All posts by Guest Author

Fighting, Fishing, and Filming: The Islamic State’s Maritime Operations

By Lucas Webber

In 2004, two US Navy personnel and one member of the Coast Guard were killed in a blast while attempting to board a boat near the Khawr Al Amaya oil terminal off Basra. Two other explosive-laden watercraft detonated nearby, though they did not cause any casualties. The attacks were later claimed by Abu Musab al-Zarqawi, the leader of Al-Qaeda in Iraq (AQI) at the time and the founding father of the Islamic State (IS) movement. Notably, the statement drew a comparison to the 2000 USS Cole bombing in Yemen, demonstrating AQI’s historical knowledge of jihadi attacks by sea and their strategic consciousness about the insurgent opportunities inherent to the maritime domain. Additionally, the statement threatened a continuance of attacks by sea, land, and air “until victory or defeat.” AQI would make good on this promise the following year, firing rockets at the Jordanian port of Aqaba and Israeli port of Eilat.

These maritime attacks were also bolstered by AQI’s river-based movements and knowledge. The historian Kimberly Kagan describes how, during the 2007 surge, AQI (then called Islamic State in Iraq) “operated almost freely in a pendulum-like arc south of Baghdad, swinging from the Euphrates to the Tigris,” adding that “they traveled southeast along the Euphrates River, often by boat, from Fallujah to Sadr al Yusufiya.”

This mode of maritime activity by IS’s organizational predecessor would continue and ultimately expand under the Islamic State. IS has proven highly adaptable and, accordingly, has sought to use geography to its advantage. In the case of Iraq and Syria, the networks have long operated along the coasts and throughout the region’s river systems. IS has traditionally exploited the maritime domain for its kinetic operations, for propaganda purposes, and, in some cases, to raise funds. To be sure, the IS movement is a primarily land-centric phenomenon, yet the propensity for maritime operations is deeply ingrained into its organizational DNA.

A screenshot portrays a group of IS fighters (Credit: Terrormonitor.com)

The Islamic State has historically been quite active along the Euphrates and Tigris, traversing throughout to move fighters, weapons, explosives, and supplies; conduct reconnaissance; prepare for and launch attacks; and strike using gunboats and boat-borne IEDs. The rivers have allowed IS fighters to avoid roads, checkpoints, and bridges. In fact, IS has even blown up such structures, including a bridge connecting Dhulueya and Balad using explosive-laden watercraft.

The Islamic State’s use of river systems was so prevalent during its high period that anti-coalition forces conducted intense airstrikes against jihadis travelling by boat. One report from 2016 stated the US and its allies had sunk over 100 IS boats up to that point, with 65 of them destroyed in a single month. The group has used barges, motorboats, and rowboats to travel around the area.

IS fishing propaganda (Credit: Weddady).

The Islamic State’s military strategy includes a significant media warfare component, and some part of this has been leveraged to weaponize the maritime domain. The Islamic State movement was early to recognize the US Navy as central to American power projection, with IS spokesman Abu Muhammad al-Adnani boasting that “Allah’s law” is “being implemented despite” the opposing military coalition’s “legions, arsenals, planes, tanks, missiles, aircraft carriers, and weapons of mass destruction.”

Further solidifying this weaponization of the maritime domain, another IS figure lamented in March 2015 that “today, Worshippers of the Cross and the infidels pollute our seas with their warships, boats, and aircraft carriers and gobble up our wealth and kill us from the sea.” The group’s supporters responded to this statement with optimism, saying IS will “take to the sea in what is only a matter of a short time,” forecasting the “creation of an Islamic fleet by the Islamic State,” and saying that an IS navy would aim to sink “warships and [commercial] ships… and to threaten their shores and lines of communication… an entire fleet, God willing, not just a single ship.”

For the Islamic State, the seas have also been viewed as a way to infiltrate the soft underbelly of Europe and to attack and invade its enemies in the West. One propagandist suggested that a Mediterranean maritime presence could “bring us closer to conquering Rome sooner rather than later.”

In a particularly notable video intended to show off the skills of its forces, fighters flaunted their amphibious capabilities by swimming in the Tigris and maneuvering in small boats.

Aside from threats, IS’s propaganda apparatus has produced photos and videos of militants paddling, fishing, selling their catches at local markets, and even scuba diving — such imagery was intended to show the serenity of life in the caliphate and the high spirits of the Islamic State’s rank and file.

Another IS fishing propaganda photo (Credit: Terrormonitor.com)

However, some of this activity served more practical purposes. As the Islamic State’s caliphate territory was rolled back by the US-led military coalition, the organization exploited the fishing industry as a source of funding. In 2016, Reuters reported about how the group turned to farming and selling fish in Iraq to finance their operations. It should be noted, though, that the Islamic State and its previous iterations had reportedly been involved in the industry since at least 2007 when AQI was fighting the Americans following their 2003 invasion.

IS-associated militants on a boat in the Lake Chad region (credit: Evan Kohlmann).

Even with the loss of land control in Iraq and Syria, IS guerrillas continue to operate along the region’s river systems. And with the organization’s international expansion and the establishment of a global network of insurgent hubs, the group’s branches, from the Sulu-Celebes Sea to the Lake Chad Basin, are more actively incorporating maritime activities into their insurgency campaigns.  

Lucas Webber is a researcher focused on geopolitics and violent non-state actors. He is cofounder editor at militantwire.com and writes a newsletter at sinosecurity.org. You can find him on Twitter: @LucasADWebber

Featured Image: Islamic State video portrays Islamic State fighters using boats to cross the Euphrates (credit: Oryx).

Gliders with Ears: A New Tool in China’s Quest for Undersea Security

By Ryan Martinson

Today, Chinese underwater gliders operate throughout the Indo-Pacific, from the Bay of Bengal to the Bering Sea, from high seas to sovereign waters. These winged, torpedo-like submersibles are being deployed in droves to collect information about the marine environment. Traveling underwater in a vertical sawtooth pattern, gliders use onboard sensors to measure characteristics of the ocean such as temperature, salinity, dissolved oxygen, and current speed at different depths to generate water column profiles. This data indirectly bolsters the capabilities of the People’s Liberation Army Navy (PLAN) by expanding its tactical understanding of the ocean environment.

Scientists and engineers based in the People’s Republic of China (PRC) are also developing a new generation of gliders that could play a far more direct role in naval combat by detecting enemy submarines. Since 2014, experts at the PLAN Submarine Academy, working with colleagues at civilian institutions, have been equipping Chinese gliders with passive acoustic sensors. Chinese language records of their activities show a determined effort to adapt this technology for anti-submarine warfare (ASW), an enduring weakness for the PLAN—one that, if remedied, could shake U.S. conventional deterrence in the Western Pacific.

Why Gliders?

The PLAN has a very difficult time detecting advanced foreign submarines within Chinese-claimed maritime space. Modern submarines are stealthy, the ocean is vast and complex, and ASW is inherently difficult—for any navy. But the stakes are especially high for China, given the perceived threat that foreign submarines pose to China’s maritime security. PRC experts often lament that China’s “underwater front door is wide open” (水下国门洞开). China’s 13th Five Year Plan for Innovation in Marine Science and Technology frankly admitted that China “still lacks the ability to resist hostile threats from the deep sea.” One PLAN analyst declared, “the threats our country faces in the maritime direction mainly come from the undersea [domain], and the main gap with the powerful enemy [the U.S.] is also in the undersea [domain].”

To shrink this capability gap, the PRC has invested heavily in new ASW capabilities for its fleet while looking to the U.S. Navy as a model. The PLAN has built ocean surveillance vessels like the USNS Effective to tow acoustic sensors designed to detect submarines. The PLAN has also procured sub-hunting maritime patrol aircraft, similar to the U.S. Navy’s P-3 “Orion,” and it may soon begin equipping the fleet with an ASW variant of the Z-20 helicopter, often described as a close copy of the MH-60 “Seahawk.”

The PRC is also taking steps to build a network of sensors, some mobile and some fixed, to detect foreign submarines in operationally important areas. Together, these sensors would constitute an “undersea alert system” (水下警戒体系). Some ASW platforms use traditional hydrophones, which only capture information about the frequency (hertz) and intensity (decibels) of sound. However, to localize the source of the sound, multiple hydrophones are often combined into an array, which can be large and unwieldy. A single vector sensor, in contrast, is capable of determining the direction of a sound source. China is very keen on pursuing a new generation of piezoelectric vector sensors, which are far smaller than previous types. Their compact size also allows their installation on much smaller platforms like underwater gliders.

Gliders move up and down in the water column by adjusting their buoyancy while their “wings” enable them to move forward at an angle. As ASW platforms, gliders offer several advantages. Due to their low power requirements, some gliders can operate at sea for months at a time. Because of the simplicity of their design, gliders are also comparatively cheap—an important attribute since they must be deployed in large numbers to be effective. Unlike fixed undersea sensors, gliders can move to where they are needed (albeit very slowly, at just about one knot). Lastly, gliders can maintain regular communications with their operators by transmitting their location (and other information) and receiving new commands when they surface at the end of a dive.

How might the PLAN use acoustic gliders? According to the PLAN researchers working on the project discussed in this article, they would be used to “complete tasks such as autonomous detection, tracking, attribute discrimination, and sending back information on moving targets in sensitive waters or areas of denial (拒止区域).” The program director, Rear Admiral Da Lianglong, likened them to a front-door “security system” (安保系统). One of his briefing slides from a 2019 presentation suggests that the PLAN intends to deploy them in the relatively quiet, deeper waters of the Philippine Sea and northern South China Sea, operationally-important areas where China lacks islands to build fixed undersea arrays.

Rear Admiral Da Lianglong with colleagues at the PLAN Submarine Academy (Source: 81.cn)

The Dolphin Project

While the advantages of gliders seem obvious, there are also many technical challenges that must be overcome before they can be used in ASW. Since 2014, the PLAN Submarine Academy, working in conjunction with scientists and engineers from Tianjin University and the Qingdao Pilot National Lab for Marine Science and Technology have methodically surmounted many of these challenges and now possess a capable prototype glider, the “Dolphin,” which has already undergone several rounds of testing in the South China Sea.

The Dolphin is based on the Haiyan glider developed by researchers at Tianjin University. Like most sea gliders, the Haiyan is a tubular robot with wings and a visible antenna. However, it is somewhat unusual in that it is equipped with a small propeller, a useful feature if needed to surface quickly in the event of a potential submarine contact. Chinese oceanographers have already deployed Haiyan gliders within the first island chain and beyond. A specially designed Haiyan variant (Haiyan-X) is capable of diving to tremendous depths, including the bottom of the Mariana Trench. Another variant (Haiyan-L) has been built for greater endurance, purportedly up to five months of continuous operations.

The Dolphin Acoustic Glider (Source: KNS.CNKI )

The Dolphin looks like a typical Haiyan glider, except for a vector sensor protruding from its nose. Within the body of the glider, forward of the batteries, is its signal processor. indicating that the platform is designed to autonomously detect, classify, and locate undersea targets, not merely to record and transmit raw data for interpretation elsewhere.

The Dolphin project is led by the Naval Undersea Warfare Environmental Research Institute (海军水下作战环境研究所) at the PLAN Submarine Academy. It is overseen by the Institute’s Director, Rear Admiral Da Lianglong, perhaps the PLAN’s most accomplished expert on undersea science and technology. Rear Admiral Da has won numerous national, provincial, and military awards for his work on how the undersea environment affects sonar performance and submarine tactics.

Under Rear Admiral Da’s leadership, the Environmental Research Institute has shrewdly leveraged civilian organizations to help advance its mission. In 2013, his institute turned its attention to vector sensors. Then, in 2016, it joined with the Qingdao Pilot National Lab for Marine Science and Technology to create the Joint Lab for Civil Military Integration in Qingdao, with Rear Admiral Da as its director. This allows the Submarine Academy to benefit from the expertise, access, and resources available to the civilian marine science community. When Xi Jinping visited the Qingdao Pilot National Lab in June 2018, he spoke about the importance of civil-military integration in marine science. Rear Admiral Da stood beaming in the audience, the embodiment of Xi’s ideal.

Milestones

The team at the Submarine Academy overcame several technical challenges to make the Dolphin a viable ASW platform including self-noise, contact localization fidelity, and overcoming the immense pressure water pressure of deep dives.

The first was self-noise. Researchers originally built the Haiyan glider for oceanographic research, where self-noise is far less of a concern. However, when detecting submarines, it is vital that an ASW platform be as quiet as possible to make it easier to distinguish the relevant signatures from other noises and thereby maximizing the signal to noise ratio. This is especially important when that signature is extremely faint, like those emitted by modern submarines.  

The Haiyan produces noise at the bottom of its dive, when a pump activates to increase buoyancy needed for the ascent. It also produces noise when the propeller engages. These noise problems, however, are simple fixes since the glider can be programmed to turn off its vector sensor during the brief periods when the pump and propeller are on. For the Chinese researchers, the real challenge was reducing the noise generated by the mechanisms used to maintain the glider’s course and attitude. Researched overcame this challenge by changing the position of the glider’s internal battery packs. Through a series of tests conducted at first in specially designed pools followed later by tests in the South China Sea, the researchers were able to optimize attitude and course adjustment mechanisms to reduce this self-noise.

Slight changes to the attitude of the glider presented a second challenge that had to be overcome: errant localization. The vector sensor receives data about the direction of a target in relationship to the attitude of the sensor at the time of detection. For this information to be tactically valuable, the glider required a tiny attitude sensor that would enable an onboard computer to locate the target relative to the surface of the ocean. Scientists at the PLAN Submarine Academy, including Da Lianglong himself, successfully developed a sensor for this purpose and it now equips the Dolphin glider.

Attitude sensor developed for the Dolphin (Source:  KNS.CNKI ).

Finally, Chinese scientists also had to develop a vector sensor that could reliably operate in the high-pressure environment of the deep ocean. Since many countries prohibit the sale of acoustic sensors to China, researchers could not simply import a foreign product. Since the early 2000s, experts at Harbin Engineering University have conducted pathbreaking research on vector sensors. The team at the Submarine Academy built off their work to develop a deep water vector sensor. In 2019, researchers tested the new sensor in the South China Sea at depths of 800 meters and 1,200 meters with promising results. That same year, Rear Admiral Da and several other colleagues at the Submarine Academy patented a vector sensor that could effectively operate down to 4,000 meters. According to their patent application, the sensor could be particularly suited for unmanned platforms like gliders “for use in submarine detection.”

Deep water vector sensor developed for the Dolphin (Source: KNS.CNKI)

Since 2018, the Dolphin has undergone multiple tests in the South China Sea, in the deep water northwest of the Paracel Islands. To date, Chinese researchers have only tested the glider’s ability to detect surface ships, which are obviously much louder than submarines. Two series of tests conducted in May and June of 2018 focused on reducing self-noise. Since then, the team has sought to refine the capabilities of the glider’s onboard systems. The most recent known tests conducted in January of 2020 offer a gauge of the Dolphin’s current capabilities. They also show the scale of the PLAN’s commitment to developing these platforms.

During the January 2020 tests, a Dolphin glider successfully tracked the movements of a 50 meter research ship (Haili) traveling at 8 knots at a maximum range of 6.5 km. As part of the same series of tests, a Dolphin glider also tracked a 60-meter merchant ship traveling at 11.7 knots at a maximum range of 11.4 km. The Dolphin also tracked the movements of a 192-meter container ship traveling at 15 knots at a maximum range of 11.2 km. Additionally, in January of 2020, a Dolphin glider tracked a 99-meter rescue and salvage ship, the Nanhaijiu 116, steaming at 14 knots at a maximum detection range of 14.4 km.

Next Steps

To be effective, a glider like the Dolphin would need to work in concert with other such platforms. A single glider would not be enough, since detection ranges will be very short and gliders are not very mobile. The PLAN will likely want to fill an operationally important area of the ocean with dozens of gliders, which will need to be coordinated to ensure efficient coverage. This will be further complicated by the fact that gliders, due to their slow speeds, are vulnerable to undersea and surface currents. Therefore, if one glider drifts out of a given area, another glider will need to move in to fill the gap. Researchers at the Submarine Academy and the Qingdao Pilot National Lab already completed simulations to address the challenge of optimizing the deployment of multiple gliders for target detection. However, these efforts have not yet been tested at sea.

Another challenge is autonomy in signal processing. Gliders will need to analyze the raw acoustic data they receive and determine if what they are “hearing” contains the signature of a target of interest. That task is fairly easy if the target is a 190-meter commercial ship traveling at 12 knots. But it becomes extremely difficult when it is a modern submarine operating at slow speed in the noisy waters of the South China Sea. Detecting and classifying targets has traditionally required humans (i.e., sonar technicians) in the loop. Developing systems that can mimic human intelligence will be vital for any autonomous ASW platform, and Chinese experts have been working on this problem for years, again, most notably at the Harbin University of Engineering. Researchers there claim they have developed unmanned platforms capable of autonomously detecting surface and undersea targets at long range and have tested them in lakes and at sea. In October 2018, the University signed a cooperative agreement with the Submarine Academy, although it remains uncertain if this will include collaboration on underwater gliders. In the meantime, researchers from the PLAN Submarine Academy and the Qingdao Pilot National Lab are proceeding with their own efforts to improve autonomy in target detection.

This relates to another huge challenge of filtering out false detections. Failing to detect an enemy submarine is bad, but declaring the presence of an enemy submarine where none exists could be potentially worse for the PLAN. It might deploy manned ASW assets to the area of false contact, wasting time and resources. Acoustic gliders will likely not be deployed for real-world operations until the PLAN is reasonably certain that onboard systems are sophisticated enough to keep false detections to an absolute minimum. In this situation, redundancy in the undersea alert system (i.e., many sensors in a given area) could help strengthen confidence in a target detection.

Conclusion

Writing in early 2013, before substantive work on acoustic gliders began in China, an expert at the 710 Research Institute boldly predicted—in his words, “without the least bit of exaggeration”—that the future development of underwater gliders would leave submarines with “no place to hide” (无处遁形). Almost ten years later, the PRC is still nowhere close to that. However, the PLAN has come a long way in a short period of time. This achievement has been made possible through a talented, dedicated, and well-funded research team at the PLAN Submarine Academy, a successful approach to civil-military integration, and institutional commitment to redressing China’s weaknesses in ASW. China now possesses a viable prototype acoustic glider that has undergone multiple rounds of testing in the South China Sea. China clearly intends to shut its “underwater front door,” and acoustic gliders will be one tool that helps it do just that.

Ryan D. Martinson is a researcher in the China Maritime Studies Institute at the Naval War College. He holds a master’s degree from the Fletcher School of Law and Diplomacy at Tufts University and a bachelor’s of science from Union College. Martinson has also studied at Fudan University, the Beijing Language and Culture University, and the Hopkins-Nanjing Center.

Featured Image: The guided-missile frigate Zhoushan (Hull 529), together with the guided-missile destroyers Taizhou (Hull 138) and Hangzhou (Hull 136), steam to designated sea area in East China Sea during a maritime training exercise in early January, 2021. (eng.chinamil.com.cn/Photo by Liu Yaxun)

Lying to Ourselves, Part One

This monograph was originally published by the Army War College under the title Lying To Ourselves: Dishonesty in the Army Profession and is republished with permission. Read it in its original form here. It deserves to be noted that the described themes and dynamics are not solely limited to the specific military service being examined.

By Dr. Leonard Wong and Dr. Stephen J. Gerras

Summary

While it has been fairly well established that the Army is quick to pass down requirements to individuals and units regardless of their ability to actually comply with the totality of the requirements, there has been very little discussion about how the Army culture has accommodated the deluge of demands on the force. This study found that many Army officers, after repeated exposure to the overwhelming demands and the associated need to put their honor on the line to verify compliance, have become ethically numb. As a result, an officer’s signature and word have become tools to maneuver through the Army bureaucracy rather than being symbols of integrity and honesty. Sadly, much of the deception that occurs in the profession of arms is encouraged and sanctioned by the military institution as subordinates are forced to prioritize which requirements will actually be done to standard and which will only be reported as done to standard. As a result, untruthfulness is surprisingly common in the U.S. military even though members of the profession are loath to admit it.

To address this problem, the authors point out that the first step toward changing this culture of dishonesty is acknowledging organizational and individual fallibilities. Until a candid exchange begins within the Army that includes recognition of the rampant duplicity, the current culture will not improve. The second recommendation calls for restraint in the propagation of requirements and compliance checks. Policies and directives from every level of headquarters should be analyzed in regard to their impact on the cumulative load on the force. Finally, the authors recommend that leaders at all levels must lead truthfully. At the highest levels, leading truthfully includes convincing uniformed and civilian senior leadership of the need to accept a degree of political risk in reducing requirements. At other levels, leading truthfully may include striving for 100 percent compliance in all areas, but being satisfied when only 85 percent is reported in some. The Army profession rests upon a bedrock of trust. This monograph attempts to bolster that trust by calling attention to the deleterious culture the Army has inadvertently created.

Lying To Ourselves: Dishonesty in the Army Profession

Secretary of Defense Chuck Hagel recently stated that he was “deeply troubled” by the latest spate of ethical scandals across the military. His spokesman, Rear Admiral John Kirby, told a news conference, “I think he’s generally concerned that there could be, at least at some level, a breakdown in ethical behavior and in the demonstration of moral courage.” He added, “He’s concerned about the health of the force and the health of the strong culture of accountability and responsibility that Americans have come to expect from their military.”1

Indeed, troubling indicators point to ethical and moral transgressions occurring across all levels of the military. In the Air Force, for example, nearly half of the nuclear missile launch officers at one base were involved with or knew about widespread cheating on an exam testing knowledge of the missile launch systems.2 In the Navy, 30 senior enlisted instructors responsible for training sailors in the operation of nuclear reactors were suspended after a sailor alerted superiors that he had been offered answers to a written test.3 In the Army, a recent promotion board looking through the evaluations of senior noncommissioned officers (NCOs) found that raters were recording deceptively taller heights in order to keep any NCO weight gain within Army height/weight standards.4 Additionally, the constant drumbeat of senior officer misconduct and ethical failings have included violations ranging from lavish personal trips at government expense to hypocritical sexual transgressions.

On one hand, scandals such as these are beneficial in that they raise visibility of the critical necessity and clear expectation of honesty and integrity in the military profession. On the other hand, such scandals are detrimental not only because they erode the internal and external trust critical to the institution of the military, but also because they encourage many in the profession to sit in judgment of a few bad apples, while firmly believing that they themselves would never lie, cheat, or steal. After all, as Secretary Hagel pointed out, “the overwhelming majority of our service members are brave, upright and honest people.”5 Dishonesty in the military, however, lies not just with the misdeeds of a few, but with the potential for deception throughout the entire military. This monograph examines how untruthfulness is surprisingly common in the military even though members of the profession are loath to admit it.

We begin by analyzing the flood of requirements experienced by military leaders and show that the military as an institution has created an environment where it is literally impossible to execute to standard all that is required. At the same time, reporting noncompliance with the requirements is seldom a viable option. As a result, the conditions are set where subordinates and units are often forced to determine which requirements will actually be done to standard and which will only be reported as done to standard. We continue by examining the effect on individuals and analyze how ethical fading and rationalizing allow individuals to convince themselves that their honor and integrity are intact despite ethical compromise. We conclude by recommending open professional dialogue on the phenomenon, institutional restraint in the proliferation of requirements, and the acceptance of risk in leading truthfully at all levels.

This monograph is not intended to be an indictment of the military profession. Instead, the subsequent pages merely argue that the military needs to introspectively examine how it might be inadvertently abetting the very behavior it deems unacceptable. We realize, though, that engaging in such a dialogue may be awkward and uncomfortable. Because the U.S. military is simultaneously a functioning organization and a practicing profession, it takes remarkable courage for a senior leader to acknowledge the gritty shortcomings and embarrassing frailties of the military as an organization in order to better the military as a profession. Such a discussion, however, is both essential and necessary for the health of the military profession.

While the phenomenon we are addressing afflicts the entire U.S. military, we focus on the U.S. Army because it is the institution with which we are most familiar. While the military profession can be broadly conceptualized to include anyone who serves in the Department of Defense (DoD), we give particular attention to the experiences of the Army officer corps. The officer corps is a bellwether for the military because, as the Armed Forces Officer points out:

“The nation expects more from the military officer: It expects a living portrayal of the highest standards of moral and ethical behavior. The expectation is neither fair nor unfair; it is a simple fact of the profession. The future of the services and the well-being of its people depend on the public perception and fact of the honor, virtue and trustworthiness of the officer corps.”6

The Deluge of Requirements

This analysis began with an exploration into the avalanche of mandatory training requirements levied throughout the Army. It has been fairly well established that the Army as an institution is quick to pass down requirements to individuals and units regardless of their ability to actually comply with the totality of the requirements. In 2001, the Army Training and Leader Development Panel noted this disturbing trend:

“Much of the Army, from the most senior levels on down, no longer follows or cannot follow the Army’s training management doctrine. The doctrine, when applied to support mission focus, prioritizes tasks and locks in training far enough out to provide predictability and allocate resources. It acknowledges that units cannot do everything because there are not enough resources, especially time. Today’s Army ignores the training doctrine.”7

In 2002, a U.S. Army War College study tallied all the training directed at company commanders and compared that total to the available number of training days. The analysis concluded that:

“In the rush by higher headquarters to incorporate every good idea into training, the total number of training days required by all mandatory training directives literally exceeds the number of training days available to company commanders. Company commanders somehow have to fit 297 days of mandatory requirements into 256 available training days.”8

More recently, in 2012 the Department of the Army Inspector General (IG) examined how units were coping with the deluge of mandatory requirements involved in the Army Force Generation (ARFORGEN) process. The IG report noted:

“At none (0 of 16) of the locations inspected were companies in the ARFORGEN process able to complete all mandatory training and administrative tasks during ARFORGEN which impacts their ability to lead effectively and take care of Soldiers.”9

Those three reports focus on the detrimental effects on training management due to the suffocating amount of mandatory requirements imposed upon units and commanders. Commanders were said to be harried and stifled as they were inundated by directives from above. Yet these reports only obliquely address a more pernicious phenomenon emerging from a culture that demands more from the profession’s members than is possible. If units and individuals are literally unable to complete the tasks placed upon them, then reports submitted upward by leaders must be either admitting noncompliance, or they must be intentionally inaccurate. Units, however, rarely have the option to report that they have not completed the ARFORGEN pre-deployment checklist. Likewise, it is not an option for individuals to decide that they will forego sexual assault prevention training this quarter because they are too busy with other tasks. If reporting noncompliance is not an acceptable alternative because of the Army’s tendency toward zero defects, then it is important to examine the resultant institutional implications.

To examine the intersection of the Army’s unbending requirements with the force’s widespread inability to comply with every directive, we looked into the experiences of officers (and some civilians) throughout the Army. We conducted discussions with scores of officers, including captains (including some from the U.S. Marine Corps) at Fort Benning, GA, and Fort Lee, VA; staff officers on the Department of Army staff in the Pentagon, Washington, DC; majors at Fort Leavenworth, KS; and former battalion and brigade commanders at Carlisle Barracks, PA.

Discussions across the force confirm, as previous reports have noted, that the requirements passed down from above far exceed the ability of units and individuals to accomplish them. A former brigade commander bluntly described the annual training requirement situation: “It’s more than you can do in one year.”10 Another officer gave more detail: “The amount of requirements, if you laid [them] down on a calendar—all the external stuff you have to do—and then how much time you have to complete [them]— it’s physically impossible!” Another officer added his perspective:

“It’s a systemic problem throughout the entire Army . . . We can probably do two or three things in a day, but if you give us 20, we’re gonna half-ass 15 and hope you ignore the other five.”

Given that it is impossible to comply with every requirement, how do units and individuals reconcile the impossible task of accomplishing all directed training with a bureaucracy that demands confirmation that every requirement was accomplished? Do they admit noncompliance? Do they submit false reports?

Before addressing these questions, it should be noted that U.S. Army officers, and members of the military profession in general, tend to have a self-image that bristles at any hint of dishonesty. Consider that according to a recent survey completed by over 20,000 members of the Army, 93 percent of respondents believed that the Army values of loyalty, duty, respect, selfless service, honor, integrity, and personal courage line up well with their own personal values.11 This apparent self-confidence in the trustworthiness of America’s warriors is also mirrored externally by American society. Each year, the Harris Poll assesses the confidence that the U.S. public has in the leaders of major American institutions. For the past decade, military leaders have been at the top of the list, with 55 percent of Americans reporting that they have a great deal of confidence in the leaders of the military. For comparison, leaders in Congress and Wall Street garnered societal confidence of only 6 percent and 7 percent, respectively, and thus occupied positions at the other end of the spectrum.12

With such a strong self-image and the reinforcing perspective of a mostly adoring American society, it is not surprising that leaders in the military profession respond with indignation at any whiff of deceit concerning directed training compliance. So, it was not unexpected for discussions with officers to begin with bold declarations such as the colonel who pointed out, “Nobody was ever asked to report something as true that was not,” or the captain who emphatically stated, “I have never given a false report. Never intentionally have I said, ‘Yes, we’re 100% on this,’ when I knew we weren’t.”

After a few minutes into the discussion (usually about 20), however, hints would inevitably emerge that there was something deeper involved in the situation. For example, one senior officer reflected upon the pressures of complying with every training directive and stated, “You find ways to qualify your answer. It’s not quibbling—it’s assuming risk.” When pressed for specifics on how they managed, officers tended to dodge the issue with statements such as, “You gotta make priorities, we met the intent, or we got creative.” Eventually words and phrases such as “hand waving, fudging, massaging, or checking the box” would surface to sugarcoat the hard reality that, in order to satisfy compliance with the surfeit of directed requirements from above, officers resort to evasion and deception. In other words, in the routine performance of their duties as leaders and commanders, U.S. Army officers lie.

Once officers conceded that they did, indeed, occasionally misrepresent the truth concerning compliance with directives, admissions tended to flow more freely. One former battalion commander commented, “We’ve always pencil-whipped training.” A captain recalled a specific example of dealing with the overwhelming requirements:

“For us, it was those little tasks that had to get done when we got returned from predeployment block leave—the number of taskings went through the roof. None [by] themselves were extremely extensive—like a 15-minute online course. The problem was getting your formation to do it with the availability of computers and then the ability to print and prove that you had taken it. So I think that some of the training got lost in translation. For a nine-man squad, they would pick the smartest dude, and he would go and take it nine times for the other members of his squad and then that way they had a certificate to prove that they had completed it.”

Another captain had a similar experience:

“I had a platoon sergeant when I first became a platoon leader, and I walked into the office and he was printing out certificates with people’s names on them. I was like, “What are you doing?” He says, “Mandatory training!” It was so accepted. It’s almost like corruption. 

Honestly Confronting Dishonesty

Dishonesty, however, is not restricted just to reports of mandatory training. While the truth is often sidestepped in reporting compliance with directed requirements, dishonesty and deception are also prevalent in many other realms of the Army. Deceit can also appear in maintenance, supply, or other official reporting. For example, one captain spoke of the deception in vehicle readiness reporting:

“I sat in a log synch and they’re like, “What’s your vehicle percentage?” I said, “I’m at 90%.” [But] if [anyone] told me to move them tomorrow, [I knew] they would all break. For months and months and months we reported up “90%, Good-to-go on vehicles!”–knowing that it didn’t matter because it carried no weight. It literally was just filling a box on a slide.”

Another captain gave an example of the half-truths commonly found in property accountability:

“We had this antenna and it had a serial number, but it was a component of the antenna. . . . We would always joke that if the Army were ever audited, and you looked at everything the Army was supposed to have, it would likely have most of it. However, would it really be of value or use or would you have a piece of plastic with a serial number that counted as an antenna? . . . We weren’t lying. We met the requirement at its minimum and that’s what we sent up. We gave them what they wanted.”

Examples of deceit also emerged in a wide variety of other areas concerning compliance with directed actions. According to a senior officer, “A command inspection is required within 90 days of company command. People don’t do it. They make it up.” One colonel spoke of inaccurate reporting following an undesirable directive: “We were asked to go to off-post housing to check on soldier quality of life. Folks were uncomfortable going so they pencil-whipped it.” In the words of another senior officer, “We have levied [on us] so many information demands that we infer that if I’m not asked specifics, they really don’t care. So I’ll just report ambiguous info.”

An officer related his experience with the Travel Risk Planning System (TRiPS) form required for soldiers going on leave or pass:

“A soldier dying on vacation because of sleep deprivation is a horrible loss. So it is absolutely something we need to mitigate. However the focus for pretty much damn [near] every soldier is, ‘Hey, I just need to get this done so I can get my leave form in and get it approved.’ So what do you do? You know what answers the survey wants. You click those answers. And it’s sad, but it’s the way it works.”

Another common (and innocuous) form of deceit in the U.S. Army officer corps concerns the evaluation reporting system. The dishonesty occurs not in the actual prose of the Officer Evaluation Report (OER)/ NCO Evaluation Report (NCOER) (although an analysis of the over-the-top hyperbole in evaluations would make an interesting study), but rather with the associated OER/NCOER Support Form. Army Regulation 623-3, Evaluation Reporting System, states that a rater must conduct an initial counseling with the rated officer/NCO within the first 30 days of the rating period, followed by additional counseling sessions every quarter. To verify compliance with this directive, the rated officer/NCO, the rater, and the senior rater must initial—or on the newest version, digitally sign—the support form.

It is the exception, not the rule, that the face-to-face counseling mandated by the regulation and verified by three members of the chain of command ever occurs. While initial counseling sessions may have a chance of being accomplished, compliance with the quarterly counseling requirement is extremely rare. Yet each year, tens of thousands of support forms are submitted with untruthful information. Interestingly, fabricating dates that the directed counseling supposedly took place is both expected and unremarkable (as long as the contrived dates do not fall on a weekend). To the average officer, it is the way business is done in the Army. Admitting that the counseling did not take place is very seldom an option. In the words of a major, “The Army would rather us make up dates saying, ‘Yes, we did it’ as opposed to saying, ‘Hey, I messed up.’”

With such widespread evidence that Army individuals and units are surrounded by a culture where deceptive information is both accepted and commonplace, we sought to examine the situation from the perspective of those who receive the flawed information. Are the recipients of the data and reports aware that the information provided to them may not be accurate? We looked to the views of civilians and officers serving on the Department of the Army staff in the Pentagon for some insights. Discussions revealed that most Army staff officers recognize that much of the data provided to them is imprecise.

When asked if units are submitting inaccurate data, one staff officer bluntly replied, “Sure, I used to do it when I was down there.” Another staff officer added, “Nobody believes the data; [senior leaders] take it with a grain of salt . . . The data isn’t valued, probably because they know the data isn’t accurate.” Another clarified, “Everyone does the best they can, but we know the data is wrong.” One officer summed up the situation, “We don’t trust our compliance data. There’s no system to track it. If we frame something as compliance, people ‘check the block.’ They will quibble and the Army staff knows it.”

Likewise, most former battalion commanders admitted that, in their roles as data receivers, many of the slides briefed to them showing 100 percent compliance or the responses given them for information requests were probably too optimistic or inaccurate. For example, one colonel described how his brigade commander needed to turn in his situation report on Friday, forcing the battalions to do theirs on Thursday, and therefore the companies submitted their data on Wednesday—necessitating the companies to describe events that had not even occurred yet. The end result was that, while the companies gave it their best shot, everyone including the battalion commander knew that the company reports were not accurate.

Meanwhile, officers at all levels admit to occasionally feeding the Army institution information that— although it is “what they want to hear”—is not totally honest. As a result, it appears that a peculiar situation emerges where both those requesting information and those supplying it know that the information is questionable. Despite the existence of this mutually agreed deception, all concerned are content to sanction and support the illusion that all is well. In the words of one Department of the Army staff officer, “The façade goes all the way up.” The façade allows the Army to continue functioning—slides are briefed as green, compliance is shown to be almost always 100 percent, and queries from Congress, DoD, or higher headquarters are answered on time.

Read Part Two.

Leonard Wong is a research professor in the Strategic Studies Institute at the U.S. Army War College. He focuses on the human and organizational dimensions of the military. He is a retired Army officer whose career includes teaching leadership at West Point and serving as an analyst for the Chief of Staff of the Army. His research has led him to locations such as Afghanistan, Iraq, Kosovo, Bosnia, and Vietnam. He has testified before Congress. Dr. Wong’s work has been highlighted in news media such as The New York Times, The Wall Street Journal, The Washington Post, New Yorker, CNN, NPR, PBS, and 60 Minutes. Dr. Wong is a professional engineer and holds a B.S. from the U.S. Military Academy and an M.S. and Ph.D. from Texas Tech University.

Stephen J. Gerras is a Professor of Behavioral Sciences in the Department of Command, Leadership, and Management at the U.S. Army War College. He served in the Army for over 25 years, including commanding a light infantry company and a transportation battalion, teaching leadership at West Point, and serving as the Chief of Operations and Agreements for the Office of Defense Cooperation in Ankara, Turkey. Colonel (Ret.) Gerras holds a B.S. from the U.S. Military Academy and an M.S. and Ph.D. in industrial and organizational psychology from Penn State University.

Endnotes

1. Rear Admiral John Kirby, Department of Defense Press Briefing, February 5, 2014, available from defense.gov/ transcripts/transcript.aspx?transcriptid=5367.

2. Helene Cooper, “Air Force Fires 9 Officers in Scandal Over Cheating on Proficiency Tests,” The New York Times, March 27, 2014, available from nytimes.com/2014/03/28/us/air-force-fires- 9-officers-accused-in-cheating-scandal.html?_r=0. (Correction: February 20, 2015. A previous version mistakenly stated that half of the missile crews in the Air Force were involved in the cheating scandal. The scandal involved half of the missile crews at one base.)

3. David S. Cloud, “Navy Investigating a Cheating Scandal of Its Own,” Los Angeles Times, February 4, 2014, available from latimes.com/nation/la-na-military-problems-20140205,0,441554. story#axzz2seN1PiPZ.

4. Jim Tice, “Too many overweight soldiers,” Army Times, August 25, 2014, pp. 18-19.

5. Kirby

6. Departments of Defense, Army, Navy, Air Force, and Marine Corps, Department of the Army Pamphlet 600-2, The Armed Forces Officer, Washington, DC: Government Printing Office, 1988, p. 2, available from apd.army.mil/pdffiles/p600_2.pdf.

7. Headquarters, Department of the Army, “The Army Training and Leader Development Panel Officer Study Report to the Army,” Washington, DC: Department of the Army, June 2001, 2-9.

8. Leonard Wong, Stifling Innovation: Developing Tomorrow’s Leaders Today, Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2002.

9. Department of the Army Inspector General Report, Disciplined Leadership and Company Administrative Requirements Inspection, Washington, DC: Department of the Army, Office of the Inspector General,

10. Unless otherwise noted, quotations are from discussions held by the authors with officers and civilians.

11. Department of the Army, Army Profession Campaign CY11 Report, Volume II, Washington, DC: Government Printing Office, January 20, 2012, p.

12. “Confidence in Congress Stays at Lowest Point in Almost Fifty Years,” Harris Interactive, May 21, 2012, available from harrisinteractive.com/NewsRoom/HarrisPolls/tabid/447/mid/1508/ articleId/1068/ctl/ReadCustom%20Default/Default.aspx.

Featured Image: (Feb. 14, 2022) Sailors man the rails aboard the Nimitz-class aircraft carrier USS Carl Vinson (CVN 70) as the ship returns to San Diego, Feb. 14, 2022. (U.S. Navy photo by Mass Communication Specialist Seaman Leon Vonguyen)

Manning the Unmanned Systems of SSN(X)

By LCDR James Landreth, USN, and LT Andrew Pfau, USN

In Forging the Apex Predator, we published the results of a new analytical model that defined the limitations and constraints for the United States Navy’s Next Generation Attack Submarine (SSN(X)) concept of operations (CONOPS) for coordinating multiple unmanned undersea vehicles (UUV). Using a Model Based Systems Engineering approach, we studied tradeoffs associated with the number of UUVs, crew complement and UUV crew work schedule. The first iteration of our analysis identified crew complement as the limiting factor in multi-UUV, or “swarm,” operations. Identifying ways to maximize UUV operations with the small footprint crew required aboard submarines is critical to future SSN(X) design. Not all potential UUV missions require continuous human operator involvement. Seafloor surveys, mine detection, and passive undersea cable monitoring for ships can all occur largely independent of human supervision. The damage to Norwegian undersea cables in late 2021, potentially caused by a UUV, hints at the critical nature of this capability for 21st century conflict.1 By identifying operations that require less human supervision, CONOPs for SSN(X) can be tailored to maximize crew and UUV employment. The requirements for training and manning the crews to employ UUVs must be part of the considerations of creating the SSN(X) program.

The submarine force needs sailors with specialized skills to maintain, operate and integrate UUVs into SSN(X) operations. Because the submarine force and the United States Navy at large lack a documented, repeatable, and formalized process for training UUV operators and maintainers, the qualitative concept and computational model presented in this article offers a bridge to scaling multi-UUV operations. The Navy needs to develop codified training and manning requirements for UUV operations and the infrastructure, both physical and intellectual, to support unmanned systems operations. The recommendations discussed here are focused on the specific use case of UUVs deployed from manned submarines.

Defining the Human Operator’s Role in “The Loop”

In order to define a strategy to man SSN(X)’s UUV mission, the submarine force must first define the possible operational and maintenance relationships between man-unmanned teams. Once the desired relationships are defined, then the relevant activities can be listed and manpower estimates can be made for each SSN(X) and for the entire fleet. The importance of this definition and the resultant estimates cannot be understated. For example, launch and recovery of a medium UUV may be seen as consistent with existing Navy Enlisted Classifications (NECs) currently required in torpedo rooms across the fleet. Novel functions like “coordination of autonomous UUV swarms” has many supporting tasks that the Navy’s education enterprise is not yet resourced to meet. Identification of the human tasks required to meet the concept of operations (CONOP) is an essential component of integrated design for SSN(X).

The original model optimized five primary variables with a number of trial configurations, and found the most critical component for maximizing the battle efficiency of SSN(X)’s UUVs was crew support. Specifically, the model identified that the human resources consumed per UUV was the limiting relationship for the UUV swarm size deployable from a single hull. The first version of the trade study varied (a) the number of UUV crews available to support UUV operations and (b) the duration of these shifts, and used a human-in-the-loop configuration, which established a 1:1 relationship between crew and UUV. In order to employ multiple UUVs at once, the model consumed additional UUV crews for each UUV operating and/or increased the length of UUV crew’s shift. This manpower intensive model quickly constrained the number of UUVs that a single hull could employ at once.

Informed by the limitations that human resources placed on SSN(X)’s UUV mission, we updated the systems model to inform the critical task of “manning the unmanned systems.” Submariners and those who support their operations know the premium placed on each additional person inside the pressure hull. Additional crew members can limit the duration of a mission whether by food consumption, bed space, or breathing too much oxygen. As a result, any CONOP that adds a significant human compliment inside the skin of SSN(X) is likely to founder. Additionally, personnel operating and maintaining the UUVs will have a specific set of training, proficiency and career pathway requirements, whose cost will scale with the complexity of the UUV system and CONOP.

The original model was based on unmanned aerial systems (UAVs) operations and followed the manning concept of Group 5 UAVs, where one pilot is consumed continuously by an armed drone. Significant differences in operating environments between UAVs and UUVs necessitate different operating models. Due to the rapid attenuation of light and electronic signals in the undersea domain, data exchange between platforms occurs at relatively low speeds over comparatively limited distances unless connected by wire. This means that the global continuous command, control and communication CONOP available to UAVs will not transfer to UUVs. Instead, SSN(X) UUV operators will control their UUVs during operations relatively close to their manned platform, where the mothership and UUVs will share the same water space during launch and recovery. Communications at longer range will occur less frequently and be status updates to the operator rather than continuous or detailed. Separating the concern about counter detection and interception of acoustic signals, communications at range is possible.2

The unique physical characteristics of the underwater domain make communications one of the most challenging aspects of multi-UUV operations.

Putting connectivity differences aside, the manpower required for this human-in-the-loop model is unnecessarily limiting for the expected UUV CONOP. Alternate models are presented in Autonomous Horizons: The Way Forward, which details the roles for three man-machine team concepts: human-in-the-loop, human-on-the-loop and human-out-of-the-loop. A human-on-the-loop scenario would allow an operator to supervise a coordinated swarm rather than a single asset. This would be less efficient than fully autonomous operation, but dramatically improve the number of UUVs a SSN(X) could deploy as a swarm. Operations performed in this control mode would be limited to those that do not present a hazard to humans but require careful supervision such as a coordinated offensive search or scanning a mine field. Finally, a human-out-of-the-loop scenario would require the fewest human resources and maximize the number of UUVs an SSN(X) could effectively employ, but its mission scope is assumed to be limited to non-kinetic activities (“shaping operations”). Figure 1 provides a visualization of how mission role and levels of autonomy impact human resource requirements.

Given the multi-mission role that SSN(X) and its UUV swarm will play, the updated model offers three man-machine team configurations that could be matched to given missions. SSN(X) requirements officers, submarine mission planners and submarine community managers must understand these man-machine configurations in order to inform SSN(X)’s human resource strategy:

  1. In-the-Loop. The authors assumed that certain missions such as weapons engagement will continue to require a human-in-the-loop architecture where a human is continuously supervising or controlling the actions of a given UUV. As such, the original model results were retained to represent these activities and provide a baseline for comparison against the two other architectures.
  2. On-the-Loop. Directed missions like coordinated search or enemy tracking that could be precursors to human-in-the-loop scenarios benefit from the supervision of a human operator. In a human-on-the-loop architecture, the UUV operator is collaborating with one or more UUVs. The UUVs operate with a degree of autonomy and prompt the operator when they require human direction. The study assumed each operator could coordinate up to 3 UUVs, though this number is a first approximation. Further experimentation might show that this number could be significantly larger.
  3. Out-of-the-Loop. In this architecture, the UUV(s) engage in fully autonomous activities. They remain receptive to commands from the operator but require no input to perform their assigned role. The study assumed that an operator could coordinate up to 18 UUVs in a fully autonomous mode.3 However, this could scale as a multiple if SSN(X) could perform simultaneous launch and recovery operations from multiple ocean interfaces.

By affording the model the scale available from on-the-loop and out-of-the-loop control modes, the predicted swarm of UUVs could easily triple the area surveyed in a 24-hour period. Detailed results of the updated model are provided in Appendix 1. The submarine force must first consider its need to generate UUV crews for SSN(X), regardless of their mode of operation. More complex UUV operations will require greater skill investment, and more actively used UUVs per hull will impose a greater maintenance burden on the crew. Figure 1 illustrates the important relationship between UUV complexity, control mode, mission role across the range of military operations.

Figure 1. Man-Machine Teaming Based on Mission Role

Current Situation Report

The Navy’s guiding document for unmanned systems, the Unmanned Campaign Framework (UCF), addresses how Type Commanders will “equip” the fleet, but the Navy should expand the UCF to include how Type Commanders will perform their “man and train” missions.4 The realities of unmanned technologies will require new training for existing rates and potentially new specialized ratings. The “man and train” demand signals will become louder as the skills required for UUV operations and maintenance grow as a function of UUV complexity5 and scale6 of operations. Establishing a central schoolhouse and formal curriculum for officer and enlisted UUV skills is a strategic imperative. As a reminder, SSN(X)’s requirements demand complex UUV operations at scale.

The Navy has organized UUVs into four primary groups based on size. Figure 2 shows the categorization of UUVs into small, medium, large and extra-large UUV (SUUV, MUUV, LUUV, and XLUUV). The current groupings are based on the ocean interface required to deploy each UUV, but as the Navy develops its UUV CONOP, the submarine force would be wise to borrow from the similar categorization of unmanned aerial vehicles (UAV) in the Joint Unmanned Aircraft Systems Minimum Training Standards.7 The five UAV groupings consider not only physical size, mission, and operational envelop but also the qualification level required of the operators. These categories will determine how each UUV category will be employed, with SUUV, MUUV and even some LUUVs able to be deployed from manned submarine motherships. The complexity and skill required to operate UUVs will also scale with size, with larger UUVs able to carry more sensors at greater endurance. These categorizations easily translate into training and manpower requirements for operations, with more training and personnel required for larger UUVs.

Figure 2: UUV System Categorization by PMS 406. Click to expand.8

Almost all of the platforms illustrated in Figure2 are currently in the experimental phase, with only a few copies of each UUV platform available for test and evaluation. At least one UUV platform, the Knifefish, is moving into low-rate initial production.9 As the Navy moves to acquire more UUVs, it will have to transition its training of sailors from an ad hoc deployment specific training to codified schoolhouses.

In line with the experimental nature of current UUVs, the units that operate and maintain UUV systems also exist in the early phases. The Unmanned Undersea Vehicle Squadron 1 (UUVRON 1), and Surface Development Squadron 1 (SURFDEVRON 1) are tasked with testing unmanned systems and developing tactics, techniques, and procedures for their operation. Task Force 59, operating in the 5th Fleet area, is the first operational Navy command that seeks to work across communities to bring unmanned assets together for testing and operations. Sailors assigned to these commands will learn many unmanned-specific skills and knowledge on the job because the skills they bring from their fleet assignments may or may not be applicable. Similar to the schoolhouse challenge, establishing maintenance centers of excellence and expanding the work of development squadrons are essential pillars of the unmanned manpower strategy.10

Preparing for the Future

The Navy must train sailors for two primary UUV tasks: operations and maintenance. While the same sailor may be trained and capable of performing both tasks on UUVs, manpower models must accommodate enough personnel to simultaneously operate UUVs while performing maintenance on one or more other UUVs.

The submarine force can examine the operational training models that exists for UAVs where the size and capabilities of the UAV determine training requirements. The Department of the Navy already provides training for a range of UAV classes and missions including: RQ-21 Blackjack, ScanEagle, MQ-4 Triton, MQ-8C Fire Scout, and a number of other joint programs of record. The UAV training requirements exist in various stages of maturity, but on average exceed UUVs by several years or even decades due to early investment by both military and civilian organizations like the Federal Aviation Administration. Requirements for UAV training vary widely based on grouping. Qualification timelines for Group 1 UAVs like small quadcopters can be measured in days. Weapons-carrying or advanced UAVs like the MQ-9 Reaper require operators who have received years of training similar to manned aircraft pilots.

The Navy, Army and Marine Corps have established military occupational designations for roles related to UAVs, including maintenance and flight operations. They have established training courses to certify service operators and maintainers for a wide variety of UAV platforms. In contrast, the Navy has yet to promulgate a plan for Navy Enlisted Classifications (NEC) or Officer Additional Qualification Designations (AQD) or establish an equivalent career field for UUV operations at a level of detail consistent with legacy warfare platforms.

In addition to evaluating the transferability of lessons learned from the UAV community, the submarine force should incorporate the lessons learned from sister UUV users in the special warfare and explosive ordinance disposal domains. These communities possess the mature UUV technology and operating procedures. The experience of these communities can accelerate the nascent domain knowledge the submarine force has already established as it builds a foundation for multi-UUV operations from SSN(X). Separate from operations, the Navy will need to be able to perform organic-level maintenance tasks on UUVs at sea such as replacing circuit cards, swapping sensor packages, or maintaining propulsion units. Given SSN(X)’s heavy weapons payload requirements, an unmaintained UUV occupying a weapon’s stow will limit its intended multi-mission nature. The Navy will need to train its work force for these maintenance tasks. Just as importantly, UUVs will have to be designed for maintainability, so that basic components can be repaired or replaced at sea.

Manpower Models

However the Navy chooses to train sailors to operate and maintain UUVs, community managers will face a different set of choices when it comes to the organization and manning. There are two different models the Navy primarily uses to organize and man similar units supporting unmanned operations: directly assign sailors with the required skills to operational units or create specialized UUV detachments located in major homeports that then augment deploying units.

The most integrated model would be direct manning of submarines with sailors possessing the NEC or AQD certifying skill in operation and maintenance of UUVs. Each unit would have the number of billets necessary to meet manpower requirements and these sailors would be part of the crew, getting underway and performing duties other than those directly related to UUVs, even when UUVs are not onboard. This model would ensure continuous integration of UUV experts with the rest of the crew. While the crew may gain more knowledge from these experts, the experts may face challenges maintaining their expertise based on the needs of a given deployment. The most significant challenge to maintaining skills will be the availability of UUVs on every submarine and time at sea to practice operations.

The detachment model offers an arguably more proficient set of operators to a deploying unit, but can cause secondary impacts to warfighting culture. The Information Warfare Community (IWC) efficiently supports current submarine operations via the detachment model for certain technical operations. IWC “riders” are welcome compliments for important missions, but the augment nature means that the hosting submarine does not necessarily fully integrate the “rider’s” culture and knowledge into its own. If the submarine force adopted this model, a UUVRON at fleet concentration areas like Groton or Pearl Harbor would have administrative responsibility for sailors with the technical skills to maintain and operate UUVs. These sailors form into detachments and deploy to submarines to conduct operations while deployed. This model requires fewer personnel than a direct manning model, and these sailors will likely become more proficient in UUV operations. However, the rest of the submarine crew (and thus the force as a whole) would become less familiar with UUV operations without a permanent presence of expert sailors.

Both of the direct assignment and detachment manning models have advantages and drawbacks. Quantitatively, the submarine force must assign priorities and human resource availability to the variables within the trade space. Qualitatively, the Navy must determine how tightly UUV operators will be coupled to deploying units, and whether the detachment model can establish the desired UUV culture across the fleet.

Conclusion

Despite the unmanned moniker, UUVs will still require skilled humans to maintain and operate them. SSN(X) requirements officers, mission planners and community managers must provide early input into the types of autonomous missions SSN(X) UUVs will perform and the corresponding skill level required of sailors. To succeed, decision makers can compare the model provided in this article with existing programs of record’s training and certification requirements for UAVs. The submarine force must adopt a framework of training requirements that scales to UUV size and capability, and that framework must include whether UUV sailors will come from specialized detachments like current-day IWC riders or be integrated members of the crew. As the Navy moves UUVs from the test and evaluation to deployment phases and formalizes requirements for SSN(X), skilled sailors must be already in the fleet, ready to receive and operate these systems.

Lieutenant Commander James Landreth, P.E., is a submarine officer in the Navy Reserves and a civilian acquisition professional for the Department of the Navy. He is a graduate of the U.S. Naval Academy (B.S.) and the University of South Carolina (M.Eng.). The views and opinions expressed here are his own.

Lieutenant Andrew Pfau, USN, is a submariner serving as an instructor at the U.S. Naval Academy. He is a graduate of the Naval Postgraduate School and the U. S. Naval Academy. The views and opinions expressed here are his own.


Appendix 1: Data Comparison between System Optimized for Human-In-the-Loop versus On-the-Loop and Out-of-the-Loop Optima

 

# UUV # Crew Miles Scanned per 24 hrs Utilization
8 4 240 0.25
7 4 240 0.29
6 4 240 0.33
5 4 240 0.4
4 4 240 0.5
3 4 240 0.67
2 3 165 0.69

Table 5. Sample Analysis Results Optimized for Man-in-the-Loop (1:1)

 

# UUV # Crew Crew OPTEMPO UUV Charging Bays Charges per Day Miles Scanned per 24 hrs Utilization Notes ↑↓
8 4 0.5 2 0.33 659 0.69 2.75x ↑ in miles scanned; 2.76x ↑ in utilization
7 4 0.5 2 0.33 577 0.69 2.4x ↑ in miles scanned; 2.37x ↑ in utilization
6 4 0.5 2 0.33 494 0.69 2.06x ↑ in miles scanned; 2.1x ↑ in utilization
5 4 0.5 2 0.33 412 0.69 1.72x ↑ in miles scanned; 1.7x ↑ in utilization
4 4 0.5 2 0.33 330 0.69 1.72x ↑ in miles scanned; 1.7x ↑ in utilization
3 4 0.5 2 0.33 247 0.69 1.03x ↑ in miles scanned; 1.03x ↑ in utilization
2 3 0.5 2 0.33 165 0.69 No change

Table 6. Sample Analysis Results for On-the-Loop (3:1) vs Man-in-the-Loop Optima

# UUV # Crew Crew OPTEMPO UUV Charging Bays Charges per Day Miles Scanned per 24 hrs Utilization Notes
8 4 0.5 2 0.33 659 0.69 No change
7 4 0.5 2 0.33 577 0.69 No change
6 3 0.5 2 0.33 494 0.69 Same output with 1 fewer crew
5 3 0.5 2 0.33 412 0.69 Same output with 1 fewer crew
4 2 0.5 2 0.33 330 0.69 Same output with 2 fewer crew
3 2 0.5 2 0.33 247 0.69 Same output with 2 fewer crew
2 2 0.5 2 0.33 165 0.69 Same output with 1 fewer crew

Table 7. Sample Analysis Results for On-the-Loop (3:1) Re-Optimized

 

# UUV # Crew Miles Scanned per 24 hrs Utilization
8 4 659 0.69
7 4 577 0.69
6 4 494 0.69
5 4 412 0.69
4 4 330 0.69
3 4 247 0.69
2 3 165 0.69
8 2 659 0.69
7 2 577 0.69
6 2 494 0.69
5 2 412 0.69
4 2 330 0.69
3 2 247 0.69
2 2 165 0.69

Table 8. Sample Analysis Results for Out-Of-the-Loop (18:1) vs In-the-Loop Optimal. The same performance metrics of miles scanned and utilization rates are achieved with only 2 crews for the same UUV configurations.

Appendix 2: Analysis Constraint Equations

The following equations were used to develop a reusable parametric model. The model was developed in Cameo Systems Modeler version 19.0 Service Pack 3 with ParaMagic 18.0 using the Systems Modeling Language (SysML). The model was coupled with Matlab 2021a via the Symbolic Math Toolkit plug-in. This model is available to share with interested U.S. Government parties via any XMI compatible modeling environment.

Equation 7b. Crew Availability Equation introduces a new variable called “Number of UUV Managed per Crew.” This variable represents an evolution from the first version of this study, which limited an individual crew and its UUV to a 1:1 relationship. Equation 7a. Crew Availability Equation used in the first version calculations is included for comparison.

Equation 1. Scanning Equation

Equation 2. System Availability Equation

Equation 3. UUV Availability Equation

Equation 4. UUV Duty Cycle Equation

Equation 5. Day Sensor Availability Equation

Equation 6. Night Sensor Availability Equation

Equation 7a. Crew Availability Equation

Equation 7b. Crew Availability Equation

Equation 8. Charge Availability Equation

Equation 9. Utilization Score

Endnotes

1. Thomas Newdick, “Undersea Cable Connecting Norway with Arctic Satellite Station has been Mysteriously Severed”, The War Zone, Jan 10, 2022, online: https://www.thedrive.com/the-war-zone/43828/undersea-cable-connecting-norway-with-arctic-satellite-station-has-been-mysteriously-severed

2. Milica Stojanovic, “On the Relationship Between Capacity and Distance in Underwater Acoustic Communication Channel”, ACM SIGMOBILE Mobile Computing and Communications Review, Vol 11, Issue 4, Oct 2007. Online: https://doi.org/10.1145/1347364.1347373

3. The basis for 18 was that the deployment and recovery of each UUV would consume approximately 4 hours in an anticipated 72-hour UUV mission (72:4 reduces to 18:1).

4. Department of the Navy, “Unmanned Campaign Framework,” Washington, D.C., March, 2021 https://www.navy.mil/Portals/1/Strategic/20210315%20Unmanned%20Campaign_Final_LowRes.pdf?ver=LtCZ-BPlWki6vCBTdgtDMA%3D%3D

5. Complexity refers to the technical sophistication of each UUV and/or the difficulty of executing a mission within a realistic battle space

6. Scale refers to the number of UUVs in a coordinated UUV operation

7. Joint Staff, “Joint Unmanned Aircraft Systems Minimum Training Standards (CJCSI 3255.01, CH1),” Washington, D.C., September 2012

8. Slide 2 of briefing by Captain Pete Small, Program Manager, Unmanned Maritime Systems (PMS 406), entitled “Unmanned Maritime Systems Update,” January 15, 2019, accessed Oct 22, 2021, at https://www.navsea.navy.mil/Portals/103/Documents/Exhibits/SNA2019/UnmannedMaritimeSys-Small.pdf?ver=

9. Edward Lundquist, “General Dynamics Moves Knifefish Production to New UUV Center of Excellence,” Seapower Magazine, August 19, 2021, https://seapowermagazine.org/general-dynamics-moves-knifefish-production-to-new-uuv-center-of-excellence/

10. The end of 2021 saw initial operating capability for Task Force 59 in the 5th Fleet area of operations, which was the first unmanned Task Force of its kind.

Featured Image: BEAUFORT SEA, Arctic Circle (March 5, 2022) – Virginia-class attack submarine USS Illinois (SSN 786) surfaces in the Beaufort Sea March 5, 2022, kicking off Ice Exercise (ICEX) 2022. (U.S. Navy photo by Mike Demello)