The Elephant at Sea: China’s Naval Outlook

A Brief Overview of China’s Naval Outlook

Naval supremacy is one of the oldest forms of projecting national power. For millennia, the ability to operate well beyond a country’s coastal waters has provided nations with unmatched security. Aircraft carriers multiply naval supremacy exponentially, providing a navy with floating bases, thereby relinquishing any dependence on other governments or local bases. Both practically and symbolically, the aircraft carrier has been central to American power projection over the six decades during which it has dominated the Pacific – but it is those same vessels that are now under threat from China’s vast new array of missiles.

Throughout the history of carrier aviation, it has been said that the first thing a President asks during times of crisis is: “Where is the nearest aircraft carrier?” The U.S. has had a naval presence, including aircraft carriers, in the northwestern Pacific Ocean for over half a century. Beginning with the defeat of Japan in World War II, the U.S. Navy has treated these waters as their own. It has used its unmatched naval power to implement a rules-based international system oriented toward the promotion and preservation of free trade, freedom of navigation, and the democratic rule of law. This dominance was accelerated in 1972 when the U.S. endorsed China’s return to the family of nations, thereby implicitly leading to China’s acceptance of American military dominance in Asia.

While there have always been Chinese antagonists to American naval dominance in the Pacific, one would find it difficult to argue that American dominance in the region has not led to the most stable and prosperous period of China’s modern history. That said, many proponents of China’s imperial ambitions assert that America’s role in the Pacific is crumbling, as China vows to recast its historic military and political might in the region.

Today, China is especially concerned with the security of its seaborne commerce in the area it calls the Near Seas – the coastal waters that include the Yellow, East China, and South China Seas. As such, China is beginning to implement a strategy to exert increased control over the Near Seas, pushing the U.S. Navy farther and farther east. In doing so, China is launching a profound challenge to the U.S.-led order that has been the backbone of China’s own modern economic success.

American military strategists assert that for the past 20 years China has been expanding its military with a keen focus on investments in its “anti-navy” – a series of warships, silent submarines, and precision missiles specifically designed to prevent the U.S. Navy from operating in large areas in the northwestern Pacific Ocean. As Dennis Blair, a retired U.S. Navy admiral who was the commander of U.S. forces in the Pacific region states: “Ninety per cent of [China’s] time is spent on thinking about new and interesting ways to sink our ships and shoot down our planes.”

Some observers believe China wants its naval capabilities to perform as an anti-access/area-denial (A2/AD) force—a force that can deter U.S. intervention in a conflict in China’s Near Seas region, or at a minimum reduce the effectiveness of intervening U.S. forces. That having been said, China currently does not possess a fully operational aircraft carrier – though it is expected to have one in service by 2015.

The U.S. Pacific Fleet, on the other hand, is the world’s largest fleet command, encompassing 160 million square kilometres and consisting of approximately 200 vessels. Of these, two are aircraft carriers.

The U.S. has not lost an aircraft carrier since the Japanese sank the USS Hornet during the Battle of the Santa Cruz Islands in 1942. Today, the mere thought of an aircraft carrier being vulnerable could be enough to restrict its use, as the loss of a carrier would be an unfathomable psychological defeat to American naval prestige and credibility – akin to a Pearl Harbor or 9/11. These sentiments are beginning to be realized in the Pentagon, as a new concept of fighting wars at sea is taking shape.

AirSea Battle, inspired by the AirLand Battle concept, is an integrated battle doctrine that officially became part of U.S. grand strategy in February 2010. The purpose of this doctrine is to shape U.S. military power in such a way as to better address asymmetrical threats in the northwestern Pacific and Persian Gulf – in other words, China and Iran.

By weakening the U.S. Navy’s presence in the Pacific, China hopes to undermine America’s alliances with other Asian countries, thereby reshaping the balance of power in the region. If U.S. influence does indeed decline, China would be in a position to quietly assume a leadership position in Asia, giving it much greater sway over the rules and practices in the global economy. The future of global security hinges on the floating of two vessels in the Pacific, for if one American aircraft carrier were to be sunk, the balance of power would be dramatically altered.

Jasen Sagman is a Junior Research Fellow at the NATO Council of Canada where he writes as part of the Maritime Nation Program. Currently pursuing a Master of Arts in Global Diplomacy from the University of London, SOAS, he also holds an Honours Bachelor of Arts in Political Science from the University of Toronto. He has previously researched for the Jerusalem Centre for Public Affairs and the Chair of Canada’s House of Commons Standing Committee on Foreign Affairs and International Development.

Countdown to Launch

Tomahawk

In the wake of TLAM strikes against targets in the Middle East by US Navy warships, we are reposting this guest article by LT Monika Chess, USN, former navigator aboard USS Barry (DDG-52) on the run-ups to a cruise-missile strike to provide a shipboard perspective of their planning and execution.

On March 19, 2011, USS Barry (DDG-52) was one of the first warships to launch Tomahawk Land-Attack Missiles (TLAMs) against targets in Libya in support of Operation Odyssey Dawn. Barry began 2011 by deploying in January with the Enterprise Strike Group in the Gulf of Aden and conducting counter-piracy operations. However, her mission unexpectedly shifted in March as she received tasking to steam independently to the Mediterranean Sea and join the international coalition of warships operating off the coast of Libya. Odyssey Dawn aimed to enforce the United Nations-sanctioned no-fly zone over Libya and stop Libyan leader Colonel Moammar Gadhafi’s forces from attacking civilians.

After arriving in the U.S. 6th Fleet Joint Operating Area, Barry’s strike team conducted numerous training scenarios that built on the skills developed during the training cycle and ensured the ship maintained the knowledge and proficiency to monitor the surface picture, make proper reports, and successfully execute any mission. As the state of affairs between the Gadhafi regime and civilian forces worsened in Libya, the training scenarios became daily.

On March 18, Barry was ordered to head to a preplanned launch position and stand by for tasking. The strike team was prepared and ready to execute a strike mission at a moment’s notice. On March 19, Barry received orders to conduct TLAM strike missions against strategic targets in Gadhafi-controlled regions in Libya. This was the first time Barry launched Tomahawk missiles for a real-world mission.

“Most strike teams never launch in their careers, but Barry was given that opportunity,” said Barry’s strike officer LTJG Jason Haney. Barry launched more than 30 Tomahawks from her forward and aft Mk 41 Vertical Launch System cells during her first of four strike taskings. With each launch, there was a deafening roar and blinding light as the missile streaked upward. Sailors watched in awe as the cells emptied one after another and the missiles flew toward Libya.

“The strike team was extremely focused. There was a sense of confidence as we accomplished our mission. I am extremely proud of my team,” said Chief Fire Controlman (FC) (SW) Ken Lilley, strike division leading chief petty officer.

“We were confident in the accuracy of our missiles and that minimal collateral damage was caused by the strikes. It helps to ease our minds to know that we conducted these missions effectively and minimized the impact on innocent people,” said Barry’s combat systems officer LT Todd Grahek, one of the tactical action officers during the strike missions.

“It required a ship-wide effort to conduct a Tomahawk strike of this magnitude,” continued LT Grahek. “Our engineers kept steady electricity and ensured that we were able to position ourselves appropriately. Our supply department ensured we had the parts we needed in a timely manner to keep the weapons systems fully functional. Combat systems, weapons, and operations departments operated as a single team focused on mission success, and every person who was a part of the mission was truly a trained professional.” FC2(SW) Royce Orr, one of the engagement planners during Barry’s strike missions, said, “I’m honored to participate in an event that will go down in U.S. history. It was a great feeling to be able to serve my country and assist the civilians in Libya.”

This article appeared in its original form in the Summer 2011 issue of Surface Warfare magazine available here. LT Monika Chess served as the navigator aboard Barry during Odyssey Dawn and works in the admissions office of the U.S. Naval Academy.

How To Make The ‘Ebola Bomb’: Why You Should Stop Worrying About Bioterrorism

By Sandra Ivanov

The Ebola outbreak in West Africa is the deadliest epidemic since the virus was discovered in 1976, crossing international borders, it has claimed over 2’600 lives (as of September 18, 2014). There is no vaccine and there is no cure. Aid and medical personnel are sought from all over the world, borders have been contained, and risks of rising violent conflict continue to develop out of the Ebola eruption. However, there have been other interesting analyses of this issue on the side – media and opinion pieces are claiming that terrorist groups could get a hold of the virus and spread it around their regions, and the world (see for example Rick Noack, “Why Ebola worries the Defense Department“, The Washington Post, 05.08.2014). Well, I wanted to test this claim for myself, so with a bit of research and optimism, I’ve created a recipe to examine what a potential terrorist group would need to do to make this so-called “Ebola Bomb” – how hard could it really be?

ebola-001

Many studies from a health, as well as a humanities perspective, assume that terrorists could successfully generate biological or chemical agents and weaponise them. Taking this initial premise, a lot of literature has been based around this looming threat, subsequently offering policy advice, public health recommendations, and technological investment to avoid such catastrophes. However it would be useful to deconstruct this claim entirely. So I’ll begin by offering a baking recipe, to explore at the very core, what a group would need to do to successfully create a biological weapon, in this case, utilising the Ebola virus.

Ingredients
Firstly, any terrorist group wanting to create and weaponise a biological or chemical agent will need to have an appropriate kitchen. In the case of the Ebola virus, a standard biosafety level 4 (BSL-4) scene will be required (Adeline M. Nyamathi et al., “Ebola Virus: Immune Mechanisms of Protection and Vaccine Development“, Biological Research For Nursing 4, No. 4, April 2003: 276-281). Some features of these laboratories include decontamination mechanisms, pest management systems, air filters, and special suits. Sometimes the kitchen will have to be in a separate building, or in an isolated area within a building to meet the safety requirements. Not only will the kitchen be under strict conditions, the baking process will need to be kept in total secrecy. The constant threat of law enforcements raiding facilities, and intelligence and secret services detecting activities will have to be avoided. Also, there are only some fifty of these laboratories successfully maintained worldwide.

Before starting, make sure there is a baking dish of ‘uncertainty’ readily available to just throw all of the following ingredients into:

  • 1 Tablespoon of Proper Agent

Initially, a terrorist group must decide what kind of agent they would like to use in a bioterror attack. This is one part of the recipe which can be modified, but the other ingredients will be standard for all types of attacks. The recent spread of the deadly Ebola virus will be the agent of choice for this bomb. Ebola is a virus which is passed to humans through contact with infected animals. The spread of the virus from person-to-person is brought about through blood and bodily fluids, as well as exposure to a contaminated environment. An infected live host with Ebola would need to be maintained in a human or animal – only a few animals are able to be used as hosts, such as primates, bats, and forest antelope. Although Ebola infection of animals through aerosol particles can be effective, it has not successfully been transferred with this method to humans (Manoj Karwa, Brian Currie and Vladimir Kvetan, “Bioterrorism: Preparing for the impossible or the improbable“, Critical Care Medicine 33, No. 1, January 2005: 75-95).

  • 1 Bucket of Resources and Money

In order to develop a biological weapon, a substantial amount of material and money is required. Investment is needed from the very outset – taking into account membership size and capabilities of a terrorist group, financial assets of a group, and making sure territory and proper infrastructure is available for the biological agent. For a successful bomb to be created, a group must think about the resources they will need for each stage of the baking process, such as weapons production, potential testing phases, and logistics, such as transportation and communications technologies (Victor H. Asal, Gary A. Ackerman and R. Karl Rethemeyer, “Connections Can Be Toxic: Terrorist Organizational Factors and the Pursuit of CBRN Terrorism“, National Consortium for the Study of Terrorism and Responses to Terrorism, 2006). Resources needed for an “Ebola Bomb” will most likely need to be imported from the outside, and a group must determine the feasibility of acquiring the materials and technologies needed for the bomb (Jean Pascal Zanders, “Assessing the risk of chemical and biological weapons proliferation to terrorists“, The Nonproliferation Review, Fall 1999: 17-34). A surplus of money would also be a smart idea in case technical difficulties arise.

  • 5 Cups of Expertise

With all the correct resources and necessary amount of monetary support, the recipe will require the right kind of know-how. For an operation like this, a terrorist group should have members with high levels of education and training in science, engineering, and technological development, to deal with highly virulent agents, and for successful weaponisation (Zanders). A group may need to be integrated into knowledge flows and institutions, or be able to recruit members to their cause with this specific expertise (Asal, Ackerman and Rethemeyer). Knowledge and expertise is required to create the correct strain, handling the agent, growing the agent with the desired characteristics, and maintaining the agent. Taking Ebola specifically requires synthesising proteins which make it infectious, and becomes a task that is difficult and unlikely to succeed (Amanda M. Teckma, “The Bioterrorist Threat of Ebola in East Africa and Implications for Global
Health and Security
“, Global Policy Essay, May 2013). If Ebola is successfully created in the kitchen, it is not itself a biological weapon – an expert will be required to transform the virus into a workable mechanism for dissemination.

  • A Teaspoon of Risk

The decision to use biological weapons for an attack is in itself extremely risky. There is a risk that bioterrorism could cause dissenting views among followers, and that public approval and opinion may channel the way a group operates. After all, terrorists are political communicators, wanting to bring attention to their grievances. If a group becomes polarised or resented by their actions, they will not see the benefits of pursuing certain methods. Terrorists want to send powerful messages, gain more members, in which these members assist to bring about certain plans and demands. Therefore, public opinion and political opportunism will be risked in a quest to create a bioweapon such as an “Ebola Bomb” (Zanders). Secondly, a terrorist group may be subject to more scrutiny or attention. This is why keeping activities covert will be a key to success. States will be more vigilant towards groups that are known to be seeking and acquiring biological and chemical capabilities (Asal, Ackerman and Rethemeyer). And finally, risk will always cling on to funding requirements, and potential technical difficulties in all stages of the bioweapon making process.

  • A Fist of Time

Now this recipe is going to take a while to prepare and bake in the oven, and there is no particular moment to determine when it should be removed from the baking dish. So, whatever group wants to make this bomb, will need to realise this is a long-term and complex effort. It will not work like most conventional weapons, which produce a high number of casualties with a single explosion, and that could be a reason why bioterrorism is not the most popular means for a violent attack – demanding time, effort, and resources without guarantees of a concrete result. A fist full of time may be needed so that knowledge, both tacit and explicit, can be acquired, as well as accounting for the various mistakes and learning curves to overcome (Asal, Ackerman and Rethemeyer). It can also refer to how long it will take to cook up, maintain and prepare a virus for an attack. It will take time to create a successful weapon with prior testing, and wait for the correct environmental conditions when it comes to dissemination. Time will have to be a group investment – it is not the kind of bomb that will detonate immediately.

  • A Pinch of Curiosity of the Unknown

The teaspoon of risk coincides with uncertainty, and there will need to be a commitment to potential unknown factors. It is unknown what will happen once a virus is disseminated. Will the weapon even work in the first place? Weather conditions are unpredictable and Ebola will not have a prominent effect in certain environments. What happens to the terrorist group if the attack fails? What happens to the reputation of the group and its membership, or will the group cease to exist? If the recipe is a success, it is impossible to control the biological agent which is released – not only can it affect the targeted population, but it may annihilate the terrorist group itself. There will be an unknown into potentially losing local and international support, and donors if this causes widespread catastrophe.

Scientists from the Southern African Development Community region, including a sponsored postdoctoral research fellow by the Southern African Centre for Infectious Disease Surveillance, working in the only biosafety level 4 (BSL-4) laboratory in Africa, which is located at the National Institute for Communicable Diseases, Johannesburg, South Africa.
Scientists from the Southern African Development Community region, including a sponsored postdoctoral research fellow by the Southern African Centre for Infectious Disease Surveillance, working in the only biosafety level 4 (BSL-4) laboratory in Africa, which is located at the National Institute for Communicable Diseases, Johannesburg, South Africa.

Method: Weaponisation and Dissemination
Mix that up good in your baking dish of what is now “deep uncertainty” and pop it in the oven to bake. But as time passes, it seems as though the ingredients are not rising. The process of turning a biological agent into a weapon for attack is the phase with the most hurdles for terrorist groups. In order for a virus to inflict a lot of harm, it has to be disseminated through an effective delivery mechanism. As mentioned previously, the Ebola virus needs a live host. Weaponising a live host is more difficult than other agents which can be cultured on dishes of nutrients. The process has many stages which involve testing, refining, upgrading, and toughening. The methods to disseminate an agent are only known to few people, and rarely published – it is not a basement project (Teckman).

Let’s take Aum Shinrikyo as an example of conducting a bioterrorist attack (even it was “only” a chemical attack). This apocalyptic religious organisation in Japan managed to release sarin gas inside a Tokyo subway, killing a dozen people, and injuring 50. However, even with money and resources, they failed to effectively weaponise the chemical. Factors which led to their failure included internal secrecy and breakdown in communication; selecting members only solely dedicated to their cause to work on the weapons, ultimately employing unskilled people to operate and maintain the project, causing accidents and leaks (Zanders). Aum Shinrikyo’s attempt to disseminate botulinum toxin into Tokyo using a truck with a compressor and vents, did not work because they had not acquired an infectious strain (Sharon Begley, “Unmasking Bioterror“, Newsweek, 13.03.2010; “Chronology of Aum Shinrikyo’s CBW Activities“, Monterey Institute of International Studies, 2001). Finally, a major obstacle to successfully disseminating Ebola, is because this virus requires a specific environment in order to thrive. Weather conditions can be unpredictable, and Ebola particularly needs high temperatures and humidity to remain effective.

The emergency service tend to victims of the Aum Shinrikyo sarin attack on Tokyo's subway in 1995 (Photo: Rex Features).
The emergency service tend to victims of the Aum Shinrikyo sarin attack on Tokyo’s subway in 1995 (Photo: Rex Features).

Decoration: Results and Conclusions
Obviously, this “Ebola Bomb” has not come close to containing the right requirements needed to explode. Looking back historically, pathogens, and all kinds of toxins have been used as tools in sabotage and assassinations since the beginning of time. Now, it would be silly to say this recipe will never work – there will always be a possibility that Ebola or other viruses may be used as biological weapons in the future. However, the likelihood of its development and use by a terrorist group is quite improbable.

Mentioning Aum Shinrikyo again, they are an organisation which at the time, had a war chest of more than $300 million, with six laboratories and a handful of biologists, in the end having insurmountable difficulties with the weaponisation and dissemination processes, and killing a dozen people (Begley). There is a greater amount of knowledge and technology available in our day and age than in 1995 with the Aum Shinrikyo attacks, but it is still unlikely that this will be the weapon of choice. Examining state biological weapons programmes, Soviet Russia had almost 60,000 personnel employed in their weapons development, with only about 100 people that actually knew how to take an agent through the full production process. In the United States, at Fort Detrick, there were 250 buildings with 3,000 personnel, and it took them a while to weaponise a single agent, such as botulinum (Manoj Karwa, Brian Currie and Vladimir Kvetan).

Nowadays, the narrative has assumed a worst case scenario analysis, and subsequently narrowed down bioterrorism to a single threat prognosis. There is little distinction made between what is conceivable and possible, and what is likely in terms of bioterrorism. Anything can be conceived as a terrorist threat, but what is the reality? The “Ebola Bomb” is not a danger. The likelihood of a bioterrorist attack remains highly unlikely (Teckman). The focus should be on preventing natural pandemics of human disease, such as tuberculosis, SARS, AIDS and influenza – emphasis placed on how we can cure diseases, and how medical training could be improved to contain, and avoid viruses such as Ebola altogether. Resources are being pumped into biodefence in the security as well as the medical sector, but preparedness and investment in bioterrorism needs to be in proportion to actual threats, otherwise, funds are diverted away from much needed public health programmes:

Diversion of resources from public health in the United States include diversion of funds needed for protection against other chemical risks – spills, leaks and explosives – and infectious diseases. Each year in the United States there are 60,000 chemical spills, leaks and explosions, of which 8,000 are classified as ‘serious’, with over 300 deaths. There are 76 million episodes of food-borne illness, leading to 325,000 hospitalisations and 5,000 deaths, most of which could be prevented. There are 110,000 hospitalisations and 20,000 deaths from influenza, a largely preventable illness, and there are 40,000 new cases and 10,000 deaths from HIV/AIDS. Diversion of resources for public health outside the US reduce the resources that can help provide protection against diseases rooted in poverty, ignorance and absence of services. — Victor W Sidel, “Bioterrorism in the United States: A balanced assessment of risk and response“, Medicine, Conflict and Survival 19, No. 4, 2003: 318-325.

The effectiveness of biological weapons has never been clearly shown, the numbers of casualties have been small and it is likely that hoaxes and false alarms in the future will continue to outnumber real events and create disruptive hysteria (Manoj Karwa, Brian Currie and Vladimir Kvetan). Emphasis needs to be back on medical research, as well as social science investigations into the roots of why terrorist groups would even want to pursue biological weapons, and the lengths they would go to use them. Let this be an avenue for further pondering and exploring, the realities of bioterrorism.

Sandra Ivanov is from New Zealand with a postgraduate education in Peace and Conflict Studies. She is currently an editor of the blog “Conflict and Security“, and primarily works in the non-government sector. You can find her through Linkedin or follow her updates on Twitter.

Sea Control 53 – Indonesian Security Policy

seacontrol-birthday

Happy Birthday CIMSEC! In celebration of CIMSEC’s first birthday, Sea Control Asia Pacific is bringing you a special podcast with an all-star cast. On the sidelines of the Conference of Australian and Indonesian Youth, Natalie Sambhi, of the Australian Strategic Policy Institute, hosts an in-depth discussion with Lieutenant General (rtd) Agus Widjojo (Indonesian Army), Brigadier General (rtd) Gary Hogan (Australian Army) and Jim Della-Giacoma (former head of International Crisis Group operations in Southeast Asia) on Indonesia’s defence and security, and maritime security in the region.

DOWNLOAD: Indonesian Security Policy

The podcast covers Indonesia’s security priorities, strategic communications and defence diplomacy, Asia Pacific cooperation on the South China Sea, naval modernisation, and US–Indonesia relations.

For some background of the events of 1965 mentioned by the guests, see here.

 

Fostering the Discussion on Securing the Seas.