Category Archives: Global Analysis

A Geographical Breakdown of What’s Going on in the World

A Personal Theory of Strategy

This essay by Nick Prime is part of the Personal Theories of Power series, a joint BridgeCIMSEC project which asked a group of national security professionals to provide their theory of power and its application. We hope this launches a long and insightful debate that may one day shape policy.

“The primary aim of the strategist in the conduct of war is some selected degree of control of the enemy for the strategist’s own purpose; this is achieved by control of the patterns of war; and this control of the pattern of war is had by manipulation of the center of gravity of war to the advantage of the strategist and the disadvantage of the opponent.”[i]

This theory of control, whereby the aim of war is some measure of control over the enemy, and the achievement of this degree of control is the purpose of strategy, was most cogently expressed by Admiral J.C. Wylie. Its origins however date back to the early 1950s. When Wylie, along with Admiral Henry Eccles and German-American historian Dr. Herbert Rosinski, developed a general theory of strategy around this central concept of ‘control’. While each of the three men’s conceptions of this theory reflected variances in nuance and expression. All three sought to understand the interplay between politics, power, and control. The focus herein will be on the value of this theory as a means to understand strategy as something which exists and is practiced both in the physical and cognitive domains.

Understanding the Terms

A half century ago Wylie remarked that the study of strategy lacked a clear and consistent vocabulary, a statement that is as true today as it was then.[ii] In addition to the many definitions of strategy itself, there are as yet no established definitions for the terms and concepts which serve as the foundational elements for our understanding of strategy. It is important then to provide, in brief, a working conception of these terms so that their interplay can be shown in each domain.

Perhaps the most simple and practical definition of politics is that provided by Harold Lasswell who defined it as “the way people decide who gets what, when, where, how, and why”.[iii] Here we see the first unstated but unmistakable emphasis on choice as critical to understanding the concept. Another unstated but clear emphasis is on the role of authority, a crucial element in the practice of politics. As Lawrence Freedman has noted there is a critical interplay between power and authority, with a great deal of debate being had as to whether the two concepts are exclusive or extensions of each other.[iv] Freedman’s discussion of power in a strategic sense (what he dubs ‘strategic power’) also emphasizes a duality between physical and cognitive. Though he makes clear distinctions between the physical expression as force (or the capability to use force) and the cognitive expression, what he sees as its perception in the mind of the ‘target’ or ‘beholder’. While his focus on strategic power is largely on ‘coercive capacity’ the important term there is capacity.

Wylie saw politics as “the allocation, use, transfer of power” a conception which echoes both the interplay between power and authority, while also reflecting an emphasis on capacity.[v] Power then could perhaps best be thought of as energy, capable of existing in various forms such as watts of electrical charge or calories of food. Politics then is the means by which the power of a group, institution, or nation state is marshalled, allotted, and/or directed. Strategy then should be viewed as the mechanism by which the capacity (power) created through politics, is applied towards the aim of a given policy. The assertion of authority or more appropriately, control. Herein lies the subtle but distinct difference between Freedman’s conception of strategy and that of Wylie, Eccles and Rosinski. Freedman defines strategy as “the art of creating power to obtain maximum political objectives using available military means.”

Rosinski, whose understanding of strategy resembles that previously quoted by Wylie, defined strategy as the comprehensive direction of (military) power, applied through tactics, for the purpose of control.[vi] The difference between Freedman’s theory and the control theory is subtle but significant. By placing the emphasis on strategy’s purpose as being (some measure of) control, they are focusing on the application of power, in contrast to Freedman’s focus on the creation of power.

Control as Cognitive & Physical

In developing their theories of strategy both Wylie and Rosinski placed the bulk of their emphasis on control in the physical domain or ‘field of action’. As the intention was to establish control as a general theory of strategy, it was critical that theory bear equal relevance to each of the commonly identified ‘domains’ of conflict (land, sea, and air). In each of the respective domains the relevance and contribution towards control was measured when contrasted against destruction. The importance of this distinction is simple but significant. Destruction serves strategy only insofar as it contributes towards the achievement of control.

Implied in this emphasis on control, as opposed to an emphasis on destruction, is the focus on economy of force. By limiting the destruction and focusing it towards asserting a ‘selected degree’ of control over ‘key centers of gravity’ and/or ‘lines of communication’, control seeks to solve the challenge posed by strategy in the most economical means possible.[vii] Many theories of strategy lack this critical balancing. Favouring an emphasis on destruction, which can and often does become counterproductive. Strategies premised first on destruction emphasize as the primary means the use of (or through coercion, the threat to use) force. These strategies fail to account for the myriad of other means through which some measure of control, or contributions toward it, can be achieved. Such as political or economic pressures which can contribute towards control, adding to coercion, while curbing destruction only to that which is necessary. As Lukas Milevski noted, “control and coercion run along a single set of tracks: only the living can be threatened and consequently controlled, but they can only be so if, due to the expected cost or due to fear, the choice of continuing is less palatable than that of accommodating.”[viii]

Wylie and Eccles also provide valuable and insightful observations on the cognitive aspects of control. For Wylie, the manipulation of the physical centers of gravity would, through its effect on the “equilibrium” of the conflict, effect the “critical decisions” of the adversary.[ix] According to Rosinski, strategy became a means of control by taking “into account the multitude of possible enemy counteractions.”[x] Eccles, in expanding on the point made by Rosinski, stressed the importance of a clear understanding of both the strategist’s own objectives and those of his adversary. He viewed this as crucial to the holistic formation of sound strategic action. Understanding that objectives (both the strategist’s own, and those of his adversary) were a critical expression of both the actions and choices, which one had to control through strategy.[xi]

This emphasis on choice is critical, as Wylie noted, with respect to deterrence-based strategies predicated on the threat to use force. As the coercive effect of this threat to use force is itself a degree of control.[xii] The ability to control by dictating, limiting, or removing the choices of the opponent, is then implicit in the cognitive side of the control theory.

Why It Matters

There is a great deal of value to be derived from understanding this control theory of strategy. This understanding of the control theory allows the strategist to perceive, under the same conceptual framework. Both those physical strategies which utilize and rely on the direct application of force and destruction, to achieve the desired political ends. As well as those strategies of coercion and deterrence, reliant upon other measures to achieve that selected degree of control required for the desired ends of policy. Violence is inherent in the nature of war, but not in the nature of strategy (broadly defined), and certainly not in the nature of conflict.

The character of contemporary conflicts whether diplomatic or political, as illustrated by recent events in both the South China Sea and the Ukraine, has shown that power can be created and the aims of policy can be achieved through more than the simple application of force. In this regard a framework that applies the same understanding of strategy to achieve a policy through brinkmanship, economic coercion, or the use of military force, is of significant utility.


[i] J.C. Wylie, Military Strategy: A General Theory of Power Control (Annapolis, 1989), 77-78.

[ii] Wylie, Military Strategy, 11.

[iii] H. Lasswell, Politics: Who gets what, when and how? (New York, 1958)

[iv] L. Freedman, ‘Strategic Studies and the Problem of Power’ in T. Mahnken & J. Maiolo ed., Strategic Studies: A Reader, (New York, 2014), 13.

[v] Wylie, Military Strategy, 90.

[vi] H. Rosinski, ‘The Structures of Military Strategy’ (1956), 18-19

[vii] Wylie, Military Strategy, 77-78; H. Rosinski, ‘New Thoughts on Strategy’ (1955), 2.

[viii] L. Milevski, ‘Revisiting J.C. Wylie’s Dichotomy of Strategy: The Effects of Sequential and Cumulative Patterns of Operations’, Journal of Strategy Studies, 35:2 (2012), 231.

[ix] Wylie, Military Strategy, 75-76.

[x] H. Rosinski, ‘New Thoughts on Strategy’ (1955)

[xi] H.E. Eccles, Logistics in the National Defense (Newport, 1997), 25-27; H.E. Eccles, Military Concepts and Philosophy (New Brunswick, 1965), 51.

[xii] Wylie, Military Strategy, 88.

Amphibious Power: A Personal Theory of Power

This essay is part of the Personal Theories of Power series, which asked a group of national security professionals to provide their theory of power and its application. We hope this launches a long and insightful debate that may one day shape policy.

The two giants of sea power theory, Alfred Thayer Mahan and Sir Julian Corbett, both touched on amphibious operations but both are properly considered sea power theorists. Mahan disliked amphibious operations, declaring that they were “harder to sustain than to make.” He judged them dangerous to those forces extended ashore and that this danger outweighed their potential benefit. In Mahan’s cost-benefit analysis of amphibious operations, they were a waste of resources. Mahan viewed the sea power side of the equation as decisive.

Corbett, however, was more of a fan. Corbett thought that naval forces could rarely be decisive on their own and thus need the ability to project land forces ashore to achieve a decision. But, amphibious forces are dependent on naval forces for protection from enemy naval forces, supply and sustainment, and fire support. For Corbett, the land power side of the equation is decisive.

A little known theorist came down right in the middle. Lieutenant Colonel Earl “Pete” Ellis, USMC, wrote about naval and amphibious strategy in the early 20th Century, including the Marine Corps’ contribution to War Plan Orange, Advanced Base Operations in Micronesia. Ellis viewed amphibious power as a symbiotic relationship between land and sea power. Expeditionary land forces are dependent on naval forces for the necessary sea control, transport, sustainment, and fire support. Naval forces are dependent on those land forces to secure key littoral terrain for protection and to secure forward supply bases. In the course of this analysis, he identified the need for specialized, task-organized amphibious forces that could fill this niche, especially since amphibious assaults were becoming far more difficult in the face of modern artillery and machine guns. Since the focus of all of his writings was on those amphibious forces and their uses, he is perhaps the only amphibious power theorist in history. For Ellis, the mutually reinforcing symbiosis of land and sea power was decisive. He was proved correct during World War II: the US Navy could not strike at the heart of the Imperial Japan without seizing lodgments across the Pacific and Marine and Army forces could not seize those lodgments without Navy transportation, support, and sea control.

In Colin S. Gray’s Theory of War Taxonomy, this theory of amphibious power falls into a category along with Mahan, Douhet, and Schelling. It is clearly not a general theory nor is it a general theory of a domain as it exists at the confluence of land, sea, and air. It does explain “how a particular kind or use of a military power strategically affects the course of conflict as a whole.” A brief look at history illuminates this point.

The Influence of Amphibious Power on History

A few examples from history suffice to illustrate the timeless nature of amphibious power. The first occurred early in the Peloponnesian War. Sparta began the war dominant on land, while Athens was dominant at sea. While Spartan land power allowed her to ravage the fields before Athens herself, Athenian fleets plied the waters of the Mediterranean. In 425 BC, Thucydides landed a fleet at Pylos in Spartan-controlled territory. The fighting that occurred at Pylos and the offshore island of Sphacteria eventually led to the defeat and capture of about 300 Spartan hoplites by Athenian expeditionary forces. Land power and sea control did not lead directly to strategic effect, but the use of sea power to project land power to defeat and capture Spartan hoplites shocked the Greek world and led directly to the Peace of Nicias. The Athenians subsequently botched the peace and thus squandered the strategic effect garnered, but they would not have had the opportunity at all if not for the use of amphibious power.

The second example occurred during the Second Punic War. The sea control of the Mediterranean gained by the Romans after the First Punic War had profound strategic effects: it force Hannibal into a difficult march through the Alps which depleted the combat power he was able to bring to Italy and prevented significant reinforcement once he had gained a lodgment in Italy. His eventual defeat there, however, failed to end the war with Carthage. It was not until Scipio used sea control to project Roman land power across the sea to Carthage itself that decisive effects occurred and Carthage surrendered.

During the American Civil War, Union forces secured sea control early on and held it throughout the war as part of the Anaconda Plan. While the Anaconda Plan certainly produced strategic effects that choked the Confederacy off from reliable and consistent sources of supply, it did not have decisive effects by itself. In this case, amphibious power would not have decisive effects but the tactical level is interesting. Union General Ambrose Burnside was an amphibious visionary. As a Brigadier General, he formed an expeditionary force and developed radically new ship-to-shore tactics which allowed him to seize virtually all of coastal North Carolina for the Union.

Another waypoint in the history of amphibious operations occurred in 1915. During the Gallipoli campaign, British forces attempted to seize control of the Dardanelles from the Turks, allied with Germany. While the attempt failed, it is easy to see what kind of strategic effects victory could have produced. If British and French forces seize the Dardanelles, control of Constantinople could have easily followed, knocking Turkey out of the war entirely. Additionally, control of the Dardanelles would have allowed supplies from the Western allies to flow to the Eastern front, shoring up their Russian allies. The British and French had the sea power and the land power, but using both as amphibious power had great potential, if unrealized.

Lastly, World War II proved to be a high water mark for amphibious operations. In the Western theater, the Allies also largely secured sea control while Germany dominated the continent. That sea control granted the allies the ability to project power ashore in Africa, Italy, and eventually in France. In the Pacific Theater, the entire Allied strategy depended on amphibious power. A measure of sea control was gained by the U.S. after the battle of Midway, but amphibious power was necessary to secure lodgments to allow the U.S. to project force across the Pacific Ocean. That sea control had to be translated into force projection ashore at dozens of islands, producing a credible threat of an amphibious assault on Japan herself and the ability to use air power to strike Japanese soil.

Conclusions from Theory and Praxis

Sea power can enable land power, land power can enable sea power, and the projection of power ashore is now dependent on air power. The fusion of all of these capabilities is amphibious power.

Specialized troops are needed to wield credible and effective amphibious power. Burnside’s pick-up team of amphibious soldiers ran into daunting tactical problems in North Carolina. While U.S. Army troops drew on Marine tactics in the European theater, hard lessons had to be learned in North Africa and at Anzio and Salerno.

Despite the need for specialized troops to effectively conduct amphibious operations, amphibious operations are never solely the interest of marines. Navy forces and air support are essential to success and must train to the unique problems associated with projecting land power ashore. Armies are also concerned with amphibious operations. In a large scale conflict, there will not be enough Marines to conduct every assault. While the U.S. Army famously conducted more amphibious operations than the U.S. Marine Corps during World War II, they did so using doctrine developed by the Marines and capabilities already resident in the Navy.

Strategic Effects

There are numerous tactical lessons that can be learned from history as well. James Wolfe’s campaign in Quebec during the Seven Years War is illustrative as is MacArthur’s master stroke at Inchon in 1950. Both battles achieved far reaching strategic effects. Amphibious power provides options to the side that has it, and the mere threat of amphibious forces the opponent to expend resources to defend against it, constraining his options. During the Gulf War, U.S. Marine forces aboard ship in the Persian Gulf forced Iraqi forces to station seven infantry divisions along the Iraqi coast to prevent a landing, depleting their combat power in Kuwait. Amphibious power, in and of itself, will rarely be directly decisive at the strategic level. It does, however, indirectly contribute to strategic effects because of the options it grants to the joint force. It is usually necessary to establish beachheads through which ground forces can flow, it can extend the range and reach of air forces, and can control littoral chokepoints to ensure the safety of naval forces. Additionally, amphibious power forces the enemy to defend their shores everywhere an amphibious assault is possible, consuming their resources and tying down combat power. Shifting defenders from one shore to another simply opens up another opportunity for a successful assault. Thus, a theory of amphibious power explains how that particular capability can affect the course of conflicts.

Cyber Power: A Personal Theory of Power

This essay by Billy Pope is part of the Personal Theories of Power series, a joint BridgeCIMSEC project which asked a group of national security professionals to provide their theory of power and its application. We hope this launches a long and insightful debate that may one day shape policy.

Cyberspace is enabling new forms of communication, influence, awareness, and power for people around the world. Families use cyberspace to communicate face-to-face over great distances. Financial institutions execute global business and commodity trades at the speed of light through the cyberspace domain. The world’s citizens are granted unprecedented access to information, facilitating more awareness and understanding than at any time in history. Yet the same cooperative domain that fosters so much good for mankind also offers a tremendous source of power. The antithesis of the mutually beneficial electronic environment is a cyberspace where competition and fear overshadow collaboration. This conundrum, however, is not new. Hobbes, in his fundamental law of nature, warns, “That every man, ought to endeavour Peace, as farre as he has hope of obtaining it; and when he cannot obtain it, that he may seek, and use, all helps and advantages of Warre.”[i] Cyberspace will continue to civilize. As the domain matures, however, so too will the forces that aim to use the cyberspace domain to project power.

Hobbes’ Leviathan





Before diving into the concept of cyber power, one must first frame the term power itself. Power, in its most basic form equates to might: the ability to compel a person or group to acquiesce through force. Thucydides captured this concept in his artful depiction of the Melian Dialog, penning the famous phrase, “the strong do what they can and the weak suffer what they must.”[ii] Hobbes, too, warned that power possessed is power to be used, suggesting every man lives in a state of constant competition with every other man.[iii] In this way, power is the ultimate arbiter, framing both what a man can do and what he should do in the same breath.

The close cousin to might is coercion. Thomas Schelling suggests “Coercion requires finding a bargain, arranging for him to be better off doing what we want — worse off not doing what we want — when he takes the threatened penalty into account.”[iv] Unlike a strategy centered on might, coercion requires insight. Military strategists and theorists who emerged from the Cold War coalesced around a single basic tenet of coercion: one must attempt to thoroughly understand an adversary before coercion can succeed.[v] Hearkening Sun Tzu’s notion that one must “know the enemy,” this community of great minds suggests in-depth analysis helps determine the bargaining chips in the coercion chess match.[vi]

Coercion is not limited to massive Cold War-styled conflicts. Non-state actors and other asymmetric threats may also be influenced through coercive strategies. Emile Simpson, in his book War From the Ground Up, infuses current counterinsurgency strategies with Aristotle’s concepts of logos, ethos, and pathos to distill the concepts of modern coercion.[vii] Simpson argues the vital importance of information as a source of power. He suggests the very definition of success in asymmetric conflicts is framed by one’s ability to compel an adversary to accept an imposed strategic narrative. Simpson writes, “In this sense, success or failure in war are perceived states in the minds of one’s intended audience.”[viii] In wars where annihilation cannot even be considered as a feasible strategy, one must win with ideas. Coercion offers a framework of thought that centers on this very approach.

Artist’s depiction of cyberspace, Feb 2011 via Cameroon’s Ministry of Defense





Why focus so much of an essay on cyber power theory to a lengthy discussion on traditional forms of power? Quite simply, cyber power is still just power at its core. Cyber power will not change the nature of war. Cyber power, at least in the foreseeable future, will not reorganize the international consortium of states, leaving the Westphalian system to flounder in a new electronic world order. Cyber power offers tremendous opportunities to enhance how people interact, cooperate, and even fight. It does not, however, make traditional forms of power obsolete.

Overzealous futurists exuberantly claim that cyber power is a game changer, saying things like, “Cyber war is real; it happens at the speed of light; it is global; it skips the battlefield; and, it has already begun.”[ix] The attuned strategist will peer through the chafe, realizing that cyber power offers new, innovative methods by which to project power. The same savvy practitioner will also appreciate that power and conflict are grounded in basic human requirements, psychology, and relationships. Neither Thucydides’ realist notions of fear, honor, and interests, nor Keohane’s collaborative concepts of cooperation and interconnectedness were developed with cyberspace in mind.[x] Cyberspace, and in turn any notion of cyber power, however, contains these concepts in troves.

What, then, is cyber power specifically? This author argues it takes two forms. First, cyber power extends and accentuates existing forms of military power. It helps shape the battlefield through intelligence collection and information operations. In some cases it facilitates military effects that were previously only achievable through kinetic means. Second, cyber power is a unique political instrument. Most military professionals are all too familiar with the elements of national power marched out during professional education courses: diplomatic, informational, military, and economic. Cyber power connects to each of these components but also offers new options. Stronger than diplomacy and sanctions, yet not to the level of Clausewitzean war, cyber power expands the spectrum of power projection available to policy-makers.

The Aviationist, March 2013





In its militaristic form, cyber power has proven its worth as an accoutrement to traditional military engagements. Two historical examples of air power employment serve as cases in point. When the United States repelled Iraq’s invasion of Kuwait in 1991, the American Air Force disabled Iraq’s integrated air defense system by permanently destroying radar sites, anti-aircraft systems, and electrical switching stations.[xi] In 2007, the Israeli Air Force penetrated Syrian airspace en route to an alleged nuclear reactor at Dier-ez-Zor. Israeli pilots simply flew past Syria’s air defense systems undetected. While Israeli officials have never confirmed the details of this operation, it is widely accepted that a cyber attack blinded the air defense systems, achieving the desired effect, while preserving the systems and their associated personnel from physical destruction.[xii] By producing military effects, cyber power enhances more traditionally understood forms of power in terms of might and projection.

The second framework of cyber power, however, places more emphasis on the combination of interdependence and leverage than military might. In this way, the concept of coercion again takes center stage. The United States serves as an appropriate case study. America is the most technologically advanced nation on Earth. The U.S., after all, invented the Internet and gave rise to the framework for cyberspace. Until very recently, the United States maintained control over the mechanisms that form the central nervous system of the Internet and its interdependent connections.[xiii] This outright advantage, however, also translates into a serious vulnerability. The U.S. and other similarly connected nations are more dependent on cyberspace for normal societal functions like banking, municipal utilities, and interstate commerce.

Prominent powers are incentivized to exercise cyber power to achieve political effects while attempting to limit vulnerabilities to the same types of actions. Largely non-lethal and quite influential against nations that find themselves dependent upon the domain, cyber power offers attractive options. Some states will attempt more cooperative approaches to limit vulnerability, as Keohane’s post-hegemonic theoretical approach would suggest. At a minimum, capable entities will communicate their abilities to exert influence in the cyber domain to influence the strategic narrative Emile Simpson so aptly describes. The ability to project power in the cyber domain becomes an important source of influence alongside economic, military, informational, and diplomatic leverage. It is in this grand-strategic purview that cyber power holds the most potential.

The difference between these two aspects of cyber power is both strategic and philosophical. In the militaristic sense, cyber might conjures a Clausewitzean approach where engagements form the foundation of strategy and digital blood is the price of victory.[xiv] A strategy centered on coercion, leverage, and dependence, however, falls into the realm of Sun Tzu and Liddell Hart where perfect strategies involve very little actual confrontation on the way to achieving political objectives.[xv] Familiar in concept yet quite novel in execution, these two methods produce power where none previously existed. Both approaches, however, must be considered as parts of a greater whole that includes the full spectrum of power and political will. Cyber power is poignant and increasingly relevant, but it is not sufficient in and of itself.

While some soothsayers predict cyberspace will reshape the global landscape and the power structures that govern it, this author suggests otherwise. So long as people depend on the physical domains of air, land, and sea for basic survival needs, the physical powers used to protect these domains will remain relevant. That is not to say, however, that cyber power is flaccid. Nations that depend on cyberspace can be held at risk through the exploitation of cyber power for political effects. Whether through direct engagement or a more indirect approach, cyber power is capable of swaying political decisions in the same way others sources of power influence policy. Cyber power is a force to consider as military leaders and statesmen alike contemplate all dimensions of national power.


[i] Thomas Hobbes, Leviathan, Rev. student ed, Cambridge Texts in the History of Political Thought (Cambridge ; New York: Cambridge University Press, 1996), 92.

[ii] Thucydides, History of the Peloponnesian War, [Rev. ed, The Penguin Classics (Harmondsworth, Eng., Baltimore]: Penguin Books, 1972), 406.

[iii] Hobbes, Leviathan, 88.

[iv] Thomas C. Schelling, Arms and Influence (New Haven, CT: Yale University Press, 2008), 4.

[v] Graham T. Allison, Essence of Decision: Explaining the Cuban Missile Crisis, 2nd ed (New York: Longman, 1999), 404; John J Mearsheimer, The Tragedy of Great Power Politics (New York: Norton, 2001), 338; Emile Simpson, War from the Ground up: Twenty-First Century Combat as Politics (New York, NY: Oxford University Press, 2013), 206; Robert Anthony Pape, Bombing to Win: Air Power and Coercion in War, Cornell Studies in Security Affairs (Ithaca, N.Y: Cornell University Press, 1996), 20. This list is not exhaustive, but is representative of the importance the community of scholars places on understanding one’s adversary.

[vi] Sun Tzu, The Illustrated Art of War (New York: Oxford University Press, 2005), 205.

[vii] Simpson, War from the Ground up, 202–203.

[viii] Simpson, War from the Ground up, 61.

[ix] Richard A. Clarke, Cyber War: The next Threat to National Security and What to Do about It, 1st ed (New York: Ecco, 2010), 30–31.

[x] Thucydides, History of the Peloponnesian War, 20–21; Robert O. Keohane, After Hegemony: Cooperation and Discord in the World Political Economy, 1st Princeton classic ed, A Princeton Classic Edition (Princeton, N.J: Princeton University Press, 2005), 243.

[xi] Michael R Gordon and Trainor, The Generals’ War: The inside Story of the Conflict in the Gulf (Boston: Little, Brown, 1995), 112.

[xii] Charles W. Douglass, 21st Century Cyber Security: Legal Authorities and Requirements, Strategic Research Project (U.S. Army War College, March 22, 2012), 14.

[xiii] “NTIA Announces Intent to Transition Key Internet Domain Name Functions | NTIA,” accessed May 7, 2014, http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions; “US Transitioning Internet DNS Control,” accessed May 20, 2014, http://cyberlaw.stanford.edu/blog/2014/03/us-transitioning-internet-dns-control.

[xiv] Carl Von Clausewitz, Michael Howard, and Peter Paret, On War (Princeton: Princeton University Press, 2011), 128, http://site.ebrary.com/id/10578581.

[xv] Basil Henry Liddell Hart, Strategy, 2nd rev. ed (New York, N.Y., U.S.A: Meridian, 1991), 324.

OBANGAME EXPRESS 2014: Together. Forward. Slowly.

Background

(April 2, 2014) - U.S. Sailors, U.S. Coast Guardsmen and Ghanaian maritime specialists, all embarked aboard joint, high-speed vessel USNS Spearhead (JHSV 1), ride in a rigid-hull inflatable boat (U.S. Navy photo by Mass Communication Specialist 2nd Class Jeff Atherton/ Released)
(April 2, 2014) – U.S. Sailors, U.S. Coast Guardsmen and Ghanaian maritime specialists, all embarked aboard joint, high-speed vessel USNS Spearhead (JHSV 1), ride in a rigid-hull inflatable boat (U.S. Navy photo by Mass Communication Specialist 2nd Class Jeff Atherton/ Released)

The Gulf of Guinea has a problem: Nigerian-driven maritime crime. Nigeria’s problem in turn is a thoroughly criminalised political and commercial elite and a largely disenfranchised electorate. The fallout of that state of affairs has an impact on the region’s security and stability. There is no short-term fix and it has become fashionable to recommend “improved governance” and anti-corruption measures to remedy the situation in the long run. This sort of advice is cheap. Beyond the obvious truth contained in them, there is little in such recommendations as to how to operationalise them or how to address the situation in practical terms as it is and will likely remain for the next years if not for decades.

The efforts of the African Partnership Station (APS) and the Africa Maritime Law Enforcement Partnership (AMLEP) are two military-political initiatives that seek to overcome the lack of practical value of general policy recommendations and to utilise the will and the resources that exist in the region to make the best of it in the maritime environment. Within this setting OBANGAME EXPRESS is an annual test since 2011 of what has been and what still needs to be achieved in West Africa’s maritime domain. APS and AMLEP, together with the French “Operation Corymbe” are the only sustained efforts to build and maintain regional maritime security capabilities in a region characteristic for its sea blindness and mutual distrust.

With the emergence of the Gulf of Guinea Code of Conduct in 2013 and subsequent agreements between various signatories, such as the Zone E Agreement between Nigeria, Benin, Togo and Niger, West Africa makes an attempt to replicate some of the hot pursuit agreement already in existence between Nigeria, Niger, Chad and Cameroon in the borderlands of the Nigerian North and North-East and transfer that model to a maritime environment. The chief difference is that the Gulf of Guinea Code of Conduct provides a multi-lateral approach with obvious political advantages, but equally obvious operational challenges given the widely divergent maritime security agendas (where they exist) of the signatories. This problem has been circumvented for the time being by breaking down the entire region encompassing the states of the Economic Community of West African States (ECOWAS) and Economic Community of Central African States (ECCAS) into manageable “zones” in order to be able to implement practical measures on the basis of the Code of Conduct more rapidly instead of having them negotiated by the entire forum. The zonal approach also allows individual states to shape the Code of Conduct according to their specific maritime security needs.

It is important to point out that maritime piracy (of whichever definition) is only one of many issues and for many regional states it is not even the most important or pressing one and thus not the driving force behind the Gulf of Guinea Code of Conduct. While piracy is costing the shipping industry and the region millions every year, the annual lost revenue from illegal fishing probably ranges in the several hundreds of millions while Nigeria alone loses approximately US$ 8bn per year from illegal bunkering and illegal crude oil exports. Much of the stolen oil leaves Nigeria by sea. The nexus of those criminal activities is transnational crime, often under the patronage of Nigerian elites. This makes it even more sensible to address the entire complex of maritime security as one and not just focus on a single symptom, however much this may exercise the pundits in the shipping journals and maritime security blogs.

OBANGAME EXPRESS 2014

Purpose

Cameroon Navy patrol boat LE LOGONE (foreground) and the Nigerian flagship NNS THUNDER during Exercise OBANGAME EXPRESS 2014 (Photo: Dirk Steffen)
Cameroon Navy patrol boat LE LOGONE (foreground) and the Nigerian flagship NNS THUNDER during Exercise OBANGAME EXPRESS 2014 (Photo: Dirk Steffen)

This year’s exercise OBANGAME EXPRESS was meant to be a litmus test of the applied Zone E Agreement, both on a command & control (C2) level as well as on a tactical level – chiefly by rehearsing vessel board seize & search (VBSS) procedures, rules of engagement (ROE) and maritime interdiction operations (MIO) with boarding teams. The purpose of OBANGAME EXPRESS 2014 was thus “to exercise and evaluate the regional interoperability, multinational command and control relationships, and proficiency of the regional maritime partners in the Gulf of Guinea.”

West African statesmen like to ascribe many if not all of the region’s maritime security woes to external factors and routinely call on the international community for support to resolve the problem. This year, their call was answered during OBANGAME EXPRESS 2014 which lasted from 16 April to 23 April 2014 and included extra-regional support beyond APS from Belgium, Germany, Turkey and Spain. “During the at-sea phase of the exercise, 11 nations, including were represented on board 36 different vessels hosting 20 different boarding teams. The boarding teams completed 47 boarding drills during three days of operations” summarised Exercise Director, Captain Nancy Lacore. Several Maritime Operation commands (MOC) were involved, specifically the Regional Maritime Awareness Centre (RMAC) at the Nigerian Navy’ Western Naval Command in Lagos, the ECCAS Centre pour la Coordination Multinationale (CMC) in Douala (Cameroon) and the Battalion d’Intervention Rapide MOC in Idenau (Cameroon). This was augmented by an embarked staffs, including a regional staff led by a Ghanaian admiral on the German combat support ship Bonn.

Conduct at sea

(July 17, 2011) - Petty Officer 2nd Class James Haurand (LEFT) takes an identification photo of a crewmember aboard a Senegalese fishing vessel as part of an African Maritime Law Enforcement Partnership (AMLEP) boarding mission with Coast Guard and Senegalese boarding teams. (U.S. Coast Guard photo by Petty Officer 2nd Class Etta Smith/RELEASED)
(July 17, 2011) – Petty Officer 2nd Class James Haurand (LEFT) takes an identification photo of a crewmember aboard a Senegalese fishing vessel as part of an African Maritime Law Enforcement Partnership (AMLEP) boarding mission with Coast Guard and Senegalese boarding teams. (U.S. Coast Guard photo by Petty Officer 2nd Class Etta Smith/RELEASED)

The at-sea phase was preceded by a pre-sail training for the MIO-teams by US, German and Spanish instructors. The at-sea phase from 19-21 April 2014 covered a range of scenarios including illegal fishing, arms smuggling, human trafficking, illegal bunkering and piracy. With the exception of the Bonn, which served as the embarked staff’s flagship, all extra-regional warships and some Nigerian Navy vessels served as target ships for the MIO-teams.

The experience made on board the German frigate Hamburg was representative for the conduct of the exercise and challenges experienced by the MIO teams and their proficiency. Teams from Benin, Nigeria and Togo boarded the Hamburg which alternatingly assumed the role of an illegally fishing vessel and a gun runner. The scenarios had been scripted by the American-led exercise control staff.

Of the three MIO-teams the Nigerian Special Boat Service (SBS) team deployed from NNS Thunder displayed the highest degree of professionalism, tactical acumen and ability to graduate their approach. Although clearly trained and conditioned with the hostile opposition of illegal bunkerers, kidnappers and hijackers in mind they were able to exercise restraint and judgement appropriate to the situation. In spite of good tactical procedures their primary challenge was communication between team elements as well as with their mothership. The latter in turn suffered from poor responsiveness of the MOC, which resulted in the SBS team being “stranded” on the target vessel for 2 hours until a decision to detain the suspect vessel and provide back-up for the team could be obtained.

The Beninese boarding team from the patrol boat Oueme was representative of the average MIO teams deployed by minor West African coastal states. The recent expansion of Nigerian piracy into Beninese waters and the aggressive response that Benin launched together with Nigeria in the form of “Operation Prosperity” had shaped their approach to VBSS. The team carried out the boarding with a high degree of pre-emptive violence including death threats. Modestly equipped and with poor communications to their own ship, the team was clearly aware of its vulnerability and consequently tense throughout the scenario.

The Togolese team, finally, represented the low end of experience found amongst some of the very small and unseasoned West African navies. The absence of even the most basic equipment for VBSS operations was reflective of the Togolese Navy’s operational readiness for this type of maritime security activity. When the team boarded the Hamburg it was only their third boarding (in the course of the exercise) and the third boarding of this kind ever conducted by the Togolese Navy. At that point all equipment – weapons, helmets, life vests and RHIB (including coxswain) had to be borrowed from the German Navy. Consequently they were tactically unready, though clearly willing to learn. Nevertheless, at that point they were overwhelmed by the scenario originally envisaged for them and ended up conducting a boarding of a very compliant fishing vessel under supervision of their instructors.

Conduct on shore

A Spanish instructor from ESPS INFANTA ELENA provides classroom training to Equatoguinean naval personnel in the pre-sail phase of OBANGAME EXPRESS 2014. (Photo: Alexander Drechsel/Adrian Kriesch)
A Spanish instructor from ESPS INFANTA ELENA provides classroom training to Equatoguinean naval personnel in the pre-sail phase of OBANGAME EXPRESS 2014. (Photo: Alexander Drechsel/Adrian Kriesch)

Command and Control – and the inadequacy of it as it was displayed during the exercise – was a recurring theme. This was not just a view of the exercise controllers but an almost universal complaint by commanding officers of most participating units, who felt they received neither the guidance nor the information they expected and needed to carry out their mission.

The exercise exposed significant deficiencies in the MOCs’ (especially RMAC’s) ability to build and maintain a situation picture and to share maritime domain awareness (MDA) information and to process requests for decision-making. Although technical shortcomings were cited during the debrief it was clear that the issue was really an organisational and training shortfall. This includes to some extent the ability to utilise technology at hand.

The RMAC used a commercially available AIS-tracking programme called Sea Vision in order to maintain a situation picture. Because many vessels in Nigerian coastal waters do not send AIS signals, it was to be augmented by an integration of radar pictures from coastal stations and assets afloat. This solution was only implemented belatedly (with the assistance of U.S. Navy personnel) and in the meantime the Nigerian Navy resorted to only monitoring AIS signals.

The effectiveness of the RMAC suffered further from a staff organisation that in addition to not having been prepared for the exercise also appeared to be less than capable of dealing with real world incidents and reports, some of which were forwarded directly to the RMAC by participating units or MOCs. Decision-making, even for pre-authorized scenarios, was routinely escalated to flag-officer level resulting in considerable delays or even in no decision being taken at all. Interagency information sharing and exchange of maritime domain awareness information, such as with NIMASA or NPA, or the Maritime Trade Information & Security Centre (MTISC) in Ghana, which was part of the exercise brief, was not evidenced – be it for exercise purposes or in real life.

Hot wash

(April 20, 2014) – Nigerian Navy Rear Adm. S. I. Alade, flag officer commanding Western Naval Command, arrives by helicopter to the German ship FGS Bonn (A-1413) during Obangame Express 2014. (U.S. Navy photo by Mass Communication Specialist 2nd Class John Herman/Released)
(April 20, 2014) – Nigerian Navy Rear Adm. S. I. Alade, flag officer commanding Western Naval Command, arrives by helicopter to the German ship FGS Bonn (A-1413) during Obangame Express 2014. (U.S. Navy photo by Mass Communication Specialist 2nd Class John Herman/Released)

The exercise ended, predictably, with much back-patting of (especially Nigerian) top brass for a job well done. Clearly, the conduct of the exercise in itself is valuable and necessary, and arguably holding the exercise in that form was no mean feat (though the credit belongs mostly to the organisers from the U.S. Navy) however, more work needs to be done to achieve even a basic maritime security capability in the region. Beyond the preening of the Nigerian flag officers at the closing ceremony this challenge is largely understood and accepted on a working level of most Gulf of Guinea navies (ships’ commanders and exercise observers), many of whom expressed a genuine desire to continue their working relationships with the extra-regional navies. It will take time for this insight to permeate into the West African navies and until then it will need to be constantly refreshed in the minds of the West African senior naval officers and politicians.

Frustration over perceived African nonchalance or foot-dragging will continue to be a key experience for many U.S. and European participants in OBANGAME EXPRESS exercises in the foreseeable future. “FUBAR” as an American exercise staff member put it was probably the strongest characterization of what went during the exercise on at times, but as a Nigerian participant pointed out: just putting Nigerians and Cameroonians into the same room would have been unthinkable a year ago. So, is there hope after all?

Conclusion

The Gulf of Guinea continues to present the vexing challenge that those countries that jealously guard their right to establish maritime security are singularly incapable of doing so. Nevertheless, continual efforts like APS, AMLEP and Corymbe will provide incremental improvements or provide support for regional initiatives aimed at improving regional maritime security. Better operational maritime security capabilities will not address the problems of corruption, lack of prosecution or even the underlying transnational criminal structures, but as one of several practical measures for improving security they can encourage the willing and contain the unwilling and contribute to an improved security environment. Experience from other theatres, not least the Indian Ocean, have shown that such measures, while not eradicating the symptoms, can at least ameliorate them. While the complexity of this year’s OBANGAME EXPRESS may have overwhelmed some of the regional participants, it is important to keep the momentum going. Equally, extra-regional participants should not be discouraged by what may be perceived as slow (or non-existent) progress. It will be a long haul, measured in decades rather than years.

Dirk Steffen is a Commander (senior grade) in the German Naval Reserve with 12 years of active service between 1988 and 2000 and was assigned to the German Battlestaff of TG 501.01 on board FGS HAMBURG during Exercise OBANGAME EXPRESS 2014. He is normally Director Maritime Security at Risk Intelligence when not on loan to the German Navy. He has been covering the Gulf of Guinea as a consultant and analyst since 2004. The opinions expressed here are his alone, and do not represent those of any German military or governmental institutions.