Tag Archives: Technology

People Not Parts: Returning Ingenuity and Tenacity to our Officer Corps

By Ian Akisoglu

Since the end of the Second World War, the military dominance of the United States has rested on its relative technological superiority over its adversaries, what has been underwritten by its impressive economic strength and high-tech domestic industries. For the first time in seventy years, the United States military is forced to contemplate a long-term strategy without the implicit guarantee that it will enjoy decisive technological superiority as its most likely adversaries come closer and closer to achieving parity in both technological and economic strength. In order to remain viable in future conflicts, the American military will have to rethink its operational paradigm and learn to rely more heavily on the creativity and individual zeal of its leaders and less on its hard assets.

For much of its history, the American military has fought its major conflicts without the overwhelming technological and financial superiority that it has enjoyed since the end of the Second World War. I believe that this phenomenon can best be explained by the following paradigm: raised in an age where American military power was relatively lacking on the world stage, the American officer corps did not possess any of the bad habits or laziness of thought engendered in today’s officer corps. Looking down on the rest of the world’s militaries from a plateau of overwhelming superiority and relative security, we have become haughty and ignorant of our peers’ capabilities. Previously generations of American military officers were forced to contend with a world in which the United States Army and Navy were not the best – indeed, not even in the top ten at times.

This forced American military leaders to develop and utilize a currently unimaginable level of organizational, operational, and strategic creativity comparably unknown to the armed forces of today, where an over-reliance on financial superiority has led to an over-reliance on technological superiority, which has led to an over-reliance on established procedures and doctrine. In order for the armed forces of the United States of America to continue to enjoy success in the future, both on the battlefield and as a viable instrument of soft power, American military leaders must look to lessons from the past and re-learn how to plan and fight wars without the assumption that they will always enjoy superiority of force.

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

A humorous quote from a European officer highlights the benefit of this, “One of the serious problems in planning against American doctrine is that the Americans do not read their manuals nor do they feel any obligations to follow their doctrine.” This emphasizes the extensive freedom of judgment American commanders previously enjoyed while executing missions in complex operational environments. From the author’s perspective as a contemporary unrestricted line officer in the U.S. Navy, this freedom of judgment is virtually non-existent nowadays. Instead, American military commanders are so hamstrung by strict adherence to the protocol and procedures that have been enshrined throughout their military upbringings that they are often afraid to rely on their own intuition, experience, and creativity. This risk aversion is not unjustified since the risk to reward ratio for officers willing to try new ideas has shifted so heavily to the risk side, that many deem the potential gains not worth imperiling their careers over. The main problem with this method of doing business is that operational arenas are not the static playing fields that we presuppose them to be in most exercise and operation briefs. They are constantly evolving, which requires adaptability and ingenuity instead of a flow-chart approach to missions.

Members of the U.S. Naval Academy Class of 2014 participate in the Oath of Office ceremony at Tecumseh Court. (U.S. Navy photo by David Tucker/Released)
Members of the U.S. Naval Academy Class of 2014 participate in the Oath of Office ceremony at Tecumseh Court. (U.S. Navy photo by David Tucker/Released)

This is not meant to be a rebuke of procedural compliance – far from it. Procedural compliance is important to ensure the safety and proper execution of our technical missions: safety and maintenance. However, it is important to also recognize its inherent limitations, and understand that it’s impossible to write “winning a war” into procedural compliance, since procedures only extend to the realm of what is known, and war often devolves into the area of the unknown. Simply put, officers should be proficient at procedural compliance and planned execution, but once the situation is no longer covered by procedures, strategic entrepreneurship and improvisation must take over seamlessly. If we consistently deny our Navy leadership the ability to improvise and test their creative problem solving abilities for fear of imperiling their careers, how and when can this creative solution seeking process be fostered?

The key question then is how do we recapture the ingenuity of the individual officer? I assert that it must start at the earliest possible point in the officer’s career – for creativity once lost is nearly impossible to rediscover. The Navy should develop programs that both encourage and train officers to think of creative solutions to problems early on in their careers. The best time to start this is at the O-2 and O-3 levels, directly after the completion of an officer’s initial warfare qualifications and first operational tour.

The importance of instilling and encouraging the idea of creative thought early on in the officer corps cannot be overstated. Senior officers that attend the Naval War College relatively late in their careers to explore ideas on war and its strategic theory have already come to depend on the rigidity of the Navy establishment for their paychecks and lifestyle, and thus are less willing to question the institution or its authority. The junior officer, relatively fresh and with fewer mental harangues, owes no such allegiance to the organization and does not see it through the same cynical lens, allowing them to see the flaws in our organization much more clearly than a dyed-in-the-wool career officer. These junior officers are still willing to question the military’s fatal deficiencies and flaws before becoming completely indoctrinated into the system.

One way to implement this would be to establish a school that officers attend with peers from their warfare areas concentrated around every major career milestone. The goal of such a school would be to gather high-flying officers into small groups where they would be posed complex operational problems. However, they would face them with handicaps and constraints put in place, making normal doctrine and pre-planned responses obsolete, and forcing them to develop creative solutions to real world problems. Officers would return to the course at every major career milestone, such as in between division officer tours, prior to starting their department head tours, prior to beginning their XO/CO fleet-up, and prior to achieving flag rank.

One of the most resonant lessons that has been gleaned from the attacks on the USS Stark, USS Samuel B. Roberts, and USS Cole is that in unexpected situations, conventional procedures often are inadequate, and improvisation dominates. Generations of American military officers have become complacent through the knowledge of their nation’s technological and financial superiority. It is time to train them to think and fight absent this implicit safety net once again. It is better to start learning these critical skills now, while remaining in control of the pace, than to be forced to learn them under fire in a future conflict.

Capt. Frank Olmo, deputy commander, Naval Surface and Mine Warfighting Development Center (SMWDC), introduces SMWDC and the new career opportunities it provides junior surface warfare officers (SWOs) during a brief aboard USS Bunker Hill (DDG 52). U.S. Navy photo).
Capt. Frank Olmo, deputy commander, Naval Surface and Mine Warfighting Development Center (SMWDC), introduces SMWDC and the new career opportunities it provides junior surface warfare officers (SWOs) during a brief aboard USS Bunker Hill (DDG 52). (U.S. Navy photo).

Secondly, while an understanding of mathematics and the sciences remain ever important in an increasingly technical and specialized military, officer programs must also recapture the emphasis on liberal arts education and creative thinking that has steadily dwindled in the twentieth and twenty-first century formation of modern military officers. At the United States Naval Academy it is a requirement that sixty-five percent of those graduates must complete degrees in the science, technology, engineering, or mathematics disciplines. Of students commissioning from ROTC programs around the country – which, combined with the Naval Academy, contribute roughly two thirds of new officer accessions the fleet each year – eighty-five percent of available scholarships are rewarded to those students who choose majors in the STEM fields. Those remaining fifteen percent who do express interest in studying disciplines outside of these fields, ignominiously referred to as “Tier 3” majors, find their options for earning scholarships and commissioning more limited.

Technical courses do an excellent job training officers to operate complex combat systems and nuclear reactors, where every aspect can be distilled to checklists and procedures, but do a poor job in training strategic and creative thought. Such critical thinking skills are ultimately where officers render the greatest value to the armed forces as leaders and warfighters, not technicians. At a minimum, a certain number of liberal arts courses in subjects such as philosophy, history, literature, and economics should be required for certain officer programs in just the same way that calculus, physics, and other mathematics and science courses are. An officer able to harness the problem-solving ability taught by an education in engineering with the propensity for creative though that comes from a study of the liberal arts would be the best equipped to execute all of the Navy’s missions.

Thirdly, the United States military must push decision-making back down the chain of command to the unit level. In our age of global real-time communication we have achieved the ability to control even the minutest detail from the highest level. We must resist the temptation to do so, for this robs on-scene commanders of the crucial experience that comes from tense, independent decision-making. Instead, we must once again become comfortable with giving commanders autonomy over their units and operations, giving direction only in broad strokes and leaving the details to the “man on the spot,” who is inevitably the subject matter expert on what is happening within and directly around his unit. In today’s fleet, the number of daily updates that a deployed warship is required to provide up the chain of command off-ship has become a full-time job on top of the full-time job of running the ship and executing its mission. No effective leader has two full-time jobs.

Assistant Secretary of the Navy Theodore Roosevelt on the steps of the Naval War College.
Assistant Secretary of the Navy Theodore Roosevelt on the steps of the Naval War College.

And all of this for what? It is absolutely ludicrous to imagine that a remote commander and their staff, often years detached from single-unit leadership, require or need all of the information now required to be tracked on a daily basis. The massive off-ship administrative burden that this places on the wardroom of an operational unit, simultaneously interfering with their ability to effectively do their job within the lifelines of the ship, significantly degrades morale and unit-level success. By fostering a culture in which officers are afraid of making even the smallest decisions themselves, we are handicapping the abilities of junior officers to develop leadership skills and to learn to take the initiative, resulting in the ones who adapt to this climate being cautious to a fault for the rest of their careers, and inducing those individuals who want more control and autonomy to seek opportunities elsewhere.

Finally, the United States military must consider drawing talent into its ranks from untraditional sources outside the military and recognize that its rigid and traditional career path that exclusively emphasizes hiring and promotion from within might have to change. This is not entirely without precedent – the Navy already does this for many of its staff corps officers who have demonstrated experience and proficiency in their civilian careers. There are many individuals with different backgrounds and specialties who hear the call to serve their country at different points in their life. A master software engineer at Google with ten years in the industry would be an incredible asset to the military’s cyber warfare communities, but at that point in his career he would likely be too old to enlist and would have his talents wasted as a newly-commissioned ensign while also being grossly under-compensated. Instead, why not bring this cyber star in as a Lieutenant Commander? This arrangement would offer significant benefits and opportunities to both the military and the individual.

If the United States wants to avoid catastrophe on the battlefield in the coming decades, it will need to come to terms with the fact that having more money and better technology will no longer be enough to win the next war against the next foe – who may very well enjoy parity in these domains, if not even superiority. Accepting this, rather than continuing to do the same thing while expecting a different result, is a required preliminary step.

Deputy Secretary of Defense presents a Master of Science diploma to Ken Thomas at the Naval Postgraduate School.
Deputy Secretary of Defense Robert Work presents a Master of Science diploma to Ken Thomas at the Naval Postgraduate School.

The United States military must fundamentally change the way it does business and drive its officer corps to rediscover skills that gave way to technology and money when they seemed to no longer be needed or valued. In order to do this, we must encourage creative thought in our officers starting at a very junior level – both by commissioning a greater portion of our officers with backgrounds in the liberal arts as well as technical majors, and by creating incubator programs at multiple levels of officer career tracks to cultivate and stimulate creative thought. The military must also learn to re-delegate greater amounts of control and authority to unit commanders while unit commanders must learn to do the same to their subordinates. This ensures that if subordinate commanders are fighting a conflict in which they are cut off from communication with headquarters or things are not going quite as they had expected them to, they aren’t paralyzed with indecision, experiencing what is in effect their first ever real experience with high-stakes decision making.

Finally, the United States must harness the huge pool of potential talent that exists in the form of civilians who want to serve but don’t fit into the current recruiting construct. By allowing experienced non-military personnel to enter the organization at mid and even upper-level officer positions, the military can harness a huge untapped reservoir of private sector talent. The same skills that our military forefathers used to achieve victory on the battlefield when outclassed in technology, money, manpower, and weapons – creativity, zeal, initiative, and guile – are needed once again. All that is lacking is the will and tenacity to bring them back.

Lieutenant Junior Grade Ian Akisoglu is a Surface Warfare Officer living in Norfolk, Virginia.  He graduated from American University with a Bachelor of Arts in economics and history and was subsequently commissioned through Officer Candidate School.  The views expressed here are his own and do not represent those of the U.S. Department of Defense or the Department of the Navy.  He can be reached at [email protected].

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

Bibliography:

Kimbrough IV, James M. MAJ, USA. (2008). Examining U.S. Irregular Warfare Doctrine. 14.

United States Naval Academy. (2015). Academics – Majors and Courses.

Population Representation in the Military Services FY 2013 Report: Appendix B: Active Component Enlisted Accessions, Enlisted Force, Officer Accessions, and Officer Corps Tables.

United States Navy ROTC. (2015). Naval Reserve Officers Training Corps Scholarship Selection Criteria.

Long, Roger D. The Man On The Spot: Essays on British Empire History. (Ed.), Praeger, First Edition (Sep 26, 1995).

Avatar: Shock and Awe-fully Dumb

Written by Matthew Hipple for Movie Re-Fights Week

The blockbuster Avatar is not only remarkable for its stunning visuals and brow-beating politics, but for the colossal  incompetence of the corporate and military leadership of the Resource Development Administration (RDA). 

Sure, humanity may be counting on you for their survival. Sure, you have arrived on an alien planet armed with the ability to transmit your consciousness into proxy flesh suits hewn together with the most advanced science. But hey, why not just “YOLO” it and see what happens? What could go wrong? It’s not like you’re 4.5 light years from earth with limited resources!

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

 

Tactical Failure: If It Looks Smart and Doesn’t Work – It’s Stupid

Having thoroughly pissed off the blue bees nest on Pandora, RDA command is ordering you to destroy a tiny, purple-glowing “Tree of Souls.” The critical node in a vast planet-wide biological neural net, it is located  in the middle of an area of heavy radar interference and the aerial equivalent of deadly shoal water.

That's it? It's the size of a town Christmas tree! How hard could it be?
That’s it? It’s the size of a small town Christmas tree! Why does this have to be complicated?

RDA commanders probably read the old classic “Starship Troopers” and had heard of Star Craft’s “Zerg” and Halo’s “Flood” from the History Channel. Biological hive minds always end in billions of dead terrans. The mission was probably too important not to staff to death.

What would be more perfect than assigning a massive, vulnerable transport ship carrying a comically lashed-together bomb of mining ordnance through this rock mine-field? Granted, the target is only the size of a Denny’s… OH! Let’s add a ground assault through dense jungle with little to no air support. Never pass up an excuse to party “Ellen Ripley” style in an exo-suit. The plan looked awesome on power point, as one can see from the many unnecessary parts: a militarized space barge and a ground assault. The words “decisive,” “domain,” and “disruptive” probably appeared multiple times.

Yeah... this feels good. I'll sacrifice all my mobility to protect this lumbering militarized space barge.
Yeah… this feels good. We’ll sacrifice all our mobility to protect this lumbering militarized space barge. We look TOTALLY cool right now.

However, RDA had JUST blown up the Home Tree – a facility the size of a small city – using nothing but a token force of deadly and agile VTOL gunships. Not only was Operation Soul Tree against a far smaller and more fragile target – but it would be in a physically and electronically denied environment.  Why suddenly trade mobile lethality for for static defense on a flying dump truck? Why risk losing your entire ground force in a superfluous assault through dense jungle?  Seriously, how could this NOT go wrong?

Aurgh! A total disaster we could have NEVER predicted!
Noooooo! A total disaster we could have NEVER predicted!

Now, had the RDA forces learned the lesson of their own experience – they would have executed a multi-axis raid on the “Soul Tree” using a primary assault by gunships and a feint by a faux “bomber.” The ground assault would have been completely scrubbed.

Maintaining a “feint” – preferably using gunships and a transport on rudimentary auto-pilot – would draw enemy forces away from the actual angle of attack. The windows of the aircraft used for the feint would have to be blacked out. Recon for Airborne Pandoran forces would quickly discover that the cockpits were empty, and realize the bomber is a feint.

Detaching the primary aerial assault force from the  bomber would have allowed pilots speed and flexibility denied to them in the original plan to guard a militarized transport. With Pandoran forces distracted by the potential bombardment by the transport ship, the main assault force would move through the floating boulders at top speed, devastating the Soul Tree with their ordnance before quickly retreating back to base.

I love the smell of victory in the morning.
I love the smell of victory in the morning.

With the ground component completely scrubbed, the RDA would retain a significant force to continue defense of their facilities. While these bases are heavily defended already, these are static defenses that require augmentation from mobile components. It would be wise to keep some of the aerial component in reserve as well, in the off chance that Operation Soul Tree failed and human forces would have to hold out until military re-supply from Earth.

Of course, unlike in Operation Guard the Slow and Useless Target, we get to win this time.

Strategic Failure: That Escalated Quickly

Sooo... now that I randomly burned down all your homes just so I can dig under your tree, we're cool - right?
Sooo… now that I randomly burned down all your homes just so I can dig under your tree, we’re cool – right?

But let’s take a step back here – why did the RDA get to the point where it believed it had to commit all its forces to a winner-take-all assault on this Soul Tree network node? Oh, that’s right, they chose to burn down some blue people’s entire capital city.

Granted, the tree is sitting on top of an unobtanium stockpile critical to humanity’s survival… but this is the same human civilization that is capable of creating avatar meat-puppets that can be operated remotely to any location anywhere on this alien planet. Certainly, we can learn the ancient art of lateral drilling?

We can bring genetically engineered soldier suits trillions of miles through space - but can only dig like Gold-rush era miners.
We can bring genetically engineered soldier suits trillions of miles through space – but can only dig  like Gold-rush era miners.

The vast mining infrastructure operated by the RDA, and the automated technology available to it, would allow humanity some options OTHER than blowing a native city into oblivion to access the resources. It’s the future, surely there are automated mining units that aren’t the size of office buildings, or tunnel-boring machines that could serve this mission.

And let’s be real here – the outfit sent to collect all these resources is the “Resource Development Administration.” Mining should be their specialty.

Force Planning: Phoning it in

The mining technology angle leads us to a more general problem with the technology employed by the RDA. Considering the military and commercial operational needs, the capabilities developed from the technology available seem oddly under developed.

The lack of orbital strike capabilities is notable. From cracking open a large hole for mining to cracking open a target – the RDA would have found great use for an orbital weapon of some sort. It’s not like the mission’s importance to earth didn’t warrant the resources. They certainly had the technology for it. You could destroy ANY  tree you really felt necessary – and you wouldn’t have to risk any military forces. Hell, the Pandorans wouldn’t even know it was you. They don’t know how satellites work.

You came this far, with ALL this technology... and couldn't bring a space cannon?
You came this far, with ALL this technology… and couldn’t bring a space cannon?

More concerning is the lack of a real military application of the avatar technology the movie is named after. Sure, the modified blue people are a nice touch. Hearts and minds is always the better path then a tough military campaign in someone else’s backyard.

However, why settle for tall skinny blue people? Why not create a legion of 10 foot tall super-Cena ? You could add extra arms, camouflage skin, or even millions of tiny spider-like hairs for extra grip! Perhaps lower cost methods could be employed to save human personnel and maximize combat effectiveness, like making the combat exo-suits neural net operated. Perhaps remote neural control could operate the gunships… or even gunship swarms controlled by a single consciousness. In the movie Surrogates, the DoD was fighting wars with legions of brain-controlled robots… and they weren’t even advanced enough to land a mining operation in another solar system.

You can biologically engineer a whole new life-form that can be remotely controlled anywhere on the planet... and all you can make is REALLY tall blue people?
Why don’t we try this with 2-3 more feet in height, 5x the muscle mass, and 2 more arms for faster magazine change-outs, multiple melee and ranged weapon use, and better climbing abilities. Maybe the skin can be a color that blends in better with the environment. Really, we can do better than super-tall blue hipsters.

Hell, if the RDA had the ability to hack into the neurological network of a surrogate body remotely – why wasn’t anyone trying to tap into this planetary neural net? Imagine the processing capacity of a planet-sized biological computer, or the influence one could have on inter-tribal planetary politics with neural-net access. At the very least, the intelligence gathering potential would be invaluable for a force operating in a potential adversary’s backyard.

Conclusion: Insanity or Laziness

Humanity is in a tight spot – an energy crisis along with dwindling terrain resources mean that unobtanium is humanity’s only way out. Unfortunately, the RDA decision makers on Pandora has decided to phone it in.

You ask me for strategy? I offer you something better - a myopic pursuit of frontal assaults. I offer you the obsessions of a man who has clearly never seen the movie "Zulu" or read a Kipling poem, and has only been fighting wildlife for at least a decade.
You ask me for strategy? I offer you something better – a myopic pursuit of frontal assaults and kinetic effects. I offer you the obsession of a man who has clearly never seen the movie “Zulu” or read a Kipling poem. I assure you, though my experience in military operations was once great, I have done nothing but slowly go mad from the isolation and fight wildlife for at least a decade.

Perhaps it’s the cabin fever spending so much time away from civilization. Perhaps it’s the simplicity of mission requirements that involve fighting either animal opponents or blue people armed with sticks. Maybe it’s even the lack of good reading material. Whatever the case, those who were clearly once capable corporate, technical, and military leaders had long ago started slacking off – thinking down predictable or silly stovepipes in their execution of the Pandora mission. It makes a good case for regular leadership rotation. It pays to ensure one’s leadership does not become stale… or even lose their minds from isolation.

Whoever humanity sends to re-take Pandora – and capture the traitor, Jake Sully – will be a bit more on the ball.

We'll be back, hippies.
We’ll be back, hippies.

Matthew Hipple is the President of CIMSEC and host of our Sea Control and Real Time Strategy podcasts. He is also an active duty Surface Warfare Officer, whose opinions do not necessarily represent those of the Department of the Navy, the Department of Defense, or the Resource Development Administration.

[otw_shortcode_button href=”https://cimsec.org/buying-cimsec-war-bonds/18115″ size=”medium” icon_position=”right” shape=”round” color_class=”otw-blue”]Donate to CIMSEC![/otw_shortcode_button]

Piracy 2.0 : The Net-Centric Evolution

By Brian Evans

Network-Centric Warfare derives its power from the strong networking of a well-informed but geographically dispersed force. – VADM Arthur Cebrowski, Proceedings 1998

Almost twenty years ago the pages of Proceedings carried an article by RDML Cebrowski that introduced the concept of network-centric, or net-centric, warfare.[1] The concept transformed the manner in which the United States (U.S.) Navy operates and fights. The principles that defined net-centric warfare remain relevant as they support Navy’s current pillars of Information Dominance: Battlespace Awareness, Assured Command and Control (C2), and Integrated Fires. The success of net-centric warfare has not gone unnoticed. Navies around the world are working to develop their own net-centric solutions. As a result, the U.S. Navy should not be surprised when enterprising individuals around the world similarly take note and make the evolutionary leap from traditional piracy to net-centric piracy.

While piracy has been a scourge for the duration of human history, the technological advances of the 21st century provide potential pirates transformational means, methods and opportunities. While the world has yet to witness a case of net-centric piracy, the two scenarios below present possible piracy events leveraging today’s technology.

Basic Net-centric Piracy

Sixty-two nautical miles south east of Singapore – 17JUL15 1154C: An Indonesian pirate opens his laptop and logs onto the internet via satellite phone. His homepage is a commercial Automated Identification System (AIS) website providing real-time track data from coastal and satellite receivers.[2] The laptop, satellite phone and website subscription were all funded by his investors.[3] As he scans his homepage, he looks for AIS contacts that meet his desired vessel profile for cargo type, transportation firm, flag, and speed of advance. Today there are two AIS tracks of interest matching his profile and likely to pass through his preferred zone of operation, MV OCEAN HORIZONS and MW ORIENTAL DAWN. He then checks weather conditions and determining that they are favorable, he sends individual texts messages containing coordinate and track data for the AIS tracks of interest. The text recipients are two fishing boat captains, one located in Belawan, Indonesia and the other in Dungun, Malaysia.

Indonesian Pirates
From: The Maritime Executive – Indonesian Pirates

Forty-six nautical miles east of Belwan, Indonesia – 17JUL15 1646C: MV ORIENTAL DAWN passes a non-descript fishing boat 46 nautical miles off the coast of Indonesia. Unbeknownst to the crew of the MV ORIENTAL DAWN, this fishing boat is captained by the pirate’s associate from Belawan. The fishing boat’s captain discretely observes the passing vessel through a pair of high-powered binoculars. Seeing barbed wire along the railings and an individual on the ship’s deck that does not appear to be a member of the crew, the fishing boat captain utilizes a satellite phone to call and report his observations to his Indonesian pirate contact. Based on this information the Indonesian pirate determines that MV ORIENTAL DAWN is not a suitable target.

One-hundred seventeen nautical miles east of Singapore – 17JUL15 1707C: The Indonesian pirate receives a call. This time it is the fishing boat captain from Dungun. The captain reports that the MV OCEAN HORIZONS is loaded down creating a smaller freeboard and there does not appear to be any additional security measures present. Given this assessment, the Indonesian pirate decides that MV OCEAN HORIZONS is a target of opportunity. He immediately has the crew of his ship alter course.

Thirty-seven nautical miles east of Pekan, Malaysia – 18JUL15 0412C: The Indonesian pirate launches two high-speed skiffs from his ship, both carrying multiple armed personnel. The Indonesian pirate mothership remains over the horizon, but in radio contact while the skiffs conduct the remainder of the intercept.

Sixty-two nautical miles east of Pekan, Malaysia – 18JUL15 0642C: The armed personnel from the skiffs board MV OCEAN HORIZONS and catch the crew off guard. Once in control of the ship, they contact the Indonesian pirate via radio and report their success. The Indonesian pirate immediately opens his laptop and reports his success to his investors. He also lists the ship’s cargo for auction on a dark website and sends a ransom demand to the employer of the MV OCEAN HORIZON crew.

Sophisticated Net-centric Piracy     

Moscow, Russia – 17JUL15 0126D: After a series of all-nighters over the last week, a Russian hacker has gained access to a crewmember’s computer onboard the MV PACIFIC TREADER.[4] Using this access he maps the shipboard network. Discovering a diagnostic and maintenance laptop used for the ship’s automation and control system on the network, he quickly exploits the laptop’s outdated and unpatched operating system to install a tool on the automation and control system.[5] The tool enables a remote user to either trigger or disable a continual reboot condition. Once installed, the hacker posts the access information for the tool’s front end user interface in a private dark web chatroom.

Prague, Czech Republic – 16JUL15 2348A: Sitting in his Prague apartment, a pirate receives a message on his cellphone via a private dark web chatroom. The message is from one of several hackers he contracted to gain access to control or navigation systems onboard vessels operated by the TRANS-PACIFIC SHIPPING LINE. With the posted access information, he logs onto his laptop and tests his access into the MV PACIFIC TREADER automation and control system. After successfully establishing a connection he closes out of the tool and electronically transfers half of a contracted payment due to his hired hacker. Next using a commercial AIS website providing real-time track data from coastal and satellite receivers, he determines that MV PACIFIC TREADER is likely headed into port in Hong Kong.[6] Posting a message in a different private dark web chatroom, the pirate provides the identifying information for MV PACIFIC TREADER.

Hong Kong, China – 19JUL15 0306H: On a rooftop in Hong Kong, a young college student pulls an aerial drone out of her backpack. She bought it online and it is reportedly one of the quietest drones on the market. She also pulls three box-shaped objects out of her backpack. Hooking one of the objects to the drone, she launches it and flies it across Hong Kong harbor in the direction of a ship she identified during the day as the MV PACIFIC TREADER. Using the cover of darkness she lands the drone on the top of the pilot house and releases the object. Repeating this process twice more, she places the box shaped objects on other inconspicuous locations on the ship. After bagging up her drone, she posts a message to a dark web chatroom simply stating that her task is complete. Almost immediately afterwards she receives a notification that a deposit was made into her online bank account.

Prague, Czech Republic – 25JUL15 1732A: After eating a home-cooked meal, the pirate sits down at his laptop and checks the position of MV PACIFIC TREADER via the commercial AIS website he subscribes to. Observing that the MV PACIFIC TREADER is relatively isolated in the middle of the Pacific Ocean, he opens the remote tool that provides him access to the ship’s automation and control system. He sends a text message and then clicks to activate the tool.

Two-thousand ninety-three nautical miles north east of Hong Kong – 26JUL15 0332K: Onboard MV PACIFIC TREADER an explosion engulfs the bow of the ships sending flames into the dark air. Immediately, the ship’s engines roll to a stop as the navigation and ship’s control system computers go into a reboot cycle. The lone watchstander on the bridge is paralyzed to inaction by the surprise and violence of the events unfolding around him. The Master immediately comes to the bridge, completely confused by the events occurring onboard his ship.

Prague, Czech Republic – 25JUL15 1736A: The pirate confirms via his remote tool that the ship’s automation and control system is in a continuous reboot cycle, then he re-checks the commercial AIS website and confirms that MV PACIFIC TREADER is dead in the water. He immediately sends an email to the TRANS-PACIFIC SHIPPING LINE demanding a ransom, stating MV PACIFIC TREADER will remain dead in the water and more explosive devices will be activated until he is paid.

New Means – Same Motive

These scenarios illustrate how the evolution of technology and the increased connectivity of systems and people potentially enable a fundamental shift in the nature of piracy. Despite the change in means and geographic distribution of actors, net-centric and traditional piracy both utilize physical force or violence, or the threat thereof, by a non-state actor to seize or detain a vessel operating on the high seas. The key enabler of net-centric piracy is the Internet.

Piracy Hot Spots

The Internet is the net-centric pirate’s “high-performance information grid that provides a backplane for computing and communications.”[7] Admiral Cebrowski argued that this information grid was the entry fee for those seeking net-centric capabilities.[8] What Admiral Cebrowski did not know was how rapidly the Internet would evolve and enable near-instantaneous global communications at relatively low costs, allowing anyone who desires access to a high-performance information grid.

As the net-centric pirate’s high-performance information grid, the Internet serves as a command and control network as well as the means for disseminating intelligence information, such as vessel location or the presence of physical security measures. The intelligence that is disseminated may also have resulted from collections performed via the Internet. One collection means is to leverage the vast area of private and commercial data sources available for public consumption, again at little or no cost, such as shipping schedules and AIS data. A second means of collection uses the Internet to conduct intelligence, surveillance and reconnaissance (ISR) via cyber techniques; however, only the most sophisticated net-centric pirates will possess this capability. Similarly, highly sophisticated net-centric pirates may be able to achieve global weapons reach by producing physical effects via cyber means over the Internet, eliminating the need for the pirate to be physically present in order to seize or detain a vessel.

Somali Pirates
From: OCEANUSLive – Somali Pirates

The attractiveness of net-centric piracy is the low barrier to entry, both in risk and cost. Since the Internet is the key enabler of net-centric piracy, its low cost and ease of use vastly expand the potential pirate population. The anonymity of the Internet also allows potential net-centric pirates to meet, organize, coordinate and transfer monetary funds with a great degree of anonymity. As a result, the risks of arrest or capture are significantly reduced, especially since a net-centric pirate may not be able to identify any of their co-conspirators. Similarly, the ability of net-centric piracy to enable remote intelligence gathering or even produce physical effects via cyber techniques removes a significant element of physical risk associated with traditional piracy. The monetary gain from the successful capture of a vessel compared to the low cost and risk currently associated with net-centric piracy make it an attractive criminal enterprise.

Countering Net-centric Piracy

The United Nations Convention of the Law of the Sea (UNCLOS) Article 101 defines piracy as:

  1. any illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship or a private aircraft, and directed:
    • on the high seas, against another ship or aircraft, or against persons or property on board such ship or aircraft;
    • against a ship, aircraft, persons or property in a place outside the jurisdiction of any State;
  2. any act of voluntary participation in the operation of a ship or of an aircraft with knowledge of facts making it a pirate ship or aircraft;
  3. any act of inciting or of intentionally facilitating an act described in subparagraph (1) or (2).[9]

Under this internationally recognized legal definition of piracy, net-centric piracy clearly results in violence against or detention of vessels on the high seas for private ends. It is also clear from this definition that any activities associated with facilitating a piracy event, such as intelligence collection or compromising a vessel’s computerized control systems, are also considered piracy under international law. International law also states that “All States shall cooperate to the fullest possible extent in the repression of piracy on the high seas or in any other place outside the jurisdiction of any State.”[10] As a result, the international community must resolve how it will counter net-centric piracy, where pirates need not operate on the high seas and may be located thousands of miles from the target vessel.

The challenge facing the international community from net-centric piracy is compounded by immaturity of international cyber law. Currently the authorities and responsibilities of international organizations, governments and law enforcement agencies with regards to the use of the Internet to commit piracy are undetermined. This challenge is further complicated by the fact that the Internet is a manmade domain where all potions are essentially within the territory of one state or another. As a result, disrupting net-centric piracy operations will require a significant degree of international coordination and information sharing. Extensive international cooperation will also be required to identify, locate, and apprehend individuals involved in net-centric piracy.

Pirates
From: Encyclopedia Britannica – Pirates utilize a range of weapons and technology

While an occurrence of net-centric piracy has yet to occur, the opportunity and capabilities required for such an event exist today. The U.S. Navy should not be caught off guard. Instead, the Navy should take the following actions:

  • Raise awareness within the international maritime community regarding the risks and realities of net-centric piracy
  • Provide best practice and limited cybersecurity threat information to transnational maritime shipping companies
  • Work with partner Navies to develop means and methods for disrupting net-centric piracy, including developing an appropriate framework for information sharing and coordination
  • Work with Coast Guard, law enforcement and international partners to develop a cooperative construct for identifying, locating and apprehending net-centric pirates
  • Engage with the State Department to advance international dialog on net-centric piracy, including the need for consensus on international law and processes for prosecution of net-centric pirates

An enduring lesson of human history is that opportunity for profit, regardless of difficulty or brevity, will be exploited by someone somewhere. Net-centric piracy represents an opportunity to generate revenue without requiring the physical risks of traditional piracy. The anonymity and distributed nature of the cyber domain also creates new counter-piracy challenges. Add to this the low cost and availability of unmanned system components coupled with the low barrier of entry for cyber, and the question becomes not whether net-centric piracy will occur but when. With a global interest in maintaining the international maritime order and ensuring the uninterrupted flow of commerce on the high seas, the U.S. Navy must be ready to meet the challenges of net-centric piracy.

LCDR Brian Evans is a U.S. Navy Information Dominance Warfare Officer, a member of the Information Professional community, and a former Submarine Officer. He is a graduate of the U.S. Naval Academy and holds advanced degrees from Johns Hopkins University, Carnegie Mellon University, and the Naval War College. 

The views expressed in this article are those of the author and do not reflect the official policy or position of the United States Navy, Department of Defense or Government.

[1] VADM Arthur K. Cebrowski and John H. Garstka, “Network-Centric Warfare – Its Origin and Future,” U.S. Naval Institute Proceedings, Volume 124/1/1,139 (January 1998).

[2]https://www.vesseltracker.com/en/ProductDetails.html

[3] “Somali Piracy: More sophisticated than you thought,” The Economist (November 2nd, 2013), http://www.economist.com/news/middle-east-and-africa/21588942-new-study-reveals-how-somali-piracy-financed-more-sophisticated-you

[4] Jeremy Wagstaff, “All at sea: global shipping fleet exposed to hacking threat,” Reuters (April 23rd, 2014), http://www.reuters.com/article/2014/04/24/us-cybersecurity-shipping-idUSBREA3M20820140424

[5] Mate J. Csorba, Nicolai Husteli and Stig O. Johnsen, “Securing Your Control Systems,” U.S. Coast Guard Journal of Safety & Security at Sea: Proceedings of the Marine Safety & Security Council, Volume 71 Number 4 (Winter 2014-2015).

[6]https://www.vesseltracker.com/en/ProductDetails.html

[7] VADM Arthur K. Cebrowski and John H. Garstka, “Network-Centric Warfare – Its Origin and Future,” U.S. Naval Institute Proceedings, Volume 124/1/1,139 (January 1998).

[8] Ibid.

[9] United Nations, United Nations Convention on the Law of the Sea (New York: United Nations, Article 101, 1994).

[10] United Nations, United Nations Convention on the Law of the Sea (New York: United Nations, Article 100, 1994).

 

Operating in an Era of Persistent Unmanned Aerial Surveillance

By William Selby

In the year 2000, the United States military used Unmanned Aerial Systems (UASs) strictly for surveillance purposes and the global commercial UAS market was nascent. Today, the combination of countries exporting complex UAS technologies and an expanding commercial UAS market advances the spread of UAS technologies outside of U.S. government control. The propagation of this technology from both the commercial and military sectors will increase the risk of sophisticated UASs becoming available to any individual or group, regardless of their intent or financial resources. Current and future adversaries, including non-state actors, are likely to acquire and integrate UASs into their operations against U.S. forces. However, U.S. forces can reduce the advantages of abundant UAS capability by limiting the massing of resources and by conducting distributed operations with smaller maneuver elements.

Leveraging the Growth in the Commercial UAS Market

While armed UAS operations are only associated with the U.S., UK, and Israel, other countries with less restrictive export controls are independently developing their own armed UAS systems. Chinese companies continue to develop reconnaissance and armed UASs for export to emerging foreign markets. Earlier this year, social media reports identified a Chinese CH-3 after it crashed in Nigeria. Reports indicate China sold the system to the Nigerian government for use against Boko Haram. Other countries including Pakistan and Iran organically developed armed UAS capabilities, with claims of varying levels of credibility. In an effort to capitalize on the international UAS market and to build relationships with allies, the U.S. eased UAS export restrictions in early 2015 while announcing the sale of armed UASs to the Netherlands. Military UAS development is expected to be relatively limited, with less than 0.5 percent of expected future global defense spending slated to buying or developing military drones. For now, long range surveillance and attack UASs are likely to remain restricted to the few wealthy and technologically advanced countries that can afford the research costs, training, and logistical support associated with such systems. However, short range military or civilian UASs are likely to be acquired by non-state actors primarily for surveillance purposes.

Still captured from an ISIS documentary with footage shot from a UAS over the Iraqi city of Fallujah(nytimes.com)

Still captured from an ISIS documentary with footage shot from a UAS over the Iraqi city of Fallujah(nytimes.com)

Hamas, Hezbollah, Libyan militants, and ISIS are reportedly using commercial UASs to provide surveillance support for their military operations. Current models contain onboard GPS receivers for autonomous navigation and a video transmission or recording system that allows the operators to collect live video for a few thousand dollars or less. Small UASs, similar in size to the U.S. military’s Group 1 UASs, appeal to non-state actors for several reasons. Namely, they are inexpensive to acquire, can be easily purchased in the civilian market, and are simple to maintain. Some systems can be operated with very little assembly or training, which reduces the need for substantial technical knowledge and enables non-state actors to immediately integrate them into daily operations. These UASs are capable of targeting restricted areas as evidenced by the recent UAS activity near the White House, French nuclear power plants, and the Japanese Prime Minister’s roof. The small size and agility of these UASs allow them to evade traditional air defense systems yet specific counter UAS systems are beginning to show progress beyond the prototype phase.

Economic forecasters may dispute commercial UAS sales predictions, but most agree that this market is likely to see larger growth than the military market. Countries are currently attempting to attract emerging UAS businesses by developing UAS regulations that will integrate commercial UASs into their national airspace. The increase of hobby and commercial UAS use is likely to lead to significant investments in both hardware and software for these systems. Ultimately, this will result in a wider number of platforms with an increased number of capabilities available for purchase at a lower cost. Future systems are expected to come with obstacle avoidance systems, a wider variety of modular payloads, and extensive training support systems provided by a growing user community. Hybrid systems will address the payload, range, and endurance limitations of the current platforms by combining aspects of rotor and fixed wing aerial vehicles. The dual-use nature of these commercial systems will continue to be an issue. Google and Amazon are researching package delivery systems that can potentially be repurposed to carry hazardous materials. Thermal, infrared, and multispectral cameras used for precision agriculture can also provide non-state actors night-time surveillance and the ability to peer through limited camouflage. However, non-state actors will likely primarily use hobby and commercial grade platforms in an aerial surveillance role, since current payload limitations prevent the platforms from carrying a significant amount of hazardous material. 

Minimizing the Advantages of Non-State Actor’s UAS Surveillance

As these systems proliferate, even the most resource-limited adversaries are expected to have access to an aerial surveillance platform. Therefore, friendly operations must adapt in an environment of perceived ubiquitous surveillance. Despite the limited range and endurance of these small UASs, they are difficult to detect and track reliably. Therefore, one must assume the adversary is operating these systems if reporting indicates they possess them. Force protection measures and tactical level concepts of operations can be modified to limit the advantages of ever-present and multi-dimensional surveillance by the adversary. At the tactical level, utilizing smoke and terrain to mask movement and the use of camouflage nets or vegetation for concealment can be effective countermeasures. The principles of deception, stealth, and ambiguity will take on increasing importance as achieving any element of surprise will become far more difficult. 

The upcoming 3DR Solo UAS will feature autonomous flight and camera control with real time video streaming for $1,000 (3drobotics.com)
The upcoming 3DR Solo UAS will feature autonomous flight and camera control with real time video streaming for $1,000 (3drobotics.com)

At static locations such as forward operating bases or patrol bases, a high frequency of operations, including deception operations, can saturate the adversary’s intelligence collection and processing capabilities and disguise the intent of friendly movements. Additionally, massing strategic resources at static locations will incur increasing risk. In 2007 for example, insurgents used Google Earth imagery of British bases in Basra to improve the accuracy of mortar fire. The adversary will now have near real time geo-referenced video available which can be combined with GPS guided rockets, artillery, mortars and missiles to conduct rapid and accurate attacks. These attacks can be conducted with limited planning and resources, yet produce results similar to the 2012 attack at Camp Bastion which caused over $100 million in damages and resulted in the combat ineffectiveness of the AV-8B squadron.

In environments without the need for an enduring ground presence, distributed operations with smaller maneuver elements will reduce the chance of strategic losses while concurrently making it harder for the adversary to identify and track friendly forces. Interestingly, operational concepts developed by several of the services to assure access in the face of sophisticated anti-access/area denial threats can also minimalize the impact of the UAS surveillance capabilities of non-state actors. The Navy has the Distributed Lethality concept, the Air Force is testing the Rapid Raptor concept, and the Army’s is developing its Pacific Pathways concept. The Marine Corps is implementing its response, Expeditionary Force 21 (EF21), through several Special Purpose Marine Air Ground Task Forces.

The EF21 concept focuses on using high-speed aerial transport, such as the MV-22, to conduct dispersed operations with Company Landing Teams that are self-sufficient for up to a week.  In December 2013, 160 Marines flew over 3,400 miles in KC-130s and MV-22s from their base in Spain to Uganda in order to support the embassy evacuation in South Sudan, demonstrating the EF21 concept. Utilizing high speed and long-range transport allows friendly forces to stage outside of the adversary’s ground and aerial surveillance range. This prevents the adversary from observing any patterns that could allude to the mission of the friendly force and also limits exposure to UAS surveillance. Advances in digital communications, including VTCs and mesh-networks, can reduce the footprint of the command center making these smaller forces more flexible without reducing capabilities. The small size of these units also reduces their observable signatures and limits the ability of the adversary to target massed forces and resources.

Confronting the Approaching UAS Free-Rider Dilemma

Non-state actors capitalize on the ability to rapidly acquire and implement sophisticated technologies without having to invest directly in their development. These organizations did not pay to develop the Internet or reconnaissance satellites, yet they have Internet access to high-resolution images of the entire globe. It took years for the U.S. to develop the ability to live stream video from the Predator UAS but now anyone can purchase a hobby UAS that comes with the ability to live stream HD video to YouTube for immediate world-wide distribution. As the commercial market expands, so will the capabilities of these small UAS systems, democratizing UAS technology. Systems that cannot easily be imported, such as advanced communications relays, robust training pipelines, and sophisticated logistics infrastructure can now be automated and outsourced. This process will erode the air dominance that the U.S. enjoyed since WWII, now that commercial investments allow near peers to acquire key UAS technologies that approach U.S. UAS capabilities.

The next generation of advanced fighters may be the sophisticated unmanned vehicles envisioned by Navy Secretary Ray Maybus. However, other countries could choose a different route by sacrificing survivability for cheaper, smaller, and smarter UAS swarms that will directly benefit from commercial UAS investments. Regardless of the strategic direction military UASs take, commercial and hobby systems operating in an aerial surveillance role will remain an inexpensive force multiplier for non-state actors. Fortunately, the strategic concepts developed and implemented by the services to counter the proliferation of advanced anti-air and coastal defense systems can be leveraged to minimalize the impact of unmanned aerial surveillance by the adversary. Distributed operations limit the massing of resources vulnerable to UAS assisted targeting while long-range insertions of small maneuver elements reduces the exposure of friendly forces to UAS surveillance. Nation states and non-state actors will continue to benefit from technological advances without investing resources in their development, pushing U.S. forces to continually update operational concepts to limit the increasing capabilities of the adversary.

William Selby is a Marine officer who completed studies at the US Naval Academy and MIT researching robotics and unmanned systems. He previously served with 2nd Battalion, 9th Marines and is currently stationed in Washington, DC. Follow him @wilselby or www.wilselby.com 

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.
Select a Donation Option (USD)

Enter Donation Amount (USD)