Classes for Nothing and Degrees For Free Pt. 2, or Knowledge (That’s What I Want)

By LCDR Adam Kahnke and LT Scott Cheney-Peters

In our first post Scott and I wrote about education opportunities available for those supporting the U.S. Navy, from reserve Marine Corps to active Navy to civil servants. We’ve updated that post with additional options thanks to RADM James Foggo, CDR Stephen Melvin, Chrissy Juergens, LCDR Vic Allen, and Tetyana Muirhead. In that article we focused on free courses that can be used towards degrees or certificate programs. But that’s not the only type of free training available.

Alternatively, you might find yourself in the situation “Degreed Out” (BSEE, MBA, CDFM, CISSP, OA Cert from NPS…), in which getting another master’s degree or certification may start merely seeming like alphabet soup. Also, if you’re like me and you find yourself on shore duty, it should be a time for professional and personal development, right? I tried something different and took a few classes through Coursera. Six classes actually, and I’m happy to say this was a very positive and rewarding experience. Coursera offers what are known as massive open online courses (MOOCs). In contrast with the courses in our first post, these typically have no limit on the number of seats in the class and some can be started at any time, although there are many variations on the set-up. While they too don’t charge for enrollment, a few have a small fee to test or “certify” you upon the course’s completion if that is something you’d like to pursue.

With Coursera each class ranged from 6-12 weeks in length and all required a different but not insignificant amount of work.  What did I get for my efforts you ask? All but one of the courses offered me PDF certificates of completion that don’t mean much to anyone but me. More importantly, I learned more than I thought possible in subject matters I chose (Cryptography, Reverse Engineering of Malware, Financial Engineering, Computational Finance, High Performance Computing and Guitar) by the experts in the field (Stanford, University of London International Programmes, University of Washington, Columbia University, Georgia Tech, and Berklee School of Music).

In my humble opinion, this is the future of education. I think this is the greatest invention since the public library system. It is the public library system and the internet combined, with guided direction of the world’s greatest instructors thrown into the mix. I am convinced that this is how the world will judge future academic institutions and decide where they will send their children to study full-time. It is also quite possibly, how future college students will prepare and choose their degree paths. I expect great things for the future due largely to efforts such as these. For Scott’s part, he believes the business model will allow MOOCs to count towards degree and certificate programs at “brick-and-mortar” institutions if they are individually partnered with that institution and upon the successful completion of testing on a fee basis (The Economist has covered the possible future of MOOCs in more depth, as well as even shorter, less-formal learning tools).

Massive Open Online Courses (MOOCs)

For an aggregation of MOOC courses across these and other sites check out MOOC-List.

Coursera

courseraCoursera has 554 institutions offering course-work in various subject areas. Take the world’s best courses for free and earn a certificate of completion. Alternatively, pay a few dollars extra and earn a verified certificate. This certificate verifies your identity by using methods such as your typing patterns and using an online camera to verify your picture. One of the downsides for military members attempting to take Coursera classes related to your job is that the site is not compatible with NMCI’s old browsers.

iTunesU

iTunesU has a large collection of free podcasts in several knowledge areas.  Not surprisingly, if you want to learn how to write an iTunes App this is the place to go. It seems that may universities have their own portal on the iTunesU website.  In my opinion, Apple’s decision to host individual portals has left this site a bit of a mess and course material is slightly unorganized. However, once you find the content you are looking for, it could make your commute to work much more productive.

Udacity

While I have yet to try this one, Udacity is the same basic concept as Coursera but with a twist. You can take the classes completely on your schedule. Although limited in number by comparison, the course offerings looked fairly attractive. I think I may just try the “Intro to Hadoop and Map-reduce” course if I can squeeze it in. With no deadlines it is much more likely that I will sign up, poke around at the most interesting content, and if I am not completely enamored put it off until another day.

edX

edX_Logo_Col_RGB_FINALedX is another top-tier MOOC which at the time of this writing has 38 courses to choose from, provided in partnership with such institutions as Harvard, MIT, and Georgetown, spanning many subject areas. Most edX course videos are provided by means of YouTube and do their best to incorporate students into discussion groups on online forums. edX also offers certificates of completion, some requiring a fee for identify verification.

Navy Knowledge Online, MarineNet, and Joint Knowledge Online

We would be remiss if we didn’t mention these three sites, which are in fact long-running DoD-restricted versions of MOOCs. While they may not have the best reputation and are saddled with clunky, non-mobile interfaces, they do offer training on topics directly related to professional duties. Additionally, for those seeking to expand their knowledge beyond their designator or rate, there’s a range of interesting coursework available – from drone operations to intel “A” school to short cultural backgrounds on dozens of countries.

Defense Acquisition University (DAU), FEMA, DHS, Defense Security Service

Back in our first post we talked about (at least in the updated version) accredited courses and certificate options available through DAU, FEMA, DHS at NPS, DHS at Texas A&M, and the Defense Security Service’s Center for Development of Security Excellence. As a reminder, they have many online training options there for self-edification as well. Offerings typically focus on subject such as incident response management, cyber security, and counter-terrorism.

Languages

While Rosetta Stone used to be available free to servicemembers, that contract has since expired. However, there are still several options for beginning or furthering a language for free. Both NKO and JKO have several languages available, but they’re not the most interactive, and focus primarily on a few of the high-demand target languages and militarily useful skills. That said, if you’re already an intermediate speaker or going on a specific assignment and want to brush up on your ability to talk to your uniformed counterparts, these could be quite useful. iTunesU has a plethora of options, running from minute-long immersion to more structured serial listening podcasts. For those with smartphones there are a variety of free language apps that I have yet to try, but the Duolingo app comes highly recommended and takes an immersion and gamification approach to try and cram learning for fun into the nooks and crannies of your free time. Scott may have to put away The Simpsons Tapped Out and finally get back to his Spanish studies.

If you have any additional recommendations on language learning options, please let us know and we’ll perhaps come up with a part 3. In the meantime let us know what else we missed, and keep on learnin’.

This article was cross-posted by permission from JO Rules.

LCDR Vincent “Adam” Kanhnke is a Navy Campaign Analyst, submarine warfare officer, and runs the site www.cricx.org. He is a graduate of the University of Minnesota and the U.S. Naval Post-graduate School.

LT Scott Cheney-Peters is a surface warfare officer in the U.S. Navy Reserve and the former editor of Surface Warfare magazine. He is the founder and vice president of the Center for International Maritime Security (CIMSEC), a graduate of Georgetown University and the U.S. Naval War College, and a member of the Truman National Security Project’s Defense Council. 

Follow @scheneypeters

 

Developing an Assessment for the IO Environment in Afghanistan

You may be wondering what an article about Afghanistan is doing on a site about maritime security. Well, I found myself asking a very similar questions when, within six months of joining the U.S. Navy and graduating from Officer Candidate School (OCS) in Pensacola, FL, I found myself in a land-locked country serving on a Provincial Reconstruction Team (PRT) conducting counterinsurgency operations. The irony was not lost on me since I had joined very late in life (I was 35 when I went to OCS). The recruiter had said, “Join the Navy and see the world!” Little did I know we’d be starting in alphabetical order …

Meeting the requirements of an “individual augmentee” – (Fog a mirror? Check!) – and having just enough training to know how to spell “IO,” I arrived in Khost province in early 2008. I was fortunate to relieve a brilliant officer, Chris Weis, who had established a successful media and public diplomacy program and laid the groundwork for a number of future programs.

I decided that before setting out to win the “hearts and minds” of the local population, we needed to take stock of where we were and whether our efforts were achieving the effects we desired.

The goal of Information Operations (or “IO”) is to “influence, corrupt, disrupt, or usurp adversarial human and automated decision making while protecting our own.”[i] But how does one know whether the decision process, either human or automated, has actually been influenced in some way? We can assume or surmise that, based on the actions of the target of the IO campaign, some desired effect was achieved or not achieved. But how much of that was based on our IO campaign and how much on other factors, perhaps unknown even to us? We can also attempt to ask the target after the fact whether campaign activities influenced their decision making. But such opportunities might rarely arise in the midst of on-going operations. 

Commanders conducting counterinsurgency operations should have two primary IO targets: the insurgents and the local population. Retired U.S. Army officer John Nagl notes that “persuading the masses of people that the government is capable of providing essential services—and defeating the insurgents—is just as important” as enticing the insurgents to surrender and provide information on their comrades.[ii] A PRT is not charged with directly targeting insurgents. Instead, its mission is to build the capacity of the host government to provide governance, development, and these “essential services” for the local population.[iii]

Information Operations traditionally suffer from a lack of available metrics by which planners can assess their environment and measure the effectiveness of their programs. It may be impossible to show direct causation, or even correlation, between Information Operations and actual effects (i.e., did my influence program actually have its desired effect?). This often places IO practitioners at a distinct disadvantage when attempting to gain the confidence of unit commanders, who are tasked with allocating scarce battlefield resources and who are often skeptical of Information Operations as a whole.

Given these constraints it was clear that the PRT in Khost province, Afghanistan, needed a tool by which the leadership could benchmark current conditions and evaluate the information environment under which the population lived. We hoped that such a tool could help provide clues as to whether our IO (and the overall PRT) efforts were having the intended effects. As a result, we developed the Information Operations Environmental Assessment tool, which can be used and replicated at the unit level (battalion or less) by planners in order to establish an initial benchmark (where am I?) and measure progress toward achieving the IO program goals and objectives (where do I want to go?). 

Since my crude attempt was first published in 2009, the U.S. Institute of Peace (yes, there is such a thing) developed the metrics framework under the name “Measuring Progress in Conflict Environments” or “MPICE.” This project seeks to:

provide a comprehensive capability for measuring progress during stabilization and reconstruction operations for subsequent integrated interagency and intergovernmental use. MPICE enables policymakers to establish a baseline before intervention and track progress toward stability and, ultimately, self-sustaining peace. The intention is to contribute to establishing realistic goals, focusing government efforts strategically, integrating interagency activities, and enhancing the prospects for attaining an enduring peace. This metrics framework supports strategic and operational planning cycles.

No doubt the MPICE framework is far more useful today than my rudimentary attempt to capture measures of effect in 2008, but I hope in some small way others have found a useful starting point. As I learned firsthand, and as practitioners of naval and maritime professions know, what happens on land often draws in those focused on the sea. 

The author would like to thank Dr. Thomas H. Johnson and Barry Scott Zellen, both of the Naval Postgraduate School, for their professional mentorship and constructive advice, and for including my work in their book.

LT Robert “Jake” Bebber is an information warfare officer assigned to the staff of Commander, U.S. Cyber Command. He holds a Ph.D. in public policy from the University of Central Florida and lives with his wife, Dana and son, Vincent in Millersville, Maryland. The views expressed here are not those of the Department of Defense, the Navy or those of U.S. Cyber Command. He welcomes your comments at [email protected].

 


[i] Joint Publication 3-13 Information Operations, p. ix

[ii] Nagl, John A. Learning to Eat Soup With a Knife: Counterinsurgency Lessons from Malaya and Vietnam. Chicago: University of Chicago Press, 2002, p. 93.

[iii] Ibid.

Sea Control 22 – Behind the Curtain

seacontrolemblem(Download: Sea Control 22 – Behind the Curtain, the First.)

A. Denis Clift, former Naval Officer, president emeritus of the National Intelligence University, and Vice President for Operations of USNI, joins us to talk about his reflections on his time in the Antarctic, Cold War intelligence, life, and the United States Naval Institute. This is the first of a bi-monthly series that will be investigating his career during the Cold War.

We are available on Itunes, Stitcher Stream Radio, etc… Remeber to subscribe, leave a comment and a 5-star rating.

What if the U.S. Gave an “Air-Sea Battle” and No One Came to Fight?

There has been much discussion in the past year on the relative merits and disadvantages of Air-Sea battle as a potential strategy or operational concept. Much of the debate has been a comparison between the warfighting options embodied in the Navy/Air Force concept verses those less kinetic choices incorporated in an “offshore control”, blockade situation. The usual opponent for these measures is the People’s Republic of China. Those in favor of these competing concepts rarely “give the potential enemy a vote” and talk more of what their idea could do vice what the opponent’s response might be. China’s own strategic choices ought to play a greater role in the discussion of these competing plans. One of the most surprising outcomes might be a failure on the part of the Chinese to engage with either vision. A review of a historical similarity, and recent Chinese strategic actions might very well suggest that if the United States attempted to have an Air-Sea battle, the People’s Republic could easily choose to not attend the event and still win the war.

This is not the first time that carefully laid plans for war at sea have come to naught. The naval situation in the North Sea throughout the First World War is an excellent example of one side not really needing to do battle in order to gain an advantage. On the outbreak of war in August 1914, many observers assumed there would be a titanic naval battle in the North Sea between the British Royal Navy (RN)’s Grand Fleet and Imperial Germany’s High Seas Fleet for the domination of the Atlantic. Noted American naval theorist Admiral Alfred Thayer Mahan had predicted such an event as the logical result of the conflict of great naval powers. Both navies had planned for a confrontation for many years. They held a ten year naval race in the construction of battleships. German officers spoke of “der tag” (the day) that they would meet and defeat the Royal Navy in battle and the German Kaiser Wilhelm II complained that British Navy charts he observed on a visit to British battleship listed the German fleet as the principal British opponent. When war did come however, the seas were largely silent and no great battle immediately took place. German naval officers may have spoken of an immediate engagement with the RN, but their leadership had a much more nuanced strategy for success.

The Germans wanted to defeat the Royal Navy, but they knew they did not have the numbers to immediately force a decision. Instead they conducted numerous raids in hope of drawing out a portion of the RN they could defeat, and thereby even the odds in a follow-up fleet engagement. They were persistently unsuccessful in doing this, and although there was a brief opportunity at the May 1916 Battle of Jutland to accomplish this goal and destroy the RN’s battle cruiser squadron, the prompt arrival of the bulk of Grand Fleet frustrated these efforts and the German’s beat a sharp retreat for home. Many experts, including such luminaries as Winston Churchill and Admiral Sir John Fisher castigated Grand Fleet Commander Admiral Sir John Jellicoe after the battle for failure to repeat the efforts of the famous Admiral Nelson, who destroyed the combined French and Spanish fleets at the Battle of Trafalgar in 1805.

In reality, Jellicoe had little chance of repeating Trafalgar as the Germans’ strategy did not support the likelihood of a fleet engagement of that magnitude. The German fleet had little reason to come to sea and face annihilation by the British. Its merchant fleets had already been rounded up, and submarines would increasingly become the principle tool for threatening the lines of communication and supply to the British Home islands. All of its vital resources came through protected waters like the Baltic Sea or through overland routes. Although the German surface fleet eventually became demoralized and rebellious after four years of inactivity, hunger, and fanatical disciplinary measures, its basic strategy of “doing nothing” was fully supportable. Admiral Jellicoe could truly have “lost the war in an afternoon” had a significant part of the British fleet been destroyed in battle, but the Germans on the other hand could afford to wait.

China could also afford to wait out any attempts to apply Air-Sea battle just as the Germans did in World War 1. China’s strategic calculations remain open to debate. The Chinese Navy’s leadership may talk boldly about their fleet and its capabilities, but it remains questionable what that fleet might do in wartime. It could be employed in a sudden rush to conquer Taiwan, and then retreat behind the formidable Chinese Anti-Access/Area Denial (A2AD) system. Such a move would leave U.S. naval and air units without a seagoing opponent, but facing potentially high casualties in breaking through shore-based Chinese defenses to aid an occupied Taiwan. Unlike the British in World War 1 whose principle bases were a day’s sail from the potential battleground, a U.S. fleet would need to remain far at sea on station expending fuel, time, and energy waiting for a Chinese naval sorties that might never occur.

A blockade might be equally fruitless. The Chinese have worked to develop alternative shore-based routes for vital supplies like petroleum products and other basic resources for war. The Chinese govt. has invested large sums of money in the Pakistani port of Gwadar on the Indian Ocean. It signed an agreement with the Pakistani govt. in 2013  to build a 2000 km. long road and rail route from Gwadar to the Chinese city of Kashgar. This route would largely circumvent any U.S. attempts to blockade Chinese fuel imports. The Chinese govt. has also developed friendly relations with Iran and Iranian oil shipped overland to Gwadar would entirely avoid naval blockade efforts. Further Chinese movement of resources and goods for commerce could be conducted through the vast Asian steppes of the Russian republic, another nation with whom China has cultivated an improved relationship. In the early 20th century, British geopolitical theorist Sir Halford Mackinder described this Asian interior as the “heartland” of a future Eurasian economic system. It remains, as it was in Mackinder’s time as largely immune to Western and U.S. military efforts aside from a dwindling U.S. strategic Air Force.

The British Royal Navy desperately desired to engage the German High Seas fleet, and in doing so somehow force an end to the First World War. German strategic thinking made this an unattainable goal. Chinese strategic efforts may equally make both Air-Sea battle and “offshore control” blockades fruitless endeavors. Some commentators have complained that the services’ effort to define these concepts has been slow. This is actually beneficial in that China’s strategic calculus remains nebulous. The usual U.S. methods of creating “strategy” through defense budgets and weapon programs are likely to fail if geography and history are not taken into consideration in planning a U.S. response. The U.S. might plan to conduct Air-Sea battle or an offshore control blockade, but neither would be useful if the Chinese chose not to accept the invitation. The U.S. can no longer deny the opponent their vote in the planning to counter their next move.

Fostering the Discussion on Securing the Seas.