Navy Information Warfare — What is it?

By Richard Mosier

Defining a warfare area’s mission and function is the foundation for all activities required to conduct mission area analysis to determine requirements, develop doctrine and tactics, and structure, train, and equip the fleet to accomplish the mission.

Within the U.S. Navy, the terms Information Warfare (IW), Information Operations (IO), and Information Operations Warfare are widely used but not well defined. Nor are they linked to provide coherent definitions from joint and service perspectives that are essential to successful communication regarding IW’s relationship to other warfare areas and supporting activities. The result is confusion and a lack of progress in structuring, training, and equipping the U.S. Navy to perform this emerging predominant warfare area.

The following are examples of how these terms mean different things to different groups:

Reference: Station Hypo, 14 Jul 16, “CWOBC, a Community’s Course“: “The Cryptologic Warfare Officer Basic Course (CWOBC) formerly known as the Information Warfare Basic Course (IWBC) is an entry level course for all officers, regardless of commission source, who are coming into the Cryptologic Warfare Officer (CWO) community. Six weeks in length with an average annual throughput of 154, the course focuses on Signal Intelligence (SIGINT), Electronic Warfare (EW), Cyber Operations, as well as security fundamentals and community history.” Inasmuch as the content of the basic course remained the same, the terms “Information Warfare” and “Cryptologic Warfare” appear to mean the same thing for this group.  

150828-N-PU674-005 PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration. (U.S. Navy photo by Carla M. McCarthy/Released)
PENSACOLA, Fla. (Aug. 28, 2015) Officers attending the Information Professional Basic Course at Center for Information Dominance Unit Corry Station listen to Rear Adm. Daniel J. MacDonnell, commander of Information Dominance Corps Reserve Command (IDCRC) and Reserve deputy commander of Navy Information Dominance Forces (NAVIDFOR). Macdonnell spoke with them about career opportunities in the Information Dominance Corps and active and reserve integration. (U.S. Navy photo by Carla M. McCarthy/Released)

Reference the BUPERS Information Warfare Community Management web page. It only addresses Information Professionals (1820), Cryptologic Warfare Specialists (1810), Cyber Warfare Engineers (1840), Intelligence Officers (1830), and Oceanography Specialists (1800), implying that together this aggregation of legacy support specialties constitutes Information Warfare. All of these are restricted line designators that by definition exercise command only over organizations that perform these specialties. There are no unrestricted line designators for specializing in and exercising Information Operations Warfare Commander (IWC) functions described in Naval Warfare Publication NWP 3-56 below.

Reference: NAVADMIN 023/16, DTG 021815 Feb 16, Subject: Information Dominance Corps Re-designated Information Warfare Community. The message states Information Warfare’s mission is: “providing sufficient overmatch in command and control, understanding the battlespace and adversaries, and projecting power through and across all domains.” This description of the Information Warfare mission is substantially different from the definition of Information Operations defined by Secretary of Defense, adopted by the JCS, and reflected in Naval Warfare Publications.

The Secretary of Defense defines Information Operations in DOD Directive 3600.1, dated May 2, 2013, as: “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” This definition was incorporated in Joint Pub 1-02 and Naval Warfare Publications.

Naval Warfare Publication (NWP) 3-13 Information Operations, Feb 2014, defines Information Operations as: “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.” Paragraph 1-3 states: “Evolving joint and Navy doctrine has refined IO as a discrete warfare area, not just a supporting function or enabling capability, and the IE [information environment] as a valuable and contested part of the battlespace.”

160123-N-PU674-018 PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company's network. (U.S. Navy photo by Carla M. McCarthy/Released)
PENSACOLA, Fla. (Jan. 23, 2016) Information warfare Sailors from the Center for Information Dominance Unit Corry Station mentor high school students during CyberThon, an event designed to develop the future cybersecurity workforce. Hosted by the Blue Angels Chapter of the Armed Forces Communications and Electronics Association, CyberThon challenged the students to play the role of newly hired information technology professionals tasked with defending their company’s network. (U.S. Navy photo by Carla M. McCarthy/Released)

Naval Warfare Publication (NWP) 3-56, subject: Composite Warfare Commander, Feb 2010, Paragraph 3.7 identifies twenty-three typical functions assigned to the “Information Operations Warfare Commander (IWC)” that are summarized below:

  • Planning IO, EW, Military Deception, Operations Security, PSYOP, and Spectrum Usage.  
  • Developing, coordinating, and practicing preplanned responses for counter-surveillance, counter-influence, and counter-targeting in response to changes in the tactical situation.        
  • Recommending the EMCON profile and coordinating with ASWC to manage acoustic emissions in response to changes in the tactical situation.
  • Controlling ES and EA assets, and coordinating employment of ES and cryptologic sensors.
  • Conducting computer Network Defense (CND) and COMSEC monitoring.
  • Paragraph 4.3.4 states; “The IWC establishes and maintains the tactical picture….” It also states: [T]he IWC ….. achieves and maintains information superiority….and supports other warfare commanders.”

The term Information Operations is officially defined and documented. The term Information Warfare, though used extensively within the Navy, is not clearly defined, nor is it linked to Information Operations, resulting in confusion and limited progress.

VADM Jan Tighe assumed duties as OPNAV N2/N6 and Director of Naval Intelligence in July 2016. Image credit: US Navy
VADM Jan Tighe assumed duties as OPNAV N2/N6 and Director of Naval Intelligence in July 2016. (U.S. Navy photo)

For example, within the OPNAV Staff the N-2/N-6 carries the title Deputy Chief of Naval Operations for Information Warfare. He/she leads the “Navy Information Warfare Community” which so far is composed only of the legacy support specialties of Intelligence, Cryptology, METOC and IT. To date, there is little to suggest that the OPNAV N-2/N-6 has assumed responsibility for mission analysis, requirements definitions, and structuring, training, and equipping the fleet to achieve superiority over an adversary through Information Operations. Moreover, there is little suggesting recognition that Information Operations Warfare Commander (IWC) functions require performance in a command capacity (IWC), specialized training, and substantial systems functionality that has to be integrated with, rather than separate from, the combat systems that support other warfare areas.

CNO NAVADMIN 083/12, DTG 121702ZMAR12, Subject: OPNAV Realignment, lays out that the DCNO for Warfare Systems (N9) “is responsible for the integration of manpower, training, sustainment, modernization, and procurement readiness of the Navy’s warfare systems.” The N9 supplies leadership, guidance, and direction to the directors of Expeditionary Warfare (N95), Surface Warfare (N96), Undersea Warfare (N97), and Air Warfare (N98). The organization also oversees requirements and resource allocation across these warfare areas. Information Operations is not mentioned. From all indications, the N9 is not responsible for integrating IW/IO combat system functionality with the combat systems that support planning and execution in the traditional warfare areas. Given the functions of the IWC summarized above, combat systems integration is essential for mission success. This suggests the need for a well defined relationship between the N-9 and the N-2/N-6.

In order to eliminate confusion and realize the potential contribution of Information Operations to naval warfare, the U.S. Navy needs to formally (1) define the IW mission, (2) specify IW functions to be accomplished by personnel, organizations, and systems, and (3) assign IW organizational responsibilities. The following are proposed definitions.

Mission

Per JP 1-02, Information Operations is “the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting our own.”  

This definition, focused on “operations” or “employment” would be retained.  However, it does not satisfy the JP 1-02 criteria of “mission”: “The task, together with the purpose, that clearly indicates the action to be taken and the reason therefore.”  The mission statement should be focused not on employment, but on the warfare task, purpose, action to be taken and the reason therefore. This translates to the need for the term “Information Warfare.” The following is offered as a statement of the mission of Naval Information Warfare:

That portion of naval warfare in which operations are conducted to influence, disrupt, corrupt, or usurp the enemy’s human and automated decision making to gain warfighting advantages over the adversary, while protecting our own.

Functions

JP 1-02 defines “Function” as: “The broad, general, and enduring role for which an organization is designed, equipped, and trained.” The following is offered as a statement of the functions of Navy Information Warfare:

Naval Information Warfare functions are to achieve superior situation awareness and combat command decisions; influence enemy decisions; deny the enemy information superiority; disrupt enemy decision making; and  protect and defend own force information and information systems from external or internal threats.

Tasks

JP1-02 defines “Task” as: A clearly defined action or activity specifically assigned to an individual or organization that must be done as it is imposed by an appropriate authority. A discrete event or action that enables a mission or function to be accomplished.”

IW tasks are those tasks considered essential for the accomplishment of assigned or anticipated missions. After defining IW mission and functions, mission area analysis can proceed to identify mission essential tasks, and define required operational capabilities derived therefrom.

In summary, IW is a predominant warfare area that has the unrealized potential to be a major factor in prevailing in naval warfare with a near-peer adversary through the employment of Information Operations. A clear definition of IW missions, functions, and assignment of responsibilities for requirements, resource sponsorship, acquisition, and combat systems integration would serve to place this warfare area on a firm footing and serve a foundation for the realization of its significant potential contribution to combat success.  

Richard Mosier is a former naval aviator, intelligence analyst at ONI, OSD/DIA SES 4, and systems engineer specializing in Information Warfare. The views express herein are solely those of the author.

Featured Image: PENSACOLA, Fla. (Feb. 3, 2011) The Center for Information Dominance (CID) has become the first non-operational shore command approved for the newly created Enlisted Information Dominance Warfare Specialty pin. (U.S. Navy photo by Gary Nichols/Released)

China’s Reactions to the Arbitration Ruling Will Lead It Into Battles It Won’t Win, Part II

Part I examined the military implications of China’s continued “military” actions versus Japan in the East China Sea or the United States and other countries in the South China Sea if China were to establish an ADIZ. Part II examines whether China has real economic or trade leverage to force other countries, including the United States, to support its point of view regarding the ruling. Part II also analyzes the related question of whether there are costs to China from continuing to ignore the legal ruling and ways in which China can be legally compelled to comply.

By Mark E. Rosen 

Embargoes and Sanctions

Shortly after the Tribunal ruling, China’s Deputy Minister of Trade was careful to encourage Chinese citizens to not boycott the U.S. and the Philippines; however, that does not mean that sanctions and boycotts are off the table. Bloomberg reported on August 4th that China will likely resume trade retaliation tactics against South Korea for its decision to deploy U.S. THAAD missiles to counter North Korean missile launches. Korea’s International Trade Association has identified 26 measures currently in place to restrict trade and is expecting more non-tariff barriers such as bogus safety inspections of inbound products, establishment of new licensing requirements, and manipulation of quarantine and safety inspections to frustrate Korean imports.   

The above actions are not unprecedented. In 2000, China banned all imports of South Korean mobile phones and polyethylene in retaliation for Seoul’s increase of duties on Chinese Garlic. In 2010, Chinese Customs Officials halted the shipments of rare earth minerals destined for Japan (for user in hybrid cars, wind turbines and guided missiles) as a form of protest for detention of a Chinese fisherman fishing near the Senkakus. The United States has also been victimized by China’s extensive unfair trade practices (dumping and illegal subsidies), theft of intellectual property, and hacking of U.S. companies. Working within the WTO system, the U.S. has filed a record number of suits versus China in the WTO on behalf of U.S. poultry producers and is now considering the unilateral institution of a total ban on Chinese steel imports because of illegal price fixing and other illegal actions by Chinese steel producers.  

The use of non-tariff barriers has been a favorite ploy by countries to sneakily frustrate imports to protect local producers while at the same time staying compliant with WTO rules. As for embargoes, WTO (Art 21) recognizes that states can impose measured national security, health, and welfare controls on both exports and imports to protect their citizens’ “essential security interests” or to prevent the proliferation of weapons. Using this exception, China passed a new national security law in 2015 which required foreign technology companies to be “secure and controllable” by Chinese National Security Agencies as a way of pushing out foreign technology firms like Microsoft, Apple, and Cisco in favor of local suppliers. However, there are limits to this type of activity, as witnessed in the 1998 Shrimp Turtle Decision in which a WTO Panel found that a U.S. ban on shrimp from India, Malaysia, Thailand and Pakistan (because those states shrimp fishermen had allegedly killed Sea Turtles) was illegal because controls can only be used to immediately protect one’s own citizens from harm. Controls cannot be used to “send signals” or indirectly pressure an exporting state to reform.

In the short term, China has considerable legal room to maneuver should it wish to impose national security controls or erect non-tariff barriers to punish Japan, the United States, the Philippines, and others for opposing them in maritime disputes. WTO cases are very time consuming to document and litigate. However, that same legal maneuver space can also be exploited by the United States and others to frustrate Chinese imports. Therefore, China should do the math and assess whether they have more to gain or lose by instituting de facto embargoes.  

In 2015, China amassed a $365 billion merchandise trade surplus with the United States. Chinese businesses have put this cash to good use by investing in new plants and equipment, educating its young people abroad, and investing billions in the U.S. and other safe offshore markets. This is not unique to the U.S.; China has a global trade surplus of $600 billion.  It continues to have small trade deficits with Japan and South Korea and its principal imports are electrical and industrial machinery (no. 1 and 3), oil (no. 2), and ores (no. 4). This cursory analysis of China’s economy overwhelmingly demonstrates that China is highly dependent on international trade to fuel its economy. China’s offshore investments of its U.S. trade surplus helps China  diversity its holdings outside of Asia. China is also heavily reliant on international suppliers for the raw materials it lacks and risks a great deal by starting a trade war in which it is deprived access to the U.S. and other foreign markets.

History confirms that China would likely suffer more than the U.S. or Japan, Australia, and the Philippines as a result of an embargo. Tough Allied embargoes against Nazi Germany and Italy proved ineffective when self-interest among allied business interests caused the embargoes to leak or, in the case of Germany, forced innovation when Germany developed synthetic substitutes for oil and other commodities. When the U.S. embargoed wheat exports to the USSR in 1973, Canada and Australia picked up the business. The latter is especially important in the current situation. If China were to stop buying Australian ore or Japanese finished products, the world economy is sufficiently diverse to compensate for some of these losses. After the U.S. embargoed exports of scrap iron, steel, and oil to Japan and froze Japan’s assets, Japan was put into the position of having to choose between fighting for additional raw materials or abandoning their plans for a “New Order” in Asia. It is unlikely that any country would launch a Pearl Harbor attack if China were to embargo their products; however, embargoes have a high potential for “blowback” and could result in unintended consequences to the PRC’s overseas businesses, mines, and industrial operations.      

It is also fiction that the U.S. is vulnerable to Chinese action because of its stake in the U.S. public debt (20% foreign owned). In reality, China buys U.S. sovereign debt because it is safe, liquid and can be used by China to finance dollar denominated international transactions (such as oil). China’s central bank also buys U.S. sovereign debt to maintain the exchange rates for renminbi and help drive down the costs of Chinese exports. Also, U.S. sovereign debt is overwhelmingly held by U.S. domestic entities (66%); such that were China to dump its nearly $1 trillion in U.S. debt, that debt will simply be purchased by domestic and foreign purchasers – as happened in August 2015 when China reduced its U.S. debt holdings by $180 billion.  For China, the impact of “a broad scale dump of U.S Treasuries…would be that China would actually export fewer goods to the United States.”  

Sanctions and embargos tend to “leak” because the global market will almost always produce another supplier or purchaser of something that is being withheld from the international market. Philippine bananas and mangos also taste good in Tokyo, Paris, and New York. Given China’s extreme dependence on international trade to fuel its domestic growth and overseas investment, it would be almost suicidal for China to engage in actions that might restrict its access to foreign markets. Likewise, a government-lead boycott of foreign products would, apart from the legal repercussions, would have extremely destructive impacts on its economy since it still relies heavily on imports of agricultural products, industrial equipment (from mostly Japan and Korea), and metal ores for  manufacturing applications. Finally, dumping U.S. debt might cause some angst but, in the long run, U.S. debt instruments would be purchased by investors in the U.S. and other countries.

Continued Trashing of the Tribunal Decision and International Law in General

China continues to condemn the Tribunal ruling. The traditional attacks focused on questions of lack of jurisdiction and “overstepping” its legal mandate. Another Chinese daily’s reported that the Tribunal was a “front” for the United States and “lackey” of outside forces and had an inherent bias because the Philippines paid the “court costs” for the proceeding. A few speculated that China might withdraw from UNCLOS, but China will more likely establish its own arbitral panel to adjudicate the territorial disputes outside of UNCLOS. This later course of action has precedent; recall China’s 2015 establishment of an Asian Infrastructure Bank to finance Asian infrastructure projects outside of the regulation-burdened World Bank system.   

China seems to labor under the perception that the Tribunal Ruling is purely a regional matter and that its impacts end with the states bordering the SCS. China continues to ignore that many countries take the ruling very seriously because the SCS is a maritime superhighway between the Middle East, South Asia, East Africa, North Asia, and Australia. Roughly 60 percent of South Korea’s energy supplies, nearly 60 percent of Japan’s and Taiwan’s energy supplies, and 80 percent of China’s crude oil imports come through the South China Sea. According to a 2015 report from the Council of Foreign Relations:

“Each year, $5.3 trillion of trade passes through the South China Sea; U.S. trade accounts for $1.2 trillion of this total. Should a crisis occur, the diversion of cargo ships to other routes would harm regional economies as a result of an increase in insurance rates and longer transits.”

Money talks. For this reason, states that would ordinarily have been silent registered their support for the Tribunal decision. The EU issued a statement on July 15, underscoring their support for a rules-based order and respect for UNCLOS. The G-7 called on states to “fully implement decisions binding on them in … tribunals under the Convention.” Canada, France, Germany, the UK, Japan, Vietnam, Singapore and the U.S. issued statements support of the ruling. Indonesia, India, South Korea issued more “measured” statements urging China to show restraint and respect for UNCLOS.  

There were some dissenters, but much of the industrial world supported the outcome and expects China to comply. If China continues to signal that it has no interest in conforming to the ruling, China could be excluded from important international negotiations, including, for example, the upcoming negotiation of an agreement under UNCLOS that deals with biodiversity beyond national EEZs. As I suggested in After The South China Sea Arbitration, China could have its privileges essentially suspended in three UNCLOS institutions: (1) the International Tribunal for the Law of the Sea (ITLOS); (2) the International Seabed Authority (ISA), and the (3) the Commissions on the Limits of the Continental Shelf (CLCS).

If China continues its island-building activities and interferes with Philippine fishing in the vicinity of Second Thomas Shoal, Scarborough Shoal, and Mischief Reef, an international court such as the International Court of Justice (ICJ) or ITLOS, could be asked to impose sanctions on the China for flaunting a lawful UNCLOS decision. The case would be predicated on the notion that China cannot take advantage of the benefits of UNCLOS if it lives outside of the law. In practical terms, an injunction could be sought which: recalls China’s judge on ITLOS; blocks the CLCS from any further proceedings involving the Continental Shelf entitlements of China; and lastly suspends both China’s ability to file further deep-seabed mining applications before the ISA and enjoin any further prospecting of its sites in the Indian Ocean. It might also be appropriate for a Tribunal to suspend China’s participation in UNCLOS related bodies including the International Seabed Authority (ISBA) (which writes the regulations for deep seabed mining), the International Hydrographic Organization (IHO) (the charting and oceanography body) and the International Maritime Organization (IMO). The latter action would be especially harmful for China given that the IMO has broad responsibilities to write the rules for merchant ship design, construction, operations, and navigational routes/practices while China has one of the largest merchant marine fleets in the world. 

A meeting of the International Maritime Organization IMO Photo
A meeting of the International Maritime Organization (IMO Photo)

These legal maneuvers would be slow to orchestrate but, like other types of sanctions, could be far-reaching and difficult to reverse once they are put in place. However, China’s continued island reclamation after the ruling, their recent military actions in the vicinity of Scarborough Shoal, and the Chinese Supreme Court’s reaffirmation of the 2012 fishing ban are in direct contravention of the Tribunal’s decision. Since the effects of China’s actions have impacts beyond the Philippines, almost any bordering state,  international organization, or possibly  NGO would have standing to seek to have the Tribunal’s decision enforced since the ICJ (and for that matter ITLOS) has “inherent jurisdiction…to ensure that its exercise of jurisdiction is not frustrated and that its basic judicial functions are safeguarded.”

Conclusion

Inexorably, China is painting itself into a corner in which its escape options become more limited. While it was hoped by officials in the U.S. and elsewhere that China would eventually come to the realization that it needed to capitalize on the favorable aspects of the ruling and “pivot” on those it did not like, that is not happening. The recent military displays in the ECS and SCS, the threatened sanctions towards South Korea, and continued “trashing” of the Tribunal ruling suggest that China is opting for confrontation versus conciliation and now runs the risk of becoming involved in a major military conflict with Japan and perhaps the United States. China says that it is committed to a rules-based order and leadership in Asia but its recent actions say otherwise. Lastly, and perhaps most importantly, pursuit of high risk strategies which could place China’s international trading relations at risk is antithetical to the Chinese Community Party’s 13th Five Year Plan for 2016-2020 to promote balanced international trade, inbound investment, and free trade zones.   

It is entirely possible that China’s leadership does not fully appreciate the dangerous choices their countrymen are making and how their actions are being perceived on the world stage. Military-to-military encounters at sea are occurring on a daily basis, and the potential for a costly misstep increases with each passing day. So too, a miscalculation in the trade or economic arena would likely backfire since China is a trading nation and it can ill afford to have its products excluded from foreign markets. High-level diplomacy and cool heads should be the order of the day.  

A maritime and international lawyer, Mark E. Rosen is the SVP and General Counsel of CNA and holds an adjunct faculty appointment at George Washington School of Law.   The views expressed in this paper are those of the author alone and do not represent the views of CNA or any of its sponsors.   

Featured Image: Triple-E class container ship “Madison Maersk” of Maersk Line loaded with containers is berthed at Nansha port in Guangzhou. (Reuters)

Military Activities on the Continental Shelf

This piece was originally published by the Lawfare Institute in Cooperation with Brookings and is republished with permission. Read it in its original form here.

By James Kraska

The recent Philippine-China Arbitration Award determined that China’s construction of artificial islands, installations and structures on Mischief Reef, Subi Reef, and Hughes Reef were unlawful interference with the Philippines’ exclusive sovereign rights and jurisdiction over the seabed of the exclusive economic zone (EEZ) and continental shelf. Since the three features are low-tide elevations (LTEs), rather than islands, they are incapable of appropriation and are merely features of the Philippine continental shelf, albeit occasionally above water at high tide in their natural state. Although the tribunal’s legal judgment with regard to China’s activities was correct, its reasoning was a bit too categorical. This article adds further fidelity to the tribunal’s determination by distinguishing between lawful foreign military activities on a coastal state’s continental shelf, and unlawful foreign activities on the continental shelf that affect the coastal states sovereign rights and jurisdiction over its resources – a distinction that evaded the tribunal’s analysis.

It is important to understand the lawful scope of foreign military activity on the seabed of a coastal state’s EEZ or continental shelf, as the issue is likely to recur. The Defense Advanced Research Projects Agency, for example, is exploring the idea of “upward falling payloads,” or pre-positioned containers or packages that lie on the ocean floor and wait until activated, at which time they “fall upward” into the water column to perform undersea missions, such as powering other unmanned systems. With some narrow exceptions, such as emplacement of seabed nuclear weapons or seabed mining, the use of the deep seabed is a high seas freedom enjoyed by all States. The more compelling question, however, is the extent foreign states may emplace naval devices or construct installations or structures on the continental shelf or within the EEZ of a coastal State for military purposes.

Article 56(1)(a) of UNCLOS provides that coastal States have certain “sovereign rights for the purpose of exploring and exploiting, conserving and managing the natural resources, whether living or non-living….” in the EEZ. Coastal States also have “jurisdiction as provided for in the relevant provisions [of UNCLOS] with regard to “(i) the establishment and use of artificial islands, installations, and structures.” Under Article 60, coastal States enjoy the “exclusive right” to authorize or regulate the construction of structures, a rule that is extended to the continental shelf by virtue of Article 80. Coastal State jurisdiction over artificial islands and structures is not all encompassing, however, and is limited to jurisdiction “as provided for in the relevant provisions [of UNCLOS].” The relevant provisions of the EEZ, of course, relate principally to exclusive coastal State sovereign rights and jurisdiction over living and non-living resources in the EEZ and on the continental shelf, and not sovereignty over the airspace, water column, or the seabed.

In the recent Philippine-China Arbitration Award, the tribunal determined that China’s artificial island construction on Mischief Reef was an unlawful violation of Philippine sovereign rights and jurisdiction over its continental shelf. Since Mischief Reef is a LTE and not a natural island, it constituted part of the Philippine continental shelf and seabed of the EEZ. China failed to seek and receive Philippine authorization for its artificial island construction, and therefore violated Articles 56(1)(b)(i), 60(1), and 80 of UNCLOS (Arbitration Award, para. 1016).

Foreign States, however, are not forbidden to construct installations and structures on a coastal State’s continental shelf per se. Only those installations and structures that are “for the [economic] purposes provided for in article 56” or that “interfere with the exercise of the rights of the coastal State” over its resources require coastal State consent. (See Article 60(1)(b) and (c)). 

But even if China converts its installations and structures into military platforms, their size and scope are so immense that they dramatically affect the quantity and quality of the living and non-living resources over which the Philippines has sovereign rights and jurisdiction. Although normally installations and structures that are built pursuant to military activities are not subject to coastal state consent, the industrial scale of Chinese activity lacks “due regard” for the rights and duties of the Philippines and its sovereign rights and jurisdiction over resources under Article 56 of UNCLOS.

If China had merely emplaced a small, unobtrusive military installation or structure on the seabed or landed an unmanned aerial vehicle at Mischief Reef as part of occasional military activities, it would not have been afoul of UNCLOS. Such incidental use of the seabed or an LTE (which is part of the seabed) are within the scope of permissible military activity in the same way as emplacement on the continental shelf of a small seabed military device. Foreign States may use the seabed for military installations and structures, and even artificial islands, as these purposes do not relate to exploring, exploiting, managing and conserving the natural resources. Only those military activities that rise to the level of or of sufficient are of such scale that they do not have “due regard” for the coastal state’s rights to living and non-living resources of the EEZ and continental shelf are impermissible.

The distinction is important because creation of the EEZ and recognition of coastal state sovereign rights and jurisdiction over the continental shelf was never envisioned to limit normal military activities. Current and future naval programs, in fact, may utilize a foreign coastal State’s seabed EEZ and continental shelf in a manner that is completely in accord with UNCLOS.

Where do we draw the line, however, between an insignificant presence and negligible interference that is lawful, and large-scale disruption that is unlawful? Like all legal doctrine, what constitutes genuine interference to coastal State sovereign rights and jurisdiction must be reasonable, i.e. not de minimis or trivial, but rather a substantial and apparent effect on the resources in the zone, as I discussed in Maritime Power and Law of the Sea. Emplacement of military devices or construction of military installations or structures in the EEZ and on the continental shelf of a coastal State must be judged by reasonableness, and not be of such scale or cross a threshold of effect that it interferes in a tangible or meaningful way with the coastal State’s resource rights.

China’s operation of military aircraft from a LTE is not a priori unlawful, any more than operation of military aircraft from a warship in the EEZ would be illegal. The reason that PLA Air Force military aircraft flights from the runway at Mischief Reef are objectionable and a violation of the Philippines’ coastal State rights is the magnitude of the activity and its effect on the living and non-living resources. Operation by a foreign warship of a small aerial vehicle that lands temporarily on an LTE, for example, would not be unlawful. Likewise, if a naval force emplaced a military payload inside a container and placed it on the seabed of the EEZ – that is, on the coastal State’s continental shelf – that would also be a lawful military activity.

James Kraska is Howard S. Levie Professor of International Law at the Stockton Center for the Study of International Law, U.S. Naval War College, Distinguished Fellow at the Law of the Sea Institute, University of California at Berkeley School of Law, and Senior Fellow, Center for Oceans Law and Policy, University of Virginia School of Law.

Featured Image: MARCH 10, 2016- Philippine Naval Ship, BRP Sierra Madre, sails near disputed Spratly Islands in the South China Sea (REUTERS/Erik De Castro)

The Israeli Navy in Context

By Guido Weiss

Introduction

Israel is a majority Jewish state located between the Red Sea and eastern Mediterranean, separating the Arabic speaking world in two geographic regions. Approximately the size of New Jersey, its maritime exclusive economic zone (EEZ) is larger than the state itself. According to an assessment from the Tel Aviv-based Institute for National Security Studies (INSS), maritime trade accounts for 99 percent of Israeli foreign trade. Furthermore, 70 percent of Israel’s population lives on the narrow coastal plain between the West Bank and the Mediterranean. This piece aims to provide an overview of the Israeli Navy and the maritime dimension of Israel’s national security.

The Israeli Navy and Geography

Israel’s southern coast is approximately 10 miles in width, leaving the Israeli Navy (IN) a limited region of operations, comparable to Iraq’s maritime border. The southern Red Sea port of Eilat is Israel’s direct maritime access route to the Indian Ocean and the markets of southern and southeast Asia. In the Red Sea, the IN protects sea lines of communication in the narrow waters between Egypt, Jordan, Saudi Arabia, and onward. Israel’s western coastline on the Mediterranean is approximately 110 miles in length. The primary facilities of Israel’s Mediterranean fleet are in the ports of Ashdod (north of the Gaza Strip), Haifa (south of Lebanon), a small presence of patrol ships in Herzliya, and a center for Israel’s Navy Seals equivalent, Shayetet 13, in Atalit.

 (Wikimapia 32.826772, 34.999781)
Haifa naval base. (Wikimapia 32.826772, 34.999781)

The IN is primarily a coastal defense force tasked with protecting Israeli shores from seaborne threats originating in the Gaza strip, Egypt, Jordan, and Lebanon. Israel maintains local maritime superiority against conventional threats and has developed capabilities to combat a variety of asymmetrical threats. Despite this, the IN is capable of performing outside of the Red Sea and eastern Mediterranean. IN corvettes and submarines are known to venture into the Indian ocean to counter threats from Iran and the western Mediterranean to address issues related to North Africa.

Procurement

The IN maintains a robust modernization program. While the Israel Defense Forces (IDF) generally receives the bulk of its military hardware from the U.S., its naval procurements are diverse, including acquisitions from ThyssenKrupp Marine Systems (TKMS) (Howaldtswerke-Deutsche Werft), Aérospatiale, Constructions Mécaniques de Normandie, as well as domestic suppliers such as Israel Aerospace Industries (IAI), Rafael, and DSIT. Active procurement programs include four Sa’ar 6 corvettes (set to begin arriving mid-2019), six Dolphinclass submarines, the Barak 8 missile system, the C-dome, unmanned sea vehicles (USV), eight SH-60F Seahawk helicopters, and Unmanned Aerial Vehicles (UAVs).

A Dolphin-class submarine arrives in the port of Haifa. Source: Reuters
A Dolphin-class submarine arrives in the port of Haifa. (Reuters)

To assist with territorial water (TTW) defense, Israeli companies have developed innovative technological solutions. Such solutions include the implementation of the sonar-based AquaShield Defense System. Designed to prevent sea infiltration, the IN has deployed the AquaShield sonar system near Gaza and the Lebanese maritime borders. This underwater sensor detects potentially hostile underwater movement. The system can reportedly detect an Open Circuit Diver (SCUBA) at a distance of up to 1000 meters and a Closed Circuit Diver (re-breather) at a distance of 700 meters.

Missile Defense

The IN is a leader in sea-based missile defense with programs designed to combat short range rocket projectiles and shorter range ballistic missiles. Strategic planning concerns Hezbollah in Lebanon and Gaza based organizations including Hamas, Islamic Jihad, as well as other regional terrorist entities.

The IN ballistic missile defense apparatus is evolving to combine a Very Short Range Air Defense (VSHORADs) systems, the such as the Counter Rocket, Artillery, and Mortar (C-RAM) C-Dome and Barak 1, as well as a Long-Range Surface-to-Air Missile (LR-SAM) platform, the Barak 8. Israel is incorporating multilayer maritime anti-ballistic systems in a similar fashion to its three well-known land based systems Iron Dome, David’s Sling, and the Arrow system.

The development of anti-missile systems is a high priority for the IN, which has recent memory of missile attacks on its ships. In 2006 Hezbollah successfully attacked the INS Hanit with a Yakhnot (S-800) anti-ship missile, nearly capsizing the ship. In 1967 the Egyptian Navy sunk the INS Eilat using a P-15 Termit anti-ship missile in the first incident of a vessel being sunk by an anti-ship missile fired in anger.

In May 2016 the IN announced a successful launch of the C-Dome system. Designed by Rafael, the C-Dome is a maritime variant of the acclaimed Iron Dome anti-rocket and projectile system operated by Israel’s Air Force. In addition to C-Dome, the IN maintains the Barak 1 and Barak 8 systems. The Barak 1, which is to be phased out, has a reported range of 5-12 km while the joint Israeli-Indian developed Barak 8 has a reported range of approximately 70-100 km. Facilitating these platforms is the incorporation of the domestically produced iMulti-Function Surveillance, Track and Guidance Radar (MF-STAR) radar system, developed by Israel Aerospace Industries’ (IAI) Elta.

Protecting Offshore Oil Platforms

A major component of the IN’s developing maritime strategy is offshore Oil platform (OPLAT) protection. Since the discovery of natural gas in the Tamar and Leviathan fields off of Israel’s west coast, Israel has dedicated naval resources to OPLAT development and protection. To protect Israel’s Mediterranean shores, the IN has a fleet of patrol boats including the Shaldag class and Dvora Mark III. Additionally, Israel is using USVs, particularly the Rafael system’s Protector. USVs play a role in providing surveillance as well as dealing with asymmetric contingencies. Such scenarios include the use of a suicide-explosive rigged boat attack or waterborne improvised explosive devices (WBIED), rocket salvos, and the takeover of an oil platform by a terrorist entity.

IN1
Characteristics of Israel’s Marine Space. (Technion Institute of Technology)

Sea Interception, Infiltration, and Blockade

The IN is experienced in implementing sea denial strategies in times of conflict. The IN conducted a naval blockade on Lebanon during the 1982 war, Operation Peace for Galilee, where its submarines provided early warning information for blockading vessels. Israel’s navy enforced a blockade on Lebanese ports again during the 2006 Lebanon War. From 2007 until today the IN has enforced a blockade of the Gaza strip. The Gaza strip blockade is an effort to prevent the transfer of arms and building materials to the Hamas terrorist organization that is currently in control of Gaza. Patrols intermittently come into contact with fishermen from Gaza who have claimed that Israel enforces the maritime policy inconsistently. After a policy change in March 2016, the IN now permits Gaza fishermen to travel up to nine nautical miles from Gaza’s coastline.

Most recently, Hamas attempted to form a naval commando unit. During the 2014 war with Hamas, Operation Cast Lead, Hamas commandos briefly stormed the Zikim beach north of the Gaza strip. In May 2015 Israel’s internal security service, Shin Bet, intercepted 40 dive suits hidden inside sport suits en route to the Gaza Strip.

IN6
IN’s Shayetet 13 conduct an underwater maneuver. (Ynet)

The IN has demonstrated its ability to operate successfully outside of its immediate coastal area including visit, board, search, and seizure (VBSS) missions. In 2014 IN commandos of Shayetet 13, a unit frequently compared to the U.S. Navy Seals, conducted Operation Full Disclosure, a VBSS mission targeting the Iranian “Klos C” sailing under a Panamanian flag en route from Iran to Port Sudan, 930 miles from Israeli waters. The ship’s cargo included several dozen M-302 missiles, reportedly of Syrian origin. The IDF Spokesman unit claimed  the weapons were en route to Hamas.

Sea to Surface Targeting and Special Operations

In the past decade the IN targeted shore-based threats in both Gaza and Lebanon and directly supported ground forces inside of enemy territory while conducting isolated attacks on enemy positions. The most recent display of sea-to-surface targeting was the targeting of Hamas positions in the Gaza Strip amidst Operation Cast Lead. During Operation Cast Lead, Israeli corvettes reportedly targeted militants in the Gaza strip with Gil or Spike-MR guided missiles. In 2006 the IN is said to have fired 2,500 rounds at Lebanese targets in the 2006 July-August Lebanese war.

Warning: Graphic Content. Israeli Navy fires on Hamas seaborne infiltrators during Operation Protective Edge in July 2014. (Israeli Navy)

During the Second Lebanon War, Shayetet 13 raided an apartment block in Tyre, Lebanon believed to be a staging site for rockets being launched into Israel. During the summer 2006 war, the Israeli Navy bombarded Hezbollah positions, infrastructure, and access routes to the Lebanese coastline. In the 1982 conflict Operation Peace for Galilee the IN inserted IDF units behind enemy lines north of Palestinian Liberation Organization (PLO) – Syrian positions. It was during the 1982 war that the IN demonstrated its ability to conduct an amphibious assault that included troops, tanks, and other vehicles.

Cyber Defense

The IN maintains a cyber defense unit known as MAMTAM (Information Systems, Processes, and Computerization unit). MAMTAM maintains three separate branches: cyber, technology, and operations and industry. According to an officer from MAMTAM, the unit deals with IT and IP networks. The Israeli Navy experienced attempts to breach its cyber networks during Operation Protective Edge in 2014 against the Gaza based Hamas terrorist group. Additionally, the IN plans to incorporate modernized C4i (Command and Control, Communications, Computers and Intelligence) systems into its fleet, particularly with the expected arrival of Sa’ar 6 corvettes.  

Second Strike Capability and Nuclear Deterrence

The IN is suspected of possessing nuclear weapons, an accusation that has traditionally neither been confirmed nor denied by the Israeli government. The Israeli submarine program is believed to incorporate second strike nuclear capabilities for strategic deterrence. In December 2015 Israel’s fifth Dolphin class submarine was delivered by Germany’ ThyssenKrupp Marine Systems (TKMS). Dolphin class submarines have reportedly been armed with submarine-launched cruise missiles (SLCMs).

Security Cooperation with the U.S. Navy

In the eastern Mediterranean, the U.S. Navy port call in Israel is among the most secure and productive for U.S. operations in the region. Haifa offers a friendly port south of Greece and Turkey and north of Djibouti. U.S. security assistance and coordination with Israel has only increased in the past decade. However, the IN is not able to publicly participate in U.S.-led operations such as Combined Joint Task Force – Operation Inherent Resolve (CJTF-OIR). Due to ongoing tensions with Arab and Muslim majority countries, the IN cannot conceivably participate in multinational regional operations, whether against ISIS in Iraq and Syria or the Saudi war with factions in Yemen. For similar political considerations, Israel was also not able to publicly participate in U.S. efforts during the Gulf War, Operation Desert Storm. Israel and the Palestinian Territories also fall under under the AOR of U.S. EUCOM rather than the seemingly more logical CENTCOM, where the majority of the Middle East falls.

Photo of US-Israeli Naval Exercise in February 2016. Source: IDFSpokesman
U.S.-Israeli naval exercise in February 2016. (IDFSpokesman Twitter)

In addition to India, the U.S. plays a critical role in Israeli missile defense scenarios. EUCOM engages with Israel through its Strategic Cooperative Initiative. The USN participates in maritime Ballistic Missile Defense (BMD) patrols in cooperation with Israel and can deploy when requested to assist Israel with ballistic missile threats. Furthermore, U.S. Aegis platforms have supported bi-annual U.S.-Israel wargames dubbed “Juniper Cobra.” Finally, EUCOM supports Missile Defense Agency test events in coordination with Israel.

In September 2016, a joint U.S-Israel Commission on the Eastern Mediterranean made up of policymakers and former flag officers from both countries noted the potential benefits of U.S. ships hypothetically homeported in Haifa. Benefits included “increased (and stabilizing) presence, deterrence of Benghazi-style attacks, assistance with non-combatant evacuations, and security for drilling rigs, liquefaction plants, and pipeline terminals.”

Closing Remarks

Israel is a small country, with a total land area approximately the size of New Jersey. The active duty navy is estimated at 10,000 mostly conscripted personnel, a force significantly smaller than that of many U.S. Navy bases. Few existing Navies are tasked with similar challenges to those of the IN in a comparable amount of surface space. While its landmass is limited, the maritime sphere allows Israel to gain some form of strategic depth. This is particularly important when the country is less than 11 miles wide at specific locations and has fought conventional and asymmetric wars throughout its existence.

Guido Weiss is an Operations Specialist (OS) in the Navy Reserve and works as a researcher on security and military issues in Iraq. He holds an M.A. in Islamic and Middle Eastern Studies from the Hebrew University of Jerusalem. The views expressed here are of Guido’s alone and do not represent the U.S. Navy or any other organization of the U.S. government.

Featured Image: Israeli naval cadets (DoD photo by Mass Communication Specialist 1st Class Chad J. McNeeley, U.S. Navy.)

Fostering the Discussion on Securing the Seas.