West Africa: An Ounce of Prevention

AMLEP in action: A joint U.S. and Sierra Leone law enforcement boarding team talk with the crew of a cargo ship.
AMLEP in action: A joint U.S. and Sierra Leone law enforcement boarding team talk with the crew of a cargo ship.

After a series of high-profile stand-offs with Somali pirates, the international community has directed a great deal of resources toward securing the Gulf of Aden. But with an increase in piracy and other criminal activities in the Niger Delta and the Gulf of Guinea, some of which may be linked to terrorist networks, what role can the Atlantic community play in securing the coasts of West Africa?

On the one hand, the United States and European partners are making an important contribution in terms of equipment. In particular, vessels provided through the U.S. military’s Excess Defense Articles system have bolstered the capabilities of naval forces in the region. A recent example is the acquisition by the Nigerian Navy of a former U.S. Navy survey ship and a U.S. Coast Guard cutter, due to be delivered by early 2014. These donated vessels will go a long way to boosting capabilities, especially as at this time the Nigerian Navy is largely dependent on Seaward Defense Boats commissioned from the Indian shipyard Garden Reach Shipbuilders and Engineers. The Indian Navy itself has decommissioned its own complement of Seaward Defense Boats because these vessels generate a disproportionately large maintenance overhead – the materials and method of construction leave the patrol craft with very low corrosion tolerance.

More than vessels and equipment, however, the naval forces of West African countries require training assistance. In this area, some training and joint exercises are being conducted by NATO and EU member states, but much of this is carried out on a bilateral, case-by-case basis. In April 2013, French and American military advisors provided training to Liberian Coast Guard personnel, including such topics as non-compliant vessel boarding, search and seizure tactics, weapons familiarization, and hull sweeps for mines and smuggling compartments. All of this mentorship and training was limited to a four-day port visit by a French frigate to Monrovia, the Liberian capital.

Other training opportunities take place intermittently. U.S. Naval Forces Africa (NAVAF) has introduced the Africa Partnership Station (APS) program, through which U.S. Navy and Coast Guard crews carry out mentoring initiatives similar to the Monrovia visit described above. The Africa Maritime Law Enforcement Partnership (AMLEP) sees personnel from the U.S. Coast Guard and relevant African institutions operating alongside one another for a slightly more sustained duration. Under this latter program, a U.S. Navy or Coast Guard vessel patrols the territorial waters of the African host country, carrying both an American boarding party and a boarding party from the host country, enhancing that country’s counter-piracy capabilities while also exposing the partner country’s personnel to U.S. Coast Guard best practices.

Although AMLEP benefits from a greater duration and depth of interaction, the exchanges are still too brief to develop naval forces that can operate independently in West Africa. More must be done in this area in order to avoid a scenario in which piracy interferes with shipping in the Gulf of Guinea to such an extent that NATO and its partners must field an intervention of the same scale and extent as Operation Ocean Shield, which continues to this day in the Gulf of Aden. To reduce reliance on Ocean Shield, the European Union has since 2012 mounted an ambitious training assistance mission, known as EUCAP NESTOR, with the objective of providing consistent and intensive training assistance to the maritime forces of such countries as Somalia, Djibouti, and Kenya. The mission has 45 full-time staff members working in the countries – primarily Djibouti – and a planned capacity of 137. Begun with a mandate of two years, EUCAP NESTOR could be renewed until these East African states are able to take charge of policing the Gulf of Aden, replacing Ocean Shield.

Whereas EUCAP NESTOR was introduced in East Africa as a response to a full-blown crisis of pirate activity, a similar mission could be launched in West Africa as a preventative measure. The lessons that could be provided and the connections that could be forged in a two-year mandate would likely surpass what can be achieved in a four-day port visit. Whether such a training mission would be better carried out under the auspices of the EU or NATO is a matter of political debate. From a practical standpoint, however, committing resources to the sustained development of the Nigerian Navy, the Liberian Coast Guard, and other regional partners would be more cost-effective than the eventual alternative: the deployment of an Ocean Shield-style mission to the Gulf of Guinea.

Paul Pryce is a Junior Research Fellow at the Atlantic Council of Canada. Having previously worked with the OSCE Parliamentary Assembly, he has an active interest in both ‘soft’ and ‘hard’ security issues.

Meeting the Full Demands of Sea Control

CVF or LHDIf you remember from my previous post I suggested that a fleet consisting of 13 frigates, 3 CVL, 5-6 tankers, and 4 RFA-operated assault ships struggles to provide a continuous offensive presence because we have to off-deck many of the required ASW helicopters onto the assault ships. There are many solutions to this problem. One is simply “more ships”. There are however, two other options that immediately spring to mind, namely CVF or LHD.

Larger Carrier (CVF)

Increasing the size of the airwing on the CVL from 20 aircraft to 30 allows the carrier to be dedicated to Sea Control aviation duties, including ASW. This relieves the burden on the amphibious ships and allows them to concentrate on supporting the landed troops.

Increasing the size still further to around the 40 aircraft mark allows us to embark many of the additional aircraft required for assault/support operations and removes the need for any aviation maintenance capability on the assault ships. This makes the assault ships even cheaper as they become simply lillypads for helicopter landing, takeoff, and refuel.

We also end up with a carrier that can do some serious damage if needed.

Landing Helicopter Dock (LHD)

The other option is to “bolt” the Sea Control Carrier onto the top of the assault ship to save money on crews and hulls. This yields a ship that can operate as either a Sea Control Carrier or an assault ship. It cannot easily do both at the same time as a flooded well deck and manuevering to launch landing craft would conflict with the need to manuever for winds to launch and recover jets. This means we would need more ships which negates the cost saving advantage.

That said, it is worth bearing in mind that four such ships could provide sustained defensive sea control near one’s home waters, or the ability to “surge” two ships forward for an offensive – with one tasked for sea control and the other as a true helicopter-carrying assault ship. The two on station would be sustained by the two back at port.

It then becomes a costing exercise to determine which is the most sensible avenue to pursue.

Conclusion

Given the original £2b figure per CVF, the choice is obvious. Increase the size of the aircraft carrier. Furthermore, by accepting possible gaps in sustained operations, we can reduce the number of carrier hulls to two.

This along with RFA-owned/operated amphibious assault ships is the way I belive the U.K. is headed. The need for a heavy amphibious assault is diminishing. The need for continuous presence and logistical support is increasing.

I therefore question the sale in 2011 of the RFA Largs Bay to Australia in favour of keeping our LPDs.

“Simon” is a tax-payer (annoyed about: the aircraft carrier debacle, and generally the way the U.K. is run) – okay I’m just a grumpy old man! I have a degree in aerospace engineering and work as a self-employed IT consultant. Unfortunately the bottom fell out of the defence industry when I graduated so I was left high-and-dry with a degree in a discipline considered unimportant by HMG. I’m just biding my time until Britain wants to rebuild her empire with imagination, ingenuity, and a nice hot cuppa.

This post appeared in its original form and was cross-posted by permission from Think Defence.

China and the Falklands Analogy: Preparing for the Wrong War?

A more appropriate Falklands model for the Chinese?
         A more appropriate Falklands model for the Chinese?

If the Pentagon’s reading of China’s interest in “Falklands-style” campaigns of long-range power projection is accurate, the task of maintaining a U.S.-centric security order in East Asia may turn out to be more manageable than expected. But the PLA Navy cannot be counted on to dilute its efforts to the extent DoD now thinks plausible.

To this day, Britain’s 1982 campaign to recapture the Falkland Islands remains among the most relevant examples both of long-range maritime power projection with limited means, and of a weaker power using niche capabilities to complicate operational access and inflict significant damage on the opponent’s projection forces.

As a valued colleague of mine has noted in a recent post here at the NextWar Blog, DoD’s latest Annual Report on Military and Security Developments Involving the People’s Republic of China explicitly picks up on the Falklands analogy in its discussion of China’s future expeditionary capabilities:

“The PLA Navy’s goal over the coming decades is to become a stronger regional force that is able to project power across the globe for high-intensity operations over a period of several months, similar to the United Kingdom’s deployment to the South Atlantic to retake the Falkland Islands in the early 1980s.”

The analogy as such is hardly new, of course, and has already spawned a small literature of its own, including Lyle Goldstein’s insightful piece in Survival and a thorough analysis by Christopher Yung. A more recent contribution by CDR Jim Griffin, USN in Proceedings makes many of the same arguments in a more implicit fashion. All three treatments suggest that the Falklands experience has considerable relevance for the PLAN in both strategic and war-fighting terms. What is new in the Pentagon report, however, is the rather one-dimensional spin it imparts to the PLAN’s adoption of the Falklands campaign as a potential paradigm for future operations.

If we accept DoD’s take on the analogy, we would expect that China will cast itself unambiguously in the role of the expeditionary power (i.e., Great Britain) and, over the next several decades, spare no efforts to attain at least a limited capability for sustained power projection over transoceanic distances. It is certainly true that this would serve the desire of many Chinese naval enthusiasts to climb the rungs of the global naval hierarchy, Felix Seidler’s discussion of which I find most useful. However, it is not yet clear that the Pentagon’s interpretation accurately reflects what Chinese strategists have in mind when they plan for “Falklands-style” campaigns.

As Robert Ross argues in his 2009 piece on “China’s Naval Nationalism,” a blue-water orientation is not a natural strategic choice for a continental power that faces multiple potential threat axes on land as well as from the sea. For such actors, access-denial strategies, broadly conceived, tend to provide a much better return on investment. Thus, to the extent that the operational requirements for access-denial and long-range power projection differ, the strong Mahanian tendency that is evident in the Chinese discourse about maritime strategy would seem to give rise to an additional diffusion of effort (brown/green-water and blue-water) within the more fundamental diffusion of effort between land and sea. (It should be noted here that, for all his insistence of control over maritime communications, such a course would have been utterly foreign to Mahan.)

In other words, given China’s current position and the many uncertainties it continues to face, any attempt at replicating the capability profile of a “Rank 3”navy [“conducting one major ‘out of area operation and (…) engaging in high-level naval operations in closer ocean areas” (Grove 1990: 238)] would amount to a distraction from its key strategic dilemmas. A transoceanic expeditionary capability, in particular, would almost certainly constitute a misinvestment of limited resources. In a very real sense, every yuan invested in dedicated long-range projection forces is a yuan not invested in the control over China’s immediate regional environment. And every Type 052D sailing the Mediterranean on anything other than a one-off port visit will mean several destroyers not sailing the West Pacific.

Of course, this is not to say that China won’t do its potential opponents the favor of going down this risky path. Speaking in broad historical terms, rising continental powers do it all the time – and suffer the consequences. But Goldstein’s and Yung’s works on the PLA’s engagement with the Falklands experience suggest that PLA planners have so far emphasized an “Argentina Plus” approach that combines the far more compatible paradigms of robust access-denial and regional power-projection, and may continue to do so for the foreseeable future.

If such is the case, there will still be more than enough to write about in the Pentagon’s next Annual Report to Congress. As far as analogies go, a much more formidable Argentina that chooses to threaten U.S. interests where it is strong seems to me a far more worrying prospect than a cut-rate Great Britain that is all over the map.

Michael Haas is a Graduate Research Assistant at the Peace Research Institute Frankfurt (PRIF), Germany. The views presented here are his alone and do not reflect an institutional perspective.

The Full Cost of Remote Diagnostics

Last week an article came out about state-sponsored hacking that had nothing to do Edward Snowden or the NSA. Bloomberg News detailed the ongoing hacking of U.S. defense contractor QinetiQ. Two paragraphs in the piece particularly struck me:

“The [China-based] spies also took an interest in engineers working on an innovative maintenance program for the Army’s combat helicopter fleet. They targeted at least 17 people working on what’s known as Condition Based Maintenance, which uses on-board sensors to collect data on Apache and Blackhawk helicopters deployed around the world, according to experts familiar with the program.

The CBM databases contain highly sensitive information including the aircrafts’ individual PIN numbers, and could have provided the hackers with a view of the deployment, performance, flight hours, durability and other critical information of every U.S. combat helicopter from Alaska to Afghanistan, according to Abdel Bayoumi, who heads the Condition Based Maintenance Center at the University of South Carolina.”

A remote diagnostic system: safe and secure...
        A remote diagnostic system: safe and secure…

While it’s unclear whether the hackers succeeded in accessing or exploiting the data, it is clear that they saw the information as valuable. And rightly so – systems such as condition based maintenance, remote diagnostics, and remote C2 systems are designed to reduce the workload burden on front-line “warfighters”, or the logistics burden on their platforms, by shifting the location of the work to be done elsewhere. This can also facilitate the use off-site processing power for more in-depth analysis of historical data sets and trends for such things as predicting part failures. The Army is not alone in pursuing CBM. The U.S. Navy has integrated CBM into its Arleigh Burke-class DDG engineering main spaces, meaning “ship and shore engineers have real maintenance data available, in real time, at their fingertips.”

However, the very information that enables this arrangement and the benefits it brings also creates risk. Every data link or information conduit created for the benefit of an operator means a point of vulnerability that can be targeted, and potentially exploited – whether revealing or corrupting potentially crucial information. This applies not only for CBM, but more dramatically for the C2 circuits for unmanned systems. I’m by no means the first to point out that CBM, et al, means tempting targets. UAV hacking has garnered a great deal of attention in the past year, but the Bloomberg article confirms an active interest exists in hijacking the enabling access of lower profile access points.

This raises several questions for CBM and remote diagnostics, not least of which is “is it worth it?” At what point does the benefit derived from the remote access become outweighed by the risks of that access being compromised? Given the sophistication of adversary hacking, should planners operate from the starting assumption that the data will be exploited and limit the extent of its use to non-critical systems? If operating under this assumption, should “cyber defense” attempts to protect this information be kept to a minimum so as not to incur unnecessary additional costs? Or should the resources be devoted to make the access as secure as the C2 systems allowing pilots to fly drones in Afghanistan from Nevada?

Scott is a former active duty U.S. Navy Surface Warfare Officer, and the former editor of Surface Warfare magazine. He now serves as an officer in the Navy Reserve and civilian writer/editor at the Pentagon. Scott is a graduate of Georgetown University and the U.S. Naval War College.

Note: The views expressed above are solely those of the authors and do not necessarily represent those of their governments, militaries, or the Center for International Maritime Security.

Fostering the Discussion on Securing the Seas.