Archive for the 'Innovation' Category

In an earlier essay , I described how technology will make the future littoral environment even more dangerous and increase the power and reach of smaller ships and shore batteries. I described the need to test and develop flotillas of combat corvettes and other craft and proposed a few platforms currently being built in the United States for use in this experimentation. My article continues the argument originally made by Vice Admiral Cebrowski and Captain Wayne Hughes in their path setting article on the Streetfighter concept. However, successful combat in the littoral environment will have to be a team sport. Fortunately, we have the US Navy and Marine Corps team who can execute this mission, if enabled to develop new capabilities and doctrine to employ them.

This paper is not an argument to kill the Liberty or Freedom class LCS/FF. It is offered for cost and capabilities comparison purposes only as the actual cost data is not for public release. The LCS is a capable mother ship for the operation of other smaller platforms, particularly helicopters. Further the LCS is a cost effective platform for open ocean anti-submarine warfare the corvettes we shall discuss here described here cannot do. We have much more work to do in fully exploring the applications of the LCS/FF.

The United States and her allies require capabilities and doctrines to operate in the littorals to provide on scene presence in areas of controversy such as the South China Seas. By being present we can shape the environment and prevent competitors from achieving effective control using salami slicing tactics and intimidation. If tensions arise to the point of requiring deterrence such forces can provide considerable numbers and resilience as to force an opponent to have to make a serious effort to remove the flotilla supporting littoral outposts. This will reduce the urge for “Use ‘em or Lose ‘em” scenarios which can rapidly escalate. If deterrence fails, these combined forces will pack a considerable punch and contest, if not remove, sea control. Over time such forces operating together could create their own Anti-Access/Area Denial (AA/AD) zone (creating a “No Man’s Sea” where both sides’ zones overlap), gradually advance our own zones and then peel away an opponent’s AA/AD zones.

A truism illustrated in the book The Culture of Military Innovation by Dima Adamsky is genuine revolutions in military affairs do not usually arise out of incremental improvements but in taking new capabilities and systems and employing them in a truly unprecedented configuration. This is the mindset we should adopt when considering how best to employ flotillas of corvettes in littoral environments. Flotillas should not be considered on their own but as part of a combined arms effort. We must change how we think of the design of the corvette and its employment with other joint forces. The flotillas, operated primarily by the Navy, should be supported by littoral outposts operated by Navy Expeditionary Combat Command and United States Marines. Their combination can be very powerful. To take full advantage of them, we must rethink how we operate the combined force. Here I’d like to examine first the flotillas and then the littoral outposts.

An undated photo of the ENS S. Ezzat, an Egyptian Fast Missile Craft. VT Halter Marine Photo

An undated photo of the ENS S. Ezzat, an Egyptian Fast Missile Craft. VT Halter Marine Photo

We must reexamine how we think of the corvette or light frigate. First let us address the definition of Corvette, which historically has ranged between 500 and 2,000 tons in displacement, though there have been variations on this theme. The more important factor is the effect of modern electronics and weapon systems granting smaller platforms enhanced capabilities, similar to what has occurred in aircraft. This provides the ability to adjust to the offensive environment of the sea by the distribution of capabilities in smaller profile platforms, however corvettes measure time on station in days not in the minutes aircraft do.

One of the most dramatic impacts of modern electronics is the increasing ability of smaller platforms to conduct scouting. Aerostats, towed kites, and small UAVs such as Scan Eagle give small platforms capabilities similar to larger platforms operating helicopters, etc. These smaller platforms have no need for the large flightdeck and hangar required for normal helicopter operations. They just need a small flat surface and storage area for rotary drones, nets and launchers for UAVs, or the UAVs can be designed to be recovered from the water. The MQ-8B could potentially be operated from a small flight deck with a small maintenance and storage hanger. This will drive the displacement requirements (and the resulting signature) for such platforms down considerably. Flotillas can then be further augmented in their ocean surveillance (“scouting”) missions by the use of land based aircraft, UAVs, Aerostats, etc. as well as carrier based aircraft operating further back.

Corvettes enabled in this manner can have the same surveillance capacity as any destroyer or frigate. By employing an aerostat or towed kite the corvette would have the ability to suspend a radar system at altitude. Because the power generation is on the ship, the aerostat or kite can have a very capable radar normally seen only in the largest UAVs or on helicopters. Further the greater altitude also provides the ability to control light weight visual sensor enabled UAVs like the Scan Eagle at far greater ranges. Combining the two systems grants the Corvette the ability to conduct surveillance on a large area with the radar locating contacts and the scan eagle visually identifying them. Thus we have gained the same capability which in the past would have required a large flight deck on a destroyer or frigate.

Complementing their scouting capability smaller platforms increasingly will have lethal firepower. The capabilities of anti-ship cruise missiles continue to improve. The distribution of firepower across multiple platforms will mean an enemy has very little opportunity to eliminate such a force without response. Similarly, defensive systems are becoming smaller and more effective. Thus the flotilla force is the littoral element of the Distributed Lethality concept designed for this deadly environment. The limiting factor for the size of corvettes is becoming less dominated by the weapons and more by endurance. Thus it would appear the knee in the curve between competing factors of size, endurance, signature, defensive weapons, offensive weapons, scouting capacity, etc. is between 350 and 800 tons.

The mission of such platforms will be challenging but necessary, particularly in light of aggressive salami slicing lines of operations which require presence to counter. In peacetime, flotillas of corvettes will maintain presence to shape the environment, assure our allies, be observable witnesses to aggression, and train others in conduct of sea control. In an environment of increasing tension, they remain on station to continue scouting, shaping, deterrence and assurance while giving larger signature platforms space to maneuver. At the outset of conflict in a real shooting war they have one mission… attack. Attack like Arleigh Burke planned and Frederick Moosbrugger executed but with updated tactics, techniques, and procedures which enable massed force from distributed forces (See Jeff Cares Distributed Network Operations). Ships will be lost; the question becomes what will be lost when the inevitable hits occur.

While it is tempting to continue the technological trend and employ such small platforms without crews, there are significant limitations which it appears solutions have not arisen. The first is the limitation of control of such vessels. Modern Electronic Warfare means the connections to small platforms will likely be severed. While artificial intelligence has made great advances it does not appear ready, or ready in the near future, to address the challenges and complications of operations at sea specifically for factors such as rules of engagement, fusing information, training allied forces, etc. Robots are not known for their imagination and ingenuity. Further there are considerable sociological prohibitions about lethal force capable platforms operating on their own. Robotics and automation should be designed into such platforms to augment the performance of and decrease the size of the crew, but not replace them. With secure line of sight communications, manned platforms could be teamed with unmanned platforms to provide sensors and firepower.

We need to decrease our dependence on hardkill systems. One of the potential driving factors of increasing the size of such platforms is the compulsion to place Aegis weapons systems on them. We may likely gain the ability to place highly capable sensors on smaller platforms. The move away from transmitting wave tubes on current passive electronically scanned array radars such as SPY-1 to more capable and lighter weight transmit receive tiles used in active electronically scanned array radar systems such as in the APG-81 on the F-35 fighter. However the limitation then becomes one of missile systems, etc. If a force is dependent on hardkill systems, it accepts the risk of not being able to defend itself adequately should active measures fail. Given the proven history of effective electronic warfare, decoys, etc. it would be prudent to take a mixed approach. However, decoy systems, etc. are only as effective as their ability to emulate the intended target. Fortunately, corvettes generally can have very small signatures and other platforms can have even smaller signatures.

Military history shows warships built for niche purposes are very successful in actual wartime though their operators often expand their use outside the original intended mission, thus the need for experimentation.

In the essay in Proceedings, I offered an example for purposes of comparison and analysis, an up-armed variation on the Sentinel class Fast Response Cutter (FRC) as an example of what a combat corvette could offer. Even when doubling the total ownerships costs of the FRC for the modifications described between 12 and 14 FRCs could be owned and operated for the cost of a single LCS and its helicopters. The FRC has an endurance which is competitive with the LCS.

Based on the displacement and design of the FRC, it could be outfitted with two to four ASCMs (perhaps the Naval Strike Missile), the 11 cell SeaRAM system, and decoy system such as the Mark 36 Super Rapid Blooming Offboard Chaff and/or the Rheinmetal Rapid Obscuring System (ROSY). Sensors upgrades would be a navalized version of the APG-81 or other AESA in a rotatable pedestal housing. Offboard sensors would include an aerostat or towed kite system with a surface search radar and/or UAVs similar to the ScanEagle. If these offboard sensor systems cannot be operated together from the same platform, then the corvettes can work in teams.

There are many factors which must be worked out. There may be other platforms more suited or complementary to this role, such as the Mark VI patrol boat, the Stiletto experimental platform, the SeaSlice experimental platform and the Ambassador Class missile boat. The upgunned version of the Sentinel class FRC could perform the role of its namesake, the day to day presence patrol missions in littoral regions, while a platform like the Stiletto would conduct sweeping attack and scouting runs in the event of conflict or the need to conduct a demonstration of resolve. Some of these platforms would not have to be manned. Those conducting high risk missions can be teamed with manned platforms to augment their scouting capabilities and firepower. The important point is the exploration of the concepts, tactics, techniques, procedures, and doctrine in wargames, campaign analysis, and fleet exercises to understand the impact advancing technology is having on naval warfare.

One threat to flotillas of corvettes is enemy submarines. Submarines would have some challenges tracking and effectively employing torpedoes against corvettes due to their small size, speeds, etc. Submarines would have to make modifications to their combat systems and torpedoes to address the flotilla. Submarines’ best opportunity to attack the flotilla would be in chokepoints. The flotillas can have an effective means of negating the submarine. Without sonar, it would appear the corvettes are very vulnerable, but simple tactics can negate the effectiveness of a submarine. As the flotilla approaches a littoral chokepoint they launch lightweight torpedoes pre-emptively in a snake search pattern in the direction of travel. The submarine will likely abort any effective targeting and have to run. Given the high rate of false positive contacts likely to be produced in littoral environments, just as many torpedoes would likely be expended by conventional ASW ships with sonar systems, etc. The number of torpedoes expended can be greatly reduced by the contribution of other forces as will be describe below.

The employment of flotillas of corvettes is only one element in how we need to approach littoral warfare. Equally, if not more, important to success in littoral conflicts is the employment of combined arms. The Proceedings essay briefly touched on the concept of Littoral Outposts as contributors to the effectiveness of flotillas. Such outposts deserve further exploration as they can contribute significantly to the success of future military conflicts and competitions.

Littoral Outposts composed of combined Navy, Marine Corps and other joint/coalition forces can contribute greatly to sea control. The Proceedings essay has already described how such forces can contribute to sea control employing shore based anti-ship cruise missiles, sensors, UAVs, etc. This is only the beginning. Such teams can contribute to ASW, AAW, and strike. Using denial, deception, hardening and mobility in the littoral environment these teams can present a difficult challenge to a competitor. All this would be accomplished by employing new technologies in new and innovative ways.

Littoral Outposts can have a significant impact on Anti-Submarine Warfare (ASW). We’ve discussed organic responses from corvettes to submarines, but the littoral outpost can greatly reduce the threat of submarines to corvettes and other platforms. The simplest and most conventional solution is the employment of Forward Arming and Refueling Point (FARP) for submarine hunting helicopters. Such helicopters can be stationed ashore or aboard ships operating further back (such as the LCS). Technology also offers effective and innovative approaches to littoral ASW. Littoral outpost can launch a swarm of UAVs employing sensors to conduct grid searches of submarines or minefields in chokepoint areas. When a target is detected and prosecution is initiated the drones could potentially drop charges or these could be launched from shore based mortars. The charges can be very deadly to a submarine as demonstrated by the Hedgehog ASW mortar in World War II. In addition to the MAD UAVs, forces ashore can launch small Unmanned Undersea Vehicles (UUVs) which act as mobile sonobuoys. The effectiveness of such systems can be greatly enhanced by the survey of such chokepoints in peacetime to identify wrecks and other metallic objects which could generate false positives, etc. In times of crisis, Littoral Outposts and corvettes can work together to plant mines in the chokepoints thus creating a dangerous environment for submarines to operate in.

Littoral Outposts can have a significant impact on Anti-Air Warfare (AAW). Corvettes are vulnerable to Maritime Patrol and Reconnaissance Aircraft (MPRA). If allowed unfettered access to an area, MPRA has the ability to eventually find and pick out of the clutter small craft like corvettes and deliver weapons or direct weapons and platforms to kill them. The key to the success of the MPRA is time and unfettered access. Littoral outpost can nullify this in different ways. First we noted the size of a corvette limits the size (and therefore range) of surface to air missile systems. So while advanced light weight AESA radars can give a corvette the ability to search and locate MPRA, they don’t necessarily have the weapons which can reach out and touch them or drive them off. Littoral Outposts can be armed with such long range weapons and employ either their own air search radars or employ cooperative engagement systems to guide off the corvette’s track. Littoral Outposts can also employ short takeoff and landing aircraft such as the F-35B. If employing land based radars the Littoral Outposts can disperse the sensors and missiles so as to retain one when the other is destroyed. Or they can remain silent and be queued from land based aerostats or airborne early warning (AEW) aircraft flying from aircraft carriers or air bases further back. Just the knowledge surface to air missiles or aircraft may be hidden in Littoral Outposts can effectively nullify MPRA which are very vulnerable to such weapons and platforms. Taking advantage of denial, deception, hardening, and mobility Littoral Outposts can present a threat to enemy aircraft which is difficult to find, fix, and finish. However, MPRA do not enjoy the same environment when they are radiating to locate small ships in the clutters of the littorals.

Littoral Outposts can make significant contributions to strike. Marine and Navy Expeditionary forces working together can deliver offensives strike operations to sea or land. Employing mobile launchers such as High Mobility Artillery Rocket System (HIMARS) with different weapons (and increasingly in the future weapons which can change roles) Littoral Outposts can deliver fires to affect ships at sea and targets on land. The same HIMARS employed to launch surface to surface missiles can also launch surface to air missiles today. Many Anti-Ship Cruise Missiles (ASCMs) today can also perform land attack missions. Again the F-35B provides similar opportunities.

Combining flotillas of corvettes with Littoral Outposts and littoral transportation platforms like powered barges, the Joint High Speed Vessel (JHSV), Landing Craft Utility (LCU), and Landing Craft Mechanized (LCM); the US can create mutually supporting elements to conduct maneuver in the littoral environment. Employing denial, deception, rapid hardening (digging in), and mobility, joint forces can advance in the littoral environment in the face of Anti-Access Area Denial (AA/AD) capabilities in the hands of potential adversaries. Littoral Outposts operated by, with, and through allies create AA/AD zones of our own. Behind these AA/AD zones we can then operate higher profile platforms such as aircraft carriers, etc. From these zones, flotillas of corvettes and other seaborne platforms sortie out to conduct sea control/denial and strike operations. From these zones, Littoral Outposts conduct support and strike operations. Once the environment has been shaped, the littoral outpost forces advance with the support of the conventional navy and flotillas. The Littoral Outposts then create new forward AA/AD zones behind which the process advances continues.

As the combined force advances their AA/AD zones advance and enable the attrition of an opponent’s AA/AD system, particularly the sensors (such as MPRA) necessary to enable them. This process will gradually wear down an opponent’s AA/AD system. If our opponents have become too reliant upon AA/AD, they will find themselves in a vulnerable position. Thus in time a combined force can contribute to the peeling away of AA/AD systems and gain maneuver space for the fleet near an opponent’s shore.

A combined arms approach to littoral combat can be very effective. We should be taking advantage of the trends in weapons and how they enhance the lethality and reach of smaller and smaller ships and shore batteries. In essence we must expand the Distributed Lethality concept to embrace our USMC and NECC capabilities in the littoral threat environment. However, to be effective and achieve true revolutions will require changing the way we employ these systems and capabilities. By employing combined arms of flotillas and littoral outposts we and our allies can confront potential opponents with a powerful deterrence force. These forces can enable us to shape events and prohibit aggressive behaviors in peacetime. As crises arise, they provide a resilient force which cannot easily be defeated thus providing stability. Finally in actual combat they provide a deadly threat which can support the larger fleet objectives by contesting and peeling away an opponent’s AA/AD network.

Here we have only addressed the outlines of what the Navy-Marine Corps team’s potential for combined arms in the littorals. We should conduct wargames, experimentation, and analysis to explore the options more fully and identify what other joint capabilities can contribute to this deadly environment. These combined forces should be able to provide commanders with options to address an opponent’s competitive actions in pre-hostilities, deterrence, and if required open warfare. Much more work needs to be done if we are going to remain viable in this new deadly environment.

k1In 1955 Air Force General Curtis LeMay, Commander of the Strategic Air Command, built the service’s first base hobby shop in Offutt, NE. His vision was to provide a facility with tools, material, and resources to allow Airmen the opportunity to repair, modify, or completely rebuild their personal automobiles. The first hobby shop was an overwhelming success and soon become popular among all ranks, including LeMay himself. Auto hobby shops soon proliferated across all SAC bases and eventually, along with their sibling wood hobby shops, to most American military bases around the globe. Many of these workshops eventually formalized their training, so service members could achieve recognized certifications for their efforts.

These hobby shops were widely viewed as constructive outlets for military personnel to learn interesting, practical skills and to make positive use of off-duty time by tapping into, or fostering, their inherent desire to “tinker” with things. By the late 1990s they began to lose their appeal and many were closed for financial reasons. The causes for their demise is unclear, whether because cars simply became too complex for the “shade tree mechanic” to repair or as a reflection of American society, where servicemen and women would rather pay someone else to do work they no longer wanted to do themselves.

I do not believe the inherent desire to tinker with things, or using individual experimentation as a learning tool, has gone away. It may, however, be occurring today in new forms. Because the cost of technology continues to decline, it has created an environment where sophisticated tools and devices are now at the fingertips of the average citizen, a condition commonly referred to as the democratization of science and technology.

For the past several years the White House has been championing the “Maker Movement” to stimulate innovation across America. Cottage industries in coding, drones, electronics, robotics, and 3D printing are sprouting up across the country in reflection of and to support this renewed interest. It is clear that the naval services are tapping into the resurgence of the tinkerer as well.

The first naval “Fab Lab” was created in Norfolk in 2015. This joint venture with DARPA and MIT provided sophisticated manufacturing equipment, materials, and world class training to Sailors in the fleet. The fundamental premise for this project was that by putting tools and capabilities into the hands of Sailors closest to our operational problems, they would develop new and innovative solutions. Since its inception, for example, LT Todd Coursey has achieved significant results, expanding interest and demonstrating the utility of this capability across the fleet. His outstanding efforts at Norfolk were recognized by the White House and Secretary Mabus. SECNAV’s Task Force Innovation has funded additional Fab Labs and over the next two years additional facilities, some of them mobile, will be operational at Navy and Marine Corps bases around the globe.

An extension of the FAB LAB concept is the Expeditionary Manufacturing Mobile Test Bed (EXMAN) project led by the Marines and SPAWAR. EXMAN offers the ability to digitally manufacture parts in the field, often at a reduced cost and in much less time. This past week EXMAN was successfully demonstrated to General Neller, a strong advocate of fielding these new facilities with the operational forces. This capability has the potential to fundamentally change how we do battlefield logistics, by making items instead of buying, storing and shipping them across the world.


3D manufacturing is not the only field where the tinkerer movement is making its military comeback. The Naval Postgraduate School built its Robo Dojo to allow students and visiting Sailors and Marines the opportunity to tinker with robots and control systems. In the future it is likely we will see coding bootcamps springing up on naval bases as well. These fora provide the opportunity for Sailors and Marines to learn basic coding skills and eventually build smart phone apps or virtual games. Ideally, all of these complementary capabilities will be connected in an integrated ecosystem, properly resourced and supported by senior leaders, and available everywhere.

These emerging capabilities fundamentally draw upon LeMay’s vision – provide the resources, tools and safe spaces to our people and allow them to cultivate their talents and creativity. We have no idea of the great things they will achieve when allowed to tinker with their own bold ideas, such as STGC Ben Lebron.

The Chief had a vision for a new decision aid to improve ASW operations on the USS Fitzgerald. After finding a JO who taught him some coding skills, Chief LeBron designed the Single Leg Bearing Range program, for which he subsequently won a 2015 SECNAV Innovation Award. His software substantially improves ASW sonar solutions by more than half.(SECNAV granted Chief Lebron a waiver to enroll in the NPS Master’s ASW distance learning program in addition to his formal award.)

The military has long practiced such problem solving. In an examination of culture’s impact on military innovation, Dima Adamsky notes the cultural difference between the US and Soviet militaries during the Cold War. One significant contrast was their approaches to technological adaptation. The Soviets would develop concepts and strategy for use ahead of delivering a technology, whereas the US military usually had the technology and then often took a decade to figure out how to turn it into an operational advantage. We may be experiencing the same phenomenon here with the maker movement.

As mentioned, today’s democratization of science and technology is enabling this tinkering resurgence to occur – not only for us, but for our adversaries. Recently, scholars CAPT Mark Hagerott (ret) and Col TX Hammes (ret), outlined their thoughtful visions of the future operating environment, where naval forces will have to contend with the challenges posed by a new reality of destructive, technology-based capabilities operated in very decentralized and unpredictable ways by our adversaries. The naval services must lead this wave, adjusting our strategy not only to counter these decentralized threats, but to use the skills of our creative workforce to create an operational advantage over our adversaries.

We are entering an era where the operational environment will be characterized by complexity, uncertainty, and unpredictability; to succeed, our naval forces must respond in kind. Simply relying on exquisite weapon systems and massed fire power will be insufficient. One way to overcome this challenge is to fully exploit the ingenuity and talents of our Sailors and Marines. The burgeoning naval tinkering movement is just one step in creating a fundamentally important operational capability that is already resident in the naval services. Failing to harness our tinkerers, and recognize their work, will be to the nation’s detriment.

Please join us at 5pm (EDT) on 22 May 2016 for Episode 333: The Battle of Jutland & the Time of the Battleship with Rob Farley:

We are coming up on the 100-year anniversary of the Battle of Jutland.

Stop for a moment, close your eyes, and then tell me what image comes to mind.

If your image is of a huge mass of steel coming at you out from the mist at 25-knots belching out sun-blocking clouds of coal-smoke and burned black powder and searing fingers of flame pushing tons of armor-piercing explosives, then this is the show for you.

For the full hour this Sunday we will have as our guest a great friend of the show, Robert Farley. We will not only be discussing the Battle of Jutland, but battleships in general in the context of his most recent book titled for clarity, The Battleship Book

Rob teaches defense and security courses at the Patterson School of Diplomacy at the University of Kentucky. He blogs at InformationDissemination and LawyersGunsAndMoney. In addition to The Battleship Book, he is also the author of, Grounded: The Case for Abolishing the United States Air Force.

Join us live if you can or pick the show up later by clicking here. You can also find the show later at our iTunes page here or at Stitcher.

The Decision Process for Littoral Warfare

Our Navy expects to retain open ocean dominance by superior “shooting” with sufficient weapon reach and accuracy using manned or unmanned aircraft and missiles, and with an adequate set of anti-scouting, Command and Control (C2) countermeasures, and counterforce measures. Our present network of continuous but electronically detectable systems needs only to be kept secure from enemy C2 countermeasures to continue our blue water dominance with carrier battle groups, surface action groups, and expeditionary strike groups. The Navy calls the capability “network-centric warfare.”

In this piece, however, we concentrate on the dangerous environment close to a coastline that the full range of our sensors and weapons cannot be exploited. The threat of sudden, short range attack is a constant concern. We wish to describe an effective mesh network to fight in combat environments like San Carlos Water in the Falklands War, the coast of Israel in the 1973 War, and other waters that led to sudden surprise attacks on ships at relatively short range, like the missile attacks on USS Stark (FFG-31), HMS Sheffield, the British supply ship Atlantic Conveyer, the many missile attacks in the Gulf “Tanker War” of 1982-1989, and most recently against the Israeli missile ship, INS Hanit, off the Lebanon coast.

The littoral environment is cluttered with islands, coastal traffic, fishing boats, oil rigs and electromagnetic emissions. It is further complicated by shoal waters and inlets that offer concealment as well as threats to our warships imposed by land-to-sea missile batteries. In littoral waters the tactics are dominated by the need to be as undetected as possible with ships and aircraft that are small in size but large in numbers. Offensive tactics are achieved not by dominance at longer ranges but by covert, sudden surprise attacks and anti-scouting techniques. The mesh network we will introduce is resilient, agile and self-healing, employing intermittent and hard-to-detect communications to support offensive strikes as its foremost operational and tactical advantage.

The development of a mesh network that enables us to Attack Effectively First with a distributed lethal force in the littorals is essential to the full spectrum of future naval operations and tactics.

Command and Control Structures

All networks for Navy Command and Control must function within the context of twelve fundamental tactical processes. The mesh network we describe below fundamentally is intended to achieve what the late VADM Arthur Cebrowski espoused: a command system that is a network of people and things to perform three processes:

  • Sense (detect, track, and target enemy units)
  • Decide (make tactical command decisions and execute them with a communications system for control)
  • Act (which for simplicity we will treat as the acts of combat maneuvering and shooting at something to good effect. Other purposes include antipiracy, defeating drug runners, or conducting humanitarian operations, each of which requires other forms of action.)

What is the purpose of the sense-decide-shoot sequence?[1] Keeping to basics, the purpose in naval tactics and in this paper is to Attack Effectively First. Now we see why there are not three but twelve elements of tactical decision making. With the above examples in mind, it is clear that to Attack Effectively First a Tactical Commander must perform his three processes better than the enemy who simultaneously is performing his own Sense, Decide, and Shoot processes. Furthermore, each side is trying to interfere with his enemy’s processes, stopping or slowing them enough so that we can act (shoot) first. In Fleet Tactics and Coastal Combat, Hughes calls these network-supported actions: anti-scouting, command and control counter-measures, and counterforce.[2]

Table of the Twelve ProcessesUntitled-1

Each commander governs only six of the twelve processes with his network. He does his best to interfere with the enemy’s activities and network but he can’t control them. A complete discussion of what comprises the combat actions and what measures help achieve an advantage—to attack effectively first—can be found again in Fleet Tactics and Coastal Combat.[3]

Also observe that timeliness is an essential ingredient of the tactical commander’s networked decision process. Rarely is it possible for him to wait for a complete picture before acting. The Battle of Midway, the night surface battles in the Solomons, and the 1973 Yom Kippur War’s sea battles all demonstrate the extreme pressure on leadership and the genius by which a victorious tactical commander chooses the right moment to launch his attack while mentally assimilating twelve interacting processes.

What Is a Mesh Network?

Fully-connected_mesh_network.svgThe definition of mesh originates in graph theory language describing flexible self-forming, self-healing, and eventually self-organizing networks. From a pure mathematical standpoint, mesh network topology is described as a complete or fully interconnected graph. For a system of N nodes the mesh topology is represented by N(N-1)/2 links in which the every node is connected to all the others. From the computer and information networking standpoint, mesh networking could take place at every critical layer of network functionality, which is typically structured through the 7-layered hierarchy of cyberspace. At the lowest physical layer populated by moving assets such as platforms and their antennas, it could be viewed as a directional or physical network of highly dynamic components. Here advances in computing technology, signal processing, and transmission open up new opportunities we are exploring at the Naval Post Graduate School

Altogether, across the layers of cyber-physical space the mesh network of LCS nodes could be implemented as an interacting set of Hubs and Relays (physical layer, layer 1) interconnected by Bridges (link layer, layer2) and governed by Routers (IP space layer 3 and above) . The set is assisted by Gateways (application layers 5-7) that interface with other networks, for example those of other Services and nations, that use different protocols. In the Navy application the network is a Decision Support System for efficient but intermittent, hard-to-detect transmission of information (processed when desirable); complex orders; and compact commands, in order to conduct almost undetectable actions by the force components in the network. A key advantage of a mesh network is its mobility in (a) physical, (b) cyber, and (c) functional domains simultaneously to enhance our command-and-control (or decision-execution) process, and to degrade an enemy’s attempt to interfere with our command-and-control countermeasures.

Mesh Networking Effects on the Decision Process in the Littorals: C2 Migration to Cyber-Physical Space

The Littoral Combat Ship (LCS) was designed to operate in the global littorals. Today’s LCS configuration with its sea frame and mission module capabilities provides a set of defensive surface, anti-submarine and mine warfare capabilities. Plans under way to boost the LCS to frigate like offensive capabilities presume survivability in contested waters.

The LCS already is a multimodal networking platform that carries small, deployable manned and unmanned components. Adding dynamic short lifetime mesh nodes will enable the LCS to operate in time and space with intermittent transmissions. We describe an extremely dynamic mesh which doesn’t rely on time-space continuity but instead executes the Sense-Decide-Act (S-D-A) C2 cycle in highly discrete moments in time and space.

lcs1In a mesh network the Sense, Decide, and Act processes operate in both the cyber and physical domains. The C2 correspondence between the S-D-A phase in physical space and similar S-D-A steps in cyberspace can be exploited to create new options for concealment and surprise. For example, by turning on the Sense Mine Counter Measure component, we start collecting surveillance feeds from organic unmanned vehicles and other fixed or aerial-surface mobile assets in the physical space. Then the LCS commander will repeat the D and A steps in cyberspace. It could be as simple as prioritizing the sensor feeds or turning the situational awareness views “on” and “off” to save on bandwidth that is shared with many partner boats. Or the MCM mesh capability can be as complex as switching all assets feeding data to LCS from on or over an island with strictly directional peer-to-peer links, meshed in a less detectable non-line of sight (N-LOS) mode. The Physical “Sense” capability meshes with multiple, nested “D-A” performed in the cyber domain.

On the other hand, suppose we are fusing feeds on a peer’s activity in the LCS physically with N-LOS to the peer concealed behind an island. Suppose as well the radar or optical sensor feeds from a patrol boat in view of the site only intermittently. Now it becomes a priority data feed. The LCS commander shoots a projectile (physical space action) with a miniature wireless hub in its payload. The projectile’s compact communications unit reads the data from the boat sensor during the descent and sends it to the LCS, while in the line of sight. It is a process of a few seconds carried out in physical space, while the C2 process improves on the patrol boat’s cyberspace data feed. Meanwhile if the adversary is able to observe the act he is unable to decide whether it is threatening or not. There are other opportunities as we approach an enemy coast while we are establishing all domain access with a mesh network. The littorals are where the complexities of warfare all converge and where access to all domains will be required often simultaneously. The Naval Postgraduate School, is exploring the complexities and experimenting with these technologies.

By serving as critical nodes in a littoral mesh network, the LCSs and other vessels and aircraft both manned and unmanned can take on new operational roles. The configuration of information networks—well described in (Comer, 2011), and their decision making variants described in (Bordetsky, Dolk, Mullins, 2015)—will typically be guided by the presence and usage of four major types of critical networking nodes: the Hubs, the Bridges, the Routers, and the Gateways in a hierarchy of protocol layers, of which the Open System Interconnection (OSI), a seven-layered model, is the most popular one. In such a unified picture, stratified nodes perform across a scaled mesh of links, and hubs are connectors of physical layer (OSI layer 1). Bridges (or switches) operate one layer above, becoming the main connectors for clusters of nodes, which share the same type of medium and use the same rules for intermittent or on-demand listening to each other. In information technology vernacular these clusters are known as local area networks. The Routers take packets of data from a local network separately and “navigate” them from cluster to cluster as layer 3 main connectors.

In this mesh network, the LCS’s function is critical as Sense-Decide-Act information flow in connectors to local clusters of manned-unmanned nodes support the mission. They could naturally become C2 flow Hubs, Bridges, and Routers. This contrasts with the usual information network, in which Bridges connect separate nodes and communicate with easily detected transmissions.

The LCS’s self-forming mesh networks are unique due to the fact that their mobile nodes perform as Hubs, Bridges, and Routers all together. Any Router could operate as a Bridge and a Hub, as those become sub-functions of node-layered operations. A Gateway includes the Router function. A special significance of this is that the LCS now becomes essential for reconciling different protocols in partner nation’s vessels and teams. Because of the LCS modular mission architecture, we can map these fundamental connector roles into the LCS C2 mesh network. Each LCS could be a Gateway, a Router, a Bridge, or a Hub, based on rapid Mission Module switching, or it could delegate some of these roles to nearby or remote vessels, depending on the situation. There will be constant reconfiguration of Mission Module functions onboard the LCS as well as reconfigured connections across the littoral mesh.

A Maneuvering Littoral Mesh Network

One of the most remarkable changes that an LCS-based littoral mesh network brings is in redefining the component of “Act” to include “Maneuver” (Hughes, 2000). COL A. T. Balls’ concept of manned-unmanned teaming, which he devised in designing the ODIN Task Force for fighting the IED threats (Task Force ODIN 2009) is similar in performance to an LCS as a flexible Hub, Bridge, Router, and Gateway in an LCS-centered, manned-unmanned force.

Such an LCS force operating in cyber-physical space will combine physical and cyber “maneuvering”. The goal for maneuvering is not only to achieve better attack or defensive positions but also to comprise a better network within the LCS modular architecture. Here are two options:

  • Directionality of physical links in the cluttered environment of littorals. For the most part ship-to-ship networking is now dominated by omnidirectional communications. In the cluttered environment of a littoral battlefield, when an intentional enemy attack or unintentional neutral or friendly force interference is highly probable, the usage of highly directional, quickly switching links, from laser to 1.2-5.8 GHz mobile ad hoc network (MANET) radio platforms could make the difference between success and failure. It is physical space maneuvering, by getting “close enough” electronically through fast switching of highly directional links.
  • Relatively swift physical movement by a LCS with its manned-unmanned vehicles to different locations. This is a traditional type of maneuver that creates a non-traditional function: an additional set of virtually undetectable relays and new links to support vessels for plugging them into the critical attack/defense data exchanges. It includes nested directional links to extend reach to one-hop neighbors and deceive the adversary. Within a few minutes the physical configuration changes, confusing the adversary by suddenly appearing at a new location, and seemingly as a new threat. Fast movement and grouping in tight clusters creates a temporary high data transfer rate cluster, in which scouting and firing data can be shared, or alternatively can create cyberspace honey pots deceiving the adversary’s countermeasures and foiling a cyber-attack on our assets.


We have described warfare as a twelve-function process in which our aim is to attack the enemy effectively before he can attack us. We have shown that the interactions of all twelve functions going on simultaneously are especially dangerous when one must fight and win in the confined, cluttered waters off a coast. Defense of ships is much harder than in the open sea where defense in depth is possible and in a relatively uncluttered ocean which has been the focus of the U.S. Navy’s successful campaign planning for decades. On the other hand, physical and electromagnetic concealment is easier in cluttered coastal waters. With practice, and aided by mesh networking, the U. S. Navy can learn to take advantage of the unique aspects of the littoral environment and take the offensive against enemy ships and aircraft.

Ship Chirstening PreparationsWe propose to shift Navy thinking from projection of power from a safe sea sanctuary to a new and different emphasis on offensive operations that forces the enemy to defend his warships and commercial vessels against our surprise attacks. We propose an operational and tactical concealment that compels the enemy to be ever-ready for our surprise attacks from above, on, or below the coastal sea surface at times and places or our choosing.

We then assert that the command and control process is the central one that does the most to coordinate the six processes our commander controls while simultaneously he attempts to confound the six processes under enemy cognizance. We wish to enhance our power of command and control with a mesh network that is hard for the enemy to detect and take actions against. We illustrated with some specific ways to do that – all of which ways are ready for experimentation at sea.

Our fundamental conclusion is that until we deploy and become proficient with technologies that permit mesh networking, the U.S. Navy will not be ready to fight successfully in the cluttered waters off enemy coasts. We urge that the Navy advance quickly from experimentation with mesh network technologies to new combat doctrine, and then to training and proficiency, in order to restore our ability to go wherever and whenever needed against any 21st Century enemy who is aided by precision tracking and targeting, and has also practiced stealthy surprise attacks at sea. We urge a perspective that takes distributed lethality to sea with offensive tactics to force the enemy to respond to attacks when the choice of time and place is not his, but ours.


Hughes, W., Capt USN (Retired), (2000) Fleet Tactics and Coastal Combat, Naval Institute Press, Annapolis, MD.

Bordetsky, A., Dolk, D. and Mullins, S (2015) Network Decision Support Systems: A conceptual Model for Network Decision Support in the Era of Social and Mobile Computing, Decision Support Systems (In Review).

Bordetsky, A. (2015) Networks That Don’t Exist, CALCALIST Newsletter.

Bordetsky, A. and Dolk, D. (2013) A conceptual model for network decision support systems. Proceedings of the 46th Hawaii International Conference on System Sciences, (CD-ROM), IEEE Computer Society Press.

Bordetsky, A. (2012) “Patterns of Tactical Networking Services,” in: Anil Aggarwal (Ed.) Cloud Computing Service and Deployment Model: Layers and Management, IGI, 2012.

Comer, D. (2014) Computer Networks and Internets, Sixth Edition.

Ball, A. Task Force ODIN,

TNT MIO After Action Report (2005-2010): , Naval Postgraduate School, Monterey, CA.

Shrivathsan, S., Balakrishnan, N., and Iyenger, S (2009) Scalability in Wireless Mesh Networks, In: Sudip Misra (Ed.) Guide to Wireless Mesh Networks, Springer Publishing Co.

[1] Some readers will be reminded of John Boyd’s famous OODA loop. It is a useful benchmark for those who are familiar with it.

[2] W.P. Hughes, Jr., Fleet Tactics and Coastal Combat, 1999, Naval Institute Press, pp 174-177.

[3] Ibid pp 40-44; pp 180-202.

AING-hominy-grits-2_sql few years back, a group of psychologists ran some tests on groups of first-grade students in the U.S. and in Japan. The researchers gave each group of students an impossible math problem, then sat back to watch how long the kids worked on the problem before giving up in frustration. On average, the groups of American kids worked at it for less than 30 seconds before quitting. The Japanese kids, however, worked and worked on the problem; each time, the researchers cut them off after an hour and told them that the problem was impossible to solve. The take away: the American kids quit at the first signs of frustration because they were not used to hard work, while the Japanese kids were determined to gut it out. One set of kids showed grit, the other set did not.

Do we have grit as a nation? Have we lost it? If so, can we regain it somehow?

When I think of Americans with grit, I think of Louis Zamperini, Anne Hutchinson, James Stockdale, and Sojourner Truth. I think of people like my great-grandmother, who successfully raised seven kids (two of them severely disabled) during the Depression. Grit reminds me of families surviving the Great Depression, the Johnstown Flood, or Hurricane Camille, through extreme suffering and severe hardship, even when all hope has been taken from them. Grit tells of men and women facing seemingly insurmountable obstacles yet digging in and persevering, pushing hard in the face of incredible odds and demonstrating courage even in the face of death.

Images like these tend to belong to events in our collective past. To anyone who is a parent or has served with Millennials, the idea that American kids today suffer from a lack of grit may be very familiar. We are constantly bombarded with the idea that American youth today consists primarily of entitled, coddled, self-absorbed individuals who don’t understand what hardship or hard work is. By this narrative, Americans—especially Millennials—are spoiled, lazy creatures consumed with ridiculous first-world problems who are growing into ineffective adults because they have been raised without taking risks and with the ease of the internet at their fingertips, all while being coddled by helicopter parents. They are used to getting info and materials instantly, can’t talk or relate to others on a personal level because all they know how to do is text, need trigger warnings before hearing harsh words, and don’t understand suffering or deprivation. And they are self-absorbed, expecting others to be interested in the inane details of their lives while constantly putting on a show of how enlightened and amazing they are (a la White Savior Barbie). Generation X is certainly not immune to these same criticisms, but the focus has been particularly harsh for Millennials.

Similar observations also come from long-term educators. School administrators complain about the worrisome changes they have seen in incoming students, whose parents are overly involved in the minutiae of their children’s lives. Camp counselors tell stories about kids who have to call home every day, or who wouldn’t make decisions for fears of choosing the wrong answer. Senior military leaders grumble about the self-absorption of their young Marines and Sailors and question whether or not younger generations can work hard enough to keep our nation safe.

A 2007 study on grit, in fact, emphasized the critical role that individual grit played in determining whether or not West Point cadets would successfully complete their first summer, Beast Barracks.

I’ve got my own fears and questions about the future, and worry that my kids will be weaker adults since they are growing up in a more comfortable (entitled?) world than the one my husband and I came from. What happens to our military in the next two decades if the people who populate it are a bunch of unimaginative, coddled nincompoops who don’t know how to gut through a challenging problem? What happens to our country by 2050 if the women and men who will one day lead it can’t relate to each other as people and can’t lead their way out of a paper bag? What happens to my kids if they can’t function as adults?

But a few recent observations have made me reconsider these fears.

Last summer, I wrote on this forum about a trial run camp that my husband and I held in our town. While talking one afternoon with friends about everything we wanted to teach our kids, we realized that we learned many of those skills at OCS, TBS, USNA, and while turning from an immature 21-year-old into a junior officer. So we held a 5th-grade version of TBS, with a bit of other stuff thrown in. It was a resounding success—the kids loved it, we had a blast planning and running it, and the feedback was overwhelming. This spring, we’ve adapted our camp into an after-school program, and are partway into the first session right now. We are attempting to teach, test, and emphasize hard work, leadership, and teamwork, how to tackle complex problems, and to enable them to lead peers in an unfamiliar and at times demanding physical environment. In a way, we are trying to teach grit.

So far? The kids eat it up. They are hungry for more responsibilities, more challenges, and tougher stuff. They relish the struggle. One of the less-athletic kids gets anxious at the thought of anything physical and competitive, and grows worried before each event, but she keeps coming back and is hugely proud of her accomplishments. Another is deathly afraid of heights but is really excited each time he climbs up an obstacle, visibly proud of conquering that fear. It’s like this whole world is out there that they can’t wait to get their hands into, and once there they shine.

What we are doing, in many ways subconsciously, is weaving a bit of struggle into all that we do with the kids. Look back at that early classroom experiment on Japanese and American kids. One researcher noticed a key difference between Japanese and American classrooms: the Japanese teachers that he observed uniformly taught and emphasized struggle. They picked tasks that pushed their students beyond their current capabilities, then discussed how the hard work and struggle was part of the successes the students had when they had them. And that grit study that looked at West Point cadets? It also found that grit increases with age. Life will certainly hand us all some trials, and if we succeed and pass these trials, we tend to develop and use grit. So it does come along at some point to some of us. But why wait until poor habit patterns are set to learn hard work? Why don’t we teach hard work and struggle earlier, to set our kids up for success, so that when the real struggles come, they are more prepared?

As for fears that the ease, comfort, and “politically correct” nature of our kids’ world is uniformly bad for them, my recent experience at the Naval Academy Foreign Affairs Conference (NAFAC) has made me view those fears differently. During the conference, I worked with a group of about 15 college students, about half of them midshipmen. I didn’t know what to expect. But during the roundtables, I grew impressed with both the demeanor (incredibly civil and professional) and the level of foreign policy knowledge and awareness demonstrated by the college student participants. I don’t remember seeing anything remotely like that level of sophistication when I was the same age. And the ideas and solutions they proposed to problems facing the United States today were insightful and creative precisely because of the knowledge that each brought to that roundtable. Maybe all of that internet stuff played a role, and maybe the greater emphasis on manners—or political correctness, to some—did as well.

What if that education, ease, and internet accessibility helps future leaders cast a wider net in the hunt for workable solutions? Compare it across generations: when given a task in elementary school, I had the local library and my parents’ old Encyclopedia Britannica to search through. But my kids, they will have the world. More knowledge and more information = more alternatives and more solutions. How is this not good?

So I believe that we can teach grit, and we can do it by building struggle into school, work, and daily tasks in imaginative ways. We can ensure that young people are allowed the gift of failure, a gift that for most of us will keep on giving. And we can expand our ideas of learning, fully embracing the wealth of information available to people today. The sooner we give that gift, and enable those struggles, and rethink what it means to teach and to learn, the more mature and grittier America can be.

Today’s cyber world is getting more complex. For those charged with ensuring information systems remain secure the question remains – how can we be certain we are taking the right actions when we continually hear of systems penetrated, information stolen, and resources plundered due to nefarious cyber actors? Is our confidence in our cybersecurity efforts based on reality or something else? In Thinking, Fast and Slow, Nobel prize winner Professor Daniel Kahneman explores the manner in which we think. To ensure cybersecurity efforts will be successful, we must first understand how we think, and how the way we think impacts our ability to bring about real cybersecurity improvements.

110524-N-GS507-210 PENSACOLA, Fla. (May 24, 2011) Students from the Center for Information Dominance (CID) Corry Station, Cryptologic Technician Collection Seaman Recruit Ben Lowden, of Brownsberg, Ind., Cryptologic Technician Networks Seaman Apprentice Alicia Sutliff, of Jacksonville, Fla., and Cryptologic Technician Technical Third Class Steven Tometczak, of Reno, Nev., preview the Integrated System for Language Education and Training program (ISLET), which is being tested by the CID-based Center for Language, Regional Expertise and Culture (CLREC) and the Academic Consortium for Global Education (ACGE). Conceived as an alternative to traditional computer-based training and classroom instruction, ISLET employs online social networking, interactive role-play, competitive gaming and speech recognition to create an immersive environment for collaborative learning. (U.S. Navy photo by Gary Nichols/Released)
Students from the Center for Information Dominance (CID) Corry Station (U.S. Navy photo by Gary Nichols/Released)

Thinking, Fast and Slow Concepts

In his book, Professor Kahneman addresses the two ways we think. Thinking Fast, identified as System 1, is how we quickly and easily put limited information together to tell a coherent story. Thinking fast is hardwired into our DNA. It’s what gives us our gut feeling which will keep us safe in some instances. Thinking Fast is what we are doing when we breeze quickly through new articles, like this one, looking for information that is familiar, instead of trying to figure out if the concept really applies to us.

Thinking Slow, identified as System 2, takes serious mental effort. Thinking slow enables us to be factual, challenging accepted beliefs with all available evidence. Thinking slow is what gives us self-control, like not indulging in too much chocolate. Thinking slow takes real effort, which is why it is difficult to do all the time, or when we are fatigued. Thinking slow is what is necessary to grasp new concepts.

The unfortunate reality is we are all “lazy thinkers.” We rely on fast thinking for the large majority of activities in our lives. In many instances that is perfectly acceptable. In familiar situations, where we have a lot of experience, thinking fast usually works fine. However, in unfamiliar areas, thinking slow is what is needed in order to succeed. The complex and challenging world of cybersecurity is just such an area where it is critical to understand how our thinking could mean the difference between success and failure.

Two concepts brought forth in the book are critical in identifying where fast thinking can lead us astray. Those concepts are What You See Is All There Is and Cognitive Ease.

What You See Is All There Is (WYSIATI).

“System 1 (fast thinking) is radically insensitive to both the quality and the quantity of the information that gives rise to impressions and intuitions.” When we are thinking fast we tell ourselves a story that supports a specific belief. In creating this story, we grab whatever information will support a belief and don’t consider anything that may refute it. We are content with What You See Is All There Is (WYSIATI). Our ignorance of other evidence, which may be of greater quality, allows us to remain in bliss. “Contrary to the rules of philosophers of science, who advise testing hypotheses by trying to refute them, people (and scientists, quite often) seek data that are likely to be compatible with the beliefs they currently hold.” WYSIATI is fast thinking, and in the world of cybersecurity, this fast thinking can result in having faith in actions that do little to improve cybersecurity. Unfortunately, WYSIATI has a fast thinking partner in crime that also conspires to keep us ignorant. That partner is Cognitive Ease.

Cognitive Ease

Cognitive Ease is simply how easy it is to retrieve a thought from memory. Something we have heard or thought on many occasions will be retrieved more easily from memory. The easier it is to retrieve something from memory gives greater confidence that the belief is true, although the reality may be the exact opposite. For example, you could be performing a certain “best practice,” like patching software or upgrading operating systems. Labeling something a “best practice” can make you think this practice has been shown through data and analysis to result in significant improvements. However, if the initial conditions are different than those considered when developing the “best practice,” this “best practice” may only result in wasted resources. Regardless of the reality, the more you recall the “best practice” from memory, along with the story that you are performing it to improve cybersecurity, the greater your confidence will be that the best practice will improve cybersecurity. WYSIATI and Cognitive Ease are truly super villains. The super hero with an “S” on its chest that can save the day is Slow Thinking.

Slow Thinking to the Rescue

Slow thinking is what is necessary to end storytelling and discover the truth. Slow thinking is about reframing the problem in order to find information that can challenge existing beliefs. As slow thinking uncovers new and better information, Cognitive Ease will remind you of your confidence in prior beliefs. Your gut will be telling you that no additional information is necessary (WYSIATI). Slow thinking is what will give you the self-control to fairly assess the new information you have discovered.

Fortunately, the Department of Defense has leaders who encourage slow thinking. The Department of Defense Cybersecurity Culture and Compliance Initiative (DC3I) was signed in September 2015 by Secretary Carter and General Dempsey. The DC3I is based on “five operational excellence principles – Integrity, Level of Knowledge, Procedural Compliance, Formality and Backup, and a Questioning Attitude.” Similarly, in his Principles of Better Buying Power, Secretary Kendall instructs us that, “Critical thinking is necessary for success,” and we should “have the courage to challenge bad policy.” These three DOD leaders are asking us to think slowly. This article will examine three separate areas; Cybersecurity Training, Our Cyber Adversaries, and The Certification and Accreditation Process, to illustrate how slow thinking can lead to improved cybersecurity.

Cybersecurity Training

In order to utilize slow thinking to improve cybersecurity, we must first be able to recognize where we are thinking fast. Cybersecurity training is an area that can clearly illustrate the difference between fast and slow thinking.

A typical approach to training on cybersecurity is to track the percentage of people trained in a particular cybersecurity area. As the percentage of people trained goes up, then the cybersecurity readiness of the workforce is assumed to be improving. This is a perfect illustration of WYSIATI. Limited information has been put together to tell a coherent story. In order to determine if the story is fact or fiction, slow thinking must be used to actively look for information that can confirm or deny the assertion that training is improving cyber readiness.

Unfortunately, there are a number of potential flaws to the assertion that training is improving cyber readiness. The training could be incorrect or inadequate. The training may not actually provide the workforce with skills required to improve cybersecurity. The workforce may not take the training seriously and not actually learn what is covered by the training. In some cases, knowing what to do isn’t enough to ensure the correct actions are taken. In the area of spear phishing, which is still the most common way malicious software enters information systems, a person must first be able to recognize a spear phishing attempt before they can take the appropriate actions. Even if spear phishing training provides a number of examples of spear phishing attempts, when people are tired, or in a rush, or possibly just don’t believe they will get spear phished, the chances of them taking the correct actions are not good.

Now, compare training on spear phishing to actively spear phishing your employees. If your employees know they will be spear phished, and held accountable for their performance, then they will be more on the lookout for suspicious emails, whether they are actual or training spear phishing attempts. By actively testing your employees with quality spear phishing attempts, you will compile real data on how the workforce is responding to this threat, and be able to provide additional training for those who aren’t. Training on spear phishing is like reading a book on running. Actively spear phishing employees would be like timing your employees for a run around a track. One is a Fast Thinking story. The other is Slow Thinking reality. Unfortunately, as illustrated by Professor Kahneman’s book, our default response in most situations is fast thinking. This can be especially true in circumstances where we have a problem that we are desperate to solve. We look for information that supports our success, and fail to look for, or disregard, information that would tell us we aren’t improving.

Outside Secretary Kendall’s door is a sign that states, “In God We Trust; All Others Must Bring Data.” One of his Better Buying Principles is “Data should drive policy.” In this circumstance, the data that we seek isn’t the simple, fast thinking question of how many people have been trained; it is the more difficult, slow thinking question: are our cybersecurity training efforts improving cybersecurity readiness? Only through slow thinking will we obtain meaningful data to drive policy and our cybersecurity efforts.

Our Cyber Adversaries

The SONY attack, the OPM breach, the Target theft, Edward Snowden, Private Manning – all involve information destroyed and stolen, resulting in the loss of millions of dollars. The cyber threat is certainly real, as the incidents above all attest. Unfortunately, the above incidents, and the press coverage that brings these threats repeatedly to mind, can lead to the perception that any system can be exploited by our adversaries at any time. As we learned previously, thoughts that are repeatedly brought to mind are more easily remembered, which Professor Kahneman describes as Cognitive Ease. In the world of cybersecurity, Cognitive Ease can make us quite confident that every single system can easily be exploited by any random hacker. With limited time and resources to address every system, it is critical to gain a clear understanding of how vulnerable systems are, and the impacts that can result if systems are exploited. If we attribute capabilities to adversaries that they don’t have, or install unnecessary protections in systems that aren’t at risk, we not only waste resources, but we continue to remain ignorant of the actual threat to our systems. Let’s see if we can do some slow thinking on the challenges faced by our cyber adversaries.

Eliminating the Fog of War

Cybersecurity firms often demonstrate the damage that could be done to information systems if hackers got control of them. What needs to be recognized is that the people performing these demonstrations have full access to system documentation, the system itself, and can run tests repeatedly until they get a desired effect. These demonstrations are a perfect example of WYSIATI. The people performing these demonstrations would have you believe (and often believe themselves) that If these demonstrations can be done then surely our cyber adversaries can do the same thing. The problem with demonstrations like these is that they eliminate the Fog of War, the uncertainty that is pervasive in almost every aspect of warfare. For our adversaries the challenge is much greater. System software and hardware configurations are constantly changing, so even if adversaries have system documentation, that information often very perishable. How will our adversaries know if that configuration is still in the Fleet? How will they locate a system that has that specific configuration so that they can test to see if their cyber-attack will work? How will they conduct the test in a manner that won’t tip off their adversary (us) about a potential vulnerability? How will they gain the necessary access to test out the attack? If they are able to locate the system, and attempt to perform their attack, how will they get the necessary feedback to understand why a test may have failed? These cybersecurity demonstrations show what is possible – with perfect knowledge, perfect access, and perfect conditions. What they don’t address is what is probable. Every step in the enemy kill chain is assumed to be perfect, which can then, of course, generate extremely significant consequences. Under those conditions, tremendous damage can be caused in non-cyber areas as well. For instance, any of our fighter planes would cause an amazing amount of damage if it was crashed into a carrier by an insider threat pilot. While everyone would admit that is certainly possible, we all recognize that the probability of that occurring is extremely low so we don’t waste valuable resources trying to create technical systems that could stop a rogue pilot from crashing their plane. In order to obtain value from our cybersecurity efforts we must understand all the challenges our adversaries must overcome. We must not focus on what is possible and then try to fix every associated vulnerability. We must use slow thinking and improve our understanding of what is probable in order to best utilize limited resources.

The Certification and Accreditation Process

The Department of the Navy spends a lot of time and effort on certifying and accrediting information systems to ensure information systems have a certain level of cybersecurity. The WYSIATI approach to certification and accreditation is simply that by using this process, and tracking the correction of system vulnerabilities, then information systems will become more secure in terms of cybersecurity. Systems that are certified and accredited are better off in terms of cybersecurity than systems that aren’t.

Once again we have a fast thinking coherent story that seems to makes sense. Let’s now willingly look for information that can compete with this story. In his book, Professor Kahneman describes an approach to enable Slow Thinking called a Pre-Mortem. The Pre-Mortem is an intellectual exercise done prior to committing to a major initiative that challenges people to think about how the initiative might fail or make things worse.

A pre-mortem for the certification and accreditation process might predict that the process could fail by taking such a long time that it significantly delays the implementation of cybersecurity capabilities. The pre-mortem could predict that due to unclear requirements and untrained personnel the certification and accreditation process might generate very little improvement in cybersecurity, wasting precious resources on something that is primarily a paperwork drill. In this situation, since the C&A process has been in place for a number of years, we can look for indications that support these predictions.

Little value for the effort.

The Naval Surface Warfare Center (NSWC) at Dahlgren, Virginia is just one of the Navy’s centers for innovation. In 1920, only 17 years after the Wright Brothers flew at Kitty Hawk, engineers at Dahlgren launched the first remote control airplane. The plane crashed, but the boldness of such an effort, so soon after the first manned flight, is striking. Innovation remains a constant pursuit by the men and women who serve at Dahlgren NSWC today.

Recently, four of Dahlgren’s engineers, with combined experience of more than 100 years, noted their concern with the certification and accreditation (C&A) process. Over the course of 18 months they examined the resources and time required to get 43 information systems processed through the C&A process. These packages took 33,000 hours of work for a cost of $3.5M, and in the end all of the information system packages were certified. Yet all that administrative work only generated one minor technical issue that needed to be corrected. $3.5 Million worth of time and effort generated almost no changes to the systems in question, and took talented engineers away from the process of innovation, research, and development which our country needs them to be doing.

Forgetting the Commander in Situ

The “Commander in Situ”, which stands for the Commander in the Situation, is a military term that recognizes it is the Commander actually on scene, or in the situation, that has the best understanding of what is going on and what needs to be done. This principle has been evoked over the years after horrible mistakes have been made by those far from the scene who tried to order what must be done with imperfect knowledge of the situation. “Commander in Situ” is all about decentralized control, leaving control to those with the best information.

Unfortunately the C&A process is a very slow, centralized process that pushes information system packages through to one approving authority. What should be recognized is that the farther the approval chain gets away from the system requiring certification, the less knowledge and understanding decision makers have regarding the system in question. In many cases, the people who make the final decisions for approval don’t have any technical expertise on the systems they are approving. System experts have to educate those who give final approval of their system. In cases such as this, decisions that could be made, literally, in minutes by the local experts, have taken over a year to run through the certification and accreditation process. The lack of local authority for cybersecurity matters is quite stunning. For example, the Dahlgren Naval Surface Warfare Center is one of the few organizations in the United States that has the authority to handle the Anthrax virus. Dahlgren can also handle and detonate ordnance up to 10,000 pound bombs. Yet if engineers at Dahlgren want to connect a new microscope to a standalone laptop, that requires a process that can take over six months and requires routing paperwork through four other organizations to gain the necessary permission.

The Illusion of Authority to Operate

When an information system successfully completes the certification and accreditation process it is provided an Authority to Operate (ATO). The ATO authorizes a particular information system for operations, normally for a period of three years. So at two years and 364 days from the date the ATO is provided the system is still good, yet two days later these systems are no longer acceptable for operation. In some instances, when a system is deemed to be at higher risk, an Interim ATO is granted for a period of six months or less. How the length of the time periods of the ATOs are linked to reality is not clear. These information systems are being treated like cartons of milk with expiration dates. While we know the science behind why milk goes bad, there is no science behind why an information system should have an ATO of three years, two years, or six months. This is just a story we have been telling ourselves.

Disregarding Design Thinking

The movie The Imitation Game details the story of the United Kingdom’s efforts to solve the Enigma machine – the encrypting machine the Germans used during WWII to send messages. The movie pits Professor Alan Turing against a group of mathematicians and code breakers. Each day, the mathematicians and code breakers scribbled furiously on paper in order to try to break the code, and each day they failed. Professor Turing was an early practitioner of design thinking. He realized he needed to design a solution that would be a good match for the problem at hand. Professor Turing eventually solved the Enigma machine by creating a machine to do it. Unfortunately, like the mathematicians and code breakers in The Imitation Game, our certification and accreditation process is a slow, centralized, and bureaucratic solution, which is unfit for the very fast, decentralized problem of cybersecurity.

The examples and concerns I have brought forth above are not intended to blame or criticize, but instead to engage in the type of critical thinking that DoD leadership has encouraged us to do. In our efforts to address current cyber challenges we are all on the same team. The examples above are meant to illustrate the concepts of fast and slow thinking in order to best address these significant cyber issues. A fast thinking response to these concerns would be to dismiss them or dispute them. A slow thinking approach would be to willingly investigate them and try to confirm them. New processes should be developed for those concerns that are confirmed.

High Velocity Learning

Recognizing that we must respond to a changing global environment, in January 2016 the Navy issued A Design for Maintaining Maritime Superiority. In the document four lines of effort are established, one of which is to “Achieve High Velocity Learning at Every Level.” The objective of this effort is to “Apply the best concepts, techniques and technologies to accelerate learning as individuals, teams and organizations.” Our Chief of Naval Operations, Admiral John Richardson, has made it clear that the US Navy will be a learning organization. But to accelerate our learning we must first understand how we think. In the end, we should recognize that what we need to effectively address our cyber challenges, as well as achieve high velocity learning, is slow thinking.

The above views are solely my own and have not been endorsed by the Navy. All quotes are from Thinking, Fast and Slow by Daniel Kahneman, a tremendous book that I highly recommend.


12948e232c6112544b98d11a051008aeSmart people in the last few years expended a lot of effort asking the question, “Where is our strategy?”

From “Pacific Pivots” to “Offshore Balancing” to “Leading from Behind,” as a culture, the national security chatterati and professionals have been grasping for a good “Ref. A” that looked like anything close to strategic thought – even if in reality some of them are only rough operational concept outlines.

As such, heads turned when CNO Richardson announced last week,

Adm. John Richardson, the current CNO, is seeking to accelerate learning and information processing and reportedly has decided the eight months each group takes to study a problem and generate a report is too long. On March 30, he directed retired Vice Adm. Phil Wisecup, the current SSG head, to stand down the group after the current team completes its work.

As a backgrounder,

The CNO Strategic Studies Group (SSG) at the US Naval War College in Newport, Rhode Island, has been working on particular CNO-directed topics since 1981. The group, according to the Navy, is tasked only by and reports directly to the CNO.Organized each year with about 18 to 22 members, many of whom are considered bound for flag rank, the SSG is thought of as a concept demonstration team, often taking on topics that could have great potential but are not being pursued in other Navy organizations. Study topics have included the integration of rail guns into operational concepts, the convergence of cyber power and sea power, and the development of synthetic fuels.

With a name like “Strategic Studies Group” and such a pedigree, one would think in a time of flux that would not be a body that the CNO would want to get rid of. Give all the squid ink about “speed” a pass and look a bit deeper on why we would do such a thing.

Why would the CNO decide it was no longer value added? I think the answer is a simple one; the product.

Such an organization produces a poor product for one of two broad reasons, neither are comfortable to talk about in the open.

1) The Process: this is what the CNO mentions as “speed.” Process is also the easiest thing to fix. Why was this not looked at in detail first? Too hard? Really not. That is what leads me to the next reason.
2) The People: if the people in the Flag holding pen are really our best and brightest, what was it about the SSG that produced such ossified thought to the point it was negative help? What does that say about either how we direct the energies of our talent, or the talent we are selecting? Those are uncomfortable and hard questions that make enemies, but they are ones that have to be asked.

This is not a process issue. Nuclear trained Admirals can fix process. The smart money is on a people problem, and that should worry us all.

As one highly respected professional told me,

SSG has been slowly descending into irrelevance, a holding pond for a bunch of post major command guys to give them a veneer of being smart guys, but the products have become increasingly vanilla. Sort of a wasted exercise where the CNO sends a really tough and important question up to Newport and nine months later the answer … comes out the other end (and sucked). I have given up reading their final reports a few years ago, a waste of time, but still three guys were selected for flag out of there in the past few years.

Why are our best and brightest producing inferior produce, and being rewarded for it? That too is a question we should want an answer to.

In 2010, author Michael Lewis wrote The Big Short: Inside the Doomsday Machine. It has since become a major motion picture.The-Big-Short-book-cover

The plot unfolds around the creation of the credit default swap market that “shorted” the collateralized debt obligation (CDO) bubble, precipitating the housing crisis and global financial collapse of 2007. The book describes a private financial and government regulatory system so blind to its own vulnerabilities that it trundles towards failure of epic proportions.

Lewis points to three key enablers of this collapse:
1) A system so large and convoluted that no one truly understands it
2) Individuals who act in self-interested stovepipes to protect their specific aspect of the system
3) Lack of adequate, appropriate oversight

The global financial collapse of 2007 resulted in trillions of dollars of lost savings, pensions, and home value. It affected the lives of millions and has fundamentally altered the way Americans interface with their economy.

There is another system in our nation that shares similar characteristics. The military acquisition system is the elephant present in every room in Washington, DC; its success or failure affects every dollar we spend and every man, woman, and child in America. If the housing bubble affected the lives and livelihoods of millions, we can only surmise the deleterious effects that the acquisitions bubble could have on global security.

We must fundamentally examine the acquisitions bubble and how we can avoid it, before it is too late.

Shorting the System

In The Big Short, Lewis tells the stories of the individuals who predicted the housing collapse and “shorted,” or bet against, the market. These were men and women who profited off the bad business practices of banks and hedge fund managers.

When considering the military acquisitions system, it is our current and potential adversaries who are betting against us. Those who “short” the system include both small-scale organizations who employ inexpensive, low-tech methods to sabotage our forces, and large nation-states who are engaged in a broader game of geopolitical Risk with the United States.

As mentioned earlier, those who leveraged the housing bubble operated with three key enablers at hand. These are the same characteristics that our adversaries will continue to use as they leverage our military acquisitions system against us:

1. A system so large and convoluted that no one truly understands it.

DoD has an entire college–“Defense Acquisition University”–that includes both physical and online classes on the subject of military acquisition, technology, and logistics. Its website estimates the total number of individuals it services each year in the acquisition system at more than 150,000, a figure that represents but a fraction of the whole.

Tens of thousands of men and women, both in uniform and out, work on the subject in the National Capital Region alone. These folks work in small cubicles with water coolers and locked doors. The DoD budget that they each have a small hand in preparing heads to Congress at more than 500 pages each year.

No one–especially not this author–could accurately describe each stakeholder or step of the military acquisitions, technology, and logistics process. Unfortunately, this means that no single person could point out its inefficiencies or effectively propose improvements.

2. Individuals who act in self-interested stovepipes to protect their specific aspect of the system

The men and women wearing the cloth of our nation, far from our shores, are our nation’s true heroes. They work hard in conditions and at tasks that would make the rest of the world blanche.

But decisions are not made on the front lines, in the cockpit, or on the bridge. They are made in office buildings with air conditioning and snappy internet connections. They are made by both military staffers and civilian bureaucrats.

Too often, these offices succumb to what you might call “9 to 5 syndrome.” Many are of the mind that the job they were hired for has definite conditions, and they will work no longer than is necessary to meet only the minimum requirements. Any further issues that arise outside of these hours or requirements are “not my problem.”

Likewise are those that see a problem–incorrect information being passed up the chain, an erroneous analysis, unjustified assumptions–and do nothing. Why? “It isn’t my job.” “I wouldn’t know who to talk to about that.” “I don’t want to make any waves.” People fear for their employment, their financial stability, and their perceived reputation in the workplace more than they fear incrementally adding to the entropy of the system.

These aren’t necessarily behaviors that you could discern from a workplace survey. It is much easier to hide behind the anonymity of the computer screen, ignore our real problems, and react with dismay when the wheels start to fall off the bus.

3. Lack of adequate, appropriate oversight

Beltway Insiders refer to the “Iron Triangle” as the relationship between Congress, the military, and industry. Through the lens of the acquisition bubble, however, let’s take a closer look at each corner of this shape:Dr._Strangelove_-_The_War_Room

-A Congress with an approval rating hovering near 10%, in an environment hostile to incumbents and financially costly to challengers

-A military with a joint staff that each of the services scoff at, with the term “joint” or the color “purple” disparaged, handling oversight of the acquisitions process

-Industry beholden to investors who are looking for profit and short-term gain

This is a reality that has existed for decades. A system that should be designed for mutualism, where the actions of one benefit the other, has instead manifested as parasitic, where each actor seems to be negatively impacted by the actions of the other.

Each of the stakeholders in the Iron Triangle is responsible for the oversight and proper regulation of the military acquisition system. But in an environment where Congressmen are more apt to pass a funding bill that includes jobs and money for their individual districts; where industry advances projects that further their bottom line the most; and where the DoD serves up an amalgamation of individual service plans rather than a comprehensive strategy, oversight and regulation are fundamentally broken.

Now, more than ever, we should remember the words of a former president: “Our problems are man-made; therefore, they can be solved by man.” We must get beyond all of this; we must eliminate our excuses. The health of our Republic and the continued success of our men and women in uniform depends on it.

No Easy Way

The slow devolution of our acquisition system is the result of an unchanging bureaucracy that is grinding to a halt in the Information Age. As the pace of the world quickens around us, our system is growing more and more inefficient. At times, it is both too easily taken advantage of and not easy enough to engage; it is both too deliberative and not deliberative enough. Yet we continue to lurch towards multi-billion dollar platforms and continued inefficient policies, unable to stop this carnival ride we are on.

Hindsight has a way of making things look more obvious than they appeared at the time. Perhaps the system is helped in some way by the notorious bean counters and turf protectors that seem to stove-pipe problems and sabotage solutions. Perhaps the American acquisition machine will continue to slog on, unabated. But as we come upon our fourth post-Cold War decade, it is alarming that our systems and processes are becoming increasingly Soviet.

One of the most obvious solutions is to foster strategic thought, understanding, and literacy in military and civilian agents of DoD at a much younger age. Mark strategic aptitude early and enable groups of these hard workers to actually influence policy and lead change within government. There are plenty of outstanding strategic leaders across DoD, but we can do much more to enable our strategic enterprise as a true meritocracy, rather than a “tenure-ocracy.”

There are already cohorts fulfilling these roles in their own personal capacities, such as the Defense Entrepreneurs Forum and similar service-based groups of junior officers, enlisted, and civilians. We should further these groups to include true coalitions of service, Congressional, and industry staffers and leaders who can come together to solve problems instead of going through the motions of decorum and paying lip service to real issues. But to date, both Congress and service leadership has reacted with scorn to these possibilities, seeming to validate problem #2 on our list above.

At the end of the day, no matter how many bits of data or inches of type-block this article takes up, there is no silver bullet solution to the military acquisitions bubble. There isn’t a 5-point plan or a CONOPS capable of the kind of course correction needed.

There is simply this:

If we got every stakeholder and decision-maker, from the lowest ranking uniformed service member to the highest ranking civilian and industry leaders, into one room at one time–with a Congress and President ready to vote and sign whatever came from such a meeting immediately into law–could we task them to build a system around answers to one question:

“What would you do differently if you knew you couldn’t be fired and you couldn’t fail?”

And how do we get them there? How do we press the “reset” button on doing the right things?

Time is of the essence: before the acquisitions bubble pops, and we are left with a tragic sequel to The Big Short.

hitchhikerHow did we get here, to this place pointed out to us by Kyle Jahner at ArmyTimes?

Army Chief of Staff Gen. Mark Milley has repeatedly complained about the convoluted, slow and expensive acquisitions process, and cited the Modular Handgun System program as a glaring example.

“We’re not figuring out the next lunar landing. This is a pistol. Two years to test? At $17 million?” Milley said to an audience at a Washington, D.C., think tank on March 10. “You give me $17 million on a credit card, and I’ll call Cabela’s tonight, and I’ll outfit every soldier, sailor, airman and Marine with a pistol for $17 million. And I’ll get a discount on a bulk buy.”

Leadership; that is how.

It all starts in Congress, of course, but the uniformed services have much of the blame to share along with them. As warfighters allowed themselves to transmogrify in to simple fonctionnaires – so we find ourselves at this point.

Through the years allowed ourselves to become numb to the various habits, regulations, instructions, regulations, and laws that have layered us like so many beggarweeds on a long-haired spaniel after a run through a fallow field in summertime.

Each little part can be traced back to someone’s good idea made flesh, or an attempt to prevent fraud, waste, abuse, or the hobby-horse of a pushy and ill-informed leader advocating a program no one wants. Each bit accumulates, but no part leaves.

We also have the sad effect of allowing leadership and integrity to be substituted by paperwork and process. We exist in a world where it is common and accepted practice to say, “The right thing is to do X, but IAW OPNAVINST 1313.99Xy, Section IV, para 1.A.(2).g.iii, we can’t.” Always with the royal, “we.”

As even a small and simple thing as a pistol takes an absurd length of time, we attempt to jump generations of developments to compensate – and as we see time and time again from A-12 to DDG-100 to a replacement for the M-16 and the 5.56mm – we fail in the face of the green eye-shade.

What to do? I think General Milley has shown the way. Within acceptable guidelines, point out publicly with a bit of scorn and sarcasm, the system we have been given mostly by those wearing civilian suits. Fix what we can, shame what we can’t.

Even before the submission deadline last month, the road to a new pistol has been long and winding. In 2008, the MHS started as an Air Force program. But little progress was made before January 2013, when the Army kick-started the latest efforts by asking industry for more information. Additional discussions with industry drew out the release of the 350-plus-page document until August 2015. Then the solicitation’s deadline for submissions was Feb. 12 of this year.

As defined before, this timelineis 1.6 WorldWars. Six years just to submit a solicitation.

Congressman Thornberry; over to you.


Secretary of Defense Carter’s message to the DIUX team

In 2015, innovation initiatives took center stage at the Department of Defense (DOD). The U.S. Navy, for example, stood up its Task Force Innovation, and the Office of the Secretary of Defense (OSD) created Defense Innovation Unit Experimental (DIUx), an innovation nexus in Silicon Valley. These efforts signal innovation’s place in reversing the erosion of DOD’s technological edge.

However, with all eyes on defense innovation, there is an increased danger that it will succumb to buzzword fatigue—a condition brought about when a word has been so exhaustively used that no one knows its original intent or ultimate purpose. DOD is rife with examples: net-centric warfare, transformation in military affairs, and effects-based operations. To the cynic, innovation is just another buzzword that will come and go.

For those of us who believe in defense innovation, we want to move past the buzzword hype and make innovation a normal part of doing business. So how is this done? There are, of course, things that should be done at the staff level, which I discussed in my previous article, but shaping a climate of innovation rests with the DOD leadership.

160316-N-BU440-025 SAN DIEGO (Mar. 16, 2016) Audience members listen to opening speeches at the Innovation Jam hosted aboard Wasp-class amphibious assault ship USS Essex (LHD 2). Commander, U.S. Pacific Fleet’s (PACFLT) Bridge Program welcomes the Space and Naval Warfare Systems Center Pacific (SSC Pacific) Innovation Jam, sponsored by OPNAV N4 Fleet Readiness and Logistics and the Office of Naval Research. The Innovation Jam showcase pioneering concepts and rapid solutions to the fleet by SSC Pacific, the Athena Project, Tactical Advancements for the Next Generation and the Hatch. Solutions to Fleet-centric war fighting challenges are showcased by some of the bright and creative PACFLT Sailors. One of the bright ideas will be selected for initial funding, development, prototyping and possible transition to Fleet-wide implementation. (U.S. Navy Photo by Mass Communication Specialist 2nd Class Molly A. Sonnier/Released)

SAN DIEGO (Mar. 16, 2016) Audience members listen to opening speeches at the Innovation Jam hosted aboard Wasp-class amphibious assault ship USS Essex (LHD 2). Sponsored by OPNAV N4 Fleet Readiness and Logistics and the Office of Naval Research, the Innovation Jam showcased pioneering concepts and rapid solutions to the fleet by SSC Pacific, the Athena Project, Tactical Advancements for the Next Generation and the Hatch. (U.S. Navy Photo by Mass Communication Specialist 2nd Class Molly A. Sonnier/Released)

Here are four actions that defense leaders can take to shape such a climate:

Define the purpose. An old proverb says that, “without vision a people perish.” A similar proverb can be applied to innovation—“without purpose, innovation flounders.”

The Innovation Cell at U.S. Forces Naval Southern Command, where I was a member, got direct tasking from the Commander, who clearly communicated our purpose: find creative, low-cost ways to support the Southern Command counter-narcotic mission. This purpose defined our boundaries and allowed us to use our creativity efficiently. Leadership provides clarity of purpose so that innovation is not for innovation’s sake.

Secure a perimeter. In 1981, Admiral Hyman Rickover, an innovative and controversial figure, gave a speech at Columbia University’s School of Engineering titled “Doing a Job.” He talked about management and the organizational environment that achieves results. What he described was, in effect, securing a perimeter for innovation to thrive. Rickover addressed the role that leaders play in creating and protecting a space where staff work to their maximum ability. Leaders actively guard employees in this environment from the fear of failure and risk-taking. This protected space allows employees freedom to collaborate, and encourages healthy confrontation and disagreement because the goal is progress, not conformity. This environment invigorates a workforce and drives people toward finding ways to say “yes” instead of the reflexive “no” that is too common at DOD these days.

Develop processes, but focus on people. Too many leaders focus solely on organizational processes to achieve innovation. The thinking goes that if it were for the right process, we could institutionalize innovation. This will never work. In their 1995 report to Mr. Andrew Marshall, the director of the Office of Net Assessment, authors Williamson Murray and Barry Watts detailed military innovation during the interwar period (1918-1939). Their findings showed that the marriage of organizational processes with the right people leads to successful innovation. Leadership at the time chose innovators like William Sims and William Moffett to navigate the processes of their day. The result was the birth of carrier aviation. Innovation was the result of the talent, energy, personality, and tenacity of these individuals.

This is not to say that processes should be ignored. Innovation requires processes to guide and bound the flow of ideas in an organization. But, ultimately, the processes are there to achieve results. Even the most heralded process is one short step away from a burdensome bureaucracy if the wrong person is in a position of oversight. Processes are important and necessary, but leaders must realize that sometimes the answer to a problem is a person.

Require progress. In her book, The Creator’s Code, Amy Wilkinson documents her research from studying and interviewing leaders of many of today’s most innovative companies (e.g., In-Q-Tel, LinkedIn). Her findings show a common thread across innovative leaders—the insatiable desire for progress. As Wilkinson points out, successful leaders maintain momentum by analyzing the data (i.e., where they’ve been and how it went) and changing their actions based on what they learn. That is, these leaders are always learning and always modifying. One leader characterized the process as “flexible persistence.”

DOD leaders should not be satisfied with answers from bullet points on PowerPoint slides. They should constantly ask questions that help them learn why things went wrong and why things went right. They must be comfortable modifying their approaches and programs based on what they learn; they must be quick to build on successes and to abandon failures. And when they’re done with that iteration, they must be ready to do it again—the process of flexible persistence. This continued drumbeat toward progress, not perfection, generates the organizational momentum that advances innovation.

The need for innovation will not go away when the buzzword frenzy has subsided. The global security landscape and proliferation of technology to potential adversaries will require DOD to be agile and forward-thinking. DOD has the resident talent within its workforce to meet these challenges, but the workforce will need leaders who can create and maintain an innovation climate. Leaders who can successfully cultivate that climate will ensure that innovation remains a normal part of doing business at DOD.

« Older Entries Newer Entries »