Tag Archives: networks

Hyper-Converged Networks and Artificial Intelligence: Fighting at Machine Speed

By Travis Howard

Lieutenant Stacey Alto sits in the Joint Intelligence Center aboard the Wasp-class Amphibious Assault ship USS ESSEX (LHD 2). As the Force Intelligence Watch Officer (FIWO), her job is to absorb relevant information related to current and future operations of the Essex Amphibious Ready Group, as well as the general intelligence within the operating theater. Her zero-client, virtual desktop environment (VDE) 6-panel display at her watch station allows her a single-pane-of-glass into Unclassified, Secret, Top Secret, and Coalition enclaves through the Consolidated Afloat Networking and Enterprise Services (CANES) network.

One of her watch standers, an Intelligence Specialist Second Class, approaches her desk with new information from the Joint Operations Center (JOC), the nerve center of ARG operations, announcing new orders from the fleet commander to enter the Gulf of Oman, which represents a shift in operating theater from their current position in the Arabian Sea.

Stacey goes to work immediately, enlisting the help of two Intelligence Specialists and one of the Information Systems Technicians standing watch in the Ship’s Signal Exploitation Space (SSES). She queries the onboard widget carousel on her CANES SECRET terminal. Using a combination of mouse, keyboard, and touchscreen, she pulls together several ready-made widgets and snaps them into place, each taking advantage of a pool of “big data” information stored on the ship’s carry-on Distributed Common Ground System-Navy (DCGS-N) and off-ship sources from the intelligence cloud. Her development work gets passed to the next watch team, as they set the application’s variables for data parsing, consolidating inputs, and terrain mapping to put together a relevant, real-time intelligence picture.

By the time Stacey returns to her watch station almost 24 hours later, the IT personnel in SSES have put the new application through the automated cybersecurity testing process and have released it to the onboard “app store,” which Stacey can now install on her virtualized, thin-client desktop within seconds. She calls the JOC, the Marine Landing Force Operations Center (LFOC), and the ship’s Combat Information Center (CIC) announcing the system’s readiness with separate logins at the appropriate classification level for each watch station. By the time ESSEX enters the Gulf of Oman, the application has mapped adversarial positions and capabilities, pulled from several disparate databases afloat and ashore, all at varying levels of classification necessary for operational planning throughout the ship.

Building a More Maneuverable Network Afloat

The above scenario is almost a reality, representing several emergent advances in network technology and application portability (the “mobility” factor) that the Navy will soon capitalize on: a hardware and network-layer software architecture known as hyper converged infrastructure (HCI). The performance and cost efficiencies realized by this architecture will pave the way for disruptive changes to how we maneuver the network across the entire spectrum of operations: as a business system, as a decision support system, and as a warfighting platform.

Hyper-convergence is the integration of several hardware devices through a hypervisor, which acts as an intermediary and resource broker between software and hardware. Independent IT components are no longer siloed but combined, simplifying the entire infrastructure and improving speed and agility of the virtual network.1 The advantages of HCI seem obvious, but the real disruptive effect is how we can build upon it. The opening scenario describes on-demand application development at the tactical edge. This is achievable through HCI efficiency and another emerging network process known as Agile Core Services (ACS), a joint software development initiative being built into several programs throughout the Navy and Air Force, and one that CANES (as the afloat and maritime operations center network provider) is leveraging.

Hyper-Convergence in Network Hardware combines storage and processing power into a single appliance for simplified management, faster deployment, and could even lower acquisition costs ( Helixstorm.com)

ACS allows applications to use a common mix of services at the platform level, reducing cost and time of development but also forcing all applications to “speak the same language.” All that is needed to make on-demand, tactical application delivery a reality is a framework for plug-ins that takes advantage of big data we already have aboard ships and available at both the operational and tactical levels of war.

Previous articles in the United States Naval Institute’s magazine Proceedings have argued for thin-client solutions aboard warships,2 leveraging the CANES network program to ultimately achieve network efficiency that can remove “fat clients” (standard computer desktops) from the architecture to be replaced by thin or zero-clients (user workstation nodes with virtualized desktops and no onboard storage or input devices beyond keyboard and mouse). Removing clients from the equation eases the burden on shipboard technicians, consolidates the information security posture, and overall presents a more efficient network management picture through smart automation that makes better use of available manpower. HCI is the architecture solution that will eventually enable a full-scale, afloat, thin-client solution.

Hyperconverged.org is a website dedicated to delivering the message of advantages that HCI can bring,3 and lists ten compelling advantages that HCI brings to any IT infrastructure, to include:

  • Focus on software-defined data centers to allow faster software modernization and more agile vulnerability patching
  • Use of commercial off the shelf (COTS) commodity hardware that provides failure avoidance without the additional costs
  • Centralized systems and management
  • Enhanced agility in network management, automation, virtualization of operating systems, and shared resources across a common resource manager (such as hypervisor)
  • Improved scalability and efficiency
  • Potentially lower costs (caveat: in the commercial sector this may be truer than in the government sector, but smart contract competitions and vendor choices can drive down costs for the government as well)
  • Consolidated data protection through improved backup and recovery options, more efficient resource utilization, and faster network management tools

The advantages of HCI are numerous, and represent the true next step in IT architecture that will enable future software capabilities. How can we, as warfighters, take advantage of this emerging technology? It cannot be overstated that our current processes for procuring and delivering software-based services and capabilities must be revamped to keep pace with industry and take advantage of the speed and agility that HCI brings.

Faster, More Efficient Application Development is the Next Step

In our current hardware development methodology, programs of record within the Department of Defense (DoD) have little difficulty determining a clear modernization path that fits within the cost, schedule, and performance constraints outlined by the DoD acquisition framework. However, software development is an entirely different story, and is no longer agile enough to suit our needs. If we can iterate hardware infrastructure at near the speed of industry, then software and application development becomes the pacing function that we must address before we can realize the opening scenario of this essay.

The key term when discussing the speed of system development is agility, defined by the Massachusetts Institute of Technology (MIT) as “the speed of operations within an organization and speed in responding to customers…or reduced cycle times.”4 The federal government, DoD in particular, has been struggling with acquisition reform for some time, and with the signing of the National Defense Authorization Act in fiscal year 2010, Congress placed renewed emphasis on the need to transform the acquisition process for information technology. Several programmatic changes to acquisition helped (such as the approval of the “IT Box” programmatic framework in the joint requirements process), but the agility of software development and modernization remains challenged. Ensuring proper testing and evaluation (T&E) methodology, bureaucratic approval processes to ensure affordability, joint interoperability testing, and lengthy proof-in testing are just some of the processes facing software applications prior to gaining approval for full-rate production and fielding to the warfighter.

Matthew Kennedy and Lieutenant Colonel Dan Ward (U.S. Air Force), in a 2012 article for Defense Acquisition University, argued for agility in system development by discussing flaws in the current “agile software development” model.5 Developed in the early 2000s, this model is not as agile as the name would imply, and still defines requirements to be developed in advance, which doesn’t leave room for innovation or rapid, iterative changes to keep pace with the speed of industry. Exciting initiatives are being fielded in the commercial sector, such as cloud-based development and learning models, and mobility technology that many of the services would use to great effect. Innovative prototyping of disruptive technology at the service or component level of DoD, such as the now-disbanded Chief of Naval Operation’s Rapid Innovation Cell (CRIC), proved that there are operational advantages to emerging tech such as wearable mobile devices, if only we could “turn a tighter circle” within our acquisition framework and work with agility to field newer and better versions to the force.

Thankfully, we don’t have to reinvent the wheel when implementing a more agile software development framework; we must take lessons from industry and apply them to the unique needs of each of the DoD components. This may be easier said than done, but Kennedy and Ward, and indeed likely many other acquisition professionals and scholars, would agree that it is entirely possible if leadership demanded it, and the policies, procedures, and resourcing followed suit to support it. Kennedy and Ward offered a common set of software and business aspect practices to support agile practices that would allow a predictable, faster software refresh cycle (not just patches, but cumulative updates) to ensure software remains agile and relevant to the warfighter. Using small teams for incremental development, lean initiatives to shorten timelines, and continuous user involvement with co-located teams are just some of the practices offered.6

Improving our software development and modernization framework to be even more agile than it is now is necessary considering the recent industry shift to software-as-a-service and cloud-based business models. No longer will software versions be deliberate releases, but rather iterative updates such as Microsoft’s “current branch for business” (CBB) model. With this model, Microsoft envisions that Windows 10 could be the last “version” of Windows to be released, which will then be built upon in future “service pack-like” updates every 12-18 months. Organizations that do not update their operating systems to the latest CBB will be left behind with unsupported versions. Not only does such a change demand a rapid speed-to-force update solution for DoD, but it represents a disruptive process change that will ultimately allow us to reach the opening scenario’s on-demand tactical application process, leveraging big data in a way that units at the tactical edge have never done before – and in a way that may never have been imagined by the system’s original developers.

Hyper-convergence infrastructure, together with agility-based application development and modernization, represents a near-term possibility that will enable true innovation at the tactical level of war and put the power of information superiority into the hands of the warfighter. While re-developing the acquisition framework to achieve this may be difficult, it is entirely possible and, many would say, necessary if DoD is to keep pace with emerging threats, take advantage of emerging technology and innovation, and ultimately retain its status as the best equipped and trained force the world has ever known.

Artificial Intelligence: The Next AEGIS Combat System

Now let’s imagine another scenario. USS LYNDON B. JOHNSON (DDG 1002), last of the Zumwalt-class destroyer line and used primarily to test emergent technology prototypes in real-world scenarios, slips silently through the South China Sea in the dead of night. She is the first ship in the U.S. Navy to possess Nelson, a recursively-improving artificial intelligence (RIAI). Utilizing an HCI supercomputer core, Nelson acts as an integrator for the various shipboard combat systems in a similar concept to today’s AEGIS Combat System, except much faster and with machine-speed environmental adaption.

American relations with China have broken down, resulting in a shooting war in the South China Sea that threatens to spill into the Pacific proper, and eventually reach Hawaii. In an effort to change the dynamic, DDG-1002 forward deploys in stealth to collect intelligence on enemy force disposition and, if the opportunity presents itself, offer a first-strike capability to the U.S. Pacific Command. JOHNSON is spotted by a surface action group of three Chinese destroyers, who take immediate action by firing a salvo of anti-ship cruise missiles followed by surface gunnery fire once in range.

At the voice command of the Tactical Action Officer, Nelson goes to work, taking control of the ship’s self-defense system and prioritizing targets in a similar fashion to Aegis, only much faster, while constantly providing voice feedback on system readiness, target status, and battle damage assessments through the internal battle circuit, essentially acting as a member of the CIC team. Nelson’s adaptability as an AI allows it to evolve its tactical recommendations based on the environment and the sensory input from the ship’s 3D and 2D radars, intelligence feeds, and even the voice reports over the battle circuit. Compiling the tactical picture on a large display in CIC, Nelson simultaneously responds to threats against the ship while providing a fused battle management display to the Captain and Tactical Action Officer. The RIAI does much to lift the fog of war, and automates enough of the ship’s defensive and information-gathering functions to allow the humans to focus on tactically employing the ship to stop the threat rather than reacting to it.

While hyper-convergence, coupled with agile and rapidly-developed software innovation, is the emerging technology, recursively-improving artificial intelligence is the ultimate disruptive technology in the near to medium-term and represents the giant leap forward that many research and development efforts are striving towards. AI has often been relegated to the work of science fiction, and while many futurists see it as the inevitable “singularity” to happen as soon as the mid-21st century, it has not quite gained acceptance in the mainstream technical community. What must be focused on from a warfighter’s perspective is the near-term (within the next 30-50 years) prospects of advances in quantum computing, neural networks, robotics, nanotechnology, and hyper-convergence. These advances could put us on a path towards artificial intelligence within the lifetime of generations currently serving or about to serve in the armed forces.

The debate over whether recursively self-improving artificial intelligence is possible continues,5 with some theorists stating that such an AI cannot be achieved because intelligence could be “upper bounded” in a way that transcends processor speed, available memory, and sensor resolution improvements. Others suggest that intelligence “is the ability to find patterns in data”7 and that, regardless of the more fringe theories surrounding AI, transhumanism, and the ontological discussions of the singularity, “a sub-human level system capable of self-improvement can’t be excluded.”8  It is the sub-human AI, capable of adapting to changing data patterns, that makes a combat system AI an exciting near-future prospect. 

Conclusion

This article presented two hypothetical scenarios. In the near-term, a Navy watchstander takes advantage of a hyper-converged infrastructure network environment onboard a U.S. Navy warship to rapidly develop a tactical application to take advantage of disparate databases and cloud data resources, ultimately producing a battle management aid for the ship’s next mission. This scenario took advantage of two emerging technological concepts: hyper-convergence in hardware infrastructure, a reality some major defense acquisition programs such as the Navy’s CANES has already resourced and on-track to field in the coming years, and agile software development in defense acquisition, which is a conceptual framework that must be developed to ensure more rapid and innovative software capabilities are delivered to the force.

The funding for these technological advances must remain stable to deliver HCI to our operating forces as a hardware baseline for future development, and policy makers must continue to find efficiencies in IT acquisition that lead to agile software development to really take advantage of the efficiencies HCI brings. Additionally, DoD IT leaders must think critically and dynamically about how future software updates will be tested and fielded rapidly; our current lengthy testing and evaluation cycle is no longer compatible with either the speed of industry’s vulnerability patching, a fluid content upgrade schedule, or the pace of adversarial threats.

The second scenario describes a near-future incorporation of recursively-improving artificial intelligence within a combat system, which builds upon hyper converged hardware and recursively improving software to deliver a warfighting platform that can defend itself more rapidly and learn from its tactical situation. The simple fact is that technology is changing at a pace no one dared dream as early as 20 years ago, and if we don’t build it, our adversaries will. A recent (2016) article in Reuters, and reported in other media outlets, showcases the People Republic of China’s (PRC) desire to build AI-integrated weapons,9 citing Wang Changqing of China Aerospace and Industry Corp with saying “our future cruise missiles will have a very high level of artificial intelligence and automation.” DoD must adapt its processes to keep pace and remain the world’s leader in incorporating emerging and disruptive technology into its warfighting systems.

Travis Howard is an active duty U.S. Naval Officer assigned to the staff of the Chief of Naval Operations in Washington D.C. He holds advanced degrees and certifications in cybersecurity policy and business administration, and has over 16 years of enlisted and commissioned experience in surface warfare and Navy information systems. The views expressed here are solely those of the author and do not necessarily reflect those of the Department of the Navy, Department of Defense, or the United States Government.

References

1. Scott Morris. “Putting The ‘Hyper’ Into Convergence.” NetworkWorld Asia 12.2 (2015): 44. 28 Jan 2017.

2. Travis Howard, LT, USN. “’The Next Generation’ of Afloat Networking.” Proceedings Magazine, Mar 2015, Vol. 141/3/1,345

3. Hyperconverged.org. “Ten Things Hyperconverged Can Do For You: Leveraging the Benefits of Hyperconverged Infrastructure.” Retrieved Feb 2 2017, http://www.hyperconverged.org/10-things-hyperconvergence-can-do/

4. Matthew Kennedy & Lt Col Dan Ward. “Inserting Agility In System Development.” Defense Acquisition Research Journal: A Publication Of The Defense Acquisition University 19.3 (2012): 249-264. 4 Feb 2017.

5. Ibid

6. Ibid

7. Roman Yampolskiy. “From Seed AI to Technological Singularity via Recursively Self-Improving Software.” Cornell University Library. arXiv:1502.06512 [cs.AI]. 23 Feb 2015.

8. Ibid

9. Ben Blanchard. “China eyes artificial intelligence for new cruise missiles.” Reuters, World News. 19 Aug 2016, http://www.reuters.com/article/us-china-defence-missiles-idUSKCN10U0EM

Featured Image: Electronic Warfare Specialist 2nd Class Sarah Lanoo from South Bend, Ind., operates a Naval Tactical Data System (NTDS) console in the Combat Direction Center (CDC) aboard the USS Abraham Lincoln as it conducts combat operations in support of Operation Southern Watch. (U.S. Navy photo by Photographer’s Mate 3rd Class Patricia Totemeier)

A Reflection on the “Personal Theories of Power”

This is the final post in the Personal Theories of Power series, a joint BridgeCIMSEC project which asked a group of national security professionals to provide their theory of power and its application. We hope this launches a long and insightful debate that may one day shape policy.

When Rich Ganske first mentioned the idea of writing about personal theories of power, I wasn’t immediately on board. I viewed it as a lot of work for a few posts, mostly done by friends who would provide content out of loyalty. I could not have been more wrong. With Rich heading the concept, we quickly sketched out some possible topics people could cover. Air power and land power, of course…we could each cover those. We then started thinking about others that tended to inhabit the blogosphere and might be willing to produce some interesting ideas. We knew more than a few eloquent navalists, so sea power would be covered. They also provided us with a valuable link to another great blogging organization, the Center for International Maritime Security, which agreed to cross-post the articles, opening up another avenue to a well-informed audience. With the domains largely addressed, we then took a different tact; we came up with writers first, allowing them to develop their own topics…ending up with 16 possible posts. We expected to actually deliver 4-5 by the short deadline provided. Fourteen arrived for publication, including:

And for those that are counting, Rich Ganske did provide 3 posts for this series (including his opening)…he was that committed. While the quantity of the posts was truly unexpected, the quality was what impressed me. The authors truly took the time to think through their desired topics and addressed their views on them. It probably didn’t hurt that the authors were either in the midst of studying the topic or immersed in it from day to day.

What really made this project a success, at least in my mind, was the obvious enthusiasm and professionalism the participants displayed. How many people do you know would volunteer time out of their already busy schedules to study, write, edit, and format a piece on theory? How many people do you know would find not only value in such a pursuit, but be excited about it? Are these people you already know? Could you call them out of the blue and make such a request?

Leveraging relationships, and even loose ties, is not new when it comes to accomplishing intellectual tasks. Last year an organization, the Defense Entrepreneurs Forum, was created to leverage just such relationships to benefit our military services and those that serve in them. In a post-event article, a few of the founding members addressed the topic of informal networks and their worth:

One solution [to the obstacles of creating] is to form informal networks outside formal organizational structures in which innovative thinking can occur. That can be as simple as a few friends drawing sketches on bar napkins or trying new tactics, techniques, and procedures on the training range. Over time, these ad hoc networks can push ideas back into formal channels. Military journals provide formalized but still peripheral networks in which innovators can inject fresh thinking into the mainstream.

Sometimes these ad hoc networks take on a life of their own, relentlessly pushing new thinking on a stale organization. In some cases, the organization eventually recognizes their value and draws them in. Such was the case with the German General Gerhard von Scharnhorst, who was eventually entrusted with reforming the Prussian military after the disastrous battle at Jena. In addition to creating the professional military staff, Scharnhorst and his network acquainted the world with a promising Prussian officer named Carl von Clausewitz. In other cases, these networks of “Young Turks” are less welcome. Billy Mitchell was ultimately court-martialed for his intemperate advocacy of airpower in the interwar years. Fortunately for his fellow airmen, the development of airpower theory was able to continue through the 1930s in the Air Corps Tactical School, a formal structure that nonetheless had enough autonomy to stay under the radar. Although airpower still faced a painful learning curve in World War II, the pre-war activities of these loyal dissidents laid the groundwork for airpower to develop into a finely honed instrument of war.

The same is true of our personal theories; others may have previously addressed all of the topics we published in this series…and in far greater detail than the 1,500 words with which I constrained our authors. However, the value of each of us delving into our own personal views is that it starts a conversation…and by doing so, it creates more relationships to sharpen the theory, improve the argument, and hopefully strengthen the ability for application.

Based on the feedback I’ve received so far for many of the posts, that conversation is happening. Relationships are being built. Others are being encouraged to write their own theories, or reactions to those they’ve read. In the coming days you’ll see a few of those posts; I hope they continue to drive the conversation and build even more relationships.

In addition to the great output provided by the authors, The Bridge was lucky to not only have the intellectual drive provided by Rich Ganske for this project, but the encouragement and advice of Mikhail Grinberg, as well as the technical copy editing skills of Tim Wolfe. Without the work of many people, this series could not have occurred. If you’d like to join us on The Bridge, we’re simply a note away.

Smashing Maritime Ratlines – A Team Sport

The following article is special to our International Maritime Shipping Week. While we often discuss the threats to maritime shipping, this week looks at dangers arising from such global trade, and possible mitigations.

 

A boarding near Cape Verde

U.S. Navy publications often describe the sea as a global commons; the idea being that the oceans represent a resource to be shared for the benefit of all.  The reality, however, is that although the world’s oceans facilitate billions of dollars of legitimate commerce and trade every day, criminal networks, insurgent groups, and transnational terrorist organizations exploit sea lanes for more nefarious ends. The same ports and ocean routes used by sailors for thousands of years also provide today’s afloat highways, over which both legal and illicit cargoes move. These routes – or “ratlines”, when used for illicit traffic – exist amid a complex international patchwork of intertwined economies, diverse cultures, and varying legal authorities and levels of governance.

Disrupting these ratlines requires teamwork and a networked approach.  Accordingly, a number of U.S. government agencies have responsibility of some sort or another for stemming the flow of illegal shipments at sea. Obvious players are Department of Homeland Security organizations, including the U.S. Coast Guard, Immigrations and Customs Enforcement, U.S. Navy, and the U.S. Drug Enforcement Agency. The Human Smuggling and Trafficking Center is a relatively new agency charged by Congress to work against smuggling, illegal trafficking of people against their will, and terrorist travel. Many other agencies play an important role in supporting interdiction efforts with intelligence and law enforcement expertise.
 
Many readers are familiar with the efforts of the Joint Interagency Task Force South, at Naval Air Station Key West, Fla. This long-standing organization consists of several U.S. agencies working with numerous partner nations to counter narcotics trafficking moving through the Caribbean and Eastern Pacific into North America. In addition to this major drug transit zone, lesser-known maritime facilitation routes throughout the world move people, money, and materials illicitly for both financial profit and malign intent.

One example is Islamic foreign fighters who leave their home country and travel over sea, land, and air routes to train and take up arms in conflict zones. The foreign fighter pipeline has supported numerous jihadi battlefields, including Afghanistan, Iraq, Pakistan, Chechnya, Bosnia, Kashmir, Somalia, Yemen, Libya, and Syria. The relatively short ocean crossing connecting Yemen and Somalia, and their long coastlines, has resulted in significant foreign fighter flow between two countries, further destabilizing the region. Estimates of the number of foreigners who traveled in the late 2000s to train and fight with Somalia’s Al Shabaab militant Islamist group range from 200 to more than 1,000. Several of these foreign fighters were westerners from the United States and United Kingdom, including the first known U.S. suicide bomber. The problem garnered significant attention, such that the African Union’s commissioner for peace and security pressed the U.N. Security Council to authorize a naval blockade in order to prevent the entry of foreign fighters into Somalia. 

pic_03A more-obscure maritime ratline involves Afghani hashish and heroin smuggled from Pakistan’s Makran Coast to the Gulf States and East Africa. These smuggling routes reflect a nexus between criminal drug-trafficking and the funding of ongoing conflict and corruption in Afghanistan. In 2009, a U.S. Navy cruiser patrolling in the Gulf of Aden seized a skiff carrying 4 tons of hashish with a street value of $28 million. In all, international naval forces operating in the Indian Ocean seized 53 tons of drugs along the “hashish highway” in 2008 and more than 22 tons during 2009. This success notwithstanding, a lack of maritime patrol and reconnaissance assets combined with lax customs laws, and competing priorities of the various countries involved make narcotics interdiction along these sea routes a challenging proposition.

A different facet of illicit maritime networks is the transport of weapons and bomb-making materials into war zones. This usually involves a combination of legitimate businesses from source countries where electronics or other “dual-use” improvised explosive device (IED) components are produced and witting smugglers, who ship the goods sometimes hidden in legitimate cargoes.

In an operation a few years back (in which this author was personally involved), a non-DOD intelligence tipper on possible maritime facilitation of IED components was passed to a U.S. military special operations task force, which pushed the information to conventional naval forces. The Navy teams interdicted the vessel of interest, boarded it, and conducted an exhaustive search. Though they did not find the incriminating cargo, irregularities in the cargo manifest warranted further investigation. The ship was allowed to proceed to the next port of call where the host nation’s authorities, assisted by U.S. officials, conducted additional inspections. Through these searches the dual-use material was found and host nation authorities seized the cargo, with disruptive effects on the IED network. Moreover, because the effort required coordination between at least five U.S. government agencies, multiple DOD commands, and several countries, valuable lessons were learned that will pave the way for success in future counter-maritime facilitation actions. 

Above all, countering illicit maritime networks requires open and flat communications at multiple levels – both interagency and international. Traditional command-and-control structures that are comfortable to most military operators are not appropriate for an interdiction effort involving multiple agencies and countries. Rather, early and frequent meetings – such as secure teleconferences – will foster an environment of collaboration and coordination.  Because maritime targets are dynamic, rapid dissemination of intelligence and intent is necessary for a successful interdiction. In the above example, only about 12 hours passed between the initial intelligence tipper and the vessel’s identification, boarding, and interdiction. In some cases, the vessel of interest must be intercepted and boarded before it passes into territorial waters. At other times, coordinating for partner nation authorities at the next port of call to inspect the cargo ashore might be more feasible. 

Africa Partnership Station 2012Differing security classifications and communication systems between agencies and countries complicate the flow of information, but these obstacles can be overcome by persistent outreach and liaison. While advances in technology have certainly helped ease information-sharing blockages, it is often viewed as a panacea. Nothing beats the information flow that can be achieved from a closely tied liaison network working towards a common end state. Along these lines, countering illicit maritime facilitation requires a careful balance between various military, agency, and partner-nation equities. Sometimes these equities are competing; in other cases they are complementary. Law enforcement agencies often require that the chain of custody for any evidence seized during a maritime interdiction be carefully preserved in order to build a legal case against an individual facilitator. These efforts are sometimes at odds with the exploitation of a seizure for intelligence purposes and the need to maintain operational security. Meanwhile, a partner nation may see broadcasting the results of a successful interdiction effort through information operations as a way to gain legitimacy in the eyes of its population. Finally, internecine struggles and political friction between various institutions often stifle coordination despite the best efforts and intentions of those involved.

The maritime facilitation networks of criminals and terrorists present serious challenges to the security interests of the United States and friendly governments. Disrupting these ratlines requires a thoughtful and integrated approach by various organizations focusing on all aspects of the interdiction problem: intelligence, legal, diplomatic, and physical.

CDR Chris Rawley serves in the special operations community. He led boarding teams during maritime interception operations against oil smugglers in the Persian Gulf and coordinated operational level maritime interdiction efforts in the Middle East and the Horn of Africa. He is the author of Unconventional Warfare 2.0: A Better Path to Regime Change in the Twenty-First Century and blogs regularly at Information Dissemination. The above opinions are his own.

For more articles in our International Maritime Shipping Week, click here.

Anecdotal Economics from the Long War

Our nation is closing its chapter on the Long Wars as 2014 approaches. While there will be no single demarcation of when we become a “nation at peace”, we will settle into the same minimal focus and consciousness (if we are not there already) regarding Afghanistan as we did in Iraq when a no-fly zone was enforced for more than a decade following the Gulf War. I do not yet wish to comment on the national reflection that needs to take place, but in terms of military science I believe our introspection is flawed. Many studies and after action reviews have been undertaken examining generic trends or qualitative assessments, but very few have examined the input/output efficiencies that were or were not achieved by units, systems, and methods. It’s reasonable that such studies cannot be expected to be coldly objective in their analysis while active combat operations are ongoing. Never the less, there will be no “Victory over the Long War Day” which clearly marks the end of war and the start of peace, so a more robust critical analysis can not wait till there is no more emotion associated with our recent wars. Below are the least efficient input/output trends that I observed from my brief service in our Long War. These are my own, and derived only by my own anecdotal experience.

At what cost this noble mission?
                                                A noble mission – but at what cost?

 

1.Counter-Improvised Explosive Devices (IED): By this I mean the big government counter-IED response, of which the Joint IED Defeat Organization (JIEDDO) is the prime example. This is an emotional topic for many, including myself, as friends of mine were killed by such devices – devices that are not new technologies that emerged in Iraq and Afghanistan, as many have portrayed them. The big government/higher headquarters response to Counter-IED might represent one of the worst returns on investment in annals of American war. When organizations such as JIEDDO consume vast swathes of money, the outlay is assumed to have achieved the effect of decreasing casualty incidents from such devices. However, such spending has actually had negligible results decreasing the harm caused to our forces. The past few years have seen millions more  spent on high-tech counters to IEDs while the devices themselves are becoming cheaper and wounding or killing more of our forces. Anecdotally, for all the amazing technology I witnessed and/or used while in Afghanistan, solutions that were top-down or directed from high-level headquarters generally had much less impact on preventing casualties than those that were bottom-up. Fantastic technology had the same results as very basic know-how applied by 19-year-olds facing death, and contained decreased opportunity costs from draining huge coffers of money to address simple tactical problems. The data sets surrounding the issue are very difficult to comprehensively discern, as we are measuring the safety of our troops, and the spillover effects of some of the work taken by organizations like JIEDDO is likely large. But in aggregate it is hard to argue that we have not spun ourselves in circles looking for a technological answer to an eternal human problem of warfare.

IEDs are, and will remain, a weapon that leverages a stronger force’s weaknesses against it. Planning to counter them in way that seems more in line with nuclear deterrence or research into ballistic missile defense seems to be a misplaced strategy. Historically there have been many examples of emerging technologies or tactics used by foes to exploit a gap in our own equipment or tactics, but we have traditionally let forces and commanders find the best way to meet those advances. Outsourcing much of the solution to large, bureaucratic organizations is not an “Occam’s Razor” solution. Money spent creating force fields more akin to Flash Gordon than Sgt Rock would have been better utilized providing realistic training for units, enabling commanders to address problems in their areas of operations according to their judgment, or, sadly the most radical suggestion for the DOD, saved for the rainy fiscal day that is upon us.

2. Growth in Networks: Inefficiency has also formed due to the gap between the vast growths in network capability of the U.S. military compared with its human processing ability. IT and communications technology allowed the U.S. military to enter into the Long War with an unparalleled ability to sense, collect, and distribute data. The largest problem is that our human processing ability – the capability to process such data into tangible and useful results – has not caught up. I was amazed as to what an infantry battalion in Afghanistan had at its disposal in terms of networks and databases, but disheartened when I tried to pull meaning out of those same networks and databases. Simply put, there has been a glut in the supply of information provided by networks and our cognitive demand has not caught up.

Commanders are shown amazing examples and case studies of networks helping find a bad guys, save a patrol, or magically reveal what an insurgent will do. In all these examples it seems as if Apple designed our systems, and upon a few clicks of the mouse the answer will appear. Generally such outcomes occurred when there was a merging of the right person/people, events, knowledge, and required training. Such a confluence was a rare occurrence, and to raise expectations that they were common is irresponsible and shows expectation bias by allowing the cherry picking of results to justify larger, more complex systems. The most critical ingredients to cook up the perfect network-enabled operation – training and judgment – are the most difficult to inculcate in the 18-22-year-olds using the systems. It is true we need graduate-level thinking in our warriors to conduct counter-insurgency (COIN), but saying we need it and providing the time necessary to obtain it are two very different things.

"Let me just make sure I've tagged everyone in this photo...."
“Let me just make sure I’ve tagged everyone in this photo….”

We can continue to build more intricate networks which add raw capability but little meaning to our command and control capabilities. I would argue the best network is not the most complex, but rather the simplest one that works the most consistently – a model our enemies seem adept at constructing. Increasing the training, judgment, and processing capacity of our forces will yield better results than expanding our digital tendrils past the point of diminishing returns of our collective nervous system. Revising our acquisitions process would help, often it seemed that new systems were shot out at the rate of how long it took a defense contractor to impress a flag officer instead an actual need occurring on the battlefield. A vetting system that involves more widespread testing at the lower ranks, and contracts which are easier to get out of if the product does not live up to expectations, could prevent debacles from seemingly simple requests that get turned into unstoppable hydras.

3. The Deification of COIN: I will preface this comment by saying that I am not a COIN naysayer who thinks that the U.S. military should only be prepared for larger force-on-force engagements a la Leyte Gulf or Kursk. I believe that the kit bag of any global power should be contain the forces necessary to interdict conflict at the low- and medium-ends of the spectrum, or before it begins. History proves that most of America’s wars have been low-intensity conflicts.

That being said there has been a fetishization with COIN, and it more proportionally affects junior leaders like myself. COIN takes much skill, has a limited bandwidth of applicability, and will always be best when its strategy comes from those closest to its application. But such characteristics are not likely to apply if high-intensity conflicts occur.

Our current rebalance to the Pacific is based on the likelihood for fast, large-scale, and highly violent conflict. Such a conflict will weigh heavily on junior leaders, but not in the way they are used to. They will have to rely on senior leadership to coordinate and enable their actions, because without strong, decisive higher headquarters guidance a danger of the second coming of Task Force Smith exists. While deployed in the hinterlands of Helmand, many lieutenants had to craft their own guidance and operate with the slimmest of intent. The vast majority did so well; they also came away from the experience rightly confident in their abilities and skeptical of the perspective higher headquarters had. In a vast ocean and littoral battlefield, those same independent operators will have to accept the fact they will not see the whole picture. Our forces have done extremely well fighting over long tours interspersed with moments of violence, but have had more limited exposure to highly kinetic battles that take place over months and require management of rates of fire, triage, and difficult decisions about weaponeering. Most of the choices were easy in a COIN fight, as the majority of the time the decision was always not how to use the most force but how to use the least. While the strong experiences that have been formed over the past ten years of small unit actions are priceless, it must not be treated as sacrosanct in all circumstances. Future junior leaders may not be in command of the lone patrol base for miles, or if they are, they might only be effective if they are aware of the fight going on at higher levels. We have rarely been able to choose our wars, and even when we do the enemy casts votes that are rarely predicted. Raising an officer corps to worship at the altar of COIN is no healthier than those who refused to accept COIN’s viability in the early stages of Iraq and Afghanistan.

There are enormous amounts of knowledge to be extracted from the previous decade of war, and efforts to refine that knowledge into a powerful, efficient fuel that can power our military to train for future conflicts needs to occur as a logical study of our efficiencies. We have had many qualitative accounts of battles and campaigns that have aptly described what was or was not done. There have not been as many quantitative studies of what provided the most for the least cost. Such an examination will be boring, and necessarily ignorant of the emotional side of our conflicts, but is required as it will be best way to extract meaning that will be useful in future wars.

About the Author: Chris Barber is a Captain in the United States Marine Corps. The views presented here are his own and not official policy of the USMC, DOD, or United States Government. They also are insanely clever for a gentlemen educated in public school that might not be able to spell COIN if not for spell check.