Category Archives: Future Tech

What is coming down the pipe in naval and maritime technology?

The Future of Information Combat Power: Winning the Information War

By VADM T.J. White, RDML Danelle Barrett, and LCDR Robert “Jake” Bebber

Imagine you are the Information Warfare Commander (IWC) of a coalition naval task force in the South China Sea in 2033. The task force’s mission is to deliver combat power in support of the Commander’s campaign objectives. As the IWC, you are simultaneously a “supporting” and “supported” commander. You execute multiple lines of operations across the full-spectrum of influence, information, and cyberspace. The other warfare commanders – strike, air defense, and sea combat – rely on you to understand their fight and fuel their decision-making with precision information, while simultaneously conducting an integrated high-end fight in and through the information domain leading to warfighting outcomes. The information domain is vast, it can be both localized and completely global, interweaving through all other domains of war.

Cyberspace and the Electromagnetic Spectrum are material realizations of the information domain, whether midpoint or endpoint, Internet Protocol or radio frequency, defense or attack, this is where you fight, for there is only one network separated in time. The arsenal of interoperable weapons and systems, manned and unmanned platforms, at the Commander’s disposal to execute and sustain a campaign requires all that you can bring to bear from across your composeable force to achieve unmatched distributed lethality. You have the authorities to execute full-spectrum information warfare to:

  • Reach intended audiences and decision-makers to alter adversary courses of action to our advantage;
  • Protect coalition decision-making;
  • Seize and hold at risk adversary cyberspace;
  • Defend our interests in and through cyberspace;
  • Compete and Win.

Technological capabilities are advancing at an exponential rate while also converging with each other, creating new capabilities for both you and your adversary. When those are combined with people and processes, they provide significant operational advantages, enabling us to simultaneously contest adversary actions in cyberspace, land, sea, air, and space. Future warfighting, enabled by these emerging technologies, is necessary to adapt, develop, and execute new, more lethal operational methods. The future IWC must foster an intuitive ability in themselves and across their force to recognize these emergent opportunities, seize them with deliberate intent, and be comfortable with a battlespace changing at an unprecedented rate. As “maestro” of the Information Warfare afloat symphony, you understand the potential power of full-spectrum, integrated information warfare. You guide your force to realize that potential by opportunities seized and effects achieved.

This requires serious forethought and planning to make certain the force – human and platform –  is prepared to orchestrate effects in this type of environment. It demands a certain mentality and type of thinker – agile, adaptive, innovative, willing to take calculated risks with speed; an aggressive change agent. Thinking like a futurist and being comfortable with being uncomfortable should be part of the IWC job description. As the IWC, you see the convergence of people, information, and machines as your domain and how the Navy makes that our warfighting gain.

The complex interactions within the information environment and ecosystem expose new vulnerabilities to pre-emptively close or seize. Space, cyberspace, and the electromagnetic spectrum must be protected from disruption by sophisticated and increasingly aggressive adversaries. These domains are contested ecosystems in which you as the IWC must align kinetic and non-kinetic fires, synchronized alongside other operations. At your disposal are surface, subsurface, air, and space autonomous vehicles that can reason, recommend actions, and execute within prescribed rules of engagement. Autonomous information warfare platforms are hyper-connected with manned units using both laser and radio frequency communications links, complicating an already congested spectrum. The ability to tie all these elements together into the fleet tactical grid, coupled with advanced data analytics and machine learning, are required to prevail in our highly contested battlespace.

Additionally, platforms are equipped with quantum computers networked across 24 time-zones. Secure cloud-networked afloat “information warfare vaults” at the tactical edge project combat power and provide the bandwidth, security, and resiliency needed to fight through information disruption and denial. Our peer adversaries have rapidly advanced their capabilities in parallel. Inexpensive and ubiquitous technology has eroded the qualitative operational advantages we once enjoyed. Our force must be postured to deny the information space to adversaries who wish to hold our national interests at risk. Resilience in your operations presents both sides of the coin; challenge and opportunity.

We observed a sea change in operational focus, due to the vastly different threat outlook outlined 17 years earlier in the 2018 National Defense Strategy (NDS). In 2033 we face new and emerging threats that were not imagined then. For example, miniaturized computing coupled with advanced robotics on autonomous Artificial Intelligence (AI) vehicles have fundamentally changed maritime warfare. The rules of engagement are different and include means for AI in those autonomous vehicles to even make ethical decisions about warfare. Our adversaries no longer conform to Geneva Convention rules having judged them anachronistic for the current fight. As IWC you have a keen sense of how these factors govern our own warfighting actions, how the adversaries don’t behave in accordance with traditionally accepted rules of warfare, and how to incorporate all of these factors for an information advantage that ensures our lethality.

Since 2000, the U.S. and China have been engaged in a fierce technological arms race, with AI at the forefront beginning 2018. Each amassed complicated autonomous combat platforms that can reason, recommend, and make decisions depending on their programming and their ability to learn. China made significant investments in people, processes, and technology (not always their own) to ensure dominance in AI and quantum computing. They have long held a strategic national objective to be the world leader in AI, working tirelessly to shape information interactions globally. What started in the early stages of Chinese and American research companies developing AI programming that defeated the world’s greatest chess and Go masters, has progressed to unprecedented computing capability far exceeding the capacity of the human brain.

Physical devices such as automobiles, appliances, phones, and homes were embedded with sensors, software, and actuators connected to share data and control actions across an “Internet of Things.” This similarly transformed maritime operations. Strategic competitors like Russia and China added disruptive tools to their information arsenal to achieve warfighting maritime effects like operational technology disruption in navigation, propulsion. and other control systems. As the IWC, you understand how to stay one step ahead of potential adversaries by leveraging those same technologies and capabilities, integrating them into the fight, and denying enemy use.  

Your superior AI is a game changer enabling you to stay ahead. It correlates thousands of factors in real time yielding a tactical picture not disconnected from operational significance. Advanced modeling and simulation of possible enemy courses of action at the tactical edge provides you with recommended countermeasures. Real-time assessment of network conditions yields the means to communicate securely over vast distances to execute distributed operations. Because it processes vast quantities of data in fractions of a second, AI quickly learns, grows, and adapts within a rules framework such as command relationships, rules of engagement, campaign phasing, weight, level of effort, all covering multiple branches and sequels to operational plans. Your team provides the necessary “man in the loop” understanding and maintaining of Commander’s intent and strategic guidance. AI supports your maritime forces by providing courses of action based on analysis of massive amounts of sensor data and information from ashore and organic afloat sources. The key to this operator extended reality (clearer sight picture, farther reach, faster decision) is data veracity – a combination of data trustworthiness and core common data standards across and within the information kill chain. Warfighting decisions are made more quickly and reliably, even factoring ethical and moral elements into the calculus. Only in the most sensitive warfighting scenarios are humans used as the last deciding factor for weapons employment.

The Navy moved boldly to get here by 2033. The information race was not an easy lift. There were practical modernization, structural, and cultural challenges for the Navy to quickly integrate and adapt processes to leverage new technology on aging platforms, new ideas by old warriors, and to build the new platforms with the flexibility to insert emerging technology at a significantly accelerated rate. In 2018, the Navy’s acquisition and programmatic processes were slow, built for the industrial era. The Navy recognized this and changed. It forced creative solutions in how it imagined, researched, built, fielded, and sustained new technology. An example of this was their move to commercial cloud to more quickly deliver lethal technologies and advanced data analytics to the tactical edge of fleet operations. Continued reforms streamlined the traditional acquisition processes so that by 2033 new capabilities are continuously delivered in increments vice in their entirety over decades, ultimately yielding the agility we require for the fight.

More important than improved acquisition processes is flexibility in how our most important treasure – our people – are missioned. To protect platform networks and exploit information advantages in 2018, the Navy began deploying cyber development units, Sailors specially trained who came with their own “cyber kit,” able to build tools “on the fly” to meet emerging priorities. By 2033, training, education, and organic platform capability have resulted in full spectrum cyber and information operations from sea. As the IWC, you recognize processes and people are just as critical to excellence in the information domain as the technology. You deliberately combine these three elements for warfighting supremacy.

In 2033 you also have the authority to execute influence operations to shape the maritime and littoral battlespace. History from prior to 2018 demonstrated that peer adversaries like Russia and China quickly organized social media and public demonstrations around the world in support of their strategic objectives in the Ukraine, Southeast Asia, and America. In 2033, influence actions at the tactical and operational level are designed and executed by you and aligned to strategic objectives including targeted messaging on social media; suppressing, changing, or interfering with adversary maritime messaging to their audiences; or targeting dual-use entities that support adversary maritime sustainment.

So how is this all playing out operationally in the total fight in 2033? Back in the South China Sea, as IWC you are coordinating with our coalition partners as a task force quietly slips out of San Diego. Under the guise of a planned international naval exercise, this force would include a Japanese “helicopter-destroyer” with a mix of Japanese F-35s and older V-22s, as well as a French frigate. To keep the Chinese unaware, the carrier fleet remains in port. The command ship, a Zumwalt-class guided missile destroyer, and two of the newest unmanned guided missile frigates lead the force. An American cruise missile submarine, which departed two weeks prior from the U.S. mainland, avoids the extensive Chinese underwater sensor networks that stretch to Hawaii.

A key component to this lethal task force are those virtually undetectable unmanned surface and subsurface “sensor/shooter” vessels. These platforms use secure and resilient quantum-encrypted relays to massively powerful shipboard data clouds. This cloud ecosystem leverages advanced heuristics and machine-language algorithms correlating sensor production and dissemination of information in the context needed for action to humans and weapons systems. Task Force vessels spread across the Pacific, link land-and-space-based intelligence and surveillance collection and long-range ballistic missiles with Air Force B-52 “arsenal” planes loaded with hypersonic, anti-ship, and anti-air missiles. This powerful manned and unmanned naval force is part of a larger coalition response, sent as a bulwark between Vietnamese islands and the oncoming Chinese amphibious fleets. The Task Force Commander relies on you to execute denial and deception to confound the adversary and maintain tactical situational awareness (EMCON, counter-ISR and counter-targeting systems). You deftly impact adversary behavior through advanced influence operations executed against their maritime forces, partners, and logistics lines of communication. You and the converged human and machine team leverage the entire electromagnetic spectrum, from space to undersea and linked to assessment and intelligence nodes via tactical and operational level “cloud”-based quantum computing systems to proactively analyze, disseminate and act on information. Synchronized human-AI teams dynamically model, wargame, and execute pre-planned and improvised tactical actions and operational movements to prevent detection. Commander confidence is high in the human-augmented teams to quickly and accurately identify potential second and third order effects across an integrated battle space. You provide the Commander with the information warfare options needed to deter, and if necessary, defeat adversary forces. Your Commander has the highest levels of force readiness and uses technology to help maintain that state. The symbiotic relationship between machine and human extends down to the individual Sailor and platform as Sailor health and readiness are continuously monitored via implants and sensors, enabling your Commander to immediately recalibrate force distribution should you begin to take casualties.

Before a shot is fired, the Commander knows she will win the information war, enabling success in the overall campaign. You as the IWC will give her that tactical and operational win as the conductor orchestrating the elements together for mission success.

In a data-rich and knowledge-poor circumstance, challenged with sophisticated competitors, as IWC you will be more than just the conductor of this information orchestra; you will be the instrument builder and tuner, the composer, and the producer. You will rely on advanced technologies and computers to perform the heavy lifting so our forces can act dynamically with precision and purpose. Modern information warfare requires this nimble shift from orchestra to jazz, or to the raw power and disruption of punk rock.

If you are interested in joining, contact the iBoss.

Vice Adm. Timothy “T.J.” White currently serves as the Commander, U.S. Fleet Cyber Command and Commander, U.S. 10th Fleet at Fort Meade, MD. A leader in the Navy’s Information Warfare Community, White originally served as a surface warfare officer before being designated as a cryptologic warfare officer. He is a graduate of the U.S. Naval Academy and has postgraduate degrees from the Naval Postgraduate School and the National Defense University-Industrial College of the Armed Forces. He is also a Massachusetts Institute of Technology Seminar XXI fellow. He is a native of Spring, TX. 

Rear Adm. Danelle Barrett is serving as the Navy Cyber Security Division Director on the staff of the Deputy Chief of Naval Operations for Information Warfare (N2N6) in the Pentagon. An Information Professional, she graduated from Boston University where she received her commission via the Naval Reserve Officers Training Corps program. She holds Masters of Arts degrees in Management, National Security/Strategic Studies, and Human Resources Development and a Master’s of Science in Information management. Barrett has published more than 29 professional articles. 

Lieutenant Commander Robert “Jake” Bebber was commissioned through the Officer Candidate School program. An Information Warfare professional, Bebber holds a Ph.D. in Public Policy, a Master’s in Public Administration and a Master’s In National Security and Strategic Studies, as well as a BA in Political Science from Stetson University. He currently is assigned to the staff of Commander, Carrier Strike Group 12 on board USS Abraham Lincoln as the Cryptologic Resource Coordinator.

Featured Image: PHILIPPINE SEA (JUNE 21, 2016) Sonar Technician (Surface) 3rd Class Michael E. Dysthe stands watch in the combat information center during a anti-submarine warfare exercise aboard the Ticonderoga-class guided-missile cruiser USS Chancellorsville (CG 62). (U.S. Navy photo by Mass Communication Specialist 2nd Class Andrew Schneider/Released)

Developing New Tactics and Technologies in Naval Warfare: The MDUSV Example

By Jeffrey Kline, John Tanalega, Jeffrey Appleget, and Tom Lucas

Introduction

The paper is about synergy. It demonstrates the power of using analytical tools in a logical sequence to generate, develop, and assess new concepts and technologies in warfare. Individually there is nothing new here. Each of the analytical tools described in this paper is thoroughly discussed in academic literature. The use of intelligent experimental design and large scale simulation to advance knowledge in defense and homeland security issues is well describe in Design and Analysis of Experiments by leaders in the Naval Postgraduate School’s Simulation Experiments and Efficient Design (SEED) Center for Data Farming (Sanchez, 2012).1 The power of campaign analysis to gain insight and quantify the value of new technologies and capabilities is covered in the campaign analysis chapter of Wiley’s Encyclopedia of Operations Research and Management Science (Kline, 2010).2 Wargaming’s use to develop concepts for employment of those new technologies and discover possible risks to them are discussed recently in both the Military Operations Research Society’s Phalanx (Appleget, 2015)3 and the journal for Cyber Security and Information Systems Information Analysis Center (Appleget, 2016).4

It is the synergy created by bringing these tools together—linked by officers with tactical experience and educated in the analytical techniques—which this paper addresses.  We provide it as an example of military operations research in practice to advance naval force development and fleet combat tactics.  We tell this story through the lens of our co-author, LT John Tanagela, USN, and one technology, the Medium Displacement Unmanned Surface Vessel (MDUSV), but provide multiple examples of past work similar in nature. LT Tanagela is a qualified Surface Warfare Officer who chose to attend the Naval Postgraduate School to obtain a master’s degree in Operations Research. We select John’s educational and research experience not for its uniqueness, but instead for its normalcy as a NPS OR student with unrestricted line qualifications. Our other co-authors were John’s combat models instructor, campaign analysis instructor, wargaming instructor, and thesis research advisors. We provide descriptions and results from the analytical courses John leveraged to advance his research in employing a MDUSV and highlights from his thesis.  We conclude with brief summaries of other concepts and technologies advanced in this manner.

Triad of Military Applied Courses

The Naval Postgraduate School’s Operations Research students receive three foundational courses in warfare analysis: the introduction to joint combat modeling course, the joint campaign analysis course, and the wargaming course (See Figure 1). In these applied courses they learn to model combat effects in tactical and operational level conflict, integrate these quantitative techniques in campaign analysis and human decision making, and, as a result, develop and quantitatively assess new concepts, tactics, and technologies.  

Figure 1: The three warfare analysis courses provided to NPS operations research students.

The joint combat models course introduces traditional force-on-force modeling, including homogeneous and heterogeneous Lanchester equations, Hughes’ salvo equations, and computer-based combat simulations. It provides our officers the experience to integrate uncertainty into these models to allow for sensitivity analysis and design of experiments in exploring new capabilities.

The joint campaign analysis class leverages these new skills and previous course work in simulation, optimization, decision analysis, search theory, and probability theory by challenging our officers to apply them in a campaign-level scenario. During the course they must develop a concept of operation to meet campaign objectives, model that concept to assess risk using appropriate measures for their objective, and assess “new” technical capabilities by comparing them to their baseline concept analytical results. The results are quantitative military assessments of new concepts and technologies, identification of force capability gaps, and risk assessments (See Figure 2).

Figure 2: The NPS Joint Campaign Analysis class process for applying officers’ new analytical skills to campaign and operational level issues.

The wargaming class provides an overview of the history, uses, and types of wargaming, but focuses its efforts on teaching officers how to design, develop, execute, analyze, and report on an analytical wargame. After learning the fundamentals, officer-teams are assigned real-world sponsors who provide the objective and the issues they desire to address during a wargame. The officer-teams work with the sponsor through execution of an actual wargame, completing their course work by reporting the wargame’s analysis and results to the sponsor. An example is supporting the Navy’s PEO C4I by assessing the Undersea Constellation concept and technology. (See Figure 3)

Figure 3: Sponsor, student wargaming team (in uniform) and players of the NPS wargaming course’s PEO C4I Undersea Constellation Game.

Passing Lessons and Students along

As the NPS operations research students proceed from one course to another in the triad above—where they are joined by Joint Operational Logistics students, Systems Engineering Analysis students, Defense Analysis students, and Undersea Warfare students—there is an opportunity to carry lessons from on course into another, and gain further insight into those concepts and technologies. The teaching faculty work closely to ensure that happens by design. NPS Warfare Analysis faculty and researchers use these courses synergistically to provide insights to real-world sponsors in advancing their concepts, assessing new technologies proposed by DoD labs and industry, and developing new tactics—all the while enhancing our officer-students’ educational experience and sharpening their combat skills. For example, after learning to model a war at sea strike using salvo equations in the joint combat modeling course, the officers are challenged to develop a maritime concept of employment using distributed forces in the joint campaign analysis class, and assess that concept using the salvo equations and simulation. That concept is passed to the wargaming class (usually the same students) to better understand Blue’s decisions in employing distributed forces and Red’s potential reactions. Common scenarios are used between classes with similar forces structures (See Figure 4).

Figure 4: The NPS Joint Campaign Analysis and Wargaming connection. Technologies and concepts analyzed in the Joint Campaign Analysis class are frequently introduced by real-world sponsors in the wargaming class to better understand Blue’s force employments and Red’s reactions to new Blue capabilities.

The results of these capstone classroom efforts are a series of analytical and wargaming briefings, reports, and papers frequently shared with DoD and service organizations. In addition, the work informs other NPS research occurring in unmanned systems, networks, and command and control. Most impactful, however, is when officers are inspired to take a much more detailed look at new capabilities as their thesis research, using the insights gathered from their capstone course work as a foundation to build upon.

Simulating a Half Million Tactical Engagements 

Officers frequently select a new technology explored in their military operations research applied courses to further study in their thesis work. They will draw upon their own operational experience to develop tactics to employ these technologies; work with weapon tactics instructors to refine these tactical situations; identify important variables and parameters within that scenario to further identify needed performance capabilities (range, speed, etc.) and tactical employment (formations, distances, logistics, etc.); build or use an existing simulation to model those tactics; use intelligent experimental design to efficiently explore a range of values for each of identified parameter; execute the experiment—frequently running over a half million tactical engagements; then use advanced data analytics to identify the most important parameters’ values to be successful (See Figure 5.)

Figure 5: Using simulation, intelligent experimental design, and advance data analytics to identify the most import performance parameters of a technology or tactical employment.

These theses’ results are always of great value to warfare and tactics development commands, to resources sponsors, material commands, and defense laboratories developing new technologies. Their insights also inform future capstone course work and NPS technical research. We now turn to our specific example, LT John Tanalega and the Medium Displacement Unmanned Surface Vessel. 

The Technology: The Medium Displacement Unmanned Surface Vessel

The Office of Naval Research (ONR) Medium Displacement Unmanned Surface Vessel (MDUSV) program is a self-deployed surface unmanned system capable of on station times of 60-90 days with ranges of 900-10000 nautical miles depending on speed (3-24 knots) and payload (5-20 tones).5  For the NPS warfare analysis group, we provide it the following future mission capabilities. In an antisubmarine warfare (ASW) role, it receives an off-board cue and hand off, then conducts overt trail with active sonar. It can act as an ASW scout in coordination with area ASW assets like the P-8 maritime patrol aircraft or benthic laid sensors in an Undersea Constellation, conducting large acoustic surveillance using passive and/or active bi-static sonar. It can deploy three Mk 54 or six smaller CRAW torpedoes. In its Intelligence, Surveillance, and Reconnaissance (ISR) role, it can work with surface ships as an advanced scout employing passive sensors, and in an offensive role, can carry eight RBS-15 surface-to-surface missiles. In its mine warfare role, it can conduct mine sweeping with a MK-104 acoustic sweep body or can deploy a clandestine delivered mine in an offensive mining role. It may also act as a forward environmental survey ship, a platform for operational military deception, a tow for a logistics barge, and special operations equipment delivery.

All MDUSVs in these analyses are augmented by TALON (Towed Airborne lift of naval systems)6, which can carry up to 150 pounds of payload up to 1,500 feet. This payload can be communication relays, radar, electronic jammers (or emitters for decoy operations), or optical sensors.

https://gfycat.com/AlivePitifulIberiannase

ACTUV conducting testing with TALONS (DARPA Video)

The MDUSV equipped with TALON has been introduced in several Joint Campaign Analysis classes and Wargaming classes as technical injects to be assessed. LT Tanalega was given the MDUSV as a technical inject for both these classes.

The Student: LT John Tanalega

Academically talented, John has a typical operational background for a Naval Postgraduate School Operations Research student. He graduated from the U.S. Naval Academy in 2011 with a Bachelor of Science degree in English. His initial sea tour was as Auxiliaries and Electrical Officer, and later First Lieutenant, in USS DEWEY (DDG 105). While assigned to DEWEY, he deployed to the Western Pacific, Arabian Gulf, Red Sea, and Eastern Mediterranean. His second division officer tour was as the Fire Control Officer in USS JOHN PAUL JONES (DDG 53), the U.S. Navy’s ballistic missile defense test ship. He attended the Naval Postgraduate School in from 2016 to 2018, where he earned a Master of Science degree in Operations Research and conducted his thesis research in tactical employment of the MDUSV.

Insights from the Joint Campaign Analysis classes, the Wargaming Classes, and other NPS research

As mentioned, the MDUSV with TALON was introduced to a series of Joint Campaign Analysis classes and several NPS wargames. Officer-students have employed it in a variety of missions, from active operational deception to logistics delivery to riverine patrol. Its strongest characteristics are on-station time over unmanned aerial systems, sensor payload capacity over all other unmanned systems, and speed over unmanned underwater systems. Its limitations include vulnerability to attack (it has no active defense), which is mitigated by a low radar cross section making it difficult to target and/or acquire. Our analytical and wargaming teams have found their value forward in offensive naval formations and in defense screening formations (Figure 5). Employing a single or pair of MDUSV with a P-8 maritime patrol aircraft in an area ASW environment is also valuable. (Figure 6).Figure 5: The graph shows the probability of successfully finding and engaging an adversary’s amphibious task force in a South China Sea scenario with a traditional U.S. Surface Action Group (SAG) with and without allied ship support. As MDUSVs are added to the SAG, the probability of mission success is increased. The MDUSV are contributing to the ISR and targeting capabilities of the SAG. This analysis was produced using combat modeling by a Joint Campaign Analysis class team.

Figure 6: This plot shows the simulation results of an Area ASW engagement between a PLA Navy SSK submarine and the MDUSV alone (labeled ACTUV or Anti-Submarine Warfare Continuous Trail Unmanned Vessel, the original DAPRA program name); the MDUSV with a P-8 (labeled both), and the P-8 alone. The Tukey-Kramer test displays significant improvement with the MDUSV and P-8 work as an unmanned-manned pair.

Unique employment concepts are also developed, such as employing paired MDUSVs working as an active-passive team for both active radar and acoustic search. This information is passed to both sponsors and the NPS combat systems research faculty for engineering analysis.

LT John Tanalega’s Joint Campaign Analysis efforts included analyzing the MDUSV’s contribution to a scouting advantage for Blue forces in a surface-to-surface engagement (see figure 5). While a student in the NPS Wargaming Class, John’s team designed, developed, and executed a classified South China Sea game for United States Fleet Forces Command exploring distributed maritime operations and a force structure that included the MDUSV. Lessons from both classes were then applied to his further research in the MDUSV’s best tactical employment in a surface to surface engagement.

Furthering the study by use of simulation (Problem, Tactical Engagement, and Design of Experiments)

In transitioning MDUSV from technical concept to operational reality, several questions are prominent. First, MDUSV is just what its name implies—a vessel. The specific technologies which will make it effective in the maritime domain are all in various stages of development, and they are too numerous for MDUSV to carry all of them. Therefore, an exploration of which capabilities improve operational effectiveness the most is essential. Second, while superior technology is necessary, alone it is not sufficient. USVs must also be used with effective tactics, techniques, and procedures (TTPs) to make them effective SUW platforms. USVs are entirely new to the U.S. Navy, and no historical data exists for their use in combat. Modeling, simulation, and data farming7 provide an opportunity to explore concepts and systems that, today, are only theories and prototypes.

Computer-based modeling and simulation are an effective means of exploring MDUSV capabilities and tactics. Live experiments at-sea are always important to gather real-world data and provide proofs of concepts. However, they require a mature design. They are prohibitively expensive, and the low number of trials that can be conducted reduces the confidence levels of their conclusions. Computer-based modeling and simulation allows us to run tens of thousands of experiments over a wide range of factors. It is, therefore, better suited for design exploration. Using high-performance computing and special techniques in design of experiments (DoE), such as nearly orthogonal and balanced (NOB) designs, simulation experiments that would have taken months or years with legacy factorial designs can be can be performed in a matter of days. This highly efficient technique provides greater insights that inform and direct live experimentation and requirements development.

To explore the effects of MDUSV on surface warfare, LT Tanalega used the Lightweight Interstitials Toolkit for Mission Engineering using Simulation (LITMUS), developed by the Naval Surface Warfare Center, Dahlgren Division (NSWC DD). LITMUS is an agent-based modeling and simulation tool suited specifically to naval combat. Ships, aircraft, and submarines are built by users and customized with weapons, sensors, and behaviors to mirror the capabilities and actions of real-world combat systems. Using an efficient design of experiments and LITMUS scenario, over 29,000 surface battles were simulated with varied active and passive sensor ranges, MDUSV formations and armament, and emissions control EMCON policies.

To compare battle results, LT Tanalega used the probability of a surface force being first to fire a salvo of missiles against an adversary as a measure of effectiveness. This choice is motivated by the maxim of naval combat in the missile era to “fire effectively first,” and indicates a clear advantage in offensive tactics.8

Simulation Results (Unclassified)

Analysis of the simulation output shows that a traditional Blue force combating a very capable Red force in its home waters has 19 percent probability of meeting first-to-fire criteria (See Table 1). Blue surface forces equipped with MDUSV are nearly three times as likely to be first-to-fire. Analysis also found the increase in performance is due primarily to the extended sensor range afforded by the TALONS platform on scouting MDUSV. Based on the presence of MDUSV alone, Blue improves its probability of being first-to-fire by a factor of nearly three (from 19 percent to 56 percent), as shown in Table 1. Though a SAG will likely have helicopters embarked, it is important to note that helicopters are more limited in endurance. Further, the use of a helicopter in Phase II of a conflict poses exceptional risk to human pilots, especially if the enemy is equipped with capable air defense systems. We therefore modeled “worst case” without an airborne helo during the engagements. Given the long endurance of MDUSV and its autonomous nature, MDUSV represents a worthwhile investment for the surface force. When numerically disadvantaged and fighting in dangerous waters, MDUSV levels the odds for Blue.

Table 1. MDUSV Effect on First-to-Fire Probability

Advanced partition tree analysis of the data noted a breakpoint at an MDUSV passive sensor range of 36nm. With this range or greater, Blue was first-to-fire in 81% of the design replications (Table 2). Using the mathematical horizontal slant range formula to approximate visual horizon, this equates to a tether height of approximately 1020 feet. Given the current 150-pound weight limit for a TALONS payload, a passive electro-optical sensor may be more feasible than an active radar. Placing a high power radar, with power amplification, transmission, and signals processing in a TALONS mission package may not be feasible in the near term. Further study, from an electrical engineering and systems engineering perspective, is required.

Table 2. MDUSV Passive Sensor Range Effect on First-to-Fire Probability

While arming MDUSV provides a marginal increase in first-to-fire performance with EMCON policies 1 and 2, it has a small negative effect with EMCON policy 3. Ultimately, first-to-fire in each replication is driven by scouting—who saw whom and fired first. Since detecting the enemy is a necessary condition to shooting him, providing MDUSV with over the horizon sensor capabilities should be the first concern. This will allow the missile shooters of the surface and air forces to employ their weapons without emitting with their own sensors.

Furthering the Study by Use of Wargaming

The Fleet Design Wargame consisted of three separate gameplay sessions. During each session, the BLUE Team received a different order of battle. During gameplay, the study team observed the players’ decisions to organize and maneuver their forces, as well as the rationale behind those decisions. After two to three turns of gameplay, a member of the study team facilitated a seminar in which all players discussed the game results. Each team, BLUE and RED, had a leader playing as the “Task Force Commander,” and a supporting staff. The Blue Team consisted of three SWOs, a Navy pilot, an Air Force pilot, a Navy cryptologic warfare officer, two human resources officers, and a supply officer. The RED team consisted of three SWOs, one Marine NFO, one Navy cryptologic warfare officer, two Naval intelligence officers, and two supply officers. Search was adjudicated using probability tables and dice. Combat actions are being analyzed using combat models, such as a stochastic implementation of the salvo model.

Wargaming Results (unclassified)

The game demonstrated the combat potential that networked platforms, sensors, and weapons provide. Long endurance systems, such as the MQ-4C Triton and the Medium Displacement Unmanned Surface Vehicle (MDUSV) can be the eyes and ears of missile platforms like destroyers. The game also showed that with its range alone, an ASuW-capable Maritime Strike Tomahawk provides BLUE forces with greater flexibility when stationing units. On the other hand, unmanned systems also provide RED with a wider range of options to escalate and test U.S. resolve during phase 1. The study team also found that expeditionary warfare can have a double effect on the sea control fight. The presence of an LHA is a “double threat” to the enemy, acting as both an F-35B platform, and as a means of landing Marines.

Further Research Work on the MDUSV

Future research is required to optimize MDUSV design and to better characterize the human element of MDUSV employment and coordination. While TALONS provides a unique elevated sensor platform, a 150-pound maximum payload will be a considerable constraint. Passive sensors, such as EO/IR, may be mounted on the TALONS platform, but the weight required to house a high-performance radar will be a higher hurdle to overcome. Though this can be mitigated by changing the parasail design to increase lift, this will require more in-depth study of the engineering trade-offs. Also, the process will have to be automated. TALONS testing to-date has involved members of the test team deploying and recovering it.

Though this study was performed with software-driven automata, the tactical decisions leading-up to the placement of MDUSV will be made by humans. The long endurance of MDUSV makes it an ideal platform for deception. Tactical and operational level wargaming may yield insight into the affect that adding MDUSV will have on human decision-making.

As this study was the first SUW simulation of a man-machine teamed force, the scope of the agents explored was purposefully limited. To add to the realism of the experiment, and to explore future tactics, the addition of helicopters and other scout aircraft to the scenario may yield further insight into the design requirements and tactical employment of MDUSV.

MDUSVs in this study were homogenously equipped and shared the same EMCON policy. However, if each MDUSV is given only one capability, such as a particular sensor type or a weapon, their strengths may offset their weaknesses. Grouping several MDUSVs with different mission load-outs may be an alternative to sending a manned multi-mission ship like a DDG. It may also prove to be more resilient to battle damage, as the loss of a single MDUSV would mean the loss of an individual mission, while the mission-kill of a DDG would result in a loss of all combat capability. Further simulation and analysis with LITMUS may yield insights into this trade-off.

Other Examples

Although we have highlighted LT Tanalega’s recent research to demonstrate how the NPS Warfare Analysis group integrates officer’s tactical experience, classroom work, and more detailed research to provide insights in new technologies, tactics, and operational concepts, many other examples can be mentioned. These include tactics to defeat swarms of unmanned combat aerial vehicles, best use of lasers aboard ships, developing tactics to counter maritime special operations insertion, employing expeditionary basing in contested environments, exploration in distributed logistics, best convoy screening tactics against missile-capable submarines, and use of sea bed sensors and systems. Analytical red teaming is also used for sponsors wishing to better understand the resilience and vulnerability of their new systems—employed in the same classes mentioned in this paper. These results are shared with DoD and Navy sponsors interested in getting robust and quantitative assessments of the strengths and weaknesses of their systems.

Although the NPS Warfare Analysis group is pleased to make real-world contributions as part of our students’ education experience, our greatest satisfaction comes from observing the junior officer’s military professional growth that accompanies the application of their newly learned analytical skills. To model and analyze an engagement, a thorough understanding of the tactical factors and performance parameters is necessary. By the end of our students’ experience, they have gained expertise in that mission and in operations analysis—a perfect blend to contribute to our nation’s future force architecture and design.

CAPT Jeff Kline, USN (ret.) is a Professor of Practice in Military Operations Research at the Naval Postgraduate School. He holds the OPNAV N9I Chair of Systems Engineering Analysis and teaches Joint Campaign Analysis, Systems Analysis, and Risk Assessment. [email protected]

Dr. Jeff Appleget is a retired Army Colonel who served as an Artilleryman and Operations Research analyst in his 30-year Army career. He teaches the Wargaming Analysis, Combat Modeling, and Advanced Wargaming Applications courses.  Jeff directs the activities of the NPS Wargaming Activity Hub. He is the Joint Warfare Analysis Center (JWAC) Chair of Applied Operations Research at NPS. [email protected]

Dr. Tom Lucas is a Professor in the Operations Research Department at the Naval Postgraduate School (NPS), joining the Department in 1998. Previously, he worked as a statistician and project leader for six years at RAND and as a systems engineer for 11 years at Hughes Aircraft Company. Dr. Lucas is the Co-Director of the NPS Simulation, Experiments, and Efficient Design (SEED) Center and has advised over 100 graduate theses using simulation and efficient experimental design to explore  a variety of tactical and technical topcs. [email protected]

LT John F. Tanalega is a Navy Surface Warfare Officer from North Las Vegas, Nevada and is a 2011 graduate of the United States Naval Academy His first operational tour was as Auxiliaries and Electrical Officer, and later as First Lieutenant, in USS DEWEY (DDG 105). He next served as Fire Control Officer in USS JOHN PAUL JONES (DDG 53). As an operations analysis student at the Naval Postgraduate School, his research focused on combat modeling, campaign analysis, and analytic wargaming. After graduating from NPS, he reported to the Surface Warfare Officer School (SWOS) in Newport, Rhode Island, in preparation for his next at-sea assignment.

References

1. Sanchez, S.M., T.W. Lucas, P.J. Sanchez, C.J. Nannini, and H. Wong, “Designs for Large-Scale Simulation Experiments with Applications to Defense and Homeland Security,” Design and Analysis of Experiments, volume III, by Hinckleman (ed.), Wiley, 2012, pp. 413-441

2. Kline, J., Hughes, W., and Otte, D., 2010, “Campaign Analysis: An Introductory Review,” Wiley Encyclopedia of Operations Research and Management Science, ed Cochran, J. John Wiley & Sons, Inc

3. Appleget, J., Cameron, F., “Analytical Wargaming on the Rise,” Phalanx, Military Operations Research Society, March 2015, pp 28-32

 4. Appleget, J., Cameron, F., Burks, R., and Kline, J., “Wargaming at the Naval Postgraduate School,” CSIAC Journal, Vol 4, No 3, November 2016 pp 18- 23

5. The Defense Advanced Research Projects Agency (DARPA) has demonstrated a prototype “Sea Hunter”. Information may be found at https://www.darpa.mil/news-events/2018-01-30a

6. For more information on the TALON visit https://www.youtube.com/watch?v=BWEoV88PtTY

7. See Sanchez, ibid.

8. Hughes, W.P., Fleet Tactics and Coastal Combat, 2nd ed, Naval Institute Press, Annapolis, Maryland, 2000.

9. Wagner D.H., Mylander, W.C., Sanders, T.J., Naval Operations Analysis, 3rd ed, Naval Institute Press, Annapolis, Maryland, 1999, pp 109-110.

Featured Image: The Medium Displacement Unmanned Surface Vehicle (MDUSV) (DARPA photo)

Drones in Africa: A Leap Ahead for Maritime Security

By CAPT Chris Rawley and LCDR Cedric Patmon

Technology adoption moves in fits and starts. The developing world cannot be forced into accepting new technology, but it can be enabled, and often in a surprising manner. A recent example is the leap in communications technology. During the 20th Century most of the world developed a robust network of terrestrial-based telecommunications based primarily on the ubiquitous land-line telephone system. Without this infrastructure in place Sub-Saharan African countries were largely left behind at the start of the information revolution. But at the turn of the new century something interesting happened. Rather than retroactively building an archaic phone system Africans embraced mobile phone technology. From 1999 through 2004 the number of mobile subscribers in Africa eclipsed those of other continents, increasing at a rate of 58 percent annually. Asia, the second fastest area of saturation, grew at only 34 percent during that time. The explosive growth of mobile phones and more recently smart phones across practically every African city and village has liberated economies and facilitated the free flow of information. This technology also enabled Africans to lead the world in mobile money payment solutions, bypassing increasingly obsolete banking systems.

Today, Africans have another opportunity to leap ahead in technology to protect one of their most important areas of commerce – their coastal seas. Africa’s maritime economy is absolutely critical to the continent’s growth and prosperity during the next few decades. On the edge of the Eastern Atlantic the Gulf of Guinea is bordered by eight West African nations, and is an extremely important economic driver. More than 450 million Africans derive commercial benefit from this body of water. The region contains 50.4 billion barrels of proven petroleum reserves and has produced up to 5.5 million barrels of oil per day. Additionally, over 90 percent of foreign imports and exports cross the Gulf of Guinea making it the region’s key connector to the global economy.

Favorable demographics and industrious populations put coastal Africans in a position to prosper, but an increase in illegal fishing activities and piracy since the early 2000s has severely impeded this potential. The growth in acts of piracy and armed robbery at sea in the Gulf of Guinea from 2000 onward points to the challenges faced by West African states.

According to Quartz Africa, illegal fishing activities in the region have a negative economic impact of $2-3 billion annually. “Fish stocks are not restricted to national boundaries, and that is why the solutions to end the overfishing of West Africa’s waters can only come from joint efforts between the countries of the region,” Ahmed Diame, Greenpeace’s Africa Oceans campaigner, said in a statement. Marine pollution, human, and narcotics trafficking are also major issues facing the region.

Due to the economic impact of illicit activities in and around West Africa a Summit of the Gulf of Guinea heads of state and government was held in 2013 in Yaoundé, Cameroon. This resulted in the adoption of the Yaoundé Declaration on Gulf of Guinea Security. Two key resolutions contained in the Declaration were the creation of an inter-regional Coordination Centre on Maritime Safety and Security for Central and West Africa, headquartered in Yaoundé, and the implementation of a new Code of Conduct Concerning the Prevention and Repression of Piracy, Armed Robbery Against Ships, and Illegal Maritime Activities in West and Central Africa. Adoption of this agreement has laid the foundation for critical information sharing and resource cooperation that can be used to combat piracy, illegal fishing, and other illicit activities in the Gulf of Guinea.

Though the Code of Conduct established an architecture for maritime security in the region, without enforcement on the water, diplomatic efforts are largely impotent. Key to enforcement is the ability to identify, track, and prosecute nefarious actors on the high seas and in coastal areas. So-called maritime domain awareness is gradually improving in the area, but current options for maritime surveillance are limited. The largest local navies have offshore patrol vessels capable of multi-day over-the-horizon operations, but even these vessels have limited enforcement capacity. Patrol vessels face maintenance issues and fuel scarcity. Shore-based radar systems at best reach out 30 or 40 nautical miles, but are plagued by power and maintenance issues. Moreover, a shore-based radar, even with signals correlated from vessels transmitting on the Automatic Identification System, only provides knowledge that a contact is afloat, not necessarily any evidence to illicit actions.

Latin American navies face similar maritime challenges to those in Africa and have learned that airborne surveillance is simply the best way to locate, track, identify, and classify surface maritime targets involved in illicit or illegal activity. A retired senior naval officer from the region related a study in the Caribbean narcotics transit zone to one of the authors that compared different surveillance mechanisms for the 11,000 square nautical mile area. The probability of detecting a surface target within six hours rose from only five percent with a surface asset to 95 percent when maritime patrol aircraft were included. Only a handful of coastal African countries have fixed-wing maritime patrol aircraft and helicopters, but these aircraft face similar issues to surface assets with fuel costs and mechanical readiness resulting in limited flight time on station.

Drone Solutions to African Maritime Insecurity

Unmanned aerial systems (UAS), or drones, as they are known colloquially, provide a way for African navies and coast guards to greatly enhance maritime security in a relatively inexpensive manner, similar to the ways mobile telephony revolutionized communications on the continent. Similar to the evolution of computing power outlined by Moore’s law tactical UAS are rapidly growing in capabilities while decreasing in cost. Improvements in sensors, endurance, and payload are advancing quickly. For any solution, acquisition cost, maintainability, and infrastructure required are key factors to be considered. The cost per flying hour of most UAS is negligible compared to their manned counterparts. Today’s fixed and rotary-wing systems, whether specifically designed for military use or for commercial applications, can be adapted for surveillance in a maritime environment without much additional cost.

A Falcon UAV unpiloted aircraft is bungee launched in a midday demonstration flight. (© Helge Denker/WWF-Namibia)

Because each country has unique requirements and budgets no single UAS solution is appropriate. Maritime drones can be based ashore or on coastal patrol vessels. One viable option for countries with limited resources involves services contracted by Western Partners, a model which has already been proven in the region for other applications. Alternatively, the Yaoundé Code of Conduct provides a framework for a possible shared model. This agreement can provide the timely sharing of critical information ascertained by maritime surveillance and reconnaissance systems to aid in the enforcement of the maritime laws and agreements in the region. Contractor-operated drones could be allocated across countries by leadership in the five Zones delineated by the Code. Multinational cooperation on maritime security has already been tested in the annual Obangame Express exercise and during real-world counterpiracy operations. Understanding that not all countries have the investment capability to purchase their own stand-alone systems, consideration could be given to sharing the initial investment costs between countries. The logistics of system placement and asset availability would have to be determined by the participating countries themselves but the benefit of such a program would positively impact the entire region economically, enhance interoperability, and assist in regional stability.

Drones are already being operated across Africa by Africans. Zambia recently purchased Hermes 450 unmanned aerial vehicles for counter-poaching operations. There are also African unmanned systems flying surveillance missions over areas plagued by violent extremists groups. UAS are even being used to transport blood and medical supplies across the continent’s vast rural landscapes. Shifting these assets over water is a natural progression. One concern about using UAS is airspace deconfliction. However, this problem is minimized because there is little to no civil aviation in most parts of Africa. Additionally, most maritime UAS would be flying primarily at low altitudes over water from coastal bases.

Conclusion

The leap-ahead capabilities that unmanned surveillance aircraft could provide to coastal security around Africa are clearly evident. African navies with adequate resources should make acquisition of unmanned air systems a priority. Likewise, western foreign military assistance programs should focus on providing contracted or organic unmanned aircraft capabilities.

Captain Rawley, a surface warfare officer, and Lieutenant Commander Patmon, a naval aviator, are assigned to the U.S. Navy’s Sixth Fleet’s Maritime Partnership Program detachment responsible for helping West African countries enhance their maritime security. The opinions in this article are those of the authors alone and do not officially represent the U.S. Navy or any other organization

Featured Image: GULF OF GUINEA (March 26, 2018) A visit board search and seizure team member from the Ghanaian special boat service communicates with his team during a search aboard a target vessel during exercise Obangame Express 2018, March 26. (U.S. Navy photo by Mass Communication Specialist 1st Class Theron J. Godbold/Released)

Why It Is Time For a U.S. Cyber Force

By Dave Schroeder and Travis Howard

The proposal to create a U.S. Space Force has cyber professionals wondering about the government’s national security priorities. While spaceborne threats are very real — some of which cannot be suitably described in a public forum — the threats posed in cyberspace have been all too real for over a decade, and include everything from nuisance hacks by nation-states, to the weaponization of social media, to establishing beachheads on our nation’s electric grid, or the internet routers in your own home.

Since 2009, incremental improvements have been made to the nation’s ability to operate in cyberspace during this period. The establishment of U.S. Cyber Command (USCYBERCOM) — first subordinate to U.S. Strategic Command, and then elevated to a Unified Combatant Command (UCC) — and the formation of the 133 teams that comprise the Cyber Mission Force (CMF) are chief amongst them.

Yet despite all of the money and attention that has been thrown at the “cyber problem” and for all of the increased authorities and appropriations from Congress, the nation’s offensive and defensive cyber capabilities suffer from inefficiency and a lack of a unified approach, slow to non-existent progress in even the most basic of cybersecurity efforts, and a short leash that is inconsistent with the agility of actors and adversaries in cyberspace. Our adversaries continue to attack our diplomatic, information, military, economic, and political systems at speeds never before seen.

The discourse surrounding the formation of a dedicated service for space defense has captured the American imagination, and for good reason. Since World War II, America has shown her ingenuity and innovation, and the success of the U.S. Air Force provides a historical model for how a combat-ready, specialized fighting force can be built around a new warfighting domain. However, a force structure has already taken shape within the U.S. military that would logically translate to its own service, and the operational culture it would both allow and cultivate would greatly enhance the effectiveness of national security.

It is past time to form the U.S. Cyber Force (USCF) as a separate branch of the United States Armed Forces.

America’s Position in Cyberspace is Challenged Daily — but it can be Strengthened

It’s no surprise that a wider breadth of adversaries can do more harm to American interests through cyberspace than through space, and for far less cost. In the aftermath of the 2008 Russo-Georgian War — the cyber “ghosts” of which are still alive and well in 2018 — Bill Woodcock, the research director of the Packet Clearing House observed, “You could fund an entire cyberwarfare campaign for the cost of replacing a tank tread, so you would be foolish not to.”

Deterring and responding to Russian hybrid warfare in cyberspace, countering Chinese cyber theft of U.S. intellectual property, shutting down state and non-state actor attacks, defending American critical infrastructure — including the very machinations of our democracy, such as voting and political discourse and even cyber defense of U.S. space assets are just some of the heavy-lift missions that would occupy a U.S. Cyber Force.

Admiral (retired) Jim Stavridis recently described four ways for the U.S. and allied nations to counter challenges like the weaponization of social media and multifaceted information warfare campaigns on Western democracy: public-private cooperation, better technical defenses, publicly revealing the nature of the attacks (attribution), and debunking information attacks as they happen. A dedicated U.S. Cyber Force, with the proper ways and means to do so, could accomplish all of these things, and be a major stakeholder from day one.

Admiral (ret.) Mike Rogers, former Director, National Security Agency (NSA)/Chief, Central Security Service (CSS) and Commander, USCYBERCOM, in his 2017 testimony before the Senate Armed Services Committee, cautioned against prematurely severing the coupling of cyber operations and intelligence that has been the hallmark of any success the U.S. has thus far enjoyed in cyberspace. General Paul Nakasone, the current DIRNSA/CHCSS and Commander, USCYBERCOM, made the same recommendation in August 2018. Despite increased resourcing of USCYBERCOM by both Congress and the Executive Branch, operational authorities in cyberspace are hamstrung by concerns about blending Title 10 military operations with Title 50 intelligence activities, along with negative public perception of the NSA. The relationship between USCYBERCOM and NSA requires a complicated (and classified) explanation, but blending cyber operations with rapid, fused intelligence is vital, and go hand-in-hand — to separate them completely would be to take the leash that already exists around USCYBERCOM’s neck and tie their hands with it as well. Offensive and defensive operations in cyberspace are two sides of the same coin — and intelligence is the alloy between them. Standing up a U.S. Cyber Force would also enable a deliberate re-imagining of this unique symbiosis, and a chance to — very carefully — lay out lines of authority, accountability, and oversight, to both prevent overreach and justifiably earn public trust.

The above challenges could be addressed in part by refining the existing structures and processes, but the real sticking point in USCYBERCOM’s sustainment of fully operational cyber forces lies in how we build forces ready to be employed. Force generation of the CMF through the various armed services’ manning, training, and equipping (MT&E) their own cyber warriors is an inefficient and weak model to sustain a combat ready force in this highly-specialized and fast-moving mission area.

Cyber resources play second-fiddle to service-specific domain resourcing; for example, the Department of the Navy has an existential imperative to resource the maritime domain such as shipbuilding and warplanes, especially during a time of great power competition. The cyber mission is secondary at best, and that’s not the Navy’s fault. It just simply isn’t what the Navy is built or tasked to do. This same reality exists for our other military services. Cyber will always be synergistic and a force multiplier within and across all domains, necessitating the need for the services to retain their existing internal cyber operations efforts, but feeding the joint CMF is ultimately unsustainable: the CMF must sustain itself.

The Cyber Force is Already Taking Shape

USCYBERCOM, NSA, the 133 teams comprising Cyber Mission Force — are approaching full operational capability in 2019 — and the operational and strategic doctrine they have collectively developed can now more easily transition to a separate service construct that more fully realizes their potential within the joint force. There is a strong correlation here with how the U.S. Army Air Force became the U.S. Air Force, with strong support in Congress and the approval of President Truman. The DoD has begun revising civilian leadership and building upon cyber subject matter expertise, as well, with the creation of the Principal Cyber Advisor (PCA) to the Secretary of Defense — a position that Congress not only agreed with but strengthened in the Fiscal Year 2017 National Defense Authorization Act. Such a position, and his or her staff, could transition to a Secretary of the Cyber Force.

The footprint would be small, and room in Washington would need to be carved out for it, but the beginnings are already there. Cyber “culture” — recruiting, retention, and operations — as well as service authorities (blending Title 10 and Title 50 smartly, not the blurry “Title 60” joked about in Beltway intelligence circles) would all benefit from the Cyber Force becoming its own service branch.

Perhaps one of the greatest benefits of a separate cyber branch of the armed forces is the disruptive innovation that would be allowed to flourish beyond the DoD’s traditional model of incremental improvement and glacial acquisition. The cyber domain, in particular, requires constant reinvention of techniques, tools, and skillsets to stay at the cutting edge. In the early 2000s, operating in a cyber-secure environment was thought to mean a restrictive firewall policy coupled with client-based anti-virus software. In 2018, we are developing human-machine teaming techniques that blend automation and smart notifications to fight and learn at machine speed. Likewise, the traditional acquisition cycle of military equipment, often taking 4-6 years before prototyping, just doesn’t fit in the cyber domain.

In short, the “cyber culture” is an incubator for innovation and disruptive thinking, and there are professionals chomping at the bit for the chance to be a part of a team that comes up with new ideas to break norms. A dedicated acquisition agency for cyber would be an incubator for baked-in cybersecurity controls and techniques across the entire DoD acquisition community. The Defense Innovation Unit (DIU) — recently shedding its Experimental “x” — is proving that something as simple as colocation with innovation hubs like California’s Silicon Valley and Austin, Texas, and a willingness to openly engage these partners, can deliver innovative outcomes on cyber acquisition and much more. Similarly, the Cyber Force must be free to exist where cyber innovation lives and thrives. 

Creating the USCF has other benefits that would be felt throughout the military. The Army, Navy, Marines, and Air Force, relieved of the burden of feeding the offensive and national CMF and paying their share of the joint-force cyber bill, can better focus on their core warfighting domains. This doesn’t absolve them of the need for cybersecurity at all levels of acquisition, but a USCF can be an even greater advocate and force-multiplier for DoD cybersecurity efforts. Services can and should retain their service-specific Cyber Protection Teams (CPTs), which could be manned, trained, equipped, and tactically assigned to their service but also maintain ties into the USCF for operations, intelligence, and reachback. Smart policies and a unity of effort can pay big dividends here, as the services would naturally look to such an organization as the resident experts.

Extreme Challenges with Existing Forces

Much has been made of the extensive difficulties faced by our military services for the recruiting and retention of cyber expertise in uniform. Brig. Gen. Joseph McGee, Deputy Commanding General (Operations), Army Cyber Command (ARCYBER), described an example in which a talented cyber prospect “realized he’d make about the same as a first lieutenant as he would in a part-time job at Dell.” Examples like this are repeated over and over from entry-level to senior positions, and everything in between, on issues from pay to culture. In the military, being a cyber expert is like being a fish out of water.

The service cyber and personnel chiefs have made a clear case before the Armed Services Committees of both houses of Congress for the urgent need for flexibility on issues such as rank and career path for cyber experts specifically. Cyber needs were repeatedly cited as the rationale for the need for changes to restrictive military personnel laws. Many of these items were indeed addressed in the Fiscal Year 2019 (FY19) National Defense Authorization Act (NDAA), with provisions which may now be implemented by each service in what is hailed as the biggest overhaul to the military personnel system in decades:

  • Allow O-2 to O-6 to serve up to 40 years without promotions, or continue service members in these grades if not selected for promotion at a statutory board
  • Ability for service members to not be considered at promotion boards “with service secretary approval” — for instance, to stay in “hands on keyboard” roles
  • No need to meet 20 years creditable service by age 62 for new accessions (no need for age limit or age waiver above 42 years old for direct commissions)
  • Direct commissions or temporary promotion up to O-6 for critical cyber skills

But even these provisions do not go far enough, and the services are not obligated to implement them. When the challenges of pay, accessions at higher rank, physical fitness, or military standards in other areas come up, invariably some common questions are raised.

A common question is why don’t we focus on using civilians or contractors? In the case of naval officers, why don’t we make them Staff Corps (instead of Restricted Line), like doctors and lawyers who perform specialized functions but need “rank for pay” and/or “rank for status?” What about enlisted specialists versus commissioned officers?

The answer to the first question is easy in that we do use civilians and contractors across the military, extensively. The reason this is a problem is that we also need the expertise in uniform, for the same legal and authorities reasons we don’t use civilians or contractors to drive ships, lead troops, launch missiles, fly planes, and conduct raids.

As for making them Staff Corps officers or equivalent in the other services, the Navy, for instance, has been talking about going the other direction: making officers in the Navy Information Warfare community designators (18XX) unrestricted line, instead of restricted line, like their warfare counterparts, or doing away with the unrestricted line vs. restricted line distinction altogether. This is a matter of protracted debate, but the reality is that some activities, like offensive cyberspace operations (OCO) and electronic attack (EA), are already considered forms of fires under Title 10 right now — thus requiring the requisite presence of commissioned officers responsible and accountable for the employment of these capabilities. The employment of OCO creates military effects for the commander, and may someday be not just a supporting effort, or even a main effort, but the only effort, in a military operation.  

Under the Navy’s Information Warfare Commander Afloat Concept, for the first time the Information Warfare Commander of a Carrier Strike Group, the Navy’s chief mechanism for projecting power, can be a 18XX Officer instead of a URL Officer. If anything, we’re shifting more toward URL, or “URL-like”, and the reality of the information realm as a warfighting domain is only becoming more true as time goes on, if not already true as it stands today.

So what about our enlisted members? They’re doing the work. Right now. And the brightest among them are often leaving for greener pastures. But still for reasons of authorities, we still need commissioned officers who are themselves cyber leaders, subject matter experts, and practitioners.

None of this is to say that direct commissioning of individuals with no prior service as officers up to O-6 is the only solution, or that it would not create new problems as it solves others. But these problems and all of the concerns about culture shock and discord in the ranks can also be solved with a distinct U.S. Cyber Force which accesses, promotes, and creates career paths for its officers as needed to carry out its missions, using the full scope of flexibility and personnel authority now granted in the FY19 NDAA.

Another major challenge is the lack of utilization of our reserve components. Many members of our reserve force have multiple graduate degrees and 10-15 years or more of experience, usually in management and leadership roles, in information technology and cybersecurity. We have individuals in GS/GG-14/15 or equivalent contractor and other positions, who are doing this work, every day, across the Department of Defense (DOD), the Intelligence Community (IC), academia, and industry.

Yet reservists are currently accessed at O-1 (O-2 under a new ARCYBER program), need to spend 3-5 years in training before they are even qualified to mobilize, or for the active components to use in virtually any operational or active duty capacity. And that’s after doing usually a year or more of non-mobilization active duty, for which nearly all employers don’t give differential pay because of existing employment policies, including in federal GS/GG positions.

We have very limited mechanisms and funding sources to even put reservists on active duty at NSA or USCYBERCOM, where our service cyber leadership repeatedly states we need people the most. And in the rare instances we manage to put people on some type of active duty in a cyber role in their area of expertise, it often is not a “mobilization” under the law — which means a person is now an O-2 or O-3, and with that “level” of perceived authority and experience to those around them. And they often just left their civilian job where they are recognized as a leader and expert — and easily make $200k a year.

National Security Operations Center (NSOC) c. 1985 — National Cryptologic Museum

Most people appreciate that you can’t just magically appear as an O-6, and have the same depth, breadth, and subtlety of experience and knowledge as a O-6 with 25 years in uniform. Yet these O-6s, as well as general and flag officers, routinely retire and assume senior leadership positions in all manner of public and private civilian organizations where “they don’t know the culture” — because they’re leaders.

So while a person off the street doesn’t have the same level of understanding of the military culture, it’s incorrect to say they can’t innovate and lead on cyber matters — to include in uniform as a commissioned officer. We’re not so special to imply that you can’t lead people and do the critical work of our nation, in uniform, unless you’ve “put in your time” in a rigid career path. It’s time to change our thinking, and to establish a military service to support the realities of that shift.

Recommendations

The call for a dedicated cyber branch of the U.S. Armed Forces is not new. Admiral (ret.) Jim Stavridis and Mr. David Weinstein argued for it quite passionately in 2014, calling on national leaders to embrace cyber innovation and imploring us to “not wait 20 years to realize it.” Great strides have been made in the four years since that argument was made, and we are closer than ever to realizing this vision. It will take a focused effort by Congress and the president to make this happen, as it did with the U.S. Army Air Forces becoming the U.S. Air Force in 1947. A tall order, perhaps, in today’s political environment, but not impossible, especially given the desire to compromise on issues of national defense and when both Republicans and Democrats alike are seeking wins in this column.

To summarize: the threat is eating our lunch, USCYBERCOM and the CMF are nearly ready to transition to their own service branch, and the benefits of doing so are numerous:

  • Sensible use of resources spent on cyberspace operations
  • An incubator of disruptive and rapid innovation in the cyber domain
  • Improved oversight and accountability by policy and under U.S. Code
  • More efficient and sustainable force generation and talent retention
  • Better alignment of service-specific core competencies across all warfighting domains
  • Synergy with a unified space commander (such as cyber protection of satellite constellations)

The United States House of Representatives recently ordered the Government Accountability Office (GAO) to begin an assessment on DoD cyberspace operations as part of the FY19 NDAA. This study, due to Congress in 2019, should prove enlightening and may become a foundational effort that could be built upon to explore the feasibility of establishing the U.S. Cyber Force as a new branch of the Armed Forces. Congress could order this as soon as FY21, with the Cyber Force fully established by the mid-2020s (blazingly fast by federal government standards, but no faster than the proposed Space Force).

Conclusion

The President has also now relaxed rules around offensive cyberspace operations, perceiving the urgent need to respond more quickly to cyber threats and cyber warfare directed at the United States. We have a great stepping stone in USCYBERCOM, but with no plans to take it to the next step, even a dedicated combatant commander for the cyber domain will face challenges with the above issues for the duration of its lifespan. Similar to how we are just becoming aware of space as a distinct warfighting domain, cyber has already been a warfighting domain since the beginning of the 21st century. The time for a U.S. Cyber Force is now. The threat in cyberspace, and our underwhelming response to it thus far, cannot wait.

Travis Howard is an active duty Navy Information Professional Officer. He holds advanced degrees and certifications in cybersecurity policy and business administration, and has over 18 years of enlisted and commissioned experience in surface and information warfare, information systems, and cybersecurity. Connect with him on LinkedIn.

Dave Schroeder served as a Navy Cryptologic Warfare Officer and Navy Space Cadre, and is Program Manager for IWCsync. He serves as a senior strategist and cyber subject matter expert at the University of Wisconsin–Madison. He holds master’s degrees in cybersecurity policy and information warfare, and is a graduate of the Naval War College and Naval Postgraduate School. Find him on Twitter or LinkedIn.

The views expressed here are solely those of the author and do not necessarily reflect those of the Department of the Navy, Department of Defense, the United States Government, or the University of Wisconsin–Madison.

Featured Image:  National Security Operations Center floor at the National Security Agency in 2012 (Wikimedia Commons)