All posts by Guest Author

Seabed Mining: The Coast Guard’s Deep Future

By Kyle Cregge

What if the final frontier is much closer to home? From SpaceX to Space Force, many groups are seeking to dominate space in an era of Great Power Competition and commercialization. Yet for all the time humans have looked up, a far murkier domain below remains largely unexplored. The deep-sea and seabed remain less understood than our near abroad in space and yet contain myriad natural resources which have yet to be tapped. Beyond the familiar reserves of hydrocarbons, there are metallic nodules and crusts spread across the seabed, resting beneath national exclusive economic zones (EEZs) and claimed continental shelves, as well as below the high seas.

China, meanwhile, maintains a near-monopoly on the rare-earth metals that sustain the modern global economy and regularly leverages these key resources through coercive bilateral sanctions. Amidst these challenges, the private sector and public investment of many other nations will likely turn to the seabed to diversify their supply chains.  Environmental risks, scientific opportunities, and assent to untested international law remain open questions in these extractive ventures, but seabed mining is coming regardless. The US Coast Guard’s similar and enduring missions around maritime resource extraction make it well-suited to enforce domestic and international law in this expanding industry. The service should prepare for seabed mining by engaging with allies and partners and by supporting scientific research and environmental protection.

The Opportunity of Seabed Mining

Deep seabed mining is generally defined as extracting resources below a depth of 200 meters, such as the deep-sea polymetallic nodules first recorded by the HMS Challenger Expedition of 1872-1876.1 Private citizens and companies have intermittently attempted to capitalize on the potato-sized concretions over the past 150 years. These ambitions even served as the elaborate cover story between Howard Hughes and the CIA for the ship Glomar Explorer and the plan to recover the sunken Soviet submarine K-129 off the coast of Hawaii in 1974.2 More recently, the multinational firm Nautilus Minerals went bankrupt in 2019 following a decade’s worth of planning and investment to drill off the coast of Papua New Guinea for copper, gold, silver, and zinc contained within seafloor massive sulfide (SMS) deposits.3 Despite the legal and financial trouble Nautilus Minerals encountered, the bounty from mining the seabed will continue to encourage innovation and investment. While estimates vary, proposals have put the potential annual contributions of the deep-sea mining industry to the US economy at up to $1 trillion, and the value of all gold deposits alone worth up to $150 trillion.4 Compared to the value of US commercial fisheries – $5.6 billion in 2018 – seabed mining could be orders of magnitude more profitable.5

As part of its coercive economic diplomacy, China has selectively complicated foreign supply chains through export restrictions on rare earth metals.Long a recognized strength for China, former leader Deng Xiaoping stated in 1992, “The Middle East has oil. China has rare earths,” and his assessment has only continued to bear out to today. The communist nation currently supplies 95% of the global rare earths output and has used its virtual monopoly as a thinly-veiled economic weapon during diplomatic disputes with Japan, South Korea, and the Philippines in the last decade.7  The US imports up to 80% of its rare earths from China. Those resources feed into critical defense systems like guided missiles, lasers, and fighters like the F-35 Lightning II, which requires up to 920 pounds of rare earths during the production of each aircraft.8 The F-35 is currently in use or on order by fifteen countries that are currently European or Indo-Pacific partners or allies of the United States.9 Expanding beyond the single aircraft system, deliberately reduced rare earth exports could threaten each of these nation’s military modernizations. Whether for profit or supply chain preservation, America and its allies will likely look to the seabed to help meet these demands.

Why the Coast Guard?

Seabed mining requires a coordinated surface support infrastructure akin to hydrocarbon exploration and extraction, which is an oversight role the Coast Guard knows well. Robot tractors, unmanned underwater vehicles (UUVs), and other seafloor collectors will mine from seamounts or collect nodules deep below,10 feeding those resources up through a flexible riser pipe for refinement and processing, while a return pipe feeds the non-desired sediment and waste back to the seafloor.11 Barges and bulk carriers will then receive the collected seabed resources from the production support vessel and transfer them back to a port of call for further use. Additional remotely-operated vehicles (ROVs) will be launched from commercial ships on the surface to provide seabed surveillance, conduct scientific research, and monitor environmental impacts as part of the broader operation.

Just like the Coast Guard’s presence missions for domestic fisheries, cutters will represent US mining interests within and beyond the nation’s exclusive economic zone (EEZ), though some national rights to seabed resources reach out to the extended continental shelf (ECS).  As the Vision to Combat Illegal, Unregulated, or Unlawful (IUU) Fishing states:

The U.S. Coast Guard has been the lead agency in the United States for at-sea enforcement of living marine resource laws for more than 150 years. As the only agency with the infrastructure and authority to project a law enforcement presence throughout the 3.36 million square mile U.S. EEZ and in key areas of the high seas, the U.S. Coast Guard is uniquely positioned to combat IUU fishing and uphold the rule of law at sea.12

While seabed resources are not living, domestic and international law similarly govern their extraction – and mining will require the same sort of maritime regulation. American domestic justification follows from the 1980 Deep Seabed Hard Mineral Resource Act (DSHMRA), which claimed the right of the US to mine the seabed in international waters, and specifically identifies the Coast Guard as responsible for enforcement.13

International Law and Engagement

Internationally, the Coast Guard will face the same problem the US Navy does with its freedom of navigation operations in places like the South China Sea. Through the presence of its surface vessels, the services seek to reinforce the United Nations Convention on the Law of the Sea (UNCLOS) as reflecting customary international law, while the US is not itself a party to the treaty. The US Senate has thus far avoided treaty ratification to avoid potentially surrendering sovereignty around seabed mining regulation to the International Seabed Authority (ISA), based in Kingston, Jamaica.14, 15

Formed in 1994, the organization retains responsibility under the United Nations for administering “The Area,” of the seabed beyond any nation’s EEZ.16  Because the US is a non-party state to UNCLOS and an observer, vice member, of the ISA, US companies must either pursue mining operations through another sponsor state under the ISA regime or operate outside the ISA’s purview based on US domestic law interpreted within the framework of UNCLOS. These complications are not the Coast Guard’s fault, nor is the service responsible to necessarily fix them. But given the intersection of maritime law enforcement, commercial resource extraction, and the desire for non-military engagement, the Coast Guard is far better suited than the US Navy in a “seabed maritime presence” role.   

The seabed is likely the next domain for competition over a “free and open Indo-Pacific,” and a “rules-based international order.” Among the most challenging in a future seabed competition would be China and Russia, states that have already used lawfare in the South China Sea and Arctic regions respectively to pursue their territorial gains. The two great powers may use the same playbook in the deep sea both in practice and through the ISA. The ISA has authorized 30 total contracts for exploration in The Area, and 16 are within the Clarion-Clipperton Zone (CCZ). The CCZ is a vast plain spanning over 3,000 miles of the central Pacific Ocean southeast of Hawaii which contains a vast supply of polymetallic nodules. Two separate Chinese and Russian companies have each received 15-year contracts from the ISA for 75,000 square kilometer areas for future exploration, in addition to areas on the Southwest Indian Ridge and Western Pacific for China specifically.17  No nation has yet indicated a serious move to begin commercial exploitation in The Area, but as the technology matures, China may seek to extend its rare earths monopoly and start mining throughout the Indo-Pacific.

While the US has claimed four tracks within the CCZ under its domestic law, it too has not yet begun commercial exploration.18 Yet there are numerous opportunities for theater engagement and for ensuring seabed mining practices are in accordance with international regulations. The Coast Guard’s enduring support to allies and partners for fisheries enforcement should naturally be mirrored to the seabed – particularly for Pacific nations. Many of the same island nations and territories working on IUU fishing are evaluating deep-sea mining ventures to stimulate their economies within their EEZs and out into the CCZ. 

The Pacific island nations Nauru, Papua New Guinea, Tonga, Fiji, Vanuatu, the Solomon Islands, and the Cook Islands all have active seabed licenses to explore within their EEZs. For US allies and partners, six of the top nine largest national EEZs are western or democratic nations, with a total area larger than the continent of Asia.19 This presents a vast potential bounty for seabed mining.  With its long history working with international coastal forces, the Coast Guard remains the most capable service to demonstrate American commitment to a rules-based international order across various future seabed mining ventures.

Preserving the Seabed Environment

The Coast Guard’s responsibility to support and enforce proper seabed mining will also be a natural outgrowth of its other enduring missions to support scientific research and environmental protection. As it has done with polar icebreaker missions, the Coast Guard routinely explores new domains with scientists and experts on board.20 The seabed requires further study, as a mere 20% of the global ocean has been mapped at better than a kilometer grid resolution, and the previous administration specifically directed the White House’s Ocean Policy Committee to develop a strategy to map the remaining 60% of unmapped American EEZ.21, 22 From what has been mapped, the seabed’s biodiversity is immense. Of the estimated 0.01% of the explored area of the CCZ, scientists have collected more than 1,000 animal species, of which 90% are believed to be new or undescribed. This tally does not account for over 100,000 potential microbe species.23 The Coast Guard can both support this research from its cutters and support its enduring statutory mission of Environmental Protection as well.24

Early studies have proposed immense risks to seabed environments from mining. Habitat loss, sediment smothering of seabed animals following resource processing, and issues of light, noise, or other vibrations are all significant concerns for unique resources and animals which have evolved over millions of years. If calls for an international moratorium on mining are ultimately ignored, the US should not leave China or Russia to shape the best practices for seabed mining.25 The US Coast Guard can be present and use its cutters or even onboard UUVs to monitor that mining practices are in accord with any standing international agreements to best preserve the environment.

A Deep Future for the Coast Guard

The Coast Guard has time to critically analyze its role in future seabed mining ventures but must consider the development of new service capabilities and build inter-agency bridges. Force structure assessments could partner with the Navy on multiple capability areas. UUVs operating at various depths could serve ongoing submarine force objectives while supporting Coast Guard mining monitoring requirements. If the Coast Guard determined it needed a larger platform for sustained presence and multi-helo or UUV deployment at a mining site, the Expeditionary Staging Base (ESB) could serve as a cheaper, known option from which to iterate. Regardless of platform, operations in the CCZ or broader Pacific would present a taxing operational requirement, given its distance from Hawaii and the necessary logistics train, compared to the service’s more common littoral missions.

To meet this demand signal, civilian policymakers must ensure that any profits associated with domestic commercial seabed mining would be taxed with a sufficient funding line to support the shipbuilding, logistics, command and control, and research and development in support of the Coast Guard seabed presence mission.

The Coast Guard must also strive to build its inter-agency relationships around seabed mining. The service is already a member of the State Department’s Extended Continental Shelf (ECS) Task Force, an inter-agency government body that already focuses on seabed issues.26 But the ECS Task Force is primarily focused on identifying the limits of the US Continental Shelf through geological survey and legal analysis; projections of national seabed mining objectives must go further. Beyond the interagency and joint force, the Coast Guard should liaise with academia, non-governmental and international organizations, and the private sector to contextualize the service’s future role. Each will have their initiatives and interests, but collectively they will better prepare the Coast Guard to engage with the seabed.

The Coast Guard has yet to be tasked to support presence, international maritime law enforcement, scientific research, or environmental protection with respect to seabed mining. Yet it has done those same types of missions on the surface for hundreds of years. While the commercial industry is developing its technologies and processes, the Coast Guard should project its role into the deep domain given its historic missions and requirements. Challenges abound, from international economic drivers to future science and environmental research. Working collaboratively, the Coast Guard can lead a network of partners to strengthen economic and maritime security around seabed mining, thereby promoting the rules-based international order and a free and open Indo-Pacific. Looking forward, the Coast Guard must look deeper to win on the seabed and in the future.

Lieutenant Kyle Cregge is a surface warfare officer. He served on a destroyer, cruiser, and aircraft carrier as an air defense liaison officer. He was selected by Carrier Strike Group 9 for the 2019 Junior Officer Award for Excellence in Tactics. He currently is a master’s degree candidate at the University of California San Diego’s School of Global Policy and Strategy.

Endnotes

1. Scarminach, Shaine. 2019. “Diving Into The History Of Seabed Mining – Edge Effects”. Edge Effects. https://edgeeffects.net/seabed-mining/.

2. “The Secret On The Ocean Floor”. 2021. Bbc.Co.Uk. https://www.bbc.co.uk/news/resources/idt-sh/deep_sea_mining.

3. “Nautilus Minerals Officially Sinks, Shares Still Trading”. 2019. MINING.COM. https://www.mining.com/nautilus-minerals-officially-sinks-shares-still-trading/.

4. “Deep-Sea Mining Could Provide Access To A Wealth Of Valuable Minerals”. 2021. Theneweconomy.Com. https://www.theneweconomy.com/energy/deep-sea-mining-could-provide-access-to-a-wealth-of-valuable-minerals.

5. National Oceanic and Atmospheric Administration (2020, February 21) Fisheries of the United States, 2018. Retrieved
from NOAA Fisheries: www.fisheries.noaa.gov/feature-story/fisheries-united-states-2018

6. Vekasi, Kristin. 2021. “Will China Weaponise Its Rare Earth Edge? | East Asia Forum”. East Asia Forum. https://www.eastasiaforum.org/2021/03/25/will-china-weaponise-its-rare-earth-edge/.

7. Tiezzi, Shannon. 2021. “Is China Ready To Take Its Economic Coercion Into The Open?”. Thediplomat.Com. https://thediplomat.com/2019/05/is-china-ready-to-take-its-economic-coercion-into-the-open/.

8. Narayan, Pratish and Deaux, Joe. ” U.S. Fighter Jets and Missiles Are in China’s Rare-Earth Firing Line”. 2021. Bloomberg.Com. https://www.bloomberg.com/news/articles/2019-05-29/u-s-fighter-jets-and-missiles-in-china-s-rare-earth-firing-line.

9. Pawlyk, Oriana. 2021. “Switzerland Becomes Latest Nation To Choose F-35 For Its Next Fighter Jet”. Military.Com. https://www.military.com/daily-news/2021/06/30/switzerland-becomes-latest-nation-choose-f-35-its-next-fighter-jet.html.

10. “Deep-Sea Mining”. 2018. IUCN. https://www.iucn.org/resources/issues-briefs/deep-sea-mining.

11. Ibid.

12. Admiral Karl L. Schultz. “The United States Coast Guard’s Vision to Combat IUU Fishing”. September 2020. https://www.uscg.mil/Portals/0/Images/iuu/IUU_Strategic_Outlook_2020_FINAL.pdf

13. “30 U.S. Code Chapter 26 – DEEP SEABED HARD MINERAL RESOURCES”. 2021. LII / Legal Information Institute. https://www.law.cornell.edu/uscode/text/30/chapter-26.

14. Ibid.

15. Verma, Aditya Singh. “A Case For The United States’ Ratification Of UNCLOS”. 2020. Diplomatist. https://diplomatist.com/2020/05/02/a-case-for-the-united-states-ratification-of-unclos/.

16. “About ISA | International Seabed Authority”. 2021. Isa.Org.Jm. https://www.isa.org.jm/about-isa.

17. “Minerals: Polymetallic Nodules | International Seabed Authority”. 2021. Isa.Org.Jm. https://www.isa.org.jm/exploration-contracts/polymetallic-nodules.

18. Groves, Steven. “The U.S. Can Mine The Deep Seabed Without Joining The U.N. Convention On The Law Of The Sea”. 2021. The Heritage Foundation. https://www.heritage.org/report/the-us-can-mine-the-deep-seabed-without-joining-the-un-convention-the-law-the-sea.

19. Migiro, Geoffrey, World Facts, Countries Zones, All Continents, North America, Central America, and South America et al. 2018. “Countries With The Largest Exclusive Economic Zones”. Worldatlas. https://www.worldatlas.com/articles/countries-with-the-largest-exclusive-economic-zones.html.

20. Ensign Evan Twarog and Lieutenant (J.G.) Cody Williamson, “Polar Security Cutters Will Face An Evolving Arctic”. 2021. U.S. Naval Institute. https://www.usni.org/magazines/proceedings/2021/january/polar-security-cutters-will-face-evolving-arctic.

21. Amos, Jonathan. “One-Fifth Of Earth’s Ocean Floor Is Now Mapped”. 2020. BBC News. https://www.bbc.com/news/science-environment-53119686.

22. Cornwall, Warren. “Trump Plan To Push Seafloor Mapping Wins Warm Reception”. 2019. Science | AAAS. https://www.sciencemag.org/news/2019/11/trump-plan-push-seafloor-mapping-wins-warm-reception.

23. Heffernan, Olive. “Seabed Mining Is Coming — Bringing Mineral Riches And Fears Of Epic Extinctions”. Nature.Com. https://www.nature.com/articles/d41586-019-02242-y.

24. Commander Sharon Russell and Lieutenant James Stevens. “The Coast Guard Can Take On DoD Environmental Response Duties”. 2020. U.S. Naval Institute. https://www.usni.org/magazines/proceedings/2020/february/coast-guard-can-take-dod-environmental-response-duties.

25. Rosane, Olivia. “Major Companies Join Call for Deep-Sea Mining Moratorium”. 2021. https://www.ecowatch.com/deep-sea-mining-moratorium-corporations-2651368554.html

26. “About The U.S. Extended Continental Shelf Project – United States Department Of State”. 2021. United States Department Of State. https://www.state.gov/about-the-u-s-extended-continental-shelf-project/.

Featured Image: ROV Deep Discoverer investigates a diverse deep sea coral habitat on Retriever Seamount. (NOAA photo)

Sea Control 280 – To Boldly Go with Doctrine Man and Jon Klug

By Jon Frerichs

Jon Klug and Steve Leonard, aka Doctrine Man, join the program to discuss their new work, To Boldly Go: Leadership, Strategy and Conflict in the 21st century and Beyond.

Sea Control 280 – To Boldly Go with Doctrine Man and Jon Klug

Links

1. To Boldly Go: Leadership, Strategy and Conflict in the 21st Century and Beyond, by Jonathan Klug and Steve Leonard (editors), Casemate, Sep 30, 2021.

Jon Frerichs is Co-Host of the Sea Control podcast. Contact the podcast team at [email protected].

This episode was edited and produced by Keagan Ingersoll.

Port Cybersecurity: Incorporating the IAPH’s New Guidelines into the ISPS Code

By CDR Michael C. Petta

Introduction

Port industry leaders recently submitted cybersecurity guidelines to the International Maritime Organization (IMO) for consideration. The IMO Member States should seize this opportunity and amend the International Ship and Port Facility Security (ISPS) Code to enact cybersecurity standards for ports and port facilities. Specifically, IMO Member States should amend the code, using the new industry guidelines as a model, to require port facilities to conduct regular cybersecurity assessments and develop distinct cybersecurity plans.

The IAPH’s Cybersecurity Guidelines for Ports and Port Facilities

Earlier this month the International Association of Ports and Harbors (IAPH), a trade association representing ports across the globe, announced the publication of cyber guidelines for ports and port facilities. With help from the World Bank, the IAPH developed these cybersecurity guidelines to mitigate, according to the publication’s executive summary, “the top risk for port authorities and the wider port community.” A review of the extensive list of cyber incidents occurring over the past year, as compiled by the Center for Strategic and International Studies, reinforces the IAPH’s view that cyberattacks are a preeminent global threat. Recently in a speech at the United Nations, President Biden recognized the immediacy of that risk, emphasizing the importance of “hardening our critical infrastructure against cyberattacks” and establishing “clear rules…for all nations as it relates to cyberspace.” Needless to say, the IAPH guidelines are a welcome move toward a nearly decade-old aspiration to improve cybersecurity resilience in the maritime sector.

The IAPH’s recent work toward cyber resiliency is not the only 2021 cyber milestone in the maritime transportation sector. Rather, at the start of the year the IMO’s guidelines for maritime cyber risk management, although adopted almost four years earlier, came into effect for parts of the Maritime Transportation System (MTS). It is no coincidence these two sets of guidelines emerged the same year. Indeed, the latter guidelines are a necessary consequence of the former because the earlier set, in fact, does not cover port facilities. Port leaders had no choice but to fill the gap, and they did so quickly.

The IAPH did more than jump into the breach. It also coordinated its effort with the IMO. This substantive coordination is evident in two 2021 submissions to the IMO’s Maritime Safety Committee (MSC). In MSC 103/92 of March, the IAPH, recognizing the port facility gap, stressed that “ports and port facilities would benefit” from a framework akin to that applied to vessels earlier in the year. The IAPH was motivated by cyber risks it considers to be “the most significant threats for ports today,” citing a “fourfold increase in cyberattacks in the maritime industry” over a four-month period last year. Equally motivating was an expected intensification of cyber threats from accelerated port digitalization, an ongoing modernization effort triggered by, inter alia, the coronavirus pandemic.

Driven by these long-standing and mushrooming risks, the IAPH declared to the MSC its intention to develop “a single comprehensive set of guidelines customized for Ports and Port Facilities.” Impressively, just four months later, via MSC 104/7/1, the IAPH reported completion of its work—the IAPH Cybersecurity Guidelines for Ports and Port Facilities.

The 73-page guide contains many valuable cybersecurity measures and instructs facility operators on many topics fundamental to security in the cyber domain. These include management buy-in, personnel training, risk assessment, proper staffing, threat detection, and incident response. While this article does not intend to explore each provision in depth, highlighting a few features is useful for illustrating the guidelines’ utility. For example, the guide expressly endorses port facilities conducting unique cybersecurity training, drills, and exercises. Also, it encourages facility operators to share cyber information with government regulators and industry partners. The guidelines further acknowledge the importance of planned cybersecurity incident response and reporting. Finally, and perhaps most importantly, the IAPH’s new guidelines favor port facilities conducting regular cybersecurity assessments and developing distinct cybersecurity plans.

To incorporate such measures into an international government framework, the IAPH asked the IMO to consider the new guidelines and measures at the next MSC session, which is scheduled to take place in the first week of October, next week.

Amending the International Ship and Port Facility Security Code

The IMO’s previous cyber guidelines, those adopted in 2017 and put into effect in 2021, were considered game changing. Certainly, they were a vital step toward a uniform approach for combating cyber threats in the shipping industry. Notably, IMO Member States relied on the International Safety Management (ISM) Code as the legal foundation for those guidelines. The ISM Code is a safety management system adopted in 1987 to help shipping industry leaders manage safety risks. Regardless of whether a safety management system is the best instrument for generally mitigating security threats, it is not the right tool for promoting cybersecurity at port facilities. This is because the ISM Code, fundamentally, applies only to ships, not port facilities.

Fortunately, there is an international instrument designed specifically to protect port facilities from attacks—the International Ship and Port Facility Security (ISPS) Code. Twenty years ago this month, subversive actors exploited vulnerabilities in the global transportation system and attacked civilian locations across the United States. The ISPS Code was developed in direct response to those attacks and has become the IMO’s “comprehensive mandatory security regime.” One of the code’s express objectives is to assess and detect “security threats to… port facilities… [and] to implement preventive security measures against such threats.” Ultimately, if IMO Member States intend to comprehensively secure port facilities against attacks from within the cyber domain, they must turn to the ISPS Code.

Even though the ISPS Code is the right tool to pull from the international toolbox, the instrument first needs calibrating. Indeed, the code’s existing, albeit implicit, cybersecurity provisions are soft law, non-binding instructive guidance that is unenforceable. Such soft cyber law makes port facilities soft cyber targets. Within the past few weeks, subversive actors backed by a foreign nation, according to the testimony of the Director of the U.S. Cybersecurity and Infrastructure Agency, breached servers and planted malicious code at a port facility in Houston, Texas. When discussing this recent breach, one cybersecurity expert predicted that such incidents would bring about a “much more regulatory” framework instead of the current “aspirational” model.

The ISPS Code has two parts: a mandatory Part A and a recommendatory Part B. Of note, there are no cybersecurity provisions, explicit or implicit, in Part A. Meanwhile, Part B hints at cybersecurity as it encourages port facilities to consider “radio and telecommunications equipment, including computer systems and networks” when they assess physical security vulnerabilities. Encouraging facilities to consider certain threats is a notable aspiration, but it is not a clear, enforceable cybersecurity rule. This is all to say, the ISPS Code, enacted for the specific purpose of preventing attacks on the MTS, is the right tool for the job, but to be an effective instrument against threats in the cyber domain, it must be amended.

Certainly, amending the ISPS Code will take careful consideration. One adjustment IMO Member States might consider is amending Part B Section 18 to encompass training, drills, and exercises specific to cybersecurity. Such cyber-specific requirements do not presently exist. Section 9 of the IAPH guidelines provides useful examples. Also, Member States might consider amending Section 15 of Part A and Part B to expressly require a cybersecurity assessment based on the factors in the IAPH’s model. The cybersecurity assessment would be separate from and a complement to the facility security assessment already required by Section 15 of the code.

Another adjustment to the ISPS Code worth earnest consideration is a change to Section 16 of Part A and Part B to require port facilities to prepare and governments to approve distinct cybersecurity plans. The IAPH provides a model as a baseline. Like the cybersecurity assessment, the cybersecurity plan would be an independent document, a supplement to the already required facility security plan. These are just a few examples of potential ISPS Code adjustments that can be used to effectively incorporate the work of the IAPH into international law.

In a 2020 Port Community Cybersecurity Note, the IAPH seems to recognize a need to amend the code. In chapter five of the note, the IAPH insightfully concludes “that the role of the [Port Facility Security Officer] must evolve to encompass cyber security… rather than being focused purely on physical threats.” Arguably, because the Port Facility Security Officer’s role is controlled by the ISPS Code, it follows that to evolve this role IMO Member States must evolve the code. Moreover, the IAPH seems to recognize that any adjustments should be comprehensive. As it asserts in the 2020 note, due to the “unpredictability and everchanging [sic] nature of cyber threats… a limited or partial approach probably will not suffice.”

Conclusion

The IMO’s MSC meets the first week of October. The IAPH provided the MSC with fully developed port facility cybersecurity guidelines and asked the MSC to consider them. This invitation should be dutifully accepted and used as a springboard to enact IMO standards internationally. The cyber threats and vulnerabilities are well known and expected to multiply with ongoing digitalization across the MTS. The time is ripe for IMO Member States to act. When they meet next week, they should build on the IAPH’s momentum and start the process to amend the ISPS Code, with strongest consideration given to mandating regular cybersecurity assessments and distinct cybersecurity plans.

Commander Michael C. Petta, USCG, is the Deputy Chair, the Director for Maritime Operations, and a professor of international law at the Stockton Center for International Law at the U.S. Naval War College. The views presented are those of the author and do not necessarily reflect the policy or position of the U.S. Coast Guard, the U.S. Department of Homeland Security, the U.S. Navy, the Naval War College, or the U.S. Department of Defense.

Featured Image: Container ship Houston Express in Hamburg, Germany. (Credit: Prosertek)

Rethinking the Cryptologic Warfare Officer Pipeline

By Will Cavin

The Cryptologic Warfare Officer (CWO) community, like many other naval warfare communities, has a narrowly-defined career path for officers to successfully complete the requisite milestones to assume command. Unlike flight school for naval aviators or nuclear power school for submariners, cryptologic warfare officers receive a rudimentary overview of the broad cryptologic field before they begin their initial tour at a Navy Information Operations Command (NIOC) collocated with a National Security Agency (NSA) site. Junior cryptologic warfare officers’ poor exposure to the incredibly broad field of cryptology and their limited insight into how signals intelligence supports the U.S. Navy fails to prepare them to serve in any meaningful role while completing their initial assignment at an NSA site. 

U.S. Navy cryptologic leaders need to send new ensigns to the fleet for their initial tour of duty to gain a broad understanding of the blue-water U.S. Navy, learn how signals intelligence (SIGINT) and electronic warfare are employed by naval units, and to ensure young officers develop a baseline knowledge to best leverage their operational experience in future support to NSA national missions. 

Importance of Early Exposure to the Maritime Navy

Historically, the CWO community believed that the Navy was best served by sending its new junior officers to work national missions at NSA sites to develop a broad understanding of cryptologic disciplines while gaining awareness of cutting-edge technologies that these junior officers could then bring to deployed forces in a follow-on “tactical” tour. However, signals intelligence, electronic warfare, and cyber operations have become increasingly specialized, making it more difficult for young officers to develop needed expertise in these three unique fields of study.

Without prior working experience in cryptology, new officers find themselves relegated to narrow-in-scope positions that often lack the technical challenges that Navy leaders hope will create subject matter expertise in their officer corps. Furthermore, without any actual experience with maritime forces, young cryptologists fail to recognize national mission capabilities or tool sets that could best be leveraged to support the Navy. 

This poor talent management is not a problem isolated to the cryptologic community. Talent management challenges span the Department of Defense due to ineffective evaluation systems used to measure performance and the poor placement of personnel to best maximize its talent. The cryptologic officer corps is uniquely positioned to make minor changes to greatly enhance its junior officers.

Navy Information Forces (NAVIFOR), the Type Commander for all of Navy cryptology, should adjust the traditional career pipeline for new CWOs by sending them to support deployable tactical naval units for their initial assignment. By serving a tour of duty directly supporting naval surface, subsurface, or air units, cryptologists would gain an understanding of how operational naval elements work and their different intelligence needs. 

Broad exposure to deployed forces provides fledgling CWOs with a unique perspective to carry to their follow-on assignment at an NSA site. Support for military operations, a primary mission set for the Intelligence Community, needs junior military officers that through tangible experience from prior assignments have the authority to explain both the intelligence needs and platform limitations of deployed military units. Having prior tactical experience provides CWOs a platform to inform their civilian intelligence analyst counterparts in how the national SIGINT apparatus can best support carrier strike groups, F/A-18 squadrons, and fast attack submarines.

The current CWO pipeline is a missed opportunity to support the warfighter because it strips first tour naval cryptologists of their most potentially valuable contribution to NSA’s joint environment, which is an ability to communicate the needs of deployed forces. 

Developing SIGINT and Electronic Warfare Expertise from Tactical Assignments

Thirty years ago, CWO leadership at NSA sites had the latitude to expose junior officers to a variety of national missions providing valuable hands-on experience for new officers to quickly develop a solid baseline in the cryptologic skillset. However in today’s construct, first-tour CWOs are expected to learn the theory of cryptology while supporting a single highly-specialized national mission. This silo of exposure limits the learning opportunities for young ensigns, and due to their lack of experience, young cryptologists are placed in largely administrative roles with little authority to support mission or to learn the complexities of cryptology. Thus, CWOs would benefit greatly from learning the basics of SIGINT and electronic warfare while attached to naval units in their initial assignment.

Through direct oversight of cryptologic elements attached to different naval units, CWOs would quickly learn the collection capabilities and limitations of various platforms. This early exposure would ensure that CWOs develop expertise and understand the warfighter’s perspective before working at an NSA field site alongside civilian intelligence analysts who spend their entire career working in national-level missions. Additionally, while completing tactical assignments these junior officers would develop much-needed experience in explaining the capabilities and importance of their mission set to the unrestricted line officers that their intelligence supports. 

In response to potential concerns of a young officer’s ability to assume responsibility for a cryptologic element with little to no experience, Navy senior enlisted personnel in the cryptologic element would provide the mentorship and guidance to young officers still learning the SIGINT and electronic warfare capabilities of their systems. This is much akin to the surface navy, which places new ensigns over divisions of sailors responsible for systems that are foreign to the young officer. Thus, young ensigns would complete a rich tour providing operational units with tactical cryptologic support while developing their own expertise through hands-on real-world application and overseeing the work of their sailors. These experiences would position them to successfully add value to NSA national mission sets with the ability to understand the capabilities and limitations of tactical naval units.

Tactical Cryptologic Competency Creates the Informed Leaders that NSA Needs

Finally, officers that complete an initial tactical assignment will have gained expertise needed to recognize NSA tool sets and emerging capabilities that can directly benefit tactical platforms. Under the current structure, new cryptologists lack the maritime experience to know which national capabilities can benefit deployed units. By altering the career progression path, officers will have the experience to know the limitations and needs of various naval platforms. In an era where over half of naval officers will separate from active-duty before completing eight years of service, the Navy must ensure it does not waste an entire tour of duty “developing” their junior officers. By reordering the career progression path and providing a clear understanding of the goals for each tour of duty, the cryptologic officer corps can best prepare its junior officers to not simply complete their expected responsibilities, but charge them to work alongside intelligence analysts to actively improve national support to deployed naval forces.

The current cryptologic warfare officer pipeline represents an outdated model in which senior officers had the flexibility to expose their new ensigns to diverse mission sets and applications of SIGINT during their initial tour, ensuring they developed a wide understanding of cryptology. In the increasingly specialized modern intelligence environment, NAVIFOR must adjust its career progression pipeline to ensure its young officers can provide better support to deployed forces. By exposing cryptologic warfare officers to the maritime navy as well as the practical application of SIGINT, they are better prepared to effectively assume leadership roles at NSA or other national SIGINT efforts. An additional outcome of this recommendation is that as CWOs continue in their career, the reorganization of the tactical assignment frees junior officers to specialize in one of the cryptologic disciplines, a growing need in today’s increasingly technical world. 

Lieutenant Will Cavin is a Cryptologic Warfare Officer in Washington, DC. He has completed assignments at the National Security Agency in Ft. Meade and served as an EP-3E Special Evaluator in Bahrain. He is passionate about the mental health of servicemembers and served as a Suicide Prevention Advocate. He graduated with merit from the United States Naval Academy.

References 

Combest, L. (1996). IC21: The intelligence community in the 21st century. Permanent Select Committee on Intelligence, 1–421. Retrieved from https://www.hsdl.org/?view&did=439040

Karpf, B. (2019). Train navy officers for cyber lethality. Proceedings145(2). Retrieved from https://www.usni.org/magazines/proceedings/2019/february/train-navy-officers-cyber-lethality

Kuzma, R., Shaw, I., Danelly, Z., & Calcagno, D. (2018). Good will hunting: The strategic threat of poor talent management. War on the Rocks. Retrieved from https://warontherocks.com/2018/12/good-will-hunting-the-strategic-threat-of-poor-talent-management/

Schultz, B. (2020, May 31). Coaching trees (NSGA kunia 2002-2004). Station Hypo. Retrieved from https://stationhypo.com/2020/05/31/coaching-trees-nsga-kunia-2002-2004-guest-post/#more-13907

Snodgrass, G. (2014). Keep a weather eye on the horizon: A navy officer retention study. Naval War College Review67(4), 64–90. Retrieved from https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1352&context=nwc-review

Talbot, A. (2020). Truth #3: Division officers must learn to “see the future.” Proceedings146(5). Retrieved from https://www.usni.org/magazines/ proceedings/2020/may/truth-3-division-officers-must-learn-see-future

Featured image:  An EP-3E Airborne Reconnaissance Integrated Electronic System (ARIES) II, assigned to the “World Watchers” of Fleet Air Reconnaissance Squadron 1 (VQ-1), transits over the East China Sea. (U.S. Navy photo )