The Counter-Piracy Failure: Andromeda Strain

We Won but We Failed: What We Should Learn

Quicker to learn?


In Andromeda Strain, the scientists of the Wildfire Team struggled against their pathogen foe, (spoiler alert) only to have their problems solved by circumstance and environment. An entire plot was written about a crisis team that, in the end, accomplished nothing. East African piracy, while by no means eradicated, looks perhaps to have peaked, and public interest waning possibly even faster. Sure, the Maersk Texas was attacked in May, but this single blip on the radar is a paltry show compared to the still-notable number of small-boat attacks off the coast of India, yacht abductions, and beach resort kidnappings.

Unfortunately, after almost a decade of engagement, the West’s maritime Wildfire team has had almost no hand in the changes on the high seas. A series of military incursions by neighbors, newfound vigor in the AU mission, and rise of PMC’s at sea have changed the state of play and cut the mission short, leaving a real possibility for naval leadership to miss the lessons learned from their recent miscalculations.

As the counter-piracy mission is fresh in our minds and before the threat fades into the jaws of vengeful regional militaries, we should use the opportunity to recognize and assess our failures as a force in countering piracy on the high seas.

The West Reacts to the Pathogen

In scope, the naval response to the threat of piracy appeared robust. Dozens of warships plied the waters in search of high-seas bandits. Area patrols ran alongside convoy escorts. Several multi-national coalitions (NATO, U.S.-led Combined Military Forces, the EU) ran operations concurrently with the independent efforts of ten or more countries at any one time. The Indian navy recently captured a stunning 61 pirates after a pitched gun battle. Over 20 nations now meet for the annual Shared Awareness and Deconfliction (SHADE) conference to build a united front against piracy. Maritime Patrol Aircraft and UAVs from multiple nations surveil the Internationally Recommended Transit Corridor (IRTC), pirate anchorages, and the open ocean. There was a reasonable expectation that such a massive military drag net might stymie piracy. However, the result was a better skilled and better organized pirate. As Napoleon said, “You must not fight too often with one enemy, or you will teach him all your art of war.”

Piracy’s Adaptation and Resistance

Until military action ashore cut short the party, coastal raids with small skiffs developed into multi-million dollar kidnapping operations with captured tankers converted to motherships. Pirates used UHF communications, skilled hostage negotiators, and money changers in Dubai. Merchants deactivated their automatic identification system (AIS), a system used for vessel safety during the height of piracy around the Straits of Malacca, as pirates at large used it as a homing beacon. Pirates adapted to the law-enforcement rules of engagement used by the respective patrolling navies, hiding or disposing of all pirate paraphernalia and making it next-to-impossible for maritime enforcers to get the convictions occasionally sought. Many pirates moved to new areas altogether, shifting operations away from patrols and avoiding the range of immediate military responses.

The focus of piracy shifted from capturing cargo to capturing people. Kidnapping was the name of the game. Due to an inability to enforce arrangements, some companies paid full ransom for captured employees and only received a fraction of their personnel in return. EUNAVFOR even reported more brazen tactics of avoiding capture, namely the threatened and actual torture of hostages.

This adaptation, combined with the lack of political stability, created threats beyond endangering global commerce. With Al-Qaeda operating in Somalia next to Al-Shabab, endless opportunities presented themselves for terrorist networks to simply generate profits through partnership or create havoc with vessels purchased from pirates. Rather than siphon off fuel for profits, the pirates could sell a vessel wholesale to terrorists who could use the vessel as a massive explosive in a civilian port, blockage in the mouth of a harbor, or a suicide battering ram against an unsuspecting warship. Capture-and-switch tactics with maritime commercial vehicles had precedent; the 1998 hijacking of the Petro Ranger being a case in point. It only takes a savvy pirate with the right connections to profit from the sale of hijacked tankers for acts of terrorism. Piracy is a crime of opportunity, and human beings are always good at finding new ones.

Breaking the Sea-Shore Learning Cycle

The key to breaking the adaptation puzzle is to boost the intensity of the counter-piracy dosage. One can have the best weapons in the world, but it won’t matter unless the operational concept is correct. The U.S. was weak on piracy, an inch-deep mile-wide river. Pirates waded easily across to tell their compatriots what they’d seen, creating a deadly sea-to-shore innovation cycle that improved pirate learning. This must be solved through more vigorous piracy prosecution, more aggressive rules of engagement (ROE)/posture, and a shore kinetic solution.

Instead, the U.S. released many captured pirates back into Somalia, only prosecuting those that attacked the rare U.S. flagged vessel. The idea behind this policy is that piracy is a crime, not a national security issue. If the vessel’s flag would not prosecute, there could be no trial or detention. Piracy is however very much a national security issue – not only does it drive up the cost of shipping and goods, but pulls mission-ready forces from other duties to keep the costs from rising higher. Sailors deployed to counter-piracy missions can attest to lengthy force protection details off the coast during RHIB transfers of detainees to shore. These temporary detentions were a waste of time and money, punishing piracy with nothing more than a few days in the ship’s center-line passageway with three squares meals and regular washes. The idea that pirates “learned” something from their capture was correct. The lesson was that they likely would survive encounters with U.S. warships and be returned to their anchorages. At the very least, more suspected vessels should have been diverted and escorted to ports where their hulls, cargo, and crew could be inspected and held if necessary. U.S. tactics involving capture had little meaning without a resolution other than emancipation. At worst, such impotent gestures actively undermined the authority of the U.S. presence.

Actions Louder than Words

These operations would have been aided by more lenient ROE and a higher level of aggressiveness in the U.S. posture toward piracy. This is a complicated subject as the rules were designed to maximize legitimacy and minimize controversy and liability. It is frustrating to read message traffic insisting on defining pirates clearly caught in the act as “suspected.” Pirates, when positively identified, are hailed and warned, but rarely destroyed. A comical irony is that an escort for a pirated vessel provides, if anything, little more than military protection for the pirates on the vessel.

Better ROE would be more aggressive, allowing the engagement and destruction of vessels with known associations to piracy. Once the chance to surrender is given, threats must be made good. To counter the use of human shields, a counter-offer must be made to pirates. The normal method, as I witnessed it, is that U.S. warships hail pirate vessels, occasionally fire warning shots, then are deterred by the presence of human shields or pirate threats to kill their hostages.

Ending Incentivization

Just as the U.S. has a standing policy not to negotiate with terrorists, the same should be clearly applied to pirates: remove the incentive to use hostages. Piracy is not about ideologies, but competing costs and benefits. The U.S. concept of operations places far too much stake on the presence of hostages, further imperiling mariners by encouraging their capture. Military policy should make hostage-taking and the use of human shields a non-factor. If uncooperative, all pirate vessels should be engaged with disabling or destructive fire. Rather than reducing the equation to capture or an escape with hostages, warships should amend the options: capture or death. If hostages are used as shields or threatened with death, the pirates should understand that they only further endanger their own lives by risking lethal retaliation. If hostages are killed by pirates, the responsibility lies with the pirates, not with the military endeavoring to save them. This is an unpleasant idea, but kinetic operations of this kind can rarely be conducted without at least a trace of regrettable collateral damage. Military planners should recognize this unfortunate inevitability and pursue the larger goal of protecting future mariners and an entire region’s stability.

Not Just the Sea

One development that did prove effective was stationing warships at pirate anchorages. This led to a better picture of piracy operations, their frequency, and capabilities. However, partially due to the presence of hostages, the infrastructure remained largely undisturbed. From only a few miles off the coast, a swath of defenseless pirate infrastructure was often in view of my own vessel. I remember SUVs brazenly shadowing us along the shore as we maneuvered close to the land. Small vessels were clearly visible transiting to and from shore with supplies for anchored pirated vessels. Pirate skiffs were propped up in clusters above the tide near supply shacks and rows of vehicles. Pirates came to rely on these facilities to coordinate their operations at sea while simultaneously maintaining a large stable of captured vessels and hostages. With rare exception, these shores were left alone, covered in equipment ripe for destruction. Again, military leaders were naturally worried about hostage collateral damage. Yet naval gunfire can be used to great effect against safe targets at pirate anchorages. UHF towers, clusters of empty vehicles, supply vessels, unattended skiffs, and the assorted support facilities onshore are all easy targets for naval gunfire. This is not only less expensive than leaving the pirates alone, launching 1.5 million dollar Tomahawks, or drone strikes, but terrifying for pirates realizing they could be bombarded at any moment with a ship offshore. This scorched-earth policy for pirate shore facilities should be common practice.

You’re Gonna Need a Bigger (and smaller) Boat

America’s military counter-piracy medication comes in the form of ships-of-the-line, namely DDGs and a few FFGs. While versatile craft, these are inherently conventional, centralized combatants designed for confrontations with modern navies. They are expensive, complicated blue-water craft weighed down with anti-submarine, anti-surface, and anti-air capabilities unsuited for the task of counter-piracy. VLS, AEGIS, torpedoes, Harpoon, towed arrays, sonobuoys, etc. have little to no use here. These platforms have a limited aviation capability and little room for detainees caught while on patrol. There are even FFGs deployed to Somalia without helicopters, making them next to useless when it comes to responding to calls for help outside of 20nm. Additionally, unlike the conventional warfare areas, there is no formal training regimen for these ships that deals with piracy specifically, their assigned mission.

Amphibious platforms, on the other hand, have the supplies and space to contain detainees for long periods without impacting crew effectiveness. Amphibious platforms also bring vital improved air assets/compatible flexibility not sufficiently present in CRUDES. The USS Oak Hill’s certification to carry riverine boats last summer demonstrates amphibious ships’ versatility with the ability to deploy patrol boats in concert with multiple air assets. Rather than a single ship and helicopter covering hundreds of miles of coastline, a whole swarm of air and sea assets, bolstered by a large detainee space and afloat support facility, become available in a single platform. These kinds of coastal patrol operations were executed to great effect during Vietnam using Landing Ship Tank (LST) vessels as bases to deploy Patrol Boats-Riverine (PBRs) and helicopters. A similar concept would be a far more effective counter-piracy force structure off Somalia.

Andromeda Strain: Not Walking Away Empty Handed

As regional entities take turns carving out pieces of the vacuum in which pirates operated, we will naturally let out a sigh of relief and enjoy a chance to walk away from the piracy issue. We must not, however, allow our efforts to be for naught; we must at a minimum take with us the important lessons from our failed efforts. Piracy is a crime of opportunity. It can only be deterred by changing the cost-benefit analysis and removing the chances to commit the crime. The United States’ incomplete capture strategy, backed up by weak actions/ROE, only taught pirates that, with a little innovation, the usual result of a run in with an American vessel was a free ride home.

Matt Hipple is a surface warfare officer in the U.S. Navy. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy. 

Weekend Reading: June 15th

In foreign waters. Will recapitalization retain this capability?

Here are a few stories to catch up on to impress your maritime security minded father (for those in the U.S.) when you dutifully call for father’s day:

Future Tech

Spencer Ackerman has a good piece at Wired’s Danger Room on the energy generation hurdles U.S. Navy’ ships must overcome if they want to enjoy the fruits of their successful directed energy weapons testing.

Maryland Invaded By Naval Drones

The DC region was invaded by naval demonstration drones with varying degrees of impact. Northrop Grumman’s X-47B UCAS-D (Unmanned Combat Air System Demonstrator), the drone designed to launch from carriers and begin the replacement of manned fighter jets, made its way cross-country to Naval Air Station Pax River in Maryland after successfully completing its first major phase of testing. En route it rounded DC’s beltway and, as in other places it was seen by the public, it sparked some humorous befuddlement.

Earlier in the week another U.S. Navy drone demonstrator at Pax River made a more literal impact into Maryland’s Eastern Shore. This was an RQ-4A BAMS-D (Broad Area Maritime Surveillance Demonstrator), a modified version of the Air Force’s Global Hawk, and one of only two of the “A” variants. As the linked AOL Defense article points out, Northrop Grumman has continued to make major improvements with the more advanced “B” and “C” variants.

Force Structure

CGBlog has a good run down and analysis of the Coast Guard’s future shipbuilding plan, including the views of a just-released GAO report. If you’re not familiar with the debates, this a good chance to get caught up on the future of another service with a global impact on maritime security.

Strategic Outlook

Information Dissemination’s 5th Anniversary Virtual Conference rolls on with great posts by Dr. Andrew S. Erickson on the strategic context of China and the U.S.’ maritime interaction; Dean Robert C. Rubel on China’s claim to the mantle of Mahan, and whether or not it matters; a Senior Vice President at Maersk Line on the state of international maritime trade; and the response of former Secretary of the Navy Richard Danzig, from the Obama campaign to the earlier Romney campaign post on the direction of the Navy.

Big Trouble in Little Cyprus

 

Greek Cyproit Navy patrol boats.

As part of the EU presidency trio program, Cyprus will become the new leader of the EU council on 01 July for a 6-month term. This may seem trivial to maritime security enthusiasts until they consider the historical tensions in the Eastern Mediterranean and the recent oil exploration discoveries in Cyprus’ Exclusive Economic Zone (EEZ).

Since the 1974 Greek coup d’ etat and subsequent Turkish invasion the island has been hotly contested between the two mediterranean powers.  This has resulted in an isolated Turkish Republic of Northern Cyprus (TRNC), completely reliant on the Turkish mainland, the only country to recognize the TRNC as a sovereign state. Turkey is also a non-signatory to the UN Convention on the Law of the Sea and continues to contest demarcation agreements as it supports the occupied Northern Cyprus. 

As the Turkish Navy patrols the Eastern Mediterranean, it will be interesting to see how new Cypriot leadership within the EU addresses maritime security and the prominence of EU Naval Force Somalia.  With continued rotations of EUNAVFOR ships to the Horn of Africa, the cyclical transits through the Suez Canal begs for EU presence while en route.  Although unlikely, if presence operations were to increase in the immediate vicinity of Cyprus, EU warship commanders would be challenged by:

  1. Patrol boundaries, sensitive to avoid escalating tensions with Turkey
  2. The immediate vicinity of Syria’s EEZ.
  3. Acknowledging Southern Cypriot’s EEZ. Doing so simultaneously challenges Israeli maritime claims that spill over into Lebanese and Cypriot waters.

Sprints to claim oil and gas exploratory rights will not improve the cloudy Eastern Med. geo-political situation without UN involvement and agreed-upon EEZ boundaries. Until such a resolution we can only expect increased tensions.  On July 1st, Cyprus is dealt a fresh set of cards, we can only sit back and see what hand is played. More to follow.

A.J. “Squared-Away” is a husband, father, and U.S. Navy Surface Warfare Officer. He has deployed on patrol boats, destroyers, and aircraft carriers to the Mediterranean, Persian Gulf, and aboard Iraqi oil terminals. The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy. 

LCDR BJ Armstrong’s Innovation Presentation

If you weren’t in Virginia Beach, Virginia for the U.S. Navy’s Navy Warfare Development Command Junior Leadership Innovation Symposium earlier this month, you might have read LCDR BJ Armstrong’s posts on the career of Rear Admiral William Sims at the U.S. Naval Institute Blog, here, here, and here.

However, if you’re like me and functionally illiterate, you’ve been missing out. Well no longer! The videos are now available:

 

My friend BJ has also invited commentators to “talk about how goofy I looked trying to talk to a circular room. What was Shakespeare thinking with the “in the round” stages?” Fire away.

Fostering the Discussion on Securing the Seas.