Category Archives: Future Tech

What is coming down the pipe in naval and maritime technology?

Lebanese Hezbollah and Hybrid Naval Warfare

This is an article in our first “Non Navies” Series.

Historically, weapons disparities with conventional forces has driven terrorists, insurgents, and other non-state actors towards asymmetric fighting tactics. But as with most long term trends, arms gaps tend to be cyclical as each side’s relative combat power waxes and wanes.  For example, pirates in the 19th Century used pretty much the same artillery as their naval counterparts, albeit on smaller ships.  Now, pirates relying on small arms and skiffs are countered by an international armada of heavily armed frigates and destroyers. The suicide improvised explosive boat attack on USS Cole was another example of David versus Goliath tactics.  In the realm of Anti-Access/Area Denial (A2/AD) though, we are witnessing an upswing in the conventional capabilities of non-state actors.  The mix of regular and irregular tactics is sometimes referred to as hybrid warfare. The proliferation of modern precision-guided weaponry is once again changing the balance of lethality between state navies and para-naval forces.  Regardless of whether these weapons are acquired from state sponsors or captured on the battlefield, the threat posed to regular naval forces is similar.  As demonstrated in recent air and ground engagements, non-state actors can field weapons on par with their conventional counterparts.  Ukrainian separatists with Soviet-era SA-11 missiles shoot down jet fighter (and civilian!) aircraft and Islamic terrorists in Iraq destroy American-made main battle tanks with advanced Russian-supplied Kornet missiles.  Advances in non-state naval weaponry are a natural evolution of these trends.

With a rash of recent fighting in the Levant and the potential for Western Naval intervention in various forms,  it’s worth taking a look at the sea denial capabilities of one of the region’s more potent non-state actors, Lebanese Hezbollah (LH).  However one wants to characterize LH – shadow government, proto-state, or simply non-state actor – their ability to contest the littorals in the Eastern Mediterranean has grown tremendously in the past decade.  Despite a number of interdictions by Israeli Defense Forces – some high profile and others intentionally less so – a nearly constant pipeline of increasingly advanced Syrian and Iranian weapons has resupplied LH by air, ground, and sea.  The most noteworthy display of LH’s A2AD network was the C-802 missile attack on INS Hanit in 2006. Subsequent to that engagement, LH’s anti-ship cruise missile inventory has advanced significantly.  Among these stockpiles is the supersonic 300 km range P-800 Yakhont. LH possibly acquired 12 P-800s from Syria, who received a shipment of 72 missiles and 36 launcher vehicles from Russia in 2011.  Over-the-horizon weapons are important, but without an adequate targeting mechanism, they are more of an indiscriminate terror weapon than a precision A2/AD tool.  A variety of means exists to target enemy ships, to include the surface search radar systems normally accompanying the missile batteries.  More crudely, third-party cueing could be provided by simple fishing vessels or UAVs.  Since at least the early 2000s, LH has flown mostly Iranian-manufactured Mohajer-4 unmanned aerial vehicles over Israel along with over-water transits.

The Yakhont ship killer

Some open-source reporting assesses that LH possesses SA-8 and SA-17 truck-mounted surface-to-air missile. The latter type can engage aircraft or missiles at altitudes of up to 24,000 meters and ranges out to 50 km.  To complicate matters, the counter-battery problem for navies facing missile launchers will be challenging because like the insurgents who fire them, mobile launchers will be well ensconced in urban population centers, and employing “shoot and scoot” tactics.

Closer into shore, LH Soviet-era AT-4 Spiggot or the more modern Kornet anti-tank guided missiles might be effective against Israeli small combatant craft, such as those which would be involved in launching a special operations raid.  Mines would be a cheaper, but more indiscriminate sea denial weapon LH might utilize to thwart amphibious operations.

Ostensibly, LH could gain access to any of the robust A2AD weapons its patron Iran possesses.  In 2011, Brigadier General Yaron Levi, the Navy’s intelligence chief, noted that “in the future, we will have to deal with missiles, torpedoes, mines, above-surface weapons and underwater ones, both in Gaza and Lebanon.”   The Iranians have elevated multi-axis, multi-layer anti-ship attack to a high art; with mines and ground-based missiles complemented by swarming missile, torpedo, and gunboat attacks, rounded out by numbers of Wing In Ground-effect aircraft and mini-submarines.  None of these systems are beyond the reach of a non-state actor.

So this network portends a viable sea denial capability, but to whom?  Clearly, LH fears Israel’s naval force and has demonstrated the willingness to engage the Israeli navy.  During the 2006 war, Israeli patrols blockaded Lebanon for eight weeks to prevent maritime resupply of LH forces.  Any advanced sea denial capability would complicate these operations in a future conflict.  Israel’s growing offshore oil infrastructure would also make a tempting fixed target for LH missiles.

And although it is possible that a missile might inadvertently target a U.S. or other allied naval combatant or aircraft operating in the Eastern Mediterranean, for self-preservation reasons, it’s unlikely that LH would deliberately target U.S. platforms without significant provocation. Even so, modern navies operating in the littorals in the vicinity of these threats will need to be continuously on a higher alert status than they might be with a more predictable state adversary.  As asymmetry cycles towards parity, developing ways to counter non-state actors with powerful conventional weapons should become the focus of naval wargames and experimentation.

Chris Rawley is the Vice President of CIMSEC. Any opinions in this piece are the his alone and in his personal capacity.

Super Tornadoes vs Wind Farms

Rather than destroying the eye of the storm, which, according to the US National Oceanic and Atmospheric Administration (NOAA), is suggested every hurricane season, a new (crazy?) study from a Stanford University professor notes an additional advantage of building offshore wind farms. Besides creating clean energy, offshore wind farms could dissipate hurricanes!

At a time of the year when Pacific countries and islands are struck by this destructive phenomenon, this study comes as good news!

It almost sounds too good to be true. But scientists from Stanford University, Cornell University and the University of California-Davis, are categorical: “You can dissipate hurricanes so much that you can reduce wind speeds, peak wind speeds by more than half, and the storm surge by almost 80 percent in the case of New Orleans and hurricane Katrina,” says Mark Jacobson, professor of civil and environmental engineering at Stanford University.  The authors even declared that 78,000 turbines 90 meters high placed off the coast of New Orleans could have reduced Hurricane Katrina’s wind speeds by as much as 158 km per hour by the time they reached land. And they go on: 100,000 turbines located between New York and Washington, D.C., could have weakened the winds of hurricane Sandy by up to 140km/h and reduced storm surge by 34 per cent. It is not without mentioning the financial benefits of producing huge amounts of clean energy.

Professor Jacobson argues that the turbines could reduce the power of a hurricane so much that the turbines themselves would not be damaged: “The wind speeds are dissipated, the hurricanes are dissipated sufficiently so that you never get to the destructive wind speed of a turbine even in a hurricane such as hurricane Katrina, which destroyed much of New Orleans.”

When winds blow in the turbine blades, some of their kinetic energy is converted into electric energy. In theory, the winds converted could no longer be used within the hurricane, which would therefore slow it down.

Jacobson explains: “We found that when wind turbines are present, they slow down the outer rotation winds of a hurricane. This feeds back to decrease wave height, which reduces movement of air toward the center of the hurricane, increasing the central pressure, which in turn slows the winds of the entire hurricane and dissipates it faster.”

Another consequence of hurricanes are storm surges. This is when a hurricane causes waters along the coast to rise above the normal tide, resulting in wide-ranging flood. However, the study also affirms that wind farms could reduce storm surge by up to 79 per cent, due to lower wind speeds.

However, installing 78,000 offshore wind turbines would have a cost of hundreds of billions of dollars. But Jacobson is optimistic: “You get all that money back by electricity sales over 25-30 years, and you reduce storm surge and wind speed associated with a hurricane.” Still, is it realistic to think that this can be done?

Could this be true?

Hell, yes!

Professor Cristina Archer of the University of Delaware, who is a co-author of the study, is sure that wind farms are a new solution against the disasters that the U.S are often facing. She suggests locating wind farms in offshore areas where they could use the wind for electricity, offsetting fossil fuel use and its resulting emissions and pollution. “If you can be smart about it, then you can have still very, very high benefits and locally. So, for example, for [Hurricane] Katrina, we placed the turbines just up wind of New Orleans,” she said. “And, so we protected New Orleans by taking action in New Orleans. So [we showed that] local actions had actual local benefits.”

A climate scientist at Massachusetts Institute of Technology, Kerry Emanuel, is also optimistic “It’s a fairly straightforward calculation,” he says.”It’s not at all implausible.”

And they are not the only ones: Mark D. Powell, a hurricane researcher at the American National Oceanic and Atmospheric Administration is excited about the conclusions of Jacobson’s study. He declared that the agency would fly its data-gathering planes (with the pretty name of “Hurricane Hunter“) which are piloted into storms every season for meteorological research, into areas where Jacobson proposed to install turbines. Powell believes that by gathering hurricane wind data from those areas, scientists could be able to forecast how the hurricanes would impact turbine blades.

Hell, no!

However, NOAA is not planning to investigate any technique to reduce hurricanes for the moment. Powell explains that the organization is currently rather focusing on improving hurricane forecasts.

Dr. Ioannis Georgiou, director of the Pontchartrain at the Institute for Environmental Sciences from the University of New Orleans, with a background in storm surge and hydrodynamic modeling, also examined the study but he is not convinced.

“I’m not questioning the reduction in winds.” However, the scientist argues that more research are needed on certain aspects of the study, in order for before an investment to be made into offshore wind farms aiming at reducing hurricanes.

For example, he explains that the shoreline of Louisiana is far more complex than the research model shows. He also asserts that the research doesn’t entirely take into account the numerous ways storms could reach the coasts.

Professor Georgiou also affirms that storm surge is not directly related to wind speed. Therefore, reducing wind speed is not the solution to avoid storm surges.

Well, maybe?

An expert in northern hurricanes at Queens College in New York, Nicholas Coch, is sceptical. He said: “That wind farm couldn’t possibly drain that much energy out of the wind”. However, he is not surprised by the idea, which is not new, he says.  Indeed, many years ago, one man “wanted to build windmills along the Florida coast to blow hurricanes back to Africa,” Coch recalls.

Offshore wind farms are not welcome in the United States of America!

There is a good reason why scientists are looking for new ideas to fight against hurricanes: from levees to storm barriers, seawalls and dunes: nothing has worked yet!

Through stats, Jacobson showed that 14,000 offshore wind farms could supply 45 percent of energy demands of the State of New York by 2050. However, there are currently no offshore wind farms in the U.S.

And Jacobson’s proposal might be difficult to apply in America. Indeed, there has been political and social resistance in the United States to installing even a few hundred offshore wind turbines. Undeniably, public acceptance is an important hurdle to U.S offshore wind power has to deal with. For example, the Cape Wind project of 130 turbines for a potential output of 468 megawattshad been delayed by many lawsuits, saying that the deal would drive up electricity costs.

However, this project could be running by 2016 and be the first offshore wind farm. It would be placed off the shores of Cape Cod and it would be run by Cape Wind.

So, is it the time for Americans to turn to offshore wind energy? We would then see if Jacobson was right!

Alix is a writer, researcher, and correspondent on the Asia-Pacific region for Marine Renewable Energy LTD. She previously served as a maritime policy advisor to the New Zealand Consul General in New Caledonia and as the French Navy’s Deputy Bureau Chief for State Action at Sea, New Caledonia Maritime Zone.

 

AFRICOM’s Chinese Satellites: How To Lose At Mastermind

THIS ARTICLE WAS ORIGINALLY PRINTED ON MAY 3, 2013 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

Easy to learn. Easy to play. Now, much easier to win.
                                   It gets easier with practice.

For many, the game Mastermind is their first adolescent introduction to cryptology.  A code-breaker is given limited turns to discover the encrypted signal of the code-maker.  By choosing to put AFRICOM bandwidth over state-controlled Chinese satellites in 2012, the U.S. Defense Department decided to extend their PRC opponents exponentially more “rounds” to win the game.  The U.S> has won a tactical convenience at the cost of strategic peril.

Defense Department representatives claim the use of the satellites was secure due to the encrypted nature of the transmissions.  However, as in Mastermind, more exposure reveals more information, with which the code-maker can be beaten.  With an unrestricted treasure-trove of data, the cyber-battle proven Dirty Data Dozen of Chinese cyber-warfare will have plenty of material to compare and contrast until base patterns are found and exploited.  This vulnerability is especially worrisome in an area of responsibility rife with corruption issues and general penetration by state-associated Chinese assets.  That access to the satellite transmissions might be doubly useful because of the potential access to the pre-transmitted data, further easing decryption efforts.  This undermines force-wide communications, providing information that will end up not only in the hands of the Chinese, but the actors with whom their intelligence services cooperate.  The U.S. stands not only to lose one game of Mastermind, but most of the tourney.

You must accept that you won’t always have attractive alternatives. The Big Picture may demand tactical sacrifice.

It was only last month that the CNO, ADM Greenert, said that the cyber-EM environment isso critical to our national interests, that we must treat it on par with our traditional domains of land, sea, air, and space…”  The EM-cyber spectrum may be invisible, but they have the same space constraints as those traditional domains.  During the Cold War, if the berths at Bremerton were full, the U.S. Navy would never have requested berthing space in Vladivostok; if the U.S. Army found itself under-equipped, they would never request use of radio towers in East Germany to communicate with West German patrols.  Resources are limited and must be rationed; put simply by Raymond Pritchett, “If this wasn’t the point to tell someone ‘no’ when they ‘needed’ bandwidth, what point is?”  Refusing to prioritize the strategic long-term viability of U.S. communications security over temporary tactical comfort is the laxity alluded to by the CNO when he highlighted the need for a new attitude.  We can start with the lessons learned from a 1970’s board game.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

Maritime Cryptology at the Crossroads

After more than a decade of land war and a desire to rebalance to Asia, America’s Navy finds itself smaller, and in many ways weaker in certain respects. One area that should be of great concern is the current practice and future of maritime cryptology.

Cryptology at sea was proven decisive during World War II, beginning with the battle at Midway and the breaking of the Japanese naval code “JN25.”[i] Equally important was the allied program that cracked the German Enigma machines, “Ultra,” especially those used by the German Navy. Winston Churchill famously remarked to King George VI that, “It was thanks to Ultra that we won the war.”[ii]

museum
(A selection of seven Enigma machines and paraphernalia exhibited at the USA’s National Cryptologic Museum. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) Luftwaffe (Air Force) Enigma; 6) Heer (Army) Enigma; 7) Kriegsmarine (Naval) Enigma—M4.)[iii]
Throughout the ensuring Cold War until the fall of the Berlin Wall, naval cryptology played a vital role in meeting national and tactical intelligence requirements. America gained deep insight and understanding of Soviet and Warsaw Pact allied naval operations and was able to obtain priceless strategic intelligence through collection missions operated by the U.S. Navy. The end of the Cold War, ensuing strategic drift and drawdown was shattered by the terrorist attack of 9/11, yet even in the midst of a worldwide “Global War on Terror,” the pressure remained to cut the naval force. Today, the Navy is at its smallest point since World War I. For the Navy to conduct its maritime cryptology mission, it must have presence in the littorals, especially in key strategic areas of the Western Pacific, Indian Ocean and Arabian Gulf and the Mediterranean and elsewhere. A smaller Navy with fewer platforms means the Navy is not always where it needs to be and when it needs to be there.

The hope was that through force shaping, automation and remote operations, maritime cryptology could continue to thrive in an ever more complex electromagnetic (EM) environment. Adversarial communications have become far more challenging to detect, exploit and prosecute. The Radio Frequency (RF) environment of today is incredibly complex, with tactical, strategic and data communication links operating in all areas of the spectrum and often at frequencies with a very low probability to intercept. Modern encryption techniques have evolved from mechanical electronics to the use of quantum mechanics.[iv]

crypto

The effects of force shaping, automation and remote operations are beginning to take their toll on the tradecraft of maritime cryptology. Today’s junior Sailors and officers have had their training time cut in order to meet growing operational demands on a shrinking Navy. To be successful in the art of cryptology – and it is a practiced art – one must have a deep understanding of the fundamentals of radio signal transmission as well as more than a passing familiarity with the collection equipment. A junior cryptologic technician and junior officer should be able to draw a basic transmitter-receiver diagram and trace the origin of a signal from its original state, such as voice or data, through the transmitter, across a medium and into the collection gear and the operator’s ears. Foundational knowledge required that the basic operator have a working knowledge of the equipment and be able to perform diagnostic and troubleshooting tasks in the event of a malfunction. Finally, operators and junior officers must understand the process of signal intelligence reporting to the tactical unit at sea (indications and warning intelligence) as well as to the national signal intelligence system.

spectrum

At the same time, emerging cyberspace communication networks place entirely new pressures on maritime cryptology. Modern communication, command, control and information sharing are a “network of networks,” an “Internet of things” that require new skill sets and new acquisition and exploitation technologies. Yet the complexity of data systems and volume of data being passed is growing exponentially, outpacing our acquisition and procurement capability. The Navy has tried to mitigate this by relying on commercial off-the-shelf technology (COTS) but this entails its own set of problems. COTS technology must be compatible with legacy systems – some more than twenty years old and built on architecture and code from the late 1980s and early 1990s – and it relies on bandwidth levels that are not always available and reliable. We often find out the hard way that equipment which works well in the sterile lab environment is not up to the task of performing reliably at sea under arduous conditions.

Maritime cryptology is at a cross roads. We must return to the fundamentals of signal intelligence at the same time we are trying to realize the potential of cyberspace operations at sea. This will require a renewed commitment to recruitment and training, and for many middle grade and senior enlisted cryptologic technicians and officers, it means new formal training. Right now, senior enlisted and officers are being asked to take leadership roles in an emerging cyberspace operations field for which they are receiving inadequate or no formal training. We must reconsider recruitment of new junior Sailors and officers who have the background skills, education and knowledge and provide them a career path that emphasizes cryptologic expertise across the spectrum, from “traditional” signals intelligence to modern wireless exploitation. This career path must be grounded in recognizing that maritime cryptology is more art than science, and to become proficient and experienced, one must practice.

The author would like to thank CDR Kevin Ernest who kindly provided his thoughts on the challenges of modern maritime cryptology.

LT Robert “Jake” Bebber is an information warfare officer assigned to the staff of U.S. Cyber Command. The views expressed here are his own and do not represent those of the Department of Defense, the Department of the Navy or U.S. Cyber Command. He welcomes your comments at [email protected].

[i] http://www.navy.mil/midway/how.html

[ii] http://www.history.co.uk/study-topics/history-of-ww2/code-breaking

[iii] http://en.wikipedia.org/wiki/Enigma_machine#cite_note-9

[iv] http://blogs.scientificamerican.com/guest-blog/2012/11/20/quantum-cryptography-at-the-end-of-your-road/