Reconfiguring the US-ROK Naval Strategy for the Wartime OPCON Transfer (Part I)

On June 1st, Secretary of Defense Chuck Hagel and Republic of Korea (ROK) Defense Minister Kim Kwan-jin met to discuss the creation of an “alternative joint operation body…similar to that of the current South Korea-U.S. Combined Forces Command.” According to the Yŏnhap News Agency, should this change occur, the ROK Chairman of the Joint Chiefs of Staff will lead the new combatant command with the “top U.S. commander in South Korea serving as his deputy.”

Although I have written previously that the United States should retain the wartime OPCON (Operational Control) for the sake of flexible strategic responses against the DPRK, it appears unlikely that the joint decision between the United States and the ROK to transfer the OPCON to the ROK military will be reversed. So how can the U.S.-ROK naval forces successfully adapt to the change?

Answering this question necessitates that we first examine the existing ROK naval capabilities. To the extent that the ROK Navy’s (ROKN) capabilities warrant our attention, it can be argued that this is due to the ROK’s recent military build-up. It should also be noted that the ROK’s naval might can be seen as a reflection of its commercial interests abroad. Indeed, Terrence Roehrig avers that the ROKN’s blue-water capabilities, as seen in its commitment to the ongoing counter-piracy campaigns in the Gulf of Aden, might suggest a link between and its naval might and the ROK’s need to protect its commercial interests and its international standing as a middle power. While there may be some truth to his argument, a more plausible explanation might be that naval power still remains “the best possible means of ensuring the region’s safety without triggering any further escalation.” After all, the ROKN has more than proved its mettle during limited naval skirmishes in the late 1990s and early 2000s over the contested Northern Limit Line (NLL). It is not surprising, therefore, that the ROKN remains the most battle-hardened of the four ROK armed service branches.

Nonetheless, the ROKN still has a long way to go before it establishes itself as a truly independent armed service. As the sinking of the corvette Ch’ŏnan and the shelling of Yŏnp’yŏng in 2010 suggest, the ROKN still lacks the ability to conduct anti-submarine warfare (ASW) and to successfully counter DPRK’s asymmetric threats. The ROKN’s operational shortcomings are particularly troubling in that they were highlighted by the Korean People’s Army Navy, suffering its own limited operability due to its aging fleet and lack of unity within its command structure.

However, as my January piece for the Georgetown Journal of International Affairs and Michael Raska’s East Asia Forum article argue, the greatest barriers to service excellence for the ROKN may be South Korea’s uneven defense spending, and operational and institutional handicaps within the conservative ROK officer corps. Because the ROK Armed Forces remains Army-centric, whereby its command structure and logistics fall under the control of the Chairman of the Joint Chiefs of Staff (ROK CJCS), who has always been an Army general,[1] the ROKN has yet to achieve autonomy as a truly independent service within the existing arrangement. Such barriers do not bode well for the ROK’s most battle-hardened service branch because it ultimately stymies much-needed flexibility and creativity.

In light of both Kim Jŏng-ŭn’s constant threats and the newly proposed Combined Forces Command structure, readjustments at both operational and strategic levels may be required for the U.S.-ROK naval forces to successfully deter further acts of aggression by Kim Jŏng-ŭn. One such readjustment, given ROKN’s weaknesses in its ASW capabilities and counter-asymmetric warfare, would be to redirect ROKN’s focus away from its blue-water ambitions to bolster its coastal defense capabilities. But doing so would jeopardize ROK’s maritime interests abroad and would foster the uneven growth of ROKN by encouraging uneven emphasis on one naval element at the expense of another.

Phase 1: A PHOTEX; Phase 2: The World!
           Phase 1: A PHOTOEX; Phase 2: The World!

Instead, a more pragmatic alternative would be for South Korea and the United States, together with Japan, to establish a combined fleet. While it is true that South Korea and Japan remain at odds over historical grievances and the territorial row over Dokdo/Takeshima, given that the three navies frequently interact through joint exercises, such as RIMPAC, and other exchange programs, so the creation of such fleet in the face of a common threat should not be ruled out. Under this arrangement, each navy would buttress inter-operability by sharing its unique resources and culture with each other. Indeed, the proposed combined fleet would enable ROKN admirals to effectively exercise wartime command over their own fleets, while at the same time help them learn from their sister navies [see note below]. Even more important for the United States, given that “the U.S. operation within the Korean Peninsula is likely to remain a peacekeeping one,” such arrangement would “ensure that [the United States Navy’s] presence is seen and not necessarily felt.” Last but not least, the proposed combined fleet could serve as a quick reaction force in the event of unforeseen crises.

Ultimately, in order for the U.S.-ROK naval forces to effectively counter the threats posed by the DPRK, the ROK Armed Forces itself must undergo a radical transformation. Doing so necessitates that it gradually move away from its Army-centric culture to accommodate jointness among the four services. It must also come up with a coherent budget to sustain its capabilities.

In short, the 2015 wartime OPCON transfer may pose challenges for the U.S.-ROK naval forces to successfully counter and deter future provocations by Kim Jŏng-ŭn. Nevertheless, it also presents an opportunity for those who would seize it. Perhaps this evolution in the extant U.S.-ROK alliance may allow the ROKN to truly come of age as an independent fighting service.

Jeong Lee is a freelance international security blogger living in Pusan, South Korea and is also a Contributing Analyst for Wikistrat’s Asia-Pacific Desk. Lee’s writings have appeared on American Livewire, East Asia Forum, the Georgetown Journal of International Affairs, and the World Outline.


Note:  In a subsequent blog entry, I will explore ways in which the US-ROK Navies, together with the Japanese Maritime Self-Defense Force (JMSDF), can best optimize their capabilities within the aforementioned combined fleet structure.

[1] There has been one exception to this rule. In 1993, Kim Young-sam appointed an Air Force general to serve as CJCS. However, after much resistance from the Army officer corps, no general or admiral from any other service has served as ROK CJCS since 1994.

West Africa: An Ounce of Prevention

AMLEP in action: A joint U.S. and Sierra Leone law enforcement boarding team talk with the crew of a cargo ship.
AMLEP in action: A joint U.S. and Sierra Leone law enforcement boarding team talk with the crew of a cargo ship.

After a series of high-profile stand-offs with Somali pirates, the international community has directed a great deal of resources toward securing the Gulf of Aden. But with an increase in piracy and other criminal activities in the Niger Delta and the Gulf of Guinea, some of which may be linked to terrorist networks, what role can the Atlantic community play in securing the coasts of West Africa?

On the one hand, the United States and European partners are making an important contribution in terms of equipment. In particular, vessels provided through the U.S. military’s Excess Defense Articles system have bolstered the capabilities of naval forces in the region. A recent example is the acquisition by the Nigerian Navy of a former U.S. Navy survey ship and a U.S. Coast Guard cutter, due to be delivered by early 2014. These donated vessels will go a long way to boosting capabilities, especially as at this time the Nigerian Navy is largely dependent on Seaward Defense Boats commissioned from the Indian shipyard Garden Reach Shipbuilders and Engineers. The Indian Navy itself has decommissioned its own complement of Seaward Defense Boats because these vessels generate a disproportionately large maintenance overhead – the materials and method of construction leave the patrol craft with very low corrosion tolerance.

More than vessels and equipment, however, the naval forces of West African countries require training assistance. In this area, some training and joint exercises are being conducted by NATO and EU member states, but much of this is carried out on a bilateral, case-by-case basis. In April 2013, French and American military advisors provided training to Liberian Coast Guard personnel, including such topics as non-compliant vessel boarding, search and seizure tactics, weapons familiarization, and hull sweeps for mines and smuggling compartments. All of this mentorship and training was limited to a four-day port visit by a French frigate to Monrovia, the Liberian capital.

Other training opportunities take place intermittently. U.S. Naval Forces Africa (NAVAF) has introduced the Africa Partnership Station (APS) program, through which U.S. Navy and Coast Guard crews carry out mentoring initiatives similar to the Monrovia visit described above. The Africa Maritime Law Enforcement Partnership (AMLEP) sees personnel from the U.S. Coast Guard and relevant African institutions operating alongside one another for a slightly more sustained duration. Under this latter program, a U.S. Navy or Coast Guard vessel patrols the territorial waters of the African host country, carrying both an American boarding party and a boarding party from the host country, enhancing that country’s counter-piracy capabilities while also exposing the partner country’s personnel to U.S. Coast Guard best practices.

Although AMLEP benefits from a greater duration and depth of interaction, the exchanges are still too brief to develop naval forces that can operate independently in West Africa. More must be done in this area in order to avoid a scenario in which piracy interferes with shipping in the Gulf of Guinea to such an extent that NATO and its partners must field an intervention of the same scale and extent as Operation Ocean Shield, which continues to this day in the Gulf of Aden. To reduce reliance on Ocean Shield, the European Union has since 2012 mounted an ambitious training assistance mission, known as EUCAP NESTOR, with the objective of providing consistent and intensive training assistance to the maritime forces of such countries as Somalia, Djibouti, and Kenya. The mission has 45 full-time staff members working in the countries – primarily Djibouti – and a planned capacity of 137. Begun with a mandate of two years, EUCAP NESTOR could be renewed until these East African states are able to take charge of policing the Gulf of Aden, replacing Ocean Shield.

Whereas EUCAP NESTOR was introduced in East Africa as a response to a full-blown crisis of pirate activity, a similar mission could be launched in West Africa as a preventative measure. The lessons that could be provided and the connections that could be forged in a two-year mandate would likely surpass what can be achieved in a four-day port visit. Whether such a training mission would be better carried out under the auspices of the EU or NATO is a matter of political debate. From a practical standpoint, however, committing resources to the sustained development of the Nigerian Navy, the Liberian Coast Guard, and other regional partners would be more cost-effective than the eventual alternative: the deployment of an Ocean Shield-style mission to the Gulf of Guinea.

Paul Pryce is a Junior Research Fellow at the Atlantic Council of Canada. Having previously worked with the OSCE Parliamentary Assembly, he has an active interest in both ‘soft’ and ‘hard’ security issues.

China and the Falklands Analogy: Preparing for the Wrong War?

A more appropriate Falklands model for the Chinese?
         A more appropriate Falklands model for the Chinese?

If the Pentagon’s reading of China’s interest in “Falklands-style” campaigns of long-range power projection is accurate, the task of maintaining a U.S.-centric security order in East Asia may turn out to be more manageable than expected. But the PLA Navy cannot be counted on to dilute its efforts to the extent DoD now thinks plausible.

To this day, Britain’s 1982 campaign to recapture the Falkland Islands remains among the most relevant examples both of long-range maritime power projection with limited means, and of a weaker power using niche capabilities to complicate operational access and inflict significant damage on the opponent’s projection forces.

As a valued colleague of mine has noted in a recent post here at the NextWar Blog, DoD’s latest Annual Report on Military and Security Developments Involving the People’s Republic of China explicitly picks up on the Falklands analogy in its discussion of China’s future expeditionary capabilities:

“The PLA Navy’s goal over the coming decades is to become a stronger regional force that is able to project power across the globe for high-intensity operations over a period of several months, similar to the United Kingdom’s deployment to the South Atlantic to retake the Falkland Islands in the early 1980s.”

The analogy as such is hardly new, of course, and has already spawned a small literature of its own, including Lyle Goldstein’s insightful piece in Survival and a thorough analysis by Christopher Yung. A more recent contribution by CDR Jim Griffin, USN in Proceedings makes many of the same arguments in a more implicit fashion. All three treatments suggest that the Falklands experience has considerable relevance for the PLAN in both strategic and war-fighting terms. What is new in the Pentagon report, however, is the rather one-dimensional spin it imparts to the PLAN’s adoption of the Falklands campaign as a potential paradigm for future operations.

If we accept DoD’s take on the analogy, we would expect that China will cast itself unambiguously in the role of the expeditionary power (i.e., Great Britain) and, over the next several decades, spare no efforts to attain at least a limited capability for sustained power projection over transoceanic distances. It is certainly true that this would serve the desire of many Chinese naval enthusiasts to climb the rungs of the global naval hierarchy, Felix Seidler’s discussion of which I find most useful. However, it is not yet clear that the Pentagon’s interpretation accurately reflects what Chinese strategists have in mind when they plan for “Falklands-style” campaigns.

As Robert Ross argues in his 2009 piece on “China’s Naval Nationalism,” a blue-water orientation is not a natural strategic choice for a continental power that faces multiple potential threat axes on land as well as from the sea. For such actors, access-denial strategies, broadly conceived, tend to provide a much better return on investment. Thus, to the extent that the operational requirements for access-denial and long-range power projection differ, the strong Mahanian tendency that is evident in the Chinese discourse about maritime strategy would seem to give rise to an additional diffusion of effort (brown/green-water and blue-water) within the more fundamental diffusion of effort between land and sea. (It should be noted here that, for all his insistence of control over maritime communications, such a course would have been utterly foreign to Mahan.)

In other words, given China’s current position and the many uncertainties it continues to face, any attempt at replicating the capability profile of a “Rank 3”navy [“conducting one major ‘out of area operation and (…) engaging in high-level naval operations in closer ocean areas” (Grove 1990: 238)] would amount to a distraction from its key strategic dilemmas. A transoceanic expeditionary capability, in particular, would almost certainly constitute a misinvestment of limited resources. In a very real sense, every yuan invested in dedicated long-range projection forces is a yuan not invested in the control over China’s immediate regional environment. And every Type 052D sailing the Mediterranean on anything other than a one-off port visit will mean several destroyers not sailing the West Pacific.

Of course, this is not to say that China won’t do its potential opponents the favor of going down this risky path. Speaking in broad historical terms, rising continental powers do it all the time – and suffer the consequences. But Goldstein’s and Yung’s works on the PLA’s engagement with the Falklands experience suggest that PLA planners have so far emphasized an “Argentina Plus” approach that combines the far more compatible paradigms of robust access-denial and regional power-projection, and may continue to do so for the foreseeable future.

If such is the case, there will still be more than enough to write about in the Pentagon’s next Annual Report to Congress. As far as analogies go, a much more formidable Argentina that chooses to threaten U.S. interests where it is strong seems to me a far more worrying prospect than a cut-rate Great Britain that is all over the map.

Michael Haas is a Graduate Research Assistant at the Peace Research Institute Frankfurt (PRIF), Germany. The views presented here are his alone and do not reflect an institutional perspective.

The Full Cost of Remote Diagnostics

Last week an article came out about state-sponsored hacking that had nothing to do Edward Snowden or the NSA. Bloomberg News detailed the ongoing hacking of U.S. defense contractor QinetiQ. Two paragraphs in the piece particularly struck me:

“The [China-based] spies also took an interest in engineers working on an innovative maintenance program for the Army’s combat helicopter fleet. They targeted at least 17 people working on what’s known as Condition Based Maintenance, which uses on-board sensors to collect data on Apache and Blackhawk helicopters deployed around the world, according to experts familiar with the program.

The CBM databases contain highly sensitive information including the aircrafts’ individual PIN numbers, and could have provided the hackers with a view of the deployment, performance, flight hours, durability and other critical information of every U.S. combat helicopter from Alaska to Afghanistan, according to Abdel Bayoumi, who heads the Condition Based Maintenance Center at the University of South Carolina.”

A remote diagnostic system: safe and secure...
        A remote diagnostic system: safe and secure…

While it’s unclear whether the hackers succeeded in accessing or exploiting the data, it is clear that they saw the information as valuable. And rightly so – systems such as condition based maintenance, remote diagnostics, and remote C2 systems are designed to reduce the workload burden on front-line “warfighters”, or the logistics burden on their platforms, by shifting the location of the work to be done elsewhere. This can also facilitate the use off-site processing power for more in-depth analysis of historical data sets and trends for such things as predicting part failures. The Army is not alone in pursuing CBM. The U.S. Navy has integrated CBM into its Arleigh Burke-class DDG engineering main spaces, meaning “ship and shore engineers have real maintenance data available, in real time, at their fingertips.”

However, the very information that enables this arrangement and the benefits it brings also creates risk. Every data link or information conduit created for the benefit of an operator means a point of vulnerability that can be targeted, and potentially exploited – whether revealing or corrupting potentially crucial information. This applies not only for CBM, but more dramatically for the C2 circuits for unmanned systems. I’m by no means the first to point out that CBM, et al, means tempting targets. UAV hacking has garnered a great deal of attention in the past year, but the Bloomberg article confirms an active interest exists in hijacking the enabling access of lower profile access points.

This raises several questions for CBM and remote diagnostics, not least of which is “is it worth it?” At what point does the benefit derived from the remote access become outweighed by the risks of that access being compromised? Given the sophistication of adversary hacking, should planners operate from the starting assumption that the data will be exploited and limit the extent of its use to non-critical systems? If operating under this assumption, should “cyber defense” attempts to protect this information be kept to a minimum so as not to incur unnecessary additional costs? Or should the resources be devoted to make the access as secure as the C2 systems allowing pilots to fly drones in Afghanistan from Nevada?

Scott is a former active duty U.S. Navy Surface Warfare Officer, and the former editor of Surface Warfare magazine. He now serves as an officer in the Navy Reserve and civilian writer/editor at the Pentagon. Scott is a graduate of Georgetown University and the U.S. Naval War College.

Note: The views expressed above are solely those of the authors and do not necessarily represent those of their governments, militaries, or the Center for International Maritime Security.

Fostering the Discussion on Securing the Seas.