forces can protect against in many cases. The domain is constantly evolving, and innovation is happening so quickly that creating new systems, platforms, and tools occurs at a rapid pace. With the creation of new applications comes the opportunity for new vulnerabilities within the systems. Adversaries are constantly seeking new ways of attack or penetration of networks.

While defensive cyber operations have to work very hard to keep up with the constant onslaught of attacks, there are things like advanced persistent threats, APTs, that are these stealthy persistent attacks on a targeted computer system in order to continuously monitor and extract data. These are particularly problematic because they are so difficult to detect and could render significant damage. We just saw recently that a very prominent cyber security firm was actually targeted with the use APTs, which is very worrying given that they are a prominent cyber security firm. And in addition, the speed at which some cyber attacks can take place, the relatively low barriers on entry to cyberspace, and the potentially big impact of an attack provides a lot of incentive for attackers to keep trying. So, it’s difficult for defensive operations to keep up with them and innovate to protect against future attacks.

RH: I have to be honest Dr. Russell, based on our discussion and the litany of challenges, I’m more inclined to believe that navies will remain exposed to invisible torpedoes more so than physical ones. But hopefully the offensive actions and the various layers will become more resilient in defending and fighting them off. Undoubtedly, it has been an eye-opening podcast that has served to expand our collective assessment on the role of cyberspace and the implications for both naval strategy and security. As we sail off on another sea control series podcast Dr. Russell, do you have any operational takeaways for the listeners or the issues they should pay special attention to?

AR: Well, the rise of cyber capabilities of allies and adversaries such as precision targeting and long-range attacks on systems mean that navies will be simultaneously more connected and more vulnerable at sea than ever before. The modern Navy has so many capabilities that rely on cyberspace that it must not take access to cyberspace for granted. As our ships grow smarter and we invest more and more in the high-end capabilities that allow this unprecedented array of actions, let us not forget to simultaneously ensure that the cyber-connected systems are protected so that our new technology can be used effectively when it’s called upon.

Sun Tzu observed that it is best to win a war without fighting. If modern navies did not have access to cyberspace, it would be very difficult for them to fight. The goal of the navies in the future will be to retain freedom of maneuver and deny freedom of action to adversaries at sea. As well as in cyberspace.

RH: Dr. Russell, thank you again for taking the time to enlighten us on such a relevant and complicated issue.

If our listeners want to follow up in more detail on cyberspace and maritime strategy, or gain a better outlook on the general maritime domain, The Routledge Handbook of Naval Strategy and Security, edited by Sebastian Bruns and Joachim Krause, published in 2016 is an indispensable resource to have. Please check www.kielseapowerseries.com for more info on the book and other podcasts derived from the book.

With no shortage of maritime issues within the greater geopolitical landscape, I promise I will be back to keep CIMSEC listeners well-informed. From the Institute for Security Policy at Kiel University and its adjunct, the Center for Maritime Strategy and Security, I’m Roger Hilton saying farewell and auf wiedersehen.

Dr. Alison Russell is an Assistant Professor of Political Science and International Studies at Merrimack College.  The author of Cyber Blockades (Georgetown University Press, 2014), she worked for six years as a security analyst at the Center for Naval Analyses where she specialized in naval strategic planning. She holds a Ph.D. from the Fletcher School of Law and Diplomacy, an M.A. in International Relations from American University in Washington, D.C., and a B.A. in Political Science and French Literature from Boston College.

Roger Hilton is a nonresident academic fellow for the Institute for Security Policy at the University of Kiel.

Matthew Merighi is the Senior Producer for Sea Control. 

Building an Asymmetric Ukrainian Naval Force to Defend the Sea of Azov Pt. 1

The following two-part series will analyze the maritime dimension of competition between Ukraine and Russia in the Sea of Azov. Part 1 analyzes strategic interests, developments, and geography in the Sea of Azov along with probable Russian avenues of aggression. Part 2 will devise potential asymmetric naval capabilities and strategies for the Ukrainian Navy to employ.

By Jason Y. Osuga

“The object of naval warfare must always be directly or indirectly to secure the command of the sea, or to prevent the enemy from securing it.”1 Sir Julian Corbett

Ukraine’s bid to join NATO, under the Partnership for Peace, and closer association with the European Union, have stirred Russian sensitivity and suspicion of Ukrainian and Western intentions.2 In 2014, Ukrainian President Yanukovych declined to sign an Association Agreement with the European Union to expand bilateral trade. Instead, he signed a trade agreement with Russia. Consequently, Ukrainians took to the streets of Kyiv in the Euromaidan protests, which led to the ouster of President Yanukovych. The new President, Poroshenko, refused to sign the 25-year extension on the lease of Sevastopol naval base in Crimea to the Russian Navy. Russia responded immediately by taking over Sevastopol and Crimea through Russian proxies clad in unmarked fatigues. To date, Russia has not returned Crimea and its naval base in Sevastopol. Ukraine must be able to defend its borders and sovereignty so that it can contribute to the stability of the Black Sea region.          

Current constrained budgets necessitate that Ukraine pursue a pragmatic maritime strategy grounded in the following geopolitical realities: it will not be a NATO ally, it will not have a great sophisticated navy, and it can no longer rely on Russia’s defense. If Ukraine continues on the current path, Ukrainian Navy’s weakness, Russia’s need to resupply Crimea, and Kerch Strait Bridge construction delays will tempt Russia to gain control of the Sea of Azov (SOA) to establish a land corridor between Russia and Crimea through the Donbas and Priazovye Regions. Therefore, a new Ukrainian maritime strategy must defend the SOA and deter Russian encroachment by building an asymmetric force, conducting joint sea denial operations, and establishing a naval base in Mariupol and forward-deploying a part of its fleet to the SOA.

Figure 1. Sea of Azov, Kerch Strait, and Crimea. (Google Maps)

Russian Motivations, Ukrainian Weakness, and Russian Operational Ideas

Since the Soviet Union’s dissolution, Russia and Ukraine have failed to agree on the demarcation of maritime borders in the SOA and Kerch Straits.3 In Ukraine’s National Security Strategy published in March 2015, President Poroshenko defined current security challenges that exist below the threat level, but could elevate into a more robust military threat. Specifically, it cited the unfinished border demarcation in the Black Sea and SOA as a potential flashpoint.4 Ukraine has responsibilities to protect its Exclusive Economic Zone (EEZ) in the SOA and Black Sea under the 1982 United Nations Convention on the Law of the Sea Treaty (UNCLOS).5 Ukraine has insisted on designating the SOA as an open sea under UNCLOS, as it links directly to the Black Sea and the world’s oceans.6 The Russian Government has, however, rejected Ukrainian claims. As an alternative, Russia called on Kyiv to abide by a 2003 agreement signed by the previous Ukrainian Government, which designated SOA as internal waters of Russia and Ukraine to be jointly owned, managed, and unregulated by international law.7 More recently, Ukraine has instituted arbitration proceedings against Russia under UNCLOS to adhere to maritime zones adjacent to Crimea in the Black Sea, SOA, and Kerch Strait.8 As a result, Ukraine asserts that Russia has usurped Ukrainian maritime rights in these zones. However, these legal actions have not halted Russian maritime aggression. In mid-September 2016, Russian vessels illegally seized Ukrainian oil rigs in the region and chased Ukrainian vessels out of the area.9 Tensions continue to mount as Russia solidifies its gains in Crimea, extending to offshore claims against Ukraine.

Resource Discovery

Russia and Ukraine’s relationship has shown no sign of improvement as more resources are discovered on its seabed. Exxon Mobil, Royal Dutch Shell and other major oil companies have explored the Black Sea, and some petroleum analysts say its potential may rival the North Sea.10 In addition, natural gas exploration has availed as many as 13 gas and dry gas deposits with a combined 75 billion cubic meters (bcm) of prospected resources discovered on the shelf, seven in the Black Sea and six in the SOA.11 Subsequently, three new gas deposits have been found on the southern Azov Sea shelf. Since taking over Crimea, Russia has made new maritime claims around Crimea in the SOA and Black Sea (see Figures 2 & 3 showing Russian maritime claims before and after Crimea’s annexation). President Vladimir Putin declared the “Azov-Black Sea basin is in Russia’s zone of strategic interests,” because it provides Russia with direct access to the most important global transport routes.12 In addition to commercial routes, keeping hydrocarbon resources from Ukraine is clearly among Russia’s interests.

Figure 2. Sea Claims Prior to Russian Annexation of Crimea (Lamont-Doherty Earth Observatory13)
Figure 3. New Russian Claims following Crimea Annexation in Black Sea and SOA.14

Possible Russian Designs on a Land Corridor

In addition to having access to the sea, Russia could also seek a land corridor connecting Crimea to Russia through the Donbas Region.15 There are at least two primary reasons for Russian leadership’s desire to encroach further on Ukraine’s territory. First, Russia needs to protect new claims in the Crimea, SOA, Black Sea, and its maritime resources. Second, Russia needs to increase the capacity to resupply Crimea through a land corridor connecting Crimea to Russia. Since the occupation of Crimea, Ukraine closed the northern borders of Crimea and Ukraine. This forces Russia to supply Crimea with food and basic wares from the sea, mainly via ferries across the Kerch Strait from Krasnodar Region to Crimea. The reliance on a single ferry system could cause a bottleneck in traffic when it reaches a daily limit on supplies carried across the Strait. Crimea depends heavily on Russia to fulfill basic services, with 75 percent of its budget last year coming from Moscow, in addition to supplying Crimea with daily electricity rationing.16 A land line of communication (LOC) via a road between Crimea and Russia would alleviate the burden of supplying Crimea by sea only. The highway along the Azov coast is the shortest link.

Realizing the SLOCs are limited, Russia is building the Kerch Strait Bridge, which will connect the Crimean Peninsula to Russia. Until its completion in 2019, however, there is no land LOC to sustain the economy and bases in Crimea. Therefore, SOA carries significance for its sea line of communication (SLOC) from Russia to Crimea. Protection of this SLOC is Russia’s main objective to consolidate its gains and secure sustainment of Crimean bases. Only then would Russia be able to use Crimea as a lily pad for power projection into the Black Sea.

The Kerch Strait Bridge construction, however, is beset with delays. Due to sanctions placed on Russia by the E.U. and the U.S., Russia is in dire financial straits which puts the completion of the bridge at risk. The construction cost of the bridge is expected to cost more than $5 billion as construction delays mount.17 Unpaid workers are quitting the project in protest over dangerous working conditions.18 With uncertainty over the bridge’s construction and overcapacity of the ferry, the need for land routes to Crimea becomes even greater. Because Ukraine closed its borders to Crimea in protest against Russian occupation, Russia must forcibly establish a LOC. In order to establish a LOC corridor, Russia must control the SOA.

https://gfycat.com/SoupyIllfatedAnkolewatusi

Kerch Strait Bridge construction footage (Sputnik/June 2017)

Ukraine’s Weak Navy

The Ukrainian Navy is old, chronically underfunded, and too small to effectively counter potential Russian aggression previously described. Ukraine’s land and air forces receive the lion-share of defense spending.19 Lack of spending on the Ukrainian Navy is a distinct disadvantage in maritime security of the SOA. The Ukrainian Navy consists of 15,000 sailors and 30 combat ships and support vessels, of which only six ships are truly combat capable while the rest are auxiliaries and support vessels.20 All in all, Ukraine lacks the capabilities to protect the now less than 350 kilometers of Azov coastline.21

Defections, low morale and training also plague the Ukraine Navy, decimating its end strength. Many sailors defected to Russia during the Crimea crisis.22 There is a systemic failure to invest in training and personnel, with housing shortages and low personnel pay depressing morale and retention.23 Old ammunition stockpiles adds to training issues. Ukraine will not win a symmetrical engagement on the open water against the Russian navy. As a result, Ukraine must seek comparative advantages in the asymmetric realm by addressing tangible and intangible issues in force structure, doctrine, morale, and training.

Theater Geometry and Interior Lines of Attack

 If Russia were to strike at the Ukrainian Achilles’ heel, it would attack from the sea taking advantage of Russia’s dominance in the SOA and Kerch Strait vice attacking on land. This is due to the Ukrainian Army being a more sizeable and proficient force compared to the Navy that is weak and underfunded.24 Russia’s control of Crimea shortens its line of operations (LOO) into eastern Ukraine. With uncontested control of SOA, Russian transports will have the freedom of maneuver to assemble forces in the SOA and utilize interior lines of attack along the [Ukrainian] coast.25 Russia will be able to maximize three enabling functions to increase combat power: sustainment using shorter SLOCs, protection of its transports and flanks by gaining sea control to then conduct amphibious landings, and establishment of effective command and control (C2) of forward-deployed forces through shorter lines of operations and an advantage in factor space. Consequently, Russia will be able to increase combat power of its limited “hybrid” troops to seize objectives ashore. Therefore, a strong navy is necessary to deny Russian forces from using the sea to seize the Azov coast.

Figure 4. Notional Russian amphibious attack vector using interior lines from assembly point in Sea of Azov. . Roads along the coast connect Crimea to Russia. Russia’s Ultimate Objective is Mariupol w/ Intermediate Objectives along E58. (Google Maps)

Seizing Opportunity and The Russian Operational Idea

Strategically, Russia will weigh the benefit of seizing more Ukrainian territory to establish a LOC between Crimea and Russia against the costs of likely Western sanctions or retaliations. Russia will seize the initiative upon any perceived Ukrainian or international weakness that presents an opportunity. Russian Op idea would be to reach objectives along the Azov coast with speed, surprise, and plausible deniability using amphibious crafts Ropucha and Alligator-class LSTs, LCM landing crafts, and LCUA/LCPA air cushion landing crafts or a combination with commercial ships/boats.26 Hybrid forces clad in civilian clothing will use speed, surprise, and plausible deniability to seize decisive points along the Azov coast maximizing the shortened LOO/LOC to seize the ultimate objective of Mariupol.

Russia will seize on Ukraine’s critical weakness—sporadic or non-existent naval presence in the SOA. The Russian Navy will assert sea control in the SOA, and attempt to close Mariupol port through a blockade. Russia’s critical strengths and operational center of gravity (COG) are its well-trained and commanded special and ground forces, which are key to seizing territory and linking the Crimean Peninsula to Russia by land. Separatist forces from the Donbas Region will support by encircling Mariupol from the north. The Russian Navy and Air Force will likely support the ground offensives through naval gunfire, land-attack missiles, and air support to attack defensive positions along beaches and cities. Russia will ensure unity of command between the special forces, navy, and separatist forces by maximizing functions of intelligence, C2, sustainment, fires, and protection combined with principles of war such as speed, initiative, surprise, deniability, and concentration of force to enable success.

Russia will complement the offensive using hybrid warfare techniques such as a strategic media blitz and cyber warfare to win the war of the narrative and global opinion. Various Russian media outlets such as RT will broadcast the Russian strategic narrative that it will protect Russian speakers in the near abroad and will reunite inherently Russian territory back to the motherland. Furthermore, Russia will use the cyber domain not only to carry out media warfare, but will use it to attack Ukrainian government websites and infrastructure through denial of service attacks and more sophisticated cyber-attack vectors. Thus, cyberspace will be a key domain of its main attack vector in addition to air, sea, and land.

Part 2 will devise potential asymmetric naval capabilities and strategies for the Ukrainian Navy to employ.

LCDR Jason Yuki Osuga is a graduate of Johns Hopkins University’s School of Advanced International Studies (SAIS) Europe Center and the U.S. Naval War College.  This essay was originally written for the Joint Military Operations course at NWC.

These views are presented in a personal capacity and do not necessarily reflect the views of any government agency.

[1] Julian S. Corbett, Principles of Maritime Strategy, (Mineola, NY: Dover Publications, 2004), 87.

[2] Janusz Bugajski, Cold Peace: Russia’s New Imperialism (Westport, CT: Praeger Publishers, 2004), 56.

[3] Deborah Sanders, “Ukraine’s Maritime Power in the Black Sea—A Terminal Decline?” Journal of Slavic Military Studies 25:17-34, Routledge, 2012, 26.

[4] Maksym Bugriy, “Ukraine’s New Concept Paper on Security and Defense Reform,” Eurasia Daily Monitor 13, No. 79. April 22, 2016.

[5] Deborah Sanders, “Ukraine’s Maritime Power in the Black Sea—A Terminal Decline?”, 18.

[6] Ibid., 26.

[7] Ibid.

[8] Roman Olearchik, “Ukraine Hits Russia with Another Legal Claim.” Financial Times. September 14, 2016. Accessed October 6, 2016. http://www.ft.com/fastft/2016/09/14/ukraine-hits-russia-with-another-legal-claim/.

[9] Ibid.

[10] William J. Broad, “In Taking Crimea, Putin Gains a Sea of Fuel Reserves.” The New York Times, May 17, 2014. Accessed 10 Oct 2016, http://www.nytimes.com/2014/05/18/world/europe/in-taking-crimea-putin-gains-a-sea-of-fuel-reserves.html.

[11] “Ukraine to Tap Gas on Black, Azov Sea Shelf.” Oil and Gas Journal, November 27, 2000. Accessed October 7, 2016. http://www.ogj.com/articles/print/volume-98/issue-48/exploration-development/ukraine-to-tap-gas-on-black-azov-sea-shelf.html.

[12] Deborah Sanders, “U.S. Naval Diplomacy in the Black Sea,” Naval War College Review, Summer 2007, Vol. 60, No. 3. Newport, RI.  

[13] William J. Broad, “In Taking Crimea, Putin Gains a Sea of Fuel Reserves.” The New York Times.

[14] Ibid.

[15] Steven Pifer, “The Mariupol Line: Russia’s Land Bridge to Crimea.” Brookings Institution, March 15, 2015. Accessed 24 Sep 2016, https://www.brookings.edu/blog/order-from-chaos/2015/03/19/the-mariupol-line-russias-land-bridge-to-crimea/.

[16] Ander Osborn, “Putin’s Bridge’ Edges Closer to Annexed Crimea despite Delays.” Reuters, April 18, 2016. Accessed 24 Sep 2016, http://www.reuters.com/article/us-ukraine-crisis-crimea-bridge-idUSKCN0XF1YS.

[17] Daria Litvinova, “Why Kerch May Prove a Bridge Too Far for Russia.” The Moscow Times, June 17, 2016. Accessed 30 Sep 2016. https://themoscowtimes.com/articles/why-kerch-may-prove-a-bridge-too-far-for-russia-53309.

[18] Ibid.

[19] Amy B. Coffman, James A. Crump, Robbi K. Dickson, and others, “Ukraine’s Military Role in the Black Sea Region,” Bush School of Government and Public Service, Texas A&M University, 2009, 7.

[20] Eleanor Keymer, Jane’s Fighting Ships, Issue 16 (Surrey, UK: Sentinel House), 2015, 642.

[21] Janusz Bugajski and Peter Doran, “Black Sea Rising: Russia’s Strategy in Southeast Europe.” Center for European Policy Analysis, Black Sea Strategic Report No.1, February 2016, 8.

[22] Sam LaGrone, “Ukrainian Navy is Slowly Rebuilding,” USNI, May 22, 2014.

[23] Deborah Sanders, “Ukraine’s Maritime Power in the Black Sea—A Terminal Decline?”, 25, 29.

[24] Amy B. Coffman, James A. Crump, Robbi K. Dickson, and others, “Ukraine’s Military Role in the Black Sea Region,” Bush School of Government and Public Service, Texas A&M University, 2009, 7.

[25] Milan Vego, Joint Operational Warfare: Theory and Practice, (Newport, RI: U.S. Naval War College, 2009), p. IV-52.

[26] Eric Wertheim, Guide to Combat Fleets of the World, 16th edition, (Annapolis, MD: Naval Institute Press) 2013, 608-610.

Featured Image: Ukrainian Navy personnel on the day of Naval Forces in 2016 (Ukraine MoD)

Capital Uncertainty

Future Capital Ship Topic Week

By J. Overton

Introduction

A snowstorm hits the coastal city of a near-peer competitor. That country’s largest naval shipyard, housed in this city, communicates via its own web site and through the local commercial media that all non- essential navy personnel should stay home until further notice. It also releases notice that a ship homecoming, due to happen the next day, will be postponed until the weather improves.

That evening, fire breaks out on a dry-docked submarine in that shipyard. The minimal staff on-site fails to notice or report the fire until the next morning. By then, the submarine and dry dock have suffered massive and horrendously expensive damage.

That morning, packages and envelopes are delivered to facilities at each of the other major naval bases in the country, all containing white powder and threatening notes. Due to an abundance of caution, the buildings in which these packages were opened evacuated, locked down until a thorough test of the substances can be done. Backpacks and unattended bags found near the entrances to the bases cause further alarm, and all of the country’s naval bases are put on reduced manning until the suspicious packages are investigated. Bomb threats call in to every coastal base at noon that day and prompt further panic, and a decision is made to get all ships that can underway.

A contracted fuel tanker, pulling in to the nation’s largest fuel pier, loses steerage way and collides with the nation’s largest amphibious ship, then moored at this pier. The damage to both ships, and the fueling pier, causes few casualties, but results in an oil spill and both ships being unseaworthy. The spill shuts down the shipping channel leading into one of the largest bases and commercial ports, backing up cargo ships, and causing the navy ships attempting to get underway to do so with less than optimal fuel requirements. At another base on a different coast, a submarine joining the scramble to get to the safety of the sea reports experiencing an explosion or collision, and sends a distress signal as it begins abandon ship procedures.  

That evening, with attempts still being made to respond to the oil spill and the disabled submarine, power outages occur at the navy’s administrative offices, located in a commercial office block in an inland city. Within minutes of the complex going dark, an individual walks to the gate of the navy’s largest communications center, shoots the lone guard, and begins killing watchstanders.

By midnight of the second day, this nation’s leaders are yet are unsure if this mayhem is just a random serious of unfortunate events, or a coordinated, sponsored attack.

In the early hours of day three, a naval jet crashes just after taking off from its base, landing in a civilian community and, it seems, starting a quickly-spreading forest fire. That morning, this navy’s emergency messaging begins sending out text alerts, telling some sailors to shelter in place, and some that they’re wanted for arrest due to some criminal activity, or that a family member has died. Emails and photos of Navy leadership engaged in inappropriate sexual behavior are sent from navy addresses to news outlets around the world.

That evening, the chief of this besieged, bewildered navy is found dead in his office, apparently from self-inflicted poisoning. His national government is unsure if they are actually under attack, much less who the attacker might be, but they do know that their navy is, at least temporarily, dead in the water.


The capital ship concept may no longer be relevant. Modern navies spend the bulk of their time performing at the softer, fuzzier end of the Range of Military Operations. The seapower that best serves their respective nations may come in the form of counter-smuggling, icebreaking, humanitarian aid and disaster response missions, or in passive-aggressive sea lane interference, none of which require a modern equivalent to an Iowa-class battleship or Royal Navy Ship of the Line, circa 1781. Even the hard-power naval actions of recent decades have not involved symmetrical actors in surface-to-surface combat. Strikes from off-shore carriers on inland targets or massive and decisive attacks on hopelessly outgunned and outnumbered navies1 have been predominant in this young century.

But if the capital ship ideal is relevant today, or will again be in the future, then first some set of criteria, allowing for both traditional usage and technological advancement, must describe it. First, it would be the most powerful platform in the fleet (however one defines platform, power, or fleet). Next, it would be the most survivable platform in that Fleet, both in having the fewest critical vulnerabilities and in that if the rest of the fleet is lost, this ship could still operate. And finally, its primary objective would be the destruction or neutralization of the enemy’s Navy assets.

What is Capital?

Capital-ship type actions have occurred in the previous few decades, but not usually in a way that they would be recognized as such. Rather than envisioning what a future capital ship would look like and what technology or capabilities it would have, one instead can assess some of recent examples of when a human-directed action or natural obstacle has caused significant damage or destruction to a platform or facility of the contemporary world’s most powerful Navy.

The most egregious example of an entire first-rate navy’s first-rate ship being damaged beyond repair during this time period would be that of the fire on the submarine USS Miami. Set while the submarine was in dry dock by a shipyard laborer who apparently just wanted to go home early, it resulted in the total loss of an attack submarine.2 An extremely expensive platform, designed for stealth and survival under the harshest conditions of war and the natural environment was taken out permanently by a lone actor using the most basic technology (fire) with effectively no planning, particular expertise, or financial cost. Other losses or severe damage to U.S. ships and submarines in the last decade have come from collisions with uncharted undersea mountains, reefs, and other ships.3 Naval shore facilities in the U.S., where most of the Navy’s platforms and people spend most of their time, have been shut down for varying periods of time by bomb threats, anthrax threats, and gunmen, none of whom seem to have been carrying out the work of an organized group or nation state, nor to have been done with significant foresight or cost outlay.4

More traceable or kinetic actions have taken place against Navy assets, with near-misses by drones and jets, attacks from waterborne improvised explosives devices, and computer system hacks likely from state actors. 5 Other threats and actual criminal acts, using commercial, off-the-shelf technology, have been used to disable or interfere with the operations of extremely complex, expensive platforms, though thankfully none has yet caused catastrophic results.6

These navy-disabling actions share certain salient characteristics:

– The offenders were either lone actors, or were part of a network that was difficult to track or had a plausibly deniable connection to the offending action.

– The offender’s Center of Gravity and critical vulnerabilities were either not present at the site of action.

– The damage they caused was with commercially-available, cheap or at-hand technology, or natural-occurring obstacles, effectively exploiting the critical vulnerabilities of their target.

Amalgamating elements of the often-accidental events mentioned above into a set of characteristics and capabilities – and adding those to capital ship criteria – yields a near-formless concept that can destroy or mitigate the world’ foremost naval platforms.7

If the stealthiest and best-armed ships can frequently be tracked and detected, and as illustrated, have times of increased vulnerability during maintenance or restricted maneuvering, then the most powerful platform in the Fleet would not be a ship. It would be a small team, networked without a formalized, exploitable communications network, with their leadership, and perhaps all but one team member, safely-distant from the actual area of operations. The individuals on this team may not all know each other, and would not all know the full details of any particular operation, only a particular actions or times which triggered particular phases they would begin or execute.

Their lethality would come from attacking the critical vulnerabilities of modern fleets such as their long logistics tails and extensive, complex network of support and maintenance, be that from sabotage, hacks on navigation or fuel systems, compromising workers, or other any other method which brought about the desired end state without the undesired risks and attribution.8

An overt strike by a ship against a similar target would invite a reciprocal strike if possible, and if not, then other elements of the enemy’s national power would react. A small footprint with a connected human network would be the most survivable platform that could perform its mission. It would be able to strike before the adversary was aware that hostilities had commenced, and even then, the adversary still might be left in doubt as to whether or not a conflict had begun, or with whom it was being fought. And if it was attacked or compromised, its center of gravity would be distant and dispersed, leaving it a far more difficult “ship” to sink than the metal hulls it was after.

A few people with skills at commercial drone pilotage, subterfuge and sabotage, and cyberwarfare connections would in no way be available to carry out the range of missions in the Design for Maintaining Maritime Superiority or even the more-focused update of a Cooperative Strategy for 21st Century Sea Power. Many of those require amphibious ships, hospital ships, and the submarines and aircraft carriers that may pass for today’s conventional version of a capital ship. But if the primary objective of a capital ship is the destruction or neutralization of the enemy’s Navy assets, those symmetrical platforms would be not be both the most effective and most survivable.9 Once they had sufficiently carried out whatever assigned mitigation or destruction was needed, this “ship” would achieve sea denial no less thoroughly than a battleship or aircraft carrier – it’s organic “firepower” would allow for follow-on sea-going platforms, now un- or minimally-contested to operate freely within a space that they could not dominate, physically or politically, alone.

Conclusion

The functions of a capital ship can no longer be performed by a single afloat unit, and the destruction of a near-peer competitor or symmetrical fleet becomes increasingly less tenable with more accurate satellite imagery and more transparent oceans. A future Battle of the Capes, Trafalgar, or a Midway might still be something for which to prepare, but also something which becomes, in the preparation, inconceivable: all sides would be well aware of the others movements and preparations, and likely of their positions and capabilities as well.

The essentials of the scenario at this essay’s beginning have been carried out piecemeal against first-rate navies in the last few decades, and yet have either been random acts of violence and vandalism, of incompetence and natural causes, or haven’t left enough evidence to warrant a hard-power state response. This might illicit distaste in proponents of traditional seapower platforms, so once did steam power, iron hulls, submarines, and aircraft carriers. The need, or possible existence, of the most supremely effective naval platform for its era will not be obsolete for as long as nations and peoples use the world’s finite sea lanes and marine resources. But the idea that this platform must, however, be now and for always a ship no longer holds water.

J. Overton is a civilian writer/editor for the U.S. Navy, has been an adjunct professor for the Naval War College and Marine Corps Command and Staff College, and is a U.S. Coast Guard veteran.

The views and opinions expressed are those of the author and do not necessarily state or reflect those of the United States Government.

1. See The Sorry State of the Ukrainian Navy—and Why It Should Matter to America http://nationalinterest.org/feature/the-sorry-state-the-ukrainian-navy%E2%80%94-why-it-should-matter-21842

Georgian Navy’s Cruel Fate https://www.wired.com/2008/08/georgian-navys/ And of course, during the same time period there have been more conventional attacks on U.S. and other modern Navies…the USS Cole bombing, the probable- torpedoing of the South Korean ship Cheonan.

2.  See Torching of nuke sub costs $400 million; Navy’s budget struggles for air  http://www.cnn.com/2013/08/07/us/navy-submarine-lost/

3. See, among others, Initial investigation blames Navy for USS Fitzgerald collision http://www.cnn.com/2017/07/21/politics/fitzgerald-initial-investigation-blames-navy/

In 2005, a U.S. Navy Submarine Ran Into a Mountain http://www.popularmechanics.com/military/navy-ships/a24158/uss-san-francisco-mountain-incident/

Navy wants answers after warship, merchant vessel collide http://www.cnn.com/2017/08/20/asia/us-navy-destroyer-collision-singapore/

4. See, among similar incidents, Gunman and 12 Victims Killed in Shooting at D.C. Navy Yard http://www.nytimes.com/2013/09/17/us/shooting-reported-at-washington-navy-yard.html?pagewanted=all

Local bomb squads busy with suspicious package scares  http://komonews.com/news/local/local-bomb-squads-busy-with-suspicious-package-scares

2 Contractors Arrested for Bomb Hoaxes at San Diego Navy Base Plagued by Threats https://news.usni.org/2016/12/19/2-contractors-arrested-bomb-hoaxes-san-diego-navy-base-plagued-threats

5.  See China is suspected of hacking into Navy site Naval War College systems off-line following network intrusion https://fcw.com/articles/2006/12/04/china-is-suspected-of-hacking-into-navy-site.aspx

6. See Coast Guard warns of laser strikes on commercial ships in the Chesapeake Bay http://www.capitalgazette.com/news/breaking_news/ph-ac-cn-ships-lasered-0505-20170504-story.html Coast Guard targeted by laser pointer http://www.abcactionnews.com/news/coast-guard-targeted-by-laser-pointer

7. See Formless Warfare: An Innovative Concept to Gather More Information, Analyze it Faster, and Strike Harder by Michael Kim and Charles Schultzhttp://smallwarsjournal.com/jrnl/art/formless-warfare-an-innovative-concept-to-gather-more-information-analyze-it-faster-and-str

Some New, Some Old, All Necessary: The Multi-Domain Imperative https://warontherocks.com/2017/03/some-new-some-old-all-necessary-the-multi-domain-imperative/

8. Taking cues from Hassan i Sabbah (“Nothing is true, everything is permitted.”) and Unrestricted Warfare (“the first rule of unrestricted warfare is that there are no rules, with nothing forbidden.”) see A New Generantion of Unrestricted Warfare https://warontherocks.com/2016/04/a-new-generation-of-unrestricted-warfare/

9.  Power as defined as adaptability to function, as described by Joseph Moretz in “The Royal Navy and the Capital Ship in the Interwar Period: An Operational Perspective,” xvi.

Featured Image: A Marine Special Operations School student maintains security during Field Training Exercise Raider Spirit, May 2, 2017, at Camp Lejeune, North Carolina. (U.S. Air Force photo by Senior Airman Ryan Conroy)

Pitfalls in New Capital Ship Creation

Future Capital Ship Topic Week

By Steve Wills

The creation of new capital ship concepts seems to historically stem from a combination of new technology, change in strategic situation, and changes in financial resources available for warship construction and maintenance over time. The best known such case is that of the development of the aircraft carrier from simple experiment in 1914 to master of Pacific theater warfare in 1941. The carrier’s evolution from experiment to capital is fairly well known, especially from books such as historians Allan Millet and Williamson Murray’s Military Innovation in the Interwar Period, Albert Nofi’s To Train the Fleet for War, and books on aircraft carrier development by the noted naval historians Norman Polmar and Norman Friedman.

The record of success in the process of creating a new capital ship is however mixed and forced attempts without the benefit of exercises and evaluation over time are not always successful. It is also useful to study less-than-successful capital ships. Consider the cases of the American Civil War ironclad monitor-type warship and the early twentieth century battlecruiser. Varying degrees of the three factors (technology, strategy, financial change) went into their concept development and active employment. These classes were overtaken by further perturbations in the same three categories that were responsible for their initial creation and their reign as “capital ships” was brief. A study of these less-than-successful capital ship entrants is useful in predicting the emergence of the “next” capital ship.

American Civil War Monitors

The American Civil War was the genesis of several ship types, including early versions of the submarine, and the torpedo/mine laying boat. Two potential capital ship entrants include the monitor-type turreted ship and the high-speed steam cruiser. Both later filled roles as capital ships in other navies. In the case of the turreted ship, a change in strategy as dictated by the need to batter through Confederate A2/AD defenses and advances in metallurgy needed for thick armor and rifled guns made possible a new class of capital ship superior to all previous U.S. capital ship types. The steam frigate; the early industrial age descendent of the sailing ship of the line, was no match for armored warships with large solid shot or shell gun weapons. The ineffectiveness of the USS Cumberland, USS Congress, and the new steam frigate USS Minnesota against the Confederate armored ship CSS Virginia attested to the superiority of the armored ship over previous “capital” ship classes. The addition of the revolving armored turret in the original USS Monitor only enhanced armored ship capabilities. In later battles with Confederate armored ships such as CSS Atlanta, and CSS Tennessee, the turret-mounted guns on U.S. Navy monitors made short work of Confederate warships that often could not bring their armament to bear on the more agile Federal warships or lacked the armor to withstand monitor weapons. By 1865 the monitor fleet included dozens of units, including the largest Dictator-class that approached 5000 tons displacement and 350 feet in length.

1862. On the James River in Virginia. “Effect of Confederate shot on Federal ironclad Galena.” Wet plate glass negative by James F. Gibson. (colorized)

A change in strategy and funding at the end of the war, however, and a failure for some aspects of armored ship technology to keep pace with political developments, ended the monitor’s brief reign as capital ship. The end of the rebel states’ coastal defenses and littoral armored ships left the monitors bereft of littoral missions. The U.S. returned to a strategy of forward-deployed squadrons on foreign stations for influence and limited combat missions. While two monitors made transoceanic voyages and were well-received by European audiences, their limited range, generally poor seakeeping and heavy coal consumption made them unfit for the new, financially austere strategic era in U.S. naval policy. On one such voyage it was discovered that while rated at 350 tons coal storage, the USS Miantonomoh actually carried only 264 tons and was towed by one of her escorts for a considerable part of her transoceanic voyage due to lack of coal.1 Nearly all were out of service by 1877. A few were briefly re-commissioned for the Spanish-American War against the threat of Spanish coastal attacks but were swiftly retired and scrapped soon after that conflict’s end. While initially successful in the limited terms of operational employment envisioned, the monitor was unable to become an enduring capital ship.

The High-Speed Steam Cruiser

The second Civil War contender for capital ship rank was the high-speed steam cruiser. While the monitor was one of the ancestors of the modern, dreadnought battleship of the early twentieth century, the Civil War steam cruiser was an early version of the armored cruiser that was also designed to prey on enemy trade in the late nineteenth and early twentieth centuries. The United States Navy was again a leader in the development of this type of ship based on its unsatisfactory experience with Confederate commerce raiders. These ships, while generally not the equivalent of Federal steam frigates, were fast on their coal burning engines and wide-ranging thanks to their sailing rigs. Over the course of the Civil War, Confederate commerce raiders, many constructed in British shipyards by Confederate-sympathizing Britons, in effect destroyed the American whaling industry at sea and inflicted severe damage on the U.S. merchant fleet as well. In the celebrated Alabama Claims arbitration case settled in 1872, the British government agreed to pay the U.S. $15.5 million dollars ($290m in 2017 dollars adjusted for inflation alone) in claims.2

This experience convinced some U.S. Navy engineers that a high-speed vessel capable of running down enemy cruisers or blockade runners would be a necessary component of the current and future U.S. Navy. To meet this mission need the navy undertook a plan to develop a steam warship fast enough to catch a blockade runner and well-armed enough to engage a Rebel cruiser. The product of this effort was the USS Wampanoag, a steam warship capable of the then- unheard of top speed of 17 knots as measured during her sea trials in 1868.3

The USS Florida, formerly the USS Wampanoag (Wikimedia Commons)

Unfortunately, the Wampanoag was completed too late for Civil War service and despite her advanced set of capabilities was quickly removed from active service. As with the monitors, the dawn of a new, post-Civil War strategic era made a high speed ship with large coal requirements. Wampanoag burned 136 tons of coal per day at high speed and 84 percent of her total weight was taken up by propulsion equipment.4 Navy leadership advised the Secretary of the Navy that, “The Navy no longer had a strategic or tactical requirement for a vessel with such high speed and long, (coal-fired) range.”5 Another group of Navy leaders believed that the eastern seaboard’s wood shipbuilding industry was threatened by iron, steam-powered ships and that the Navy should not damage an industry on which it so relied for the maintenance of such a large part of the existing, wooden fleet. Wampanoag’s speed and coal-fired endurance records were not equaled by any foreign vessel for nearly a decade and not superseded by any U.S. ship for almost 20 years.6

The Battlecruiser

Finally, there is the case of the battlecruiser which was British Admiral Sir John Fisher’s attempt to scientifically address advancing technology, high costs in warship construction, and meet the needs of a new strategic era in a purpose-designed capital ship. Early twentieth century British naval estimates had skyrocketed over the previous decade as Britain sough to maintain a “Two Power Standard” where the Royal Navy’s capital ship fleet was the equal of the next two largest naval powers. This effort, combined with the high costs of the recent Boer War and a desire on the part of many British lawmakers to increase the size and funding of the nascent British welfare state put great pressure on Britain’s naval leadership to cut costs whilst maintaining maritime superiority.

The capital ships charged with maintaining British maritime superiority were the standard battleship (later known as the predreadnought,) that was designed to combat similar vessels in pitched battle and the armored cruiser; a high-speed capital ship designed to protect British global commerce and to hunt down and sink enemy commerce raiding ships. Both ships were expensive, but both types were seen as essential to British maritime security. Fisher’s solution was to combine both of these classes into one new capital ship capable of meeting all of the previous requirements. Advanced fire control systems then under development that allowed all of the guns of a warship to be fired in concert against a single target were also incorporated into Fisher’s new capital ship concept, albeit with less attention to detail than that which went into the guns and speed of the ship.

This vessel was the battlecruiser, the first of which (HMS Invincible) was commissioned in 1908. The battlescruisers had the size and high speed of the armored cruiser, with the heavy guns of a battleship, at the expense of additional armor that Fisher thought superfluous if the battlecruisers big guns and superior fire control allowed it to hit enemy warships decisively before return fire could inflict damage. Fisher envisioned the battlecruisers as the Royal Navy’s deployable “911 force” capable of meeting both enemy battle fleets and commerce raiders on the high seas while torpedo-armed destroyers and submarines guarded British littoral waters against enemy warships and potential invasion of the British homeland.

Battlecruiser HMS Invincible exploding at the Battle of Jutland, 31 May 1916. (Wikimedia Commons)

The battlecruiser concept, as well as Fisher’s other capital ship concept the HMS Dreadnought-type, all big gun battleship, allowed him to reduce British naval costs from 1905 through 1910. Unfortunately, technology continued to advance and the strategic situation around which the battlecruisers were designed changed. Oil propulsion, bigger guns, and the ability to build larger vessels resulted in a further combination of the dreadnought battleship and the battlecruiser into the “fast battleship” concept; the first of which was the Queen Elizabeth class of 1913. This ship could travel nearly as fast as the battlecruiser, and possessed superior armament and armor to the existing battlecruiser fleet.

The strategic situation also changed. Fisher designed the battlecruiser against the known threat of French and Russian armored cruisers built to attack the British Empire’s global trade routes. The advent of the Triple Entente alliance and the emergence of the German Empire as the Royal Navy’s new, primary enemy resulted in a different employment for the battlecruisers. Germany had no fleet of commerce raiding cruisers, and built short-range battlecruisers of its own as scouting elements for its battle fleet. While some British battlecruisers remained stationed overseas in accordance with Fisher’s original concept, most were assembled in home waters as a heavy scouting arm of the battle fleet much as were their German counterparts.

The experience of war seemed to confirm the utility of the fast battleship over the battlecruiser. Although the first two battlecruisers (HMS Invincible and HMS Inflexible) found early employment as Fisher intended; hunting down and sinking German Vice Admiral von Spee’s raiding cruiser squadron, most wartime battlecruiser operations were in support of battle fleet actions in the North Sea. German battlecruisers sacrificed gun size, operational range, and habitability for survivability and were likely more robust than most of their British counterparts. Heavy British battlecruiser losses at the Battle of Jutland were probably more to do with the failure of British gunnery officers to abide by their own standing and safety orders then any inherent vulnerability of the battlecruiser type. Nonetheless, the loss of three British battlecruisers and over 3000 men with them in spectacular magazine explosions, along with the scapegoating of the class by senior operational British commanders to cover failures in tactical doctrine did much to discourage further construction. The “last battlecruiser” HMS Hood was also sunk by a magazine explosion 20 years later by the German battleship Bismarck, an event that served only to further discredit the battlecruiser concept even though Hood was over two decades old and in need of refit and modernization.

Conclusion

What do these examples suggest about the changes in capital ship design over time? Changes in national strategy can quickly make today’s ideal warship an expensive anachronism from another era. The U.S. navy monitors, the high-speed Wampanoag, and the battlecruisers were all ideal warships as conceived in support of their respective national and naval strategies. The end of the Civil War and of the Franco-Russian surface raider threat to global British shipping made all three designs obsolete to a degree. Changes in financial support to a navy can also change capital ship definitions and bring about a search for alternatives. The post-Civil War U.S. Navy funding shortage limited the applicability of coal-hungry armored or high-speed ships, and brought a nearly two-decade return of ships with significant sail propulsion. The expensive British “Two Power Standard” building program helped to drive the search for an alternative major combatant in the form of first the Dreadnought battleship and then the battlecruiser. Post World War I financial and treaty limitations of battleships in turn helped to drive the development of the aircraft carrier. Finally, technology never stands still for long, and the monitors, the Wampanoag, and the battlecruisers were all overcome in short periods of time by ships with more advanced capabilities.

What do these changes in historical capital ships suggest about designs for the “next” primary naval platforms? The British naval architect and historian David K. Brown suggested that while the aircraft carrier was always more vulnerable to attack than was the armored battleship, the flattop was able to deliver a larger and more sustained load or ordnance on an opponent as compared to even a squadron of battleships. Anything that replaces the aircraft carrier or the nuclear submarine (both have proponents that suggest they are the current capital ship,) must at least deliver a heavier, sustained combat punch than these units. The monitors and the battlecruiser were both superseded by ships that met this criterion. The aircraft carrier, by contrast, has been upgradable over time with new aircraft making it sustainable for a long period. Continued technological advances demand that any new platform be upgradable over time. The Wampanoag’s machinery was advanced, but contained wooden gears that wore down and needed a replacement over the course of one voyage. Subsequent machinery plants and other systems were more robust. The electromagnetic rail gun may be the next weapon of the next capital ship, but its barrel life must improve beyond a few hundred shots in order to be operational and tactically viable.

There is a lively debate as to what the next capital ship or system will be, but it will still likely be affected by the same financial, technological, and strategic influences that drove past capital ship changes. Any new capital ship must be capable of greater sustained ordnance delivery over time than its predecessor. Given the changes of the last decade in terms of a new era of strategic, great power competition, the rapid advance of many technologies, and financial shortfalls for many nations in terms of naval spending, the question of the next capital ship remains a healthy one open to continued debate.

Steven Wills is a retired surface warfare officer with a PhD in Military History from Ohio University. 

These views are presented in a personal capacity

References

1. Howard J. Fuller, ““A portentous spectacle”: The Monitor U.S.S. Miantonomoh Visits England, “ The International Journal of Naval History, Volume 4, No 3, December 2005, p. 8.

2. http://legal.un.org/riaa/cases/vol_XXIX/125-134.pdf

3. http://usacac.army.mil/cac2/csi/docs/Gorman/06_Retired/03_Retired_2000_11/20_09_DisruptiveTechnology_2Mar.pdf

4. Wegner, D.M.; Ratliff, C.D. (September 1998). “USS Wampanoag, 1868: Isherwood, Taylor, and the Search for Speed”. Naval Engineers Journal, pp. 19–31.

5. http://usacac.army.mil/cac2/csi/docs/Gorman/06_Retired/03_Retired_2000_11/20_09_DisruptiveTechnology_2Mar.pdf

6. David K. Brown, From Warrior to Dreadnought, Warship Development from 1860 to 1905, Barnsley, UK, Seaforth Publishing, 1997, p. 19.

Featured Image: “Congress Burning” by Tom Freeman.