Category Archives: Current Operations

On-going Naval Ops or Maritime Current Events

CIMSEC February Recap

CIMSEC

Announcements
Distributed Lethality Task Force Launches CIMSEC Topic Week by Ryan Kelly
CIMSEC Releases First 2016 Compendium by Matt Merighi
January Recap by Dmitry Filipoff
Invite – Feb 18 – CIMSEC DC’s Distributed Lethality Meet Up by Scott Cheney-Peters
CFAR 2016 Nominations Now Open by Scott Cheney-Peters
Distributed Lethality Week Kicks Off on CIMSEC by Dmitry Filipoff
Write for CIMSEC by Dmitry Filipoff

Distributed Lethality Topic Week
A Tactical Doctrine for Distributed Lethality by Jeff E. Kline, CAPT, USN, (ret)
Distributed Lethality: Old Opportunities for New Operations by Matthew Hipple
Enabling Distributed Lethality: The Role of Naval Cryptology by LCDR Chuck Hall and LCDR David T. Spalding
Distributed Leathernecks by LCDR Chris O’Connor

The Legal Implications of Arming MSC Ships by Anthony Freedman and Mark Rosen
Distributed Lethality, Non-Traditional Fleets, and the Law of War by Chris Rawley
Implementing Distributed Lethality within the Joint Operational Access Concept by LCDR Collin Fox

Enabling Distributed Lethality by LCDR Josh Heivly
Reconfiguring Air Cushioned Vehicles to Enhance Distributed Lethality by John Devlin
The Elephant in the Room: E2-D and Distributed Lethality by LCDR Christopher Moran and LT Ryan Heilmann
Distributed Lethality: China is Doing it Right by Alan Cummings
Unleashing Unit Lethality: Revising Operational & Promotion Paradigms by ENS Daniel Stefanus

Publication Releases
Distributed Lethality 2015 Week Compendium
Chinese Military Strategy Week Compendium
Distributed Lethality 2016 Week Compendium

Sea Control
Sea Control 108-Expertise with Prof. Tom Nichols hosted by Matt Hipple
Sea Control 109 CAPT Raimondo & Navy FITREPS hosted by Matthew Merighi
Sea Control 110 Small Arms Control and the South Pacific hosted by Natalie Sambhi

Interviews
On Naval History, Books, and Coal: An Interview with Rear Admiral James Goldrick RAN (ret.) by Christopher Nelson

Member Round Up
January 2016 Members Roundup Part 1 by Sam Cohen

Events
8-12 Feburary 2016 Events of Interest by Emil Maine
14-21 February 2016 Events of Interest by Scott Cheney-Peters
29 February- 4 March 2016 Events of Interest by Scott Cheney-Peters and Emil Maine

Naval Affairs
Series: 21st Century Maritime Operations under Cyber-Electromagnetic Operations by Jon Solomon
crossposted from Information Dissemination
Part One
Part Two
Declassified: U.S. Nuclear Weapons at Sea by Hans M. Kristensen
crossposted from Federation of American Scientists
North Korea and Asymmetric Naval Warfare by Paul Pryce
People Not Parts: Returning Ingenuity and Tenacity to our Officer Corps by Ian Akisoglu

Asia-Pacific
Trailblazers In Warfighting: The Maritime Militia of Danzhou by Andrew S. Erickson and Conor M. Kennedy
Series: U.S. Department of State Seeks to Clarify Meaning of China’s Nine Dash Line Claim by Alex Calvo

Part One
Part Two
Part Three
Part Four
Finale
Little Fallout: Vietnam’s Security Policy after the 12th Congress of the Vietnam Communist Party by Zachary Abuza and Nguyen Nhat Anh
India: International Fleet Review 2016 by Commodore RS Vasan
crossposted from South Asia Analysis Group
China’s Middle East Balancing Act by Adam MacDonald
crossposted from the Conference of Defense Associations Institute

Middle East
Farsi Island and Matters of Honor by Jake Bebber

Western Hemisphere
How Peaceful is the South Atlantic? by W. Alejandro Sanchez
Whence the Threat? Lessons from Argentina’s Air-Naval Arsenal in 2015 by Hal Wilson
crossposted from the Phoenix Think Tank

Cyber
Apple Thinks It Is Protecting Freedom. It’s Wrong. Here’s Why. by Dave Schroeder

A Call for an EU Auxiliary Navy – under German Leadership

By Dr. Sebastian Bruns

A popular quote reads “A ship in port is safe. But that’s not what ships are made for.” Correspondingly, one could quip “Navies are very good in constabulary tasks. But that’s not what they’re maintained for,” echoing noted political scientist Samuel Huntington in the process. More than sixty years ago, Huntington wrote about the purpose of naval forces in the early Cold War, yet some of his thoughts have an enduring value for 2016. In the Mediterranean, not one but two naval task groups are working hard to contain a humanitarian crisis at sea. While their service is admirable and strictly necessary, even as it is only a drop in a bucket, naval capabilities which are in high demand elsewhere are bound in a mission that is only a secondary role for navies. Instead, Germany should lead the way in investing in an EU auxiliary force.

A crowded boat with migrants awaits rescue by EU NAVFOR MED.
A crowded boat with migrants awaits rescue by EU NAVFOR MED.

In May 2015, the German Navy began participating in the search and rescue mission in the Central Mediterranean north of the Libyan coast, dubbed EU NAVFOR MED (Operation “Sophia”) shortly thereafter. The pressure to act had become unbearable for political decision-makers in Berlin and Brussels after yet another devastating humanitarian catastrophe which occurred somewhere on the High Seas between Libya and Italy. An overloaded boat sank during the night of 18/19 April, costing the lives of up to 800 migrants. Hundreds others had perished in the Mediterranean during the months before. Following a European Council decision and a parliamentary green light, the German Navy dispatched the frigate Hessen (F221) and the combat support ship Berlin (A1411) to provide a presence north of Libyan territorial waters. At the time, both ships were operating off the Horn of Africa and in the Easter Mediterranean to provide the German Navy with an operational reserve. Hessen and Berlin joined a number of other EU vessels, which ranged from warships to auxiliary and coast guard ships. EU NAVFOR MED was just the latest mission that the German government engaged its shrinking military forces in; on the maritime domain alone, Germany is continuously involved in naval operations in the central Mediterranean (ACTIVE ENDEAVOUR, since 2002), off the coast of Lebanon (UNIFIL, since 2006), and on the Horn of Africa (EU NAVFOR Atalanta, since 2008). German Navy participation in one or often two of the four Standing NATO Maritime Groups, exercises, training, and out-of-the-schedule naval operations such as providing cover for the destruction of Syrian chemical weapons at sea in 2014 have added pressure to (wo)men and material.

Combat support ship Berlin and frigate Hessen steam side by side in the initital provision of humanitarian assistance on the Southern flank.
Combat support ship Berlin and frigate Hessen steam side by side in the initital provision of humanitarian assistance on the Southern flank.

Cue: Queen, “Under Pressure”

Since the summer of 2015, rotating up to two ships in and out of the EU NAVFOR MED mission – such as the Berlin’s sister ship Frankfurt (A1412), or the tender Werra (A514) – put a truly severe strain on German military-operational planning. It goes without saying that adapting these venerable warships and supply vessels, which are optimized for many things other than housing, feeding, and medically caring for hundreds of castaways on board, has put a strain on the Deutsche Marine. The noble task of saving lives at sea has challenged the well-trained crews of the ships, but it hardly obscured the fundamental problem that more than two decades of defense budget cuts, strategic disorientation, and a larger disinterest in all things hard power by the German public (and most of its political masters) have caused. By default, the German Navy has turned into a low-end, operationally-minded force, where high intensity should be a design guide.

The German Navy’s dilemma, at 16,000 people and just 62 vessels at the smallest it has ever been by a December 2015 count, was illustrated best right before Christmas. In response to the November attacks in Paris, the frigate Augsburg (F213) was re-assigned from EU NAVFOR MED to provide air defense for the French aircraft carrier Charles de Gaulle in the Eastern Mediterranean and Persian Gulf. The mine hunter Weilheim (M1059), en route to return from UNIFIL to its homeport on the Baltic Sea right in time for the holidays (and probably the least-capable vessel to offer space for potentially hundreds of migrants), was tasked to remain in the Central Mediterranean. It joined the corvette Ludwigshafen am Rhein (F264), another warship tasked with a humanitarian assistance task that was hardly envisioned by strategic and operational planners in Berlin and Rostock, site of the naval command. Samuel Huntington, who warned that navies should concentrate on providing high end options and not be used for low-end missions, would probably turn over in his grave. This is not to say that other countries did not have their own challenges in providing assets to the mission, but some of them are better equipped to attend to low-end missions. The Royal Navy, for instance, dispatched HMS Enterprise (H88), a multi-role hydrographic oceanographic vessel.

The corvette Ludwigshafen am Rhein is currently part of Germany's contribution to EU NAVFOR MED. Germany's naval missions can sometimes be as complicated as its ship-naming policy.
The corvette Ludwigshafen am Rhein is currently part of Germany’s contribution to EU NAVFOR MED. Germany’s naval missions can sometimes be as complicated as its ship-naming policy.

When all you have is a hammer, every problem looks like a nail

In February 2016, the German Navy is still tied up in the EU NAVFOR MED. Privately owned platforms such as the Phoenix, operated by the Malta-based Migrant Offshore Aid Station (MOAS), and two vessels operated by Doctors without Borders (Medicines Sans Frontiers, MSF), the offshore supply ships Bourbon Argos and Dignity 1, have also at some point joined the operation (although they are not integrated into the EU force). At the same time, the Aegean Sea, which offers the shortest distance between Turkey and Greece, has moved into focus for human trafficking. The cold of winter has hardly deterred the refugees from mounting unseaworthy dinghies, rubber boats, or derelict fishery vessels that the criminal networks of human traffickers operate. In response, NATO stepped in and dispatched its Standing NATO Maritime Group 2 (SNMG2). The task force is commanded by the German rear admiral Jörg Klein and currently consists of the German Navy combat support Ship Bonn (A1413) and four frigates from Turkey, Italy, Greece, and Canada. As the New York Times noted in an article on 11 February,

“while the hastily made decision reflected the growing urgency of the situation, it was not clear that it would have much practical effect on the flow of refugees fleeing Syria’s five-year civil war: The alliance said it would not seek to block the often rickety and overcrowded migrant vessels or turn them back, and military officials were scrambling to determine precisely what role their warships would play.”

Standing NATO Maritime Group 2, seen here steaming in formation, is currently tasked with operating on the Aegan Sea refugee route.
Standing NATO Maritime Group 2, seen here steaming in formation, is currently tasked with operating on the Aegan Sea refugee route.

A European Auxiliary Navy

Granted, the political leverage for European integration is low at the moment. The European Union is struggling to fend off tendencies that call not for an ever closer union, but in fact work towards dismantling some of the EU’s accomplishments in the wake of the refugee crisis. Still, with security and defense in increasing demand, including maritime security from on Europe’s southern flank, there need to be fresh ideas that can be operationalized quickly. In the face of the deteriorating relations between the West and Russia and the disintegrating Middle East, warships should contribute to the more robust stance against political aggression and hard threats, thus focusing on more of their core tasks (no doubt requiring doctrinal and conceptual re-assessments in some European capitals). This would give NATO a stronger role, and leave the EU to take care of the low-end maritime task. It could thus serve as an example of burden-sharing between the two entities.

Germany could play a leadership role in drawing up a European auxiliary navy, reenergizing the European spirit of cooperation in the process. Such a task force could have a number of political advantages. First, it would send a strong signal that European nations are willing to work together to address the ramifications of maritime trafficking. Second, Germany would address calls from inside and outside to do more. As a maritime nation with strong normative impulses, the Federal Republic would also demonstrate to the electorate (long weary of military engagement) that it is aware of the utility of naval forces in crisis response. Naturally, German investment into an auxiliary EU navy should not come at the expense of more robust naval tasks with the German Navy, but these could be better tailored if the combat support ships, frigates, and corvettes need not be used in lesser operations. Third, if and when the current migrant crisis ebbs, the European auxiliary navy could concentrate on the public diplomacy role of naval forces, providing anything from humanitarian assistance to the provision of medical services on goodwill tours around the world (like the U.S. Navy and the Chinese PLAN routinely do already). This auxiliary navy could also lend a hand to regional coastal and constabulary navies and coast guards (e.g. in West or East Africa) to train and exercise.

The last dedicated German hospital ship was the MS Helgoland, which saw extensive action in Saigon (South Vietnam) between 1966 and 1972. The ship was operated by the German Red Cross.
The last dedicated German hospital ship was the MS Helgoland, which saw extensive action in Saigon (South Vietnam) between 1966 and 1972. The ship was operated by the German Red Cross.

To this end, it is strictly necessary to inject some fresh thinking into how such as force could be tailored. It is imperative that an idea such as this can be put into action rather quickly before being brought to grinding snail speed by bureaucrats in Brussels or Berlin. First, one should look at the market of commercial vessels. Ro/Ro ships or offshore supply ships are available, usually even on short notice. They could be painted gray or white, manned by a mixed civilian-military crew, and quickly form the backbone of an auxiliary navy.

The Royal Navy used the Ro/Ro vessel Atlantic Conveyor in the 1982 campaign to retake the Falkland Islands from Argentina. The makeshift helicopter and Harrier carrier was sunk by Argentine forces in the course of the conflict.
The Royal Navy used the Ro/Ro vessel Atlantic Conveyor in the 1982 campaign to retake the Falkland Islands from Argentina. The makeshift helicopter and Harrier carrier was sunk by Argentine forces in the course of the conflict.

Other opportunities arise as well. The offshore patrol vessel L’Adroit (P725) is a demonstrator vessel built by French shipbuilder DCNS and was placed at the disposal of the French Navy for three years, a period that is now drawing to a close. The ship could be introduced as a French contribution to the auxiliary navy, which need not limit itself to state-run ships. If done properly, NGOs like SOS Mediterranee could be integrated (the non-profit organization operates the MS Aquarius, a former German fishery protection vessel). The former rescue cruiser Minden, built in 1985 and serviced by volunteers from the German Maritime Search and Rescue Service, will join what is already emerging as a multinational, civilian, and military task force in the Mediterranean.

The former SAR cruiser Minden, for thirty years operated in the North Sea and Baltic Sea by an NGO, will soon begin rescue operations in the Mediterranean.
The former SAR cruiser Minden, for thirty years operated in the North Sea and Baltic Sea by an NGO, will soon begin rescue operations in the Mediterranean.

In the medium term, one could consider the charter of vessels which could be converted quickly as dedicated hospital ships, also crewed by civilian mariners and military. A logistics ship would also come in handy, as well as a simplistic command platform. To provide range, ships taken up from trade (not such a novel concept after all) could be selected if they provide the opportunity to operate reconnaissance drones or helicopters. In the long term, there are even further ideas that could be floated. For example, the 2016 German federal budget has earmarked the procurement of three new patrol vessels for the Bundespolizei See, Germany’s quasi Coast Guard. It is entirely plausible that these ships could also be detached as part of the EU’s auxiliary fleet, akin to NATO’s SNMGs – that is, if Germany politically resolves its constitutional conflict between police and military jurisdiction and respective responsibilities. To go even further, the German Navy is currently in the early stages of procuring the future multi-role combat ship MKS180, designed as a modular warship. Is it too far-fetched to consider adding a civilian variant, a MKS180CIV, for the auxiliary “Great EU White Fleet”?

The German Navy's next project: Multi-role combat ships MKS180 (artist conception).
The German Navy’s next project: Multi-role combat ships MKS180 (artist conception).

To be clear: Such an auxiliary navy would have to be organized, trained, and equipped properly. This requires financial and political investments. The task force, more of a 10-ship navy than a 100- or even 1000-ship navy, would provide a vision for European cooperation. EU or United Nations mandates would be desirable. It appears that it is also a much more sensible road leading to further defense and security cooperation than political soap-box oratories about the need for a European army could ever do. Politically and operationally, it could provide Berlin with a sense of regaining some degree of initiative when it comes to maritime security.

Sebastian Bruns directs the Center for Naval Strategy and Security at the Institute for Security Policy, University of Kiel (Germany). He is the editor of “The Routledge Handbook of Naval Strategy and Security” (Routledge: London 2016). 

The Aegis Warship: Joint Force Linchpin for IAMD and Access Control

This article originally appeared in the National Defense University’s Joint Forces Quarterly 80, and is republished with permission. It can be read in its original form here.

By John F. Morton

Under defense strategic guidance, U.S. combatant commanders have been rebalancing joint forces along the Asia-Pacific Rim with recalibrated capabilities to shape the regional security environments in their areas of responsibility. The mission of what the 2012 guidance calls “Joint Force in 2020” is to project stabilizing force to support our allies and partners, and to help maintain the free flow of commerce along sea lines of communication in the globalized economic system.1

Forces postured forward for deterrence and conflict prevention are a substantial component to U.S. global engagement. The combatant commanders, joint community, and Services are working together to plan and resource this joint force with credible, effective, and affordable warfighting capabilities that assure friends and deter adversaries—should deterrence and conflict prevention fail.

Complicating the combatant commanders’ calculus are the advancing antiaccess/area-denial (A2/AD) capabilities in the hands of potential adversaries and rogue states that pose a major challenge to the maritime domain. From the Arctic to the Arabian Gulf, Russia, North Korea, China, India, Pakistan, and Iran all have to varying degrees either deployed or are developing nuclear weapon and ballistic missile capabilities. Combined with other A2/AD capabilities that include sea-skimming and high-diving supersonic cruise missiles, these threats to the global maritime commons translate into powerful tools for diplomatic coercion.

The 2014 Quadrennial Defense Review put specific priority on increasing overall joint force capabilities to counter growing A2/AD challenges. In what the Pentagon characterizes as the A2/AD environment, defense officials are now conceptualizing the high-end level of the warfighting spectrum around the integrated air and missile defense (IAMD) mission. In December 2013, General Martin Dempsey, then Chairman of the Joint Chiefs of Staff, released his Joint Integrated Air and Missile Defense: Vision 2020 that spoke of the need for IAMD to “be even more Joint—advancing interdependence and integrating new capabilities.”2

Senior military officials conceive of high-end operations as IAMD-centric. They view IAMD as a joint capability to be employed at the tactical, operational, and strategic levels of war. Competitive IAMD strategies for today’s A2/AD environments are comparable to those strategies formulated during the Cold War with reference to the Fulda Gap, such as the Follow-on Forces Attack subconcept. The strategies inform IAMD requirements generation and acquisition, as well as the Planning, Programming, Budgeting, and Execution process for systems and architectures.

Ticonderoga-class guided-missile cruiser USS Chancellorsville recently completed combat systems update with latest Aegis Baseline 9 combat system, June 18, 2015 (U.S. Navy/Peter Burghart)
Ticonderoga-class guided-missile cruiser USS Chancellorsville recently completed combat systems update with latest Aegis Baseline 9 combat system, June 18, 2015 (U.S. Navy/Peter Burghart)

Joint IAMD describes the IAMD environment as an expanding battlespace requiring plans and operations that range across global, regional, transregional, and homeland domains. “The regional and intercontinental reach of ballistic missiles,” it continues, “alters the strategic and operational decision space.”3 IAMD forces in a specific theater can extend to regional, transregional, and homeland operations. As such, combatant commander plans must allow for coordination and handoff across combatant command areas of responsibility.

Since May 2013, the Missile Defense Agency (MDA) has had technical authority over the IAMD mission. MDA now leads all joint IAMD engineering and integration efforts, including defining and controlling the IAMD interfaces and the allocation of IAMD technical requirements. MDA’s current director is Vice Admiral James Syring, the first Navy head of the agency. His arrival in 2012 coincided with a time when the Aegis ship-based combat system came to be seen as a core element of U.S. and partner nation efforts in ballistic missile defense (BMD) in line with the European Phased Adaptive Approach (EPAA), the administration’s missile defense strategy for Europe.4 Syring previously served as the program executive officer for integrated warfare systems (PEO IWS) in the Navy office that was responsible for modernization of Aegis cruisers and destroyers, new construction, and ongoing baseline upgrades to their combat systems.

Working with MDA in driving IAMD jointness is the Joint Staff’s Force Structure, Resources, and Assessment Directorate (J8), specifically the Joint Integrated Air and Missile Defense Organization (JIAMDO). This group leads in developing and fielding a comprehensive, integrated joint and combined air and missile defense force in support of Joint IAMD. Since June 2014, JIAMDO directors have been two other Navy flag officers, Rear Admiral Jesse A. Wilson, Jr., and his recent successor, Rear Admiral Ed Cashman. They have led JIAMDO in planning, coordinating, and overseeing joint air and missile defense requirements, operational concepts, and operational architectures. They have also headed the U.S. delegation to the North Atlantic Treaty Organization (NATO) Air and Missile Defense Committee that develops and steers Alliance IAMD policy, all the more important in view of the current situation in the Eastern Mediterranean.

These Navy appointments to the joint community reflect the reality that the foundational maritime IAMD enablers for active defense will be the surface Navy’s modernized fleet of Aegis-equipped warships. Mobile, forward-deployed Aegis cruisers and destroyers, variously upgraded, will serve as the combatant commanders’ net-enabling nodes for globally integrated joint force operations for access control. (Augmenting the missile defense capability of at-sea Aegis platforms in the NATO area of responsibility will be the land-based Aegis Ashore variant. Under EPAA Phase II, Aegis Ashore is in Romania with a technical capability declaration that came at the end of 2015; the Office of the Secretary of Defense for Policy has planned for initial operational capability [IOC] in July 2016. Phase III Aegis Ashore is due in Poland in 2018.)

Modernized Aegis as the IAMD Game Changer

The linchpin of regional IAMD is surface warfare, then-Captain James Kilby wrote in April 2014.5 The deputy for ballistic missile defense, Aegis combat systems, and destroyers in the Office of the Chief of Naval Operations (OPNAV) Surface Warfare Directorate (N96), Kilby explained that the surface Navy’s fleet of 30 Aegis cruisers and destroyers is capable of conducting ballistic missile defense. His main points, however, addressed how a host of additional Aegis ships are undergoing modernization and will be equipped with a new combat system baseline that provides advanced IAMD capabilities. Now a rear admiral, Kilby became the first commander of the newly established Naval Surface and Mine Warfighting Development Center in San Diego in mid-2014. Prior to his OPNAV service, he commanded the cruiser USS Monterey (CG 61), the first Aegis BMD ship to deploy to the Mediterranean in March 2011 to support EPAA.

sm launch
Crew of guided-missile destroyer USS John Paul Jones successfully engaged 6 targets with 5 Standard Missiles during live-fire test, June 19, 2014 (U.S. Navy)

Kilby stated that the key feature of Aegis IAMD modernization is the Baseline 9 combat system upgrade that provides the ability to conduct integrated fires via a sensor net linking ships and aircraft. Four Baseline 9 ships—two cruisers and two destroyers—underwent certification in 2015. An additional BMD destroyer, the lead Baseline 9 destroyer USS John Paul Jones (DDG 53), is homeported in Hawaii. In August 2014, the John Paul Jones replaced the Aegis cruiser USS Lake Erie (CG 70) as the deployable BMD test ship assigned to the Barking Sands Pacific Missile Range Facility on Kauai to support MDA and Navy testing of IAMD capabilities. (The John Paul Jones Baseline 9 upgrade was co-funded by the Navy and MDA. Although the ship is an “integrated baseline ship” that is also deployable, it is not a combatant command asset.) John Paul Jones has to date successfully completed four flight test events intercepting both short-range ballistic missile and cruise missile targets using the Standard Missile (SM)-6 Dual I and SM-2 Block IV missiles.

The most complex variant of integrated fires, wrote Kilby, is the emerging Navy Integrated Fire Control–Counter Air (NIFC-CA) capability that dramatically extends the sensor net to allow for missile engagements beyond the radar horizon. NIFC-CA provides integrated fire control for theater air and antiship cruise missile defense in the tactical environment. The capability greatly expands the over-the-horizon air warfare battlespace for surface combatants to enable third-party targeting and use of smart missiles. “If properly employed with the right tactics,” Kilby wrote, NIFC-CA, the SM-6 surface-to-air/space missile, the E-2D Hawkeye with the Cooperative Engagement Capability (CEC), and 5th-generation F-35 fighter aircraft will be “IAMD game changers.”

OPNAV’s Surface Warfare Directorate is working to enhance the utility of NIFC-CA. Among the concepts considered is making the Baseline 9 ships less reliant on assets of the carrier strike group by using an organic unmanned aerial vehicle with the necessary data links to provide the tracking and targeting information to the ship’s system as a way forward for Aegis in its IAMD role.

In 2013, then–Chief of Naval Operations Admiral Jonathan W. Greenert directed the Service to accelerate NIFC-CA’s fielding, achieving IOC of Increment 1 with the E-2D in 2014. The Theodore Roosevelt carrier strike group deployed with a squadron of E-2Ds and the USS Normandy (CG 60), a Baseline 9 cruiser. The lead Baseline 9 cruiser, USSChancellorsville (CG 62), is now under operational control of U.S. 7th Fleet. The third Baseline 9 cruiser, USS Princeton (CG 59), underwent combat system ship qualification trials and integrated testing in July 2015. The initial NIFC-CA concept of operations, however, still requires additional testing and refinement as the Navy delivers the tactics, techniques, and procedures (TTPs) needed to exploit the new IAMD capabilities.

While the Baseline 9 cruisers go by the name “air defense cruisers,” the Baseline 9 destroyers will be full-up IAMD Aegis ships with both NIFC-CA and BMD capabilities. The Baseline 9.C1 destroyers USS John Paul Jones, USS Benfold (DDG 65), and USS Barry (DDG 52) were slated to achieve Navy certification in 2015 with open architecture BMD 5.0 combat system computer software. Benfold is now on station with the 7th Fleet’s Forward Deployed Naval Forces in Yokosuka, Japan. Barry will follow by 2017.

Based on the tactical threat picture, Baseline 9 Aegis destroyers will be able to allocate their computer resources more dynamically in a single computing environment to maximize their BMD performance without degrading their air defense role. The principal enabler of this capability is the multi-mission signal processor (MMSP) for the Aegis SPY-1D radar. Earlier BMD computing suites for the radar used a separate signal processor, meaning a BMD-equipped surface warship could engage either a ballistic missile or an aircraft/cruise missile threat, but not both threats simultaneously. This situation resulted in difficult trade-offs that limited the system’s anti-air warfare (AAW) capability to an unknown extent. The MMSP, however, effectively integrates signal-processing inputs from the BMD signal processor and the legacy Aegis in-service signal processor for the radar. This integration enables the SPY radar to go from single-beam to dual-beam capability to meet the power resource priorities for simultaneous anti-air warfare and BMD sector coverage. The MMSP’s up-to-date commercial off-the-shelf hardware and software algorithms control radar waveform generation and allow for simultaneous processing of both AAW and BMD radar signals.

Critically, the MMSP improves Aegis SPY radar system performance in littoral environments, for example, against sea skimmers in a high-clutter environment. For BMD, the processor also enhances search and long-range surveillance and tracking and BMD signal processor range resolution, discrimination, and characterization, as well as real-time capability displays.

The Navy’s PEO IWS strategic vision for Aegis modernization is simple. Smaller and more frequent upgrades to modular combat systems with open architecture and standard interfaces will best enable the surface Navy to maintain operational superiority in support of the joint force in the A2/AD environment.

Aegis baseline upgrades strive for commonality to reduce the combat system footprint onboard ships. Future baselines will bring additional IAMD capabilities, notably, integration of additional off-board sensors as the joint force “sensor-shooter” networks mature and A2/AD counters in the access environment. A key developmental focus is determining what other off-board elements can integrate into the fire control loop and federated network to increase overall affordability and lethality.

JIAMDO: An Ally for Driving Data-Sharing over the Sensor-Shooter Net

Guided-missile cruiser USS Lake Erie equipped with second-generation Aegis BMD weapon system used launch-on-remote doctrine to engage target from Pacific missile range facility, February 12, 2013 (U.S. Navy/Mathew J. Diendorf)
Guided-missile cruiser USS Lake Erie equipped with second-generation Aegis BMD weapon system used launch-on-remote doctrine to engage target from Pacific missile range facility, February 12, 2013 (U.S. Navy/Mathew J. Diendorf)

The good news is that the question of how to share data is no longer a “cultural issue.” The Joint Integrated Air and Missile Defense Organization is helping to forge strong relationships across PEO IWS, MDA, combatant commands, and the Services. The bad news, however, is that going from interoperable to integrated systems that seamlessly share data will require investments in systems testing and evaluation among the Services. The era of declining defense budgets and increasing demand from combatant commanders for capacity as well as capability provides impetus to leverage efficiencies with joint and possibly Allied systems. “Importantly, IAMD will need to be even more Joint—advancing interdependence and integrating new capabilities,” states the Joint IAMD.6 Affordability is key to the joint IAMD vision for fielding more systems. The JIAMDO Vision and Roadmap describe the “to be” goals and desired states of IAMD in 2020 and 2020–2030, respectively. Not anticipating a quantum leap to interoperability, JIAMDO is working closely with MDA’s IAMD technical asessment to determine what interoperability is possible given Service budgets and willingness.

Modernized Aegis cruisers and destroyers will plug into the strategic-level network of national sensors for missile defense. This sensor-shooter net will ultimately provide them with a flexible, combined launch-on-remote/engage-on-remote capability along the area and regional missile defense continuum, potentially extending to select homeland defense missions in the future.

The potential for further IAMD sensor-shooter networks to counter A2/AD capabilities is leading both combatant commanders and JIAMDO to focus on track correlation and data links. From an Aegis-platform perspective, the farther out the sensor-shooter mix, the more crucial the resolution of track correlation issues. Tracks and data are provided, for example, by Link 16, CEC, and the Command and Control Battle Management and Communications network, the integrating element of the ballistic missile defense system.

JIAMDO has been pushing the Services to share common tracks for a shared-picture, integrated fire control (IFC) and operational-level joint engagement zones (JEZs). JIAMDO funds and runs exercises for combatant commands and the Services to test TTPs for joint IAMD missions. The annual Black Dart exercises, for example, test countermeasures against unmanned aerial systems. Joint IAMD challenges JIAMDO to leverage ongoing efforts to improve the air picture (the common operational picture [COP] for wide-area surveillance and battlespace awareness), combat identification (CID), discrimination (for ballistic missiles), and IFC and battle management, for example, via automated battle management aids (ABMA). Having embraced the joint IAMD vision, the Office of the Secretary of Defense and combatant commanders have accepted localized JEZ integrated air and missile defense. JIAMDO is thus active in developing its JEZ approaches and their COPs. Indeed, it regards COPs as one of the so-called pillars of IAMD, along with CID, IFC, and ABMA.

JIAMDO has the responsibility for developing the IAMD operational architecture—the broad-based description of how things work conceptually over the entire IAMD mission area. A fully functional joint IAMD architecture supports execution of current and future concepts with operationally representative positions for these systems. Applying a systems-agnostic approach, a JIAMDO technical committee takes that architecture and then defines IAMD system requirements in concert with the MDA Joint Service Systems Engineering Team (JSSET), now that MDA has the responsibility over IAMD technical assessment.

Having technical authority over IAMD missions, MDA approaches interoperability architecture first by building on legacy systems that will then inform ground-up design for future systems. To execute the joint IAMD architecture requirements for Aegis, MDA works with its Aegis BMD component and the Navy’s PEO IWS 7.0 (Future Combat Systems). IAMD interoperability requirements also apply to the Army Terminal High Altitude Air Defense and Patriot missile systems, the Air Force Airborne Warning and Control System, F-15 and F-22 aircraft, the Navy E-2 and F/A-18 aircraft, and the Army Joint Land Attack Cruise Missile Defense Elevated Netted Sensor system, among others.

The JSSET is the specific MDA entity that coordinates the work on the architectures. This team serves as a joint acquisition effort to build the future framework for the near-term joint track management capability (JTMC) and long-term joint IAMD capabilities. JSSET now has a business structure for outreach as well as traction for the system architecture products that are releasable to NATO Allies and industry for the requirements definition process.

A priority product is the Army/Navy JTMC Bridge. JSSET is continuing development of the JTMC Bridge, which has been in the works for several years. Representing a successful translation of operational needs into joint requirements, the Bridge is in fact the only system architecture for an entire mission area. A hardware solution specific to connecting two systems—the Army Integrated Fire Control Network and the Navy CEC—the JTMC Bridge has the potential to enable additional kill chains. At this point, however, JIAMDO and the JSSET recognize the value of the Bridge. JIAMDO would like to see a broader, future-looking effort toward an IAMD-wide systems architecture based on the operational architecture. Studies are ongoing, including an operational benefits analysis and cost benefit analysis.

Looking Ahead

Joint Integrated Air and Missile Defense: Vision 2020 aspires to integrate policy, strategy, concepts, tactics, and training. The overarching imperative that supports integration must incorporate:

  • Creating an awareness of the IAMD mission and the benefits of its proper utilization across the Department of Defense, to include the development of the enabling framework of concepts, doctrine, acquisition, and war plans that support full integration of IAMD into combat operations. Commanders must understand and embrace every weapon and tool available to them.
  • Educating personnel at every level on the need to integrate our capabilities into an interdependent joint force, how to employ joint elements together, how to employ elements in a joint engagement zone, what combinations create which capability, and which are ineffective when employed on a stand-alone basis.7

refuel

In his April 2014 commentary, Rear Admiral Kilby wrote, “Efficient and effective command and control (C2) of IAMD forces ensures that we employ these new capabilities to their maximum effectiveness, which requires moving beyond the C2 approach under which we currently operate.”8 To exploit the Navy’s revolutionary Aegis IAMD capabilities, the admiral observed that, “Surface Warriors must embrace the art and science of IAMD. . . . We require pioneering naval officers to master 21st-century warfighting technology, discard outdated ideas, and generate, sometimes from scratch, the tactics, techniques and procedures essential for effective employment of new weapons systems.”

Kilby wants the Navy to assemble Strike Group Staffs, ship crews, and Air Wing personnel to do the significant, dedicated planning and integration essential for putting NIFC-CA, SM-6, Aegis Baseline 9, CEC, E-2D, and F-35 to sea. “This execution is operational rocket science,” he concluded. “Those who master it will be identified as the best and brightest.”

Under command of the best and brightest, modernized Aegis NIFC-CA and IAMD warships will enable the Navy to maintain its historical role as the Nation’s provider of general purpose fleets operating away from American shores to maintain maritime access and the security of the maritime commons. JFQ

John F. Morton is a Senior National Security Analyst for TeamBlue National Security Programs, Gryphon Technologies LC.

Notes

1 Sustaining U.S. Global Leadership: Priorities for 21st Century Defense (Washington, DC: Department of Defense, January 2012), 3, available at <www.defense.gov/news/defense_strategic_guidance.pdf>. Referencing U.S. engagement in the Asia-Pacific, the 2014 Quadrennial Defense Review speaks of “our commitment to free and open commerce, promotion of a just international order, and maintenance of open access to shared domains.” Quadrennial Defense Review 2014(Washington, DC: Department of Defense, 2014), 4, available at <http://archive.defense.gov/pubs/2014_Quadrennial_Defense_Review.pdf>.

2 Joint Integrated Air and Missile Defense: Vision 2020 (Washington, DC: The Joint Staff, December 5, 2013), 1, available at <www.jcs.mil/Portals/36/Documents/Publications/JointIAMDVision2020.pdf>.

3 Ibid., 1–2.

4 Rachel Oswald, “Missile Defense Agency May Go in New Direction with New Chief, Advocate Says,” Global Security Newswire, August 8, 2012, available at <www.nti.org/gsn/article/missile-defense-agency-may-go-new-direction-new-navy-leadership-advocate-says/>.

5 James Kilby, “Surface Warfare: Lynchpin of Naval Integrated Air/Missile Defense,” Center for International Maritime Security, April 4, 2014, available at<https://cimsec.org/surface-warfare-lynchpin-naval-integrated-airmissile-defense/10748>.

6 Joint Integrated Air and Missile Defense, 1.

7 Ibid., 5.

8 Kilby.

Apple believes it is protecting freedom. It’s wrong. Here’s why.

Ed. note: This is an expanded version of a previous article, “We Don’t Need Backdoors.”

By Dave Schroeder

Let me open by saying I’m not for backdoors in encryption. It’s a bad idea, and people who call for backdoors don’t understand how encryption fundamentally works.

Apple has been ordered by a court to assist the FBI in accessing data on an iPhone 5c belonging to the employer of one of the San Bernardino shooters, who planned and perpetrated an international terrorist attack against the United States. Apple has invested a lot in OS security and encryption, but Apple may be able comply with this order in this very specific set of circumstances.

Apple CEO Tim Cook penned a thoughtful open letter justifying Apple’s position that it shouldn’t have to comply with this order. However, what the letter essentially says is that any technical cooperation beyond the most superficial claims that there is “nothing that can be done” is tantamount to creating a “backdoor,” irrevocably weakening encryption, and faith in encryption, for everyone.

That is wrong on its face, and we don’t need “backdoors.”

What we do need is this:

A clear acknowledgment that what increasingly exists essentially amounts to virtual fortresses impenetrable by the legal and judicial mechanisms of free society, that many of those systems are developed and employed by US companies, within the US, and that US adversaries use those systems — sometimes specifically and deliberately because they are in the US — against the US and our allies, and for the discussion to start from that point.

The US has a clear and compelling interest in strong encryption, and especially in protecting US encryption systems used by our government, our citizens, and people around the world, from defeat. But the assumption that the only alternatives are either universal strong encryption, or wholesale and deliberate weakening of encryption systems and/or “backdoors,” is a false dichotomy.

How is that so?

Encrypted communication has to be decrypted somewhere, in order for it to be utilized by the recipient. That fact can be exploited in various ways. It is done now. It’s done by governments and cyber criminals and glorified script kiddies. US vendors like Apple, can be at least a partial aid in that process on a device-by-device, situation-by-situation basis, within clear and specific legal authorities, without doing things we don’t want, like key escrow, wholesale weakening of encryption, creating “backdoors,” or anything similar, with regard to software or devices themselves.

When Admiral Michael Rogers, Director of the National Security Agency and Commander, US Cyber Command, says:

“My position is — hey look, I think that we’re lying that this isn’t technically feasible. Now, it needs to be done within a framework. I’m the first to acknowledge that. You don’t want the FBI and you don’t want the NSA unilaterally deciding, so, what are we going to access and what are we not going to access? That shouldn’t be for us. I just believe that this is achievable. We’ll have to work our way through it. And I’m the first to acknowledge there are international implications. I think we can work our way through this.”

…some believe that is code for, “We need backdoors.” No. He means precisely what he says.

When US adversaries use systems and services physically located in the US, designed and operated by US companies, existing under US law, there are many things — entirely compatible with both the letter and spirit of our law and Constitution — that could be explored, depending on the precise system, service, software, device, and circumstances. Pretending that there is absolutely nothing that can be done, and that it must be either unbreakable, universal encryption for all, or nothing, is a false choice.

To further pretend that it’s some kind of “people’s victory” when a technical system renders itself effectively impenetrable to the legitimate legal, judicial, and intelligence processes of democratic governments operating under the rule of law in free civil society is curious indeed. Would we say the same about a hypothetical physical structure that cannot be entered by law enforcement with a court order?

Many ask why terrorists wouldn’t just switch to something else.

That’s a really easy answer — terrorists use these simple, turnkey platforms for the same reason normal people do: because they’re easy to use. A lot of our techniques, capabilities, sources, and methods have unfortunately been laid bare, but people use things like WhatsApp, iMessage, and Telegram because they’re easy. It’s the same reason that ordinary people — and terrorists — don’t use Ello instead of Facebook, or ProtonMail instead of Gmail. And when people switch to more complicated, non-turnkey encryption solutions — no matter how “simple” the more tech-savvy may think them — they make mistakes that can render their communications security measures vulnerable to defeat.

And as long as the US and its fundamental freedoms engender the culture of innovation which allows companies like Apple to grow and thrive, we will always have the advantage.

Vendors and cloud providers may not always be able to provide assistance; but sometimes they can, given a particular target (person, device, platform, situation, etc.), and they can do so in a way that comports with the rule of law in free society, doesn’t require creating backdoors in encryption, doesn’t require “weakening” their products, does not constitute an undue burden, and doesn’t violate the legal and Constitutional rights of Americans, or the privacy of free peoples anywhere in the world.

Some privacy advocates look at this as a black-and-white, either-or situation, without consideration for national interests, borders, or policy, legal, and political realities. They look at the “law” of the US or UK as fundamentally on the same footing the “law” of China, Russia, Iran, or North Korea: they’re all “laws”, and people are subject to them. They warn that if Apple provides assistance, even just this once, then someone “bad” — by their own, arbitrary standards, whether in our own government or in a repressive regime — will abuse it.

The problem is that this simplistic line of reasoning ignores other key factors in the debate. The US is not China. Democracy is not the same as Communism. Free states are not repressive states. We don’t stand for, defend, or espouse the same principles. Apple is not a Chinese company. If Apple really believes it will set a precedent for nations like China by complying with a lawful US court order, it really should perform a little self-examination and ask why it would seek to operate in China, and thus be subject to such law.

The other argument seems to be that if Apple does this once, it would constitute a “backdoor” for “all” iPhones, and thus the abrogation of the rights of all. That is also categorically false. There are a number of factors here: The iPhone belongs to the deceased individual’s employer. The FBI may have a companion laptop that this specific iPhone considers a “trusted device”, and is thus potentially able to deploy an OS update without a passcode. The specific device and/or OS version may have other vulnerabilities or shortcomings that can be exploited with physical access.

This argument seems to be equivalent to saying that if government has any power or capability, it will be abused, and thus should be denied; and that encryption, or anything related to it, should somehow be considered sacrosanct. It’s like saying, if we grant the government the lawful to enter a door, they could enter any door — even yours. Some might be quick to say this is not the same. Oh, but it is. This is not an encryption backdoor, and does not apply to all iPhones, or even all iPhone 5c models, or even most. It applies to this specific set of circumstances — legally and technically.

It is puzzling indeed to assert that the government can try to break this device, or its crypto, on its own, but if the creator of the cryptosystem helps in any way, that is somehow “weakening” the crypto or creating a “backdoor.” It is puzzling, because it is false.

Specific sets of conditions happen to exist that allows Apple to unlock certain older devices. These conditions exist less and less, and in fewer forms, as devices and iOS versions get newer. Unlocking iOS 7 only works, for example, because Apple has the key. The methodology would only work in this case because it’s specifically a pre-iPhone 6 model with a 4-digit passcode and there is a paired laptop in the government’s possession. All of this is moot on iPhone 6 and newer.

Apple is welcome to use every legal mechanism possible to fight this court order — that is their absolute right. But to start and grow their company in the United States, to exist here because of the fundamental environment we create for freedom and innovation, and then to act as if Apple is somehow divorced from the US and owes it nothing, even when ordered by a court to do so, is a puzzling and worrisome position.  They can’t have it both ways.

If Apple wishes to argue against the application of the All Writs Act — which, while old, is precisely on-point — it needs to make the case that performing the technical steps necessary to comply with this court order creates an “undue burden.” It may be able to make just that argument.

ios

We exist not in an idealized world where the differences of people, groups, and nation-states are erased by the promise of the Internet and the perceived panacea of unbreakable encryption.

We exist in a messy and complicated reality. People seek to do us harm. They use our own laws, creations, and technologies against us. People attack the US and the West, and they use iPhones.

Apple says that breaking this device, even just this once, assuming it is even technically possible in this instance, sets a dangerous precedent.

Refusing to comply with a legitimate court order levied by a democratic society, because of a devotion to some perceived higher ideal of rendering data off-limits under all circumstances to the valid legal processes of that society, is the dangerous precedent.

The national security implications of this case cannot be overstated. By effectively thumbing its nose at the court’s order, Apple is not protecting freedom; it is subverting the protection of it for the sake of a misguided belief in an ideal that does not exist, and is not supported by reality.

Dave Schroeder serves as an Information Warfare Officer in the US Navy. He is also is a tech geek at the University of Wisconsin—Madison. He holds a master’s degree in Information Warfare, is a graduate of the Naval Postgraduate School, and is currently in the Cybersecurity Policy graduate program at the University of Maryland University College. He also manages the Navy IWC Self Synchronization effort. Follow @daveschroeder and @IDCsync.

The views expressed in this article do not represent the views of the US Navy or the University of Wisconsin—Madison.