It is common sense that Unmanned Autonomous Systems can be used against NATO populations and forces – but beyond the public perception of this threat, there is a need for an expert level debate that will produce a thorough understanding of the challenges and initiate the development of efficient response options. This is what NATO Transformation Command is addressing with this online and in-person workshop.
WHAT?
The workshop is gathering experts from all backgrounds: Government, Military, NATO, Academia, Industry … to address all aspects (operational, autonomy related, legal, legitimacy, financial and ethical)of the proliferation of Unmanned & Autonomous systems in ground, air, sea and telecoms dimensions. The aim is to identify the best options to counter Unmanned & Autonomous systems and to provide senior policy makers and industry with guidance on related future implications and requirements.
HOW?
The FORUM (sign up online first to gain access to online event registration)
We’ve talked about privately-funded drones for maritime eco-activism and humanitarian operations, so it’s not surprising to see another naval mission where unmanned air vehicles have bled into the private sector. Now, at least one private security company has offered UAV services as an anti-piracy solution.
Commercial shipping companies embraced private security as a means for protecting their ships after piracy in the Indian Ocean expanded significantly in the late 2000’s, putting crews at risk and costing shippers billions in dollars in increased insurance premiums.
Incidents of Somali piracy have been virtually non-existent since 2012, primarily due to the hardening of commercial shipping targets by embarked security teams. Other counter-measures, such as fire hoses, razor wire, and hardened crew citadels were too easily defeated by pirates, but to date, no ship with an armed security team has been successfully hijacked. UAVs make a lot of sense to enhance the effectiveness of these teams. According to Advanced Tactics and Countermeasures Global, “acting as a forward scout and transmitting a live video feed of possible threats, the ATAC UAV simultaneously video documents each step from the identification to even the escalation of force, if necessary.” ATAC’s video depicts a quadcopter launching from a container ship, which would work in conjunction with their designated marksmen onboard the ships to deter and neutralize a pirate attack. The ability of the UAV to get much closer to suspicious skiffs will also help security teams to reduce liability and mistaken identification of fishermen as pirates.
If deployed, these private sector UAVs will join the ranks of the increasing number of naval drones flying anti-piracy patrols in the Indian ocean. The Italian Air Force’s 32nd Wing flies the MQ-1 Predator out of Djibouti for EUNavFor. Among other navies operating ship-board UAVs against Somali piracy, Dutch and American ships have flown ScanEagle and the Spaniards the Skeldar. U.S. ships have also deployed the Fire Scout against pirates.
This post appeared in its original form at NavalDrones.com and was republished by permission.
CIMSEC is having a Non-Navies Week from 29 July to 2 August as a first step in a longer series on specific non-navies. Delve into this list of non-navy navies with us.
Mainstream policy discussions of navies and maritime law enforcement often consider the denizens of the high seas to be a pliant polity – passive actors being defended, disrupted, or directed by the might of global or local security networks. However, national fleets and their individual warships are not the only ones with the agency to effect global politics and security.
Some topics we have covered at length – pirates and the Private Military Contractors that have risen up in opposition – but we have only scratched the surface.
Commercial enterpirses pursue the possibility of massive drone-ships, bringing new possibilities and vulnerabilities as our virtual network and our trade network grow closer together. Remember those pirates?
Fishing fleets have their own interests and controls – their operations and movement impacting global politics from the Gibraltar to the South China Sea. Sometimes inadvertant, sometimes purposeful, their movements can motivate states or global institutions – from territorial disuptes, to security, to environmental concerns.
Ever-better organized and equipped activists are taking to the high-seas, battling whalers or even states. From the Sea Shepards to the “amphibious landings” of Japanese and Chinese activists in the Senkakus, civilians are taking the politics to sea. Somalian piracy actually started as activism, fisherman-come-vigilantes.
Terrorists are an unfortunate reality on the high seas, from the category of at-sea terrorist attacks to the use of amphibious operations as vectors for attack from Israel to Mumbai. Some groups, such as the Tamil Tiger’s “Sea Tigers”, even went so far as be considered a possible real-world naval force.
Around the raucus political conflicts flows the silent schemes of smugglers, black marketeers, and human traffickers. From drug runners to sanction busters, admirals are not the only ones trying to mask their position. Criminal enterprises conduct their own air-sea battle, even operating submarines to smuggle goods.
The almost clinicically precise maps of the sea lines of communication would lead one to think that the oceans are a tame and organized place. Hardly. The sea is as alive with merchants, combatants, and all number of active players creating their own order and chaos.
ARTICLES ARE DUE 24 JULY TO [email protected] OR IN OUR WORDPRESS QUEUE. LATE ENTRIES WILL BE ACCEPTED, BUT DON’T PUSH YOUR LUCK. THIS IS FIRST-COME, FIRST/MOST AWESOME SERVED.
This is the second article of our “Sacking of Rome” week: red-teaming the global order and learning from history.
This is not a prediction for the future, simply a thought experiment to tell a story of what might be. Thinking about how American power and influence might decline is not a slight to the United States. It is a strength. We are not a people blinded by American hubris, but instead are willing to honestly analyze the negative what-ifs while working toward the positive ones.
When discussing the fall of the United States, the initial reaction is to think of a dramatic collapse. Things such as losing World War III in an enormous battle or an economic collapse making the Great Depression look like a little setback could make for an engaging movie, but reality does not have to entertain – it simply has to be.
This is fiction, not a prediction, but hopefully it makes us think.
And Now for our Story…
The United States is powerless. Though our economy is still intact for the moment, our ability to influence events on the world stage and protect our national interests is gone. We try to turn to our allies for help, but even our oldest friends recognize that the balance of power has shifted and begin to reshape their alliances to look out for their best interests. We are alone, afraid, and powerless in a very complicated world. How did we get here?
The Age of Austerity
As the War on Terror wound down, the Department of Defense entered what has now become known as “the age of austerity.” We began to heed the warnings of Admiral Mike Mullen that our national debt is the biggest threat to our national security. It started with sequestration in 2013. The writing was on the wall that we were no longer the post-Cold War hegemon of the 1990s and once again simply a strong player within a multipolar world.
Before we knew it, China was no longer just a developing power. Profits from energy exports enabled Russia to regain its seat as a major player on the global stage. If there was a time for more guns and less butter it was then. But America was tired and mostly broke from over a decade of war, so the Department of Defense was forced to confront more diverse global challenges with fewer resources.
The future emerged amongst a sea of buzzwords and lightning bolts connecting nodes on countless PowerPoint slides within the Pentagon. It was impossible to attend a Department of Defense brief without network-centric warfare, cross-domain synergy, asymmetric advantages, and autonomous unmanned systems being heralded as the solution to all problems.
In an effort to preserve America’s military advantage while reducing long-term spending, we invested in unmanned technologies and the ability to network unmanned and highly advanced manned systems together. The network enabled coordinated operations across all domains almost simultaneously. This would provide the quick and overwhelming response necessary to defeat any adversary, and the best part was it required minimal personnel. Unmanned systems might have a high upfront cost, but they do not require a salary, medical care for dependents, or a retirement plan. The extra savings from eliminating as many people as possible enabled the establishment of a network of unmanned undersea, surface, air, and even space systems providing continuous intelligence, surveillance, and reconnaissance on a global scale and immediate coordinated response in the event of hostilities. The global influence of the United States was secured at a fraction of the long-term costs.
The Bubble Bursts
The American drone network continuously patrols the Air Defense Identification Zones (ADIZs) which China has established encompassing the East and South China Seas. China has made repeated complaints to the United States and the United Nations, and there have been many close calls between American assets and the People’s Liberation Army (PLA) Navy and PLA Air Force resulting in the loss of some drones, but without loss of life. Relations are tense, but the global status quo is maintained. The strategic goal of the United States is to keep economic relations with China how they currently are.
Suddenly the handful of operators within the Joint Force Drone Operations Center necessary to monitor and operate the global unmanned network find themselves staring at blank screens. What happened? An unannounced drill? A power outage? A loss this extensive has never happened before. They wonder and begin to troubleshoot.
While the casualty to the network is being reported up the chain of command, drones begin disappearing from radar screens at monitoring stations around the world. A flight of drones scheduled to land at Kadena Air Base in Okinawa for routine maintenance and refueling never arrives. Reports even begin to arrive of flights taking off and immediately crash landing. U.S. Cyber Command is alerted and begins to investigate. Once they know what to look for, it does not take long to find the malicious code responsible and it is glaringly obvious where it originated. The PLA. Not only did they not try to cover their tracks, but it looks like they wanted us to know who was responsible.
The few remaining manned platforms – a mere shadow of the previous numbers during the Cold War – are ordered to sortie toward the western Pacific in a show of force. Everyone quickly makes a devastating discovery. They are receiving no signal from the Global Positioning System. Once they are out of sight from land, ships and aircraft have no idea where they are. The Fleet attempts to adapt. They pull out the old paper charts – which they luckily retained onboard. Utilizing their mechanical compass and dead-reckoning for navigation, they set sail and attempt to find the Chinese coast.
They might not be at 100% capability, but they can at least make a show of American power with presence. Luckily, satellite communications are still functioning so they can coordinate between each other and with their operational commander. As they cross the Pacific, one by one they drop out of communications. The failures are first noticed in the radio room, but they quickly spread to ship control, combat systems, and to engineering. Every U.S. platform is now blind, impotent, and dead in the water. Within a few short days the once-feared military power of the United States is defeated without any bloodshed. Not with a bang, but a whimper.
Jason H. Chuma is a U.S. Navy submarine officer who has deployed to the U.S. 4th Fleet and U.S. 6th Fleet areas of responsibility. He is a graduate of the Citadel, holds a master’s degree from Old Dominion University, and has completed the Intermediate Command and Staff Course from the U.S. Naval War College. He can be followed on Twitter @Jason_Chuma.
The opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.