China’s Evolving Perspectives on Network Warfare: Lessons from the Science of Military Strategy

This article by Joe McReynolds originally appeared in the Jamestown Foundation’s China Brief and can be found in its original form here

When tracking the development of China’s military capabilities, Western People’s Liberation Army (PLA) watchers encounter frequent challenges in determining which data sources they should draw upon for their analysis. Purely quantitative measurements of the PLA’s nominal force strength, though often valuable, may not provide insights into challenges the PLA faces in the real-world execution of its missions, while writings on Chinese military strategy by any given PLA author may not reflect the PLA’s broader institutional stance or limitations imposed by inadequate material capabilities.

If one analyzes China’s approach to network warfare in particular, these challenges are multiplied. [1] “Cyber weapons” are not publicly viewable and quantifiable in the same sense as submarines or aircraft, and often the PLA will not admit even their existence. And just as in U.S. discussions of “cyber war,” charlatans and self-promoters abound; although it is easy to find writings by PLA officers theorizing loosely and grandiosely about information warfare, they are often speaking only for themselves rather than for their respective military institutions.

Roughly once every 15 years or so, however, the PLA’s influential Academy of Military Sciences (AMS) issues a new edition of The Science of Military Strategy (SMS), a comprehensive, generally authoritative study of the PLA’s evolving strategic thought that escapes much (though not all) of the shortcomings of other PLA original sources. The AMS plays a much more central role in the formation of China’s military strategic thought than its academic counterparts in the United States, and the SMS is its flagship external product. It is the result of dozens of high-level PLA authors working together over a period of years to produce a heavily vetted consensus document.

As a result, each new edition of the SMS is closely scrutinized by China hands in the West for the valuable insights it provides into the evolving thinking of the PLA on a range of strategically important topics. The newest edition of the Science of Military Strategy has recently been released, with Western PLA analysts beginning to obtain copies since summer 2014. Although no English translation is currently available, a book forthcoming this year from The Jamestown Foundation, China’s Evolving Military Strategy, will aim to convey the central insights contained within this important new document to Western policy and analysis audiences.

The SMS is a particularly valuable resource for understanding China’s evolving strategic approach to network warfare. A study that aims to be as comprehensive as the SMS cannot afford to ignore network warfare due to the centrality of information warfare to modern war-fighting, and the process by which the SMS is written ensures that the information analysts receive on network warfare represents something approaching an authoritative consensus within the PLA. The following are the most important revelations from the new SMS on the PLA’s approach to network warfare:

The Fig Leaf is Gone: China’s Network Warfare Forces Are Now Explicitly Acknowledged

In recent years, official PLA publications have repeatedly issued blanket denials of offensive activities in the network domain, such as that “the Chinese military has never supported any hacker attack or hacking activities” (China Armed Forces / 中国军队, No. 20, 2013) even as the evidence conclusively attributing various large-scale cyber intrusions to China has continued to mount. The release of the new SMSremoves that barest fig leaf of plausible deniability. The SMS not only explicitly acknowledges that China has built up network attack forces, but divides them into three types:

  • The PLA’s “specialized military network warfare forces” (军队专业网络战力量), which are military operational units specially employed for carrying out network attack and defense
  • “PLA-authorized forces” (授权力量), which are teams of network warfare specialists in civilian organizations such as the Ministry of State Security (MSS), the Ministry of Public Security (MPS) and others that have been authorized by the military to carry out network warfare operations
  • “Non-governmental forces” (民间力量), which are external entities that spontaneously engage in network attack and defense, but can be organized and mobilized for network warfare operations

This is the first time an explicit acknowledgement was made of the existence of China’s secretive network attack forces from the Chinese side, and it is particularly noteworthy that this acknowledgement extends beyond the military domain and into the network warfare capabilities of civilian government agencies. The AMS’s statement that China’s civilian network attack forces operate under the PLA’s “authorization” may speak to an ongoing power struggle within the Chinese system between the PLA’s leadership and the aforementioned civilian government organs to determine who truly oversees Chinese actions in cyberspace; as unprecedented as it is to have the Chinese military acknowledge the existence of its network attack forces, having a PLA publication be the first to announce the existence of such secretive forces inside the civilian government is particularly unusual, and may represent an attempt to “plant the flag” for the PLA.

This could also seriously complicate China’s international efforts at law enforcement cooperation on cybercrime. The MPS, which is more or less “China’s FBI,” has assisted more than 50 countries in investigating over a thousand cases of cyber-crime in the past decade, and China has established bilateral law enforcement cooperation with over 30 countries (including the United States, the United Kingdom, Germany and Russia), often including a cyber-crime component (China Armed Forces, 2013). With the Chinese now explicitly acknowledging that the MPS has network warfare forces stationed within it, the United States and other targets of Chinese state-sponsored hacking will have to weigh carefully whether cooperation with the MPS on cyber-crime is worth the risks.

Blurring the Divide Between the Military and Civilian Realms

In keeping with Chinese President Xi Jinping’s recent statements that “without network security there is no national security” (PLA Daily, October 7, 2014), the authors of the new SMS break from the previous edition’s vague talk of overall information warfare objectives to concretely assert the centrality of cyberspace power to China’s overall ability to project national power, engage in strategic deterrence, and defend itself in a conflict. However, this “network domain,” which has become so central to the PLA’s warfighting, exists primarily as civilian infrastructure and is used globally for civilian purposes. As a result, although development of elite network warfare personnel remains central to the PLA’s ongoing cyber mission, the authors of the SMS focus an unusual amount of their energies examining the importance of civilian information technology and the civilian Internet to network warfare.

First and foremost, the authors believe that civilian infrastructure in foreign countries can be targeted more freely with network warfare than with conventional weapons, without provoking the degree of conflict escalation that a conventional attack on civilian targets would. This echoes an idea known as “unrestricted network warfare” long advocated by some of the PLA’s more hawkish network warfare theorists, and its presence in an authoritative work such as the SMS suggests that more aggressive voices may be gaining ground in the PLA’s internal deliberations on network warfare strategy (See Dong Qingling and Dai Changzheng, “Deterrence in the Network Space: Is Retaliation Feasible?”). To put it simply, they believe that the old playground sports adage of “no blood, no foul” applies to network warfare, even if the attack in question has debilitating effects on civilian infrastructure, and in a conflict scenario they may advocate that the PLA chooses its targets accordingly.

Second, the authors of the SMS acknowledge that China’s civilian information technology (IT) industry functions as a core component of China’s overall power in cyberspace. Since the development of China’s network warfare capabilities relies heavily on human talent and the civilian IT industry is where the bulk of China’s IT talent is found, PLA analysts believe that civilian industry will continue to serve as an important source of technical talent and human capital for the PLA’s network warfare operations to a degree that is disproportionate to the PLA’s reliance on civilian industry in other realms of warfare. The authors also emphasize the fact that despite recent advances in Chinese IT, key state-of-the-art networking technologies are still advanced primarily in the West, and the bulk of the Internet’s core architecture is controlled by the United States and its allies. Thus, what the West views as the neutral “status quo” of the network domain is, to China, an intolerable “network hegemony” (????) imposed by the United States and others. Based on the increasing prominence of these sentiments within the PLA, the prediction one sometimes hears in the West—that China’s IT development will one day transform it into a “mature” partner interested primarily in cyberspace cooperation to preserve our “mutual” interests—appears likely be overly optimistic. The PLA’s stated intentions to mobilize its civilian IT industry as a component of national power in both peacetime and wartime must be accounted for in the calculus of determining whether any given Sino-U.S. information security cooperation is in the United States’ national interest.

“Salami-Slicing” in Cyberspace and Planning for Resilience in the Face of the Inevitable

The SMS authors also focus heavily on the central role of peacetime “network reconnaissance”—that is, the technical penetration and monitoring of an adversary’s networks—in developing the PLA’s ability to engage in wartime network operations. As the SMS puts it, since the technical principles underlying successful penetrations of an adversary’s systems are essentially the same whether the objective is reconnaissance or active disruption, at the appropriate moment “one need only press a button” to switch from reconnaissance to attack.

Despite this ambiguity of intent, since network reconnaissance is both non-destructive (at least initially) and widely engaged in by all nations for the purposes of espionage, the SMS authors believe it has been clearly demonstrated that the act of network reconnaissance alone is unlikely to lead to escalation or the outbreak of war. As a result, PLA strategists appear to have arrived at a strategic understanding of peacetime network operations similar to China’s “salami slicing” tactics for asserting control of disputed islands in the South China Sea: a pattern of taking actions during peacetime that incrementally put China into a superior tactical position should conflict ever break out but that, which while provocative and unwelcomed by China’s neighbors, are unlikely to lead to direct conflict in and of themselves. If conflict eventually does break out, China will be in a better position than they otherwise would; if it does not, they will have incrementally gained much of what they desire without a fight.

PLA analysts understand, however, that network reconnaissance is not by any means one-sided, and believe that just as they are actively attempting to penetrate the networks of their adversaries, the PLA’s networks are likely being repeatedly breached as well. Furthermore, they argue that since China’s “main strategic opponent” (their euphemistic way of referring to the United States) has superior network warfare capabilities, the strict balance of power in a network-domain conflict would not necessarily tilt in China’s favor. As a result, the SMS emphasizes that the PLA must plan for a future of network warfare in which its defenses will inevitably be breached, military networks will at times be taken down by hostile adversaries, and China’s modernized C4ISR systems cannot be fully relied upon. [2] Although they do call for a major effort to strengthen China’s network defenses, this is undertaken in the hope that those defenses will not catastrophically fail, without any expectation that they will fully withstand outside attacks.

For Western military analysts, this line of thinking should trigger particular attention and concern. With China preparing for conflict in the network domain under the assumption that from the outset their information networks will quickly be heavily degraded and only partially functional, there will be a strong incentive in a conflict for the PLA to push the envelope of what is globally considered legitimate in areas such as anti-satellite warfare. The intersection of U.S. technological reliance on space-based C4ISR systems with its distance from East Asia will multiply this incentive, as China will (all other things equal) be able to do “more with less” in its immediate backyard.

Much of the focus by Western analysts when examining China’s approach to anti-access/area-denial (A2/AD), also known as “counter-intervention,” has centered on the physical realm of warfare, including the use of precision-guided munitions reliant on C4ISR. However, as the insights contained in the newSMS demonstrate, this discussion is fundamentally incomplete if it does not take into account China’s evolving approach to network and information warfare. Rightly or wrongly, many Chinese analysts believe that the United States currently possesses what they term a “no satellites, no fight” military force, and in a major conflict scenario they appear increasingly likely to put that presumption to the test.

Notes

  1. Rather than mirroring the United States’ ‘cyber’ concept, PLA writing speaks at the broadest level of the ‘information domain’ and ‘information warfare,’ with network, electromagnetic, psychological, and intelligence warfare each taking place as distinct components of that broader concept. The PLA concept of “network warfare” is roughly analogous to the current United States cyber concept, though not always identical in its details.
  2. C4ISR stands for command, control, computers, communication, intelligence, reconnaissance and surveillance.

Joe McReynolds is a Research Analyst at Defense Group Inc.’s Center for Intelligence Research and Analysis. His research interests primarily center on China’s approach to computer network warfare and defense science & technology development. Mr. McReynolds has previously worked with the Council on Foreign Relations and the Pacific Council for International Policy, and is a graduate of Georgetown University’s School of Foreign Service and Graduate Security Studies programs. He speaks and reads Chinese and Japanese, and has lived and studied in Nagoya, Guilin and Beijing.

Assessing the U.S. Navy’s Arctic Roadmap

By Andreas Kuersten

Shielded by a significant expanse of sea ice, the Arctic Ocean has historically had limited naval strategic relevance outside of submarine and early warning operations.  But the process of climate change is increasingly melting away this covering and laying bare previously inaccessible northern waters.  As a result, and in concert with the region’s vast natural resource endowments and potential shipping lanes, one of the world’s five oceans and adjacent marine areas are slowly opening to human maritime activity – both in terms of state and private actors.  As the military branch responsible for fielding forces “capable of winning wars, deterring aggression and maintaining freedom of the seas,” the United States Navy has understandably turned its attention northward. 

In planning for the Arctic Ocean’s opening and its ensuing responsibilities in the region, the Navy researched and published the Arctic Roadmap: 2014-2030.  The report lays out how the service views the high north as a theater for operations and its priorities in the area in the near- (2014-2020), mid- (2020-2030), and long-terms (2030-beyond). 

The Arctic Naval Strategic Environment

As outlined at the beginning of the Roadmap, the Navy expects the Arctic “to remain a low threat security environment where nations resolve differences peacefully.”  It sees its role as mostly a supporter of U.S. Coast Guard (USCG) operations and responder to search-and-rescue and disaster situations.  However, the presence of vast resource endowments and territorial disagreements “contributes to a possibility of localized episodes of friction in the Arctic Region, despite the peaceful intentions of the Arctic nations.” 

For the most part, this assessment appears accurate.  The Arctic has consistently remained an area of peaceful interaction despite periodic disagreements, and its harsh environment minimizes conflict potential.  But the region also presents a completely unique geopolitical and military situation for the Navy.  As Arctic sea ice melts, the Navy will find itself engaging a theater where it is not the most capable force for the first time in recent history.  Russia’s Northern Fleet, designated in 1937, has been based and operating in the Arctic for nearly 80 years.  Russian naval and support capabilities in the high north surpass those of the Navy: currently, they possess the only fleet of nuclear powered icebreakers and extensive naval bases. 

Direct comparisons with Russia, however, are not very telling in terms of what the Navy’s Arctic priorities should be.  Russian interests in the Arctic have always been far greater than those of the U.S.  As such, the Roadmap is right to avoid any language seeking American naval predominance in the region, or comparisons to the northern capacities of others.  But given Russia’s recent provocative actions in Ukraine and elsewhere, and the fact that the Roadmap was published before these commenced, the Navy would be right to incorporate awareness of Russian activities and capabilities into future Arctic policy publications. 

Russian warships en route to New Siberian islands, including Kirov class battlecruiser Pyotr Velikhiy.

The Navy’s Arctic Capabilities

Turning to the more technical issue of actual Arctic capabilities, the Roadmap presents the region as a unique operational environment.  It astutely notes that “Navy functions in the Arctic Region are not different from those in other maritime regions; however, the Arctic Region environment makes the execution of many of these functions much more challenging.”  This observation was born out in the Fleet Arctic Operations Game naval exercise of 2011.  Unfortunately, so was the reality that the Navy is currently ill equipped to operate in the high north.  A report from the U.S. Naval War College on this exercise noted the following:

The U.S. Navy is inadequately prepared to conduct sustained maritime operations in the Arctic region.  This assertion is due to the poor reliability of current capabilities as well as the need to develop new partnerships, ice capable platforms, infrastructure, satellite communications and training.  Efforts to strengthen relationships and access to specialized capabilities and information should be prioritized. 

The Roadmap seeks to take each of these failings into account, though it does so to varying degrees of prudence.  It presents the need for strong cooperation and partnership with foreign states, the USCG, and other government agencies.  Such interactions are aimed at helping to manage shared Arctic spaces, engage in multilateral training and operations, and develop Maritime Domain Awareness (MDA) for the region. 

The Roadmap puts a heavy emphasis on the advancement of MDA and logistics capabilities in the Arctic, and these foci are well warranted.  The principal restrictive variables in Arctic operations are severe and erratic weather, sea ice, poorly developed nautical charts, remoteness, and the absence of support infrastructure.  Tackling these issues begins with extensive data gathering and MDA development.  In this regard, the Roadmap asserts that partnerships with government agencies responsible for meteorology and geography – such as the National Geospatial-Intelligence Agency and National Oceanic and Atmospheric Administration – are crucial for helping “the Navy better predict ice conditions, shifting navigable waterways, and weather patterns to aid in safe navigation and operations at sea.”  A force with a robust understanding of a harsh environment has a significant advantage in any undertaking or confrontation therein. 

Arctic MDA will, in turn, aid in the maintenance of critical logistical support for naval assets deployed in remote northern theaters and the alleviation of infrastructure failings.  The distribution of fuel and other resources, along with the conservation of these assets, are important considerations in Arctic operations and ones the Roadmap shrewdly highlights. 

Beyond MDA and logistics, the Roadmap puts an emphasis on Arctic training and exercises.  These are often conducted with other countries and military branches and are touted to “improve knowledge of the Region and provide a positive foundation for future missions.”  While this is certainly true, training can only go so far when a force lacks the requisite equipment for operating in a region, and this is the Roadmap’s main problem. 

The Naval War College’s assessment of the Navy’s Fleet Arctic Operation Game, noted above, serves to illuminate the branch’s deficiency in terms of material capacity when it comes to the Arctic.  In addressing its equipment needs for northern operations, the Navy’s Roadmap is lacking.  Rather than stating the need to procure necessary equipment, it simply “directs review and identifications of requirements for improvements to platforms, sensors, and weapons systems.” 

For years, the needs of the Navy in terms of Arctic acquisitions and refitting have been extensively researched and presented.  Many individuals and organizations have laid out the various basic purchases and upgrades necessary for effective Arctic naval action.  Moreover, as reported by the website DoD Buzz through interviews with top Navy Officers, the branch is well aware of its needs and has undertaken numerous research and development projects to address them.  Ice-strengthened hulls, topside icing prevention and management, surveillance and reconnaissance sensor establishment and maintenance, and network systems adaptation to northern conditions are all clear areas of need with available remedies. 

Training and operating within equipment limitations enhances effectiveness, but being properly outfitted allows for substantially more freedom of action and strategy, as well as for the more likely attainment of superiority in any future confrontation. 

Even though the Navy is currently experiencing a time of relative budget constraint and massive asset redistribution – namely to the region of East and Southeast Asia – a policy roadmap encompassing the next several decades must make Arctic-directed equipment procurement an expressed priority.  These sorts of undertakings require a good deal of lead-time, and continuing to tread water by solely emphasizing need assessment over need fulfillment is a recipe for future shortfalls in necessary capabilities. 

In addition to equipment, the Navy is also lacking in terms of Arctic infrastructure.  Aside from Thule Air Base in Western Greenland, American deepwater ports are non-existent above the Arctic Circle.  The Navy has utilized temporary ice bases in the past for submarine exercises – the most recent being Camp Nautilus north of Prudhoe Bay in 2014 – but to support the necessity of an increasing naval presence in the next several decades a permanent base and deepwater ports will eventually be needed. 

These, however, are incredibly costly undertakings, both in terms of money and capital as well as force deployment to occupy such facilities.  The absence of any clear intent to look into permanent presence possibilities, or commit to equipment procurements, evinces the Navy’s desire to hedge its commitments to a remote and relatively minor area in the face of important responsibilities elsewhere.  While this is certainly prudent, such policies could become problematic if they result in the inconsequential development of Arctic capabilities over the period the Roadmap encompasses. 

Crewmembers of the Los Angeles-class submarine USS Annapolis (SSN 760) man the bridge watch after breaking through the ice during Ice Exercise (ICEX 2009) in the Arctic Ocean.
Crewmembers of the Los Angeles-class submarine USS Annapolis (SSN 760) man the bridge watch after breaking through the ice during Ice Exercise (ICEX 2009) in the Arctic Ocean.

The Navy’s Near-, Mid-, and Long-Term Arctic Assessments

The Navy’s concluding presentation on its ambitions over the timeline of the Roadmap lends credence to concerns over its intent to meaningfully prepare for future Arctic obligations. 

Within the near-term (2014-2020), the Navy plans to have a limited Arctic presence, “primarily through undersea and air assets.”  Surface operations will only take place in open water conditions.  More broadly, the Navy states that it aims to “increase the number of personnel trained in Arctic operations,” maintain ongoing exercises, “focus on areas where it provides unique capabilities,” “leverage…partners to fill identified gaps,” and “emphasize low cost, long-lead time activities to match capability and capacity to future demands.”  From this information, it appears that the Navy has minimal Arctic ambition in the near-term and is content to expand very little on its current capacities. 

In the mid-term (2020-2030), the Navy predicts that it “will have the necessary training and personnel to respond to contingencies and emergencies affecting national security.”  Its “surface vessels will operate in the expanding open water areas” and the Navy “will work to mitigate the gaps and seams and transition…from a capability to provide periodic presence to a capability to operate deliberately for sustained periods when needed.”  Although this language may be interpreted to push for accelerating Arctic initiatives in the mid-term, it actually simply shows the Navy moving at the speed of climate change.  Surface-wise, it will expand into the high north wherever the melting ice allows, but no real impetus is noted to engage the region outside of those areas that become like other environments in which the Navy already operates.  Furthermore, there is not even an ambiguous expression as to how the Navy plans to facilitate “deliberate and sustained” Arctic operations.

In the far-term (2030-beyond), the Roadmap asserts that the “Navy will be capable of supporting sustained operations in the Arctic Region as needed to meet national policy guidance” and “will enable naval forces to operate forward.”  Once again, however, no clear avenue, let alone a vague one, is presented through which these capabilities will be developed.  Consequential investment in region-adapted equipment and infrastructure are needed before the Navy can meaningfully operate in a forward capacity in the Arctic.  Unfortunately, as noted throughout this analysis, there is scant mention of any such commitment. 

Conclusion

The Roadmap ultimately shows the Navy having a keen understanding of the capacities it must develop to be a truly Arctic-capable force, but also evinces an organization weary of any real commitment to a region currently possessing little national security importance.  As the Navy puts it in the report’s final sentence: “The key will be to balance potential investments with other Service priorities.”  The Roadmap, however, currently shows that balance tipping away from any substantial Arctic engagement.  Hopefully the Navy’s fiscal apprehension will not hamstring its ability to operate in a future Arctic environment requiring its capable presence and leadership. 

Andreas Kuersten is a lawyer working in international law who has previously held positions with NOAA and the U.S. Navy and Air Force JAG Corps.

The God of Submarines


Unknown

Rear Admiral Dave Oliver, USN (Ret.),  Against the Tide: Rickover’s Leadership Principles and the Rise of the Nuclear Navy. Naval Institute Press. 178pp. $27.95.

Admiral Hyman George Rickover, USN, (1900 – 1986), has been gone now for almost thirty-years.  Yet his legacy remains — and not only in the boats he built, or the submarine culture he shaped, or even the incessant attention to detail and excellence — but also the theatrical.  Thus, most stories of the great man are told in either a tone of reverence or disbelief, but regardless, they tend to be entertaining.

I’ll never forget the first story that I had heard about the old man. When I was a young ensign, somehow his name came up during a conversation:

Officer: Hey, have you ever heard of Admiral Rickover and what he did when he interviewed officers for command?

Me: No, I haven’t heard about him.  What did he do?

Officer: Well, Rickover would interview every prospective commanding officer of a nuclear submarine. So, this one time, an officer was in his office and Rickover said to him, “Do something to make me mad.” The guy looks at Rickover, and then he knocks everything off Rickover’s desk, including a valuable model of a submarine.  Rickover was furious — but apparently it worked, the officer got the job and ended up commanding a nuclear submarine.  Crazy, huh?

Me: (Stunned silence).

A few years later, more stories would come up — and they always had something to do with his infamous interviews: Rickover stuffed officers in the broom closet next to his office if they gave a poor response to a question; Rickover sawed a few inches off the legs of the chair in front of his desk to confuse an officer interviewing for the program; and Rickover had no qualms about calling you an idiot.  The best, and really the only complete transcript of a Rickover interview comes from the late-Admiral Elmo Zumwalt, who, as a commander, interviewed with Rickover in the late 1950s for command of a submarine.  While Zumwalt passed the interview (although with a few stops in the broom closet along the way) he ended up going a different direction.  He became the first commanding officer of a  guided-missile frigate, and  years later,  the youngest chief of naval operations in U.S. naval history. His memoir, On Watch, is worth the price of admission for the interview alone.

Rear Admiral Dave Oliver, USN(ret.), however, has less to say about his interview with Rickover in his new book, Against The Tide.  Rather, Oliver has written an entertaining, slim volume that is a series of anecdotes and stories tied to leadership and management principles gleaned from years of observing and studying “the father of the nuclear navy.”

On Leadership: “I have the charisma of a chipmunk, so what difference does that make?”

– Admiral Hyman Rickover

Early in the book, Oliver tells us one of the more interesting stories about Rickover and his ability to expect the unexpected.  It is worth telling in full.

It was the late 1960s the U.S. and the U.S.S.R. were in the middle of the Cold War. Oliver was deployed on his first nuclear-powered submarine, USS George Washington Carver (SSBN-656).  While returning from a patrol, somewhere in the Barents Sea, they received an encoded message from the boat that was enroute to relieve them.  The boat set to relieve them experienced a “technical problem.”  Oliver can’t say what kind of technical problem because, well, it “remains classified to this day.”  Thus, he simply refers to it as a “giraffe.”

The “giraffe” that this boomer had experienced was unheard of: “It was serious and was the first time this particular problem had ever arisen in the fledgling nuclear-power industry.” A message was immediately sent to Navy Nuclear Reactors.  Rickover would find out about the problem — it was only a matter of time.  Meanwhile, Oliver and the officers of the Carver sat down and tried to figure out a solution to the problem themselves, treating it as a real-world training evolution.  In a few hours they came up with a solution.  Oliver says that Carver’s solution took up twelve single spaced type-written pages.  They thought that they had figured it out and then hit the rack.  Hours later, Navy Reactors sent a message to “their sister ship” with instructions on how to proceed.  The length of the message?  Four words. 

And in those four words, Oliver says, they recognized its wisdom and — as a group — missed a safety consideration that just might have killed the entire crew.  Years later, Oliver ran into Rickover’s deputy for submarines, Bill Wegner.  Oliver says he thanked Wegner for that great four word response from what he assumed, was a group of Navy Reactor engineers.

As it turned out, the engineers came up with the same response as the officers on the Carver — something close to a twelve page type-written response to address the problem of the “giraffe.”  And this is where it gets interesting.  Wegner relayed to Oliver that when the event occurred, he went to Rickover’s apartment in Washington D.C. with a response in hand for the admiral’s approval to send to the boat. As Wegner tells Oliver:

“The admiral stood in the hall reading without comment and then invited me inside.  He went over to the rolltop desk that was just off the living room, reached into one of the pukas, and took out a half-inch thick package of yellowed envelopes encased by a rubber band.  He fanned through the pile, slipped one out from the pack and handed it to me. ‘Tell them this,“he said.”

“On the outside of the envelope, in Rickover’s handwriting was written ‘Giraffe’ … also inside, in Rickover’s distinctive scribble, was a three-by-five card with the four words we sent you.”

This pack of “emergency contingency plans” were there, sitting in Rickover’s desk, for the day the unexpected might happen.  Why they weren’t already onboard boats in the fleet, well, Wegner went on to tell Oliver that “…Rickover was not interested in anyone else in the Navy knowing how far he was willing to stretch engineering limits in an emergency situation.  Rickover believed in operating conservatively and safely.  In those envelopes he was going to give up a great deal of his safety cushion to provide an additional operating margin…” [Italics mine].

But not interested in letting anyone else know?  A story like this, then, can be seen in at least two ways: Rickover the genius; a man prepared for all seasons.  Or its opposite: Rickover was a micromanager that could have empowered his crews with information that in a different and deadlier circumstance could save their lives.  What does Oliver say at the end of this story?  He asks two of his own questions for the reader to ponder: “Do directors of companies sometimes accept risks they cannot evaluate until the bell tolls? And second, how do leaders avoid fooling themselves about the true condition of their own start-ups?”  Oliver ends every chapter with these kind of questions for self-reflection or discussion.  However, it would be nice to also hear Oliver’s take on the same questions he asks.

“There were a few times, yeah, that I hated him — because he demanded more from me than I thought I could deliver.”

– President Jimmy Carter

Leadership books that dip into the anecdotal stories of great men and women’s lives are often hagiographic. Oliver, as he says, respected Rickover second only to his father.  This admiration does not necessarily take anything away from the value of the work or the merit of Rickover’s principles.

But for every leadership book that sits on the shelf it is important to remember that one can learn just as much about leadership from a leader’s failures and shortcomings.  Rickover was a paradox on this count.  Oliver reminds us that one of Rickover’s mantras was  “Do the right thing.” Yet in 1986 Rickover was censured by the secretary of the navy for accepting over $60,000 in gifts from General Dynamics (twelve shower curtains?).  Rickover did not deny it, and he would later say that his “conscience was clear,” the gifts, he said, never influenced his decisions when it came to the submarine force.

Rickover was a contentious man, a brilliant man, and he had magical bureaucratic skills and vision: Imagine Peter Drucker and Steve Jobs all rolled up into one slight, white haired, five foot wiry frame.  And he could write.  Name a flag officer today that can wrap up Robert Browning, Walter Lippmann, I-Ching, Voltaire, Ralph Waldo Emerson, Teddy Roosevelt, and Aristotle into a single cogent essay.

Dave Oliver’s book is a nice volume to have on the shelf.  But it should not be read alone.  Rickover, his cult of personality, and his  legacy in the U.S. Navy needs a  larger context.  Polmar and Allen’s exceptional biography should sit right next to Oliver’s book for anyone who is considering learning more about this, the “father of the nuclear navy.”

 

Lieutenant Commander Christopher Nelson, USN, is a naval intelligence officer and recent graduate of the U.S.  Naval War College and the Navy’s operational planning school, the Maritime Advanced Warfighting School in Newport, RI.  LCDR Nelson is also CIMSEC’s book review editor and is looking for readers interested in reviewing books for CIMSEC.  You can contact him at [email protected].  The views above are the author’s and do not represent those of the US Navy or the US Department of Defense.

Fostering the Discussion on Securing the Seas.