Low Tech – High Tech: The Dichotomy of Piracy Tactics and Threat Mitigation

Maritime security, specifically counter-piracy, has undergone an evolution. Spikes in piracy and changes in contemporary threat perception first introduced the ‘Generation One’ maritime security paradigm: the presence of armed guards and kinetic means to protect vessels, goods, and people at sea. Pushes by various groups and governments for increased regulation in this sector, however, quickly ushered ‘Generation Two’ onto the scene, marked by decreases in armed personnel along with rapid acquisition and deployment of high-tech equipment.

Increased reliance on technology increases vulnerabilities. The more components that exist in a system, the more chances the system has to break down or fail. Evaluating radio and satellite communications, vital for ship-to-shore and ship-to-ship communication creates a weak-link even in the most basic technology. Mostly unencrypted, these virtually open frequencies are susceptible to interception by hostile parties. Pirates, for example, can and do listen-in on radio communications, using gathered intelligence to plot ship courses and plan their attacks. They can wreak further havoc by interfering with communications, jamming signals, or even feeding misinformation. Thus, commercial maritime security has morphed from physical protection of assets to incorporate elements of signals intelligence, electronic, and cyber warfare.

More disturbing perhaps are reports of pirates, leveraging not only conventional communications, but Automatic Identification System (AIS) data to plan attacks. AIS, used for monitoring vessel movements, has now become an intelligence tool for pirates to locate and select targets. Unlike radar monitoring which requires sophisticated hardware and skill, AIS data is readily available online by a variety of commercial Geographic Information System (GIS) providers. Pirate planners, with standard computer and internet connection, or even just a smartphone, can view and monitor AIS connected vessels worldwide. They can then selectively evaluate potential targets, track their movements, and use gathered information to coordinate attacks. This exemplifies the double-edged sword that technology is: on one hand aiding safety and security, allowing precise positioning and geomapping of vessels to aid operators in their daily business and guide search-and-rescue teams should anything go wrong at sea. On the other hand, improvements in technology also open vulnerabilities that multiply risk, proliferating cheap hardware and valuable information to potential perpetrators.

AIS Data
AIS data indicating real-time vessel locations

 

Interestingly, pirates, just like terrorists, drug-runners, and other criminals, are simultaneously employing low-tech, low-fi solutions to overcome or circumvent high-tech defenses. They are enhancing the performance of engines and hulls; are insulating outboard motors in (mostly unsuccessful) attempts to hide from thermal-imaging cameras; and, are even observed wearing ear-muffs to mitigate effects of Long Range Acoustic Devices (better known as LRADs or Sound-cannons). Such synthesis of simple, yet outside-the-box creative tactics and low-tech equipment, which together are capable of overcoming expensive and sophisticated systems is today’s ‘Generation Three’ piracy/counter-piracy paradigm. It’s exemplified by the continuation of asymmetric threats in the maritime domain, the widening of the technological divide between attacker and defender, and the carry-over of the debate about technology’s ability to reduce risk at sea.

Although shiny kits and gizmos undoubtedly ease processes and enhance operators’ technical situation, experts must evaluate if employment of such sophisticated hardware, whether on a ship, offshore installation, or even in ports will genuinely reduce risk while operationally remaining within legal constraints. They must consider how technology can enhance security, how it can fail, how it can be defeated, and moreover how it can be exploited by potential assailants.

Maritime security planners must not only seek to develop innovative products and procedures to enhance safety in this ‘Generation Three’ paradigm, but must also apply ingenuity in fusing high and low-tech solutions to counter asymmetric maritime threats. They must consider borrowing successful land based tactics from counter-terrorism, counter-insurgency, and other low intensity conflict operations and find applications for their use in the maritime environment. On land, this blend of hardening assets in conventional ways, maintaining an innovative yet ‘low-tech-low-fi’ profile, and preempting perpetrators actions through better understanding the rules and tactics of their own game has proven triumphant. Replicating this strategy at sea will be a crucial key to piracy threat reduction.

Simon O. Williams is a maritime security analyst specializing in offshore installation and port security, Arctic maritime challenges, naval capabilities, and multinational cooperation. He previously worked in the American and European private sector and US government, but now contributes independent analysis to industry, media, and policymakers while pursuing an LL.M. in Law of the Sea from University of Tromsø, Norway.

Drones for Maritime Activisim

 

Phase 1: Stop illegal driftnet fishing in the Med. Phase 2: Keep those pesky children out of my flowerbeds.
First we stop driftnet fishing in the Med, then we get those pesky children out of my flowerbeds.

The Black Fish is a non-governmental organization (NGO) “working for the oceans that has integrated the use of unmanned air vehicles in support of its marine wildlife protection operations.  Blackfish’s UAS were provided by Laurens De Groot’s organization ShadowView, which supplies UAVs to non-profits for conservation projects.  The group flew initial demonstration sorties with a quad-rotor over a harbor and is looking to improve their UAS capabilities to fly longer-range missions over the open water in an effort to expose illegal driftnet fishing in the Mediterranean
 
The Black Fish joins the ranks of a growing number of NGOs using drones for maritime activism, specifically UAVs for surveillance operations, including Sea Shepherd Conservation Society, Earthrace Conservation, and Greenpeace.

This article was re-posted by permission from, and appeared in its original form at NavalDrones.com.

The Shifting Center of Gravity for Piracy in Africa

Maritime Criminals in the Niger Delta
                       Maritime Criminals in the Niger Delta

The NGO Oceans Beyond Piracy recently updated their report, The Human Cost of Maritime Piracy, including data from 2012.  Discussing the impact piracy (or more accurately, “maritime crime”) off Somalia or West Africa has had on merchant seaman, the report has received much exposure from the press by pointing out that in 2012 more pirate attacks occurred in West Africa than off Somalia.

The shift of piracy’s center of gravity from the east to west coast of Africa may shed light on more than just the current hotspots for maritime insecurity, but also demonstrate how commonly held assumptions regarding the impact state failure has on maritime security may be overstated or false.  For much of the last decade, the conventional wisdom has been that “failed states” or “ungoverned spaces” are breeding grounds for illicit activities like terrorism, drug trafficking, arms smuggling, and piracy.  However, academics like Stewart Patrick and Ken Menkhaus have argued that illicit actors may in fact find that “weak but functioning” states are more attractive environments to operate in than failed states, as weak states, despite their problems, have the necessary linkages into the global economic system that failed states lack, and that illicit actors need to be able to profit from their activities.

More importantly, it is much more difficult for external actors to interfere in the internal affairs of a weak state than a failed state.  Without a functioning government (excepting the self-declared states of Somaliland and Puntland), there has been nothing to stop foreign intervention in Somalia against terrorists or pirates (such as Ethiopian and Kenyan invasions, occasional raids against pirate camps by Western militaries, and an African Union-sponsored peacekeeping force).  In West Africa, meanwhile, much of the violence has been conducted within the territorial waters of Nigeria or its neighbors, and conducted by Nigeria-based gangs.  While the various Gulf of Guinea states are planning talks to hammer out the details of a regional counter-piracy strategy, it is unlikely that sovereignty-conscious states like Nigeria would be willing to accept outside intervention by Western navies in the region.  Ultimately, there is nothing stopping a foreign power from using military force against pirates in Somalia if they desire, but a similar course of action in Nigeria would be much more complicated by the fact that there is a functioning government in Nigeria, even with Abuja’s somewhat limited ability to assert its authority in the Niger Delta.

Lieutenant Commander Mark Munson is a Naval Intelligence officer currently serving on the OPNAV staff.  He has previously served at Naval Special Warfare Group FOUR, the Office of Naval Intelligence, and onboard USS Essex (LHD 2).  The views expressed are solely those of the author and do not reflect the official viewpoints or policies of the Department of Defense or the U.S. Government.

PS:  Oceans Beyond Piracy report is worth a read because it shifts the focus from the typical economic costs of piracy and whether the piracy in Somalia has hurt the bottom line of the maritime industry to the real victims, the poorly-paid merchant seamen who have truly borne the cost of maritime insecurity as piracy has exploded on both the east and west coasts of Africa.

Uncertainty and Australian Force Structure Planning

By Peter Layton

When talking about current defence and security matters there seems strong agreement on at least one characteristic: the future is uncertain. Of course that’s true, and many things could potentially happen but, even so, what does this uncertainty mean for Defence?

Eggs in one basket2Defence could choose a single future scenario, press on with it, and hope for the best. A fundamental problem in basing force development on a particular anticipated future is that if those specific circumstances don’t materialize, the force acquired might prove quite ineffective. This happened to Australia in the grim days of 1942. The inter-war emphasis on acquiring warships to be based in Singapore for coalition naval operations (PDF) proved completely inappropriate to the actual circumstances that arose. Precious time and resources were squandered preparing for an eventuality that didn’t happen, while consuming resources that could have created the force structure actually needed.

This force structure dilemma, being ill-prepared for the future that actually occurs, is evident in the varying advice given about the implications of the rise of China. Some recommend building a bigger defence force ‘just in case,’ others opt for going amphibious (and in Japan as well), others say to engage while creating a force structure around hedging, yet others don’t see the need for worrying over a military response at all. These alternative courses reflect real uncertainty amongst professional analysts, defence staffs, foreign affairs specialists, and commentators over whether China’s rise will be peaceful or not—and what the appropriate response is if not. It seems that realists fear that war’s inevitable while liberal thinkers see much value in deep economic integration with the People’s Republic. The real answer is that no one yet knows; there are many possible futures, depending on the choices that China and the rest of us make.

One way of thinking about this is to accept this uncertainty and survey the space of possibilities (with credit to LTG Noboru Yamaguchi for pointing this out). To take extreme positions, China will become either a peaceful great power cooperating with all or a revisionist great power aggressively remaking Asia. In either circumstance the role of the United States will be highly influential in determining what Australia and many others will do. America could remain deeply engaged in the Asian region and be strongly intent on shaping the regional order. Conversely, it might retire from the field of play and focus its efforts elsewhere. What do these four alternative futures look like for us? Maybe like this (click to enlarge):

Seen this way, most futures seem OK. Three range from the really good ‘Nirvana’ to the ‘we’ve done this before and survived’ Cold War Redux. The Home Alone future is, however, a really bad one. Should we then accept this worst-case analysis and structure our defence force for it? If we did, then surely the worst that could happen is that Australia will be unnecessarily poorer than it should be? Not quite. The danger of going that route is that others might follow—they might think we know something they don’t or that we harbour aggressive intentions ourselves. For example, developing a nuclear capability would certainly draw attention.

How about force structuring around the competition-heavy Cold War Redux possibility? Such a force would be in case an aggressive China arose and the U.S. embraced a new containment strategy that we’d become a part of. If we really thought such a future was likely, then extensive trade with the ‘enemy’ would be most unwise as this would simply be supporting a hostile military build-up—a notion that might have historical resonance as well. Sharply constraining trade though would inflict some real economic damage on us as we missed out on much of the financial gains from China’s rise. Worse, it might also set off a security dilemma in which China sees the west bulking up its power projection and containment capabilities and talks itself into a major arms expansion. We need to be careful that we don’t inadvertently create the future we fear.

China-alternative-futures

Should we then hope for the best and force structure for the better alternatives? This though runs significant risks if the future turns dark, as it did with the Japanese attacks in late 1942.

A potential answer lies in adopting a robust force-development strategy that aims to meet the different challenges of the four possible worlds, identified with all their differences, albeit set against the constraints of limited resources. Such a strategy doesn’t presuppose an ability to identify the most, or indeed the least, likely outcomes. Instead, it seeks to build a force structure that resembles a market, with a range of capabilities that covers a broad array of possibilities and evolves over time, with some succeeding and some failing. In this approach, a robust strategy isn’t an ‘optimum’ strategy, this being inherently impossible in an uncertain environment (except in retrospect). Instead, it tries to meet strategic needs within a limited resource base by being designed to evolve over time as strategic circumstances change.

How many eggs in how many baskets? There are of course some problems with this approach. It needs some real intellectual thought—always a scarce commodity—and it isn’t ‘set and forget’. The external environment needs continuous monitoring so that the force structure can be steadily tweaked as the actual future progressively arrives.

The value of the approach lies in realising that the future could be good or downright terrible, but that we might be able to tilt the probabilities towards the better futures. In using our instruments of national power and in building a force structure we can act to nudge the future in the direction we prefer. With an understanding of what might happen, we’re better able to work towards achieving such an outcome.

With such an optimistic thought comes a word of warning. While this focus has been on China, security even in the Nirvana future might well include dealing with tyrannical regimes, failing states, transnational terrorism and civil wars. There’ll be a need for effective and efficient armed forces in whichever alternative future arrives, it’s just their shape that will differ—and whether we’re prepared or not.

Peter Layton is undertaking a research PhD in grand strategy at UNSW, and has been an associate professor of national security strategy at the US National Defense University.

This post first appeared at the Australian Strategic Policy Institute (APSI)’s blog The Strategist.

Fostering the Discussion on Securing the Seas.