Category Archives: Tactical Concepts

What are the evolving ideals of tactics in maritime and naval affairs.

Scotland, Counter-Insurgency, and Sea Control

This article is part of a series hosted by The Strategy Bridge and CIMSEC, entitled #Shakespeare and Strategy. See all of the entries at the Asides blog of the Shakespeare Theatre Company. Thanks to the Young Professionals Consortium for setting up the series.

1_FYwDrMPjtw8FffAcTb8iwQWhen curtains close on Shakespeare’s 1606 The Tragedy of Macbeth, audiences are left to ponder the fate of Scotland. Contemporaries of the playwright were well aware of the Union of the Crowns a mere three years prior in 1603, uniting the rule of England and Ireland under James the VI, King of the Scots. But few could claim to know the events that followed Macbeth’s toppling by the hands of an English army half a millennium earlier. Part of the problem is that as with many popular pieces on Scottish history, such as Braveheart, a factual recounting – if one could be determined in the first place – is sacrificed to good story-telling.

Dunsinane, written by David Greig and playing in an excellent National Theatre of Scotland production at the Shakespeare Theatre Company’s Sidney Harmon Hall in Washington, DC, through February 21st, brings a few elements of the story closer to what is known: Macbeth ruled for over 15 years and wasn’t widely considered a tyrant. The narrative largely picks up where Macbeth left off, chronicling England’s attempt to establish a friendly regime across its northern border and the subsequent insurgency and counter-insurgency campaigns. Greig uses this context to explore military, political, and moral themes (more on those later) quite familiar to those who’ve lived through or in the shadows of the wars in Iraq and Afghanistan.

But what does sea power have to do with a land war and occupation of physical territory? A monologue from a boy soldier opens the show:

“We boarded our ships at the Thames mouth.
There were two thousand of us and also
Some horses for the knights to ride and animals
For us to slaughter on the way.

_MG_0095 (2)We stood on the Essex shore a mess of shingle,
Some of us new and eager for a fight and others
Not so sure but all of us both knowing and not knowing

What lay ahead of us.

Scotland.

Scotland. Where we would install a king.

…..

Of the river Forth and we landed in a place called Fife –
Which is wild compared to Kent –
And there we camped in woods near the abbey of Inchocolm.

And waited until at last he came to us – Siward
Our commander – and he told the sergeants it was time
To prepare us to fight.

Clearly sealift and local sea control can smooth the path for an initial military assault. The sea journey described above is just shy of 400 nm, and would have taken far less time than a northward march, thereby increasing the chance the expedition maintains some element of surprise. Whether the landing force is completely unexpected or merely arrives sooner after word reaches Macbeth and his advisors at Dunsinane, seat of his power, the force would have faced less entrenched and ready resistance. Additionally, had Macbeth received early warning, the mobility afforded by the sea would still have allowed the expedition some latitude in choosing where to disembark – a perennial complication for military planners facing an amphibious landing, from the American revolutionaries accounting for the movements of the British to Nazi Germany awaiting the Americans.

Invasion by sea would also have impacted the campaigns’ logistics. The initial requirements for foodstuffs and military supplies would have been greater than on a march, which could have offered a mix of supplies provided by other vassals when available and foraging in their absence. But the fact that the force set off from Essex indicates many of the forces were raised by southern nobles, easing the burden on the expedition’s northern commander, Siward, Earl of Northumbria. A march through his lands, bordering Scotland, would also have risked engendering a hostile populace enroute that might have joined Macbeth’s cause.

As in a later invasion of Scotland during the (2nd) English Civil War, the sealift could have been retained for resupply over open sea lines of communication (SLOCs) to limit the need of the expedition to disperse and forage after landing. It is unclear in Dunsinane whether the ships were kept at hand. But indications are that the English did not anticipate a long phase of contested nation-building to defend their installed king’s regime, and likely expected to rely on Siward’s neighboring realms as the situation changed. They may also have believed local sea control and predictable SLOCs would be challenged by other powers such Norway, which commanded more allegiance from some Scottish chiefs than the king at Dunsinane. This allegiance in turn was easier to command when, due to Scotland’s extensive coastlines, sea control could be no more than a localized or transitory thing, meaning other foreign powers could provide even overt support to prop up local proxies with little risk of interception.

Whether fleeting or near-absolute, a mastery of the waves confers both advantages and dangers. When it comes unchallenged at the start of a campaign it can breed an overconfidence that the rest of the endeavor will be as easy. Additionally, while command of the seas can be a great enabler in projecting power against an enemy state, it is of more limited use if a war transitions to a counter-insurgency phase where the nexus of success resides with the support of the people. This is not to say it’s of no use – the success of the U.S. counter-insurgency campaigns in the Philippine-American War were possible only through extensive naval activities – but unhindered SLOCs could only set the stage in cases such as Vietnam and Iraq, where what happened ashore was in many ways divorced from what happened at sea. It’s a lesson those eying an enemy (or wayward province) across the waters would do well to remember.

unnamed

In Dunsinane, sea power is a minor character, and the end of major combat operations it supported does not mark the beginning of peace. That comes with acceptance of defeat by the enemy, which as Clausewitz notes cannot always be imposed through the mere “total occupation of his territory.” And, as the German states learned in the Franco-Prussian War, the destruction of a regime’s forces can create a power vacuum filled by those even more loathe to throw in the towel. In the face of a recalcitrant foe, an occupier that increases its stay tempts provoking the people and swelling the ranks of the enemy.

While Siward and the English may have factored in the risk of rising resentment in their decision to invade by sea, they seem to overlook that of outlasting their welcome. In lines that could have been taken from The Accidental Guerilla, a book by Gen. Petraeus’s senior counter-insurgency advisor, David Kilcullen, Siward’s subordinate Egham says:

They’re not fighting us because of their Queen. They’re fighting us because we’re here. The Scots will fight anyone who’s standing in front of them. They like fighting. In fact – they’re fighting us partly because we’re stopping them from fighting each other.

Image-5 470x394Successful insurgencies and counter-insurgencies make this fighting personal. The former try to provoke an emotional (over-) response from the latter, while the later try to win the hearts and minds (or at least acquiescence) of the people through a return to a semblance of normalcy. In the forthcoming novel Ghost Fleet, by Peter Singer and August Cole, which also draws inspiration from the recent decades of counter-insurgency, a colonel chides another commander for “taking the losses from the insurgency personally…missing [the] greater responsibilities.” The death of Siward’s son at the beginning of the play makes the campaign immediately personal for him. While he and Egham both try to protect their men from harm by seeking accommodation with their former enemy, once the blood of their comrades is spilled in the insurgency phase Siward quickly goes through the seven stages of grief to punitive violence.

I don’t have as much experience with counter-insurgency as others writing in this series do, so I can’t say with certainty how I would handle the personal nature of it. Twice – in 2009 and in 2015 – I was ordered to spend a year with the war in Afghanistan, but twice those orders were cancelled – after 1 week and 4 hours respectively (I learned after the first time to wait awhile before telling my wife, just to be sure). But I’ve been lucky. Sailors by the thousands have been called from Active Duty assignments and the Reserve to serve in the counter-insurgency campaigns in Iraq and Afghanistan, and some are still being sent to the latter to this day. This is to say nothing of the contributions of the U.S. Marine Corps. Sea control may not make much difference in the counter-insurgency campaigns of Dunsinane or Afghanistan, but at the individual level the line between sea power and land power, between sailor and soldier, has blurred.

Scott Cheney-Peters is a surface warfare officer in the U.S. Navy Reserve and the former editor of Surface Warfare magazine. He is the founder and president of the Center for International Maritime Security (CIMSEC), a graduate of Georgetown University and the U.S. Naval War College, and a member of the Truman National Security Project’s Defense Council.

A Feast of Cabbage and Salami: Part I – The Vocabulary of Asian Maritime Disputes

This is the first installment in a series of primers produced in partnership with The Diplomat.

“Words have meanings.” It’s easy to dismiss this statement as a truism. But words – and their meanings – do hold particular import in the multi-layered realm of maritime territorial disputes, where the distinction between a rock and an island can mean the difference between hundreds of square miles of Exclusive Economic Zone. At times, usage of words has itself opened new fronts in conflicts as nationalist fights over place names in textbooks have shown. Those wishing to understand and accurately describe maritime Asia’s long-standing territorial disputes must wade through a colorful and evolving vocabulary. So, in an effort to help bring clarity to the lexicon we offer this guide to common terms in use.

A Starter Legalese

conven1U.N. Convention on the Law of the Sea (UNCLOS): UNCLOS is the international agreement that resulted from the Third UN Conference on the Law of the Sea from 1973-1982. It establishes the maritime zones that divide the modern seas, and the rights and sovereignty of states within them. It also provides means for determining sovereignty within disputed areas. The United States has neither signed nor ratified UNCLOS but regards all but several clauses relating to the International Seabed Authority as customary international law that it therefore follows. Several additional key international terms below are defined in UNCLOS. A full reading of the Convention is highly recommended for any serious student of international affairs to gain a better appreciation of the nuances of the terms than can be spelled out here:

Territorial Waters: Extends 12nm from a country’s internationally agreed upon baseline. A coastal state has full sovereignty over its territorial waters, but other states’ vessels (including military, but not aircraft) enjoy the Right of Innocent Passage through these waters so long as their passage is “continuous and expeditious,” and not “prejudicial to the peace, good order or security of the coastal State.” For example naval vessels cannot engage in spying during the transit and submarines must transit surfaced. A similar concept is that of Transit Passage, enabling the “continuous and expeditious” passage of all ships and aircraft through most international straits, as well as archipelagic states’ sea lane passages (straits formed by two islands of the same state).

Contiguous Zone: Extends from 12nm out to 24nm from a country’s baseline. Coastal states here enjoy rights limited to “customs, fiscal, immigration [and] sanitary laws and regulations.”

Exclusive Economic Zone (EEZ): Extends 200nm out from the baseline, wherein a state enjoys exclusive rights to natural resources such as fish and oil. States may also enjoy some resource exploitation rights in the seabed and subsoil beyond the EEZ depending on the lay of the Continental Shelf.

Artificial Islands: Of importance due to recent activity in the South China Sea, “Artificial islands, installations and structures do not possess the status of islands. They have no territorial sea of their own, and their presence does not affect the delimitation of the territorial sea, the exclusive economic zone or the continental shelf.”

High Seas: Anything beyond a state’s EEZ. “No State may validly purport to subject any part of the high seas to its sovereignty.” The high seas are sometimes also referred to synonymously as International Waters, but this latter term is not well defined as it can also be used for everything outside a nation’s territorial waters. Note: Per UNCLOS, Piracy can technically occur only on the high seas or “in a place outside the jurisdiction of any state,” such as the waters of a failed state. This is why reporting of piracy statistics can be inaccurate unless it uses the term Piracy and Armed Robbery to capture piracy occurring within a nation’s EEZ.

maritime-eng

The Freedom of Navigation: The overarching right of ships (and aircraft with Freedom of Overflight) to transit the sea unimpeded except as restricted by international law. Some states, such as China, claim rights not afforded to it by UNCLOS or customary international law, namely the ability to restrict activities of military assets and aircraft not inbound within its contiguous zone and EEZ (see for example the recent dispute over the right of U.S. P-8 Poseidon aircraft to fly outside of its territorial waters). The United States conducts Freedom of Navigation operations to register its non-concurrence with China’s position on territorial rights, thereby preventing it from becoming accepted customary international law.

ITLOS (International Tribunal for the Law of the Sea): Established by UNCLOS, its mandate is to “adjudicate disputes arising out of the interpretation and application of the Convention.” The Philippines has a case before the tribunal asking it to declare China’s Nine-Dash Line not in accordance with UNCLOS (and therefore not a valid basis for its South China Sea claims) – the ruling is expected in the next two years, but China is not taking part in the proceedings and has indicated it will not abide by the ruling.

Air Defense Identification Zone (ADIZ): According to Foreign Affairs, an ADIZ is “a publicly defined area extending beyond national territory in which unidentified aircraft are liable to be interrogated and, if necessary, intercepted for identification before they cross into sovereign airspace.” An ADIZ is not covered by any international agreement and does not confer any sovereignty over airspace or water, but has arguably become a part of customary international law due to its growing usage and acceptance. The rules China stipulated with its establishment of an ADIZ in the East China Sea in late 2013 however garnered widespread criticism and non-observation due to its surprise announcement and application to those flights not intending to enter sovereign airspace.

2013-09-12-BZSSR

Conduct for Unplanned Encounters at Sea (CUES): CUES provides a set of non-binding “safety procedures, a basic communication plan and basic maneuvering instructions” when naval vessels and aircraft unexpectedly encounter each other at sea. It was agreed upon at the 14th Western Pacific Naval Symposium in April 2014, and while a code of conduct CUES should not be confused with the much-discussed and as yet elusive ASEAN Code of Conduct below.

Code of Conduct (CoC): In 2002, the member states of ASEAN and China signed a voluntary Declaration on the Conduct (DoC) of parties in the South China Sea “to resolve their territorial and jurisdictional disputes by peaceful means, without resorting to the threat or use of force, through friendly consultations and negotiations by sovereign states directly concerned.” This was to be the precursor to a binding CoC, but as Carl Thayer ably documents implementation of the CoC was kept in check for a decade by China and focus on Guidelines to Implement the DoC, which were approved in 2012. However, promises in the DoC such as to refrain from then uninhabited maritime features and to handle differences in a constructive manner have since been violated by actions including several parties’ ongoing construction and expansion on features under their control. As a result of this and because the Guidelines have been removed as the focus by adoption, many ASEAN states, with the Philippines foremost among them, have returned attention to reaching agreement on a legally binding CoC. There have been recent indications that China may be willing to soon start serious discussions about the Code of Conduct, but it is unclear whether it will be willing to accede to (let alone adhere to) any potent enforcement mechanisms.

A Strategic Buffet

Cabbage Strategy: In a television interview in May, People’s Liberation Army (PLA) Maj. Gen. Zhang Zhaozhong described China’s approach towards securing control over and defending the Scarborough Shoal, after reneging on an agreement with the United States whereby both they and the Philippines would back down from a standoff in 2012:

Surrounding a contested area with so many boats — fishermen, fishing administration ships, marine surveillance ships, navy warships — that “the island is thus wrapped layer by layer like a cabbage.”

140527-china-vietnam-5a_7de94800443e43ddcb5c34b519f8b5e8.nbcnews-ux-960-600Analysts note this approach forces those opposing China’s actions to contend not only with layers of capabilities but also rules of engagement and public relations issues such as would arise from a confrontation between naval vessels facing fishing boats at the outermost layer. A more recent example of this layered approach occurred this summer with the arrival of a CNOOC oil rig in Vietnam’s claimed EEZ.

Salami Tactics (A.K.A. Salami Slicing): This term was coined by Hungary’s Cold War Communist ruler Matyas Rokosi to depict his party’s rise to power in the 1940s. The emphasis is on incremental action. In the initial usage it described the piecemeal isolation and destruction of right wing, and then moderate political forces. In maritime Asia it has come to be used to describe China’s incremental actions to assert sovereignty over areas of disputed territory. A key aspect of Salami Tactics is the underpinning rationale that the individual actions will be judged too small or inconsequential by themselves to provoke reaction strong enough to stop further moves.

The Three Warfares: The Three Warfares is a concept of information warfare developed by the PLA and formally approved by China in 2003aimed at preconditioning key areas of competition in its favor.” The U.S. DoD defined the three as:

  1. Psychological Warfare: Undermining “an enemy’s ability to conduct combat operations” by “deterring, shocking, and demoralizing enemy military personnel and supporting civilian populations.”
  2. Media Warfare: “Influencing domestic and international public opinion to build support for China’s military actions and dissuade an adversary from pursuing actions contrary to China’s interests.”
  3. Legal Warfare (also known as Lawfare): Using “international and domestic law to claim the legal high ground or assert Chinese interests. It can be employed to hamstring an adversary’s operational freedom and shape the operational space.” This type of warfare is also tied to attempts at building international support.

Chinas-Nuclear-SubmarinesAnti-Access / Area Denial (A2/AD): describes the challenges military forces face in operating in an area. According to the U.S. DoD A2 affects movement to a theater: “action intended to slow deployment of friendly forces into a theater or cause forces to operate from distances.” AD, meanwhile, affects maneuver within a theater: “action intended to impede friendly operations within areas where an adversary cannot or will not prevent access.” Advances in weapons such as mines, torpedoes, submarines, and anti-ship missiles are commonly cited examples of those that can be used for A2/AD.

Air-Sea Battle (ASB): A warfare concept designed by the United States military to counter A2/AD challenges and ensure freedom of action by trying to “integrate the Services [primarily the Navy and Air Force] in new and creative ways.” ASB is not a “strategy or operational plan for a specific region or adversary.” There has been much debate and confusion about ASB, in part because it requires the development and balancing of new complimentary capabilities, many of them classified.

Offshore Control: A strategy for the United States to win in the event of a conflict with China put forward in 2012 by USMC Col. T.X. Hammes (Ret.). In Offshore Control, the United States focuses on bringing economic pressures to bear via a tailored blockade, working with and defending partners along the first island chain rather than strikes against mainland China.

Four Respects: The Four Respects is a new term fellow The Diplomat contributor Jiye Ki, based on remarks made by Chinese Foreign Minister Wang Yi earlier in September. They are the four guiding principles by which Wang says South China Sea negotiations should proceed, namely:

  1. The dispute over the Spratlys “is a problem left over by history,” and that “handling the dispute should first of all respect historical facts.”
  2. “Respect international laws” on territorial disputes and UNCLOS.
  3. Direct dialogue and consultation between the countries involved should be respected as it has proven to be the most effective way to solve the dispute.
  4. Respect efforts that China and ASEAN have made to jointly maintain peace and stability. Wang says China hopes countries outside the area can play constructive roles.

Mutual Economic Obliteration Worldwide (MEOW): A term coined by yours truly to describe the deterrent effect of the threat of economic side-effects of a conflict between the United States and China on their actions towards each other.

See any we missed? Part 2 will cover the Geography of Asian Maritime Disputes

Scott Cheney-Peters is a surface warfare officer in the U.S. Navy Reserve and the former editor of Surface Warfare magazine. He is the founder and president of the Center for International Maritime Security (CIMSEC), a graduate of Georgetown University and the U.S. Naval War College, and a member of the Truman National Security Project’s Defense Council.

Countdown to Launch

Tomahawk

In the wake of TLAM strikes against targets in the Middle East by US Navy warships, we are reposting this guest article by LT Monika Chess, USN, former navigator aboard USS Barry (DDG-52) on the run-ups to a cruise-missile strike to provide a shipboard perspective of their planning and execution.

On March 19, 2011, USS Barry (DDG-52) was one of the first warships to launch Tomahawk Land-Attack Missiles (TLAMs) against targets in Libya in support of Operation Odyssey Dawn. Barry began 2011 by deploying in January with the Enterprise Strike Group in the Gulf of Aden and conducting counter-piracy operations. However, her mission unexpectedly shifted in March as she received tasking to steam independently to the Mediterranean Sea and join the international coalition of warships operating off the coast of Libya. Odyssey Dawn aimed to enforce the United Nations-sanctioned no-fly zone over Libya and stop Libyan leader Colonel Moammar Gadhafi’s forces from attacking civilians.

After arriving in the U.S. 6th Fleet Joint Operating Area, Barry’s strike team conducted numerous training scenarios that built on the skills developed during the training cycle and ensured the ship maintained the knowledge and proficiency to monitor the surface picture, make proper reports, and successfully execute any mission. As the state of affairs between the Gadhafi regime and civilian forces worsened in Libya, the training scenarios became daily.

On March 18, Barry was ordered to head to a preplanned launch position and stand by for tasking. The strike team was prepared and ready to execute a strike mission at a moment’s notice. On March 19, Barry received orders to conduct TLAM strike missions against strategic targets in Gadhafi-controlled regions in Libya. This was the first time Barry launched Tomahawk missiles for a real-world mission.

“Most strike teams never launch in their careers, but Barry was given that opportunity,” said Barry’s strike officer LTJG Jason Haney. Barry launched more than 30 Tomahawks from her forward and aft Mk 41 Vertical Launch System cells during her first of four strike taskings. With each launch, there was a deafening roar and blinding light as the missile streaked upward. Sailors watched in awe as the cells emptied one after another and the missiles flew toward Libya.

“The strike team was extremely focused. There was a sense of confidence as we accomplished our mission. I am extremely proud of my team,” said Chief Fire Controlman (FC) (SW) Ken Lilley, strike division leading chief petty officer.

“We were confident in the accuracy of our missiles and that minimal collateral damage was caused by the strikes. It helps to ease our minds to know that we conducted these missions effectively and minimized the impact on innocent people,” said Barry’s combat systems officer LT Todd Grahek, one of the tactical action officers during the strike missions.

“It required a ship-wide effort to conduct a Tomahawk strike of this magnitude,” continued LT Grahek. “Our engineers kept steady electricity and ensured that we were able to position ourselves appropriately. Our supply department ensured we had the parts we needed in a timely manner to keep the weapons systems fully functional. Combat systems, weapons, and operations departments operated as a single team focused on mission success, and every person who was a part of the mission was truly a trained professional.” FC2(SW) Royce Orr, one of the engagement planners during Barry’s strike missions, said, “I’m honored to participate in an event that will go down in U.S. history. It was a great feeling to be able to serve my country and assist the civilians in Libya.”

This article appeared in its original form in the Summer 2011 issue of Surface Warfare magazine available here. LT Monika Chess served as the navigator aboard Barry during Odyssey Dawn and works in the admissions office of the U.S. Naval Academy.

Maritime Cryptology at the Crossroads

After more than a decade of land war and a desire to rebalance to Asia, America’s Navy finds itself smaller, and in many ways weaker in certain respects. One area that should be of great concern is the current practice and future of maritime cryptology.

Cryptology at sea was proven decisive during World War II, beginning with the battle at Midway and the breaking of the Japanese naval code “JN25.”[i] Equally important was the allied program that cracked the German Enigma machines, “Ultra,” especially those used by the German Navy. Winston Churchill famously remarked to King George VI that, “It was thanks to Ultra that we won the war.”[ii]

museum
(A selection of seven Enigma machines and paraphernalia exhibited at the USA’s National Cryptologic Museum. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) Luftwaffe (Air Force) Enigma; 6) Heer (Army) Enigma; 7) Kriegsmarine (Naval) Enigma—M4.)[iii]
Throughout the ensuring Cold War until the fall of the Berlin Wall, naval cryptology played a vital role in meeting national and tactical intelligence requirements. America gained deep insight and understanding of Soviet and Warsaw Pact allied naval operations and was able to obtain priceless strategic intelligence through collection missions operated by the U.S. Navy. The end of the Cold War, ensuing strategic drift and drawdown was shattered by the terrorist attack of 9/11, yet even in the midst of a worldwide “Global War on Terror,” the pressure remained to cut the naval force. Today, the Navy is at its smallest point since World War I. For the Navy to conduct its maritime cryptology mission, it must have presence in the littorals, especially in key strategic areas of the Western Pacific, Indian Ocean and Arabian Gulf and the Mediterranean and elsewhere. A smaller Navy with fewer platforms means the Navy is not always where it needs to be and when it needs to be there.

The hope was that through force shaping, automation and remote operations, maritime cryptology could continue to thrive in an ever more complex electromagnetic (EM) environment. Adversarial communications have become far more challenging to detect, exploit and prosecute. The Radio Frequency (RF) environment of today is incredibly complex, with tactical, strategic and data communication links operating in all areas of the spectrum and often at frequencies with a very low probability to intercept. Modern encryption techniques have evolved from mechanical electronics to the use of quantum mechanics.[iv]

crypto

The effects of force shaping, automation and remote operations are beginning to take their toll on the tradecraft of maritime cryptology. Today’s junior Sailors and officers have had their training time cut in order to meet growing operational demands on a shrinking Navy. To be successful in the art of cryptology – and it is a practiced art – one must have a deep understanding of the fundamentals of radio signal transmission as well as more than a passing familiarity with the collection equipment. A junior cryptologic technician and junior officer should be able to draw a basic transmitter-receiver diagram and trace the origin of a signal from its original state, such as voice or data, through the transmitter, across a medium and into the collection gear and the operator’s ears. Foundational knowledge required that the basic operator have a working knowledge of the equipment and be able to perform diagnostic and troubleshooting tasks in the event of a malfunction. Finally, operators and junior officers must understand the process of signal intelligence reporting to the tactical unit at sea (indications and warning intelligence) as well as to the national signal intelligence system.

spectrum

At the same time, emerging cyberspace communication networks place entirely new pressures on maritime cryptology. Modern communication, command, control and information sharing are a “network of networks,” an “Internet of things” that require new skill sets and new acquisition and exploitation technologies. Yet the complexity of data systems and volume of data being passed is growing exponentially, outpacing our acquisition and procurement capability. The Navy has tried to mitigate this by relying on commercial off-the-shelf technology (COTS) but this entails its own set of problems. COTS technology must be compatible with legacy systems – some more than twenty years old and built on architecture and code from the late 1980s and early 1990s – and it relies on bandwidth levels that are not always available and reliable. We often find out the hard way that equipment which works well in the sterile lab environment is not up to the task of performing reliably at sea under arduous conditions.

Maritime cryptology is at a cross roads. We must return to the fundamentals of signal intelligence at the same time we are trying to realize the potential of cyberspace operations at sea. This will require a renewed commitment to recruitment and training, and for many middle grade and senior enlisted cryptologic technicians and officers, it means new formal training. Right now, senior enlisted and officers are being asked to take leadership roles in an emerging cyberspace operations field for which they are receiving inadequate or no formal training. We must reconsider recruitment of new junior Sailors and officers who have the background skills, education and knowledge and provide them a career path that emphasizes cryptologic expertise across the spectrum, from “traditional” signals intelligence to modern wireless exploitation. This career path must be grounded in recognizing that maritime cryptology is more art than science, and to become proficient and experienced, one must practice.

The author would like to thank CDR Kevin Ernest who kindly provided his thoughts on the challenges of modern maritime cryptology.

LT Robert “Jake” Bebber is an information warfare officer assigned to the staff of U.S. Cyber Command. The views expressed here are his own and do not represent those of the Department of Defense, the Department of the Navy or U.S. Cyber Command. He welcomes your comments at jbebber@gmail.com.

[i] http://www.navy.mil/midway/how.html

[ii] http://www.history.co.uk/study-topics/history-of-ww2/code-breaking

[iii] http://en.wikipedia.org/wiki/Enigma_machine#cite_note-9

[iv] http://blogs.scientificamerican.com/guest-blog/2012/11/20/quantum-cryptography-at-the-end-of-your-road/