Category Archives: Future Tech

What is coming down the pipe in naval and maritime technology?

Developing New Tactics and Technologies in Naval Warfare: The MDUSV Example

By Jeffrey Kline, John Tanalega, Jeffrey Appleget, and Tom Lucas

Introduction

The paper is about synergy. It demonstrates the power of using analytical tools in a logical sequence to generate, develop, and assess new concepts and technologies in warfare. Individually there is nothing new here. Each of the analytical tools described in this paper is thoroughly discussed in academic literature. The use of intelligent experimental design and large scale simulation to advance knowledge in defense and homeland security issues is well describe in Design and Analysis of Experiments by leaders in the Naval Postgraduate School’s Simulation Experiments and Efficient Design (SEED) Center for Data Farming (Sanchez, 2012).1 The power of campaign analysis to gain insight and quantify the value of new technologies and capabilities is covered in the campaign analysis chapter of Wiley’s Encyclopedia of Operations Research and Management Science (Kline, 2010).2 Wargaming’s use to develop concepts for employment of those new technologies and discover possible risks to them are discussed recently in both the Military Operations Research Society’s Phalanx (Appleget, 2015)3 and the journal for Cyber Security and Information Systems Information Analysis Center (Appleget, 2016).4

It is the synergy created by bringing these tools together—linked by officers with tactical experience and educated in the analytical techniques—which this paper addresses.  We provide it as an example of military operations research in practice to advance naval force development and fleet combat tactics.  We tell this story through the lens of our co-author, LT John Tanagela, USN, and one technology, the Medium Displacement Unmanned Surface Vessel (MDUSV), but provide multiple examples of past work similar in nature. LT Tanagela is a qualified Surface Warfare Officer who chose to attend the Naval Postgraduate School to obtain a master’s degree in Operations Research. We select John’s educational and research experience not for its uniqueness, but instead for its normalcy as a NPS OR student with unrestricted line qualifications. Our other co-authors were John’s combat models instructor, campaign analysis instructor, wargaming instructor, and thesis research advisors. We provide descriptions and results from the analytical courses John leveraged to advance his research in employing a MDUSV and highlights from his thesis.  We conclude with brief summaries of other concepts and technologies advanced in this manner.

Triad of Military Applied Courses

The Naval Postgraduate School’s Operations Research students receive three foundational courses in warfare analysis: the introduction to joint combat modeling course, the joint campaign analysis course, and the wargaming course (See Figure 1). In these applied courses they learn to model combat effects in tactical and operational level conflict, integrate these quantitative techniques in campaign analysis and human decision making, and, as a result, develop and quantitatively assess new concepts, tactics, and technologies.  

Figure 1: The three warfare analysis courses provided to NPS operations research students.

The joint combat models course introduces traditional force-on-force modeling, including homogeneous and heterogeneous Lanchester equations, Hughes’ salvo equations, and computer-based combat simulations. It provides our officers the experience to integrate uncertainty into these models to allow for sensitivity analysis and design of experiments in exploring new capabilities.

The joint campaign analysis class leverages these new skills and previous course work in simulation, optimization, decision analysis, search theory, and probability theory by challenging our officers to apply them in a campaign-level scenario. During the course they must develop a concept of operation to meet campaign objectives, model that concept to assess risk using appropriate measures for their objective, and assess “new” technical capabilities by comparing them to their baseline concept analytical results. The results are quantitative military assessments of new concepts and technologies, identification of force capability gaps, and risk assessments (See Figure 2).

Figure 2: The NPS Joint Campaign Analysis class process for applying officers’ new analytical skills to campaign and operational level issues.

The wargaming class provides an overview of the history, uses, and types of wargaming, but focuses its efforts on teaching officers how to design, develop, execute, analyze, and report on an analytical wargame. After learning the fundamentals, officer-teams are assigned real-world sponsors who provide the objective and the issues they desire to address during a wargame. The officer-teams work with the sponsor through execution of an actual wargame, completing their course work by reporting the wargame’s analysis and results to the sponsor. An example is supporting the Navy’s PEO C4I by assessing the Undersea Constellation concept and technology. (See Figure 3)

Figure 3: Sponsor, student wargaming team (in uniform) and players of the NPS wargaming course’s PEO C4I Undersea Constellation Game.

Passing Lessons and Students along

As the NPS operations research students proceed from one course to another in the triad above—where they are joined by Joint Operational Logistics students, Systems Engineering Analysis students, Defense Analysis students, and Undersea Warfare students—there is an opportunity to carry lessons from on course into another, and gain further insight into those concepts and technologies. The teaching faculty work closely to ensure that happens by design. NPS Warfare Analysis faculty and researchers use these courses synergistically to provide insights to real-world sponsors in advancing their concepts, assessing new technologies proposed by DoD labs and industry, and developing new tactics—all the while enhancing our officer-students’ educational experience and sharpening their combat skills. For example, after learning to model a war at sea strike using salvo equations in the joint combat modeling course, the officers are challenged to develop a maritime concept of employment using distributed forces in the joint campaign analysis class, and assess that concept using the salvo equations and simulation. That concept is passed to the wargaming class (usually the same students) to better understand Blue’s decisions in employing distributed forces and Red’s potential reactions. Common scenarios are used between classes with similar forces structures (See Figure 4).

Figure 4: The NPS Joint Campaign Analysis and Wargaming connection. Technologies and concepts analyzed in the Joint Campaign Analysis class are frequently introduced by real-world sponsors in the wargaming class to better understand Blue’s force employments and Red’s reactions to new Blue capabilities.

The results of these capstone classroom efforts are a series of analytical and wargaming briefings, reports, and papers frequently shared with DoD and service organizations. In addition, the work informs other NPS research occurring in unmanned systems, networks, and command and control. Most impactful, however, is when officers are inspired to take a much more detailed look at new capabilities as their thesis research, using the insights gathered from their capstone course work as a foundation to build upon.

Simulating a Half Million Tactical Engagements 

Officers frequently select a new technology explored in their military operations research applied courses to further study in their thesis work. They will draw upon their own operational experience to develop tactics to employ these technologies; work with weapon tactics instructors to refine these tactical situations; identify important variables and parameters within that scenario to further identify needed performance capabilities (range, speed, etc.) and tactical employment (formations, distances, logistics, etc.); build or use an existing simulation to model those tactics; use intelligent experimental design to efficiently explore a range of values for each of identified parameter; execute the experiment—frequently running over a half million tactical engagements; then use advanced data analytics to identify the most important parameters’ values to be successful (See Figure 5.)

Figure 5: Using simulation, intelligent experimental design, and advance data analytics to identify the most import performance parameters of a technology or tactical employment.

These theses’ results are always of great value to warfare and tactics development commands, to resources sponsors, material commands, and defense laboratories developing new technologies. Their insights also inform future capstone course work and NPS technical research. We now turn to our specific example, LT John Tanalega and the Medium Displacement Unmanned Surface Vessel. 

The Technology: The Medium Displacement Unmanned Surface Vessel

The Office of Naval Research (ONR) Medium Displacement Unmanned Surface Vessel (MDUSV) program is a self-deployed surface unmanned system capable of on station times of 60-90 days with ranges of 900-10000 nautical miles depending on speed (3-24 knots) and payload (5-20 tones).5  For the NPS warfare analysis group, we provide it the following future mission capabilities. In an antisubmarine warfare (ASW) role, it receives an off-board cue and hand off, then conducts overt trail with active sonar. It can act as an ASW scout in coordination with area ASW assets like the P-8 maritime patrol aircraft or benthic laid sensors in an Undersea Constellation, conducting large acoustic surveillance using passive and/or active bi-static sonar. It can deploy three Mk 54 or six smaller CRAW torpedoes. In its Intelligence, Surveillance, and Reconnaissance (ISR) role, it can work with surface ships as an advanced scout employing passive sensors, and in an offensive role, can carry eight RBS-15 surface-to-surface missiles. In its mine warfare role, it can conduct mine sweeping with a MK-104 acoustic sweep body or can deploy a clandestine delivered mine in an offensive mining role. It may also act as a forward environmental survey ship, a platform for operational military deception, a tow for a logistics barge, and special operations equipment delivery.

All MDUSVs in these analyses are augmented by TALON (Towed Airborne lift of naval systems)6, which can carry up to 150 pounds of payload up to 1,500 feet. This payload can be communication relays, radar, electronic jammers (or emitters for decoy operations), or optical sensors.

https://gfycat.com/AlivePitifulIberiannase

ACTUV conducting testing with TALONS (DARPA Video)

The MDUSV equipped with TALON has been introduced in several Joint Campaign Analysis classes and Wargaming classes as technical injects to be assessed. LT Tanalega was given the MDUSV as a technical inject for both these classes.

The Student: LT John Tanalega

Academically talented, John has a typical operational background for a Naval Postgraduate School Operations Research student. He graduated from the U.S. Naval Academy in 2011 with a Bachelor of Science degree in English. His initial sea tour was as Auxiliaries and Electrical Officer, and later First Lieutenant, in USS DEWEY (DDG 105). While assigned to DEWEY, he deployed to the Western Pacific, Arabian Gulf, Red Sea, and Eastern Mediterranean. His second division officer tour was as the Fire Control Officer in USS JOHN PAUL JONES (DDG 53), the U.S. Navy’s ballistic missile defense test ship. He attended the Naval Postgraduate School in from 2016 to 2018, where he earned a Master of Science degree in Operations Research and conducted his thesis research in tactical employment of the MDUSV.

Insights from the Joint Campaign Analysis classes, the Wargaming Classes, and other NPS research

As mentioned, the MDUSV with TALON was introduced to a series of Joint Campaign Analysis classes and several NPS wargames. Officer-students have employed it in a variety of missions, from active operational deception to logistics delivery to riverine patrol. Its strongest characteristics are on-station time over unmanned aerial systems, sensor payload capacity over all other unmanned systems, and speed over unmanned underwater systems. Its limitations include vulnerability to attack (it has no active defense), which is mitigated by a low radar cross section making it difficult to target and/or acquire. Our analytical and wargaming teams have found their value forward in offensive naval formations and in defense screening formations (Figure 5). Employing a single or pair of MDUSV with a P-8 maritime patrol aircraft in an area ASW environment is also valuable. (Figure 6).Figure 5: The graph shows the probability of successfully finding and engaging an adversary’s amphibious task force in a South China Sea scenario with a traditional U.S. Surface Action Group (SAG) with and without allied ship support. As MDUSVs are added to the SAG, the probability of mission success is increased. The MDUSV are contributing to the ISR and targeting capabilities of the SAG. This analysis was produced using combat modeling by a Joint Campaign Analysis class team.

Figure 6: This plot shows the simulation results of an Area ASW engagement between a PLA Navy SSK submarine and the MDUSV alone (labeled ACTUV or Anti-Submarine Warfare Continuous Trail Unmanned Vessel, the original DAPRA program name); the MDUSV with a P-8 (labeled both), and the P-8 alone. The Tukey-Kramer test displays significant improvement with the MDUSV and P-8 work as an unmanned-manned pair.

Unique employment concepts are also developed, such as employing paired MDUSVs working as an active-passive team for both active radar and acoustic search. This information is passed to both sponsors and the NPS combat systems research faculty for engineering analysis.

LT John Tanalega’s Joint Campaign Analysis efforts included analyzing the MDUSV’s contribution to a scouting advantage for Blue forces in a surface-to-surface engagement (see figure 5). While a student in the NPS Wargaming Class, John’s team designed, developed, and executed a classified South China Sea game for United States Fleet Forces Command exploring distributed maritime operations and a force structure that included the MDUSV. Lessons from both classes were then applied to his further research in the MDUSV’s best tactical employment in a surface to surface engagement.

Furthering the study by use of simulation (Problem, Tactical Engagement, and Design of Experiments)

In transitioning MDUSV from technical concept to operational reality, several questions are prominent. First, MDUSV is just what its name implies—a vessel. The specific technologies which will make it effective in the maritime domain are all in various stages of development, and they are too numerous for MDUSV to carry all of them. Therefore, an exploration of which capabilities improve operational effectiveness the most is essential. Second, while superior technology is necessary, alone it is not sufficient. USVs must also be used with effective tactics, techniques, and procedures (TTPs) to make them effective SUW platforms. USVs are entirely new to the U.S. Navy, and no historical data exists for their use in combat. Modeling, simulation, and data farming7 provide an opportunity to explore concepts and systems that, today, are only theories and prototypes.

Computer-based modeling and simulation are an effective means of exploring MDUSV capabilities and tactics. Live experiments at-sea are always important to gather real-world data and provide proofs of concepts. However, they require a mature design. They are prohibitively expensive, and the low number of trials that can be conducted reduces the confidence levels of their conclusions. Computer-based modeling and simulation allows us to run tens of thousands of experiments over a wide range of factors. It is, therefore, better suited for design exploration. Using high-performance computing and special techniques in design of experiments (DoE), such as nearly orthogonal and balanced (NOB) designs, simulation experiments that would have taken months or years with legacy factorial designs can be can be performed in a matter of days. This highly efficient technique provides greater insights that inform and direct live experimentation and requirements development.

To explore the effects of MDUSV on surface warfare, LT Tanalega used the Lightweight Interstitials Toolkit for Mission Engineering using Simulation (LITMUS), developed by the Naval Surface Warfare Center, Dahlgren Division (NSWC DD). LITMUS is an agent-based modeling and simulation tool suited specifically to naval combat. Ships, aircraft, and submarines are built by users and customized with weapons, sensors, and behaviors to mirror the capabilities and actions of real-world combat systems. Using an efficient design of experiments and LITMUS scenario, over 29,000 surface battles were simulated with varied active and passive sensor ranges, MDUSV formations and armament, and emissions control EMCON policies.

To compare battle results, LT Tanalega used the probability of a surface force being first to fire a salvo of missiles against an adversary as a measure of effectiveness. This choice is motivated by the maxim of naval combat in the missile era to “fire effectively first,” and indicates a clear advantage in offensive tactics.8

Simulation Results (Unclassified)

Analysis of the simulation output shows that a traditional Blue force combating a very capable Red force in its home waters has 19 percent probability of meeting first-to-fire criteria (See Table 1). Blue surface forces equipped with MDUSV are nearly three times as likely to be first-to-fire. Analysis also found the increase in performance is due primarily to the extended sensor range afforded by the TALONS platform on scouting MDUSV. Based on the presence of MDUSV alone, Blue improves its probability of being first-to-fire by a factor of nearly three (from 19 percent to 56 percent), as shown in Table 1. Though a SAG will likely have helicopters embarked, it is important to note that helicopters are more limited in endurance. Further, the use of a helicopter in Phase II of a conflict poses exceptional risk to human pilots, especially if the enemy is equipped with capable air defense systems. We therefore modeled “worst case” without an airborne helo during the engagements. Given the long endurance of MDUSV and its autonomous nature, MDUSV represents a worthwhile investment for the surface force. When numerically disadvantaged and fighting in dangerous waters, MDUSV levels the odds for Blue.

Table 1. MDUSV Effect on First-to-Fire Probability

Advanced partition tree analysis of the data noted a breakpoint at an MDUSV passive sensor range of 36nm. With this range or greater, Blue was first-to-fire in 81% of the design replications (Table 2). Using the mathematical horizontal slant range formula to approximate visual horizon, this equates to a tether height of approximately 1020 feet. Given the current 150-pound weight limit for a TALONS payload, a passive electro-optical sensor may be more feasible than an active radar. Placing a high power radar, with power amplification, transmission, and signals processing in a TALONS mission package may not be feasible in the near term. Further study, from an electrical engineering and systems engineering perspective, is required.

Table 2. MDUSV Passive Sensor Range Effect on First-to-Fire Probability

While arming MDUSV provides a marginal increase in first-to-fire performance with EMCON policies 1 and 2, it has a small negative effect with EMCON policy 3. Ultimately, first-to-fire in each replication is driven by scouting—who saw whom and fired first. Since detecting the enemy is a necessary condition to shooting him, providing MDUSV with over the horizon sensor capabilities should be the first concern. This will allow the missile shooters of the surface and air forces to employ their weapons without emitting with their own sensors.

Furthering the Study by Use of Wargaming

The Fleet Design Wargame consisted of three separate gameplay sessions. During each session, the BLUE Team received a different order of battle. During gameplay, the study team observed the players’ decisions to organize and maneuver their forces, as well as the rationale behind those decisions. After two to three turns of gameplay, a member of the study team facilitated a seminar in which all players discussed the game results. Each team, BLUE and RED, had a leader playing as the “Task Force Commander,” and a supporting staff. The Blue Team consisted of three SWOs, a Navy pilot, an Air Force pilot, a Navy cryptologic warfare officer, two human resources officers, and a supply officer. The RED team consisted of three SWOs, one Marine NFO, one Navy cryptologic warfare officer, two Naval intelligence officers, and two supply officers. Search was adjudicated using probability tables and dice. Combat actions are being analyzed using combat models, such as a stochastic implementation of the salvo model.

Wargaming Results (unclassified)

The game demonstrated the combat potential that networked platforms, sensors, and weapons provide. Long endurance systems, such as the MQ-4C Triton and the Medium Displacement Unmanned Surface Vehicle (MDUSV) can be the eyes and ears of missile platforms like destroyers. The game also showed that with its range alone, an ASuW-capable Maritime Strike Tomahawk provides BLUE forces with greater flexibility when stationing units. On the other hand, unmanned systems also provide RED with a wider range of options to escalate and test U.S. resolve during phase 1. The study team also found that expeditionary warfare can have a double effect on the sea control fight. The presence of an LHA is a “double threat” to the enemy, acting as both an F-35B platform, and as a means of landing Marines.

Further Research Work on the MDUSV

Future research is required to optimize MDUSV design and to better characterize the human element of MDUSV employment and coordination. While TALONS provides a unique elevated sensor platform, a 150-pound maximum payload will be a considerable constraint. Passive sensors, such as EO/IR, may be mounted on the TALONS platform, but the weight required to house a high-performance radar will be a higher hurdle to overcome. Though this can be mitigated by changing the parasail design to increase lift, this will require more in-depth study of the engineering trade-offs. Also, the process will have to be automated. TALONS testing to-date has involved members of the test team deploying and recovering it.

Though this study was performed with software-driven automata, the tactical decisions leading-up to the placement of MDUSV will be made by humans. The long endurance of MDUSV makes it an ideal platform for deception. Tactical and operational level wargaming may yield insight into the affect that adding MDUSV will have on human decision-making.

As this study was the first SUW simulation of a man-machine teamed force, the scope of the agents explored was purposefully limited. To add to the realism of the experiment, and to explore future tactics, the addition of helicopters and other scout aircraft to the scenario may yield further insight into the design requirements and tactical employment of MDUSV.

MDUSVs in this study were homogenously equipped and shared the same EMCON policy. However, if each MDUSV is given only one capability, such as a particular sensor type or a weapon, their strengths may offset their weaknesses. Grouping several MDUSVs with different mission load-outs may be an alternative to sending a manned multi-mission ship like a DDG. It may also prove to be more resilient to battle damage, as the loss of a single MDUSV would mean the loss of an individual mission, while the mission-kill of a DDG would result in a loss of all combat capability. Further simulation and analysis with LITMUS may yield insights into this trade-off.

Other Examples

Although we have highlighted LT Tanalega’s recent research to demonstrate how the NPS Warfare Analysis group integrates officer’s tactical experience, classroom work, and more detailed research to provide insights in new technologies, tactics, and operational concepts, many other examples can be mentioned. These include tactics to defeat swarms of unmanned combat aerial vehicles, best use of lasers aboard ships, developing tactics to counter maritime special operations insertion, employing expeditionary basing in contested environments, exploration in distributed logistics, best convoy screening tactics against missile-capable submarines, and use of sea bed sensors and systems. Analytical red teaming is also used for sponsors wishing to better understand the resilience and vulnerability of their new systems—employed in the same classes mentioned in this paper. These results are shared with DoD and Navy sponsors interested in getting robust and quantitative assessments of the strengths and weaknesses of their systems.

Although the NPS Warfare Analysis group is pleased to make real-world contributions as part of our students’ education experience, our greatest satisfaction comes from observing the junior officer’s military professional growth that accompanies the application of their newly learned analytical skills. To model and analyze an engagement, a thorough understanding of the tactical factors and performance parameters is necessary. By the end of our students’ experience, they have gained expertise in that mission and in operations analysis—a perfect blend to contribute to our nation’s future force architecture and design.

CAPT Jeff Kline, USN (ret.) is a Professor of Practice in Military Operations Research at the Naval Postgraduate School. He holds the OPNAV N9I Chair of Systems Engineering Analysis and teaches Joint Campaign Analysis, Systems Analysis, and Risk Assessment. jekline@nps.edu

Dr. Jeff Appleget is a retired Army Colonel who served as an Artilleryman and Operations Research analyst in his 30-year Army career. He teaches the Wargaming Analysis, Combat Modeling, and Advanced Wargaming Applications courses.  Jeff directs the activities of the NPS Wargaming Activity Hub. He is the Joint Warfare Analysis Center (JWAC) Chair of Applied Operations Research at NPS. jaappleg@nps.edu

Dr. Tom Lucas is a Professor in the Operations Research Department at the Naval Postgraduate School (NPS), joining the Department in 1998. Previously, he worked as a statistician and project leader for six years at RAND and as a systems engineer for 11 years at Hughes Aircraft Company. Dr. Lucas is the Co-Director of the NPS Simulation, Experiments, and Efficient Design (SEED) Center and has advised over 100 graduate theses using simulation and efficient experimental design to explore  a variety of tactical and technical topcs. twlucas@nps.edu

LT John F. Tanalega is a Navy Surface Warfare Officer from North Las Vegas, Nevada and is a 2011 graduate of the United States Naval Academy His first operational tour was as Auxiliaries and Electrical Officer, and later as First Lieutenant, in USS DEWEY (DDG 105). He next served as Fire Control Officer in USS JOHN PAUL JONES (DDG 53). As an operations analysis student at the Naval Postgraduate School, his research focused on combat modeling, campaign analysis, and analytic wargaming. After graduating from NPS, he reported to the Surface Warfare Officer School (SWOS) in Newport, Rhode Island, in preparation for his next at-sea assignment.

References

1. Sanchez, S.M., T.W. Lucas, P.J. Sanchez, C.J. Nannini, and H. Wong, “Designs for Large-Scale Simulation Experiments with Applications to Defense and Homeland Security,” Design and Analysis of Experiments, volume III, by Hinckleman (ed.), Wiley, 2012, pp. 413-441

2. Kline, J., Hughes, W., and Otte, D., 2010, “Campaign Analysis: An Introductory Review,” Wiley Encyclopedia of Operations Research and Management Science, ed Cochran, J. John Wiley & Sons, Inc

3. Appleget, J., Cameron, F., “Analytical Wargaming on the Rise,” Phalanx, Military Operations Research Society, March 2015, pp 28-32

 4. Appleget, J., Cameron, F., Burks, R., and Kline, J., “Wargaming at the Naval Postgraduate School,” CSIAC Journal, Vol 4, No 3, November 2016 pp 18- 23

5. The Defense Advanced Research Projects Agency (DARPA) has demonstrated a prototype “Sea Hunter”. Information may be found at https://www.darpa.mil/news-events/2018-01-30a

6. For more information on the TALON visit https://www.youtube.com/watch?v=BWEoV88PtTY

7. See Sanchez, ibid.

8. Hughes, W.P., Fleet Tactics and Coastal Combat, 2nd ed, Naval Institute Press, Annapolis, Maryland, 2000.

9. Wagner D.H., Mylander, W.C., Sanders, T.J., Naval Operations Analysis, 3rd ed, Naval Institute Press, Annapolis, Maryland, 1999, pp 109-110.

Featured Image: The Medium Displacement Unmanned Surface Vehicle (MDUSV) (DARPA photo)

Drones in Africa: A Leap Ahead for Maritime Security

By CAPT Chris Rawley and LCDR Cedric Patmon

Technology adoption moves in fits and starts. The developing world cannot be forced into accepting new technology, but it can be enabled, and often in a surprising manner. A recent example is the leap in communications technology. During the 20th Century most of the world developed a robust network of terrestrial-based telecommunications based primarily on the ubiquitous land-line telephone system. Without this infrastructure in place Sub-Saharan African countries were largely left behind at the start of the information revolution. But at the turn of the new century something interesting happened. Rather than retroactively building an archaic phone system Africans embraced mobile phone technology. From 1999 through 2004 the number of mobile subscribers in Africa eclipsed those of other continents, increasing at a rate of 58 percent annually. Asia, the second fastest area of saturation, grew at only 34 percent during that time. The explosive growth of mobile phones and more recently smart phones across practically every African city and village has liberated economies and facilitated the free flow of information. This technology also enabled Africans to lead the world in mobile money payment solutions, bypassing increasingly obsolete banking systems.

Today, Africans have another opportunity to leap ahead in technology to protect one of their most important areas of commerce – their coastal seas. Africa’s maritime economy is absolutely critical to the continent’s growth and prosperity during the next few decades. On the edge of the Eastern Atlantic the Gulf of Guinea is bordered by eight West African nations, and is an extremely important economic driver. More than 450 million Africans derive commercial benefit from this body of water. The region contains 50.4 billion barrels of proven petroleum reserves and has produced up to 5.5 million barrels of oil per day. Additionally, over 90 percent of foreign imports and exports cross the Gulf of Guinea making it the region’s key connector to the global economy.

Favorable demographics and industrious populations put coastal Africans in a position to prosper, but an increase in illegal fishing activities and piracy since the early 2000s has severely impeded this potential. The growth in acts of piracy and armed robbery at sea in the Gulf of Guinea from 2000 onward points to the challenges faced by West African states.

According to Quartz Africa, illegal fishing activities in the region have a negative economic impact of $2-3 billion annually. “Fish stocks are not restricted to national boundaries, and that is why the solutions to end the overfishing of West Africa’s waters can only come from joint efforts between the countries of the region,” Ahmed Diame, Greenpeace’s Africa Oceans campaigner, said in a statement. Marine pollution, human, and narcotics trafficking are also major issues facing the region.

Due to the economic impact of illicit activities in and around West Africa a Summit of the Gulf of Guinea heads of state and government was held in 2013 in Yaoundé, Cameroon. This resulted in the adoption of the Yaoundé Declaration on Gulf of Guinea Security. Two key resolutions contained in the Declaration were the creation of an inter-regional Coordination Centre on Maritime Safety and Security for Central and West Africa, headquartered in Yaoundé, and the implementation of a new Code of Conduct Concerning the Prevention and Repression of Piracy, Armed Robbery Against Ships, and Illegal Maritime Activities in West and Central Africa. Adoption of this agreement has laid the foundation for critical information sharing and resource cooperation that can be used to combat piracy, illegal fishing, and other illicit activities in the Gulf of Guinea.

Though the Code of Conduct established an architecture for maritime security in the region, without enforcement on the water, diplomatic efforts are largely impotent. Key to enforcement is the ability to identify, track, and prosecute nefarious actors on the high seas and in coastal areas. So-called maritime domain awareness is gradually improving in the area, but current options for maritime surveillance are limited. The largest local navies have offshore patrol vessels capable of multi-day over-the-horizon operations, but even these vessels have limited enforcement capacity. Patrol vessels face maintenance issues and fuel scarcity. Shore-based radar systems at best reach out 30 or 40 nautical miles, but are plagued by power and maintenance issues. Moreover, a shore-based radar, even with signals correlated from vessels transmitting on the Automatic Identification System, only provides knowledge that a contact is afloat, not necessarily any evidence to illicit actions.

Latin American navies face similar maritime challenges to those in Africa and have learned that airborne surveillance is simply the best way to locate, track, identify, and classify surface maritime targets involved in illicit or illegal activity. A retired senior naval officer from the region related a study in the Caribbean narcotics transit zone to one of the authors that compared different surveillance mechanisms for the 11,000 square nautical mile area. The probability of detecting a surface target within six hours rose from only five percent with a surface asset to 95 percent when maritime patrol aircraft were included. Only a handful of coastal African countries have fixed-wing maritime patrol aircraft and helicopters, but these aircraft face similar issues to surface assets with fuel costs and mechanical readiness resulting in limited flight time on station.

Drone Solutions to African Maritime Insecurity

Unmanned aerial systems (UAS), or drones, as they are known colloquially, provide a way for African navies and coast guards to greatly enhance maritime security in a relatively inexpensive manner, similar to the ways mobile telephony revolutionized communications on the continent. Similar to the evolution of computing power outlined by Moore’s law tactical UAS are rapidly growing in capabilities while decreasing in cost. Improvements in sensors, endurance, and payload are advancing quickly. For any solution, acquisition cost, maintainability, and infrastructure required are key factors to be considered. The cost per flying hour of most UAS is negligible compared to their manned counterparts. Today’s fixed and rotary-wing systems, whether specifically designed for military use or for commercial applications, can be adapted for surveillance in a maritime environment without much additional cost.

A Falcon UAV unpiloted aircraft is bungee launched in a midday demonstration flight. (© Helge Denker/WWF-Namibia)

Because each country has unique requirements and budgets no single UAS solution is appropriate. Maritime drones can be based ashore or on coastal patrol vessels. One viable option for countries with limited resources involves services contracted by Western Partners, a model which has already been proven in the region for other applications. Alternatively, the Yaoundé Code of Conduct provides a framework for a possible shared model. This agreement can provide the timely sharing of critical information ascertained by maritime surveillance and reconnaissance systems to aid in the enforcement of the maritime laws and agreements in the region. Contractor-operated drones could be allocated across countries by leadership in the five Zones delineated by the Code. Multinational cooperation on maritime security has already been tested in the annual Obangame Express exercise and during real-world counterpiracy operations. Understanding that not all countries have the investment capability to purchase their own stand-alone systems, consideration could be given to sharing the initial investment costs between countries. The logistics of system placement and asset availability would have to be determined by the participating countries themselves but the benefit of such a program would positively impact the entire region economically, enhance interoperability, and assist in regional stability.

Drones are already being operated across Africa by Africans. Zambia recently purchased Hermes 450 unmanned aerial vehicles for counter-poaching operations. There are also African unmanned systems flying surveillance missions over areas plagued by violent extremists groups. UAS are even being used to transport blood and medical supplies across the continent’s vast rural landscapes. Shifting these assets over water is a natural progression. One concern about using UAS is airspace deconfliction. However, this problem is minimized because there is little to no civil aviation in most parts of Africa. Additionally, most maritime UAS would be flying primarily at low altitudes over water from coastal bases.

Conclusion

The leap-ahead capabilities that unmanned surveillance aircraft could provide to coastal security around Africa are clearly evident. African navies with adequate resources should make acquisition of unmanned air systems a priority. Likewise, western foreign military assistance programs should focus on providing contracted or organic unmanned aircraft capabilities.

Captain Rawley, a surface warfare officer, and Lieutenant Commander Patmon, a naval aviator, are assigned to the U.S. Navy’s Sixth Fleet’s Maritime Partnership Program detachment responsible for helping West African countries enhance their maritime security. The opinions in this article are those of the authors alone and do not officially represent the U.S. Navy or any other organization

Featured Image: GULF OF GUINEA (March 26, 2018) A visit board search and seizure team member from the Ghanaian special boat service communicates with his team during a search aboard a target vessel during exercise Obangame Express 2018, March 26. (U.S. Navy photo by Mass Communication Specialist 1st Class Theron J. Godbold/Released)

Why It Is Time For a U.S. Cyber Force

By Dave Schroeder and Travis Howard

The proposal to create a U.S. Space Force has cyber professionals wondering about the government’s national security priorities. While spaceborne threats are very real — some of which cannot be suitably described in a public forum — the threats posed in cyberspace have been all too real for over a decade, and include everything from nuisance hacks by nation-states, to the weaponization of social media, to establishing beachheads on our nation’s electric grid, or the internet routers in your own home.

Since 2009, incremental improvements have been made to the nation’s ability to operate in cyberspace during this period. The establishment of U.S. Cyber Command (USCYBERCOM) — first subordinate to U.S. Strategic Command, and then elevated to a Unified Combatant Command (UCC) — and the formation of the 133 teams that comprise the Cyber Mission Force (CMF) are chief amongst them.

Yet despite all of the money and attention that has been thrown at the “cyber problem” and for all of the increased authorities and appropriations from Congress, the nation’s offensive and defensive cyber capabilities suffer from inefficiency and a lack of a unified approach, slow to non-existent progress in even the most basic of cybersecurity efforts, and a short leash that is inconsistent with the agility of actors and adversaries in cyberspace. Our adversaries continue to attack our diplomatic, information, military, economic, and political systems at speeds never before seen.

The discourse surrounding the formation of a dedicated service for space defense has captured the American imagination, and for good reason. Since World War II, America has shown her ingenuity and innovation, and the success of the U.S. Air Force provides a historical model for how a combat-ready, specialized fighting force can be built around a new warfighting domain. However, a force structure has already taken shape within the U.S. military that would logically translate to its own service, and the operational culture it would both allow and cultivate would greatly enhance the effectiveness of national security.

It is past time to form the U.S. Cyber Force (USCF) as a separate branch of the United States Armed Forces.

America’s Position in Cyberspace is Challenged Daily — but it can be Strengthened

It’s no surprise that a wider breadth of adversaries can do more harm to American interests through cyberspace than through space, and for far less cost. In the aftermath of the 2008 Russo-Georgian War — the cyber “ghosts” of which are still alive and well in 2018 — Bill Woodcock, the research director of the Packet Clearing House observed, “You could fund an entire cyberwarfare campaign for the cost of replacing a tank tread, so you would be foolish not to.”

Deterring and responding to Russian hybrid warfare in cyberspace, countering Chinese cyber theft of U.S. intellectual property, shutting down state and non-state actor attacks, defending American critical infrastructure — including the very machinations of our democracy, such as voting and political discourse and even cyber defense of U.S. space assets are just some of the heavy-lift missions that would occupy a U.S. Cyber Force.

Admiral (retired) Jim Stavridis recently described four ways for the U.S. and allied nations to counter challenges like the weaponization of social media and multifaceted information warfare campaigns on Western democracy: public-private cooperation, better technical defenses, publicly revealing the nature of the attacks (attribution), and debunking information attacks as they happen. A dedicated U.S. Cyber Force, with the proper ways and means to do so, could accomplish all of these things, and be a major stakeholder from day one.

Admiral (ret.) Mike Rogers, former Director, National Security Agency (NSA)/Chief, Central Security Service (CSS) and Commander, USCYBERCOM, in his 2017 testimony before the Senate Armed Services Committee, cautioned against prematurely severing the coupling of cyber operations and intelligence that has been the hallmark of any success the U.S. has thus far enjoyed in cyberspace. General Paul Nakasone, the current DIRNSA/CHCSS and Commander, USCYBERCOM, made the same recommendation in August 2018. Despite increased resourcing of USCYBERCOM by both Congress and the Executive Branch, operational authorities in cyberspace are hamstrung by concerns about blending Title 10 military operations with Title 50 intelligence activities, along with negative public perception of the NSA. The relationship between USCYBERCOM and NSA requires a complicated (and classified) explanation, but blending cyber operations with rapid, fused intelligence is vital, and go hand-in-hand — to separate them completely would be to take the leash that already exists around USCYBERCOM’s neck and tie their hands with it as well. Offensive and defensive operations in cyberspace are two sides of the same coin — and intelligence is the alloy between them. Standing up a U.S. Cyber Force would also enable a deliberate re-imagining of this unique symbiosis, and a chance to — very carefully — lay out lines of authority, accountability, and oversight, to both prevent overreach and justifiably earn public trust.

The above challenges could be addressed in part by refining the existing structures and processes, but the real sticking point in USCYBERCOM’s sustainment of fully operational cyber forces lies in how we build forces ready to be employed. Force generation of the CMF through the various armed services’ manning, training, and equipping (MT&E) their own cyber warriors is an inefficient and weak model to sustain a combat ready force in this highly-specialized and fast-moving mission area.

Cyber resources play second-fiddle to service-specific domain resourcing; for example, the Department of the Navy has an existential imperative to resource the maritime domain such as shipbuilding and warplanes, especially during a time of great power competition. The cyber mission is secondary at best, and that’s not the Navy’s fault. It just simply isn’t what the Navy is built or tasked to do. This same reality exists for our other military services. Cyber will always be synergistic and a force multiplier within and across all domains, necessitating the need for the services to retain their existing internal cyber operations efforts, but feeding the joint CMF is ultimately unsustainable: the CMF must sustain itself.

The Cyber Force is Already Taking Shape

USCYBERCOM, NSA, the 133 teams comprising Cyber Mission Force — are approaching full operational capability in 2019 — and the operational and strategic doctrine they have collectively developed can now more easily transition to a separate service construct that more fully realizes their potential within the joint force. There is a strong correlation here with how the U.S. Army Air Force became the U.S. Air Force, with strong support in Congress and the approval of President Truman. The DoD has begun revising civilian leadership and building upon cyber subject matter expertise, as well, with the creation of the Principal Cyber Advisor (PCA) to the Secretary of Defense — a position that Congress not only agreed with but strengthened in the Fiscal Year 2017 National Defense Authorization Act. Such a position, and his or her staff, could transition to a Secretary of the Cyber Force.

The footprint would be small, and room in Washington would need to be carved out for it, but the beginnings are already there. Cyber “culture” — recruiting, retention, and operations — as well as service authorities (blending Title 10 and Title 50 smartly, not the blurry “Title 60” joked about in Beltway intelligence circles) would all benefit from the Cyber Force becoming its own service branch.

Perhaps one of the greatest benefits of a separate cyber branch of the armed forces is the disruptive innovation that would be allowed to flourish beyond the DoD’s traditional model of incremental improvement and glacial acquisition. The cyber domain, in particular, requires constant reinvention of techniques, tools, and skillsets to stay at the cutting edge. In the early 2000s, operating in a cyber-secure environment was thought to mean a restrictive firewall policy coupled with client-based anti-virus software. In 2018, we are developing human-machine teaming techniques that blend automation and smart notifications to fight and learn at machine speed. Likewise, the traditional acquisition cycle of military equipment, often taking 4-6 years before prototyping, just doesn’t fit in the cyber domain.

In short, the “cyber culture” is an incubator for innovation and disruptive thinking, and there are professionals chomping at the bit for the chance to be a part of a team that comes up with new ideas to break norms. A dedicated acquisition agency for cyber would be an incubator for baked-in cybersecurity controls and techniques across the entire DoD acquisition community. The Defense Innovation Unit (DIU) — recently shedding its Experimental “x” — is proving that something as simple as colocation with innovation hubs like California’s Silicon Valley and Austin, Texas, and a willingness to openly engage these partners, can deliver innovative outcomes on cyber acquisition and much more. Similarly, the Cyber Force must be free to exist where cyber innovation lives and thrives. 

Creating the USCF has other benefits that would be felt throughout the military. The Army, Navy, Marines, and Air Force, relieved of the burden of feeding the offensive and national CMF and paying their share of the joint-force cyber bill, can better focus on their core warfighting domains. This doesn’t absolve them of the need for cybersecurity at all levels of acquisition, but a USCF can be an even greater advocate and force-multiplier for DoD cybersecurity efforts. Services can and should retain their service-specific Cyber Protection Teams (CPTs), which could be manned, trained, equipped, and tactically assigned to their service but also maintain ties into the USCF for operations, intelligence, and reachback. Smart policies and a unity of effort can pay big dividends here, as the services would naturally look to such an organization as the resident experts.

Extreme Challenges with Existing Forces

Much has been made of the extensive difficulties faced by our military services for the recruiting and retention of cyber expertise in uniform. Brig. Gen. Joseph McGee, Deputy Commanding General (Operations), Army Cyber Command (ARCYBER), described an example in which a talented cyber prospect “realized he’d make about the same as a first lieutenant as he would in a part-time job at Dell.” Examples like this are repeated over and over from entry-level to senior positions, and everything in between, on issues from pay to culture. In the military, being a cyber expert is like being a fish out of water.

The service cyber and personnel chiefs have made a clear case before the Armed Services Committees of both houses of Congress for the urgent need for flexibility on issues such as rank and career path for cyber experts specifically. Cyber needs were repeatedly cited as the rationale for the need for changes to restrictive military personnel laws. Many of these items were indeed addressed in the Fiscal Year 2019 (FY19) National Defense Authorization Act (NDAA), with provisions which may now be implemented by each service in what is hailed as the biggest overhaul to the military personnel system in decades:

  • Allow O-2 to O-6 to serve up to 40 years without promotions, or continue service members in these grades if not selected for promotion at a statutory board
  • Ability for service members to not be considered at promotion boards “with service secretary approval” — for instance, to stay in “hands on keyboard” roles
  • No need to meet 20 years creditable service by age 62 for new accessions (no need for age limit or age waiver above 42 years old for direct commissions)
  • Direct commissions or temporary promotion up to O-6 for critical cyber skills

But even these provisions do not go far enough, and the services are not obligated to implement them. When the challenges of pay, accessions at higher rank, physical fitness, or military standards in other areas come up, invariably some common questions are raised.

A common question is why don’t we focus on using civilians or contractors? In the case of naval officers, why don’t we make them Staff Corps (instead of Restricted Line), like doctors and lawyers who perform specialized functions but need “rank for pay” and/or “rank for status?” What about enlisted specialists versus commissioned officers?

The answer to the first question is easy in that we do use civilians and contractors across the military, extensively. The reason this is a problem is that we also need the expertise in uniform, for the same legal and authorities reasons we don’t use civilians or contractors to drive ships, lead troops, launch missiles, fly planes, and conduct raids.

As for making them Staff Corps officers or equivalent in the other services, the Navy, for instance, has been talking about going the other direction: making officers in the Navy Information Warfare community designators (18XX) unrestricted line, instead of restricted line, like their warfare counterparts, or doing away with the unrestricted line vs. restricted line distinction altogether. This is a matter of protracted debate, but the reality is that some activities, like offensive cyberspace operations (OCO) and electronic attack (EA), are already considered forms of fires under Title 10 right now — thus requiring the requisite presence of commissioned officers responsible and accountable for the employment of these capabilities. The employment of OCO creates military effects for the commander, and may someday be not just a supporting effort, or even a main effort, but the only effort, in a military operation.  

Under the Navy’s Information Warfare Commander Afloat Concept, for the first time the Information Warfare Commander of a Carrier Strike Group, the Navy’s chief mechanism for projecting power, can be a 18XX Officer instead of a URL Officer. If anything, we’re shifting more toward URL, or “URL-like”, and the reality of the information realm as a warfighting domain is only becoming more true as time goes on, if not already true as it stands today.

So what about our enlisted members? They’re doing the work. Right now. And the brightest among them are often leaving for greener pastures. But still for reasons of authorities, we still need commissioned officers who are themselves cyber leaders, subject matter experts, and practitioners.

None of this is to say that direct commissioning of individuals with no prior service as officers up to O-6 is the only solution, or that it would not create new problems as it solves others. But these problems and all of the concerns about culture shock and discord in the ranks can also be solved with a distinct U.S. Cyber Force which accesses, promotes, and creates career paths for its officers as needed to carry out its missions, using the full scope of flexibility and personnel authority now granted in the FY19 NDAA.

Another major challenge is the lack of utilization of our reserve components. Many members of our reserve force have multiple graduate degrees and 10-15 years or more of experience, usually in management and leadership roles, in information technology and cybersecurity. We have individuals in GS/GG-14/15 or equivalent contractor and other positions, who are doing this work, every day, across the Department of Defense (DOD), the Intelligence Community (IC), academia, and industry.

Yet reservists are currently accessed at O-1 (O-2 under a new ARCYBER program), need to spend 3-5 years in training before they are even qualified to mobilize, or for the active components to use in virtually any operational or active duty capacity. And that’s after doing usually a year or more of non-mobilization active duty, for which nearly all employers don’t give differential pay because of existing employment policies, including in federal GS/GG positions.

We have very limited mechanisms and funding sources to even put reservists on active duty at NSA or USCYBERCOM, where our service cyber leadership repeatedly states we need people the most. And in the rare instances we manage to put people on some type of active duty in a cyber role in their area of expertise, it often is not a “mobilization” under the law — which means a person is now an O-2 or O-3, and with that “level” of perceived authority and experience to those around them. And they often just left their civilian job where they are recognized as a leader and expert — and easily make $200k a year.

National Security Operations Center (NSOC) c. 1985 — National Cryptologic Museum

Most people appreciate that you can’t just magically appear as an O-6, and have the same depth, breadth, and subtlety of experience and knowledge as a O-6 with 25 years in uniform. Yet these O-6s, as well as general and flag officers, routinely retire and assume senior leadership positions in all manner of public and private civilian organizations where “they don’t know the culture” — because they’re leaders.

So while a person off the street doesn’t have the same level of understanding of the military culture, it’s incorrect to say they can’t innovate and lead on cyber matters — to include in uniform as a commissioned officer. We’re not so special to imply that you can’t lead people and do the critical work of our nation, in uniform, unless you’ve “put in your time” in a rigid career path. It’s time to change our thinking, and to establish a military service to support the realities of that shift.

Recommendations

The call for a dedicated cyber branch of the U.S. Armed Forces is not new. Admiral (ret.) Jim Stavridis and Mr. David Weinstein argued for it quite passionately in 2014, calling on national leaders to embrace cyber innovation and imploring us to “not wait 20 years to realize it.” Great strides have been made in the four years since that argument was made, and we are closer than ever to realizing this vision. It will take a focused effort by Congress and the president to make this happen, as it did with the U.S. Army Air Forces becoming the U.S. Air Force in 1947. A tall order, perhaps, in today’s political environment, but not impossible, especially given the desire to compromise on issues of national defense and when both Republicans and Democrats alike are seeking wins in this column.

To summarize: the threat is eating our lunch, USCYBERCOM and the CMF are nearly ready to transition to their own service branch, and the benefits of doing so are numerous:

  • Sensible use of resources spent on cyberspace operations
  • An incubator of disruptive and rapid innovation in the cyber domain
  • Improved oversight and accountability by policy and under U.S. Code
  • More efficient and sustainable force generation and talent retention
  • Better alignment of service-specific core competencies across all warfighting domains
  • Synergy with a unified space commander (such as cyber protection of satellite constellations)

The United States House of Representatives recently ordered the Government Accountability Office (GAO) to begin an assessment on DoD cyberspace operations as part of the FY19 NDAA. This study, due to Congress in 2019, should prove enlightening and may become a foundational effort that could be built upon to explore the feasibility of establishing the U.S. Cyber Force as a new branch of the Armed Forces. Congress could order this as soon as FY21, with the Cyber Force fully established by the mid-2020s (blazingly fast by federal government standards, but no faster than the proposed Space Force).

Conclusion

The President has also now relaxed rules around offensive cyberspace operations, perceiving the urgent need to respond more quickly to cyber threats and cyber warfare directed at the United States. We have a great stepping stone in USCYBERCOM, but with no plans to take it to the next step, even a dedicated combatant commander for the cyber domain will face challenges with the above issues for the duration of its lifespan. Similar to how we are just becoming aware of space as a distinct warfighting domain, cyber has already been a warfighting domain since the beginning of the 21st century. The time for a U.S. Cyber Force is now. The threat in cyberspace, and our underwhelming response to it thus far, cannot wait.

Travis Howard is an active duty Navy Information Professional Officer. He holds advanced degrees and certifications in cybersecurity policy and business administration, and has over 18 years of enlisted and commissioned experience in surface and information warfare, information systems, and cybersecurity. Connect with him on LinkedIn.

Dave Schroeder served as a Navy Cryptologic Warfare Officer and Navy Space Cadre, and is Program Manager for IWCsync. He serves as a senior strategist and cyber subject matter expert at the University of Wisconsin–Madison. He holds master’s degrees in cybersecurity policy and information warfare, and is a graduate of the Naval War College and Naval Postgraduate School. Find him on Twitter or LinkedIn.

The views expressed here are solely those of the author and do not necessarily reflect those of the Department of the Navy, Department of Defense, the United States Government, or the University of Wisconsin–Madison.

Featured Image:  National Security Operations Center floor at the National Security Agency in 2012 (Wikimedia Commons)

Harnessing Tech Innovation from Blockchain to Kill Chain

By Jimmy Drennan

With all of the hype surrounding bitcoin and other cryptocurrencies, it can be difficult to sort through the noise and it might seem trendy to ask the question “How can this technology benefit my organization?” After all, a cryptocurrency started as a joke in honor of dog memes recently achieved a $2B valuation. Still, the underlying technological innovation behind Bitcoin, the blockchain, has real, concrete advantages that can impact numerous industries, from banking to logistics.

Applications in maritime operations are no exception. Blockchain is essentially a distributed database that incentivizes network consensus to make it extremely difficult to alter recorded data. Think of it this way: blockchain is like a museum that offers free entry, but heavily secures each exhibit with anti-tamper systems such that they can only be observed, not stolen or defaced. That so-called “immutability property” makes blockchain useful any time data integrity (i.e. preservation of data) is more important than data security (i.e. privacy of data).

Ideas are already being formulated by the Secretary of the Navy’s Innovation Advisory Council on how blockchain can improve additive manufacturing. Perhaps the most intriguing example of how blockchain can assist naval operations lies in ensuring an accurate recognized maritime picture (RMP). In naval warfare, nothing is more important when forming a kill chain than ensuring one has properly identified the target. RMP is even more critical when relying on networks, and the U.S. Navy has invested heavily for decades to become the world’s preeminent networked force. Blockchain has the potential to solve two of the Navy’s biggest problems associated with building RMP: ambiguity and manipulation. In fact, the broader maritime industry can also benefit from the use of blockchain due to inherent security flaws in the widely used automatic identification system (AIS).

What is a Blockchain?

A brief primer on how blockchains work will help to illustrate how they can impact naval operations. A blockchain used to record financial transactions, called “cryptocurrency,” is perhaps the best example to use. It is a distributed ledger that keeps track of every transaction ever conducted. Bitcoin, the original and most well-known cryptocurrency, relies upon a large network of independent users to prevent “double spending.”  Since cryptocurrency is just data, and not something tangible that is traded for goods or services, it would normally be easy for someone to spend it twice and delegitimize the entire system. Bitcoin’s unique process solved the double spending problem by calling upon its network users to work together to verify each transaction. Bitcoin conducts “consensus building” by offering a prize (currently 12.5 bitcoin) to a randomly selected user helping to verify the latest transaction. Once consensus is built and a transaction is verified, a new 12.5 bitcoin is awarded (i.e. mined) and the transaction is recorded to the blockchain. Each subsequent transaction is built upon the last, making it very difficult to retroactively manipulate data on the blockchain. In fact, the only way for a nefarious actor to alter a previous transaction or record an invalid transaction would be to achieve 51 percent of the computing power on the bitcoin network. For reference, today the world’s most powerful supercomputer, China’s Sunway Taihulight, would comprise just 0.6 percent of the bitcoin network’s computing power, which is growing exponentially.

Recognized Maritime Picture

U.S. and coalition navies rely on secure tactical data networks to share information from a variety of sensors to build RMP. Since RMP is built from the input of numerous, widely distributed users in these networks, they are susceptible to errors like “dual tracks” (i.e. a single ship or aircraft being broadcast to the network as two contacts) or faulty navigational data causing a ship to misreport its own course and speed. These errors can lead to ambiguity in RMP that could lead to critical delays in successfully identifying a threat. Tactical data networks are also susceptible to intrusion and manipulation, no matter how secure they are. Like any cybersecurity system designed to keep unauthorized users out, navies constantly strive to make their tactical data networks more secure against ever more determined adversaries.

Blockchain technology can help navies mitigate the problems of ambiguity and manipulation in building RMP. By building tactical data networks on a blockchain foundation, ambiguity will be resolved naturally as “consensus” develops around new tracks and they are distributed throughout the network. Once consensus is built around a track, blockchain’s immutability property makes it very difficult for subsequent users to clutter RMP with errant data on that track. Likewise, an unauthorized user trying to manipulate RMP by infiltrating tactical data networks will be challenged to alter data on established tracks. Even if a cyber attack attempted to insert new false tracks into the network, specialized blockchain features could be developed to override track data that is not corroborated by friendly sensors. A blockchain that utilizes special features and operates on secure networks is an example of a  private blockchain. Going back to the museum example, a private blockchain is like a museum that employs robust anti-tamper systems on the exhibits, but also restricts entry to museum members only. A disadvantage of a private blockchain is the reduction in available computing power, due to limited users, to ensure data integrity. The cost of rebuilding U.S. and coalition navy tactical data networks from the ground up utilizing blockchain will likely be significant; however, the advantages in data integrity by mitigating ambiguity and manipulation are worth analyzing.

Much as U.S. and coalition navies could benefit from private blockchain, the maritime industry at large could benefit from public blockchain to improve its RMP. Worldwide, mariners use AIS – an open network of ship position, course, and speed data – as a primary tool for building RMP. Implemented in the early 2000s, AIS has been critical to improving safety of navigation. Still, AIS has inherent flaws that blockchain could be used to fix. Because it is open source, AIS data can easily be manipulated to make a ship appear in a different location, report false course and speed, or even mimic another ship’s identity. As Glenn Hayes explains in the Maritime Electronics Journal, AIS “is vulnerable to malicious transmissions and runs the risk of being manipulated by individuals seeking to deceive the system.”  Illegal fishing, piracy, and smuggling are just a few of the reasons one might seek to deceive AIS. As use of AIS spreads, potential security issues will only increase. The data manipulation that AIS is susceptible to is exactly the type of vulnerability that blockchain was developed to address. With targeted funding and industry-wide effort, blockchain can provide data integrity to AIS to improve maritime safety and deter illegal activity at sea.

Countering Maritime Smuggling

Another potential application of blockchain in maritime operations could be in supply chain improvements to counter maritime smuggling of drugs, weapons, or any illicit cargo. Lieutenant Junior Grade Henry Bond wrote an insightful article for U.S. Naval Institute Proceedings on the potential for blockchain to protect the DoD supply chain. Lieutenant Bond’s analysis can be expanded to include the global shipping industry. Specifically, smugglers often exploit the inherent difficulties in conducting cargo inspections on container ships by concealing contraband within legitimate cargo in innocuous, unmarked containers. Economic and operational constraints do not often allow for the time it would take to open and inspect hundreds of containers pierside, and physical constraints usually prohibit at-sea inspection. So, to counter maritime smuggling via container ships, navies and law enforcement agencies must focus on deterring the use of containers vice locating illicit cargo in transit. Blockchain portends to act as a potential deterrent by openly and irrevocably recording the status of every container in the supply chain. Essentially, each container could be treated like a “transaction” in the blockchain, so that once it is loaded as part of a legitimate shipment, its status relative to all other nearby containers is “locked down,” making it very difficult to mix in an illegitimate container at a later point. Events like the opening or repositioning of a container could also be recorded as “transactions” to further complicate smugglers’ to conceal illicit cargo.

Ideas like those of Lieutenant Bond or the SECNAV Innovation Board are sound, but they require further development because blockchain is still a nascent technology. DoD, and the maritime industry at large, would do well to assign additional research funding to pursue ideas for applying blockchain in national defense and maritime safety.

Jimmy Drennan is the Vice President of CIMSEC. These views are the author’s alone and do not necessarily reflect the position of any government agency.

Featured Image: ORLANDO, Fla. (August 12, 2014) Sailors train on a new diesel generator simulator during a project review at Naval Air Warfare Center Training Systems Division in Orlando, Fla. (U.S. Navy photo by Darrell Conley/Released)