INS Vikrant Makes Progress at Cochin Shipyard

Guest Post by Chris B.

New satellite imagery shows that India’s first indigenous aircraft carrier has made significant progress since it was launched in August 2013, helping India inch towards the goal of a two carrier battle group.

Imagery acquired by commercial satellite firm DigitalGlobe in February 2015 shows further assembly of INS Vikrant, a 40,000 ton aircraft carrier and India’s soon-to-be largest vessel once commissioned. Additional ship modules now welded to the hull have enlarged the deck width — measuring almost 60 meters. The erection of the superstructure reported last November was also confirmed. India’s first domestically produced carrier is currently under construction at state-owned Cochin Shipyard Limited, the country’s largest shipbuilding and maintenance facility located in Kerala on the west coast.

Like other vessels built in India, significant cost overruns and delays have hampered shipbuilding progress. The South Asian country is already four years behind schedule on the project with the latests estimates pushing an operational date closer to December 2018, if not beyond. However, the Indian Navy expects that the vessel will “undock” sometime this month after mounting the propellers on the engine shafts, according to an April statement from Vice Admiral Ashok Subedar. Afterward, the shipyard will continue with the fitting out process.

Originally, India was to have fielded her carrier by 2014, eleven years after the government approved the build. Last July, the Cabinet Committee on Security released an additional Rs 19,000 crore (approx USD 3.18 billion), the lion’s share, to complete the vessel’s construction — on top the USD 585 million already spent. Due to India’s extensive bureaucracy, the funds languished for almost a year halting progress on the project.

“As much as 95 per cent of its hull is complete as is 22,000 tons of [its] steel structure,” Subedar went on to say. That’s 3,500 tons heavier than its August 2013 launch weight though significantly less than its planned 40,000 tons. Of course, much of the that weight will be comprised of two fixed wing squadrons (12 x fighters each) of Russian-built MIG-29K and Indian-built Tejas Light Combat Aircraft, 10 x Ka-31 ASW helicopters as well as necessary ammo, fuel, and other supplies.

Vikrant

Indian Navy Computer Model of INS Vikrant

Featuring a STOBAR (short take-off but arrested recovery) configuration with a ski-jump, India’s indigenous carrier will push naval pilots to master a new launch and recovery system, one very different from its existing STOVL (short take-off and vertical landing). Luckily, Russia helped India build a shore-based testing facility which became operational early last year. Imagery shows that Indian pilots are already hard at work. (INS Vikramaditya also features a STOBAR configuration).

Aircraft aside, India’s latest carrier will be powered by four General Electric LM2500 gas turbines capable of cruising speeds around 18 knots. With an endurance of 7,500 nautical miles the Navy should have few problems projecting force throughout the Indian Ocean region, especially given India’s previous proficiency in carrier operations.

But if issues do arise, the United States has proposed a joint working group to help support Indian ops, share best practices and even possibly, technology. All of which may lead observers to conclude that India’s naval capability has become increasingly important. Prime Minister Modi made that clear while visiting Mauritius in March: “India is becoming more integrated globally. We will be more dependent than before on the ocean and the surrounding regions. We must also assume our responsibility to shape its future. So, [the] Indian Ocean region is at the top of our policy priorities.”

As perhaps it should be. India is already advantaged by its unique geography, jutting out in the Indian Ocean with its 7,500km coastline and island territories. Given India has short distances to travel to manage any regional conflict or rivalry, it only makes sense that India would focus resources on protecting national interests in its own backyard.

DG (11MAR15) PLAN Salalah

Satellite Imagery of PLAN Vessel at Oman’s Salalah port (DigitalGlobe 11MAR15)

However, few regional contenders are making a splash in the maritime space, though emerging challenges from China are certainly on India’s radar. China’s People’s Liberation Army Navy (PLAN) commissioned its first aircraft carrier, the Liaoning, in 2012 and has already started construction on a second. With recent infrastructure established in the South China Sea and additional PLAN deployments in the Indian Ocean region, China appears poised to take a more aggressive maritime stance, a clear departure from India’s Cold War experience.

In response, India is planning a 160-plus-ship navy as it seeks to constrain what it sees as a Chinese incursion into its sphere of influence. Unfortunately for the navy, India is still predominately a land force with the Army maintaining the biggest share of the defense budget. Regardless, India expects that its homegrown carrier program will eventually allow it to maintain two carrier battle groups supporting its respective Eastern and Western Naval Commands.

Named after India’s first aircraft carrier recently scrapped, the INS Vikrant is one of two homegrown carriers planned for the Indian Navy. The second carrier, INS Vishal is currently being fast-tracked—though it’s unknown what this means for Vishal’s construction timeline. In the meantime, India’s lack of experience building carriers and the uncertainty of outside assistance may impede India’s pressing strategic goals, probably pushing the operation of its second carrier to 2025 or beyond.

This article can be found in its original form at Offiziere.ch

China’s Military Strategy: Assessment of White Paper 2015

This article can be found in its original form at the National Maritime Foundation here and was republished with permission. 

China has been issuing Defence White Papers biennially since 1998. The ninth White Paper of 2014 titled ‘China’s Military Strategy’ was released recently in May 2015. This essay seeks to analyse the salient aspects of the document, particularly in context of the preceding document of 2012 released in April 2013.

In comparison to the Defence White Papers published by China in the preceding years, the 2014 document is very concise. Nonetheless, it reveals substantial content and context, disproportionate to the size of its text. While much of the revelation is likely to be Beijing’s ‘strategic communications’, the document is nonetheless insightful.  

Title of White Paper

The present White Paper has continued the trend of using a thematic title – a trend that was initiated with the 2012 document titled ‘The Diversified Employment of China’s Armed Forces’. The trend and the specific title spelling out “China’s Military Strategy” signify the increased self-confidence of an emerging global military power, which until a few years ago, preferred to be opaque to the world on ‘matters military’.  The document also reflects an increased self-assurance as a nation, stating that “China’s comprehensive national strength, core competitiveness and risk-resistance capacity are notably increasing, and China enjoys growing international standing and influence”.

Core National Objectives

In the document, China has maintained its earlier stance of avoiding war through its military strategy of “active defence” (that envisages an ‘offensive’ only at the operational and tactical levels). However, the document mentions “preparation for military struggle (PMS)”, which indicates its strong desire to retain the option of first use of military force, if it cannot achieve its core objectives otherwise. Furthermore, the emphasis on “maritime PMS” indicates that these objectives pertain to Taiwan’s “reunification”, and fructification of its maritime-territorial claims in the Western Pacific. Furthermore, the inclusion of the phase “You fight your way and I fight my way” indicates that China’s war-fighting concept to meet its core objectives is likely to be based on use of asymmetric capabilities.

Maritime Interests

The previous 2012 document stated the PLA Navy’s mandate to preserve China’s sovereignty over its territorial seas and its maritime rights and interests in ‘offshore areas’ against complex security threats, thereby portraying China as a victim or an underdog reacting to the actions of Japan, and implicitly, of the U.S. The new document, however, emphasises a more proactive protection of its interests in ‘open waters’, thereby enlarging its strategic depth. Notably, the document also calls upon the need to shed the mindset that peace, stability, and development of China is linked to affairs on land rather than the sea. This indicates a maritime emphasis of China’s military strategy.

With regard to the security of sea-lanes, it uses the term “strategic Sea Lines of Communication (SLOCs)”. Although the term ‘SLOC’ itself bears a ‘strategic’ connotation, the addition of the adjective indicates that China considers itself vulnerable to commodity denial during war, thereby severely limiting its option of use of military force. Although the document does not specifically mention the ‘Indian Ocean’, the reference to Indian Ocean SLOCs may be inferred.

 Naval Presence in Indian Ocean

Alike the previous 2012 document, the 2014 White Paper states that the PLA Navy would maintain “regular combat readiness patrols…(and maintain)…military presence in relevant sea areas.” While the former may refer to the Western Pacific, the latter is a likely reference to the Indian Ocean. This is buttressed by the statement that the PLA Navy would “continue to carry out escort missions in the Gulf of Aden and other sea areas as required, enhance exchanges and cooperation with naval task forces of other countries, and jointly secure international SLOCs.” This implies that China’s naval presence in the Indian Ocean would continue, and may even increase. While such presence may be primarily for undertaking ‘Military Operations Other than War’ (MOOTW), it is likely to be dovetailed with preparing for ‘wartime’ operations. This assertion is borne out by Beijing’s assertion in September 2014 that its Song-class submarine deployed in the Indian Ocean was meant for counter-piracy. (The credibility of this rationale was dismissed by naval analysts on operational grounds). The document adds that the “PLA Navy will work to incorporate MOOTW capacity building into…PMS” thereby implying the China would also seek to develop fungible capabilities.

Furthermore, the White Paper lays emphasis on ‘sustenance’ of the forward-deployed naval platforms through “strategic prepositioning”. This indicates that China is likely to seek overseas access facilities (if not military bases) in the Indian Ocean, or even resort to the U.S. concept of ‘sea-basing’. The latter possibility is supported by recent news-reports about China developing large ‘Mobile Landing Platforms’ (MLP) similar to those used by the U.S. expeditionary forces.

Military Interface with Major Powers

The mention of Russia in the White Paper precedes all other countries. The “exchanges and cooperation with the Russian military within the framework of the comprehensive strategic partnership…to promote military relations in more fields and at more levels” indicates the imminence of a China-Russia quasi-alliance. 

The 2012 White Paper, without naming the U.S., had expressed a concern for its “pivot” to Asia strategy and “strengthening of its military alliances with the regional countries, leading to tensions.” In contrast, the 2014 document mentions the U.S. explicitly. While it does state the need for “cooperative mechanisms with the US Navy, including exchange of information in the maritime domain”, its tone and tenor indicates a precursor to a ‘Cold War-style’ military interface between the two major powers. It talks about a “new model of military relationship” with the US based on “major-country relations”, with “strengthening of defence dialogue (and)…CBMs to include notification of major military activities (and) rules of behaviour” to prevent “air and maritime encounters…strengthen mutual trust, prevent risks and manage crises.” However, it is yet unclear what kind of bipolar interface will eventually emerge since the current global environment marked by close China-U.S. economic ties is vastly dissimilar to the erstwhile Cold War era.

 The 2012 White Paper had mentioned India’s combined Army exercises with PLA and increased anti-piracy coordination with India. Since the 2014 document is more succinct, the lack of details is understandable. However, the lack of even a mention of defence exchanges with India, or any other Asian country is remarkable.

Also ‘conspicuous by absence’ are the various facets of ‘transparency’ that the preceding Defence White Papers had addressed, ranging from China’s defence budget to its nuclear weapons policy of no-first use (NFU). Evidently, China has ‘arrived’ on the world stage with a single-minded preoccupation of how it could challenge the unipolar world order dominated by the U.S.

Captain (Dr.) Gurpreet S Khurana is the Executive Director, National Maritime Foundation (NMF), New Delhi. The views expressed are his own and do not reflect the official policy or position of the NMF, the Indian Navy or the Government of India. He can be reached at [email protected]

 

For a Good Time Hack OPM

Guest article by Brian Scopa, USN.

“Once is happenstance. Twice is coincidence. Three times, it’s enemy action.”

-Ian Fleming

 

M looking for W? W looking for M? PRC looking for Intel?

The revelation that the Office of Personnel Management has been hacked, allegedly by the Chinese, has profound implications for the safeguarding of classified US information. Beyond the typical identity theft problems associated with any breach of Personally Identifiable Information (PII) from a government or private database, the fact that the data on 4.1 million military and  government personnel contained  information on their security clearances is extremely grave. This is not only an egregious breach of individual privacy, but when combined with two other hacks of private websites make for a counterintelligence nightmare.

Allowing ourselves to go briefly down the conspiracy theory rabbit hole, two additional hacks of private websites are worth considering in conjunction with the OPM hack:

Linkedin in 2012. 

“LinkedIn Security professionals suspected that the business-focused social network LinkedIn suffered a major breach of its password database. Recently, a file containing 6.5 million unique hashed passwords appeared in an online forum based in Russia. More than 200,000 of these passwords have reportedly been cracked so far.”

The consensual aggregation of personal and employment information online has greatly simplified the task of finding targets for intelligence gathering. The technology that makes finding a project manager with an MBA and five years of experience fast and convenient also makes it easy to track down missile and radar engineers on LinkedIn. The publicly available information on LinkedIn is a trove of intelligence in itself regarding military, government, and contract employees that work in defense related industries. Having the private email addresses and passwords of LinkedIn members has staggering spearfishing implications ala STUXNET.

Adult Friend Finder (AFF) in May 2015 

Andrew Auernheimer, a controversial computer hacker who looked through the files, used Twitter to publicly identify Adult FriendFinder customers, including a Washington police academy commander, an FAA employee, a California state tax worker and a naval intelligence officer who supposedly tried to cheat on his wife.” (emphasis mine)

Catching Flies

Developing intelligence sources costs time, money, and effort, regardless of the method employed, and intelligence agencies are constantly searching for ways to more efficiently target and recruit intelligence sources. The OPM and LinkedIn hack simplify the targeting, but it’s the AFF hack that helps with recruitment.

One of the most useful tools intelligence agencies have for recruiting sources is blackmail, and a ‘Honey Trap’ is the practice of luring a potential intelligence source into a compromising position with a romantic partner that’s working for an intelligence agency, and either gaining their cooperation in the name of love, or blackmailing the source into compliance.

The Chinese are apparently particularly fond of this specific type of intelligence gathering operation:

“MI5 is worried about sex. In a 14-page document distributed last year to hundreds of British banks, businesses, and financial institutions, titled “The Threat from Chinese Espionage,” the famed British security service described a wide-ranging Chinese effort to blackmail Western businesspeople over sexual relationships.”

The AFF hack is probably the first Massive Multiplayer Online Honey Trap (MMOHT).  Even better for foreign intelligence agencies (FIAs), it was self-baiting and required zero investment of resources.

How bad is it?

Perverting the Drake Equation for this exercise, we can conduct a thought experiment about the number of potential intelligence sources created by the confluence of the three hacks mentioned above, expressed mathematically as P = O * W * N * Y, where:

P = Total number of useful possible US government employee intelligence sources that could be exploited.

O  = All government employees with security clearances whose personally identifiable information has been compromised, reported to be 4.1 million.

W = Fraction of O that are AFF members. This number has not been made public by the DoD, if it’s known, but the reported number of member profiles compromised was 3.5 million.

N = Fraction of W that desperately want their activities on AFF to remain undisclosed and could be effectively blackmailed. Not everyone will be embarrassed by their activities on AFF.

Y = Fraction of O that has been or is currently employed in a position that a FIA would find useful to turn into a source of intelligence.

Since I don’t have any insight into the any of the variables with the exception of O, I won’t speculate on what P might be, but I have no doubt that it’s an actionable, non-zero number that FIAs must be rushing to exploit.

AdultFriendFinderIntel

 

Lessons Re-identified, Still Unlearned

Any information that’s online can be accessed online- full stop. We should all assume that any device connected to the public internet is hackable, and act accordingly. While there are many good precautions and security features that individuals, companies, institutions, and governments can take to better protect online dealings and information, such as two-factor authentication, tokens, and salted password hashing, it has been demonstrated time and again that the advantage in the cyber security arms race is with the attacker. You cannot count on technical means alone to protect your information.  If individuals with security clearances have used the internet to facilitate behavior that the knowledge of by a third party could lead to blackmail, the individuals should assume the information will be made public.

Security through obscurity is always a loser, but anonymity is still worthwhile. The critical information that makes blackmail possible in this instance is being able to identify government employees that were also members of AFF. If AFF members had taken care to remain anonymous by making their member profiles non-attributional, using email addresses and phone numbers not otherwise linked to them, using non-identifiable pictures, and keeping locations ambiguous, they may yet have some measure of protection from identification.

What’s next?

This is only the beginning of this particular saga. In the coming months I have no doubt we’ll hear about the hacks of other popular dating, hook-up, and porn sites. The hacking itself has probably already happened; it’ll just take time for the discoveries to be made.

The news is grim, but there is opportunity here. While FIA see openings, our own counterintelligence organizations have an unprecedented opportunity to identify potential targets before they can be contacted by FIAs and possibly prepare them to act as double-agents, turning the honey traps on the attackers. If nothing else, the act of sharing the blackmail information with the security services helps to inoculate the individuals against blackmail, since it’s typically (but not always) the fear of disclosure that makes the information useful, not the specific behavior that’s problematic.

In any case, it’s time for a DoD-wide effort to review the list of AFF members and check it against current and past employees with security clearances. Then, command security officers can start having the difficult, closed-door conversations necessary to learn the scope of the possible vulnerability. Doing so will limit the damage from this hack, and it’ll be a useful exercise in preparing for the next episode.

Which has already happened.

Sea Control 81 – Third Offset and Human Offset

seacontrol2ADM John Harvey, USN (ret), joins us to discuss the Third Offset and the “Human Offset.” Third Offset is Defense Undersecretary Robert Work’s strategy to embraces the US technological advantage, pushing the throttle to the max through a suite of development efforts. However, ADM Harvey worries that this technological emphasis will pull attention from other foundational areas – like talent management and development – as well as what he sees as a dedication of our resources into dominance less-achievable in our globalized civilian-led tech economy.

DOWNLOAD: Third Offset and Human Offset

Fostering the Discussion on Securing the Seas.