Category Archives: Current Operations

On-going Naval Ops or Maritime Current Events

NAFAC: The 4th Battle for the Atlantic and Technology’s Impact on Warfighting

By Sally DeBoer

For the past fifty-six years, the United States Naval Academy has hosted the Naval Academy Foreign Affairs Conference (NAFAC). NAFAC, planned and executed by the midshipmen themselves, brings together outstanding undergraduate delegates as well as notable speakers, scholars, and subject matter experts from around the nation and the world to discuss a current and relevant international relations issue. The theme for this year’s conference, A New Era of Great Power Competition?, seeks to explore the shifting dynamics of the international system, challenges to a U.S. – led world order, the nature of potential future conflicts, the challenge of proto-peer competitors and rising  as well as what steps the U.S. might take to remain the primary arbiter of the international system at large. As this topic is of great interest to CIMSEC’s readership, we are proud to partner with NAFAC in this, their 57th year, to bring you a series of real-time posts from the day’s events in Annapolis, MD. CIMSEC would like to recognize MIDN 1/C Charlotte Asdal, NAFAC Director, and her staff for allowing us to participate in this year’s events and for inviting our readership to virtually share in the week’s rich academic environment.

Robert H. McKinney Address – Vice Admiral James Foggo, III, Director, Navy Staff and Former Commander 6th Fleet

“The greatest leaders must be educated broadly.” – Gen. George Olmstead

Vice Admiral James Foggo III addressed midshipmen and delegates Thursday morning, the last day of the NAFAC conference. The address, bolstered by personal anecdotes, videos, and photographs from the Navy Staff Director and former 6th Fleet Commander, largely addressed the question of great power competition from the perspective of the United States’ relationship with the Russian Federation. The admiral’s address familiarized the audience with recent history and current operations within the Mediterranean, Arctic, Baltic and beyond, informing the day’s discussion on the evolution of great power competition in the coming decades.

What Makes a Great Power?

To begin, VADM Foggo was careful to define the terms used in answering the question: Are we in a new era of great power competition? The admiral expressed confidence that the United States remains the greatest nation in the world, providing exposition on what makes the United States a great power.  Great powers, he explained, go beyond the sum of their people, economic, or military strength to offer ideas, opportunity, and leadership, using their power to affect change for the world’s weakest and most vulnerable populations. Russia, he went on to conclude, is not by this definition a great power – their “sum” qualifies the Federation as a major power, but their actions, primarily enacted in self-interest, disqualify them from great power status.  Understanding this distinction is crucial.

The 4th Battle for the Atlantic

VADM Foggo provided helpful historical context for the historical relationship between the Soviet Union/Russian Federation and the United States. The First Battle for the Atlantic, he explained, occurred during the course of World War One, while the Second, where the United States and her allies defeated axis powers relentless undersea tactics with “grit, resolution, the submarine detection system, and the lend-lease program to Britain.” The third battle, he explained, occurred during the course of the Cold War. An unclassified report based on the 3rd Battle Innovation Project commissioned by the United States Submarine Force on the contribution of U.S. undersea assets to U.S. victory in the Cold War concluded with the following sentiment: “someday, we may face a 4th Battle of the Atlantic.” VADM Foggo asserted that we are, indeed, in the midst of this battle now. The admiral and his co-author Alarik Fritz of the Center for Naval Analysis, collected their thoughts in an article published by the United States Naval Institute,  “The 4th Battle for the Atlantic.”

Rising Tensions 

VADM Foggo characterized the aforementioned 4th Battle for the Atlantic though a series of examples and anecdotes. Beginning with Russia’s invasion of Georgia in 2008, the United States exercised its responsibility as a great power to seek to deescalate tensions and compromise where possible by pursuing the Reset policy with the Russian Federation. This policy, he explained, did not work as intended. In 2014, the U.S. was once again surprised by Russia’s aggressive and illegal actions in Ukraine. This unjustified action, he went on, is an example of why Russia is not a great power, but rather only a major power. This action partially inspired the “back to basics” policy for U.S. defense thinkers and policymakers called for by ADM Greenert.

Admiral Foggo recommended several books to the audience, including ONI’s Russian Navy report, which he emphasized was a “must read” for tomorrow’s defense and foreign policy leaders.

Continued Vigilance

VADM Foggo explored a few key areas where Russia is challenging U.S. and allied interests, providing tangible examples. In the Arctic, he explained, Russians currently operate seven former Cold War bases at company- and battalion- strength units with an endurance of a year or more. Russia has militarized the Arctic, which concerns the U.S. and our allies, particularly the Norwegians, regarding restricted access to international waters. To drive this point home, the admiral displayed a photograph of the Russian flag planted at the geographical North Pole, moved there by a Russian submersible.

https://gfycat.com/EmbarrassedJitteryGoldfinch

U.S. Navy ship encounters aggressive Russian aircraft in Baltic Sea, April 12, 2016. (U.S. European Command)

Given the venue of the conference, VADM Foggo appropriately addressed his professional experience with aggressive actions by the Russian Federation at sea. Beginning with the Su-24 flyby of the USS Donald Cook (DDG-75) in the Black Sea, during which, he emphasized, the wingtip of the Russian aircraft was no more than 30 feet from the deck of the destroyer, the Russian Naval forces escalated tensions in response to U.S. presence in Russia’s adjacent international waters and beyond. The admiral explained the import of strategic communication to gain the moral high ground, which the U.S. achieved by declassifying and releasing an image of the Su-24 narrowly off the bridge wing of the Donald Cook, along with diplomatic protest and meaningful presence in the form of BALTOPS 2016.

“49 Ships Became 52”

BALTOPS is a NATO exercise to improve and display the interoperability of allied forces. The 2016 exercise communicated a clear strategic message; the exercise boasted three amphibious landing operations (versus the previous year’s two), extensive anti-submarine warfare (ASW) operations with three allied submarines and maritime patrol and reconnaissance (MPRA) aircraft, and more. In an effective anecdote that illustrated the Russian response to the exercise, the admiral shared that when reviewing photos from the PHOTOEX conducted during BALTOPS, 52 ships appeared in the photograph – 49 allied vessels, two Russian destroyers, and a Russian AGI. “49 ships, he recalled, became 52.” Tellingly, the Russian response to the success of the strategic messaging of the exercise included “a Stalin-like purge of Russian commanders in the Baltic Fleet,” due to their unwillingness to challenge western ships. Further reinforcing the point, VADM Foggo shared moreexamples of his interactions with Russian counterparts in multilateral and bilateral discussions.

Looking Forward – “The Surest Guarantee of Peace”

The tone of VADM Foggo’s remarks was one of stark realism, but also optimism as well. The admiral expressed confidence in the forces that were under his command, but reiterated to the audience of future diplomatic and military leaders the crucial nature of continued vigilance and continued action in support of the United States’ responsibilities as a great power. He included a timely example – the recent strikes on a Syrian airbase in response to the use of chemical weapons by the Assad regime. “Great powers react, but they react proportionally,” the VADM concluded, expressing belief in the possibility that such actions can bring compromise – a concept, he said, a great power should pursue and prioritize.

Technology and Cyber-Competition Panel

Note: The following information is paraphrased from the panelists’ remarks – their thoughts, remarks, and research are their own and are reproduced here for the information of our audience only.

Panelists Brigadier General Greg Touhill, USAF (ret.), the First Federal Chief of Information Security Officer, Mr. August Cole, Senior Fellow at the Atlantic Council and co-author of Ghost Fleet, and Dr. Nicol Turner-Lee, Fellow at the Center for Technology and Innovation at the Brookings Institution, were given the opportunity to provide open-ended remarks before the question and answer portion of the panel.

A Strategic Framework for Cybersecurity

Cybersecurity is a provocative issue, and General Touhill used his opening remarks to dispel some common rumors about the cyber realm. This is not a technology issue, he went on, but a risk management issue; it is an instrinsic facet of [the United States’] national economy and security to be sensitive to the protection of our technology, information, and competitive advantage. Cybersecurity, he explained, is not all about the tech, but rather about the information. When considering cyber strategy, the General contended that a direct, simple strategy is best and most likely to be effectively executed. To this end, he outlined five lines of effort:

  • Harden the workforce: risk exposure is tremendous, as our culture, norms, and economy rely on automated information systems – this includes home, federal, and corporate entities
  • You can’t defend what you don’t know you have. Information is an asset, and should be treated as such.
  • Within five years, every business will be conducting asset inventory and valuation of its information as any other asset – some entities within the Federal Government, he explained, may not appreciate the value of their information and may not even realize they have it.
  • Do the right things, the right way, at the right time: Cyber hygiene is great, but has to be applied smartly – 85 percent of breaches, he explained, are due to improper patching of common vulnerabilities. The basics come first – stakeholders should update apps, OS, and apply other simple fixes. Care and due diligence is required.
  • Investment. The General introduced “Touhill’s Law,” which contends that one human years accounts for twenty five “computer” years – by this math, some machines in the federal government architecture are several thousand years old. Depreciation and recapitalization are key; from a strategic standpoint, neglecting this reality is a failure.
  • It’s all about the risk. In a contemporary sense, much of the risk is deferred to server management teams and IT, and decisions on that risk are not being made at the right levels.

The general indicated a desperate need for a cogent strategic cyber framework on which to operate and that these five lines of effort are a good foundation for such a framework.

Fiction’s Role in Challenging Assumptions

August Cole, a noted analyst and fiction author, began by recounting the impact that Tom Clancy’s 1986 thriller Red Storm Rising had on his life. As a fiction author, he went on the explain, his job is to think the unthinkable, devoting intellectual energy and professional attention to considering tomorrow’s conflict from a multitude of perspectives. Fiction, Cole explained, allows us to consider an adversaries perspective and confront our own biases to present a bigger truth.

Cole and his co-author Peter Signer’s novel Ghost Fleet addresses the rise of China – the book starts a conversation in an engaging way that captured the authors’ imagination. The writing process caused the authors to confront some uncomfortable truths. The American way of war, he said, is predicated on technical superiority that isn’t necessarily in line with our evolving reality. The reliance on tech creates a vulnerability, and through the lens of great power competition, we should be thinking about the difference between our assumptions about conflict and how conflict will actually be. One must challenge their assumptions, and resist the urge to fall in love with their own investments.

Information as a Commodity and Vulnerability

As a policy analyst and social scientist, Dr. Turner-Lee looks to understand behaviors that are overlaid with technology – she has focused on what we need to do to create equitable access to technology. Tech, she explained, is changing the nature of human behavior and increasing vulnerabilities. We must consider, she said, how we are contributing to the evolution of the tech ecosystem from the realm of consumption to an entity that effects the fabric of national security. What we understand as being “simple” actually isn’t, and what started as a privacy discussion has evolved into a security issue. When considering social media, Dr. Turner-Lee went on, it is interesting to see how 140 characters can become the catalyst for campaigns that threaten national security.

Dr. Turner-Lee  mentioned the concept of pushback from technology companies against government requests for information and policies that need to be engaged to address this. There is a role, she explained, for the military to identifies vulnerabilities, while companies are appointing chief privacy officers and innovation officers, while lastly, the research community needs people to understand how information has become a commodity. As researchers, she explained, she and her colleagues are trying to find vulnerability and understand the impact on our national economy by looking at the nature of human behavior prescribing the right policies to ensure threats are minimized.

Given the current security landscape for cyber, what do you see as the greatest cyber threats facing the U.S.?

Brig. Get Touhill explained that at the Department of Homeland Security, they binned threats into 6 groups:

  • Vandals – frequent and common
  • Burglars – financially motivated and prevalent 
  • Muggers – this includes hacks like SONY as well as cyber-bullies
  • Spies – can be either insiders or traditional political-military threat looking to gain a competitive edge by stealing intellectual property.
  • Sabatuers – pernicious, difficult to find, and could be, for example, an individual who is fired but retains access to a system.
  • Negligent Users – This group constitutes the greatest threat. This group includes the careless, negligent, and indifferent in our own ranks.

China has been evidently and aggressively pursuing AI, hypersonic, quantum computing, and other next-generation technology – what does this mean for our assumption about the American way of war over the next several decades?

August Cole explained that the U.S. must directly confront the assumption that we will always have the edge of technical superiority – this may very well remain true, he said, but we cannot count on it. From a PRC military point of view, they look to not only acquire capabilities but further their knowledge on how best to employ them. We must, he went on, work to connect information and technology that we would not instinctively put in the same basket by considering, for instance, the battlefield implications of a hack on a healthcare provider who serviced military personnel. Technology, he explained, will alter the relationship between power and people, and understanding this connection is complex and difficult. Fiction allows us to synthesize these realms in a way that may be difficult otherwise – and appreciate the operational implications.

How has social media impacted our ability to monitor and address national security threats?

Dr. Turner-Lee began by exploring the implication of emerging social media tools that do not curate data (think Snapchat), explaining that as encryption technology has become more sophisticated, it has further complicated the national security problem. Nicole referred to “permission-less innovation,” meaning that the tech community continues to innovate in ways that cannot be controlled and this innovation is sometimes disruptive. Social media, she went on, is not always designed with privacy in mind, and enacting privacy policies has been reactionary for many companies.

Turner-Lee addressed the general hesitation of users to hand over or allow the collection of their information – personal data, she said, is seen as just that – personal – and companies promote this quality in their tech. For instance, she alluded to the current lawsuit between Twitter and the federal government over the identities of disruptive Twitter accounts. The disconnect between privacy and security, she concluded, can sometimes constitute a weakness.

The moderator pointed out that while tech has developed, policy has lagged. Mr. Cole added that the “internet of things” provides a corollary to this. Further development of wearable or say-to-day tech that generates and collects data automatically has national security implications. He provided an example in the domain of land warfare, suggesting that operators could notionally create a digital map based on device feedback. The data and processing power to make these analytics will exist, he affirmed, but we haven’t considered it.

Dr. Turner-Lee further elaborated that machine-to-machine interactions, which are based on algorithms that predict what you will or will not do, sustain a threat to national security when those algorithms are incorrect or tampered with. For instance, autonomous vehicles could be hacked and directed in a way that makes them a vehicular bomb. Overcoming machine-to-machine bias is very difficult and constitutes a security risk proportional to our dependence on machine-to-machine tech. This is a space, she said, with many vulnerabilities, driving itself in ways we are unaware of.

Conclusion

The final day of NAFAC 2017 proved a fitting end to three days of intense discussion and consideration on the topic of a new era of great power competition. VADM Foggo’s address brought a much needed operational perspective to the delegates and attendees, relaying the seriousness and immediate applicability of the question at hand, particularly for those midshipmen who will be serving aboard operational vessels in just a few short months. Further, the Technology and Cyber-Competition panel provided much needed context for the changing nature of tomorrow’s conflicts, challenging many long-held assumptions about the way of war.

Our representatives were impressed with the diligence, research, and creative thought participants brought to the round table panels. Readers can look for select publications from the Round Tables next week, when CIMSEC will share outstanding research essays from delegates. CIMSEC is extremely grateful to the United States Naval Academy, MIDN Charlotte Asdal and her NAFAC staff, and senior advisors and moderators for allowing us to participate in this year’s conference and share the great value of this discussion with our readership.

Until next year!

Sally DeBoer is the President of CIMSEC for 2016-2017. She can be reached at president@cimsec.org.

Featured Image: A CH-53E Super Stallion helicopter flies ahead of the amphibious assault ship USS Peleliu (LHA-5) after conducting helocast operations at Pyramid Rock Beach, Marine Corps Base Hawaii. The helocast was part of a final amphibious assault during Rim of the Pacific (RIMPAC) Exercise 2014. (U.S. Marine Corps photo by Cpl. Matthew Callahan/Released)

Gulf of Guinea Maritime Security in 2016

By Dirk Steffen

2016 witnessed a marked increase in maritime security incidents over the previous year, irrespective of the counting standards. Denmark-based Risk Intelligence counted 119 verified attacks by criminals on all kinds of vessels in West Africa (Senegal to Angola) – compared with 82 in 2015. The vast majority of attacks in 2016 were perpetrated by Nigerian criminals, including all of the 84 that were concentrated in and around Nigerian waters.

However, as alarming as such figures may seem, 2016 was neither unusually busy nor were there any significant changes to the patterns of maritime crime in West Africa, specifically the Gulf of Guinea, when assessed in the long term. Over a 9-year period (since 2007), the average number of maritime security incidents for West Africa is 122 – typically ranging between 80 and 140 per year. Of this figure, Nigerian waters alone account for an average of 87 attacks per year.

Annual pirate and piracy-related attacks against shipping in West Africa (Senegal to Angola) 2007-2016. (MaRisk by Risk Intelligence)

Throughout this period, maritime kidnappings steadily increased and focused almost exclusively on Nigerian waters. Since 2013, maritime kidnappings have accounted for around 30 percent of all attacks (including failed attacks) off Nigeria. In 2016, most successful kidnappings were concentrated in two cycles of attacks: the first in January to mid-May 2016 (mirroring almost exactly the development of 2013), the second in the last two months of the year. Hijackings, a common feature during the MEND insurgency in the Niger Delta between 2006-2009, and again during the period of tanker hijackings between late 2010 and 2013, have all but stopped, following the successful intervention of the Nigerian Navy against the hijackers of the tanker MAXIMUS in February 2016.

The real strategic concern for the Nigerian government in 2016 was the resurgent Niger Delta insurgency. It was spearheaded by a group called the “Niger Delta Avengers,” whose campaign of oil and gas infrastructure disruption reduced the Nigerian oil output to a historic low of 1.1m barrels per day (bpd) (vis-à-vis the projected 2.2-2.4m bbpd and the average 1.75m bbpd on average in 2015) during the summer of 2016. One impact on maritime security was the disruption of crude oil loading and an increased demand for petroleum products (due to Nigerian refineries being cut off from their crude oil supplies), thus creating, at least in theory, a more target-rich environment. However, the dynamics of maritime insecurity in Nigeria are historically driven by other factors. As the insurgency went through its customary cycles of issuing threats, militant action, and “cease-fires” to regroup and reiterate demands, the maritime security situation displayed an inverse correlation: the spate of attacks reminiscent of the first 4 months of 2013 swept across the seas off the Niger Delta between March and mid-May 2016, followed by a lull as militant groups were actively engaged in onshore violence throughout the summer. Offshore attacks returned to the waters outside the Niger Delta in November and December 2016 because of calmer weather, cyclical pre-Christmas criminal activity, and lower onshore militancy. This pattern suggests that at the tactical level, the “attackers” ,when not employed in militancy, oil theft, illegal bunkering or gang warfare, engage in piracy to cover some of their funding needs.

The wider Gulf of Guinea was less affected by these developments than it was when the tanker hijackings originating from Nigeria peaked in 2011-12. While the capability to enforce security even in very limited parts of their territorial waters remains constrained for some nations, like Congo, Sao Tome and Principe, Liberia or Sierra Leone, organized piracy has not really taken hold in any of those places. In Guinea-Conakry, however, members of the armed forces are engaged in armed robbery at sea and extortion of foreign fishing vessels, even in neighboring Sierra Leone. Ghana experienced a spate of petty thefts at Takoradi anchorage, which gave it some bad press, but no violence against crews was reported. By and large, when speaking of “Gulf of Guinea piracy” as a problem for international shipping, it is Nigerian piracy that we mean. Other forms of maritime crime, on the other hand, such as illegal, unreported and unregulated fishing (IUU), smuggling of oil, drugs, agricultural products and other goods were – and are – the more pressing day-to-day challenges for coastal nations in the region.

Piracy and maritime security incidents in the Gulf of Guinea (Ivory Coast to Gabon) in 2016. (MaRisk by Risk Intelligence)

It is important to understand that many acts of Nigerian “piracy” also have a hidden context that the uncritical reporting in the international press is unaware of. Locally trading product tankers are often attacked, and crew members kidnapped or cargo stolen, as a part of criminal “turf” wars or other disputes between criminal parties. The kidnapping of crew members from fishing (and refrigerated cargo) vessels is often related to extortion within the criminal business of illegal fishing and transhipment of catch. This may, for example, have been the case on 27 November 2016, when the SARONIC BREEZE was attacked 80 nm off Cotonou. The Panama-flagged vessel, according to the Benin Navy, was in a different place than where it should have been (at the anchorage) when it was attacked and three crew members kidnapped.

Regional Cooperation

Against this slightly disconcerting backdrop, there is the gradual increase of political will and ability by some West African nations to take ownership of maritime security. Following the successful rescue of the MAXIMUS, the Nigerian Navy launched Operation ‘Tsare Teku’ in the face of intense pirate activity, and prolonged the operation throughout summer, while being engaged in counterinsurgency operations at the same time. While the impact of the operation was assessed as modest even by Nigerian planners, it demonstrated that the Nigerians were, for the first time, publicly owning up to the problem of maritime piracy emanating from their country. More recently, the flag officer commanding the Eastern Naval Command, Rear Adm. James Oluwole, quite rightly pointed out that the lack of prosecution reduced any effectiveness the Navy might have in the battle against maritime criminals.

Naval police stand guard as suspected pirates are paraded aboard a naval ship after their arrest by the Nigerian Navy at a defense jetty in Lagos, August 20, 2013. (Reuters/Akintunde Akinleye)

The lack of prosecution, and in many cases the lack of legislation that permits prosecution of pirates, is still one of the shortfalls of the implementation of the Yaoundé Code of Conduct as it came under review in mid-2016, when its initial three-year trial period ended. Information sharing, maritime domain awareness, and maritime law enforcement capacities and capabilities vary sharply throughout the region, and are by and large wholly insufficient, although measurable progress has been made in all fields. Nigeria, as the main country of origin for serious criminals in maritime piracy, is in the process of passing a law that will allow it to prosecute pirates who had hitherto gone unpunished or were indicted for lesser crimes.

The Role of Private Maritime Security

Gulf of Guinea states remain wary of private security solutions, yet various models of private-public security partnerships exist in the region. In Benin and Togo, both navies operate “secured anchorages,” in addition to providing embarked teams of navy troops through agents and local security companies. In Ghana and Cameroon, naval or, in the case of Cameroon’s Battalion d’Intervention Rapide (BIR), army protection can be obtained through direct liaison with those nations’ militaries.

The most unusual arrangement though has evolved in Nigeria. Although various models have been employed by security companies and shipping companies, not always with authorization by the Nigerian government, the pre-eminent security solution is the security vessel or patrol boat. Security vessels have a long history that date back to the early 2000s, when the first armed unrest spread onto the creeks and off the Niger Delta. Typically, the security vessels of that era were ordinary offshore support vessels with four to six embarked soldiers. These vessels were (and still are) predictably ineffective against groups of heavily armed attackers, who engage with two to three large speedboats, often with one or two general purpose machine guns between them.

Converted offshore service vessels with improvised firing positions, like these two fast crew and supply boats at Borokiri (Port Harcourt), form the bulk of Nigeria’s privately contracted “auxiliary” navy. (Dirk Steffen)

The model of choice though, originally conceived at the height of the Niger Delta insurgency between 2006 and 2009, was for private companies to supply and maintain patrol boats, which would be put at the disposal of the then dysfunctional Nigerian Navy. When not on military business, those vessels and their Nigerian Navy gun crews with mounted weapons and ammunition would be available for protection missions for commercial clients. Sixteen Nigerian companies entered such an agreement with the Nigerian Navy in 2016 under a Memorandum of Understanding (MoU), effectively providing the bulk of offshore oil field security, and increasing the amount of merchant vessel protection in- and outbound from Nigerian ports. A privately operated joint venture also manages the secure anchorage off Lagos, the only such dedicated area in the region officially promulgated on admiralty charts.

More than 100 such privately contracted security vessels are in operation in Nigerian waters. No one knows the exact number – not even the Nigerian Navy. The quality of these vessels varies – ranging from purpose-built law-enforcement and patrol boats to hastily converted offshore support vessels (or vessels with embarked troops only.) While this contractor fleet provides a welcome relief for the Nigerian Navy, which has only a few assets capable of patrolling the exclusive economic zone, it also presents a major headache for the Nigerian Navy’s operations department to monitor the activities of these contracted patrol boats and supply men, weapons, and ammunition to them and ensure compliance with the terms of the MoU.

NNS GBEDE, a privately contracted patrol boat, returns to Port Harcourt from sea trials on the Bonny River (Nigeria). These boats are examples of the type of vessels envisaged by the Nigerian Navy’s Memorandum of Understanding with private maritime security companies. (Dirk Steffen)

The document envisages a partnership between the Nigerian Navy and the private companies for maintenance, training, welfare, and information sharing, thus leveraging the Navy’s “investment” in terms of hard-to-get trained personnel and weapons into the public-private partnerships. Unfortunately, most companies appear to consider the partnership as an “optional” element of their relationship with the Navy. This is compounded by commercial and contractual pressures that preclude many security vessels from rendering assistance to attacks or incidents other than those involving their clients. Unless the MoU is enforced more rigorously, it is therefore unlikely that anyone except for a handful of commercial clients with sufficiently deep pockets will benefit from this arrangement.

Conclusion

Despite the brief surges of offshore piracy in 2016, the Gulf of Guinea remains “business as usual” in terms of maritime security, with incidents in Nigerian waters or emanating from Nigeria accounting for the lion’s share of incidents. For the other West African countries, with a few exceptions, piracy is persistent, but one of the lesser problems in a region characterized by weak maritime governance.

For Nigeria, 2016 was one of the hardest years since the county’s return to democracy in 1999, politically and economically. While the “Niger Delta Avengers” failed to incite a broad-based insurgency in the Niger Delta, their pinpoint targeting of critical oil and gas infrastructure in the Niger Delta was more effective than MEND ever was in that respect; even the temporary loss of control of considerable territory in the northeast to Boko Haram in 2013-14 was strategically less significant.

The onshore security situation in the Niger Delta had a direct impact on the maritime security situation in Nigerian waters and the wider Gulf of Guinea. The seesaw between onshore violence and surges of offshore piracy underlines that while Buhari and his government have made some inroads against the “godfather” system, the latter is far from defeated. It continues to bind criminal, economic, and political interests in Nigeria together. Nigeria will thus remain the nexus for organized crime in western Africa and any regional efforts can only contain the maritime element of this threat until the problem is solved in Nigeria.

Private maritime security will likely remain the (expensive) sticking plaster to fix the situation for commercial ship operators in the short term. However, few of the models in use, short of purpose-built and suitably armed patrol boats, are likely to provide any meaningful deterrent against Nigerian pirates in particular, who are both capable and willing to overcome armed resistance. Except for Ghana and Cameroon (where the use of naval/army assets for commercial purposes is severely circumscribed), none of the “private” or public-private maritime security solutions is likely to enhance the scarce maritime security assets and capabilities of the West African nations.

Dirk Steffen is a Commander (senior grade) in the German Naval Reserve with 12 years of active service between 1988 and 2000. He took part in the African Partnership Station exercises OBANGAME EXPRESS 2014, 2015 and 2016 at sea and ashore for the boarding-team training and as a Liaison Naval Officer on the exercise staff. He is normally Director Maritime Security at Risk Intelligence (Denmark) when not on loan to the German Navy. He has been covering the Gulf of Guinea as a consultant and analyst since 2004. The opinions expressed in this article are his alone, and do not represent those of any German military or governmental institutions.

Featured Image: A Nigerian Marine Police checkpoint on the Bonny River designed to intercept illegally refined petroleum products from being marketed in Port Harcourt. Endemic corruption in Nigeria’s police force casts some doubt on the effectiveness of such measures. Photo: Dirk Steffen.

CIMSEC To Launch Topic Week on U.S. Naval Academy Foreign Affairs Conference

By Dmitry Filipoff

We are excited to announce that the U.S. Naval Academy will be working with CIMSEC to promote the work presented at the 57th Naval Academy Foreign Affairs Conference (NAFAC). Taking place from April 11-13, NAFAC will bring together midshipmen and students from across the United States and around the world to discuss a theme of global importance. This year’s conference theme is “A New Era of Great Power Competition?”

During the week of the conference, CIMSEC will provide coverage of the event’s major proceedings with regular postings. The week after the conference CIMSEC will republish the top papers from each of the sixteen round tables facilitating debates on specific topics. Each round table involves three midshipmen on (one moderator, two delegates) as well as 8-10 external delegates (both domestic and international civilians and military delegates). Each round table will also have two senior advisers (one academic expert and one professional in the field covered). See the list of this year’s round table topics here.

Read on to learn more about this year’s conference and the purpose and history of NAFAC. From the U.S. Naval Academy website

Despite the cost of being at war for over a decade, “America is still today the world’s foremost leader, partner, and underwriter of stability and security in every region across the globe.” However, a rising China and more belligerent Russia have moved to the forefront of American strategic thinking. Despite recent setbacks, India and Brazil will likely continue to rise. Key U.S. military and civilian leaders have acknowledged a return to great power politics. American global dominance may begin to expect competition from multiple powers around the world, a reality not seen since the Cold War. America’s current fiscal deficits continue to be high, while other economies are rivaling the United States. Rapid technological advances and the changing nature of warfare pose challenges to America’s military might. Given these trends, to what level should the U.S. strive to remain the world’s greatest power and security leader? Should great power status continue to be measured in traditional ways? NAFAC 2017 will examine the promise and constraints of the rising peer competitors. The conference will invite you to think not only about what these dynamics mean for the future of global power, but also what strategies America should take to effectively respond to this competition.

What is NAFAC

Each year since 1960, the U.S. Naval Academy has hosted a gathering of undergraduates from around the United States and the world who come together in the spring to discuss a theme from current global affairs.

The Naval Academy Foreign Affairs Conference (NAFAC) has grown to be the leading undergraduate conference in the country. It has welcomed delegates from thirty countries in each of the last five years and it has heard speakers as notable as President George Bush and Secretary of State Defense Robert Gates.

This conference provides an outstanding opportunity for the midshipmen to come to understand the global forces that may project them into duty in Afghanistan, the Middle East, Korea, North Africa or Latin America. Good officers need a sophisticated understanding of current affairs; this conference puts them together for a week with their civilian counterparts as well as with young officers and civilian delegates from about two dozen countries for conversations in which they can develop that understanding.

The Naval Academy Foreign Affairs Conference has grown in reputation but not in size. It is kept small – no more than one hundred fifty delegates–in order that the discussion groups which are at the heart of the conference retain a good seminar atmosphere. These round table discussions include ten university delegates, two or three foreign delegates, two midshipmen delegates, a midshipman moderator and two senior advisors.

NAFAC also offers an excellent occasion for the midshipmen to show off the Academy and the Navy at its best. Each year they produce an impressive event, handling without a visible hitch the many logistical difficulties of transporting, housing, feeding and entertaining scores of guests, some of them of flag rank or international reputation. As one former midshipman director said. “The Naval Academy aims to provide a laboratory where we can learn and practice the skills of leadership. Putting on this conference was the toughest leadership and logistical exercise I have faced here yet.

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at Nextwar@cimsec.org.

Featured Image:ANNAPOLIS, Md. (July 1, 2015) The 1,192 members of the U.S. Naval Academy’s incoming Class of 2019 gather in Tecumseh Court for the Induction Day Oath of Office Ceremony. Induction Day marks the beginning of Plebe Summer, the arduous six week indoctrination that transitions civilian students to military life. (U.S. Navy photo by Mass Communications Specialist 2nd Class Nathan Wilkes/RELEASED)

An Adequate NATO Maritime Posture: The Missing Element For Deterring Russia

European Maritime Security Topic Week

By Ian Sundstrom

Introduction

Since the Alliance Maritime Strategy (AMS) was published in 2011, the strategic context facing NATO has shifted. The drafters envisaged a world where the Alliance would continue to be an expeditionary one, employing its forces in counterterrorism, counterpiracy, and humanitarian roles in many locations around the world. Under the aegis of this strategy, Alliance maritime forces did precisely that. Operations Ocean Shield and Active Endeavor were conducted in these contexts. The former was a counterpiracy operation off the Horn of Africa and the latter a counterterrorism operation in the Mediterranean. Both ended in 2016, but Active Endeavor was replaced by Operation Sea Guardian, designed in much the same spirit. Its objectives are very similar: maritime situational awareness, protection of freedom of navigation, maritime interdiction against weapons of mass destruction, counterterrorism, and protection of critical infrastructure. This lone maritime operation does not, however, match the strategic realities that NATO faces.

Over the last six years, NATO’s strategic environment has changed significantly. The Arab Spring, beginning in 2011, led to instability on the Alliance’s southern flank, exacerbated perhaps by NATO’s own actions in Libya. One result has been massive cross-Mediterranean migrant flows that European states have been unable to halt. The civil war in Syria has slowly deteriorated to the point that the United States, its allies, and Russia have become involved in the air and on the ground. Naval activity in the Eastern Mediterranean is at levels not seen since the Cold War. Russian, American, and NATO warships continuously ply these seas and the Russian Navy’s only aircraft carrier recently completed its maiden combat deployment from the Eastern Mediterranean.

There and elsewhere, Russian forces regularly intercept NATO aircraft and ships in international airspace and waters, generating tension between East and West and demonstrating a renewed level of aggression epitomized by the Russian invasion of Ukraine. In 2014 Russia invaded its neighbor and annexed the Crimean Peninsula and the strategic naval base at Sevastopol in the process. Russia’s actions in Ukraine have destabilized Eastern Europe and the Black Sea region and caused concern amongst NATO and non-NATO states that Russia’s next moves may come in the Baltic. NATO was founded to deter and defend against Soviet aggression in Europe, and Russia’s recent actions have shown its enduring necessity after more than two decades of strategic drift. All told, the strategic environment predicted by the drafters of the AMS has evaporated.

Insufficient Measures

NATO has responded to its changing strategic environment almost exclusively through operations and initiatives ashore. To counter Russian aggression and reassure eastern Allies, NATO established two major programs. The first, Enhanced Forward Presence (eFP), installs NATO soldiers in Estonia, Latvia, and Lithuania on a permanent rotational basis. It will be fully established in 2018 and includes troop contributions from 19 member states. The second is Tailored Forward Presence in Romania. This consists of an expanded series of rotational exercises, with the result of near continual NATO presence on Romanian territory. The United States’ own European Reassurance Initiative (ERI), distinct from, but complementary to, NATO actions, is similarly land-focused. Over its three years of existence, from 2015 to today, the annual budget for the U.S. Navy’s participation in ERI has been three percent, four percent, and two and a half percent respectively. The response to Russian aggression has been clearly focused ashore.

The existing initiatives are a step in the right direction, but the lack of a coherent maritime response undermines those efforts and presents opportunities for Russia to exploit. NATO’s sole maritime operation, Operation Sea Guardian, does not support existing efforts to counter Russian aggression. And it is not designed to, as it is specifically not an Article 5 operation. Article 5 of the North Atlantic Treaty requires that treaty signatories come to the defense of one another in case of attack and is considered the bedrock of the Alliance. NATO is right to state that Operation Sea Guardian is not in response to an attack on any member, but by explicitly highlighting that the operation is non-Article 5 in focus, it sends a signal that day-to-day operations are not aimed at deterring NATO’s potential opponents. Operation Sea Guardian is also explicitly focused on Task Four of the AMS, consisting of maritime security operations. These are conceptually distinguished from the deterrence and defense roles of the Alliance delineated in Task One. This further demonstrates to Russia that NATO’s maritime focus is separate from its ground efforts. Even if aimed at deterring Russia, it is insufficiently resourced. One recent “Focused Security Patrol” under the mantra of Operation Sea Guardian comprised three aged frigates (Turkish, Greek, and Italian) conducting 600 combined hours of patrols, or 8 and 1/3 days each, in the Eastern Mediterranean. This level of effort, in both duration and capability, is inadequate in the face of the forces the Russian Navy has maintained in that theater.

Bolstering NATO Seapower

To their credit, Alliance leadership may have begun to recognize the insufficiency of NATO’s maritime posture. As part of Tailored Forward Presence, Alliance defense ministers agreed in February 2017 to increase NATO presence in the Black Sea to improve situational awareness and increase training and exercises. This may improve the situation in the Black Sea, but the problem of deterrence is broader. This ad hoc approach to maritime deterrence will not stop Russia’s pattern of aggressive actions in the seas around Europe.

NATO’s poor showing at sea has led some to argue that the AMS itself needs a total overhaul. Critics are correct in noting that the strategy’s discussion of the maritime security environment is out of date. They also rightly criticize the lack of any resource – i.e. force structure and development – discussion. The strategy is also insufficiently focused on the core collective defense and deterrence mission and therefore not aligned with NATO’s 2015 Political Guidance which reemphasized these core Alliance tasks. The AMS does require a refresh, and policymakers should begin discussions on this now, but without delaying maritime action by the Alliance.

The AMS itself provides the logical basis for conducting peacetime Article 5 operations. The first task the strategy assigns to maritime forces is deterrence and collective defense. By grouping these two concepts together, the AMS links collective defense and deterrence in a continuum of action between peace and war. It highlights that collective defense is the necessary action in response to failed deterrence. Article 5 requires that member states aid one another only in the event of armed attack, but given the defensive nature of the alliance, the terrible consequences of war between NATO and Russia, and the conceptual link between deterrence and collective defense, it is logical to draw explicit connections between peacetime NATO deterrent operations and Article 5 collective defense actions.

Such an explicit connection would improve the deterrent effect of the operation. The AMS notes that deterrence relies upon “proven capability, demonstrations of readiness, and effective strategic communications.” This is firmly based in existing theories of deterrence. An actor, be it a state or group of states, must possess not merely adequate defensive capabilities to either stop enemy aggression or inflict sufficient pain to make the aggression too costly. The actor must also be credibly committed to using this force in the event that deterrence fails. Communicating these two preceding facts to the potential enemy in such a way that their leaders perceive a sufficient threat is the final component. Establishing a new maritime operation would neither change NATO’s capabilities nor fully address the credibility problem inherent in the alliance, but by tying this new operation to Article 5 the alliance would better communicate the seriousness of its commitment to preventing further Russian aggression.

As written, the AMS is flexible enough to serve as the basis for a more coherent maritime response to Russia. As it declares, “the relative weight given to the Alliance’s engagement in each of these roles will depend on circumstances and the resources available.” NATO should rebalance its maritime efforts to increase the relative weight devoted to the deterrence and collective defense mission. This can be accomplished through a combination of three actions: launching a new maritime operation with collective defense and deterrence as its main objective, increasing the frequency and complexity of NATO maritime exercises, and better resourcing the existing Standing NATO Maritime Groups (SNMG) and Standing NATO Mine Countermeasure Groups (SNMCMG).

First, NATO should establish a new operation focused on deterring Russian aggression at sea and, if necessary, exercising collective defense. This operation should explicitly state that it rests upon the foundation of Article 5 of the North Atlantic Treaty. To date, the article has been activated only once, in response to the terrorist attacks of September 11, 2001. Operation Active Endeavor was established as the maritime component of the NATO response to this armed attack on a member state. While Russia has not attacked any members, this recent experience provides some precedent for establishing a maritime operation founded upon Article 5.

To achieve the desired effect, this operation should be wide in its geographic scope and mission to best demonstrate existing capability and readiness. It should be active in the Baltic, Black, Mediterranean, and Norwegian Seas to counter Russian efforts in each of these areas. Russia has increased its maritime presence in each sea to levels last seen during the Cold War and NATO must demonstrate the capability to respond simultaneously in each theater. The operation should also focus on the full-range of maritime missions. It should develop situational awareness of Russian actions, hold Russian maritime forces at risk any time they deploy, and enhance NATO interoperability and build expertise in combined operations at the unit and higher echelon command levels. These actions will better prepare NATO forces to defend against Russian attacks in the event of war and will demonstrate to Russian leaders that NATO stands ready to do so.

Invigorating Alliance Exercises

In addition to a new deterrent operation, NATO should significantly expand the number and scale of its maritime exercises. These exercises should focus on high-end warfighting skills against peer opponents to demonstrate effective combat capability and readiness. Existing maritime exercises are a step in the right direction. The Dynamic-series, consisting of Dynamic Guard, Dynamic Move, Dynamic Mantra, and Dynamic Mongoose in 2017, are focused on air defense and electronic warfare, MCM, and antisubmarine warfare respectively.

NATO Secretary General Jens Stoltenberg is welcomed by the Captain of the frigate Aquitaine, Emmanuel Sagorin. (NATO)

The current exercise schedule is focused on the appropriate warfare areas but it must be significantly expanded to develop the level of competence and interoperability that would be necessary in the event of war. Antisubmarine warfare exercises in particular require expansion and should be the highest priority. The Russian Navy sees submarines as its primary capital ships, unlike western navies which prioritize aircraft carriers. Russia has invested heavily in its submarine force, with new classes under development, old classes undergoing modernization, and new Kilo-class submarines destined for its Black Sea Fleet under construction. By focusing efforts on detecting and defeating submarines, NATO can demonstrate to Russia that, in the event of war, its primary naval forces will be defeated.

Air defense and electronic warfare should also be emphasized. Russia has invested heavily in new antiship missiles. NATO navies must demonstrate their ability to defeat these weapons to show Russia that it cannot count on keeping Allied maritime forces outside striking range of its shore. This will warn Russia’s leaders that they cannot initiate conflicts far from Russian shores and rest assured that the Russian mainland will be safe.

Finally, mine countermeasures remains a key enabler for Allied maritime missions and must be strengthened. In particular, the United States should participate in exercises with its own MCM ships to improve its capabilities and highlight the importance of the mission area. Increasing the frequency and complexity of exercises in these three areas would significantly increase alliance capabilities to counter Russian aggression.

Strengthening Standing Maritime Groups

The final component of an improved NATO maritime posture is better resourcing of the SNMGs and SNMCMGs by member states. Discussions of resourcing in the NATO context are often focused on the two percent policy, wherein member states pledge to contribute two percent of GDP towards defense. Total alliance resources are important, as each state’s total military capabilities are the source of NATO-assigned forces; however, they do not translate directly into forces available for Alliance use. Without increasing their defense budgets, each state could improve NATO’s deterrent posture by assigning more existing forces to NATO missions. A brief review of the maritime forces currently assigned to the Alliance will demonstrate the availability for growth.

As currently constituted, NATO’s standing maritime forces consist of two SNMGs and two SNMCMGs. These consist of the three warships and one tanker of SNMG1, ten warships (five of which are small patrol craft) and one oiler of SNMG2, four mine countermeasures (MCM) ships of SNMCMG1, and five further MCM ships of SNMCMG2, for a total of 23 vessels of all types. Looking deeper, one finds no U.S. ships, no French vessels, only one British minesweeper, and only three German ships, one of which is a tanker. The heaviest contributors are the Spanish, Greek, and Turkish navies, who together contribute almost half the ships. Ships rotate through these standing task groups, but the absence of the two largest NATO fleets and the poor showing from the Royal Navy and Bundesmarine indicate a lack of commitment to the Alliance’s maritime posture.

If each member state contributed an additional vessel, NATO’s maritime forces would more than double, sending a clear signal to Russia that the Alliance was ready to defend its maritime flanks. Barring that, if the United States, France, and the United Kingdom each contributed several ships it would vastly improve the capability of these forces. These navies are not only the largest, but their ships are the most capable against the threats posed by Russian forces.

Conclusion

NATO was founded as a means of defending Western Europe against Soviet aggression, but with the fall of the Soviet Union its raison d’être disappeared and the Alliance lost focus. It grew to incorporate many former foes in Eastern Europe and began participating in peacekeeping and expeditionary operations and envisaged a future where it would emphasize missions other than deterrence and collective defense. Recent Russian actions have reminded Alliance members of its original purpose. Through its invasions of Georgia and Ukraine, its intervention in Syria, and its continued bellicosity at sea and in the air, Russia has proven itself to be a threat to European security once again. NATO has taken actions to deter aggression against its members, but its efforts at sea have been inadequate. Implementing the initiatives above would go a long way toward integrating alliance maritime posture with existing plans ashore, improving the overall deterrent effect. The Alliance has all the necessary tools, its members need only act.

Ian Sundstrom is a surface warfare officer in the United States Navy. The views expressed here are his own and do not reflect those of the United States Department of Defense.

Featured Image: NATO Standing Maritime Groups operating in the Mediterranean (NATO)