All posts by Guest Author

Announcing the DC Lightning Rounds Lineup

By Scott Cheney-Peters

The last gasps of DC’s humid summer means it’s time for CIMSEC’s Summer Lightning Rounds: 5 minute presentations by CIMSEC members on their current work in the maritime security world or maritime security challenges they’re grappling with. Join us in the back of the Barracks Row staple The Ugly Mug to mingle, hear the following fine folks sharing a bit of their interests or work from across the maritime spectrum, or consider discussing a bit of your own:

Timothy Walton
Heather Havens
B. A. Friedman
Wilder Alejandro Sanchez
Elizabeth Mitchell
Katie Burkhart
Mike McEleney
Elsa Kania
James Hasik
Sam Bendett
Harry Krejsa
John “Patsy” Klein
Justin Goldman
Gina Fiore
Joe McReynolds
And more!

If you’re interested in participating as a presenter or would like to RSVP, please contact [email protected]. All are welcome.

Time: Thursday, 28 Sep, 6:00-8:00pm; presentations will begin approximately 6:30.

Place: The Ugly Mug 723 8th St SE (Eastern Market Metro stop on the Blue/Orange/Silver Line)

The Ugly Mug First Look 09.20.16. Photo Credit: Nicholas Karlin www.nicholaskarlin.com

 

 

 

 

 

 

 

Chinese Warplanes: Combat Aircraft and Units of the Chinese Air Force and Naval Aviation

Andreas Rupprecht and Tom Cooper. Modern Chinese Warplanes: Combat Aircraft and Units of the Chinese Air Force and Naval Aviation. Houston: Harpia Publishing, 2012. 256pp. $64.95

By Lieutenant Commander David Barr, USN

Over the past two decades, the term “modernization” has been widely used by foreign affairs experts, military and political leaders, and intelligence analysts to describe the startling rapidity of the Chinese military’s rise from an arguably primitive force to one of the most technologically-advanced militaries in the world. In his article, “China: A Threat or a Challenge: Its Air Power Potential”, Indian Air Marshall RS Bedi describes modernization as “a dynamic process to keep abreast with the latest” (Bedi, p3). By applying lessons learned from its military actions against U.S. forces during the Korean War and observations made during later conflicts such as Operation Desert Shield/Desert Storm, NATO operations in the Balkans, and Operations Enduring Freedom and Iraqi Freedom, the PLA have kept abreast of the significant role of airpower in modern warfare. Accordingly, both the People’s Liberation Army Air Force (PLAAF) and People’s Liberation Army Naval Air Force (PLANAF) have quickly progressed through this “dynamic process” and have emerged as a force capable of countering American and regional neighbor land- and sea-based airpower, including aircraft carriers, cruise missiles, and long-range bombers. Via informative writing and a litany of glorious, colored and black & white photographs, Modern Chinese Warplanes leads readers along the PLA air forces’ progressive path toward today’s modernized force. Chock full of vivid and informative photographs, readers are immediately transfixed. To invoke a classic adage, if a picture speaks a thousand words, then even a cursory flip through the pages reveals a stunning, photographic summary and leaves the reader eager to investigate the accompanying text.

The first chapter of Modern Chinese Warplanes is dedicated to describing the origins, progressions, and even setbacks of both the PLAAF and the PLANAF, thus providing succinct yet informative context toward understanding how remarkable the modernization of China’s air forces has been. Although the PLAAF and PLANAF were established in 1949 and 1952 respectively, it could be argued that the modernization of today’s force was born from the compelling wake-up call presented to Chinese Communist Party (CCP) and People’s Liberation Army (PLA) leadership during the 1991 U.S.-led military operations in Iraq. Using Rupprecht and Cooper’s description, U.S. operations in Iraq “shocked the PLA into the realization that it had to become capable of engaging in high-tech warfare or otherwise face the certainty of falling ever further behind other modern militaries.” This marked a momentous shift in Chinese national military strategy and the subsequent 1993 issuance of the “The Military Strategic Guidelines for the New Period” by the CCP and PLA. Thus, if 1993 can be considered the start of China’s current military modernization period, the mere 24-year rise in military capabilities of the PLA, arguably now on par with the world’s leading military forces, is even more remarkable.

After Chapter 1’s useful historical context, Rupprecht and Cooper use Chapters 2 through 6 to succinctly present the book’s stated objective: to provide “a summary of the Chinese air arms as they are today, what equipment they operate, and how this equipment is organized.” Chapters two and three both describe and illustrate China’s modern combat aircraft, combat support aircraft, and associated armament. Chapter two’s introductory pages aptly describe Chinese aviation nomenclature and unique designations but then seemingly gloss over China’s numerous aircraft manufacturing companies. Admittedly this area is outside the scope of Modern Chinese Warplanes; however, readers seeking additional information regarding Chinese aircraft manufacturing companies would benefit by combining this book with The Chinese Air Force; Evolving Concepts, Roles, and Capabilities by National Defense University Press (Hallion). The remainder of Chapters two and three however, present information that is well-researched and effectively organized into an almost encyclopedic presentation of each aircraft’s unique characteristics, performance parameters, and weaponry. The vibrant pictures and charts are wonderfully placed and provide ample relevance. An especially intriguing inclusion within Chapter 2, especially to military analysts and aircraft enthusiasts, is the sections entitled “Future” at the conclusion of each aircraft’s narrative. These paragraphs provide the reader with tantalizing hints regarding future aircraft developments, variants, and designations – details that would need to be expounded upon in a possible update. Additionally, Chapter four provides a highly-informative explanation of PLA aircraft markings and serial number systems – information neither readily available nor widely understood.

The only thing going against Modern Chinese Warplanes is time, for today the term “modern,” as the book’s title implies, is especially fleeting regarding the modernization of the Chinese military and its air forces. Since the book’s 2012 publication date, further reflected in the 2012 Order of Battle in chapters five and six, numerous changes have occurred within China’s political and military structures that, if the authors and publisher do not address, will quickly render this book irrelevant: In November 2012, Xi Jinping assumed China’s presidency and chairmanship of the Central Military Commission (CMC), quickly embarking on a campaign to reorganize the PLA, including restructuring the existing military regions. This effort was realized in February 2016 as the seven military regions described in Modern Chinese Warplanes were reorganized into five theater commands – a reorganization which also affected the subordinate command structures (Wuthnow). Additionally, in 2013–2014, China initiated substantial dredging and land reclamation projects in the Spratly and Paracel Islands.

These efforts continued, despite international backlash and in the face of a ruling by an international tribunal in The Hague in July 2016 which officially stated that China’s expansive claim to sovereignty over the waters of the South China Sea (SCS) had no legal basis. Today, these projects have resulted in three highly-functional artificial islands which are strategically located in the southern portion of the SCS and are fully capable of hosting Chinese military aircraft (Kyodo). Furthermore and more specifically, the PLA has accelerated its 4th and 5th-generation aircraft and armament development programs; therefore, many of the programs or technologies only hinted at within the pages of Modern Chinese Warplanes such as the Chengdu J-20 stealth fighter, Shenyang J-15 aircraft carrier-based fighter, and the Xian Y-20 heavy transport aircraft have rapidly progressed to the point of entering service in the PLAAF and/or PLANAF (Adams).

Finally, the PLA continues to initiate or expand military aviation and armament developmental programs. Modern Chinese Warplanes needs to be updated to further reflect the ongoing advances in PLAAF and PLANAF aviation platforms and technologies such as the Shenyang J-31 “Gyrfalcon”/”Falcon Hawk” stealth fighter (Fisher), the CJ-20 long-range land-attack cruise missile (LACM), and the YJ-12 long-range anti-ship cruise missile (ASCM) (Roblin).

In Modern Chinese Warplanes, the authors do not dive deep into foreign affairs or military strategy, nor do they embark on theorizing on how the aircraft are or will be operationally integrated into the PLA – foreign affairs experts, military analysts, and political strategists will find little usefulness here. Readers seeking to expand into air power operational integration would benefit by also reading Chapter five of China’s Near Seas Combat Capabilities by Peter Dutton, Andrew Erickson, and Ryan Martinson (Dutton). However, military analysts, history buffs, and even aircraft model aficionados will discover a wonderful and colorful addition to their collection – as a quick reference or an immersive interlude – likely resulting in many dog-eared pages. For any military enthusiast looking to expand his or her knowledge of modern Chinese aviation, this book is certainly a handy reference; however, it should not stand on its own but rather serve as a springboard toward additional research. If not already in the works, this reader personally hopes the authors and publisher collaborate and embark on revised editions that includes updated information and equally stunning photographs so that the 2012 version of Modern Chinese Warplanes will not be lost to the annals of time but rather, much like the PLA itself, will continue “in a process of sustained reform and modernization.”  

LCDR David Barr is a career intelligence officer and currently within the Directorate for Intelligence and Information Operations for U.S. Pacific Fleet. His opinions do not represent those of the U.S. Government, Department of Defense, or the Department of the Navy.

References

Adams, Eric. “China’s New Fighter Jet Can’t Touch the US Planes It Rips Off”; Wired; 07 NOV 2016. https://www.wired.com/2016/11/china-j-20-fighter-jet/

Bedi, R.S. “China: A Threat or a Challenge:  Its Air Power Potential”; Indian Defense Review; 08 March 2017. http://www.indiandefencereview.com/print/?print_post_id=35227

Dutton, Peter, Andrew S. Erickson, and Ryan Martinson. China’s Near Seas Combat Capabilities. Newport: U.S. Naval War College; China Maritime Studies, 2014.

Fisher, Richard D Jr. “New details emerge on Shenyang FC-31 fifth-generation export fighter”; IHS Jane’s Defence Weekly; 09 NOV 2016. http://www.janes.com/article/65359/new-details-emerge-on-shenyang-fc-31-fifth-generation-export-fighter

Hallion, Richard, P., Roger Cliff, and Phillip C. Saunders. The Chinese Air Force: Evolving Concepts, Roles, and Capabilities. Washington, D.C.: National Defense University Press, 2012.

Kyodo News. “China tests 2 more airfields in South China Sea”; posted 14 July 2016. http://news.abs-cbn.com/overseas/07/14/16/china-tests-2-more-airfields-in-south-china-sea

Roblin, Sebastien. “China’s H-6 Bomber: Everything You Want to Know about Beijing’s ‘B-52’ Circling Taiwan”; The National Interest; 18 DEC 2016. http://nationalinterest.org/blog/the-buzz/chinas-h-6-bomber-everything-you-want-know-about-beijings-b-18772

Rupprecht, Andreas, and Tom Cooper. Modern Chinese Warplanes: Combat Aircraft and Units of the Chinese Air Force and Naval Aviation. Houston: Harpia Publishing, 2012.

Wuthnow, Joel and Phillip C. Saunders. “Chinese Military Reform in the Age of Xi Jinping: Drivers, Challenges, and Implications”; National Defense University Press; March 2017. http://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/ChinaPerspectives-10.pdf?ver=2017-03-21-152018-430

Featured Image: A J-31 stealth fighter (background) of the Chinese People’s Liberation Army Air Force lands on a runway after a flying performance at the 10th China International Aviation and Aerospace Exhibition in Zhuhai, Guangdong province, in this November 11, 2014 file photo. (Reuters/Alex Lee)

Finding New Ways to Fight, Pt. 1

How the Mad Foxes of Patrol Squadron FIVE are harnessing their most powerful resource – their people – in an effort to cut inefficiencies and improve productivity.

By Kenneth Flannery with Jared Wilhelm

The U.S. Military Academy’s Modern War Institute recently published a thorough primer by ML Cavanaugh on what it means to drive innovation in the military. The most important takeaway was the large difference between the simple buzzword “innovation,” and the people who actually do the dirty work of driving positive change – oft-cited as “innovation”– within the force: “defense entrepreneurs.” This series focuses on an operational U.S. Navy Maritime Patrol Squadron that is full of defense entrepreneurs, and how their unit is taking the “innovation imperative” from on high and translating it to the deckplate level. Part 1 focuses on the “Why? Who? And How?”; Part 2 reveals observed institutional barriers, challenges, and a how-to that other units could use to adapt the model to their own units. 

The Innovation Imperative

Today, the U.S. Navy remains the most powerful seafaring force the world has ever known, but there is nothing destined about that position. To maintain this superior posture, we must find leverage that allows us to maintain an edge over our adversaries. One of our most powerful levers in the past has been our economy. We were once able to maintain supremacy simply by outspending our rivals on research, development and sheer production. While the United States still has the largest military budget of any nation, that budget is increasingly stretched to counter threats in a dizzying array of locales to include the South China Sea, Arabian Gulf, or even an increasingly vulnerable Arctic. Additionally, the rest of the world is catching up economically. Some assessments indicate that China will have the largest economy in the world by 2030 and they are already producing their own domestically-built aircraft carriers. It isn’t just China on our economic heels; by 2050 the United States could have slid to third place behind India as well. Finally, our adversaries’ continual embrace of technological theft and espionage involving some of our most expensive proprietary platforms has shrunk the technological gap that the U.S. enjoyed for multiple decades. These realities make it clear that the U.S. must find a new way to counter opponents besides technological advantage.

Much like the Obama administration’s “Pivot to Asia,” the Department of Defense is experiencing what some might call a “Pivot to Innovation.” Former Secretary of Defense Chuck Hagel’s “Defense Innovation Initiative” and Third Offset Strategy both signal a reinvigorated focus on maintaining and advancing our military superiority over both unconventional actors and near-peer competitors alike. 

In alignment with Chief of Naval Operations Admiral John Richardson’s intent, VP-5 is investing time and manpower in the idea that that new counterweight will be the innovative ideas of our Sailors. Just as nuclear weapons and advancements like stealth and Global Positioning Systems kept the U.S. military on top during the conflicts of the Cold War and Post-Cold War eras, it will be our ability to rapidly assess challenges and implement solutions that will guarantee our security in the future. This will require a reimagining of how we currently operate and how we are organized. Our squadron believes the key to this revolution lies with its junior enlisted and junior officer ranks.

Tapping the Innovative Ideas of the Everyday “Doers”

VP-5 is taking a multi-pronged approach to molding an innovation-friendly climate to best tap the ideas of those accomplishing the mission on a daily basis. Patrol Squadron FIVE (VP-5) is currently experimenting with a dedicated Innovation Department in our command structure, but this isn’t the first time that the squadron has embraced change to maintain the technological and fighting advantage over adversaries. The unit is based at the U.S. Navy’s Master Anti-submarine Warfare facility at Naval Air Station Jacksonville, FL, where we became the second squadron Fleet-wide to transition from the P-3C Orion to the P-8A Poseidon aircraft. This successful transition was based on new training and simulation technologies, but also on a rich history that spans from our founding in 1937 to involvement in World War II, Kennedy’s blockade of Cuba during the Cold War, the Balkan Conflict, and our recent involvement in the Middle East. Throughout this time, we have used no less than five different types of Maritime Patrol Aircraft.

VP-5 Mad Foxes
The VP-5 Mad Foxes. Courtesy Ken Flannery

Just as the transition in 1948 from the PBY-5A to the PV-2 brought new tools to the squadron’s warfighting capabilities, today we are augmenting the new technologies of the P-8A with a change to our organizational structure and business practices. A traditional operational naval aviation command administers a standard set of departments including Operations, Training, Safety/NATOPS (Standardization), and Maintenance. By implementing a new Innovation Department led by a warfare-qualified pilot or Naval Flight Officer lieutenant (O-3), VP-5 seeks to elevate the innovation construct to a position alongside the traditional departments required for squadron mission accomplishment. In addition to the lieutenant department head, the Innovation group is staffed by an additional lieutenant and a Senior Chief. Its mission statement reads:

“Lead Naval Aviation in accomplishing our mission by sustaining a culture based on process improvement and disruptive thinking. The force that knows the desired outcome, measures progress in real time, and adapts processes to overcome barriers has a sustainable advantage over adversaries who tolerate their deficiencies. Similarly, the force that can innovate transforms the battlespace to their advantage.”

The establishment of the Innovation Department sends a strong signal to the department heads and the senior enlisted that innovation is a priority, but it may not necessarily trickle down to the average junior enlisted Sailor that VP-5 is a different type of squadron. To ensure the culture reaches everyone, we have implemented large “Innovation Whiteboards” throughout the squadron and encourage all members to post ideas and suggestions. Sailors can see what others have posted and leave reactions of their own. Similar to the “CO’s Sticky Note Board” on the USS Benfold (DDG 65), the ideas written on the whiteboards are then compiled for further action by the Innovation Department.

Whether an idea has been generated via a whiteboard or suggested by means of a more traditional route, the next step in the process is to create a “Swarm Cell.” Swarm Cells are small groups of people that aim to rapidly implement solutions to the problem being addressed. These groups follow a predetermined set of procedures that begin with specifying the desired output. Starting with a clear description of the end result discourages the Cell from veering off course or diluting their product with superfluous features that do little to help the original problem. The Swarm Cells then move to address the actual problem or process for which they were created, all the while making sure that their efforts lead them toward the desired output. Next, the Cells measure their progress to decide if the desired output has been achieved. From there, the members of the group can choose to share their knowledge or revisit their solutions if they have determined that they have not met their output goals.

These Swarm Cells are not on an innovation island. The squadron strives to provide support and guidance for those working to realize their ideas and provides each Swarm Cell with an Innovation Accelerator. This Accelerator may be an official member of the Innovation Department, but is not necessarily so. If the Swarm Cell is like the train conductor, deciding the destination and exactly how fast to get there, the Innovation Accelerator is the train track, allowing room for minor deviations, but keeping the train on course to its final goal. Accelerators need not be intimately involved with the minutiae of their Swarm Cells, and as such may be facilitating two or three different Cells concurrently. By asking simple questions the Accelerator can refocus the team:

1. Has the Cell outlined a clearly defined output?
2. Is the Cell working to achieve that vision, or have they allowed distractions to creep in?
3. Are they continually measuring their progress along the way?

Again, in VP-5 innovation belongs to everyone. Sailors of all ranks and pedigrees are encouraged and expected to turn a critical eye to established procedures in an effort to push our squadron into the twenty-first century. However, change for the sake of change is not one of our objectives. To guard against this, the product or design is subjected to an internal Shark Tank once each Swarm Cell is sufficiently satisfied with their work. These Shark Tank events are open to all hands and are designed to prod for weak spots in the proposal and introduce the idea to the whole team. The Swarm Cell’s program or improvement is critiqued from every angle to determine its overall benefit and structural integrity. These sessions are designed to be thorough in order to weed out underdeveloped initiatives or those that may not provide a quantifiable benefit. If a program passes muster, it continues in whatever form is appropriate, whether that is a new or revised squadron instruction or perhaps a meeting further up the chain of command.

Meaningful Results

Our modest foray into innovation has already begun to bear fruit. One of the most promising results of the innovation process has been the development of a dedicated command smartphone application called Quarterdeck. What started as a search for a better way to communicate has blossomed into a robust “app” which boasts capability far beyond that which was initially envisioned. Currently available on the Droid and Apple App stores, the application meets or exceeds DoD information assurance requirements and includes features like flight schedule postings and peer-to-peer instant messaging, among many others. Thanks to motivated junior officers who attended the 2016 Aviation Mission Support Tactical Advancements for the Next Generation (TANG) at Defense Innovation Unit Experimental (DIUx) in Silicon Valley, the Adobe Company is now conducting market research, has shown interest in acquiring the hosting rights for the app, and is currently developing a professional version based on the VP-5 prototype.

The application developed by the Mad Foxes’ Innovation Department. (Courtesy Ken Flannery)

Another of our most promising innovation programs appeared to be headed toward realization before being dismissed due to concerns about running afoul of the Program Management Aviation (PMA) office. The plan was to implement an Electronic Flight Bag (EFB) to replace the existing system of paper flight publications. This innovation would use tablet computers and digital flight publication subscriptions to save each squadron approximately $17,000 annually. PMA is currently developing a parallel program, but the estimated fleet delivery date was still at least a year away at the time our project was initiated. Our program would be able to deliver tablets within months. Every detail of the program had been meticulously researched, and drew heavily upon long established, similar programs used by the airlines.

The EFB program was widely supported among VP-5 junior officers, Fleet Replacement Squadron instructors, our own CO and XO, reserve unit squadrons manned by commercial airline pilots, and even had the interest of Commander, Patrol and Reconnaissance Group (CPRG). Unfortunately, information security concerns rooted in a risk averse culture combined with the lack of official approval from higher authorities halted the project prior to purchase. Even though our organic EFB proposal was not accepted, our efforts to address the issue sparked broader interest and pressured PMA to move up its timeline. It is a testament to the power of this innovation process that it could conceive and develop a product that rivaled a parallel effort of the standard acquisition pipeline and a regular program office. Tablets are now forecast to be delivered to the fleet by the end of this year.

Other achievements include a redesign of the Petty Officer Indoctrination course, a Command Volunteer Service Day suggested, planned, and led by an E-3, and an “Aircrew Olympics” which pitted two combat aircrews against each other in a variety of mission-related tasks. These ideas were all generated and executed from within the junior enlisted ranks.

Conclusion

We do not intend to suggest that a smartphone application or volunteer service holds the key to dismantling Kim Jong-Un’s nuclear program or China’s grip on the South China Sea. What we are trying to do is develop a framework in which creative solutions can be cultivated. Not every idea is going to be a grand slam, but before you can hit a grand slam you have to get people on base. The most important point we’ve learned is that the ideas are out there, we can cultivate them, and we’ve so far proven that we have “defense entrepreneurs” that can see these innovative ideas through from the white boards to implementation.

Formalizing an innovation process within a squadron is a new way of doing things and this new approach has been met with a variety of challenges. From stubborn, bureaucratic restrictions to “innovation stagnation,” the innovation construct at VP-5 has faced hurdles along the way and been forced to adapt. In the next installment of this series, we will explore some of these obstacles and describe the ways in which the Innovation Department has evolved as a result.

Lieutenant Ken Flannery is a P-8A Poseidon Instructor Tactical Coordinator at Patrol Squadron FIVE (VP-5). He may be contacted at [email protected].

Lieutenant Commander Jared Wilhelm is the Operations Officer at Unmanned Patrol Squadron One Nine (VUP-19), a P-3C Orion Instructor Pilot and a 2014 Department of Defense Olmsted Scholar. Hey may be contacted at [email protected]

Featured Image: A P-8 assigned to VP-5 (U.S. Navy photo)

Harvesting the Electromagnetic Bycatch

By Tim McGeehan

Most Navy bridge watchstanders have had the experience of adjusting their surface-search radar to eliminate sea clutter or rain. In relation to the task of detecting surface ships, these artifacts represent “noise,” just as when one tunes out unwanted transmissions or static to improve radio communications.

However, information can be gleaned indirectly from unintentionally received signals such as these to yield details about the operating environment, and it may reveal the presence, capabilities, and even intent of an adversary. This “electromagnetic bycatch” is a potential gold mine for the Navy’s information warfare community (IWC) in its drive to achieve battlespace awareness, and represents a largely untapped source of competitive advantage in the Navy’s execution of electromagnetic maneuver warfare (EMW).

Electromagnetic Bycatch

The term electromagnetic bycatch describes signals that Navy sensors receive unintentionally. These signals are not the intended target of the sensors and usually are disregarded as noise. This is analogous to the bycatch of the commercial fishing industry, defined as “fish which are harvested in a fishery, but which are not sold or kept for personal use, and includes economic discards [edible but not commercially viable for the local market] and regulatory discards [prohibited to keep based on species, sex, or size].”1

The amount of fisheries bycatch is significant, with annual global estimates reaching twenty million tons.2 Navy sensor systems also receive a significant volume of bycatch, as evidenced by efforts to drive down false-alarm rates, operator training to recognize and discard artifacts on system displays, and the extensive use of processing algorithms to filter and clean sensor data and extract the desired signal. Noise in the sensor’s internal components may necessitate some of this processing, but many algorithms aim to remove artifacts from outside the sensor (i.e., the sensor is detecting some sort of phenomenon in addition to the targeted one).

U.S. and international efforts are underway to reduce fishing bycatch by using more-selective fishing gear and methods.3 Likewise, there are efforts to reduce electromagnetic bycatch, with modifications to Navy sensors and processing algorithms via new installations, patches, and upgrades. However, it is unlikely that either form of bycatch ever will be eliminated completely. Recognition of this within the fishing industry has given rise to innovative efforts such as Alaska’s “bycatch to food banks” program that allows fishermen to donate their bycatch to feed the hungry instead of discarding it at sea.4 This begs the question: Can the Navy repurpose its electromagnetic bycatch too?

The answer is yes. Navy leaders have called for innovative ideas to help meet twenty-first century challenges, and do to so in a constrained fiscal environment. At the Sea-Air-Space Symposium in 2015, Admiral Jonathan W. Greenert, then-Chief of Naval Operations, called for the Navy to reuse and repurpose what it already has on hand.5 Past materiel examples include converting ballistic-missile submarines to guided-missile submarines; converting Alaska-class tankers to expeditionary transfer docks (ESDs), then to expeditionary mobile bases (ESBs); and, more recently, repurposing the SM-6 missile from an anti-air to an anti-surface and anti-ballistic missile role.6 However, the Navy needs to go even further, extending this mindset from the materiel world to the realm of raw sensor data to repurpose electromagnetic bycatch.

Over The River and To The Moon

The potential value of bycatch that U.S. fisheries alone discard exceeds one billion dollars annually (for context, the annual U.S. fisheries catch is valued at about five billion dollars).7 Likewise, the Navy previously has found high-value signals in its electromagnetic bycatch.

In 1922, Albert Taylor and Leo Young, two engineers working at the Naval Aircraft Radio Laboratory in Washington, DC, were exploring the use of high-frequency waves as new communication channels for the Navy. They deployed their equipment on the two sides of the Potomac River and observed the communication signals between them. Soon the signals began to fade in and out slowly. The engineers realized that the source of the interference was ships moving past on the river.8 Taylor forwarded a letter to the Bureau of Engineering that described a proposed application of this discovery:

If it is possible to detect, with stations one half mile apart, the passage of a wooden vessel, it is believed that with suitable parabolic reflectors at transmitter and receiver, using a concentrated instead of a diffused beam, the passage of vessels, particularly of steel vessels (warships) could be noted at much greater distances. Possibly an arrangement could be worked out whereby destroyers located on a line a number of miles apart could be immediately aware of the passage of an enemy vessel between any two destroyers in the line, irrespective of fog, darkness or smoke screen. It is impossible to say whether this idea is a practical one at the present stage of the work, but it seems worthy of investigation.9

However, this appeal fell on deaf ears; the idea was not considered worthy of additional study. Later, in 1930, after it was demonstrated that aircraft also could be detected, the newly formed Naval Research Laboratory (NRL) moved forward and developed the early pulsed radio detection systems whose successors are still in use today.10 What started as degradations in radio communication signals (owing to objects blocking the propagation path) evolved to being the signal of interest itself. Today that bycatch is used extensively for revealing the presence of adversaries, navigating safely, and enforcing the speed limit. It is known as RAdio Detection And Ranging, or simply by its acronym: RADAR.

Notebook entry of James H. Trexler, dated 28 January 1945, showing calculations for a long-distance communications link between Los Angeles, California, and Washington, D.C., via the Moon. (Courtesy of the Naval Research Laboratory)

During World War II, Navy radar and radio receivers became increasingly sensitive and began picking up stray signals from around the world. Instead of discarding these signals, the Navy set out to collect them. The NRL Radio Division had been investigating this phenomenon since the mid-1920s, and in 1945 NRL established a Countermeasures Branch, which had an interest in gathering random signals arriving via these “anomalous propagation” paths.11 By 1947, it had erected antennas at its Washington, DC, field site to intercept anomalous signals from Europe and the Soviet Union.12 Just the year before, the Army Signal Corps had detected radio waves bounced off the moon. The convergence of these events set the stage for one of the most innovative operations of the Cold War.

NRL engineer James Trexler, a member of the Countermeasures Branch, advocated exploiting the moon-bounce phenomenon for electronic intelligence (ELINT). He outlined his idea in a 1948 notebook entry:

From the RCM [Radio Counter Measures] point of view this system hold[s] promise as a communication and radar intercept device for signals that cannot be studied at close range where normal propagation is possible. It might be well to point out that many radars are very close to the theoretical possibility of contacting the Moon (the MEW [actually BMEWS, for Ballistic Missile Early Warning System] for example) and hence the practicability of building a system capable of intercepting these systems by reflections from the Moon is not beyond the realm of possibility.13

Trexler’s idea addressed a particular intelligence gap, namely the parameters of air- and missile-defense radars located deep within the Soviet border. With an understanding of these parameters, the capabilities of the systems could be inferred. This was information of strategic importance. As friendly ground and airborne collection systems could not achieve the required proximity to intercept these particular radar signals, the moon-bounce method provided a way ahead. All that was required was for both the Soviet radar and the distant collection site to have the moon in view at the same time. What followed were NRL’s Passive Moon Relay experiments (known as PAMOR) and ultimately the Intelligence Community’s Moon Bounce ELINT program, which enjoyed long success at collecting intelligence on multiple Soviet systems.14

Around this time, the Navy grew concerned about ionospheric disturbances that affected long-range communications.15 So the service employed the new moon-bounce propagation path to yield another Navy capability, the communications moon relay. This enabled reliable communications between Washington, DC, and Hawaii, and later the capability to communicate to ships at sea.16 Thus, what started as bycatch led to a search for the sources of stray signals, revealed adversary air- and missile-defense capabilities, and ultimately led to new communications capabilities for the Navy.

Extracting the Electromagnetic Terrain

Signals in the electromagnetic spectrum do not propagate in straight lines. Rather, they refract or bend on the basis of their frequency and variations in the atmospheric properties of humidity, temperature, and pressure. Signals can encounter conditions that direct them upward into space, bend them downward over the horizon, or trap them in ducts that act as wave guides. Knowing this electromagnetic terrain is critical to success in EMW, and can prove instrumental in countering adversary anti-access/area-denial capabilities.

Variation in electromagnetic propagation paths can lead to shortened or extended radar and communications ranges. Depending on the mission and the situation, this can be an advantage or a vulnerability. Shortened ranges may lead to holes or blind spots in radar coverage. This information could drive a decision for an alternate laydown of forces to mitigate these blind spots. It also could aid spectrum management, allowing multiple users of the same frequency to operate in closer proximity without affecting one another. Alternatively, extended radar ranges can allow one to “see” farther, pushing out the range at which one can detect, classify, and identify contacts. Signals of interest could be collected from more distant emitters. However, the adversary also can take advantage of extended ranges and detect friendly forces at a greater distance via radar, or passively collect friendly emissions. Identifying this situation could prompt one to sector, reduce power, or secure the emitter.

As the weather constantly changes, so too does signal propagation and the resultant benefit or vulnerability. Understanding these effects is critical to making informed decisions on managing emitters and balancing sensor coverage against the signature presented to the adversary. However, all these applications rely on sufficient meteorological data, which typically is sparse in space and time. More frequent and more distributed atmospheric sampling would give the U.S. Navy more-complete awareness of changing conditions and increase its competitive advantage.

Luckily, Navy radar sensors already collect a meteorological bycatch. Normally it is filtered out as noise, but emerging systems can extract it. The Hazardous Weather Detection and Display Capability (HWDDC) is a system that takes a passive tap from the output of the SPS-48 air-search radar (located on most big-deck amphibious ships and carriers) and repurposes it like a Doppler weather radar.17 Besides providing real-time weather information to support operations and flight safety, it can stream data to the Fleet Numerical Meteorology and Oceanography Center in Monterey, California, to feed atmospheric models. With this data, the models can generate better weather forecasts and drive electromagnetic propagation models for prediction of radar and communications-system performance.18 The Tactical Environmental Processor (TEP) will perform the same function by extracting atmospheric data from the SPY-1 radar.19

By passively using the existing radar feeds, HWDDC and TEP provide new capabilities while avoiding additional requirements for power, space, frequency deconfliction, and overall system integration that would be associated with adding a new radar, antenna, or weather sensor. There also is the potential to extract refractivity data from the radar returns of sea clutter.20 The multitude of radar platforms in the Navy’s inventory represents an untapped opportunity to conduct “through the sensor” environmental data collection in support of battlespace awareness.

Likewise, the Global Positioning System (GPS) also collects meteorological bycatch. As GPS signals pass through the atmosphere, they are affected by the presence of water vapor, leading to errors in positioning. The receiver or processing software makes corrections, modeling the water vapor effect to compensate, thereby obtaining accurate receiver positions. However, water vapor is a key meteorological variable. If the receiver location is already known, the error can be analyzed to extract information about the water vapor, and by using multiple receivers, its three-dimensional distribution can be reconstructed.21 Instead of dumping the bycatch of water vapor, it can be (and is) assimilated into numerical weather prediction models for improved short-range (three-, six-, and twelve-hour) precipitation forecasts.22

Do Not Adjust Your Set

There is also great potential to harvest bycatch from routine broadcast signals. While a traditional radar system emits its own pulse of energy that bounces back to indicate the presence of an object, passive systems take advantage of signals already present in the environment, such as television and radio broadcasts or even signals from cell towers or GPS.23 These signals propagate, encounter objects, and reflect off. This leads to the “multipath effect,” in which a transmitted signal bounces off different objects, then arrives at the same receiver at slightly different times owing to the varied distances traveled. (This is what used to cause the “ghost” effect on television, in which an old image seemed to remain on screen momentarily even as the new image was displayed.) Variations in this effect can be used to infer the presence or movement of an object that was reflecting the signals.

In a related concept, “multistatic” systems collect these reflections with multiple, geographically separated receivers, then process the signals to detect, locate, and track these objects in real time.24 These systems have proved effective. In a 2002 demonstration, Lockheed Martin’s Silent Sentry system tracked all the air traffic over Washington, DC, using only FM radio and television signal echoes.25 More recently, another passive system went beyond simple tracking and actually classified a contact as a small, single-propeller aircraft by using ambient FM radio signals to determine its propeller rotation rate.26 This level of detail, combined with maneuvering behavior, operating profiles, and deviations from associated pattern-of-life trends, could even give clues to adversary intent.

Passive radar systems have many advantages. They emit no energy of their own, which increases their survivability because they do not reveal friendly platform location and are not susceptible to anti-radiation weapons. They do not add to a crowded spectrum, nor do they need to be deconflicted from other systems because of electromagnetic interference. The receivers can be mounted on multiple fixed or mobile platforms. Technological advances in processing and computing power have taken much of the guesswork out of using passive systems by automating correlation and identification. Moving forward, there is great potential to leverage radar-like passive detection systems.

That being said, operators of the passive radar systems described may require extensive training to achieve proficiency. Even though the systems are algorithm- and processing-intensive, they may require a significant level of operator interaction to select the best signals to use and to reconfigure the network of receivers continually, particularly in a dynamic combat environment when various broadcasts begin to go offline. Likewise, the acquisition, distribution, placement, and management of the many receivers for multistatic systems (and their associated communications links) is a fundamental departure from the traditional employment of radar, and will require new concepts of operations and doctrine for employment and optimization. These efforts could be informed by ongoing work or lessons learned from the surface warfare community’s “distributed lethality” concept, which also involves managing dispersed platforms and capabilities.27

Challenges and Opportunities

Among the services, the Navy in particular has the potential to gain much from harvesting the electromagnetic bycatch. During war or peace, the Navy operates forward around the world, providing it unique access to many remote locations that are particularly sparse on data. Use of ships provides significant dwell time on station without requiring basing rights. Navy platforms tend to be sensor intensive, and so provide the means for extensive data collection. This extends from automated, routine meteorological observations that feed near-term forecasts and long-term environmental databases to preconflict intelligence-gathering applications that include mapping out indigenous signals for passive systems to use later.28 The mobility of Navy platforms allows for multiple units to be brought to bear, scaling up the effect to create increased capacity when necessary.

However, there are many challenges to overcome. The Navy soon may find itself “swimming in sensors and drowning in data”; managing this information will require careful consideration.29 Returning to the fishing analogy, to avoid wasting bycatch fishermen need to identify what they have caught in their nets, find someone who can use it, temporarily store it, transport it back to port, and get it to the customer before it spoils. Likewise, the Navy needs to dig into the sensor data and figure out exactly what extra information it has gathered, identify possible applications, determine how to store it, transfer it to customers, and exploit it while it is still actionable.

This hinges most on the identification of electromagnetic bycatch in the first place. As automation increases, sensor feeds should be monitored continuously for anomalies. Besides serving to notify operators when feeds are running outside normal parameters, such anomalous data streams should be archived and analyzed periodically by the scientists and engineers of the relevant systems command (SYSCOM) to determine the presence, nature, and identity of unexpected signals. Once a signal is identified, the SYSCOM team would need to cast a wide net to determine whether the signal has a possible application, with priority given to satisfying existing information needs, intelligence requirements, and science and technology objectives.30 

History has shown that this is a nontrivial task; remember that the original discovery and proposed application of radar were dismissed. If the unplanned signal is determined to have no current use, it should be noted for possible future exploitation. Subsequent sensor upgrades, algorithm improvements, and software patches then should strive to eliminate the signal from future incidental collection. If there is potential value in the incidental signal, upgrades, algorithms, and patches should optimize its continued reception along with the original signal via the same sensor, or possibly even demonstrate a requirement for a new sensor optimized for the new signal. The identified uses for the electromagnetic bycatch will drive the follow-on considerations of what and how much data to store for later exploitation and what data needs to be offloaded immediately within the limited bandwidth owing to its value or time sensitivity.

The analogy to fisheries bycatch also raises a regulatory aspect. Much as a fisherman may find that he has caught a prohibited catch (possibly even an endangered species) that he cannot retain, the same holds true for electromagnetic bycatch. It is possible that an incidental signal might reveal information about U.S. citizens or entities. Once the signal is identified, intelligence oversight (IO) requirements would drive subsequent actions. Navy IO programs regulate all Navy intelligence activities, operations, and programs, ensuring that they function in compliance with applicable U.S. laws, directives, and policies.31 IO requirements likely would force the SYSCOM to alter the sensor’s mode of operation or develop upgrades, algorithms, and patches to avoid future collection of the signal.

The Role of the Information Warfare Community

The Navy’s IWC is ideally suited to play a key role in responding to these challenges. Its personnel have experience across the diverse disciplines of intelligence, cryptology, electronic warfare, meteorology and oceanography (METOC), communications, and space operations, and assembling these different viewpoints might reveal instances in which one group can use another’s bycatch for a completely different application. IWC officers now come together to make connections and exchange expertise in formal settings such as the Information Warfare Basic Course and the Information Warfare Officer Milestone and Department Head Course. Further cross-pollination is increasing owing to the cross-detailing of officers among commands of different designators. Recent reorganization of carrier strike group staffs under the Information Warfare Commander construct has increased and institutionalized collaboration in operational settings. Restructuring has trickled down even to the platform level, where, for example, the METOC division has been realigned under the Intelligence Department across the carrier force. As a net result of these changes, the IWC has a unique opportunity to have new eyes looking at the flows of sensor data, providing warfighter perspectives in addition to the SYSCOM sensor review described above.

The Navy also can capitalize on the collective IWC’s extensive experience and expertise with issues pertaining to data collection, processing, transport, bandwidth management, archiving, and exploitation. Furthermore, the different components of the IWC share a SYSCOM (the Space and Naval Warfare Systems Command, or SPAWAR); a resource sponsor (OPNAV N2/N6); a type commander (Navy Information Forces); a warfighting-development center (the Navy Information Warfighting Development Center); and a training group (the Navy Information Warfare Training Group will be established by the end of 2017). This positions the IWC to collaborate across the doctrine, organization, training, materiel, leadership and education, personnel, and facilities  (DOTMLPF) spectrum. This will support shared ideas and unified approaches regarding the employment of emerging capabilities such as the machine-learning and “big-data” analytics that will sift through future electromagnetic bycatch. Ultimately, the members of the IWC can forge a unified way forward to develop the next generation of sensors, data assimilators, and processors.

Conclusion

While the Navy might not recognize exactly what it has, its sensors are collecting significant amounts of electromagnetic bycatch. The Navy’s forward presence positions it to collect volumes of unique data with untold potential. The associated electromagnetic bycatch is being used now, previously has yielded game-changing capabilities, and could do so again with future applications. Instead of stripping and discarding it during data processing, the Navy needs to take an objective look at what it can salvage and repurpose to gain competitive advantage. The fishing bycatch dumped every year could feed millions of people; the Navy needs to use its electromagnetic bycatch to feed new capabilities. Don’t dump it!

Tim McGeehan is a U.S. Navy Officer currently serving in Washington.  

The ideas presented are those of the author alone and do not reflect the views of the Department of the Navy or Department of Defense.

[1] Magnuson-Stevens Fishery Conservation and Management Act of 1976, 16 U.S.C. § 1802 (2) (1976), available at www.law.cornell.edu/.

[2] United Nations, International Guidelines on Bycatch Management and Reduction of Discards (Rome: Food and Agriculture Organization, 2011), p. 2, available at www.fao.org/.

[3] Ibid., p. 13; Lee R. Benaka et al., eds., U.S. National Bycatch Report First Edition Update 1 (Silver Spring, MD: NOAA National Marine Fisheries Service, December 2013), available at www.st.nmfs.noaa.gov/.

[4] Laine Welch, “Gulf Bycatch Will Help Feed the Hungry,” Alaska Dispatch News, June 4, 2011, www.adn.com/; Laine Welch, “Bycatch to Food Banks Outgrows Its Beginnings,” Alaska Fish Radio, August 3, 2016, www.alaskafishradio.com/.

[5] Sydney J. Freedberg Jr., “Tablets & Tomahawks: Navy, Marines Scramble to Innovate,” Breaking Defense, April 13, 2015, breakingdefense.com/.

[6] Sam Lagrone, “SECDEF Carter Confirms Navy Developing Supersonic Anti-Ship Missile for Cruisers, Destroyers,” USNI News, February 4, 2016, news.usni.org/; Missile Defense Agency, “MDA Conducts SM-6 MRBM Intercept Test,” news release, December 14, 2016, www.mda.mil/.

[7] Amanda Keledjian et al., “Wasted Cash: The Price of Waste in the U.S. Fishing Industry,” Oceana (2014), p. 1, available at oceana.org/.

[8] David Kite Allison, New Eye for the Navy: The Origin of Radar at the Naval Research Laboratory, NRL Report 8466 (Washington, DC: Naval Research Laboratory, 1981), p. 39, available at www.dtic.mil/.

[9] Ibid, p. 40.

[10] “Development of the Radar Principle,” U.S. Naval Research Laboratory, n.d., www.nrl.navy.mil/.

[11] David K. van Keuren, “Moon in Their Eyes: Moon Communication Relay at the Naval Research Laboratory, 1951–1962,” in Beyond the Ionosphere, ed. Andrew J. Butrica (Washington, DC: NASA History Office, 1995), available at history.nasa.gov/.

[12] Ibid.

[13] Ibid.

[14] Frank Eliot, “Moon Bounce ELINT,” Central Intelligence Agency, July 2, 1996, www.cia.gov/.

[15] Van Keuren, “Moon in Their Eyes.”

[16] Pennsylvania State Univ., From the Sea to the Stars: A Chronicle of the U.S. Navy’s Space and Space-Related Activities, 1944–2009 (State College, PA: Applied Research Laboratory, 2010), available at edocs.nps.edu/; Van Keuren, “Moon in Their Eyes.”

[17] SPAWAR Systems Center Pacific, “Hazardous Weather Detection & Display Capability (HWDDC),” news release, n.d., www.public.navy.mil/; Timothy Maese et al., “Hazardous Weather Detection and Display Capability for US Navy Ships” (paper presented at the 87th annual meeting of the American Meteorological Society, San Antonio, TX, January 16, 2007), available at ams.confex.com/.

[18] Tim Maese and Randy Case, “Extracting Weather Data from a Hybrid PAR” (presentation, Second National Symposium on Multifunction Phased Array Radar, Norman, OK, November 18, 2009), available at bcisensors.com/.

[19] Hank Owen, “Tactical Environmental Processor At-Sea Demonstration,” DTIC, 1998, www.handle.dtic.mil/.

[20] Ted Rogers, “Refractivity-from-Clutter,” DTIC, 2012, www.dtic.mil/.

[21] Richard B. Langley, “Innovation: Better Weather Prediction Using GPS,” GPS World, July 1, 2010, gpsworld.com/.

[22] Steven Businger, “Applications of GPS in Meteorology” (presentation, CGSIC Regional Meeting, Honolulu, HI, June 23–24, 2009), available at www.gps.gov/; Tracy Lorraine Smith et al., “Short-Range Forecast Impact from Assimilation of GPS-IPW Observations into the Rapid Update Cycle,” Monthly Weather Review 135 (August 2007),  available at journals.ametsoc.org/; Hans-Stefan Bauer et al., “Operational Assimilation of GPS Slant Path Delay Measurements into the MM5 4DVAR System,” Tellus A 63 (2011), available at onlinelibrary.wiley.com/.

[23] Lockheed Martin Corp., “Lockheed Martin Announces ‘Silent Sentry(TM)’ Surveillance System; Passive System Uses TV-Radio Signals to Detect, Track Airborne Objects,” PR Newswire, October 12, 1998, www.prnewswire.com/; Otis Port, “Super-Radar, Done Dirt Cheap,” Bloomberg, October 20, 2003, www.bloomberg.com/.

[24] Lockheed Martin Corp., “Silent Sentry: Innovative Technology for Passive, Persistent Surveillance,” news release, 2005, available at www.mobileradar.org/.

[25] Port, “Super-Radar, Done Dirt Cheap.”

[26] F. D. V. Maasdorp et al., “Simulation and Measurement of Propeller Modulation Using FM Broadcast Band Commensal Radar,” Electronics Letters 49, no. 23 (November 2013), pp. 1481–82, available at ieeexplore.ieee.org/.

[27] Thomas Rowden [Vice Adm., USN], Peter Gumataotao [Rear Adm., USN], and Peter Fanta [Rear Adm., USN], “Distributed Lethality,” U.S. Naval Institute Proceedings 141/1/1,343 (January 2015), available at www.usni.org/.

[28] “Automated Shipboard Weather Observation System,” Office of Naval Research, n.d., www.onr.navy.mil/.

[29] Stew Magnuson, “Military ‘Swimming in Sensors and Drowning in Data,’” National Defense, January 2010; www.nationaldefensemagazine.org/.

[30] U.S. Navy Dept., Naval Science and Technology Strategy: Innovations for the Future Force (Arlington, VA: Office of Naval Research, 2015), available at www.navy.mil/.

[31] “Intelligence Oversight Division,” Department of the Navy, Office of Inspector General, n.d., www.secnav.navy.mil/.

Featured Image: ARABIAN GULF (March 4, 2016) Electronics Technician 3rd Class Jordan Issler conducts maintenance on a radar aboard aircraft carrier USS Harry S. Truman (CVN 75). (U.S. Navy photo by Mass Communication Specialist 3rd Class Justin R. Pacheco/Released)