Battlespace Awareness Tools Are Central to Fleet Readiness

By Michael Tiefel and Andrew Orchard

In his book Fleet Tactics and Naval Operations, Capt.(ret) Wayne Hughes states: “At sea the essence of tactical success has been the first application of effective offensive force.”1 Capt. Hughes’ warfighting axiom – applying offensive force first – is the distinct advantage information warfare (IW) intends to deliver, and it is predicated on sound battlespace awareness (BSA). Given the advances in the speed, precision, and destructive power of modern naval weapons, finding and fixing the adversary remains indispensable.

A powerful suite of BSA tools exists now, and they hold the key to making sense of an increasingly complex environment for Carrier Strike Group (CSG) and Expeditionary Strike Group (ESG) IW Teams. Incorporating BSA tool familiarization and training in IW schoolhouses while exercising their use in the Fleet Response Training Program (FRTP) cycle is an opportunity the IW community must seize to maintain an edge over potential adversaries.

Artificial intelligence and machine learning (AI/ML) integration will drive future conflicts. In 2018, the Department of Defense (DoD) published its Artificial Intelligence Strategy and established the Joint Artificial Intelligence Center (JAIC) in recognition of this fact.2 The AI Strategy directs the military to accelerate research, development, and adoption of AI/ML into a range of defense activities. The JAIC, meanwhile, manages the DoD investment in the application of AI/ML in activities ranging from logistics management to BSA. It serves as the executive agent for the military’s adoption of AI Strategy and seeks opportunities to move the military from traditional “Handcrafted Knowledge Systems” towards the development and incorporation of AI/ML.3 JAIC’s efforts portend exciting changes and will fundamentally transform how the Navy approaches the BSA mission.

However, none of these AI/ML efforts have resulted in tools the force can use now. Fortunately, there are BSA tools available to make Information Warfare teams effective in today’s maritime fight and that of the near future until AI/ML capabilities mature. Potential adversaries also recognize the criticality of winning the BSA battle and the possibilities of AI/ML in the long term. To remain ahead of these challengers and prevent them from gaining “the potential for decision by technological surprise,” the US Navy must expand its advantages in understanding the operational environment, and that starts with the effective use of currently available BSA tools.4

The Future Is Now: A Powerful Suite of Tools Exists

There is a pervasive belief both within and outside the Information Warfare community that BSA watch standers cannot successfully compete in a data- saturated world without AI/ML to help them understand the tactical picture. Action officers have spent many hours writing urgent operational needs statements to argue for rapid development and fielding of analytical tools to do the work usually placed on junior officers and Sailors. This panacea AI solution probably will not materialize in the near term, even though the JAIC continues to work to this end. The tools currently available may be the ones with which the next maritime conflict will be fought, and the fact is they work! Information Warfare officers must make an earnest effort to train their Sailors to complement traditional analysis tools with multi-intelligence fusion applications. CSG and ESG Staff Intelligence Officers play a significant role in cultivating a culture within their watch and analysis teams to push the envelope of available BSA capabilities in order to build the most accurate maritime picture from which commanders make tactical decisions even under stressful conditions.

 Afloat intelligence teams are now prioritizing training in Intelligence Community-wide tools as a standard operating practice for BSA watches.5 Not only does this train personnel on “buttonology,” but it also ensures watch teams understand the data sources from which they derive information, identify alternative sources if available, and appreciate data that is not available and what that means to their analysis. Officers and Sailors must understand the fundamentals of BSA tools and the sources that feed them; they must know other search mechanisms when missing information and explain their analytical process to other ship watches, aviators performing pre-flight walkthroughs, or even the strike group commander.

Afloat intelligence teams are also employing these BSA tools for analysis across all work centers from the air wing to shipboard cryptology. It is our experience that core BSA tools including the Fusion Analytic Development Effort (FADE) tool suite, Thresher data fusion tool, and Defense Intelligence Agency’s Think, Analyze, Connect (TAC) are integral to understanding the threat and operational situation in today’s dynamic maritime environment.6 Watch standers and analysts more quickly and accurately cross-reference information, build greater confidence in their use of traditional program of record systems, such as generic area limitation environment (GALE), and make higher confidence intelligence assessments through their continued utilization of these and other BSA tools.

How to Make the Connection: Cross-functional Training

Cross-functional training is the natural complement to BSA tools implementation; Sailors require a functional understanding of how each discipline provides value to the organization to use these tools most effectively. This is not a novel concept. Many papers have been written on the need for cross-pollination within  intelligence and cryptologic communities to better operationalize information warfare.7 However, there is no better environment to push the boundaries of integration than in SUPPLOT or EXPLOT. 

A common understanding of the various intelligence and cryptology specializations enables efficiency both on the watch floor and in the other intelligence work centers. An Intelligence Specialist (IS) with an ELINT background can leverage a Cryptologic Technician Technical’s (CTT) skill to find uncooperative contacts while he or she resourcefully locates cooperative contacts. Similarly, a CTT able to correlate imagery with ELINT can identify a vessel of interest without assistance and allow for more economical use of time for those high demand positions such as the Red Database Manager or the Force Intelligence Watch Assistant. 

This cross-functional approach does not demand in-depth expertise, but instead requires a basic, working understanding of the IS and CT disciplines. Watch standers benefit from cross-functional working knowledge that breaks down knowledge silos and enables collaboration using a common language and BSA tool set.  A shared background fosters the free flow of analytical ideas by unifying the team. Ultimately, a unified and self-aware team will remain one step ahead, thereby creating a distinctive capability.8 At the Strike Group level, our distinctive capability begins with training personnel on Intelligence fields, data sources, BSA tools, and fleet operations.9 The goal is to familiarize, which precedes, or at least tightly accompanies, analytic skills development.

Watch standing qualification now requires a combination of fundamental and practical lessons to create a cross-functional foundation. The fundamentals portion provides a basic understanding of the “how” behind each facet. Much like Surface Warfare Officers must understand how a warship’s systems acquire and track targets; information warfare professionals need to understand the sources and methods behind the data. Such lessons also concentrate on improving technology literacy and operational knowledge. Both are critical to effectively using advanced analytics and associated technologies during the practical training. The practical segment seeks to build the technical skills an intelligence professional requires to turn data and information into intelligence. The best way to become an intelligence professional is to work through as many practical examples as possible. Initial practical training emphasizes the development of personnel skills, patterns of life, and technology familiarization. Once mastered, practical applications focus on cross-functional communication and team building to meet strike group intelligence demands.

Battlespace Awareness Tool Recommendations

Recommendation 1: Build BSA tools and cross-functional training into routine watch practices. Two years ago, Carrier Strike Group Five (CSG-5) introduced substantive changes to the SUPPLOT training syllabus. We recognized the need for cross-functional training on the various BSA tools currently available. All watch standers, whether they are direct support personnel assigned from a Navy Information Operations Command (NIOC), the USS Ronald Reagan, or Carrier Air Wing 5 complete both common and specialized job qualification requirements (JQR) that includes proficiency in a BSA toolkit (i.e., Thresher, MIST, TAC). At sea, our ability to train personnel relies upon knowledge gained through informal online training, on-the-job training and through active interest by the various IS, CT, and officer users. Additionally, CSG-5 frequently coordinates with CACI, NRO, ONI and the USAF to schedule training opportunities for watch standers as these courses are available.10 We recommend all deploying CSGs/ESGs build BSA tool competency and a cross-functional approach into their watch standing JQRs.

Recommendation 2: Ensure Information Warfare students receive BSA tool training early. The Center for Information Training (CIWT) must integrate modern Battlespace Awareness tools into its curricula across the basic Intelligence Officer, basic Cryptologic Officer, Cryptologic Resources Coordinator (CRC), and various IS, CTT and CTR “A” school training curricula. This aligns with Admiral Gilday’s charge in his NAVPLAN 2021 that the Navy reforms its education programs to win in day-to-day operations and in combat.11 We are confident our Information Warfare schools can find space within the margins of Training Requirements Reviews to incorporate initial training on FADE MIST, A2, Thresher, and TAC. This change will also address a training deficiency in the OPINTEL toolkit identified by LT William Murray in 2019.12 However, training in BSA tools cannot end at the accession level training commands.

Recommendation 3: Reinforce early training with sustained training events during the FRTP. Fleet training commands must begin to integrate follow-on training and OPINTEL tool utilization during all phases of the CSG/ESG work up cycle. For example, some Information Warfare Training Commands must invest in a second iteration of BSA tool training as part of the Supplementary Plot (SUPPLOT) and Expeditionary Plot (EXPLOT) Team Trainer (SETT) events. Fleet training commands, such as our Naval Information Warfare Training Groups, should then put the SETT classroom instruction into practice as part of the Fusion Analysis Team Trainer (FATT) and Afloat Information Warfare Team Trainer (AIWTT). Deploying CSGs and ESGs should have the confidence to explore these tools during Fleet Synthetic Training (FST) and Composite Training Unit Exercise (COMPTUEX) graded events. There remains an important role for NRO, CACI, ONI or USAF training opportunities beyond the introduction to these tools at the basic schools and into the FRTP process. We envision these organizations moving beyond teaching the basic application of these tools to more sophisticated training events that allow for mastery of these capabilities. Furthermore, repetitive training opportunities allow these organizations to refine their curriculums to address basic and advanced training requirements as well as update their tools through fleet feedback.

Recommendation 4: Engage IW WTIs to be our BSA tool experts. Finally, we must ensure our WTIs are well versed in the variety of BSA tools currently at our disposal and able to implement rigorous training programs for our junior officers and Sailors. Several WTI candidates communicated with CSG-5 during our 2020 deployment to discuss thesis topics and request reviews of their final projects. Looking back, we should have pressed them to write projects on the training and application of current BSA tools for deploying naval forces. Naval Information Warfare Development Center (NIWDC) must include robust training in BSA tools as part of their standing WTI curriculum to make our future training officers successful in the fleet. The fleet deserves NIWDC-trained instructors well versed in existing tools and energized to help nurture their use from the tactical level up through the operational level at Maritime Intelligence Operations Centers .

Battlespace Awareness Tools Allow the Navy to Act Decisively First

Potential adversaries will continue to develop the requisite technology and weaponry to amass an effective offensive force. In response, the Navy is introducing new hardware, more demanding pre-deployment training and exploring AI/ML to address these challenges. Information warfare will enable the success of these efforts by maintaining the Navy’s advantage in BSA using existing analytical tools, building commonalities across the IS and CT force to encourage collaboration and communication, and modifying officer and enlisted training syllabi to allow for early and continuous integration of BSA resources. Moreover, broad use of current BSA tools across both  intelligence and cryptologic communities and supported by our WTIs engenders feedback from multiple perspectives. This feedback continues to be critical to tool developers as they refine many of these analytical tools even as we move away from handcrafted knowledge systems towards contextual adaptation and beyond. 

To achieve battlespace awareness to the satisfaction of any commander is the intelligence community’s highest objective. Intelligence personnel must be best prepared to provide confident analytical assessments of the tactical situation so that commanders and naval forces can make informed tactical decisions with greater confidence and speed than their adversaries. As CAPT Hughes wrote, “winners have out-scouted [battlespace awareness] the enemy in detection, in tracking, and in targeting.”13 A growing appreciation for BSA tools accompanied by a robust training program tailored toward fast recognition and quick integration of all available data ensures information warfare professionals remain at the leading edge of this mission critical requirement to out-scout the adversary, even in the information realm. This will allow the Fleet to be the one “who would attack decisively first.”14 

Michael Tiefel is a U.S. Navy intelligence officer and currently serves as the Executive Officer at the Center for Information Warfare Training, Pensacola, FL.

Andrew Orchard is a U.S. Navy intelligence officer and currently the officer in charge of the Joint Reserve Intelligence Center New Orleans.

The authors thank Capt. James Pendergast, USN, commanding officer of the Hopper Information Services Center at the Office of Naval Intelligence, for his review and inputs into the final version of this paper.

The views expressed are those of the authors and do not necessarily reflect the official policy or position of the U.S. Navy, Department of Defense, or the U.S. Government.

Endnotes

1 Hughes, Wayne P. Fleet Tactics and Coastal Combat. Naval Institute Press., 2018, 206.

2 Department of Defense. “SUMMARY OF THE 2018 DEPARTMENT OF DEFENSE ARTIFICIAL INTELLIGENCE STRATEGY: Harnessing AI to Advance Our Security and Prosperity.” https://media.defense.gov/2019/Feb/12/2002088963/-1/-1/1/SUMMARY-OF-DOD-AI-STRATEGY.PDF, 5.

3 Allen, Greg. Understanding AI Technology: A concise, practical, and readable overview of Artificial Intelligence and Machine Learning technology designed for non-technical managers, officers, and executives. Joint Artificial Intelligence Center (JAIC), April 2020, 3.

4 Hughes, 229.

5 Although we reference SUPPLOT throughout this article; our methodology and tools have equal practical application in Expeditionary Plot (EXPLOT) as well.

6 The National Reconnaissance Office maintains a suite of tools under their FADE program that contribute to the BSA toolkit used afloat.

7 Schwille, Michael, et al. “Improving Intelligence Support for Operations in the Information Environment.” RAND Corporation, 2020, doi:10.7249/rb10134.

8 Barney, Jay, and William Hesterly. “Strategic Management and Competitive Advantage.” Competitive Strategy, 2011, doi:10.7551/mitpress/8956.003.000, 149-153.

9 We recognize an appreciation for blue force capabilities is important. In fact, the CSG-5 Battlespace Awareness team works with surface, air, MISR (which resides within the N2 Department) and Information Warfare WTIs on a daily basis to ensure an understanding of blue force tasks and capabilities, allowing the SUPPLOT team to focus on N2’s Intelligence priorities. See Nelson, Christopher, and Eric Peterson. “Naval Intelligence Must Relearn Its Own Navy.” Proceedings, 13 Feb. 2020, www.usni.org/magazines/proceedings/2020/february/naval-intelligence-must-relearn-its-own-navy.

10 Individuals with SIPRNET accounts are welcome to review the SUPPLOT JQR on the CTF-70 Collaboration at Sea (CAS) webpage.

11 Gilday, Michael ADM. “CNO NAVPLAN 2021,” https://media.defense.gov/2021/Jan/11/2002562551/-1/-1/1/CNO%20NAVPLAN%202021%20-%20FINAL.PDF, 6.

12 Murray, William N. “Reimagine Intelligence Officer Training.” Proceedings, 21 Feb. 2019, www.usni.org/magazines/proceedings/2019/january/reimagine-intelligence-officer-training

13 Hughes, 212.

14 Hughes, 212.

Featured Image: EAST CHINA SEA (July 17, 2020) Lt. Louis Petro, from Weeki Wachee, Fla., stands watch as the tactical action officer in the combat information center aboard the amphibious dock landing ship USS Germantown (LSD 42). (U.S. Navy photo by Mass Communication Specialist 2nd Class Taylor DiMartino)

Fiction Contest Week Concludes on CIMSEC

By Dmitry Filipoff

Last week CIMSEC ran the top 10 stories submitted to the USNI-CIMSEC Fiction Contest.  The top finishers were ultimately selected by our esteemed panel of judges, which included August Cole, David Weber, Larry Bond, Kathleen McGinnis, Peter Singer, and Ward Carroll.

Authors explored future hypotheticals of maritime security and naval conflict through narrative storytelling. Unconventional outcomes and methods were often the result of modern concepts and capabilities that seem familiar. Through these fictional short stories, we may gain insight into how the future of maritime security may evolve, or go awry.

Below are the top finishers and stories featured during CIMSEC’s Fiction Contest Week. We thank the judges, our partners at USNI, and all submitting authors for their excellent contributions.

1st Place: Security by Obsolescence,” by Captain James Schmitt, USAF

“Sleazy laughed. The Reaper was many things, but it wasn’t intimidating. A low pass over the ships wasn’t going to scare off the China Coast Guard. If the MQ-9 was going to scare the Chinese, it wasn’t going to be with its speed.”

2nd Place: Bone Daddy,” by Michael Barretta 

“DF-26B ballistic missiles split the sky with their hypersonic screams. Guam Killers rained down and Andersen Air Force Base burned. Greasy, black smoke, illuminated by bright flashes of primary detonations, billowed violently into the sky. War was loud, very loud, thought Lieutenant Andrew Cohen as he strapped into the right seat of Bone Daddy, a B-1B Sea Control Bomber. He was first to the aircraft and had hit the alert button at the base of nose gear to start the engines before climbing up to the cockpit.”

3rd Place: Reality Hack,” by Robert Williscroft

“The seafloor was a hundred feet below, and the water was crystal clear. A thousand feet above, the sun shined brightly over the South China Sea, but not a single ray penetrated to where we were, on the seafloor, some forty nautical miles southwest of the Hainan Island coast. We were in international waters but very much inside the Chicoms’ exclusive economic zone. Somewhere below, yet nearby, was a Chicom acoustic array that allowed their intelligence people to identify and track every American submarine in the South China Sea outside the continental break. Our job was to take it out.”

#CancelMolly,” by Major Brian Kerg, USMC

“‘Thank you, Senator,’ Molly said. ‘If you will, allow me to step to the past to help understand the future. I joined the Corps just as Force Design 2030 was reaching maturation, and I saw firsthand what the fight was like under that model. And a lot of Marines died because we still had to ‘fight to get to the fight.’” She let that hang, giving the comment extra time by taking a sip from her glass of water.”

First Move,” by Dylan Phillips-Levine and Trevor Phillips-Levine

“I remembered the HMS Defender’s ‘innocent passage’ last year; I flew as the aircraft commander. The situation escalated to the point where my SU-24 dropped 4 x OFAB 250kg bombs in its path after repeated warnings from violating Russia’s sovereign territorial waters. However, despite the bombs, she refused to alter course. Since then, the West brazenly increased their FONOPs and ‘innocent passage’ transits.”

Task Force Foo Fighter,” by Jon Paris

“The missiles glided to their targets at supersonic speeds and lanced into the waiting enemy. Explosions washed out Burner’s screen. She peered outside and saw several orbs remained. They bolted in the direction of the cruiser. Burner put her jet on its wingtip and yanked into a body-crushing turn to follow, but they were too fast and sped out of view.”

The Baffin Bay Turkey Shoot,” by Mike Matson

“Lt. Larsen, taking local command of the swarm, sent a burst transmission, and the formation seamlessly shifted in the dark. ISR and jammers climbed to 5,000 meters. The HARMs moved to the tips on the flanks, and the two heavy weapon Raiders moved to the center. The swarm formed a crescent, with the tips farthest forward, HARMs waiting for the first electronic signs of its prey.”

Fishbowl in a Barrel,” by Keith Nordquist

“In an SCS, a crew of two could handle an entire New Panamax container ship on their own. From pinpointing a micro-mechanical problem in the turbine assembly to coordinating the additive manufacturing of repair parts at the next port-of-call, the system could do it all. Such impressive technology led Damocles Logistics’ CEO to call the SCS ‘a revolutionary tool for seamless and global logistics.’ The small cadre of SCS mission commanders and mission engineers preferred instead to call their little revolution a scuzz-bucket. Semantics aside, the system made autonomous, large container ship movements possible. Until it didn’t.”

The Dream of Russia: The Events of September 23rd, 2024,” by Billy Bunn

“Aboard the Kolpino, Kastonov and his crew had already moved on to their next mission: proceed west towards Crete, positioning outside of Souda Bay, Greece, and wait for further orders. As the largest NATO naval base in the Mediterranean, he prayed those orders didn’t include engaging hostile American ships. But Russia had just unleashed a surprise attack on a NATO member, and he knew that Article 5 impelled a response. Hopefully, his superiors had crafted a plan that would keep the U.S. and her allies from fulfilling this commitment.”

Any Clime and Place,” by Karl Flynn

“First Lieutenant Liu, USMC, looked north out to sea toward the Luzon Strait. The sky was turning amber and orange as the sun sank toward the horizon. He knew Taiwan lay beyond the horizon 200 kilometers away. As he often did, he began to wonder what was happening there. As a platoon commander, he was not privy to strategic level actions. Even if he had had internet access, it would have been impossible to discern the truth from news sources, much less social media. Both sides were pushing as much deception as possible. Liu knew he probably wouldn’t find out until well after the war concluded, which, as far as he knew, could last for a very, very long time.”

Dmitry Filipoff is CIMSEC’s Director of Online Content. Contact him at [email protected].

Featured Image: “J-15 Flying Shark (with J-15S),” by Jeffbearholy via Artstation

Sea Control 299 – Maritime Insecurity in the Age of Revolutions

By Walker Mills

Dr. Vanessa Mongey and Dr. Tyson Reeder discuss their new books, Rogue Revolutionaries and Smugglers, Pirates and Patriots in a discussion that covers the role the maritime space played in spreading revolution in the western hemisphere during the “Age of Revolutions.”

Download Sea Control 299 – Maritime Insecurity in the Age of Revolutions

Links

1. Rogue Revolutionaries: The Fight for Legitimacy in the Greater Caribbean, by Vanessa Mongey, University of Pennsylvania Press, 2020.
2. Smugglers, Pirates and Patriots: Free Trade in the Age of Revolution, by Tyson Reeder, University of Pennsylvania Press, 2019.
3. Sea Control 239: “Things Done By Halves” by Walker Mills with Dr. BJ Armstrong, CIMSEC, April 11, 2021. 
4. Dr. Mongey’s Website.

Walker Mills is Co-Host of the Sea Control podcast. Contact the podcast team at [email protected].

This episode was edited and produced by Marie Williams.

Security by Obsolescence

Fiction Contest Week

1st Place Finisher

By Captain James Schmitt, U.S. Air Force

Captain Hal “Sleazy” Slotsma watched the sea pass underneath his aircraft. The day was calm and the water’s surface mostly unmarred, though the occasional wakes passing through his field of vision led him to fishing vessels and other small craft. Looking at the brilliant blue water illuminated by a sun just starting to set, he could feel a familiar emotion building inside. “I am so damn bored,” he announced, startling the other person in the cockpit.

“We still have four hours until the break crew gets in,” said Corporal Sam “Curbs” London, settling back into her seat and glancing at the shift schedule on a screen to her right. “Is it your Friday or something?”

“Thursday,” said Sleazy glumly. He had two days left in his rotating workweek.

“Well, you’re in for a long night,” said Curbs, catching the edge of a wake and following it with the aircraft’s camera. “You never know, though. Maybe this wake leads to a sub and we get the XO’s bottle of scotch.”

“Some sub to leave a wake this big,” said Sleazy, as the camera finally caught the other edge of the wake, the disruptions making a “V” pointing to a ship still off-screen. “Maybe a tanker got lost.”

“Maybe not,” said Curbs, who had caught up with the ship and begun to zoom in.

Instead of the high-walled stern of a tanker, the ship’s aft was flat and sleek. As the camera slewed, it became clear that the ship was military, not commercial; it had a well-marked helipad, tapered bridge, and two uncovered mounted machine guns.

“Well, they’re not supposed to be here,” said Sleazy. “White hull?”

“White hull,” confirmed Curbs, identifying the ship as Coast Guard instead of a gray-hulled regular Navy vessel. The white hull also provided enough contrast to clearly see the bright red Chinese flag flying from the mast. “Not a monster ship, though.”

Curbs was right. The ship didn’t have the familiar bulk of the CCG-3901, a massive China Coast Guard ship that had terrorized Japanese fishing boats for the past four months. The outdated ship had surprisingly free rein of the area after decisively winning a game of chicken against a Japan Coast Guard cutter. A determined rescue effort saved the Japanese ship from sinking, but political leaders had still backed away from any further confrontations.

This mystery vessel’s course was as unusual as its type. Curbs was used to seeing Chinese ships patrolling a regular path through the waters off the Senkaku islands, part of normalizing their “domestic police actions.” This ship, however, was steaming in the general direction of the disputed islands, but it wasn’t on the normal course.

“I’m going to see where they’re headed,” said Sleazy, pulling up a moving map on a screen to his left. “Let’s look around to see if there’s anyone else.”

“Copy,” Curbs acknowledged, beginning an expanding search with practiced precision as Sleazy projected the ship’s course on his map. As far as he could tell, it would pass within two miles of Uotsuri Island, the westernmost of the disputed Senkaku islands. It wouldn’t be the closest approach that he had ever seen—hell, a maritime militia fleet had briefly landed on the islands a couple months ago—but it was odd. Odd enough for him to take a closer look.

“Coming left,” he said to Curbs, banking gently and activating the aircraft’s air-to-sea radar to sweep the area off the islands. There was plenty to find—just under two miles northwest of Uotsuri there was a cluster of a dozen returns, perhaps more. Sleazy waited for the radar to make a second pass, but the screen froze. Looking to another screen, Sleazy could see that the feed from the camera had frozen there as well.

“Lost link,” said Curbs, somewhat obviously. The link between their ground control station and the MQ-9 remotely piloted aircraft had failed. Sleazy and Curbs were now sitting in a moderately expensive shipping container in Hawaii, not in the cockpit of an aircraft flying over the East China Sea. Sleazy picked up the phone.

“Savage 26 lost link,” he told the communications technician on the other end. “Let’s get countermeasures going.”

It wasn’t long after the Marines started flying MQ-9s in the Pacific that the Chinese had begun interfering with their command-and-control links. The interference had turned into a back-and-forth competition, with increasingly ingenious and complex jamming and counter-jamming. The latest solution let MQ-9 aircrew defend their link to the aircraft . . . usually.

“Sorry, sir, but we can’t,” the tech answered immediately. Sleazy was sure he could hear other phones ringing in the background of the call—not a good sign. When comm techs were busy, it was often a bad day for everyone. “There’s jamming across the whole scope. I’m surprised the damn phones are working.”

“It’s not just us?” asked Sleazy, surprised. Harassing one MQ-9, especially one near the Senkakus, was pretty par for the course. But the Chinese normally avoided escalation.

“It’s everyone,” confirmed the tech. “Not just SatCom, either. Over-the-air comms are out, and the internet is so slow that even the backup chat is down.”

“How are we talking, then?” asked Sleazy. While he was talking on what seemed like a phone, it was technically a Voice over IP device routing the call through a secure network.

The tech laughed.

“Security by obsolescence,” he said. “There’s a backup mode on these things that routes through an old satellite constellation in the X band that no one uses. It’s so out of date that the Chinese probably decommissioned their jammers for it.”

Sleazy laughed too. “Hey, no mocking old tech. This whole MQ-9 program basically exists because the Air Force had leftovers. In fact, we used to be on X-band.” “Too bad you’re not there anymore,” said the tech. “Anyway, sir, you need anything else? It’s getting pretty hectic here.”

Sleazy stayed silent, staring at the frozen image on the screen. “Hang on a second,” he said. “Curbs, do you remember the brief we got with the last software update?” Curbs looked up from documenting the jamming.

“Yes?” she answered hesitantly.

“Not a test,” said Sleazy, grinning. “Do you remember the new procedure for emergency divert? One of the steps was to manually disable the link recovery automatic checklist.”

“Yeah,” said Curbs, “because the genius engineers still had it set to the backup.”

“The X-band backup!” Sleazy turned back to the phone. “Still there?”

“Yeah, and I heard you,” said the tech, starting to get excited. “We’re not really supposed to use that constellation without coordinating first, but what the hell. How do

you feel about limited bandwidth?”

“A hell of a lot better than no bandwidth,” said Sleazy. “Give me the numbers.”

They went back and forth for a couple minutes, getting the technical details for the new link pathway. Finally, the video stuttered. It dropped noticeably in quality and then restarted, displaying blue water dulled by low fidelity. Triumphantly, Sleazy and Curbs retook control of the aircraft and camera.

“Nice thinking,” said the comms tech. “You might be the only people with a connection back home.”

“We’ll see what we can do with it. Thanks for getting us going again,” said Sleazy. As he hung up the phone, Curbs was already looking for their target. The China Coast Guard ship, moving at an unhurried 10 knots, was easy to reacquire.

“Tally,” announced Curbs. “Same course, same speed.”

“Headed right toward those other contacts. Let’s see if we can find his friends.”

“You think maritime militia?” asked Curbs as she worked.

“Probably,” said Sleazy. “They love to cause trouble.”

The camera, zoomed out to move quickly, picked up some specks. The images enlarged, then sharpened as Curbs worked her controls.

“We should have put money on it,” she said. The ships were civilian, but they weren’t the fishing ships of the maritime militia. They were massive and had just begun a slow crawl toward the Senkakus. A brief check on the Coast Guard ships showed they had changed course to join as a small flotilla a mile or so off Uotsuri.

“RO/ROs,” said Sleazy, referring to roll-on/roll-off ships used to transport cars. “That’s new.”

“And they’re moving,” pointed out Curbs. “Right toward the islands.”

Sleazy considered briefly, then pointed the aircraft at the Senkakus. RO/ROs might be an easy way for patriotic Chinese citizens to transport some supplies to Uotsuri as a publicity stunt. Or they might be a great way to transport military equipment. Sleazy figured that in the worst-case scenario, it couldn’t hurt to be in a position to intercept.

“Let’s try to figure out what we’ve got,” he said. He pulled up yet another screen and scrolled to the location of the Chinese fleet, finding a cluster of returns from the hodgepodge of sensors on the aircraft. It looked largely like any other civilian group of ships with their associated emissions. Radios, navigation radar, AIS signals—the mess of identifiers required to operate safely in international waters. Most were represented as dots, but twoway communications were represented by faint lines. They branched out to navigation stations, other vessels, and . . . an area near the city of Fuzhou?

“Hey, Curbs,” said Sleazy, pointing at the lines. “You see this HF connection? Every ship has one to Fuzhou.”

Curbs sat up straight. “Isn’t the Eastern Army headquarters in Fuzhou?”

She was right—the PLA command responsible for the invasion of Taiwan and the Senkakus was communicating with this fleet. If Sleazy had any doubts about what was in the RO/ROs before, he didn’t now.

“It’s an occupation,” he said. “They’re going to land enough equipment to make it a fait accompli. Probably a whole A2AD kit.”

“What can we do about it?” asked Curbs. “Even if we could confirm it, and even if someone wanted us to shoot, we can’t talk to anyone with this jamming. Look, the damn phone even cut out.”

She pointed at the phone next to her, which now featured a prominent spinning wheel.

“We’re not going to start World War III anyway,” said Sleazy. “We need a nonkinetic option.”

“Get some 35s in here for a show of force,” suggested Curbs. “That would scare them right off.” “Probably, but it’ll take too long,” said Sleazy. “They’re not going to pack up after they land, it would look too bad. We have to get them to turn around.”

“So, we need to spook them with all of one MQ-9,” said Curbs. “Hey, we could try a show of force.”

Sleazy laughed. The Reaper was many things, but it wasn’t intimidating. A low pass over the ships wasn’t going to scare off the China Coast Guard. If the MQ-9 was going to scare the Chinese, it wasn’t going to be with its speed.

“I think I have an idea,” he said, “but it’s going to mean a major security violation.”

“Good thing the security team is on leave.”

“Alright, grow a track,” said Sleazy, “and grab my cell phone from the front. We’re going to become some opensource intel.”

In a surprisingly short time, everything was set up. Sleazy’s cell phone was propped up haphazardly on a stand, livestreaming to Twitch. The viewership was surprisingly high—a counter in the corner read 482—and surprisingly localized to Japan. Marine liaisons, informed by a cell phone call, had reached out to the Japan Coast Guard, which had in turn distributed the stream to local fishing boats. An overlay even included a helpful map showing the location of the video feed. 

Smaller and nimbler than the Chinese RO/ROs, Japanese fishing ships started moving toward the Senkakus. Even the poorest fishers carried a small Starlink terminal, and word spread at the speed of low-earth orbit internet. After the Chinese rammed their Coast Guard ship, Japanese citizens were determined to prevent another embarrassing maritime incident. It was hard to feel anything other than admiration as a cluster of small boats gathered around the islands. And the group of boats kept growing.

Sleazy also felt increasing concern for the fishers. The China Coast Guard ships were paramilitary vessels. They were larger than any of the fishing ships, and they were armed. If they wanted to clear a path through the impromptu fishing blockade, they could do it. But if they did, it would be a bloody, aggressive act. Maybe too aggressive—maybe so aggressive that it would set the Chinese back more in international opinion than the gains from occupying the Senkakus.

“They have to know that we’re here,” said Sleazy.

“Show of force?” asked Curbs hopefully.

“Sort of,” said Sleazy. One of the few radio channels not filled by the static of jammers was 156.8 MHz, a channel reserved for vessels in distress. Feeling a strange sense of relief when the static stopped and he heard radio silence for the first time in hours, Sleazy switched to the distress frequency and keyed the mic.

“Unknown Chinese vessels at position 25 48 north, 123 20 east, this is the United States military,” he said, keeping his voice level through the adrenaline of unauthorized international diplomacy. “You are unlawfully transiting a designated protected area within the sovereign Japanese waters. Reverse course, acknowledge this transmission, and exit Japanese waters immediately.”

“I don’t think that’s the script from the SPINS,” said Curbs wryly, referencing the theater Special Instructions that spelled out authorized radio transmissions in exacting detail. The instructions were so precise that there was a persistent rumor of pilots who had lost their theater qualification for getting a single word wrong. And Sleazy had just gone completely off-script.

“Not quite,” agreed Sleazy, letting out a breath. “Don’t worry, I’m pretty sure you won’t have to do the requalification training with me.”

Any further contemplation was cut off by a return radio call, delivered in English so pristine and mellifluous that it might have been from a professional actor.

“American aircraft,” said the voice. “This is the Chinese Coast Guard patrol cutter Haijing 1126. You and the paramilitary fleet of boats off the Diaoyu Islands are in Chinese territory and are in an area of live-fire operations.

Please exit the area to the east, or there may be unintentional damage to your vessels or aircraft.”

Time to call their bluff, thought Sleazy, hoping desperately that it was true.

Haijing 1126,” he responded, ensuring that he kept using his cool radio voice, “this is an MQ-9 aircraft with a full-motion, high-definition, video feed of your actions. Any attempted ‘accident’ will be broadcast live to the world and recorded for history. If you do not believe me, I invite you to tune in to the broadcast yourself.”

He slowly read out the website for the live stream, to no immediate response from the Chinese. But a couple minutes later, the viewer count began climbing rapidly. Most of the new viewers were smart enough to route through a VPN, but apparently some of his new Chinese audience was in too much of a rush to bother. Satisfied that his message had gotten across, he returned to the radio.

Haijing 1126, this is the United States military. I assume you have now seen our live feed. Any hostile act against this aircraft or Japanese ships in the area will be a public act of violence and aggression.”

He bit back the instinct to add “and get the hell out.” The Chinese ships needed a way to leave without losing face, and they couldn’t do that if it looked like they were following American imperialist direction. He bounced his leg nervously as he waited for a response, shaking the cockpit until Curbs looked over, annoyed. He stopped and focused on flying a precise figure eight in the sky over the Senkakus while they waited.

“American aircraft,” said the Chinese voice, abruptly. “Your presence is illegal, as is the presence of unauthorized fishing ships. We have noted the hull numbers of all ships involved and will be issuing citations for unauthorized fishing operations. We will also file a complaint and issue a fine for the unsafe operation of an aircraft inside an Air Defense Identification Zone. Haijing 1126 out.”

“They’re changing course,” said Curbs, amazed. “I can’t believe that worked.”

Sure enough, Sleazy could see the small fleet breaking up. The RO/ROs turned ponderously back onto a course toward the mainland, as the Coast Guard ships split off to pick up a standard patrol route. Over the next few minutes, the video quality snapped back to high-definition normality as the jamming between cockpit and aircraft disappeared. At the same time, the persistent static on the tactical frequencies cleared, and aircraft began checking back in. The East China Sea was returning to its normal uneasiness.

“Well,” said Sleazy. “I’m not paying that fine.”

Captain James Schmitt is an MQ-9 pilot with more than 2,500 combat and combat-support hours. He currently serves on the Air Staff and is a graduate student in strategic studies at Norwich University. He is a graduate of American University’s School of International Service and the U.S. Air Force Weapons School.

Featured Image: “MQ-9 Reaper” by Neakster via Artstation.

Fostering the Discussion on Securing the Seas.