Tag Archives: US Navy

OK, Explain Again Just Why the American Taxpayer Should Pay For All This (Series Finale)

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)

OK, Explain Again Just Why the American Taxpayer Should Pay For All This

This article, the sixth of the series, presents reasons why Congress and the American taxpayer should pay for all the drones, buoys, railguns and the additional necessary ships to deploy them at sea introduced earlier in the series. Some of the justifications briefly discussed below are sure to be familiar to the reader, some less so. In either event, please feel free to mentally rearrange them according to your own priorities. Read Part One, Part Two, Part Three, Part Four, Part Five

Expensive Assets

These are not inexpensive assets that can be squeezed into the Navy’s spending plans somehow. With a likely cost of $3 billion plus for the CVLN and CARN classes, less the cost of at least one, possibly two DDGs that a CARN replaces in a carrier task force and $2 billion plus cost for an AORH, Congress and the American taxpayer are going to have to be persuaded to purchase these as additional assets for the Navy. So why should they do so?

Deterrence

Adding large quantities of ISR and ASW drones along with a dozen, or more, railguns as a matter of routine will provide a credible defense against the increasing A2AD threat the Navy faces. Presenting a potential adversary with overwhelming force in a potential area of conflict is a time proven technique for preventing conflict and promoting dialogue. It should also be noted that while these additional assets are expensive, combined they are still less than half the construction cost of just the CVN being protected, much less the air wing embarked aboard.

Protection

For CVNs

Much of the surface warfare assets the Navy possesses are routinely dedicated to protecting other critical ship classes and their embarked sailors. The CVNs operating in their dedicated task forces normally find themselves free to go where they please given the protection against air, submarine and surface threats the surrounding ships provide. Adding a CVLN and a CARN to this operating procedure is simply adding to a proven recipe by countering the increasingly formidable A2AD assets other nations are steadily acquiring.

For amphibious assaults

The Marine Corp routinely catches a ride on an ARG provided by the Navy. Most of the time there is no need to provide the extra protection provided by the suggested new ship classes. Come the big moment though, both during the few days leading up to and then during an amphibious assault placing a CARN, an AORH and a Zumwalt class destroyer between the opposing forces ashore and the ARG can very substantially improve the chances of success and measurably lower the anticipated casualty rates amongst the Marines making the landing. By providing substantial ASW assets in the coastal waters involved, numerous ISR and target spotting assets from the AORH, formidable fire support abilities from the CARN and Zumwalt and substantial anti-missile, rocket or artillery shell protection courtesy of the twelve railguns the new ship classes will significantly improve the Navy’s ability to support an amphibious invasion. Plus the Marines making the ride ashore will be able to start from just over the horizon thanks to the presence of multiple targeting drones and railguns instead of the much discussed fifty mile seasick inducing slog currently anticipated.

Ally reassurance

Protecting the carrier strike groups also means reassuring our allies that we will be able to fulfill the defense commitments we have made, particularly in the Western Pacific. However, building and deploying the means to allow the fleet to go where it wants is a globally useful capability, allowing the U.S. to confidently assert it will be there in time of need.

Multi-polar world

We live in a multi-polar geopolitical structure. China, Russia, India, Europe, the Gulf States, Brazil and others already are jostling with the U.S. for influence and trade. Including a China who already is in some respects, and will remain our economic equal in world affairs. This economic equivalence is something the U.S. has not had to deal with since our enormous industrial expansion in the last three decades of the 19th Century. We need to refresh our thinking with some of the concepts that worked well for us as we dealt with Great Britain, the existing economic power back then.

That said being a rival is not the same as being an enemy. There certainly are many areas where the U.S. and China will find ways to cooperate to our mutual benefit. We are certain to jostle each other though, especially in China’s immediate area as that proud civilization looks to ‘put things right’ after their many difficulties of the last two centuries. As mentioned above, we want to deter everyone in the area from using violence to bring about change, instead encouraging patience while the various nations involved discover mutually acceptable adjustments via discussion.

Playing defense to maintain the world as it is

There are other issues that come with being in a multi-polar world. In the new global circumstances the U.S., and the Navy in particular, need to execute defense, and first things first, keep our ships afloat. Something we have not had to overly concern ourselves with since the demise of the Soviet Union or the destruction of the Imperial Japanese Navy in the 1940s. Increasingly we will no longer be able to exercise the freedom of the seas and engage in whatever activity we want, whenever we want to. Russia is already building a submarine and long-range bomber force to potentially contest our passage. Others, China in particular, will be able to invest steadily increasing resources in military assets that make sense for their geo-political situation. Investments that mean the U.S Navy may have to fight our way across the North Pacific or North Atlantic before we commence operations at the location of our choice.

Hawaii has to eat

Our geography as a nation includes Hawaii, control of which easily translates into the control of the bulk of the Pacific Ocean. Yet Hawaii is a series of islands, thousands of miles from the mainland with a population of 1.4 million. Again, the change to a multi-polar world means we have to give thought to just how we can ensure the population on the islands can eat when trouble arrives. Russia already has the submarine assets needed to threaten mining or torpedoing ships crossing the North Pacific. Obviously the naval assets based at Pearl Harbor and the West Coast should be able to prevent that. However, we can no longer just take it for granted. The Navy needs to consciously add this to its long list of missions to accomplish.

The same issues apply to Guam, though the much smaller population can be fed by air if necessary, which means the mission is more one of being able to get our needed fuel and ammunition supplies delivered. Once more, the local air and naval forces should be able to ensure it happens. This is an area where the rise in China’s capabilities means we cannot take free passage for granted there either.

Maritime Commons

Protecting the global commons to ensure free passage of American trade was one of the primary reasons the U.S navy was originally built in the 18th Century. The need, a global need in the 21st Century, continues unabated.

Blockade

Occasionally over the years the U.S. has chosen to impose a blockade during a dispute. This is a capability, or more importantly for our relationship with China, a potential capability that we need to maintain. And the world needs to be reminded of on occasion.

Protection

As many others have noted over the last few years, a British citizen in the 19th Century could travel the world secure in the realization that the local government, regardless of whether it got along well with London or not, was not going to antagonize Britain by harming, or allowing to be harmed, the traveling Brit. A benefit that transferred to American citizens as a result of our overwhelming victory in 1945.

Unfortunately, in growing numbers of places in the world this benefit no longer exists due to the inability of many local governments to provide law and order within their borders for anyone, much less wandering Americans. This means that the U.S. Navy and Marine Corp have to face the reality that just as in the ‘olden days’ of the 18th and 19th Centuries, they are on call to provide basic protection to Americans all across the globe.

Rescue

The need for the Navy and Marine Corp to provide rescue service as needed has never gone away. And given the monotonous regularity of severe weather events, civil disturbances and the endless list of troubles that arise, this is certainly not going to change.

AORH uses

The AORH class suggested earlier in this series of articles was quite consciously designed to be capable of taking on some of the responsibilities, new and old, mentioned above. First among these was to be flagship capable, coupled with the resupply abilities and the substantial ASW and special forces capabilities built into the design.

These abilities are capable of being useful undertaking missions beyond the obvious applications in the Gulf, South China Sea and Northeast Asia. In addition, an ice-strengthened version of an AORH is very well suited to leading a small task force of frigates on ASW duty in the Arctic. It can also be used as the centerpiece for an old-fashioned hunter killer group prosecuting submarines or to provide transoceanic convoy protection in either the North Pacific or North Atlantic.

Current Political Impasse

As for the likelihood of persuading the current Congress to pay for this the Navy needs to be frank. The additional spending being asked for here are additional dollars for additional capabilities. Beyond some small incremental steps, most of the needed dollars will not fit inside the spending limits in place over the next few years. It is intended as a long term plan, to be funded as a recovering economy allows, with the big ticket items being built starting in the 202os and extending into the late 2030s.

For the economy is slowly growing and just as importantly the deficit is in notable decline. There are multiple reasons for this and there is good reason to believe they will continue to positively impact the deficit. A growing economy, the impact fracking is having on energy production, the beginning of the return of some manufacturing to North America from China due to higher wages there, the fact that Medicare costs are much less onerous than forecast five years ago, Obamacare is not costing nearly as much as feared when it was passed, and ending the Bush-era tax cuts are having a real impact on the actual deficit as well as on the, far larger, feared one.

So the enormous fear factor that was driving the deficit reduction hawks back in 2010/11 is in the process of dissipating, being replaced with some truly old-fashioned value driven politics. It is important to note that the Republic has been down this road before. After both the Revolutionary War and the Civil War Congress chose to slowly bring down an enormous deficit by running small annual surpluses. In essence, some variation of this strategy, regardless of how fiercely you espouse the ‘value’ part of balanced budgets, is what we are going to have to do as we deal with the left over Cold War debt and the enormous additional debt load piled on post 9/11 and due to the Great Recession.

Die Hard Yankee Frugality

Or depending on one’s viewpoint, good old-fashioned small town frugality, skinflints, True Blue small town values defending America from corrupt Big City mentalities, etc. The reader should feel free at this point to insert the variation(s) he hears most often where he lives. This cultural attribute came to the New World with the Pilgrims and remains a vigorous part of American culture. It has not, and will not be, departing from our political discussions. Or budgeting decisions.

So, how should we address those who hold this belief? In my experience, when trying to influence or alter decisions made by those operating from this position, argument and persuasion can work. If. Actually two ifs. Big ones. First a resolution to the revenue versus budget issue forcing hard choices has to be visible to the individual you are working with. And it is they that have to see it; regardless of how obvious it is to you, they are the ones that have to see, understand and agree. Then you need a plan dealing with anticipated results and consequences that you can clearly articulate, including how you will execute the plan, deal with the known potential problems and be convincing about being able to complete the task on time and most importantly, within the agreed upon budget.

Mid-America Teary-Eyed Balanced Budget Goodness

Across much of interior America another strong cultural value, the Intrinsic Goodness of Balancing Your Budget also accompanied some of the earliest English settlers of North America. Over the centuries this value has also been passed on to succeeding generations over family dinner tables, political discussions at the local diner or at the town’s barbershop. The at times teary-eyed value some of it’s current believers place in it can be almost moving to observe by someone who considers it merely another number. Plus, minus or zero each have meaning, yet no particular cultural Goodness.

To the True Believers amongst us it constitutes one of life’s bedrock values though. And it is not departing the American political scene either. Which means it will strongly impact budgeting issues far into the future as well.

However, unlike those professing Yankee Frugality, True Believers are virtually impervious to discussion and argument. Sometimes they will patiently listen to you and your points, still no matter how cogent and persuasive one might be, True Believers, once they start their decision making process, will cycle back and check your argument against various values and beliefs they hold. And if they find your argument in conflict with one of their values, for the purposes of this article, the Intrinsic Goodness of Balancing Your Budget, your suggested plan will be rejected.

Any additional information you might provide tends to ultimately provoke something along the line of this real life quote. “You are just trying to confuse me with facts,” responded one individual a few years ago. Global warming was the topic that day rather than the budget and the end result was, “I have my faith (in the rightness of their belief – not really a conclusion, a belief) and I will not change my position.”

This attribute is very much in play when discussing the current budget situation. Unfortunately it is, in my experience anyway, impervious to analysis and discussion. All those carefully honed arguments and points of persuasion potentially useful when speaking with those convinced of the value of frugality will only be considered by True Believers after the budget is balanced. Maybe.

Their faith in the correctness of the uttermost value of balanced budgets can be trumped by another value however. Not by many though, as it ranks high in their pantheon. Historically of course the value to use was the need for defense. Whether national defense from other nations, personal defense against crime or terrorism or preserving orderly and lawful procedures when discussing social issues, over the decades this has proven an effective approach.

Unfortunately the current spending debate has been embroiled in the revolt of a significant number of voters, primarily though not entirely, conservative Republicans, over the blatant abuse of this trump value during the second Bush administration. Vice President Cheney was incorrect when he claimed there were no electoral consequences to running vast deficits. There are, both economic and political, a truth that is not going away.

A significant portion of their political base could, and did for a while, accept the national defense against terrorism argument after 9/11. However subsequent failures to control Federal spending, under a Republican President, Senate and House no less infuriated them. Fury then became something close to horror after the Salomon Brothers debacle unleashed a need for massive federal deficits to restore the economy.

So after years of serious abuse of the national defense trump value, its use with those who fervently believe in the Intrinsic Goodness of Balancing Your Budget has been heavily invalidated. For a significant portion of the American electorate the call for a return to this basic value remains a hot button issue. It is five years on from the revolt that took place in 2010 and the fury and horror seem to have been replaced with a grim resolve to never allow spending to run out of control again. And balance the budget.

This implies, barring a serious political change in the House in a future election year, we may well have to wait for the sanctified day when the Federal government takes in more revenue than it spends before any substantive increases in spending, or allocations for substantial new abilities for the U.S. Navy can be expected.

In all likelihood this means it will not be until sometime in the 2020s before much of what has been suggested in terms of shipbuilding, i.e. the new AORH, CVLN and CARN class ships and large quantities of the associated drones and buoys, can obtain the political support needed for the substantial sums needed.

Count Our Blessings

It is always useful to Count Your Blessings though. The bulk of the resistance in Congress is to additional spending, with no more than the usual amount of Congressional meddling in the details of departmental, including DOD, spending. Just figure out a way to get things done within the dollar amount allotted is a frequently expressed desire by many in the House.

Nor is there any value based or carefully analyzed opposition to new equipment programs from any of the services. So while the suggested ship classes and drones will provoke a fierce defense of spending limits, there is no reason to anticipate Congressional opposition to the new equipment if the Navy develops a coherent plan including them. As suggested above in all probability the big items will not be affordable until sometime in the 2020s, nonetheless if the items are part of a long term acquisition plan it will merely be a question of waiting for funds to become available rather than overcoming fierce opposition to the plans and equipment.

So have a long-term plan in place

This means the U.S. Navy needs to have that forward looking plan in hand, constantly being updated as various improvements in doctrine, sensors and drones are developed. And be ready when additional funds become available, rice bowl pointed upwards as the saying goes. Whether the motivation to Congress is a perceived problem somewhere across the globe, the occasional Congressional compromise over something or other that includes extra funds for some department, a call for ‘shovel ready’ projects when recessions hit, or the slippery processes of logrolling; having a plan in place will allow the extra funds to be applied far more beneficially to the Navy’s, and the countries, benefit than a haphazard purchase of a few more of this and that.

Honor the Premise

In the end though, funding for the U.S. Navy, and all other Federal government departments, is only going to grow as fast as the economy. Which will happen, meaning any plan including the suggestions made in this series of articles will have to be implemented over a period of many years. Into the late 2030s or mid-2040s before the last of nine ship CARN build for instance. The early 2030s for eleven AORHs and the same for a six ship CVLN build are also reasonable build out expectations at this point.

Clearly the time to start to work on such a plan is now.

Jan Musil is a Vietnam era Navy veteran, disenchanted ex-corporate middle manager and long time entrepreneur currently working as an author of science fiction novels. He is also a long-standing student of navies in general, post-1930 ship construction thinking, design hopes versus actual results and fleet composition debates of the twentieth century.

Enter the SCAGTF: Combined Distributed Maritime Ops

By Nicolas di Leonardo

SURFACE * CYBER * AIR * GROUND * TASK FORCE

 “…The supreme art of war is to subdue the enemy without fighting.” –Sun Tzu, The Art of War 

Six Phases of Warfare
Source: JP 3-0

In modern parlance, winning without fighting is accomplished in Phases 0 and 1 of a campaign.  China is seeking to achieve a Phase 0-1 victory in the Pacific through its acquisition / deployment of Anti-Access Area Denial (A2AD) weaponry and economic / military coercion of its peripheral neighbors. When the two are coupled, US operational and diplomatic freedom of maneuver becomes severely constrained, and decisive counter-strategy is required.

Historically, the US has attempted to counter each of China’s weapon systems / diplomatic moves individually without attacking its overall strategy.  When new Chinese weapons systems are deployed, new American countermeasures are fielded.  When China builds new islands where disputed sandbars and reefs once existed, the US flies freedom of navigation sorties overhead.  When individual South East Asian countries are coerced by China to abandon multilateral UNCLOS negotiations and sign bilateral agreements, the US reaffirms support of multilateralism.  The American strategy demonstrates

Source: InformationDissemination.net
Source: InformationDissemination.net

resolve and intent, but does little to shape the environment, and deter the near peer competitorIt plays like a precipitated withdraw and ceding of the South China Sea to China—a stunning admission that there is seemingly little that the US can do when faced with the Chinese dominated political-economic landscape on one hand and a potential naval – air war of attrition on the other. 

The potential Chinese A2AD environment is particularly daunting for the US Pacific Fleet.  Chinese forces could elect to deploy their anti-surface / land attack ballistic and cruise missiles to keep American carriers outside of the 9-Dash Line; disable reconnaissance satellites; jam communications necessary for secure / centralized command & control; threaten to overwhelm remaining forces with vast numbers of aircraft while using the majority of their ships and submarines to counter the US asymmetric advantage in undersea warfare. By asymmetrically threatening American Navy “kill chains”, and especially by holding its naval center of gravity—the CVNs—at risk, the Chinese can effectively turn the American critical strength into a critical vulnerability.  The US cannot afford to lose even one CVN and thus when confronted with the threat of a paralyzing strike against its Pacific CVNs followed by an attrition war, it is prudent to assume that the US would not risk the losses and would exit the battlespace. A potential de-facto Chinese victory in Phases 0-2 could thus be achieved without a decisive Mahanian sea battle–just a credible threat.

Solution sets to countering Chinese A2AD Phase O-2 victory are under development from multiple sources—US  Naval Surface Forces (Distributed Lethality); Marine Corps Combat Development Command (Distributed STOVL [F-35B] Operations); US Marine Corps Advanced Studies Program (Engagement Pull).  All have one thing in common: strategic distribution of mobile offensive power to hold China’s freedom of maneuver in the South China Sea at risk, and inhibit their sea control over key sea lines of communication (SLOC). These solution sets represent a significant evolution in the strategic thought surrounding the US pivot to the Pacific:  attacking China’s strategy vs countering its individual asymmetric capabilities.

In Distributed Maritime Operations: Back to the Future, Dr. Benjamin Jensen states that

“…integrating land and naval forces as a ‘fleet in being’ denying adversary sea control is at the core of the emerging distributed maritime operations paradigm.” 

The defining of the pieces parts and the organizational construct of this paradigm is at the heart of the matter.  General Al Gray, USMC (ret) and Lt. General George Flynn, USMC (ret) recently presented at the Potomac Institute their thoughts on Sea Control and Power Projection within the context of The Single Naval Battle.  In their vision, the forces would include:

To this list I would add tactical level cyber capabilities.

Forces engaged in these missions will likely operate in near proximity to each other and in joint / combined operations, as the American, Australian, New Zealand and British sea, air and land forces of Guadalcanal did.  They will be required to pose sufficient threat to Chinese forces without significant reinforcement due to anticipated Chinese A2AD.  The inter-complexity of their likely combined Sea, Cyber, Air, Ground operations dictates that their task force command and control should not be ad-hoc, but must be defined well in advance to allow for the emergence, experimentation and exercising of command knowledge, skills, abilities and tactics / doctrine. US and allied lack of exercising joint/ combined, multi-domain operations prior to Guadalcanal led to tactics and command and control (C2) doctrine being written in blood.  This lack of foresight should not be repeated.

A SCAGTF construct allows for the US to shape the environment with its allies, deter the [Chinese], and if necessary to seize the initiative, buying time for the massing of forces to dominate the battlespace.  The SCAGTF is one way to integrate the great ideas of our best strategists on distributed maritime operations into a single, flexible organizational structure that is capable of mobile, simultaneous combined / joint multi-domain operations in all phases of warfare.  Such a force could aid the US in reversing its Pacific fortunes, in reinforcing multilateral peace and security for the region, and ultimately in realizing Sun Tzu’s bloodless victory.

Nicolas di Leonardo is a graduate student of the US Naval War College.  The views expressed here are his own and do not necessarily reflect those of the War College or the United States Navy.

Piracy 2.0 : The Net-Centric Evolution

By Brian Evans

Network-Centric Warfare derives its power from the strong networking of a well-informed but geographically dispersed force. – VADM Arthur Cebrowski, Proceedings 1998

Almost twenty years ago the pages of Proceedings carried an article by RDML Cebrowski that introduced the concept of network-centric, or net-centric, warfare.[1] The concept transformed the manner in which the United States (U.S.) Navy operates and fights. The principles that defined net-centric warfare remain relevant as they support Navy’s current pillars of Information Dominance: Battlespace Awareness, Assured Command and Control (C2), and Integrated Fires. The success of net-centric warfare has not gone unnoticed. Navies around the world are working to develop their own net-centric solutions. As a result, the U.S. Navy should not be surprised when enterprising individuals around the world similarly take note and make the evolutionary leap from traditional piracy to net-centric piracy.

While piracy has been a scourge for the duration of human history, the technological advances of the 21st century provide potential pirates transformational means, methods and opportunities. While the world has yet to witness a case of net-centric piracy, the two scenarios below present possible piracy events leveraging today’s technology.

Basic Net-centric Piracy

Sixty-two nautical miles south east of Singapore – 17JUL15 1154C: An Indonesian pirate opens his laptop and logs onto the internet via satellite phone. His homepage is a commercial Automated Identification System (AIS) website providing real-time track data from coastal and satellite receivers.[2] The laptop, satellite phone and website subscription were all funded by his investors.[3] As he scans his homepage, he looks for AIS contacts that meet his desired vessel profile for cargo type, transportation firm, flag, and speed of advance. Today there are two AIS tracks of interest matching his profile and likely to pass through his preferred zone of operation, MV OCEAN HORIZONS and MW ORIENTAL DAWN. He then checks weather conditions and determining that they are favorable, he sends individual texts messages containing coordinate and track data for the AIS tracks of interest. The text recipients are two fishing boat captains, one located in Belawan, Indonesia and the other in Dungun, Malaysia.

Indonesian Pirates
From: The Maritime Executive – Indonesian Pirates

Forty-six nautical miles east of Belwan, Indonesia – 17JUL15 1646C: MV ORIENTAL DAWN passes a non-descript fishing boat 46 nautical miles off the coast of Indonesia. Unbeknownst to the crew of the MV ORIENTAL DAWN, this fishing boat is captained by the pirate’s associate from Belawan. The fishing boat’s captain discretely observes the passing vessel through a pair of high-powered binoculars. Seeing barbed wire along the railings and an individual on the ship’s deck that does not appear to be a member of the crew, the fishing boat captain utilizes a satellite phone to call and report his observations to his Indonesian pirate contact. Based on this information the Indonesian pirate determines that MV ORIENTAL DAWN is not a suitable target.

One-hundred seventeen nautical miles east of Singapore – 17JUL15 1707C: The Indonesian pirate receives a call. This time it is the fishing boat captain from Dungun. The captain reports that the MV OCEAN HORIZONS is loaded down creating a smaller freeboard and there does not appear to be any additional security measures present. Given this assessment, the Indonesian pirate decides that MV OCEAN HORIZONS is a target of opportunity. He immediately has the crew of his ship alter course.

Thirty-seven nautical miles east of Pekan, Malaysia – 18JUL15 0412C: The Indonesian pirate launches two high-speed skiffs from his ship, both carrying multiple armed personnel. The Indonesian pirate mothership remains over the horizon, but in radio contact while the skiffs conduct the remainder of the intercept.

Sixty-two nautical miles east of Pekan, Malaysia – 18JUL15 0642C: The armed personnel from the skiffs board MV OCEAN HORIZONS and catch the crew off guard. Once in control of the ship, they contact the Indonesian pirate via radio and report their success. The Indonesian pirate immediately opens his laptop and reports his success to his investors. He also lists the ship’s cargo for auction on a dark website and sends a ransom demand to the employer of the MV OCEAN HORIZON crew.

Sophisticated Net-centric Piracy     

Moscow, Russia – 17JUL15 0126D: After a series of all-nighters over the last week, a Russian hacker has gained access to a crewmember’s computer onboard the MV PACIFIC TREADER.[4] Using this access he maps the shipboard network. Discovering a diagnostic and maintenance laptop used for the ship’s automation and control system on the network, he quickly exploits the laptop’s outdated and unpatched operating system to install a tool on the automation and control system.[5] The tool enables a remote user to either trigger or disable a continual reboot condition. Once installed, the hacker posts the access information for the tool’s front end user interface in a private dark web chatroom.

Prague, Czech Republic – 16JUL15 2348A: Sitting in his Prague apartment, a pirate receives a message on his cellphone via a private dark web chatroom. The message is from one of several hackers he contracted to gain access to control or navigation systems onboard vessels operated by the TRANS-PACIFIC SHIPPING LINE. With the posted access information, he logs onto his laptop and tests his access into the MV PACIFIC TREADER automation and control system. After successfully establishing a connection he closes out of the tool and electronically transfers half of a contracted payment due to his hired hacker. Next using a commercial AIS website providing real-time track data from coastal and satellite receivers, he determines that MV PACIFIC TREADER is likely headed into port in Hong Kong.[6] Posting a message in a different private dark web chatroom, the pirate provides the identifying information for MV PACIFIC TREADER.

Hong Kong, China – 19JUL15 0306H: On a rooftop in Hong Kong, a young college student pulls an aerial drone out of her backpack. She bought it online and it is reportedly one of the quietest drones on the market. She also pulls three box-shaped objects out of her backpack. Hooking one of the objects to the drone, she launches it and flies it across Hong Kong harbor in the direction of a ship she identified during the day as the MV PACIFIC TREADER. Using the cover of darkness she lands the drone on the top of the pilot house and releases the object. Repeating this process twice more, she places the box shaped objects on other inconspicuous locations on the ship. After bagging up her drone, she posts a message to a dark web chatroom simply stating that her task is complete. Almost immediately afterwards she receives a notification that a deposit was made into her online bank account.

Prague, Czech Republic – 25JUL15 1732A: After eating a home-cooked meal, the pirate sits down at his laptop and checks the position of MV PACIFIC TREADER via the commercial AIS website he subscribes to. Observing that the MV PACIFIC TREADER is relatively isolated in the middle of the Pacific Ocean, he opens the remote tool that provides him access to the ship’s automation and control system. He sends a text message and then clicks to activate the tool.

Two-thousand ninety-three nautical miles north east of Hong Kong – 26JUL15 0332K: Onboard MV PACIFIC TREADER an explosion engulfs the bow of the ships sending flames into the dark air. Immediately, the ship’s engines roll to a stop as the navigation and ship’s control system computers go into a reboot cycle. The lone watchstander on the bridge is paralyzed to inaction by the surprise and violence of the events unfolding around him. The Master immediately comes to the bridge, completely confused by the events occurring onboard his ship.

Prague, Czech Republic – 25JUL15 1736A: The pirate confirms via his remote tool that the ship’s automation and control system is in a continuous reboot cycle, then he re-checks the commercial AIS website and confirms that MV PACIFIC TREADER is dead in the water. He immediately sends an email to the TRANS-PACIFIC SHIPPING LINE demanding a ransom, stating MV PACIFIC TREADER will remain dead in the water and more explosive devices will be activated until he is paid.

New Means – Same Motive

These scenarios illustrate how the evolution of technology and the increased connectivity of systems and people potentially enable a fundamental shift in the nature of piracy. Despite the change in means and geographic distribution of actors, net-centric and traditional piracy both utilize physical force or violence, or the threat thereof, by a non-state actor to seize or detain a vessel operating on the high seas. The key enabler of net-centric piracy is the Internet.

Piracy Hot Spots

The Internet is the net-centric pirate’s “high-performance information grid that provides a backplane for computing and communications.”[7] Admiral Cebrowski argued that this information grid was the entry fee for those seeking net-centric capabilities.[8] What Admiral Cebrowski did not know was how rapidly the Internet would evolve and enable near-instantaneous global communications at relatively low costs, allowing anyone who desires access to a high-performance information grid.

As the net-centric pirate’s high-performance information grid, the Internet serves as a command and control network as well as the means for disseminating intelligence information, such as vessel location or the presence of physical security measures. The intelligence that is disseminated may also have resulted from collections performed via the Internet. One collection means is to leverage the vast area of private and commercial data sources available for public consumption, again at little or no cost, such as shipping schedules and AIS data. A second means of collection uses the Internet to conduct intelligence, surveillance and reconnaissance (ISR) via cyber techniques; however, only the most sophisticated net-centric pirates will possess this capability. Similarly, highly sophisticated net-centric pirates may be able to achieve global weapons reach by producing physical effects via cyber means over the Internet, eliminating the need for the pirate to be physically present in order to seize or detain a vessel.

Somali Pirates
From: OCEANUSLive – Somali Pirates

The attractiveness of net-centric piracy is the low barrier to entry, both in risk and cost. Since the Internet is the key enabler of net-centric piracy, its low cost and ease of use vastly expand the potential pirate population. The anonymity of the Internet also allows potential net-centric pirates to meet, organize, coordinate and transfer monetary funds with a great degree of anonymity. As a result, the risks of arrest or capture are significantly reduced, especially since a net-centric pirate may not be able to identify any of their co-conspirators. Similarly, the ability of net-centric piracy to enable remote intelligence gathering or even produce physical effects via cyber techniques removes a significant element of physical risk associated with traditional piracy. The monetary gain from the successful capture of a vessel compared to the low cost and risk currently associated with net-centric piracy make it an attractive criminal enterprise.

Countering Net-centric Piracy

The United Nations Convention of the Law of the Sea (UNCLOS) Article 101 defines piracy as:

  1. any illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship or a private aircraft, and directed:
    • on the high seas, against another ship or aircraft, or against persons or property on board such ship or aircraft;
    • against a ship, aircraft, persons or property in a place outside the jurisdiction of any State;
  2. any act of voluntary participation in the operation of a ship or of an aircraft with knowledge of facts making it a pirate ship or aircraft;
  3. any act of inciting or of intentionally facilitating an act described in subparagraph (1) or (2).[9]

Under this internationally recognized legal definition of piracy, net-centric piracy clearly results in violence against or detention of vessels on the high seas for private ends. It is also clear from this definition that any activities associated with facilitating a piracy event, such as intelligence collection or compromising a vessel’s computerized control systems, are also considered piracy under international law. International law also states that “All States shall cooperate to the fullest possible extent in the repression of piracy on the high seas or in any other place outside the jurisdiction of any State.”[10] As a result, the international community must resolve how it will counter net-centric piracy, where pirates need not operate on the high seas and may be located thousands of miles from the target vessel.

The challenge facing the international community from net-centric piracy is compounded by immaturity of international cyber law. Currently the authorities and responsibilities of international organizations, governments and law enforcement agencies with regards to the use of the Internet to commit piracy are undetermined. This challenge is further complicated by the fact that the Internet is a manmade domain where all potions are essentially within the territory of one state or another. As a result, disrupting net-centric piracy operations will require a significant degree of international coordination and information sharing. Extensive international cooperation will also be required to identify, locate, and apprehend individuals involved in net-centric piracy.

Pirates
From: Encyclopedia Britannica – Pirates utilize a range of weapons and technology

While an occurrence of net-centric piracy has yet to occur, the opportunity and capabilities required for such an event exist today. The U.S. Navy should not be caught off guard. Instead, the Navy should take the following actions:

  • Raise awareness within the international maritime community regarding the risks and realities of net-centric piracy
  • Provide best practice and limited cybersecurity threat information to transnational maritime shipping companies
  • Work with partner Navies to develop means and methods for disrupting net-centric piracy, including developing an appropriate framework for information sharing and coordination
  • Work with Coast Guard, law enforcement and international partners to develop a cooperative construct for identifying, locating and apprehending net-centric pirates
  • Engage with the State Department to advance international dialog on net-centric piracy, including the need for consensus on international law and processes for prosecution of net-centric pirates

An enduring lesson of human history is that opportunity for profit, regardless of difficulty or brevity, will be exploited by someone somewhere. Net-centric piracy represents an opportunity to generate revenue without requiring the physical risks of traditional piracy. The anonymity and distributed nature of the cyber domain also creates new counter-piracy challenges. Add to this the low cost and availability of unmanned system components coupled with the low barrier of entry for cyber, and the question becomes not whether net-centric piracy will occur but when. With a global interest in maintaining the international maritime order and ensuring the uninterrupted flow of commerce on the high seas, the U.S. Navy must be ready to meet the challenges of net-centric piracy.

LCDR Brian Evans is a U.S. Navy Information Dominance Warfare Officer, a member of the Information Professional community, and a former Submarine Officer. He is a graduate of the U.S. Naval Academy and holds advanced degrees from Johns Hopkins University, Carnegie Mellon University, and the Naval War College. 

The views expressed in this article are those of the author and do not reflect the official policy or position of the United States Navy, Department of Defense or Government.

[1] VADM Arthur K. Cebrowski and John H. Garstka, “Network-Centric Warfare – Its Origin and Future,” U.S. Naval Institute Proceedings, Volume 124/1/1,139 (January 1998).

[2]https://www.vesseltracker.com/en/ProductDetails.html

[3] “Somali Piracy: More sophisticated than you thought,” The Economist (November 2nd, 2013), http://www.economist.com/news/middle-east-and-africa/21588942-new-study-reveals-how-somali-piracy-financed-more-sophisticated-you

[4] Jeremy Wagstaff, “All at sea: global shipping fleet exposed to hacking threat,” Reuters (April 23rd, 2014), http://www.reuters.com/article/2014/04/24/us-cybersecurity-shipping-idUSBREA3M20820140424

[5] Mate J. Csorba, Nicolai Husteli and Stig O. Johnsen, “Securing Your Control Systems,” U.S. Coast Guard Journal of Safety & Security at Sea: Proceedings of the Marine Safety & Security Council, Volume 71 Number 4 (Winter 2014-2015).

[6]https://www.vesseltracker.com/en/ProductDetails.html

[7] VADM Arthur K. Cebrowski and John H. Garstka, “Network-Centric Warfare – Its Origin and Future,” U.S. Naval Institute Proceedings, Volume 124/1/1,139 (January 1998).

[8] Ibid.

[9] United Nations, United Nations Convention on the Law of the Sea (New York: United Nations, Article 101, 1994).

[10] United Nations, United Nations Convention on the Law of the Sea (New York: United Nations, Article 100, 1994).

 

Where is the U.S. Navy Going To Put Them All? (Part Three)

Where is the U.S. Navy Going To Put Them All?

Part 3: Two New Ship Classes.

Sketch by Jan Musil. Hand drawn on quarter-inch graph paper. Each square equals twenty by twenty feet.

This article, the third of the series, presents two ship classes that can be used to take to sea the various UAVs, UUVs and buoys suggested in the previous two articles. These ships can provide the space needed to operate, maintain and hangar the equipment as well as house the necessary sailors. Read Part One, Part Two.

The first class, the CVLN (carrier aviation light, nuclear powered), is intended to operate with the two main carrier task forces, providing a home for the many ISR drones, UUVs, UAVs and buoys needed in the increasingly dangerous A2AD environment and to prosecute ASW. The second suggested class, the AORH (auxiliary oiler replenishment helicopter), is intentionally designed to routinely operate far from a CSG, frequently in association with either allied or local navies. The AORH is expressly designed to carry out a wide variety of missions with substantially lower initial construction costs and lower lifetime operating costs.

CVLN class

The intent of the CVLN class is to provide a deep blue sea platform that can operate, in fact come to be seen as needed to operate, with the two primary carrier task forces the U.S. Navy operates. Currently these task forces are almost always on station in the Western Pacific or the Gulf region. Adding a CVLN to the task force provides a home for the ISR drones, so useful in a contested A2AD environment as well as a home for the additional ASW assets the UUVs and Fire Scouts bring to the fleet.

By making the new platform nuclear powered the ship will be able to keep up with the CVNs, in both a strategic as well as a tactical sense. If the President suddenly needs a carrier strike group hundreds or thousands of miles away from their current position, the CVLN will be a fast complement to the CSG. A CVLN that can keep up with the CSGs affords the task force some very useful ASW protection both in transit and upon arrival. In addition, it will provide a permanent arc of ISR drones on the search, locate, transmit and target mission.

As for the tactical use of speed, in naval combat close almost always doesn’t count, and being able to accelerate over a 5-15 minute period at nuclear powered speeds can be just enough to survive an incoming strike. And once more, it allows the CVLN to keep up with the CVNs.

While building a nuclear powered CVLN is of course more expensive initially, once lifetime construction, operating and maintenance costs are considered, it should be notably less costly than an oil powered ship. Installing two of the existing nuclear reactors in use with the new CVNs aboard should provide plenty of power to move 45k tons around effectively and efficiently.

An obvious existing ship class to consider as a starting point for the new CVLN is the existing LHA/LHD design, but tweaked to accommodate nuclear power. If a canted flight deck and catapult were deemed necessary another alternative would be to revisit the old Midway class for design ideas.

CVLN Equipment

So how should the CVLN be equipped? A ski jump or canted flight deck should certainly be considered, although even if the ISR drone is fixed wing it should be small enough to launch off an LHD-style ship. If some of the modified S-3 Vikings or new refueling drones are going to be carried, then the extra expense of a canted flight deck will have to be incurred. Either way, the following, rather basic list of desired equipment should provide the reader with a good idea of what the CVLN will be accomplishing.

The navy should investigate whether it is practical to install one railgun, probably on the fight deck just before the island, aboard a CVLN. Obvious problems to be solved include insuring enough power is available, providing the space for the needed large capacitor just below the railgun and meeting the usual cost-to-benefit analysis applied to any new feature sent to sea.

2 CIWS mounted fore and aft and at least one RAM missile launcher for anti-missile defense are necessities.

15+ ISR drones with traditional jet engines or upgraded Osprey tilt-rotors are needed to execute the search, locate, network and target mission.

4+ UUVs plus the needed docking/launching buoys needed to get them in and out of the water.

15+ Fire Scouts and around 75 ASW oriented TIF Buoys.

4+ Seahawks

1 SAR team with associated equipment.

AORH class

The second suggested choice for the U.S. Navy to add is a ship class based on a modified AOR sized and double hulled design without a full flight deck, approximately 25k tons and oil powered. This class is intended to provide very substantial helicopter and VTOL launching and servicing capabilities, for ASW, amphibious, special-ops or other missions and then executing these missions over the years alongside a large variety of allied nation navies; hence the built in patrol boat capabilities as well as at least one UNREP station port and starboard.

The AORH is a solution to use, at a much lower cost than a CVLN in locations where a carrier task force is not present across the globe, especially in the Arctic, South China Sea, Gulf region and perhaps Northeastern Asia. These are obvious locations to homeport one of each of these ships permanently, but a standard rotation of three ships, perhaps only two ice-strengthened ones are needed for the Arctic, should be built for each requirement.

Reading the list of suggested equipment and capabilities below should provide a good grasp of the variety of missions, and not just ASW or amphibious, this class of ships will be capable of. The abilities this class will provide will substantially augment the small surface force combatants nations in the area already possess.

There has not been a great deal published on what the newly designated Arctic Command is going to deploy. Or do. As far as the U.S. Navy is concerned, my suggestion is to use ice-strengthened versions of what we already have and focus on the only realistic threat, submarines, that the fleet is likely to encounter up there. Let the Air Force provide air cover and if it comes to it, aerial strike capabilities out of Alaska or Greenland. As for ASW or ASuW capabilities, a task force composed of an AORH serving as flagship, 2-3 of the new ASW frigates, a Los Angeles class SSN and a Coast Guard icebreaker on an as needed basis should be ample to meet the nations needs up there.

As for more substantial portions of the fleet, there simply are not enough targets to justify the routine presence of a CCG or DDG. As for an amphibious ship, the American taxpayer as well as our Arctic neighbors should be asking just who we intend to invade up there. There simply is no need for these kinds of assets.

Operating in the Arctic is a new reality that the U.S. Navy has to add to its long list missions to accomplish. But a very limited list of ice-strengthened surface assets concentrating on the ASW mission, a SSN and Air Force provided top cover should handily do the job.

AORH equipment

Once more the following, rather basic list, of desired equipment should provide the reader with a good idea of what the double hulled, AORH should be equipped with.

A gun of some sort and since we have lots of 5-inch guns available one of these will probably be installed. One of the OTO-Melara 76mm family would also function well, possibly even be preferable over the 5-inch gun.

4 CIWS and at least 2 RAM missile launchers, and room for more should be considered if feasible. These are not going to be stealthy ships; they will be sailing in harm’s way, often in littoral waters and WILL be considered high value targets.

4+ ISR drones IF fitted with the new engine upgrade for the Osprey, allowing them to function as a VTOL capable airframe. Without VTOL capabilities the AORH will operate with the ScanEagle like the rest of the fleet.

4+ UUV drones plus the needed docking/launching buoys needed to get them in and out of the water.

15+ Fire Scouts and around 75 ASW oriented TIF Buoys.

4+ Seahawks

Flagship capable in the sense of having both working as well as berthing space aboard for a small task force commander’s team, which will occasionally be multinational.

1 SAR team with associated equipment.

This class will almost certainly be tasked from time to time with hosting Seals and Special Operations teams and their equipment as they come and go on their missions. Ample berthing, operating and maintenance spaces need to be designed into the class. In addition, room for the necessary crane capacity should be available to handle:

2 25’ Mark V.1 Patrol Boats and 2 Mark VI 85’ Patrol Boats

OR

4-6+ Mark V.1 Patrol Boats

The ability to berth and support a company of Marines.

The ability to support the operations of 2-4 of the Marines CH-53E/K helicopters.

Plus the ability to berth and operate on a add something, drop something off basis, whatever additional helicopters or small amphibs the Marine Corp might want to bring aboard.

Summation

The new abilities unmanned flight brings to the fleet are potentially very useful. But as discussed above, achieving the benefits frequently requires the use of the new drones in quantity. The suggested ship classes are two possible ways to get the needed UAVs, UUVs and buoys into the fleet. Another choice is certainly possible though and now is a good time to start discussing the topic.

In the next article we will examine how the Navy can add the railgun to the fleet in quantity and make use of its distinctive qualities in an effective manner. Read Part Four here.

Jan Musil is a Vietnam era Navy veteran, disenchanted ex-corporate middle manager and long time entrepreneur currently working as an author of science fiction novels. He is also a long-standing student of navies in general, post-1930 ship construction thinking, design hopes versus actual results and fleet composition debates of the twentieth century.

CIMSEC content is and always will be free; consider a voluntary monthly donation to offset our operational costs. As always, it is your support and patronage that have allowed us to build this community – and we are incredibly grateful.

Select a Donation Option (USD)

Enter Donation Amount (USD)