Category Archives: Capability Analysis

Analyzing Specific Naval and Maritime Platforms

The Dimensions of Russian Sea Denial in the Baltic Sea

By Tobias Oder

Introduction

Over the last few years, the Russian Federation pursued an increasingly assertive foreign policy in Eastern Europe. Geopolitical infringements on Crimea and Eastern Ukraine are coupled with hybrid warfare and aggressive rhetoric. The buildup and modernization of the Russian armed forces underpins this repositioning and Russia has taken major steps in increasing its conventional and nuclear capabilities.

The significant rearmament of its Western exclave Kaliningrad requires special attention.1 The recent buildup of Russian A2/AD forces in Kaliningrad, coupled with increasingly assertive behavior in the Baltic Sea, poses a serious challenge for European naval policy. Should Russia make active use of its sea denial forces, it could potentially shut down access to the Baltic Sea and cut maritime supply lines to the Baltic states. The full range of Russia’s A2/AD capabilities in Kaliningrad comprises a wide array of different weapon systems, ranging from SA-21 Growler surface-to-air missiles2 to a squadron of Su-27 Flanker fighters and another squadron of Su-24 Fencer attack aircraftsthat can be scrambled at a moment’s notice to contest Baltic Sea access.4 German naval capabilities to counter the SS-C-5 Stooge anti-ship missile system,Russia’s mining of sea lanes, and its attack submarines are of particular interest in retaining Baltic sea control.

Russian A2/AD Systems

The K300 Bastion-P system includes in its optional equipment a Monolit-B self-propelled coastal radar targeting system.6 This radar system is capable of, according to its manufacturer, “searching, detection, tracking and classification of sea-surface targets by active radar; over-the-horizon detection, classification, and determination of the coordinates of radiating radars, using the means of passive radar detection and ranging.”7The manufacturer further states that sea-surface detection with active radar ranges up to 250 kilometers under perfect conditions, while the range of sea surface detection with passive detection reaches 450 kilometers.8

With regard to its undersea warfare capabilities, the Russian Baltic Fleet currently only operates two Kilo-class submarines. Of these diesel-powered submarines, only one is currently operational with the other unavailable due to repairs for the foreseeable future.However, the entire Russian Navy’s submarine fleet is currently undergoing rapid modernization and the Baltic Fleet will receive reinforcements consisting of additional improved Kilo-class submarines.10 Despite the fact that the Baltic fleet remains relatively small in size, these upgrades amount to “a level of Russian capability that we haven’t seen before” in recent years.11

With its formidable ability to float through waters largely undetected and versatile missile equipment options capable of attacking targets on water and land, the Kilo-class presents a serious threat to naval security in the region.12 In fact, its low noise level has earned it the nickname “The Black Hole.”13

The Baltic Sea is relatively small in size and has only a few navigable passageways that create chokepoints. Therefore, it resembles perfect terrain for the possible use of sea mines.14 While often underestimated, sea mines can have a devastating impact on naval vessels. Affordable in price and hard to detect, they can be an effective area-denial tool if spread out in high quantities.15 Russia still possesses the largest arsenal of naval mines, and according to one observer, Russia has “a good capability to put weapons in the water both overtly and covertly.”16 The versatility of possible launch platforms, ranging from full-sized frigates to fishing boats, makes an assessment of current capabilities in Kaliningrad a difficult endeavor.

A Possible Scenario for Russian A2/AD Operations in the Baltic Sea

Given Russia’s long-term strategic inferiority to western conventional capabilities, a realistic scenario will bear in mind that Russia is not interested in vertical conflict escalation. Instead, it is primarily interested in exploiting its temporary regional power superiority.17 Thus, its endgame will not be to destroy as many enemy vessels as possible, but rather to send a signal to opponents and deter them from navigating their ships east of German territorial waters as long as needed.18 Ultimately, A2/AD capabilities only have to inflict so much damage to make defending the Baltic States appear unattractive or too costly to decision makers, especially if those measures can create the perception of Russian escalation dominance.19

Russia is very inclined to use means that offer plausible deniability, to possibly include sea mines.20 The Baltic Sea is still riddled with sea mines from both World Wars21 and if Russia manages to lay sea mines undetected, it can make the argument that any incidents in the Baltic Sea involving sea mines were simply due to old, leftover mines instead of newly deployed Russian systems.

Should measures to deploy sea mines in the Baltic Sea fail, Russia may consider use of a  more overt, multi-layered approach to sea denial. We can expect that a realistic scenario will feature a mixture of above-mentioned approaches that include submarine warfare as well as the use of anti-ship missiles. Russia could also make use of its naval aviation assets and other missile capabilities stationed in Kaliningrad.

Strategic Implications and NATO’s Interests

It is difficult to interpret the deployment of these weapon systems and missiles as anything different than an addition to Russia’s A2/AD capabilities. Russia is actively trying to improve it strategic position to deter possible troops movements on land as well as on the water.22 They mirror Russia’s claims to its sphere of influence in Eastern Europe and serve as an example of Russia’s attempts to exert authority over its periphery, effectively giving Russia the potential to deny access to the Baltic Sea east of Germany.

If Russia increases its A2/AD capabilities in the Baltic Sea, it complicates NATO’s access to the Baltic states during a potential crisis. This is especially startling due to the fact that NATO troops are currently stationed in the Baltics and cutting off maritime supply routes would leave those troops extremely vulnerable. If Russia can effectively cut off NATO’s access to the Baltic states, it increases the “attractiveness to Russia of a fait-accompli.”23 Ben Hodges, then-commanding general of the United States Army in Europe, shared these concerns: “They could make it very difficult for any of us to get up into the Baltic Sea if we needed to in a contingency.”24 In case regional states will be called to fulfill its alliance commitments in the Baltic Sea, Russian submarine blockades, along with mining and missile deployments, will be a major roadblock and possibly threaten safe passage for European vessels.

NATO has an immense national interest in maintaining freedom of navigation in the Baltic Sea and ensuring free access. On average, 2,500 ships are navigating the Baltic Sea at any time and its shipping routes are vital to European economic activity.25 In the 2016 German Defence White Paper, this is clearly identified: “Securing maritime supply routes and ensuring freedom of the high seas is of significant importance for an exporting nation like Germany which is highly dependent on unimpeded maritime trade. Disruptions to our supply routes caused by piracy, terrorism and regional conflicts can have negative repercussions on our country’s prosperity.”26 Thus, if Russia impedes freedom of navigation in this area with its A2/AD capabilities, it will significantly damage Germany’s and other European nations’ export potential. However, vulnerabilities are not limited to shipping routes but also include the Nord Stream gas pipeline and undersea cables upon which a large part of European economies depend.27

A map of the Nord Stream infrastructure project (Gazprom)

In sum, Russia’s A2/AD systems, along with updated submarine capabilities and the potentially disastrous effects of disrupted undersea pipelines and communication cables, enhance Russia’s strategic position and makes hybrid warfare a more realistic scenario. This kind of instability would have serious security and economic implications for NATO.

Recommendations

Should the Baltic Sea fall under de facto authority of the Russian Federation or witness conventional or hybrid conflict, then NATO would face dire economic consequences and live with a conflict zone at its doorstep. This is especially concerning given the poor state of Germany’s naval power in particular. The German Navy lacks most capabilities that would qualify it as a medium-sized navy, and its strategy is mostly agnostic of a threat with significant A2/AD capabilities just East of its own territorial waters.28 Since it is in Germany’s vital interest to maintain freedom of navigation in the Baltic Sea and plan for a potential use of Russian A2/AD capabilities, the German Navy should shift its operational focus to the Baltic Sea. Having outlined the means through which Russia can deny access to the Baltic Sea, specific recommended actions can follow.

Effectively countering the effects of anti-ship missiles stationed in Kaliningrad requires two measures. First, it requires the German Navy to equip its ships and submarines with standoff strike capabilities that enable them to engage Russian radars and anti-ship missiles from outside their A2/AD zone.29 In practice, this requires the procurement of conventional long-range land-strike capabilities for the German Navy. To this day, the entire German fleet lacks any form of long-range land-attack weapon for both surface vessels and submarines.30 Second, if the German Navy has to operate within Russia’s A2/AD environment, it should equip its surface ships with more advanced electronic warfare countermeasures that disrupt sensing and enable unit-level deception.

Russia’s submarines are traditionally hard to detect, but they can be countered by Germany’s own class of 212A submarines. Those feature better sonars and are even quieter, giving them an advantage over Russia’s submarines.31 However, in order to fully exploit this advantage, Germany has to do a better job of committing resources to the maintenance of its submarines as all six of its active submarines are currently not operational due to maintenance.32

German Type 212A submarine U-32. (Bundeswehr/Schönbrodt)

A large part of the effectiveness of anti-mine operations hinges on preemptive detecting. If Germany and other NATO allies can catch Russia in the act of laying mines, it will actively decrease the possible damage those mines can do to vessels in the future and thus their effect on sea denial.33 It can do so by increasing its sea patrols in the region. These patrols can include minimally armed vessels such as the Ensdorf and Frankenthal classes in order to avoid incidental confrontations and to assume a non-threatening stance toward Russia. If preventive action fails, Germany should be ready to employ a NATO Mine Countermeasure Group in order to clear as many mines as possible and to ensure safe passage of ships.

Conclusion

The buildup of forces on Russia’s Western border is paired with a more aggressive stance by the Russian military. Over the last months, the Baltic Sea became “congested” with Russian military activity, leading to increasingly closer encounters.34 In April 2014, an unarmed Russian Su-24 jet made several low-passes near a U.S. missile destroyer, the USS Donald Cook in the Baltic Sea.35 Later in 2014, a small Russian submarine navigating in Swedish territorial waters spurred a Swedish military buildup along its coast due to “foreign underwater activity.”36 And during July 2017, Russia conducted joint naval exercises with China in the Baltic Sea. By conducting a joint naval drill with China in these waters, the Russian military demonstrated strength and flexed its military muscle in a message specifically directed at NATO.37 These actions by the Russian military all point toward conveying the message that Russia does not want the presence of foreign militaries in Baltic Sea waters and is capable of taking countermeasures to exert its sovereignty in the region.

Tobias Oder is a graduate student in International Affairs at the Bush School of Government and Public Service at Texas A&M University. He focuses on international security, grand strategy, and transatlantic relations

References

[1]  “The Baltic Sea and Current German Naval Strategy,” Center for International Maritime Security, last modified July 20, 2016, accessed September 22, 2017, https://cimsec.org/baltic-sea-current-german-navy-strategy/26194.

[2] Also known as S-400 Triumf.

[3]  “Chapter Five: Russia and Eurasia,” The Military Balance 117, no. 1 (2017), 183-236.

[4]  “Entering the Bear’s Lair: Russia’s A2/AD Bubble in the Baltic Sea,” The National Interest, last modified September 20, 2016, accessed September 24, 2017, http://nationalinterest.org/blog/the-buzz/entering-the-bears-lair-russias-a2-ad-bubble-the-baltic-sea-17766?page=show.

[5] Also known as K-300P Bastion-P.

[6]  “K-300P Bastion-P System Deliveries Begin,” Jane’s, last modified March 5, 2009, accessed November 20, 2017, https://my.ihs.com/Janes?th=janes&callingurl=http%3A%2F%2Fjanes.ihs.com%2FMissilesRockets%2FDisplay%2F1200191.

[7]  “Monolit-B,” Rosoboronexport,, accessed November 20, 2017, http://roe.ru/eng/catalog/naval-systems/stationary-electronic-systems/monolit-b/.

[8] Ibid.

[9]  Kathleen H. Hicks et al., Undersea Warfare in Northern Europe (Washington, D.C.: Center for Strategic and International Studies, 2016).

[10]  Karl Soper, “All Four Russian Fleets to Receive Improved Kilos,” Jane’s Navy International 119, no. 3 (2014).

[11]  “Russia Readies Two of its most Advanced Submarines for Launch in 2017,” The Washington Post, last modified December 29, 2016, accessed September 23, 2017, https://www.washingtonpost.com/news/checkpoint/wp/2016/12/29/russia-readies-two-of-its-most-advanced-submarines-for-launch-in-2017/?utm_term=.2976db8c1710.

[12]  “The Kilo-Class Submarine: Why Russia’s Enemies Fear “the Black Hole”, The National Interest, last modified October 23, 2016, accessed November 21, 2017, http://nationalinterest.org/blog/the-kilo-class-submarine-why-russias-enemies-fear-the-black-18140.

[13]  “Silent Killer: Russian Varshavyanka Project 636.3 Submarine,” Strategic Culture Foundation, last modified July 14, 2016, accessed November 21, 2017, https://www.strategic-culture.org/news/2016/07/14/silent-killer-russian-varshavyanka-project-636-3-submarine.html.

[14]  Stephan Frühling and Guillaume Lasconjarias, “NATO, A2/AD and the Kaliningrad Challenge,” Survival 58, no. 2 (April-May, 2016), 95-116.; Alexander Lanoszka and Michael A. Hunzeker, “Confronting the Anti-Access/Area Denial and Precision Strike Challenge in the Baltic Region,” The RUSI Journal 161, no. 5 (October/November, 2016), 12-18.; Hicks et al., Undersea Warfare in Northern Europe.

[15]  “Sea Mines: The most Lethal Naval Weapon on the Planet,” The National Interest, last modified September 1, 2016, accessed November 21, 2017, http://nationalinterest.org/blog/the-buzz/sea-mines-the-most-lethal-naval-weapon-the-planet-17559. In fact, even a small number of sea mines have the capability to disrupt marine traffic due to the perceived risk of a possible lethal encounter (Caitlin Talmadge, “Closing Time: Assessing the Iranian Threat to the Strait of Hormuz,” International Security 33, no. 1 (Summer, 2008), 82-117.).

[16]  “Minefields at Sea: From the Tsars to Putin,” Breaking Defense, last modified March 23, 2015, accessed November 21, 2017, https://breakingdefense.com/2015/03/shutting-down-the-sea-russia-china-iran-and-the-hidden-danger-of-sea-mines/.

[17]  Frühling and Lasconjarias, NATO, A2/AD and the Kaliningrad Challenge, 95-116, 100.

[18]  Lanoszka and Hunzeker, Confronting the Anti-Access/Area Denial and Precision Strike Challenge in the Baltic Region, 12-18 Specifically, commentators outline various scenarios that all share the basic notion that the ultimate goal is to deny NATO forces access to its eastern flank (“Anti-Access/Area Denial Isn’t just for Asia Anymore,” Defense One, last modified April 2, 2015, accessed November 20, 2017, http://www.defenseone.com/ideas/2015/04/anti-accessarea-denial-isnt-just-asia-anymore/109108/).

[19]  Andrew F. Krepinevich, Why AirSea Battle? (Washington, D.C.: CSBA, 2010). For a more detailed discussion of potential Russian escalation dominance, see David A. Shlapak and Michael W. Johnson, Reinforcing Deterrence on NATO’s Eastern Flank (Santa Monica, CA: RAND Corporation, 2016); “Demystifying the A2/AD Buzz,” War on the Rocks, last modified January 4, 2017, accessed September 24, 2017, https://warontherocks.com/2017/01/demystifying-the-a2ad-buzz/.

[20]  Rod Thornton and Manos Karagiannis, “The Russian Threat to the Baltic states: The Problems of Shaping Local Defense Mechanisms,” The Journal of Slavic Military Studies 29, no. 3 (2016), 331-351. The idea behind plausible deniability states that Russia will only make use of means to disrupt Western forces if they cannot explicitly trace their origins back to Russia and that they cannot hold Russia accountable for these actions. This, in turn, leads to insecurity among NATO allies and prevents the alliance from taking collective action.

[21]  “German Waters Teeming with WWII Munitions,” Der Spiegel, last modified April 11, 2013, accessed November 25, 2017, http://www.spiegel.de/international/germany/dangers-of-unexploded-wwii-munitions-in-north-and-baltic-seas-a-893113.html.

[22]  Martin Murphy, Frank G. Hoffman and Gary Jr Schaub, Hybrid Maritime Warfare and the Baltic Sea Region (Copenhagen: Centre for Military Studies (University of Copenhagen), 2016), 10.

[23]  “The Russia – NATO A2AD Environment,” Center for Strategic & International Studies, last modified January 3, 2017, accessed September 23, 2017, https://missilethreat.csis.org/russia-nato-a2ad-environment/.

[24]  “Russia could Block Access to Baltic Sea, US General Says,” Defense One, last modified December 9, 2015, accessed September 23, 2017, http://www.defenseone.com/threats/2015/12/russia-could-block-access-baltic-sea-us-general-says/124361/.

[25]  Frank G. Hoffman, Assessing Baltic Sea Regional Maritime Security (Philadelphia: Foreign Policy Research Institute, 2017), 6.

[26]  Federal Ministry of Defence, White Paper on German Security Policy and the Future of the Bundeswehr (Berlin: Federal Ministry of Defence, 2016), 50.

[27]  Murphy, Hoffman and Schaub, Hybrid Maritime Warfare and the Baltic Sea Region.

[28]  Bruns, The Baltic Sea and Current German Naval Strategy.

[29]  Andreas Schmidt, “Countering Anti-Access/Area Denial: Future Capability Requirements in NATO,” JAPCC Journal 23 (Autumn/Winter, 2016), 69-77.

[30]  Hicks et al., Undersea Warfare in Northern Europe.

[31]  Hicks et al., Undersea Warfare in Northern Europe.

[32]  “All of Germany’s Submarines are Currently Down,” DefenseNews, last modified October 20, 2017, accessed November 21, 2017, https://www.defensenews.com/naval/2017/10/20/all-of-germanys-submarines-are-currently-down/.

[33]  Talmadge, Closing Time: Assessing the Iranian Threat to the Strait of Hormuz, 82-117, 98.

[34]  “Russian Warships in Latvian Exclusive Economic Zone: Confrontational, Not Unlawful,” Center for International Maritime Security, last modified May 15, 2017, accessed September 23, 2017, https://cimsec.org/russian-warships-latvias-exclusive-economic-zone-confrontational-not-unlawful/32588.

[35]  “Russian Jet’s Passes Near U.S. Ship in Black Sea ‘Provocative’ -Pentagon,” Reuters, last modified April 14, 2014, accessed September 23, 2017, https://www.reuters.com/article/usa-russia-blacksea/update-1-russian-jets-passes-near-u-s-ship-in-black-sea-provocative-pentagon-idUSL2N0N60V520140414.

[36]  “Sweden Steps Up Hunt for “Foreign Underwater Activity”,” Reuters, last modified October 18, 2014, accessed September 23, 2017, https://www.reuters.com/article/us-sweden-deployment/sweden-steps-up-hunt-for-foreign-underwater-activity-idUSKCN0I70L420141018.

[37]  “Russia Says its Baltic Sea War Games with Chinese Navy Not a Threat,” Reuters, last modified July 26, 2017, accessed September 23, 2017, https://www.reuters.com/article/us-russia-china-wargame/russia-says-its-baltic-sea-war-games-with-chinese-navy-not-a-threat-idUSKBN1AB1D6.

Featured Image: Russian troops load an Iskander missile. (Sputnik/ Sergey Orlov)

Call for Articles: Restoring Warfighting Readiness

By Dmitry Filipoff

Articles Due: February 5, 2018
Week Dates: February 12-16, 2018

Article Length: 1000-3000 words 
Submit to: [email protected]

The U.S. Navy finds itself at an inflection point in the aftermath of two high-profile ship collisions that killed 17 sailors. But for years the Surface Navy in particular has struggled amidst crushing operational tempo and initiatives that backfired in attempts to reform training, maintenance, and manning. While numerous leaders at varying levels of seniority were relieved and remedial reforms are under way, the underlying problems that caused these collisions are deep-seated, pervasive, and self-inflicted. 

This was made clear enough in both the Comprehensive and the Strategic Readiness Reviews that sought to make sense of these fatal mishaps. These findings come in the midst of numerous other issues that challenge the overall readiness of the Navy, such as how the Government Accountability Office claimed nearly 14,000 operational days have been lost over five fiscal years – days that ships were not available for operations – due to maintenance overruns. These claims come against a backdrop of hopeful ambition where the Navy hopes to grow to a planned 355 ships even while it struggles mightily to maintain the smaller fleet it has today. 

Authors are encouraged to analyze the state of the U.S. Navy’s readiness and offer recommendations for reform. The emphasis should be on institutional means to improve warfighting readiness beyond simply buying new equipment. These recommendations can run the gambit from train, man, and equip activities to the nature of the operational employment and strategic tasking of the Navy. Authors are encouraged to cast a wide net and address looming issues that may become tomorrow’s tragic headline. 

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at [email protected]

Featured Image:  The Arleigh Burke-class guided missile destroyer USS John S. McCain (DDG 56) loaded on heavy lift transport MV Treasure. (U.S. Navy Photo)

Seeing the Forest Through the Trees: The Value of OSINT for the U.S. Navy

CIMSEC is committed to keeping our content FREE FOREVER. Please consider donating to our annual campaign now so we can continue to provide free content.

By Dave Andre

“Intelligence means every sort of information about the enemy and his country.” –Clausewitz, On War, 1832 

Though it often goes unrecognized, history shows publicly available information (PAI) consistently plays an integral part in the development of the intelligence picture. With the advent of the Information Age, a rapid evolution of technological innovations democratized and decentralized information, creating a digital universe and a surfeit of open source intelligence, or OSINT. In the past decade alone, the world produced more information than it had in the rest of human history. This diffusion of information holds significant promise for the Naval Intelligence community, whose own rich history is replete with examples of OSINT being an integral part of the analytic picture.

From the Age of Sail to the Global War on Terror and beyond, OSINT has proven valuable across the range of maritime operations. Despite this history, Naval Intelligence treats OSINT as an oxymoron, relying on an analytic culture biased against unclassified data. This bias is a mistake. To maintain maritime superiority the Naval Intelligence community needs to orient its collection and analysis toward a truly all-source effort and harness the full potential of OSINT as an intelligence discipline on par with the classified disciplines or it risks ceding the advantage to adversaries and competitors.

OSINT in the Information Age: Problems and Promise

Since the end of the Cold War, the democratization and decentralization of the information landscape resulted in a sharp rise in information quantities, altering the intelligence community. As publicly available information that anyone can lawfully obtain proliferated, the advancements of the Information Age affected OSINT more than any other intelligence discipline. The Internet and cellular technology means individuals enjoy unprecedented access to information, particularly in otherwise underdeveloped regions. Meanwhile, social media makes individuals active participants in the production of information.

Studies estimate that this digital universe is doubling in size every two years. Globally, an estimated 50 percent of the population has Internet connectivity; 34 percent are active on social media; and there are enough mobile subscriptions that every person on earth could have one. Gone are the halcyon days where OSINT was local papers, television, and radio broadcasts. With each passing year, OSINT expands further past those conventional means and now includes information from the deep web, commercial imagery, technical data, social media, and gray literature with more sources inevitably to follow.

According to the author, the exponential growth of PAI offers OSINT “a competitive advantage over the traditional intelligence disciplines in terms of speed, quantity, and usability.” (Image: International Data Corporation study, “Data Age 2025.”)

The changes to the information environment affected more than individuals; government agencies and militaries embrace these information platforms, readily divulging information, pictures, budgets, and material status of platforms to the public to champion causes and promote transparency. It is no wonder some experts estimate that 80-90 percent of intelligence originates from OSINT. There is no reason to think these trends will abate soon.

The Naval Intelligence community has been slow to recognize and adapt to these changes in society’s relationship with information. In 1992, speaking at the First International Symposium on Open Source Solutions, Admiral William Studeman discussed the importance of OSINT and the associated challenges that accompanied its acceptance on par with Signals Intelligence (SIGINT), Human Intelligence (HUMINT), and Imagery Intelligence (IMINT). Twenty-five years after Admiral Studeman’s speech, the Naval Intelligence community still treats OSINT at a disadvantage vis-à-vis the established intelligence disciplines, viewing it as unclassified “low-hanging fruit.” This second tier status is shortsighted and history shows it is detrimental to the analytic process.

In a world that moves increasingly faster, OSINT holds a competitive advantage over the traditional intelligence disciplines in terms of speed, quantity, and usability. Sensors, signals, and human sources take time to collect and exploit. In addition, classified means tend to be resource constrained—there simply are not enough assets to cover everything everywhere.

In contrast, PAI, by its very nature, is everywhere and does not require significant resources to exploit. These strengths are why OSINT is “the outer pieces of a jigsaw puzzle” and why it is useful in framing a problem. This framing allows an analyst to focus on effective use of the technical disciplines, thereby acting as a resource multiplier. Acknowledging these factors underscores the important roles that PAI and the resulting OSINT play in the analytic process.

OSINT analysis draws from a multitude of publicly available information sources, such as those illustrated here. (International Institute for Counter-Terrorism)[Click to expand]
Despite the promise that OSINT holds, the Naval Intelligence community has been slow to adopt it, underutilizing this glut of publicly available information. There is no formal pipeline for OSINT training and there is scant reference to OSINT in doctrine, which underscores an analytic culture that subordinates OSINT to the covert and technical disciplines of HUMINT, SIGINT, IMINT, and Measures and Signals Intelligence (MASINT). Considering the modern information environment, the current treatment of OSINT within the Naval Intelligence community is a mistake.

Reliance on the technical disciplines has traditionally come at the detriment of OSINT, but this is unnecessary. Learning how to exploit PAI as an organization necessitates a paradigm shift that begins with training and doctrinal inclusion. This shift needs to occur today. Resource constraints will continue to hamper classified collection methods and as information continues to increase, it will become easier to hide information in plain sight—a real boon for adversaries. The U.S. Navy acknowledged as much in 2013, describing nations that were “simply using the Internet and the commercial global information grid as their own C4ISR system for networking their low-technology military forces.” To buoy this change the Naval Intelligence Community needs to take stock of its history with OSINT.

OSINT Lessons from Naval History: An Important Resource

Naval Intelligence history is replete with successful stories of monitoring, filtering, transcribing, translating, and archiving PAI to produce OSINT. Indeed open source maritime intelligence is as old as the U.S. Navy itself. In Nelson’s ‘old lady’: Merchant news as a source of intelligence, Jane Knight details how, in 1796, intelligence derived through the analysis of a merchant woman’s correspondence with her husband proved useful.1 As the story goes, Frances Caffarena, an Englishwoman married to a Genoese merchant, supplied Admiral Jervis and Lord Nelson’s Mediterranean campaign with a steady stream of information gleaned from open sources. These reports filled a critical gap in intelligence, informing the decision-making of both men as they waged war against Napoleonic France and her allies. This episode marks the beginning chapter of a long history of OSINT supporting and defining the maritime intelligence picture.

Since these early years, OSINT has played a vital role in a wide range of naval operations from Humanitarian Assistance and Disaster Response (HA/DR) and Non-Combatant Evacuation Operations (NEOs) to combat on land and sea. During the Second World War, analysts pored over enemy magazines and newspapers and monitored radio broadcasts. These open-source efforts yielded valuable intelligence. One notable example of specific value to Naval Intelligence was the first mention of German submarine tenders through a newspaper article.2

Collecting, translating, and analyzing PAI – i.e., OSINT – has proven valuable throughout historical conflicts. Locations like this WWII-era BBC listening room monitored broadcasts originating from Nazi Europe as one more piece of the intelligence puzzle. (BBC)

Another integral OSINT lesson from that era was the importance of a distributed network that leverages partner nations’ ability to exploit information with knowledge of local sources and local languages. Such cooperation produced significant results during the Second World War as the British Broadcasting Company (BBC) monitored foreign radio broadcasts across many theaters, sharing the information with the United States. This distributed network is not limited to international partners; it has application across the services as well. One enduring example of an OSINT network is the U.S. Army’s Asian Studies Detachment, which has collected and analyzed PAI on Asian topics since 1947. Developed for U.S. Army tactical units throughout the Pacific, the Asian Studies Detachment has relevance for host of consumers throughout the Pacific region.

Recently, OSINT has been particularly useful in areas—both functional and geographical—that do not typically use classified assets. The 2010 earthquake in Haiti is a good example of how important OSINT can be to U.S. Navy operations. During OPERATION UNIFIED RESPONSE analysts from United States Southern Command (SOUTHCOM) used social networking sites, blogs, clergy, non-governmental organizations, and the Haitian diaspora to supplement traditional ISR capabilities with firsthand accounts of the situation that focused humanitarian response efforts. This shaped the picture in a way that classified, technical sources could not because of sharing limitations and processing and exploitation timelines.

OSINT’s utility is not limited to non-kinetic operations. The Arab Spring and OPERATION ODYSSEY DAWN exemplify OSINT’s effectiveness in providing intelligence during kinetic operations, especially without “boots on the ground” to provide tactical updates. Throughout ODYSSEY DAWN the Joint Task Force J2 derived valuable intelligence from social media sources such as Facebook and Twitter, with NATO specifically acknowledging that Twitter had become a leading source in developing the intelligence picture and assisted analysts in target development. Additionally, during NEO planning in Libya and Egypt, OSINT was a significant factor in answering intelligence requirements for the 26th MEU embarked on the USS Kearsarge. Meanwhile, OPERATION ATALANTA, the European Union Naval Force’s response to Somali piracy, overcame the dearth of intelligence and the resulting lack of situational awareness by working primarily off PAI; in this case, local newspapers. This proved to be a double-edged sword, as local Somali news sources were heavily biased or censored, oftentimes resulting in “corkscrew journalism” where uncorroborated statements, repeated often enough, turned into truths. These operations illustrate how OSINT may sometimes be the most accurate and timely intelligence available to analysts; and in the case of Somalia, underscore the importance of training and corroboration while using OSINT. 

Satellites providing Google Earth imagery captured this publicly available overhead shot of China’s then-new aircraft carrier LIAONING. Exploitation of PAI such as this offers timely and relevant maritime intelligence that the Navy has yet to fully capitalize on according to the author. (Google Earth)

Despite changes over the years, the communal and commercial nature of PAI proves to be its most pertinent contribution to the intelligence picture. OSINT is different from the other intelligence disciplines by virtue of its accessibility. Unlike national sensors, sources, and satellites, a private individual or company usually owns the production method and dissemination of PAI. More often than not, these individuals and companies derive more benefit from making the information available than they do restricting it.

A 2017 Janes IHS article highlighted this relationship, describing how public webcams that overlooked Severomorsk Naval base confirmed the departure of the Russian aircraft carrier Admiral Kuznetsov. This episode also highlights the difficulty in determining the veracity of PAI as these webcams were contradicting what news networks were reporting. In a similar manner, Google Earth offers a great example of how PAI can provide valuable OSINT for analysts. A 2013 TIME magazine article covered how Google Earth imagery provided analysts with a wealth of information as they examined China’s construction of its first indigenous aircraft carrier.

Unfortunately, history is also replete with examples of military planners neglecting OSINT to their detriment. In their history on the Battle of Gallipoli, Peter Chasseaud and Peter Doyle detail how a private geological survey omitted from military planning held the key to vital terrain intelligence, which may have mitigated or prevented the ANZAC force’s defeat.3 

In one of the most well-known cases of intelligence failure, the aftermath of Pearl Harbor illustrated just how important OSINT could be in the realm of indications and warnings. As the recently established Foreign Broadcast Information Service (FBIS) was listening to and translating broadcasts from Japan, they noted increasing hostility towards the United States; the attack on Pearl Harbor commenced before the intelligence could yield value.

The Intelligence Community re-learned the importance of OSINT six decades later as classified data failed to predict, let alone prevent, the Sept. 11th attacks. In the aftermath of the attacks, it became clear there were open source resources that may have offered insight into the attackers plans. A similar assessment was made after the bombing of the USS Cole a year before.4 In each of these examples, the lack of OSINT was just one of many failures, but it is a failure that the Naval Intelligence community perpetuates and one that is relatively easy to fix.

OSINT Tech for the Future Navy

The technological advances of the Information Age are germane to the future of OSINT within the Naval Intelligence enterprise. Across all levels of warfare, PAI represents an opportunity and a challenge to naval intelligence analysts. From the fight against violent extremist organizations (VEOs), which use social media for recruitment and propaganda dissemination, to the understanding of national strategies as world leaders increasingly employ the media to make the case for military operations, OSINT can enable or enfeeble analysis. Irrespective of geography or subject, the Information Age has virtually guaranteed the proliferation of PAI.

Every intelligence discipline has limitations and OSINT’s biggest limitations are the volume and veracity of information. Fortunately, technology continually provides tools to assist in overcoming these obstacles. Some are technical and require training, while others are simple and low-tech, merely requiring familiarization and practice; yet others involve incorporating government technology or commercial subscription services. Regardless of their particular details, these tools are all available to assist the analyst in filtering the overwhelming amount of data available today. These technological advancements also indicate that OSINT is rapidly becoming as technical a discipline as SIGINT or IMINT and Naval Intelligence needs to treat it as such.

There are processes that assist in categorizing useful information versus distracting and irrelevant information and procedures that help determine reliability and credibility. There are increasingly effective ways to use search parameters to cut through the large swaths of information. The Open Source Indicators (OSI) program is one such initiative. A program run by the Intelligence Advanced Research Projects Activity (IARPA) under the Director of National Intelligence (DNI), OSI aims at automated and continuous analysis of PAI in an effort to predict societal events.

Additionally, the proliferation of foreign language media will pose a challenge for analysts, though there are promising tools such as the U.S. Army’s Machine Foreign Language Translation Software (MFLTS), which allows analysts to understand foreign language documents and digital media across a variety of platforms. In a similar vein, initiatives like Defense Advanced Research Projects Agency’s (DARPA’s) Deep Exploration and Filtering of Text (DEFT) program and Natural Language Processing (NLP) technology aim to help analysts collect, collate, and process information. In addition to these Intelligence Community initiatives, there are commercial programs like Google’s Knowledge Graph that hold promise for intelligence analysts. Using a semantic search, a Knowledge Graph query returns results that determine the intent and context of a searched item, allowing an analyst to avoid the irrelevant responses a traditional keyword search returns and establish relationships between people, places, and events.

Even the socio-technical aspect of social media lends itself to optimization, with Social Media Intelligence (SOCMINT) now championed, despite privacy concerns, as an emerging intelligence discipline in its own right. Reputable blogs, forums, and chat-rooms – operated by individuals with a strong interest in a subject – act as a form of crowdsourcing where these philes compile large amounts of data for their own interest while simultaneously filling intelligence gaps.

Technically savvy and unencumbered by corporate or government constraints, the individual citizen has proven to be a remarkable source of information for analysts. Whether it is pictures on Instagram of their latest work trip to a naval installation or their Facebook comments about government policies, individuals routinely expose important information to the public. Acknowledging OSINTs role in counterintelligence is at the core of the U.S. Navy’s stringent OPSEC program.

Mainstreaming OSINT Analysis

Whether it is traditional media, social media, or any other element of PAI, the Naval Intelligence community needs to develop the analytic skills to cash-in on this information. Unfortunately, this explosion in information is not without its downside. Concurrent booms of disinformation, misinformation, and propaganda threaten to hamper the analysis of PAI just as social media has become a tool for disseminating fake news. Much as these information distractions present a challenge, they also underscore the importance of all-source analysis. The OSINT landscape has changed dramatically since the days of the Cold War. Despite these changes, the core challenge of open source analysis remains the same — parsing the salient from the trivial — and that takes skill.

It is not enough to recognize the utility of OSINT; the Naval Intelligence community must train, equip, and organize around the process of collecting and analyzing PAI. It is time to adhere to the guidance put forth since the 1992 Intelligence Reorganization Act, which acknowledged the importance of “providing timely, objective intelligence, free of bias, based upon all sources available to the U.S. Intelligence Community, public and non-public.” More explicitly, in 1996, the Aspin-Brown Commission concluded, “a greater effort also should be made to harness the vast universe of information now available from open sources.”Again, in 2004, the Intelligence Reform and Terrorism Prevention Act (IRTPA) emphasized the need for the Director of National Intelligence (DNI) to “ensure that the IC [Intelligence Community] makes efficient and effective use of PAI and analysis.” Despite these repeated issuances and a long history that demonstrates the importance of OSINT, the Naval Intelligence community continues to pay scant attention to OSINT relative to other intelligence disciplines.

Currently, the Naval Intelligence community has no formal training pipeline to develop open source analysts, no formal guidance on collection methods or best practices, and it receives little direction from Navy doctrine. As such, OSINT within Naval Intelligence resides (unreliably and disparately) at the grassroots level, where intrepid intelligence professionals and the occasional Mobile Training Team (MTT) delve into the realm of open source.

This approach is akin to a person who knows just enough information to be dangerous. PAI is going to continue to increase in scope and value, but also difficulty, which is precisely why the Naval Intelligence community needs to develop a formal training pipeline so they can begin addressing the problem from the bottom-up. In the meantime, the Navy can leverage open-source training that exists within the larger Intelligence Community or employ private organizations like Jane’s IHS that offer OSINT training on effective collection methods, monitoring social media, conducting safe and optimized searches, and conducting analysis of PAI. Such training will allow analysts to exploit the full potential of OSINT and move past mere regurgitation of previously reported information.

The author argues that the U.S. Navy should take note of international and joint force partners who have emphasized the institutional value of OSINT. In the above photo, Canadian LTC Ian MacVicar provides a period of instruction to African officers as part of CJTF-Horn of Africa’s Open Source Intelligence Course. (Image CJTF-HOA)

The lack of a formal training pipeline is not the only limitation that undermines the realization of OSINT’s role in the Naval Intelligence community. OSINT is barely mentioned in Naval doctrine, all but ensuring that the training and cultural issues will remain. Moreover, the absence of OSINT in doctrine provokes discord amongst intelligence professionals and creates an environment where commanders default toward a pre-conceived emphasis to classified sources.

This is where the Navy can learn a lesson from the other services and the larger intelligence community, which have all made significant steps towards including OSINT in their doctrine. These lessons, borne of years of fighting in Iraq and Afghanistan, lend themselves to adaption by the Navy. For example, both the Marine Corps and Army detail the collection and production of OSINT, considerations to judge reliability and credibility, and reporting and dissemination procedures. Similarly, both DIA and NGA recognize the importance of OSINT and the emerging technologies that support its exploitation.

Adding OSINT to doctrine will work in tandem with a formal training pipeline and change the culture from top-down. Together these changes can overcome what is perhaps the greatest barrier that OSINT faces: an analytic cultural that does not afford OSINT the same respect as other disciplines. A 2005 report from the Center for Strategic and International Studies (CSIS) summed up this sentiment, stating “analysts tend to give more weight to a folder stamped ‘SECRET’ than to the latest public broadcast of an Al Qaeda message on Al Jazeera Satellite television network.” Changing the culture will take time and money, but not changing the culture will certainly be more costly. The time is perfect, the officers and sailors joining today are accustomed to social media and the Internet, as are our adversaries.

Conclusion 

The referenced instances of OSINT’s successes and failures are not exhaustive, but serve as examples of the breadth and depth of OSINT support to the intelligence picture. History shows that OSINT has always been important, but the future indicates that OSINT will play an increasingly critical role in the intelligence picture. The Information Age profoundly altered the way PAI is produced, collected, analyzed, and disseminated, which has led to changes in the quality and quantity of that information.

Fortunately, the Information Age has also brought with it a host of tools to address these changes in the information landscape. It is time the Naval Intelligence Community transforms its approach and attitude to OSINT. Disregarding these changes risks a painful reiteration of past lessons where intelligence failures were the result of poor policy, not analysis.

LT David M. Andre is a prior enlisted Intelligence Specialist, and has served as an Intelligence Officer onboard the USS ENTERPRISE (CVN 65), an Intelligence and Liaison Officer assigned to AFRICOM, and as N2 for COMDESRON SEVEN in Singapore. He is currently serving as an analyst at STRATCOM’s JFCC-IMD. He can be reached at [email protected].

References

1. Jane Knight, “Nelson’s ‘old lady’: Merchant news as a source of intelligence: June to October 1796,” Journal for Maritime Research, Vol. 7, Issue 1, (2005): 88-109, DOI: 10.1080/21533369.2005.9668346.

2. William J. Donovan, “Intelligence: key to Defense” LIFE, 30 Sep 1946. Vol. 21, No. 14; 108-122.

3. Peter Chasseaud and Peter Doyle Grasping, Gallipoli: Terrain, Maps and Failure at the Dardanelles, 1915. (London: Spellmount, 2005): 173-174.

4. Arnaud De Borchgrave, Thomas M. Sanderson, John MacGaffin, Open Source Information: The Missing Dimension of Intelligence: A Report of the CSIS Transnational Threats Project, CSIS Report (2006):3.

Featured Image: Information Systems Technician 2nd Class Michael Tolbert, left, and Information Systems Technician 2nd Class An-Marie Ledesma upload geographical data onto tactical Apple iPads for combat operations in the Carrier Air Wing (CVW) 17 operations room aboard the Nimitz-class aircraft carrier USS Carl Vinson (CVN 70). Carl Vinson and Carrier Air Wing (CVW) 17 are conducting maritime security operations and close-air support missions in the U.S. 5th Fleet area of responsibility. (U.S. Navy photo by Mass Communication Specialist 3rd Class Christopher K. Hwang/Released)

Reviewing the U.S. Navy’s LCS Deployments to the Indo-Asia-Pacific Region

CIMSEC is an all-volunteer, 501(c)3 nonprofit that relies on its readers to continue. Consider making a donation here today.

By Swee Lean Collin Koh

The littoral combat ship USS Coronado, upon recent completion of its 14-month Indo-Asia-Pacific stint, marks the conclusion of the U.S. Navy’s third LCS rotational deployment to the region. Thus far, the LCS has not operated without problems, including criticisms about its lack of a potent offensive strike capability.

Designed in two separate variants – the monohulled Freedom, and the trimaran-hulled Independence classes – the LCS forms part of broader plans to forward-deploy the bulk of the U.S. Navy to the region. Following the retirement of the Oliver Hazard Perry-class guided missile frigates which used to be the U.S. Navy’s general-purpose workhorse, the LCS represents an alternative platform spanning between a huge, heavily-armed Aegis surface combatant and a small, under-armed Cyclone-class coastal patrol craft which had once engaged the Southeast Asian brownwater navies. The LCS also banks on its modular mission concept, enjoying up to 60-percent of reconfigurable below-decks internal space compared to less than 10-percent on board the Aegis surface combatants.

Of especially significant value is the LCS’s shallow draft, less than four meters compared to over 10 meters of the Aegis destroyer or cruiser, allowing entry into areas that other ships could not in the Indo-Asia-Pacific littorals characterized by archipelagos, congested sea lanes, shallow water, and small ports. “In that arc between the Philippines and Sri Lanka, nearly 50 ports are accessible to larger ships,” Rear Admiral Don Gabrielson, Commander, Task Force 73 described in January 2017 but the LCS, he pointed out, “can dock in well over a thousand ports in the same range of locations.”

Trial and Error: Early LCS Deployments

 The LCS has come a long way since the first vessel, the USS Freedom (LCS-1), debuted in the type’s maiden rotational deployment. But this ship was unfortunately bogged down by systems breakdown, which was attributed to it being “a research and development platform,” even though the ship remained available for 70 percent of the time – on par with most other forward-deployed vessels. Despite its problems, the LCS even managed to render humanitarian assistance and disaster relief to the Philippines in the aftermath of Super Typhoon Haiyan in November 2013. The U.S. Navy and Lockheed Martin have since made design changes in follow-on Freedom-class ships, such as improved diesel-electric generators, main reduction gear coolers, and other software modifications.

Following the Freedom, her sister ship of the same class, USS Fort Worth (LCS-3), became the second LCS to be rotated through Southeast Asia. It was also the first LCS to deploy for 16 months under a “3-2-1” manning concept, that is, having three rotational crews to support two LCS and one ship deployed at any time. This envisages fully-trained crews to be swapped roughly every four months, thus allowing it to deploy six months longer than the Freedom which swapped crews only once every 10 months, thus extending LCS forward presence and reducing crew fatigue. The Fort Worth deployment served as a U.S. Navy test-bed for how the LCS can be employed for sustained periods taking into consideration that the small crew size, rotational crew concept, contractor-reliant maintenance structure, and swappable combat systems modules are all relatively unique compared to the rest of the fleet.

Crewing remained a challenge, considering that the Fort Worth was manned by around 100 sailors, compared to 180 on board the Perry-class frigates. Then in January 2016, a machinery problem sullied the LCS’ otherwise noteworthy performance, resulting in the ship being side-lined for extended periods. After a prolonged period of rectification work, the Fort Worth managed to join the Rim of the Pacific (RIMPAC) exercise in July. Overall, the Fort Worth fared reasonably well – underway for 185 out of 298 days for its entire deployment – totaling over 18 months with the 7th Fleet. It managed to complete numerous bilateral and multilateral engagements, and assisted in the search-and-rescue operations for AirAsia flight QZ8501 in late 2014.

New Milestones with the USS Coronado

The USS Coronado (LCS-4) arrived in the 7th Fleet area of responsibility in early October 2016 – becoming the first Independence variant to deploy to Southeast Asia. Compared to the Freedom variants, the Coronado possesses more fuel capacity thereby providing increased operational capabilities. It is also equipped with the Surface Warfare mission package, comprising two 11-meter rigid-hulled inflatable boats, two teams for visit, board, search and seizure operations, and two 30mm chain guns. Most significantly, this variant boasts a bigger flight deck allowing for expanded aviation operations including two MQ-8B Fire Scout unmanned aerial systems (UAS), and for the first time on board an LCS to Southeast Asia, an MH-60S Seahawk helicopter.

In response to criticisms about the LCS’ lack of long-range offensive strike capabilities, the Coronado was outfitted with four RGM-84 Harpoon Block-1C anti-ship cruise missiles. This is roughly equivalent to the four YJ-83 missiles typically fitted on board the Chinese Type 056 Jiangdao corvette. The Harpoon is a venerable but aging design despite numerous upgrades. Until new ASCMs such as the Long Range Anti-Ship Missile (LRASM) arrive, the LCS will have to make do with the Harpoon. This armament, hitherto not seen in the Freedom and Fort Worth deployments, represents a step, albeit an interim one, toward bolstering the LCS’ combat capabilities.

The Coronado became a test-bed for surface strike concepts integrating both the newfound missile capability and its organic aviation capacity. The LCS captured the first inverse synthetic aperture radar pictures of surrounding surface contacts with the Fire Scout, marking a critical step toward providing a recognized maritime picture for the LCS, and for over-the-horizon (OTH) Harpoon missile targeting. The first OTH test-fire failed to hit its target in July 2016 during RIMPAC, but following rectification work, in August the following year the Coronado successfully fired a live Harpoon ASCM off Guam in OTH mode using both Fire Scout and MH-60S to provide targeting support.

PHILIPPINE SEA (Aug. 22, 2017) A Harpoon missile launches from the missile deck of the littoral combat ship USS Coronado (LCS 4) off the coast of Guam. (U.S. Navy photo by Mass Communication Specialist 2nd Class Kaleb R. Staples/Released)

Compared to the previous LCS deployments, the Coronado also attained several new breakthroughs for the LCS Program. Amongst various skillsets including small-boat defense, the Coronado demonstrated a first for the LCS in integrating special operations forces during RIMPAC 2016. Moreover, the ship was able to complete in just seven days extensive “D” Phase maintenance, the most intrusive period of organizational-level maintenance which normally takes as long as 2.5 weeks for the MH-60S helicopter while deployed – another achievement.  

The Coronado also advanced the 15-4 maintenance concept of shaving the average repair time for maintenance casualties while deployed from 15 to just four days, thus increasing ship availability and readiness, according to Lieutenant Commander Arlo Abrahamson, spokesman for the U.S. Navy’s Task Force 73. Furthermore, in June 2017, the LCS conducted an expeditionary preventive maintenance availability in Cam Ranh International Port, Vietnam – marking the first demonstration of such capabilities for the Independence variant to be conducted outside the normal maintenance hub in Singapore – and a similar feat was accomplished in Lumut, Malaysia.

Adding Value to Southeast Asian Maritime Security

Southeast Asian maritime forces may have invested in larger surface combatants such as frigates, but they continue to operate numerous coastal and patrol combatants which mainly operate well within the shallow 12-nautical mile territorial sea limits. With its shallow draft, the LCS gains more opportunities to engage these often obscure Southeast Asian “brownwater” counterparts, availing the crew to the latter’s diverse range of useful experiences and intimate familiarity with the local littoral operating environment. “The LCS is a comparable sized platform to ships of navies across South and Southeast Asia, which provides an opportunity to conduct a variety of operations and missions with partner nations… and our LCS sailors learn just as much from operating with the partner navies of the region – so the learning goes both ways,” Gabrielson wrote.

Such engagements would not have been possible if Southeast Asian brownwater naval elements are unable to venture beyond those littoral confines to train with the U.S. Navy’s large surface combatants. This is also a matter of managing perceptions – a gigantic Aegis destroyer might not make good contrasting optics with the puny Southeast Asian vessels; it could appear too overpowering yet at the same time, excessive for the limited nature and scope of engagements with these much simpler and capability-constrained counterparts.

In all, throughout the entire 14-month deployment to Southeast Asia, the Coronado continued and built on the work done by its predecessors. In its 15 port visits across the Indo-Asia-Pacific, the Coronado called on Cam Ranh and Lumut in July and September 2017 respectively – the first for the LCS. In the Sulu Sea, where kidnap-for-ransom attacks by militants were reported, it conducted coordinated counter-piracy operations with the Philippine Navy. The Coronado implemented ship-rider programs by embarking regional naval officers on board the vessel. It also rehearsed the Code on Unplanned Encounters at Sea (CUES) procedures during Naval Engagement Activity Vietnam – another continuation from its predecessors, such as the Fort Worth which practised the mechanism with Chinese warships during its May 2015 South China Sea routine patrol.

Notably, however, the Coronado adds to Southeast Asian maritime security capacity-building – leveraging upon its capabilities hitherto not found on board its predecessors to enhance interoperability especially in conventional warfighting. Building on the Cooperation Afloat and Readiness Training (CARAT) exercises in August 2015, when several Southeast Asian navies conducted deck landing practice with their helicopters on board the Fort Worth for the first time, the Coronado’s UAS capability brought new value to the interoperability training – in particular OTH targeting.

This capability is especially relevant given the interest lately evinced in Southeast Asia in shipboard UAS capabilities, which constitute a cost-effective force multiplier for budget-conscious regional navies, such as Singapore which retrofitted the ScanEagle UAS on board the modernized Victory-class missile corvettes. In this context, UAS-enabled OTH missile targeting constitutes one of the key focus areas of contemporary Southeast Asian naval warfighting capacity-building. The Republic Singapore Navy refined OTH targeting of Harpoon ASCMs during the inaugural bilateral Exercise Pacific Griffin off Guam in September 2017, and the Coronado participated in the effort.

The significant utility of LCS rotational deployments to the region mean that plans are afoot to ramp up the ship’s presence. In February 2015, the U.S. Navy announced plans to operate four LCS out of Singapore – one at a time – by 2018. The LCS was viewed as “a pillar of future U.S. maritime presence in Southeast Asia,” Abrahamson remarked, adding, “We expect the next LCS to deploy to Southeast Asia in mid-2018 with multiple LCS operating from the region in the near future.”

Inherent Limitations

But given the need to balance between fulfilling an ever-growing list of operational demands in the Indo-Asia-Pacific and enhancing operational safety, especially in the wake of the recent ship collisions, capacity constraints may pose potential challenges. Despite extensive automation on board the LCS which meant less sailors required for daily tasks, thereby allowing a rotational crew concept and keeping ships deployed longer than other platforms, a smaller crew also has less time for maintenance. This was addressed by the U.S. Navy’s implementation of a contractor-reliant LCS maintenance structure. During its deployment, the Fort Worth docked in Singapore once every few weeks to be serviced by the maintenance personnel. To boost LCS availability, the Navy also purchased an expeditionary maintenance capability, which consists of two large shipping containers – one acting as a workstation and the other containing spare parts for the LCS, which can be shipped to most ports worldwide.

However, the small crew size on board the LCS still poses the issue of getting sufficiently qualified crews to man the LCS, in order to keep up with the high operational tempo that characterizes forward deployments to the Indo-Asia-Pacific. For instance, the delay in getting a new crew qualified to replace them after a change in training standards led to the open-ended deployment of the Coronado’s Crew 204. Crew 203, which was supposed to replace Crew 204, required a ship to get underway to qualify under the new standards. Unfortunately at that time, all available Independence  ships were either in overhaul or undergoing repairs – an unintended consequence of a complete reorganization of the LCS Program’s manning system triggered by the earlier spate of LCS engineering woes, such as the breakdowns which afflicted the Freedom and Fort Worth.

Considering that demands for security cooperation missions which typically characterize engagements with Southeast Asian maritime forces will probably increase, and given that the LCS is also required for crew qualifications besides rotational deployments, fleet availability would hinge heavily on the U.S. Navy’s overall scheme for small surface combatants (SSCs) that are tailored for such low-end tasks.

The current LCS Program envisages a total of 40 ships though the U.S. Navy has maintained a requirement for at least 52 to conduct security cooperation exercises with allies and the low-end missions the ship was originally designed for. A total of 29 LCS had been procured through FY2017 and for FY2018, the Navy would procure the 30th and 31st ships. The December 2015 program restructuring saw the reduction of planned annual procurement rate from about three ships to just one or two. As part of its FY2018 budget submission, the Navy decided to shift from procuring LCS to the FFG(X) separately from the LCS Program, starting in FY2020. But the FFG(X) design may or may not be based on one of the existing two LCS designs. This generates uncertainty overall for the SSC scheme.

Conclusion

That said, notwithstanding problems faced by the LCS throughout the three iterations of its rotational deployment, the presence of this type of warship not only fulfilled its intended missions but also opened new vistas for engagement with Indo-Asia-Pacific littoral navies, especially in helping build Southeast Asian maritime security capacity. As pertinently, in such times of troubled peace given the persistent maritime flashpoints and ensuing angst amongst many of the regional governments, the LCS does symbolize Washington’s deepening security commitment to the Indo-Asia-Pacific.

Swee Lean Collin Koh is research fellow at the Maritime Security Programme, Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies based in Nanyang Technological University, Singapore.

Featured Image: The USS Coronado at Changi Naval Base in Singapore on Oct. 16. (Photographer: Roslan Rahman/AFP via Getty Images)