Congrats to the New Officers

Still our tropical island fortress boardroom.
Some day we will move to our tropical island fortress boardroom.

Congrats to our 2013-2014 Officers!

President: Annie George
Vice President and Director of External Relations: Scott Cheney-Peters
Director of Membership: Chris Barber
Director of Social Media: H. Lucien Gauthier III
Director of the NextWar Blog: Matt Hipple
NextWar Journal Editor in Chief: Michael Junge

Associate Editors
James Bridger
Sherman Patrick
Michael Haas
Matt McLaughlin
Matt Hipple
John Wilshusen
Scott Cheney-Peters

Chapter Presidents
New Caledonia/France: Alix Willemez

Unfortunately our candidate for Director of Operations and Treasurer found out his company ruled against his taken on the positions as a potential conflict of interest. So those two are vacant for now, but if you have any interest or would like to nominate a candidate, please let us know. Likewise, if you have any interest in becoming a chapter president we would like to work with you to carry the CIMSEC banner in your neighborhood.

More to come on the way ahead, and congrats again!

Video Game AI and the Future UCAV Top Gun

My brother in flight school should be glad we played so much Ace Combat 4.
Alright, Roomba, now start sweeping for enemy units.

A Roomba is useful because it can sweep up regular messes without constant intervention, not because it can exit and enter its docking station independently. Although the Navy’s new X-47B Unmanned Combat Air Vehicle (UCAV) has, by landing on a carrier, executed an astounding feat even for humans, this ability only means our weapons have matured past their typical one-way trips. The real challenge will be getting a UCAV to defend units while sweeping up the enemy without remote guidance (i.e. autonomously). The answer is as close as the games running on your Xbox console.

 

 

Player One: Insert Coin

ace-combat-5-the-unsung-war-20041024114416859
Simulated fighters are UCAVs having an out-of body experience.

Considering the challenge of how an air-to-air UCAV might be programmed, recall that multiple generations of America’s youth have already fought untold legions of advanced UCAV’s. Developers have created artificial “intelligences” designed to combat a human opponent in operational and tactical scenarios with imperfect information; video games have paved the way for unmanned tactical computers.

A loose application of video game intelligence (VGI) would work because VGI is designed to operate in the constrained informational environment in which a real-life UCAV platform would operate. Good (i.e. fun) video game AI exists in the same fog of war constraints as their human opponents; the same radar, visual queues, and alerts are provided to the computer and human players. The tools to lift that veil for computer and human are the same. Often, difficulty levels in video games are not just based on the durability and damage of an enemy, but on the governors installed by programmers on a VGI to make competition fair with a human opponent. This is especially evident in Real Time Strategy (RTS), where the light-speed all-encompassing force management and resource calculations of a VGI can more often than not overwhelm the subtler, but slower, finesse of the human mind within the confines of the game. Those who wonder when humans will go to war using autonomous computers fail to see the virtual test-bed in which we already have, billions of times.

This Ain’t Galaga

No extra lives, and forget about memorizing the level's flight patterns.
No extra lives, and forget about memorizing the level’s flight patterns.

Those uninitiated must understand how VGI has progressed by leaps and bounds from the pre-programmed paths of games such as the early 1980’s arcade shooter Galaga; computer opponents hunt, take cover, maneuver evasively, and change tactics based on opportunities or a sudden states of peril. The 2000’s Half-Life and HALO game series were especially lauded for their revolutions in AI – creating opponents that seemed rational, adapting to a player’s tactics. For the particular case of UCAV air-to-air engagements, since the number of flight combat simulators is innumerable, from Fighter Pilot on the Commodore 64 in 1984 to the Ace Combat series. Computers have been executing pursuit curves, displacement rolls, and defensive spirals against their human opponents since before I was born.

However, despite its utility, VGI is still augmented with many “illusions” of intelligence, mere pre-planned responses (PPR); the real prize is a true problem-solving VGI to drive a UCAV. That requires special programming and far more processing power. In a real UCAV, these VGI would be installed into a suite far more advanced than a single Pentium i7 or an Xbox. To initiate a learning and adapting problem-solving tactical computer, the DARPA SyNAPSE program offers new possibilities, especially when short-term analog reasoning is coordinated with messier evolutionary algorithms. Eventually, as different programs learn and succeed, they can be downloaded and replace the lesser adaptations on other UCAVs.

I’ve Got the Need, The Need For Speed

Unlike Maverick, drones will never have to go through motorcycle safety training.
Unlike Maverick, drones will never have to go through motorcycle safety training.

When pilots assert that they are more intuitive than computer programs, they are right; this is, however, like saying the amateur huntsman with an AR-15 is lesser trained than an Austrian Arabesquer. The advantage is not in the quality of tactical thought, but in the problem solving rate-of-fire and speed of physical action. A VGI executing air-to-air tactics in a UCAV can execute the OODA loop encompassing the whole of inputs much faster than the human mind, where humans may be faster or more intuitive in solving particular, focused problems due to creativity and intuition. Even with the new advanced HUD system in their helmets, a human being cannot integrate input from all sensors at an instant in time (let alone control other drones). Human pilots are also limited in their physical ability to maneuver. G-suits exist because our 4th and 5th generation fighters have abilities far in excess of what the human body is capable. This artificially lowers aircraft tactical performance to prevent the death or severe damage of the pilot inside.

Pinball Wizard: I Can’t See!

VGI doesn’t have a problem with the how, it’s the who that will be the greatest challenge when the lessons of VGI are integrated into a UCAV. In a video-game, the VGI is blessed with instant recognition; its enemy is automatically identified when units are revealed, their typology is provided instantly to both human and VGI. A UCAV unable to differentiate between different radar contacts or identify units via its sensors is at a disadvantage to its human comrades or enemies. Humans still dominate the field of integrating immediate quality analysis with ISR within the skull’s OODA loop. Even during the landing sequence, the UCAV cheated in a way by being fed certain amounts of positional data from the carrier.

We’ve passed the tutorial level of unmanned warfare; we’ve created the unmanned platforms capable of navigating the skies and a vast array of programs designed to drive tactical problems against human opponents. Before we pat ourselves on the back, we need to effectively integrate those capabilities into an independent platform.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

Tools of the Trade

How the U.S. Navy is embracing crowdsourcing and cloud collaboration, what it means to you, and how you can take advantage of the tools

Readers of the NextWar blog will recall that in the past I’ve bemoaned the U.S. Navy’s limited success tapping into web-enabled “social” tools. Specifically, I noted the lack of efforts to use either crowdsourcing tools to generate and develop ideas, or to provide the sort of collaborative tools to which Sailors have grown accustomed in their personal lives.

"Let me zee vhat you are verking on..."
             “Let me zee vhat you are verking on…”

In addition to the exceptions I mentioned in the article, such as the U.S. Naval Postgraduate School (NPS)’s MMOWGLIs, commentators kindly pointed out a few more, and I have through professional exposure since stumbled upon others. Further, as many are likely aware, in just the past month some new tools have come online or been revamped. I feel, therefore, a reassessment is warranted. What follows is a brief overview of the social web-enabled tools on offer for U.S. maritime professionals – whether by culling ideas (the Crowdsourcers) or by empowering organizations (the Collaborators). I’m more familiar with some than others, but this is not intended to be an exhaustive review – the best way to fully learn the caps and lims of any of these sites is to play around with them and see how they can aid in your specific mission accomplishment.

From our non-U.S. friends, I’d be interested to hear what’s available in their toolboxes to leverage the concepts and underlying platforms of the web.

The Crowdsourcers:

Massively Multiplayer Online Wargame Leveraging the Internet (MMOWGLIs)

NPS partners with various other Navy commands to run these online games, which tap into the combined knowledge and ideas of the invited crowd to respond to scenario prompts. These response ideas are critiqued by other players, steering the decisions in future actions in the game, allowing people to work through (and the game sponsors to collect input on) the second- and third-order consequences of potential solutions. Past MMWOGLIs have focused on topics such as piracy and the electro-magnetic spectrum, while the next MMWOGLI (scheduled for September) will focus on additive manufacturing (aka 3D-printing), of which we have written about much on this blog. My only real complaint is that I’ve had trouble accessing past MMWOGLIs on a lot of NMCI computers, so can’t really speak personally to the “gameplay”.

RAD

This new site is the core of the CNO’s recent tasking to find ways to create a more efficient Navy by Reducing Administrative Distractions — or RAD. The site uses the IdeaScale platform and boasts a clean look, crowdsourcing, and gamification: users vote for favorite posts, earn points through a variety of manners – incentivizing input, earn patches for a variety of “accomplishments”. While a leaderboard displays the top point-earners, the Admiral in charge of the effort is looking to tie the virtual rewards with real ones. According to NavyTimes:

“While they are still working out details, [RDML] Shelanski said he hopes to secure funds to reward the generators of the top 10 ideas. He would like to award $1,000 prizes for the top three ideas. The rest of the top 10 would each earn $500.”

Nearly 600 ideas were submitted by the time of this writing. Unsurprisingly many posts take the form of typical Sailor complaints only loosely related to “administrative distractions”, but the better ones suggest practical solutions. My suggestion to the moderators is to give themselves a “pause” on new idea submissions every week or so, giving themselves the chance to actually find the diamonds in the rough and collate the many duplicative submissions, while still allowing the rest of the community to comment on the “ideas”.

NWDC’s CollabLab

NWDC's CollabLab: Not to be confused with Bob Lablaw's Law Blog
NWDC’s CollabLab: Not to be confused with Bob Lablaw’s Law Blog

The proverbial “suggestion box” set up by the U.S. Naval Warfare Development Command (NWDC) asks users to “pose solutions to problems by providing an easy-to-use platform to submit ideas, provide feedback, and vote for the best ideas.” Similar in function to RAD, but more broadly focused. You can participate both by donating your brightest thoughts and critically evaluating those of others. Also uses voting feedback to rate the ideas, although comments are more plentiful than votes.

The site features a handy Domino’s-like status “tracker” of your idea in the review/implementation process (although unlike the pizza it will unfortunately take longer than 20 minutes to see results). You can also see if it has been rejected, and the reason why, or moved over to the SIPR version for processing. It may suffer, though to a lesser degree, the same challenge of giving every idea a fair shake and collating duplicative submissions.

(Full disclosure: I’m a member of NWDC’s CNO’s Rapid Innovation Cell, or CRIC)

The Collaborators:

Although it would mean a loss of some control over functional design, for efficiency’s sake Navy organizations or groups in search of cloud collaborative sites should consider using Milsuite, Intelink, Max.gov, or Navy Lessons Learned rather than spending money to create their own.

Milsuite

logo-milbookThrough Milsuite’s Milbook site, small (or large) DoD teams can use a an access-controlled, slick-looking cloud collaborative site to centralize documents, tasks, and discussions in a specific “group”. Users have a variety of project management tools they can integrate, and search for other users with expertise in a given functional area to bring in to critique ideas. The only real downside is that some functions, especially the permissions/access settings, are not entirely intuitive and the help documents leave a bit to be desired.

Intelink

This site is restricted to federal employees with associated email or CAC/PIV. But like Max.gov, by keeping it broadly open it enables collaboration for projects across federal agencies. Users can on NIPR can create an Intellipedia page and on SIPR create a “team” to do the discussion and file-sharing collaboration. NIPR is expected to increase functionality and tools with Google platform tie-ins, but for now the SIPR version is a bit easier to use for collaboration.

MAX.gov

This site is restricted to federal employees with associated email, allowing for cloud collaboration on projects across federal agencies. I have only poked around it a little but my first impression is that it is functional (posting documents, commenting, discussions), but some what bare-boned.

Defense Connect Online (DCO)

DCO_LOGO_200DCO’s basic purpose is web conferencing. It allows DoD users to create a virtual meeting that can integrate voice (with computer microphone/speakers), chat, and PowerPoint display functions – sharing slides and other files. Those on the go can also access the website via smartphones and a downloadable app, and a SIPR version is available. The site is great for those of us without VTC capabilities who want to add some visual oomph to telecons and keep everyone on the same page. The ability to hang and trade information is also nice – the files can also be kept up for a long time, so anyone who wants them again can just be directed back to the site.

The computer-driven version is pretty easy to use and understand, but I had a little more trouble on a smartphone working the site (There is an updated version that I’ve not yet had the chance to try). I’d also like to see DCO directly integrate phone lines as those hosting meetings typically must set up a separate telecon bridge to allow those who can’t pull up DCO from a phone or computer to also participate. With the reduction in travel spending there has been a marked uptick in the usage of this site – to the point where it has been maxing out its capacity. Lastly, I’m not sure how bandwidth-intensive this would be for anyone underway, but my guess is it wouldn’t handle well.

NWDC’s TacticsLive site

Another collaborative site run by NWDC could be used to pick up some of the slack left by the loss of groups such as the Surface Warfare Development Group for tactical innovations. Unfortunately in my limited poking around on the site on SIPR (http://tacticslive.nwdc.navy.smil.mil.) It doesn’t appear much used. This points to one of the fundamental truths of the collaborative sites: No matter how good in concept or design they are, they can’t help users collaborate unless they have users to begin with (often through command endorsement or enforced use).

Interagency Lessons Learned

I decided to return to the source – several years ago – of my angst with the Navy’s web-enabled tools and find out what’s changed. Navy Lessons Learned, part of Interagency Lessons Learned, has definitely undergone a facelift, and the ability to submit lessons learned has increased. There is also a “Communities of Practice” feature that allows those with the initiative to collate/centralize data (share observations/lessons learned/documents, etc., and comment on them) for communities at any level – from interagency groups to a wardroom. So those are big improvements.

Unfortunately, it’s still a bit clunky, dated looking, and not intuitive to navigate or search. It’s also split between NIPR and SIPR – which on one hand allows users to get more specific, but on the other splits efforts and users – sometimes in confusing fashion, as with the otherwise valuable Port Visits feature.

An “Issue Resolution” crowdsource function is ignored on NIPR, but has some legs on SIPR. Yet the process is opaque and clunky in comparison with the RAD and CollabLab sites. Without reading through the “training material” one has no idea who moderates the submissions or whether they will end up getting a fair look.

However, for its flaws, staffs or other groups looking for the infrastructure to quickly stand up restricted group to share restricted (FOUO or SECRET) files and lessons learned will find this site provides the no-frills functionality to do so, but as with the others it needs someone to convince or enforce everyone in the group to use the site. As with the Port Visits feature, there’s good nuggets in the site, but you have to dig for them.

Crafting a Counter-Piracy Regime in the Gulf of Guinea

The winds of global piracy have shifted, as attacks by West African pirates now exceed those of their Somali counterparts. The Nigeria-based pirates may not yet inspire Hollywood films, but they have prompted regional governments to take collective action. A June 24-25 summit in Yaounde, Cameroon brought representatives from the Economic Community of West African States, the Economic Community of Central African States (ECCAS) and the Gulf of Guinea Commission together to draft a Code of Conduct concerning the prevention of piracy, armed robbery against ships and illicit maritime activity; now signed by 22 states.

The Gulf of Guinea’s problem is not a dramatic rise in the number of attacks, but the expansion of a criminal enterprise once restricted to Nigerian waters into those of neighboring states. While support vessels operating near Nigeria’s oil fields have been pirate targets for decades, the hijacking and full-scale pilfering of oil tankers is a recent development. This modus operandi first appeared off Benin in December 2010 and has spread to the waters of Togo and Côte d’Ivoire in subsequent years. According to Risk Intelligence data, there were at least 93 tanker attacks in the Gulf of Guinea between December 2010 and May 2013, resulting in some 30 hijackings.

2013 Pirate Attacks in the Gulf of Guinea (IMB)
2013 Pirate Attacks in the Gulf of Guinea (IMB)

Tanker traffic is particularly dense in the Gulf of Guinea because Nigeria, the region’s largest oil producer, lacks the capacity to refine its own product. Crude oil is thus transported out of Nigeria, refined elsewhere, and then imported back into the country where it is sold at below market rates thanks to a government fuel subsidy. Nigerian criminal syndicates, backed by high-level political and economic patrons, are exploiting this situation by targeting specific tankers for hijacking, offloading their cargo to secondary vessels and then selling the product on the lucrative black market.

A conference of regional experts, held in preparation for the Cameroon summit, estimates that maritime crime is now bleeding the Gulf of Guinea’s states some $2-billion a year in lost port revenue, insurance premiums and security costs. West Africa has now reached a tipping point, like East Africa and South East Asia before it, where the geographic expansion of pirate activity demands a coordinated response. An examination of previous regional efforts to combat piracy thus serves as both a guide and warning for the Gulf of Guinea’s new endeavor.

Regional Counter-Piracy in Context

As a response to increased pirate attacks in the wake of the 1997 Asian Financial Crisis, 16 states drafted the Regional Cooperation Agreement on Combating Piracy and Armed Robbery Against Ships in Asia (ReCAAP) in 2004, which came into effect 2006. The organization is credited with reversing the spike in piracy that coincided with the 2009 global economic downturn, as attacks against ships in the region have steadily fallen from 2010 to 2013. Notable in this success was the establishment in Singapore of an Information Sharing Center (ISC) that facilitates the collection, analysis and dissemination of piracy information among member states.

ReCAAP obligates its members to take legal measures against vessels and individuals who commit acts or robbery or piracy; to extradite such individuals at the request of another state; and to render mutual legal assistance in such cases. Donations from member states fund ReCAAP’s central budget – Singapore and Japan being the largest donors – with additional support coming from out-of-area signatories such as Norway and the Netherlands.

Concerns over state sovereignty have prevented closer cooperation with ReCAAP, as equipment procurement and counter-piracy patrols remain the responsibility of individual states, and national security forces are unable to pursue suspected pirates across maritime boundaries. ReCAAP is also hampered by the unwillingness of Malaysia and Indonesia—the two most pirate-prone states in the region—to ratify the agreement.

As Somali piracy rapidly expanded in the late 2000s, the international community hoped to replicate the success of ReCAAP through a counter-piracy agreement encompassing Eastern Africa and the Arabian Peninsula. Steered by the International Maritime Organization (IMO), the Djibouti Code of Conduct (DCoC) was adopted by nine states in January 2009 and has since expanded to 20 signatories spanning from Jordan to South Africa.

An independent study notes that the DCoC has made significant progress in information sharing, legal reform, and the training of coastguards. At least twelve member states have introduced legal changes to cover the crime of piracy. These developments have been credited for the higher percentage of arrested pirates now being tried and prosecuted in regional courts. The DCoC’s projects are largely financed by an IMO-managed trust fund of some $14-million, funded by maritime states such as Japan, the Netherlands, Norway, and South Korea.

Heading Back West

Influenced by these previous agreements, the Gulf of Guinea’s new Code of Conduct calls on signatories to: share and report relevant information; interdict vessels suspected of engaging in illegal activities; ensure those committing such acts are apprehended and prosecuted; and facilitate the care and repatriation of seafarers subject to illegal activity.

As was done in Singapore, the West and Central African leaders aim to build a regional maritime security center, based in Cameroon, which will facilitate information sharing among governments. The center, it is hoped, will address the massive underreporting of pirate attacks that occurs in the Gulf of Guinea and improve regional maritime domain awareness. However, the examination of previous efforts reveals that regional competition and suspicion are likely to hamper this process. Malaysia refused to join ReCAAP because it viewed the ISC in Singapore as a duplicative competitor to the International Maritime Bureau’s Piracy Reporting Center based in Kuala Lumpur. Similarly, disagreements within the DCoC resulted in the establishment of three separate information sharing centers in Yemen, Kenya and Tanzania.

PMSCs have helped curb piracy off Somalia, but they are not allowed in the Gulf of Guinea
PMSCs have helped curb piracy off Somalia, but they are not allowed in the Gulf of Guinea

Absent from West Africa’s new agreement was any mention of the counter-piracy role that Private Maritime Security Companies (PMSCs) might play in the Gulf of Guinea. Foreign armed guards are not allowed in the territorial waters of local nations, forcing transiting vessels to hire military personnel from regional states and embark and disembark them along route. Several PMSCs were confident that the new agreement would allow them to operate inside the territorial waters of West African states, but concerns over state sovereignty and vested interests in the current system likely prevented such an arrangement from materializing.

Nor are international naval operations likely to be the panacea to West African piracy. At the summit, Ivorian President Alassane Ouattara called on the international community “to show the same firmness in the Gulf of Guinea as displayed in the Gulf of Aden, where the presence of international naval forces has helped to drastically reduce acts of piracy.” However, NATO and the EU have already begun to drawdown assets from their Horn of Africa operations, set to terminate at the end of 2014, and there does not appear to be the political will for cross-continental redeployment. Furthermore, while almost all Somali pirate attacks occur on the high seas, the vast majority of attacks in the Gulf of Guinea take place in territorial waters, primarily those of Nigeria. This serves to render foreign naval vessels both unwelcome, due to local concerns for state sovereignty, and ineffective, as they are unable to operate so close to the shore.

Live Together, Die Alone

The absence of PMSCs and international naval operations means that a counter-piracy regime for the Gulf of Guinea will have to be local and regionally owned. This is a desirable and more sustainable course of action, but it means that the new Code of Conduct must contend with the low level of maritime security capacity that permeates across the region. Nigeria is the only state in the region that possesses a frigate, corvette, or aerial surveillance capacity. However, only an estimated 28% of Abuja’s navy is operational at any given time, meaning that maritime operations usually amount to intermittent sweeps, rather than a continuous patrol presence. The other littoral nations’ “navies” are more accurately described as coastguards. Taken together, West and Central African states are estimated to have fewer than 25 large security vessels available for interdiction efforts. In terms of force multiplying, Nigeria has engaged in joint patrols with Benin since 2011, but there was little indication in the new agreement that other states will join these operations.

Togo's tiny navy is now on the front line in fight against piracy
Togo’s tiny navy is now on the front line in fight against piracy

As was the case with the DCoC, the IMO has established a trust fund for the Gulf of Guinea that will allow donor states to offset capacity building costs, and it is advisable that the U.S, EU, Japan and others use this as a common channel to coordinate their existing security efforts in the region. Not limiting itself to carrots, the U.S is also trying to exert pressure on Nigeria by issuing a 90-day ultimatum (set to expire at the end of August) to improve port security or face the diversion of U.S-flagged shipping.

While piracy is now a regional issue for the Gulf of Guinea, this ultimatum highlights the fact that the drivers of the crime and its ultimate solution both lay in Nigeria. The country’s fuel subsidies and the lack of local refining capacity are at the root of West Africa’s petroleum black market, and endemic corruption has protected the economic and political elites suspected of profiting from it. Inequality and local grievances in the Niger Delta have been only superficially addressed by payments from a government amnesty program, leaving a massive pool of unemployed young men who see piracy and oil theft as their ticket out of poverty.

Off the coast of Somalia, international naval operations, regional agreements and private armed guards have helped to suppress and contain piracy. In the Gulf of Guinea, enhanced regional cooperation – through information sharing, capacity building, and joint patrols – should serve to roll back the geographical expansion of Nigeria’s pirate gangs. In both cases however, a permanent solution rests within the state that gave rise to regional piracy. Closer maritime coordination in the Gulf of Guinea is a welcome development, but the road to secure marine environment will ultimately have to run through Nigeria.

James Bridger is a maritime security consultant and piracy specialist at Delex Systems Inc. He can be reached at jbridger@delex.com

Fostering the Discussion on Securing the Seas.