Archive for the 'Navy' Category
The June issue of Proceedings offered a call from CNO Admiral Richardson, and his speechwriter Lt. Ashley O’Keefe, encouraging naval professionals to engage with their service through the act of professional writing. The CNO has not discovered a new idea, but instead lends his voice to something a number of recent senior officers have called for, from Stavridis to Winnefeld. Even some “not so senior” officers have suggested the same. Others have written indications and warnings about the risks the voyage entails.
There have been a long list of professionals throughout our history who have participated in the development of naval affairs in this way, from Maury to Mahan, Nimitz to Zumwalt. And while the spark for this post came from the CNO and the Navy, the other services have a history here too: from soldiers in the 19th century to leaders like Patton in the 20th century. However, the repeated calls to arms over time, or perhaps calls to pens, have missed something. How do you do it?
Our Navy is a technically oriented service. This is also generally true of the other services to greater or lesser degrees. Our educational policies focus on engineering and technical study, and rarely encourage us to learn how to communicate in writing beyond a bare minimum. In our staff positions we use briefing slides and other communication methods which inspire partial thoughts, quick hits, and incomplete sentences and no concept of paragraph structure or style. For cultures raised on procedural compliance and powerpoint, what is the procedure for writing a professional article? Some simple steps inspired by the words in the Naval Institute’s mission can help set our course.
The mission of USNI is to:
Provide an independent forum for those who dare to read, think, speak, and write to advance the professional, literary, and scientific understanding of sea power and other issues critical to global security. [emphasis added]
The bold words are borrowed from President John Adams. In his 1765 pamphlet “Dissertation on the Canon and Feudal Law,” Adams examined monarchy and feudalism and compared them to the growing movement for freedom and liberty in the American colonies. The future president called for Americans who valued liberty to develop their knowledge, and their argument, by daring to read, think, speak, and write on the subject. It was a clarion call, but it also hinted at a certain amount of process. Adams was a careful writer and it is quite possible he put these words in a very specific order. Following his counsel can help professionals chart their process for developing an article which contributes to understanding of our profession.
In order to make a contribution to the field of military, naval, or national security knowledge, you have to know the state of the field. The way to do this is by reading. If you have come up with an interesting analogy for a current debate the only way to know if someone has made the argument before is by reading the field. If you wonder what counter-arguments may be against your position, that also comes with reading the field. Articles in journals like Proceedings, Military Review, or Naval War College Review, online publications like War on the Rocks and The Bridge, blogs like Next War, all contribute to the state of the field. Not only will reading them give you new information, and new ideas, but they also tell you what others have said before. It can save you from the embarrassing retort: “yeah, Lieutenant Commander Jones said it six months ago and had a better argument.” (Not that you have to be entirely original, but knowing the field helps you understand where you fit.)
It is not just articles and online posts we should be reading. Books have long given us the deep knowledge needed to understand where the profession has been and where it may head in the future. There is a common refrain in the modern world that we simply do not have time for books. The watch schedule keeps us too busy. Digital media has affected our attention span. Military service is demanding, and we need time with our families. Yet we find time for physical exercise, while we discount intellectual exercise. According to some studies the average college graduate reads around 300 words a minute. If we read 15 minutes each evening, it totals up to 18-20 books a year. The excuse there is “no time” would never be accepted when we failed the PFT. Accept the challenge to read more widely. Maybe this sounds “high brow” or too “egg headed” but as President Truman, a WWI Army veteran, said: “Not all readers are leaders, but all leaders are readers.”
Once a servicemember or natsec professional has an idea of the subject they want to write about, has done some research and reading about it, and has come up with the initial kernel of an argument, they must spend some time thinking about it. This advice probably goes against the grain of what digital media incentivises, or what social media seems to encourage. However, the point of this effort is to make a contribution to the field of military and naval affairs or national security, not to rush into being a “thought leader” in the crashing tide of the blogosphere. Thinking hard about the subject you intend to tackle includes attempting to employ the skills of critical thinking.
Critical thinking gets a lot of attention these days and there are numerous competing definitions of what it means. Unfortunately, too many people seem to think “critical thinking” means “thinking about important or critical things.” That’s not the case. Instead we need level criticism at ourselves and our ideas. We need to examine our ideas with depth, and rigor, in order to get to the heart of whatever issue we want to write about. This includes becoming a critic of yourself and your own ideas, as well as the ideas of others. As you develop the concept for your article, be exacting and penetrating with the evidence you have amassed either through research or your own experience.
Having researched, considered experience, and critically examined the subject in your own mind, it is important to get a sanity check from someone else. In the academic world, this is part of the reason there is peer review before journal articles are published. In the professional and popular press, editors and editorial boards will judge your work with a dispassionate eye. The best way to ensure your argument makes sense, and you have developed a sound approach before contacting an editor, is to talk about it with other people.
Speaking about your idea can take a number of forms. It can happen with a pint in your hand at a pub with a mentor or group of respected friends. In the lost days of our Officer Clubs this was actually a common way of helping people develop professional ideas. It could also involve a cup of coffee. Seek out a mentor who you trust, whether a senior officer or a former professor or co-worker, and see what sticks in your conversation with them. Speaking also does not have to be taken literally, even if some of us work better in the give and take of live conversation. It can take the form of an email or social media exchange. The goal is to introduce new criticisms the writer has not considered, or clarifying the way to express the ideas.
Sit down and write the article. Just do it. Don’t allow the blank page on the computer screen to intimidate. One of the benefits of having thought through the idea systematically, and then spoken about it with a trusted friend or mentor, is you have already started to develop the words to express the idea. As many successful authors have told us, from Stephen King and Anne Lamott to Ernest Hemingway: the first draft is going to be bad. It does not matter. Sit at the keyboard and bang away until you have said everything you want to say.
Once the words are on the page, raw and terrible as they might be, the writer has crossed a major hurdle. After that, it is a matter of editing, organizing, and rewriting, which should be easier than putting the idea down the first time. The editing does not need to be rushed, and the mentor or friend you spoke with probably will be excited to take a look at the article and help make suggestions to improve it. You have already made them feel like a part of the process. When the draft is something which reads well, and you’re happy with it, then it is time to start looking for a place to publish it. Good editors, strong editorial boards, and the review process they use will help strengthen the piece even more. Be ready to make more adjustments to help clarify any issues they discover.
The RTSW Loop
The steps of RTSW might be seen as a sort of OODA loop for professional writing. In some ways it is similar to Boyd’s strato-tactical ideal. For example, each element can send you back to a previous spot. Speaking with a mentor may send you to a book or article you had not heard of before which you need to read, or the process of writing may cause you to return to your thinking and reorganize your approach. But there are also differences with Boyd’s Observe-Orient-Decide-Act sequence, most notably speed. Speed can be your enemy when writing a good professional article. There is no hurry. Please do not try to beat the rush of modern media, this can lead to shallow writing, weak argument, and poorly sourced facts. Doing it right may take time, and multiple rounds of the “RTSW loop,” but that only makes the article stronger and a better contribution.
Writing for publication can be a rewarding challenge. It is also something a legion of Sailors, Soldiers, Marines, Airmen, and security professionals have done throughout history. Many discover the process of writing clarifies their thinking. It also develops our communication skills, our critical faculties through practice, and our leadership ability. All of these make us better military professionals. Writing for publication is not something we should do because we need another FITREP or evaluation bullet, or because we think we can impress our boss. We don’t do it simply because the CNO says so. It is something we do in order to move our profession forward and to improve our service or our nation’s security. So, it is time to dare. Dare to read, think, speak, and write.
The author would like to thank Cdr Mike Flynn and his Naval Academy summer school class on “Professional Writing” for their invitation to join them for a day of class, where the author had a chance to speak about and refine some of these ideas.
This post is the first in a three part series where the author shares lessons learned from a decade of his own professional writing, almost four years on the editorial board of the U.S. Naval Institute, as a Senior Editor with War on the Rocks, and as series editor of the 21st Century Foundations books from the Naval Institute Press. The advice contained is worth exactly what you have paid to read it and individual experience will vary. The opinions expressed are offered in the author’s personal capacity and do not represent the policy of the US Navy, Department of Defense, or any government agency.
Photo Credit: FVAP
“All qualified electors of this state who shall be in the actual military service of the United States or of this state…shall be entitled to exercise the right of suffrage at any general election…at the several posts, camps, or places where the regiment or battery of artillery may be…”
Wisconsin State Law, Section One
Passed September 25, 1862
Voting while serving in the military was not always as easy as it is today. For a long time, if a soldier or sailor was away from their hometown, they simply didn’t vote. It wasn’t until the Civil War when most states confronted the challenging issue of voting in the military. In the run-up to the 1862 congressional election, there were many questions about how to handle voting for a significant number of military members that were far from home.
The first two states that led the way with passing military suffrage laws were Wisconsin and Minnesota. In Wisconsin, their state constitution was interpreted to allow military members to vote outside of state boundaries, and just before the 1862 election a bill was passed that, “directed officers in the army camps to conduct the vote…and to forward to the governor and the secretary of state for final tabulation the results of the vote.” Just two days later, Minnesota passed a law allowing any soldier who had enlisted at least ten days prior to the election, “to vote wherever he might be. Having done so, he should place his marked ballot in an envelope, then seal said envelope with wax, and mail to the judges of his district.” With those simple pieces of legislation behind them, the first military absentee ballots were cast!
In 1863, several more states followed suit. By 1864, most state governments had provisions enabling their residents serving outside their state to vote in various forms. Some states chose to allow voting by proxy, some followed Wisconsin and Minnesota’s example and allowed absentee voting for the first time, and others even sent election commissioners to their state units to verify voting procedures and tally results. However, several states, purely for political reasons, chose not to enact legislation until 1865, too late for their soldiers’ votes to count in the 1864 presidential election.
Photo Credit: Missouri State Historical Society
Union Soldiers voting in the field during the Civil War
Fortunately, we have come a long way since the Civil War and the United States has passed a number of laws protecting a servicemember’s right to vote. The 1955 Federal Voting Assistance Act urged states to pass laws to improve voting procedures for the military, by simplifying the absentee process, creating a uniform ballot, and providing adequate time for ballots to be returned. The 1975 Overseas Citizens Voting Rights Act repealed and updated the 1955 law, guaranteeing absentee registration for citizens outside the United States. The 1986 Uniformed Overseas Citizens Absentee Voting Rights Act (UOCAVA) directed states to provide overseas personnel with the ability to vote in all elections, specifically protecting members of the uniformed services and their families. As a result of UOCAVA, states must provide requested absentee ballots at least 45 days prior to an election. Finally, the 2002 Help America Vote Act (HAVA) required the Federal Voting Assistance Program (FVAP) to ensure that military servicemembers assigned to voting assistance positions have the “time and the resources needed to provide voting related services.”
These changes have helped ensure that members of the military have every opportunity to register and to vote in elections. As a direct result, servicemembers have increasingly registered to vote and turned out in higher percentages than their civilian counterparts. Here are some of the military voting turnout rates over the last 40 years:
-1976: <40% (15% less than the civilian turnout rate)
-1984: 55% (military exceeded the civilian turnout for the first time)
-1992: 67% (compared to 55% civilian turnout rate)
-1996: 64% (compared to 49% civilian turnout rate)
-2000: 69% (compared to 54% civilian turnout rate)
-2004: 79% (compared to 60% civilian turnout rate)
In the 2008 presidential election, the overall voter turnout rate for the country was 61.7% – the highest since 1964. In the 2012 presidential election, the military again turned out and voted in higher percentages than the civilian populace.
Most recently in the 2014 congressional election, data from the Federal Voting Assistance Program (FVAP) showed that in the 2014 congressional elections 71% of Active Duty Military members registered to vote. Conversely, only 58% of civilians of the same demographics (age, gender, education, region, family status, etc.), registered. However, when it came to actually voting in the 2014 election, active duty members had a voter participation rate of only 23%, compared to 25% of those not in the military.
The 2014 results should not overshadow the fact that as an overall group, the military and veterans have increasingly become more likely to register and to vote in elections. Our job now is to continue to encourage everyone to exercise his or her right to vote. The bottom line is that in today’s day and age, even if you are deployed to a combat zone, underway on a ship halfway across the world, or stationed at a base abroad, there is virtually no excuse for not being able to vote. There are great informational tools out there and most states allow you to handle just about everything online – some even allow you to utilize an online ballot!
A great website to refer to for state by state guidelines on how to register to vote, how to request an absentee ballot, and how to check the status of your ballot is https://www.fvap.gov.
Alexander Hamilton wrote in April 1784 that, “A share in the sovereignty of the state, which is exercised by the citizens at large, in voting at elections is one of the most important rights of the subject, and in a republic ought to stand foremost in the estimation of the law. It is that right, by which we exist a free people.” Hamilton went on to note that voting is a citizen’s, “right to a share in the government. That portion of the sovereignty, to which each individual is entitled, can never be too highly prized. It is that for which we have fought and bled.”
This is something we should be talking about in our squadrons, on our ships, and within our units. By not voting, even if you think there are no good choices, you are ceding your voice to someone else. The only way we as a democracy can move forward and truly represent the will of the people is for the people to vote. This is an area where the military has led in the past, and must surely lead in the future.
General Robert Neller has always been regarded as a tough, no-nonsense Marine, and as Commandant of the Marine Corps he has also emerged as a genuine visionary. He deeply understands the future military environment and how his service must prepare for it. At the 2016 U.S. Naval Institute/AFCEA West Conference, the general provided critical insight into his vision, which closely aligns with that of Chief of Naval Operations (CNO) Admiral John Richardson, on the direction of leadership development the Naval Services should take.
According to the 37th Commandant:
I think the training systems we have as far as simulators and simulation are pretty good for individual task/condition/standard, for air crew, for drivers, for even firing individual weapons, gunnery, things like that, I think the thing that we’re looking for is, where’s the equivalent of our Holodeck, where a fleet commander or division commander or air wing commander can go in and get a rep. Right now that almost requires an actual provision of the real stuff, which is really expensive . . . . Where’s our Enders Game battle lab kind of thing where we can not just give our leadership reps, but we can actually find out who the really good leaders are.
General Neller’s comments compel us to further analysis. He invokes aspects of popular science fiction to paint a picture for how leaders will be trained, evaluated, and readied for operational challenges in the not-so-distant future. He identifies critical gaps in today’s approach to leadership development, where mid- and senior-grade officers have few opportunities to experiment with novel operational concepts, using multiple units, in a risk tolerant environment. He also places cognitive development, or military decision-making, on par with the physical fitness which has long been a hallmark of Marine Corps officers. Finally, Neller highlights the problem of assessing the true quality of leadership in today’s ranks, where a significant portion of an officer’s career is in non-operational assignments.
One Army study of the novel Ender’s Game describes the “battle lab” (or school) in this way:
Using virtual training environments, the children go head-to-head on an individual level against computers that simulate Formic battle tactics to gain the knowledge and abilities required to defeat the enemy. The children can then compete against one another in the virtual environments to further develop their strategies. The next phase involves live collective training. Divided into armies, the soldiers must learn to function as a single unit to accomplish a mission objective in the battleroom. With enough skill, soldiers can become commanders of their armies and must learn to lead them effectively. By merging these individual and collective training components, the soldiers’ knowledge, skills, and abilities can translate into operational readiness.
While the concept of an Ender’s Game battle lab may seem like pure fantasy to some, the technology to build it may be right around the corner. In order to turn Neller’s vision into reality, several organizational changes must occur.
Harnessing advances in several emergent fields is critical for creating a naval battle lab, but we must exercise prudence in our approach. We must take full advantage of better private sector platforms and systems, and make using them our first choice, rather than taking the more expensive approach of designing our own systems. Reinventing the wheel, and the resulting exorbitant costs, will be the death knell of a naval battle lab long before the project would get underway in earnest.
As the current Pokémon Go craze clearly demonstrates, working augmented reality is now widely available to the public at virtually no cost. If built from scratch using the defense acquisition process, its cost surely would render such a system unaffordable. In fiscally constrained times, the DON must adopt new business practices and modernize outdated IT policies to capitalize on these types of commercial initiatives. Senior leaders and acquisition professionals need to consider open source software (OSS) services, such as GitHub, as the new norm for software procurement. OSS services allow users to take available code and modify it for a specific use at potentially a much lower cost than developing their own version from scratch or purchasing a commercial software license.
Another form of technological advancement needing consideration is the rise of machine learning and “bot” technology. Sophisticated software algorithms show great utility in modern computer networks, with their ability to monitor computer systems, offer data access, and to check network activity, while adapting themselves to varying conditions without human direction. This capability is being commercially used to improve customer service and to monitor network activity, among other private sector functions. Such advanced machine learning tools will be critical for creating virtual exercise controllers or simulated adversaries, using their adaptable artificial intelligence to challenge military tacticians based on their level of expertise.
Mobility will be an important enabler for leadership development in the future. It is difficult to find a naval officer today who does not own a smart phone. We must take advantage of these powerful tools by providing our people with appropriate network access and software to enable them to participate in scalable leadership exercises alone or as members of a networked team. Such access will allow them to develop professionally wherever they are. In short, we must make cognitive development as accessible as doing a set of push-ups. Leveraging commercial technology, however, is only one part of the changes required to implement General Neller’s vision.
The naval services have led at wargaming for decades. Over the past few years, improvements to analytical methods have resulted in game outcomes informing organizational decision-making processes. However, we must not lose sight of the fact that wargaming, and gameplay in general, serves as an excellent leadership development tool. In essence, traditional wargaming is a competition among participants based on a scenario that is conducted in a turn-based manner. They make people think and solve problems. This same process is easily replicated, repeated and expanded by using a virtual environment.
Virtual wargaming offers many advantages over traditional simulations. Consider popular online games such as World of Warcraft or Call of Duty. These games are played by millions of networked participants around the world every day. Fundamentally, they are designed to pose tactical problems to players who have a set of options from which to select. This interaction presents an incredible opportunity both to learn and collect useful data on military decision making.
In the future, for example, tactical problem X could be posed to a large and diverse group of naval officers in a virtual game format. From their answers, it would be possible to determine that a certain percentage would chose option Y, while others would chose option Z. This data could then influence policy changes or improve training and education programs, using any observed shortfalls. Further, if this virtual environment is shared with other services and coalition partners, it will be possible to determine the effect service and national culture has on tactical decision making.
Another advantage of virtual gaming is its ability to draw upon the expertise of the crowd to solve challenging problems. This is contrary to the norm of giving only a few elite players the opportunity to participate in large-scale events. Virtual environments are also more accommodating to various personality types and better for overcoming the power dynamics and hierarchies associated with the traditional approach to military wargaming.
The DON is at the forefront of crowdsourcing in the Department of Defense through its use of online platforms such as MMOWGLI, The Hatch, and the Marine Corps Innovation Challenge. Each of these forums provides Sailors, Marines, and DON civilians the opportunity to participate in virtual problem solving challenges. The lessons from these nascent systems could influence operational planning in the future, as the multitude of options available to our adversaries could be given to a network of operational planners, rather than myopically focusing on one or two likely courses of action. History has shown the current approach to planning often results in failure to anticipate our adversaries’ actions, an inflexibility we must remedy.
Virtual games are only as good as the environment in which they are conducted. Commercial gaming technology, geographic information systems, intelligence collection sensors, and repositories of global societal data are constantly improving. Much work remains to integrate these various sources of data in order to develop virtual environments of sufficient quality to enable realistic decision-making exercises. Excessive emphasis on environmental fidelity can often become an expensive distraction, however.
Virtual environments may be used to represent complex, networked, “wicked problems” better, as well as demonstrating the impact of our actions within, for example, complex civilian population centers. In short, virtual environments can present a different set of decision making problems and feedback mechanisms not available in live training exercises or traditional war games. This is yet another advantage offered by new forms of simulation.
The term “game” often connotes a recreational activity. If gameplay in the battle lab of the future is to become an effective tool for assessing the tactical decision making of naval leaders, proper incentives must be put in place so these exercises are taken as seriously as time on the rifle range. The emerging concept of gamification rests upon rewards or meaningful status upgrades to reinforce positive behavior, while penalizing negative behavior. Performance in the naval battle lab consequently must be incorporated into annual performance assessments and ultimately influence career decisions.
In an examination of military innovation, Dima Adamsky notes a significant difference between the US and Soviet militaries during the Cold War in their approaches to technological adaptation. The Soviets would develop concepts and strategy for use ahead of delivering a technology, whereas the US military usually had the technology and then often took a decade to figure out how to turn it into an operational advantage. To prevent this problem in the future, DARPA and ONR could insert the latest weapons technology into the battle lab years ahead of its actual fielding. This would give future naval leaders the opportunity to experiment with weapons of the future, then speedily integrate them into their decision making cycle as soon the new systems arrive in the operating forces.
The DON’s Task Force Innovation was comprised of over 150 naval innovators from across the operating forces. Improving wargaming and expanding virtual environments were identified as important tools to promote innovative thinking. As a result, Secretary Mabus directed two policy memos to emphasize these two issues and take an integrated naval approach, when possible. While great progress is being made as a result of these directives, these two areas will ultimately form the foundation for a naval battle lab and must proceed in parallel and complement one another.
To operationalize this concept, the numerous stakeholders from across the naval enterprise must work towards a common vision. Developing the functional system as described here will require strong leadership and collaboration across numerous DON organizations. As we have seen, this topic is of great interest to the SECNAV, CNO and CMC. Therefore the current bureaucratic environment may be optimal to make meaningful progress.
There are many technical, fiscal, and organizational barriers which must be overcome to fully operationalize the naval battle lab concept. The most significant obstacle, however, will be cultural. Ultimately our leaders must see the lessons learned from traditional leadership tasks and day-to-day decision-making in an operational environment are invaluable and cannot be supplanted. As cognitive decision-making emerges as a critical capability on the battlefield of the future, we must leverage every opportunity to build the most tactically and operationally proficient naval officers possible. As we see in every aspect of society, technology will play a vital role. If a battle-hardened, infantry Marine like General Neller, who entered military service long before personal computing became part of our daily lives, recognizes the potential of a naval battle lab for building and testing naval leaders, others must take notice too.
By Brad Cooper
“As our platforms and missions become more complex, our need for talented people continues to be a challenge. We need to recruit, train and retain the right people…”
Admiral John Richardson, U.S. Navy
Chief of Naval Operations
In 2017, nearly 2,000,000 young men and women will graduate from colleges and universities throughout America. We want 200 of the very best to commission through Officer Candidate School (OCS) and serve America as a Navy Surface Warfare Officer (SWO).
To be sure, we have historically attracted and retained great people in Surface Warfare. With an eye toward our return to Sea Control and distributed, more lethal warships, we should ask ourselves a series of critical questions, “Can we do better?”… and… “Are we tapping into the full potential of America’s shining youth?” Former Joint Chiefs Chairman, Admiral Mike Mullen, referred to the “sea of goodwill” that has given rise to a tide of support for our military since the attacks of 9/11. Is that goodwill sustainable?
Talented young men and women matriculating from our nation’s colleges and universities have life options. Surface Warfare could be one of those options, but it is not enough to sit back and wait for talent to come to us. In the competitive market of America, we must reach out, connect with, inform and attract the most talented into our community – and our Navy – in order to position our warships to fight and win when the nation calls.
There are extraordinary young men and women throughout this nation who would thrive as Surface Warfare Officers, but literally have no idea that the amazing opportunity to serve on warships… leading at sea… undertaking impactful work for our country… is even a remote possibility in their lives.
We are positioned to turn a life opportunity into reality for our nation’s best. Here is how we are doing it.
We know who we want
Through a series of surveys and data collection efforts, we have mapped attributes and characteristics of successful young SWOs.
These include: previous proven leadership experience – of any sort, at any level – in a varsity sport, club or organization; demonstrated initiative; oral and written communication skills; positive contribution to organizational efforts as part of a “team” – assessed through previous participation in organizations, clubs and sports; work experience that illustrates a sense of discipline and accountability; time management and organizational skills that reflect an ability to follow established procedure and demonstrate attention to detail; enthusiasm and passion for the nation and the Navy that would prompt internal motivation in the face of adversity; and, a desire to work hard, remain committed to mission accomplishment with a strong desire for service with impact.
In March, we worked with Navy Recruiting Command and we generated guidance to the entire officer recruiting force in the country, reflecting these attributes and characteristics.
Leveraging our competitive advantage
Junior Officers have told us that the principal attractors to Surface Warfare are: 1) the opportunity for immediate leadership; 2) the opportunity for adventure and travel; 3) the opportunity for a flexible, option-based career; and, 4) the opportunity for postgraduate level education.
In business terms, Surface Warfare has a near-monopoly on these attractors. Can we better leverage that competitive advantage in a more meaningful and vibrant way?
Outreach and the Power of Social Media
In Fiscal Year 2016, 18 young men and women applied to be SWOs through Officer Candidate School from the states of North and South Carolina –combined. We met our “numbers” and we got great people. But there are more than 125 colleges and universities in these two states. Do graduates from these schools – and thousands like them around the country – even know that Navy Surface Warfare is a life option for them and, consequently, are we missing out on large segments of the population who could serve and propel us to even greater heights as a Navy?
Through the power of social media, we can – at a minimum – begin to raise nation-wide awareness of the opportunities in Surface Warfare. This is not about numbers. This is about reaching out and connecting with talented young men and women to ensure they are aware of the opportunities to serve in our community today, ultimately leading our Navy and serving as the sea captains of tomorrow.
Bringing it together
We know who we want, we know what attracts men and women to serve in Surface Warfare and we have the ability to connect with America at our fingertips. Can we take these pieces and integrate them in a meaningful way? Conceptually, we want to move toward “getting who we want” to serve as Surface Warfare Officers – quality men and women, with characteristics that set themselves up for success as a SWO and who are drawn to our community. Along the way, we should connect with America’s exceptional youth from backgrounds and demographics that are under-represented in today’s force.
This is possible today. So we are seizing an opportunity – and moving out quickly!
In a collaborative effort with Navy Recruiting Command, we launched our community’s first-ever targeted outreach into America using the power of social media. Through a newly formed teaming effort with LinkedIn – the largest connector on the planet – we now have the ability to “meet people where they are,” connecting directly with people all over the country using high end talent matching and recruiting functionalities imbedded in LinkedIn.
We also have the ability to provide interested candidates with access to our #1 asset – our people. Today, a cadre of more than 50 junior officers in the current force who have “walked a mile in the shoes of a SWO candidate” are aggregated in an on-line platform. Have a question about serving in the Navy? How to apply for a commission? What does a Surface Warfare Officer do? Those answers are a keystroke away on social media.
The overall concept is simple. Connect directly with the people we want to serve in our ranks, invite their attention to the opportunities of future service as a SWO and provide on-line access to the exceptional men and women we have in today’s fleet. Then, turn interested candidates over to the exceptional professionals in our Navy Recruiting Districts all over the country to support application for Officer Candidate School.
Earlier this month, we conducted our first significant outreach — a direct communication to 150 students possessing the background, attributes and characteristics we want in future SWOs. These students are enrolled in universities and colleges in North and South Carolina – among them: Duke, Wake Forest, the Universities of North and South Carolina, Clemson, Appalachian State, Elon, Davidson, and Historically Black Colleges and Universities (HBCU’s) like North Carolina A&T and Benedict College.
In a great example of the power of high velocity learning, we have already captured key lessons and applied them – enabling outreach to specific people in even larger audiences on-line.
More broadly, perhaps we open new doors and find opportunities by using a similar approach in critical areas for national security like cyber.
We are also thinking differently about how to more vibrantly leverage social media and networks of influencers to connect with young men and women seeking a commission through the U.S. Naval Academy and Navy Reserve Officer Training Corps (NROTC).
From 2,000,000 young men and women, we want the best 200 to serve America as a Navy Surface Warfare Officer – executing military diplomacy, sea control and power projection.
Let’s go get ‘em!
Standing there, head bowed, pausing to reflect on the 46 Republic of Korea (ROK) navy Sailors whose lives were lost when their ship was sunk by an alleged North Korean submarine torpedo, makes one realize how precarious peace remains in the dynamic theater that is the Asia Indo-Pacific.
During what was a leadership symposium for other task force commanders, led by U.S. 7th Fleet commander, Vice Adm. Joseph Aucoin, I had the solemn privilege to tour the memorial dedicated to those Sailors, which includes the salvaged stern of the ship, ROKS Cheonan (PCC-772).
ROKS Cheonan was a Pohang-class corvette commissioned in 1989, one of the many worthy surface ships in the ROK navy fleet. On March 26, 2010, as the ship patrolled waters near the border with North Korea, she was struck by the torpedo, broke in two and sank.
As anyone with a Twitter account is well aware, North Korea continues to make headlines by test-launching ballistic missiles.
North Korea’s rhetoric and actions is just one fault line in a patchwork of tectonic plates that could lead to regional instability. And as such, we must remain steadfast in ensuring our forces, Sailors and Marines part of the Blue-Green team, are ready to deploy at a moment’s notice.
In early June, the Navy conducted a sort of stand down after a series of off-duty incidents. It may have seemed from outside that Navy leadership was going “high” and “right” – but instead it served as an important time to refocus us to readiness and the incredible importance we bare in being forward-deployed here.
As commander of Amphibious Force 7th Fleet, I command over a wide range of forces from an amphibious ready group to a mine countermeasures squadron to a helicopter sea combat squadron. Each unit has a unique role and each Sailor – and Marine – has an equally unique and important role.
To me, the recent stand down was about looking ourselves in the mirror – and looking each other in the eye – and challenging ourselves to do better, to conduct ourselves every second of the day with a recognition that we may be called to action.
One of the key components during this period was a buddy rule. The emphasis here was on accountability, a renewed attention on shipmates being shipmates.
While “shipmate” is a U.S. Navy term, it applies to all services and it applies to our bond with other nations. In my last year in command, I have grown bonds with several other amphibious leaders in different countries.
This past March, I had the privilege of commanding forces, more than 17,000 in total, alongside my ROK counterpart Navy Rear Adm. Park, Ki-kyung in the exercise Ssang Yong. Though we are from different militaries, we share the same oath to defend our nation.
While the specific policies of our recent stand down period have been eased, the mentality to stand tall at all times must remain. Our nation, this region, is counting on us too much for us to “slip.” We must realize that we are not only accountable to ourselves and our unit, but the partner forces that rely on us to answer the call with them.
The House of Representatives recently passed an amendment to the National Defense Authorization Act sponsored by Representative Ken Buck (R-CO) that would “prohibit funds to implement Department of Defense (DoD) Directive 4715.21 on Climate Change Adaption and Resilience.” It is a short-sighted and ill-conceived action that will jeopardize U.S. military effectiveness.
Successful, prudent planning requires considering all pertinent variables. For that reason, DoD needs the ability to factor climate change as a variable at the strategic, operational, and tactical levels. If Congress wishes to limit the scope or cost of a specific program it should do so, but it must not limit the ability of the military to plan.
Having served as the senior environmental executive for the United States Air Force in the George W. Bush Administration, I would like to address this, both as someone who had the responsibility to plan for and respond to environmental contingencies, and as a Republican needing to work with a Democrat Congress to effectively govern.
The fact that the climate changes is not a political issue, it is reality. It has been changing for millennia. While the cause may be debated by some, the reality is that climates evolve and such developments have a major impact on security interests. You don’t have to believe that the cause is man-made. You can believe it is part of an ongoing cycle and point to whatever study you want to back up your point of view.
Irrespective of the cause, the climate changes and those changes affect the weather, sea level, crop production and migration patterns. Rising sea levels have displaced populations, land failing to produce crops due to drought has exacerbated already complex Syrian issues, and ocean temperature killing coral is moving fishing grounds further into the South China Sea; all of these can lead to conflict and must be prepared for. These are key variables that are affected by climate change and impact everything from broad strategy to discrete tactics.
In a statement, Representative Buck said, “The military, the intelligence community [and] the domestic national security agencies should be focused on ISIS and not on climate change.”
To understand the importance of climate and weather in very concrete terms, one only needs to look back at the critical value of a weather forecast for the D-Day landings. To bring off the invasion, General Dwight D. Eisenhower needed a full moon, a low tide, little cloud cover, light winds and low seas. (The low tide was necessary to allow soldiers to see, avoid, and disarm the mined obstacles that the Germans had placed in the surf.) He could have had the full moon and low tide on June 5, 6, or 7. He could have had the low tide without the full moon on June 19 or 20. But what about the weather?
The landing was originally scheduled for June 5, but was moved to June 6 based upon a weather forecast and succeeded not because of the brilliant work of any solitary forecaster, but because a group of forecasters imitated the weather. They jostled, yelled, scribbled, and cast malevolent looks at one another. They fought it out and voted. And in the end, they were just right enough.
Imagine, if Congress, in 1944, had said that the military and the allied forces should be focused on the Germans and not on the weather, then passed an amendment that prohibited identifying and assessing the effects of the weather. Well, that is pretty much what Representative Buck’s amendment does in a 21st-century context.
The fact that the climate changes is a significant variable that needs to be considered by our military planners. Given the sophistication of modeling and analytic capability available to our military, being able to understand and predict broad patterns in the climate cannot be underestimated. It is a strategic advantage that will play out in tactics against the range of current and potential adversaries.
If you actually read Department of Defense (DoD) Directive 4715.2 [.pdf], you will find that it is not about pushing a “radical green agenda” as Representative Buck asserts. DoD Directives flow from policy and assign responsibilities for carrying out that policy. In this case, the DoD policy is to ensure that the DoD is able to adapt current and future operations to address the impacts of climate change in order to maintain an effective and efficient U.S. military.
Nowhere in the Directive is there language that speaks to the cause or reason for the climate changing. It is focused solely on identification and assessment of the effects of climate change on the DoD mission; taking those effects into consideration when developing plans and implementing procedures; and anticipating and managing any risks that develop as a result of climate change to build resilience.
Military planning is an art that requires an in-depth understanding of numerous critical elements or factors that may impact on the mission — both positively and negatively — and an assessment/analysis of how those elements or factors can be either negated, overcome or exploited to give the Commander the advantage required in the execution of the mission. The inability to take into account the changing climate would be catastrophic limitation. This limitation would be compounded by the fact that most of our efforts, against ISIS and other potential adversaries are carried out though multinational coalitions. U.S. joint strategic plans and contingency plans prepared in support of multinational efforts are developed, reviewed, and approved exclusively within U.S. operational channels. Currently, Combatant Commands are integrating climate-related impacts into their planning cycles to reduce the national security implications associated with climate change. This includes monitoring, analysis, and integration of climate related risks into existing overall risk management measures, as appropriate for each combatant command. The Buck Amendment would tie the hands of not only our Combatant Commanders and military planners, but render the United States ineffective in joint planning and operations.
If the purpose of the amendment is to limit spending on overly expensive showcase projects like the Navy’s Great Green Fleet, there are better ways to do that than prohibiting the assessment and analysis of a key long-term variable in our nation’s ability to fight and win.
For example, in 2007 and 2008 when the nation was facing oil prices of $140 per barrel, the Air Force undertook an effort to use domestically produced synthetic fuel in our aircraft to reduce the need for foreign oil. We made a conscious policy decision that the program would be market-based and that the Air Force would do only those things in our control that would create the conditions for success, but not to subsidize uneconomic alternatives.
The Air Force successfully certified every aircraft and associated system to be able to fly on a 50/50 blend of synthetic fuel, and we made a commitment to buy half of our domestic fuel requirement as a synfuel blend as long as the price of the synthetic fuel was competitive with conventional fuel.
At the same time, there were those in Congress who were concerned about the greenhouse gas emissions associated with the production of synthetic fuels from coal, but rather than completely stop the program, they passed Section 526 of the Energy Independence and Security Act of 2007, which restricts the federal government’s procurement of alternative fuels that exceed the lifecycle greenhouse gas emissions associated with conventional petroleum based fuels. While not ideal from the Air Force perspective, it was a proper and constructive use of Congressional prerogatives; it was congruent with the Air Force commitment to be good stewards of the environment, and simultaneously allowed the Air Force to move forward with our testing and certification.
Rather than Representative Buck’s draconian approach to prohibit funds to implement Department of Defense Directive 4715.21 and not allow planners to identify and assess the effects of climate change on the DoD mission, it is wholly appropriate for Congress to require that all efforts with regard to climate change be market-based and that the prices paid for biofuels and other alternative energy sources be competitive with the least cost alternative.
DoD’s ability to successfully counter terrorism, defeat a near-peer adversary, or respond to a natural disaster depends on its ability to collect, analyze and assess data regarding all contingencies, including changes in the climate. To limit that ability puts the lives or our sons and daughters who wear the cloth of our nation at risk.
An excerpt of this article was published in the July issue of Proceedings. The full article is provided here for further context and explanation. This article does not reflect the views of the Department of Defense, Department of the Navy or U.S. Cyber Command.
China and the United States appear to be engaged in a long-term competition, and one area of particular concern is cyberspace. What used to be considered a significant, overwhelming advantage of U.S. military capabilities relative to the rest of the world, including China, has recently been called into question. Recent Chinese military writings confirm the centrality of cyberspace operations to the People’s Liberation Army (PLA) concepts of “informationized warfare.” This paper examines Chinese writing on these concepts. It proposes that China has been actively seeking to position its sources of information power to enable it to ideally “win without fighting” or if necessary, win a short, overwhelming victory for Chinese forces. It concludes with some recommendations for how the U.S. might counter China’s informationized war strategy.
Chinese Strategic Thinking and “Informationized War”
There’s a war out there, old friend. A world war. And it’s not about who’s got the most bullets. It’s about who controls the information. What we see and hear, how we work, what we think… it’s all about the information!
-Cosmo, from the movie “Sneakers”, 1992
You may not be interested in war, but war is interested in you.
-Leon Trotsky (1879-1940)
Chinese military and strategic thought is markedly different from Western tradition. Fundamentally, China views the natural state of the world as one of “conflict and competition” rather peace and cooperation. The goal of Chinese strategy is to “impose order through hierarchy.” The natural conclusion is that due to this state, the world needs global powers, perhaps even a super power, to manage the conflict and competition and bring harmony. Timothy Thomas has identified several components to Chinese military thinking, to include: 
- A more broad and analytic framework that holistically incorporates information-age strategy;
- While remaining prominently Marxist, it “examines the strategic environment through the lens of objective reality and applies subjective judgment to manipulate that environment to one’s advantage”;
- The use of stratagems integrated with technological innovation, creating a hybrid combination targeting the adversary’s decision-making process to induce the enemy to make decisions China wants;
- The constant search for shi, or strategic advantage. Shi is thought to be everywhere, “whether it be with the use of forces, electrons, or some other aspect of the strategic environment”; and
- The object of “deceptively making someone do something ostensibly for himself, when he is actually doing it for you.”
Shi is the “concept born of disposition … of a process that can evolve to our advantage if we make opportune use of its propensity.” Chinese military thought seems to differ from Clausewitz, becoming focused on shi where Clausewitz finds “ends” and “means” as the most important. Shi aims to use “every possible means to influence the potential inherent in the forces at play” to its own advantage, before any engagement or battle takes place. Therefore, the engagement never actually constitutes the decisive battle that Clausewitz envisions, because it has already been won.
Chinese military writing contemplates war transitioning to an “informationized” state “in which informationized operations is the main operation form and information is the leading factor in gaining victory.” Information is a resource to be harvested and exploited, as well as denied to the enemy or manipulated for advantage. Nations and militaries “can be wealthy or poor in this resource. Overall wealth in information is what will ultimately matter most in peacetime competitions, crises or military conflicts.” 
China considers herself at an information disadvantage, so her use of information harvesting and exploitation in cyberspace align with her strategic intention. Thomas likens it to three faces of a “cyber dragon”: peace activist, spook and attacker. The peace activist is the face of the dragon concerned with internal and external soft power (improving China’s image, respect and perhaps fear or awe of China abroad, while remaining on guard internally against a Chinese version of an “Arab Spring” or “Orange Revolution”). The spook is the uses of cyber techniques to not only acquire information but also to reconnoiter adversary information systems, perhaps laying the groundwork for future attack or deterrence capabilities. The attacker face uses offensive capabilities and concepts to deter, or if necessary, paralyze the information capabilities of the adversary. The goal is that these three faces “work in harmony to achieve dominance over any potential adversary.”
People’s Liberation Army (PLA) books such as the Academy of Military Sciences’ Science of Military Strategy and Ye Zheng’s Lecture on the Science of Information Operations “reflect a consensus among Chinese strategists that modern war cannot be won without first controlling the network domain.” This tracks with current U.S. doctrine that emphasizes dominance in the network domain as “central to deterring Chinese forces and protecting U.S. interests in the event of crisis or conflict.”
Importantly, PLA writers emphasize first strike and first mover advantage in the network domain to “degrade or destroy the adversary’s information support infrastructure and lessen their ability to retaliate.” This creates strong incentive to strike in the network domain just prior to the formal onset of hostilities. China’s lines of effort in support of this strategy include:
- Gaining information through reconnaissance of cyber systems, and manipulating or influencing Western or American perception and technology to establish strategic advantage;
- Using that reconnaissance information to position its forces, to locate vulnerabilities, and be in a position to conduct system sabotage;
- In a crisis, using system sabotage to either render information technology systems impotent, or expose strategic cyber geography to establish offensive cyber deterrence.
Chinese writers publicly state that China lacks the ability to successfully launch a first strike at the present time. This is because they believe that Chinese networks are constantly penetrated by adversaries, and because of U.S./western control of most of the Internet’s core architecture. PLA writers do recognize the vulnerabilities of relying on Western technology supply chains for hardware and software operating systems.
Chinese writings suggest information is the bonding agent for strategic action from which China will be able to amass enough power that it will be unnecessary for her to use military force to accomplish her objectives. If force is necessary, China will be in such an advantageous position that the military conflict will be a forgone conclusion. Consider the game of chess. Andrew Marshall, former Director of the Office of Net Assessment, noted that “most of the game is not directly aimed at checkmating the opponent’s king. Instead, the early and middle parts of the contest are about building a more advantageous position from which checkmating the opponent almost plays itself out.” Indeed this is why most competitive games of chess end not in checkmate, but rather concession or a draw. The player on the losing end knows that he or she will lose, perhaps in a finite number of moves.
Recently, the Chinese political and military leadership established a new unit within the PLA to enhance its cyber operations capabilities, space operations and cyber espionage. This new unit, called the “Strategic Support Force,” is part of a larger military reorganization program. In some ways, it might be seen as a counter to the establishment in the United States of U.S. Cyber Command. Along with hoped for improvements to China’s already formidable cyber offensive and defensive capabilities, the unit will also focus on space assets and global positioning services, as well as interference with RADAR and communications. This is a clear sign of the importance that the leadership places on fighting and winning in the information domain.
Beyond its military activities, China’s information control system remains critical to ensuring regime survival. However, understanding this system is made more difficult by the fact that the PRC goes to great lengths to “deliberately and systematically attempt to control how China is understood by both foreigners and Chinese alike,” according to Christopher Ford. He goes on to note:
The modern Chinese information space remains a controlled one, subject to pervasive government monitoring and censorship, widespread and increasingly sophisticated methods of media-savvy opinion management, and the ever-present possibility that the citizenry will face penalties for venturing too far beyond the bounds of the CCP’s official line.
Diplomatic and international policies are also built around giving China maneuvering room to interpret norms, rules and standards to serve domestic needs, principally through the primacy of state sovereignty. China must constantly seek to balance economic growth with maintaining the Party’s grip on power. Not only is Internet usage controlled and censored, but it is also a tool for state propaganda. Chinese “journalists” are, to a large degree, arms of the Chinese propaganda system, transmitting the official “party line” to the population, while at the same time providing feedback “to the leaders on the public’s feelings and behavior.”
Chinese authorities use a number of techniques to control the flow of information. All Internet traffic from the outside world must pass through one of three large computer centers in Beijing, Shanghai and Guangzhou – the so-called “Great Firewall of China.” Inbound traffic can be intercepted and compared to a regularly updated list of forbidden keywords and websites and the data blocked.
Within China, the government heavily regulates and monitors Internet service providers, cafes and university bulletin board systems. It requires registration of websites and blogs, and has conducted a number of high profile arrests and crackdowns on both dissidents and Internet service providers. This “selective targeting” has created an “undercurrent of fear and promoted self-censorship.” The government employs thousands of people who monitor and censor Internet activity as well as promote CCP propaganda.
While the CCP retains the ability to shut down entire parts of the information system, to include Internet, cell phone, text messaging and long-distance communication, it truly prefers to “prevent such incidents from occurring in the first place. And here lies the real strength of the system.” The “self-censorship that the government promotes among individuals and domestic Internet providers is now the primary regulating and control method over cyberspace and has experienced great success.”
China has long been rightfully accused of being a state sponsor of cybercrime and intellectual property theft . This has led to a high level of domestic cybercrime “due in large part to rampant use and distribution of pirated technology,” which creates vulnerabilities. It is estimated that 54.9 percent of computers in China are infected with viruses, and that 1,367 out of 2,714 government portals examined in 2013 “reported security loopholes.” Chinese networks themselves, by virtue of their size and scope, may represent a gaping vulnerability.
Options for the U.S.
Both the 2015 National Security Strategy and 2015 DoD Cyber Strategy state that the U.S. desires to “deter” or “prevent” China from using cyberspace to conduct malicious activity. To do so, the United States may want to consider strategies which have the following desired outcomes:
- Build up Chinese confidence that they are achieving their goals and devote resources to attacking networks where the United States wants them to be;
- Increase ambiguity in China’s understanding of the information they are able to acquire;
- Introduce doubt in China believing it has the ability to disrupt American information networks; and
- Force China to expend more resources focused inward to controlling information within China that threatens Communist Party control.
Unlike the other domains, cyberspace is entirely man-made and the physical properties which characterize it can be altered, almost at will and instantaneously. Traditional geographic constraints do not apply, and we can alter the cyber strategic geography to reinforce American competitive advantages that can aid in achieving some of the goals mentioned above.
For example, many American networks that interest Chinese cyber forces reside on public and commercial Internet service provider (ISP) backbones, such as those owned by Verizon and AT&T, and use commercially available equipment, like Cisco routers. We like to think of “cyberspace” or “the Internet” as being a “global commons,” (see the 2015 NSS), but in reality, nearly all the physical infrastructure and equipment is privately owned and subject to manipulation. The information itself travels on electrons, which can also be manipulated.
The U.S. might develop alternative information pathways and networks, perhaps solely owned and operated by the government or military and not connected to the public ISP backbone. By keeping the existence of a separate network a secret, China may continue to devote resources to attacking and exploiting existing government networks residing on public ISP’s. Alternatively, the U.S. could permit China to acquire access to this surreptitious network in order to feed it deceptive information. In either case, the Chinese regime’s confidence in its ability to disrupt or deceive U.S. information networks could be placed in doubt at a time of our choosing.
Existing information networks could be made more resilient. Peter Singer recommends that we think about resilience in terms of both systems and organizations. He identifies three elements underpinning resiliency: the capacity to work under degraded conditions, the ability to recover quickly if disrupted, and the ability to “learn lessons to better deal with future threats.”
The DoD can also play a role by establishing more consistent network security standards. Cleared defense contractors (CDC), such as Lockheed Martin, Northrup Grumman and Boeing for example, are priority targets for espionage. The DoD can leverage its buying power to mandate accountability, not only for the products developed by the contractors, but also for the security of the information networks they use. It can work to bring “transparency and accountability to the supply chain” to include using agreed-upon standards, independent evaluation, and accreditation and certification of trusted delivery systems. It should address supply chain risk mitigation best practices to all contracting companies and the Department. Resiliency, risk mitigation and security can reduce China’s confidence that it can successfully execute system sabotage or offensive deterrence.
Another strategy might be to develop capabilities that permit the U.S. to execute cyber blockades or create cyber exclusion zones. A cyber blockade is a “situation rendered by an attack on cyber infrastructure or systems that prevents a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data beyond a geographical boundary.” Alison Lawlor Russell has researched the potential of blockades, carefully examining case studies of Russian attacks on Georgia in 2008 and Estonia in 2012, and comparing them to more traditional maritime blockades and “no fly zones.” She notes that it is a “legitimate tool of international statecraft … consistent with other types of blockades” and can be, though not always, considered an act of war.” Cyber exclusion zones seek to deny a specific area of cyberspace to the adversary, sometimes as a form of self-defense.
As previously stated, China’s information strategy is designed foremost to ensure regime survival. It has erected a massive information control system for the purpose of monitoring, filtering and controlling information within China and between China and the world. The Chinese Communist Party spends more money and resources on domestic security and surveillance than the PLA. Clearly, in the minds of the Chinese Communist Party, information control is a critical vulnerability. Therefore strategies which seek to keep China focused inward may be advantageous. The U.S. might invest in technologies which can be easily inserted into the Chinese market that encrypt communication or permit Chinese users to bypass government monitors. Targeting China’s information control regime should align with current and historic cultural proclivities. For example, environmental degradation, corruption and an urban-rural divide are areas of concern for the Chinese people. Sophisticated highlighting of these issues put pressure on the Communist Party.
The U.S. will not be as successful if does not address the modern, “informationized” concept of war. This should not be taken as a call to change our understanding of war or its nature. War remains violent and brutal, and should be avoided when possible. But the use of information to exploit the adversary and achieve strategic advantage is not being addressed by strategic and military planners as well as it might. Information capabilities in the electromagnetic spectrum, cyberspace, and elsewhere remain stove-piped and walled off from planners. The Department of Defense (and the U.S. government) continues to treat information as a separate compartmented capability rather than treat it holistically – a resource that supports our national security.
The 2015 DoD Cyber Strategy does make mention of force planning, to include the training and equipping of cyber forces. However, cyberspace is just one part of the information domain. We need to better integrate the growth in advanced technology into planning, not just acquisition. We need to consider the impact of dual use technology and its proliferation worldwide, not just to China. We must consider the implications of Chinese information technology companies providing goods and services in the U.S. – especially to the U.S. government. The DoD should develop human capital investment strategies that leverage America’s strengths, and consider new ways to recruit, train and keep the best and brightest in the military, intelligence and national security communities. Just as the “space race” of the Cold War ushered in the modern “Information Age,” .
China’s use of cyberspace operations to support her strategic goals is like the canary in the coal mine. While the U.S. maintains several competitive advantages, it is clear that China is investing large amounts of time, energy, people and resources to achieve her strategic desires, probably within our lifetime. Yet there is reason for the U.S. to be hopeful. It engaged in a long-term competition with the Soviet Union, and was ultimately victorious. This competition was not so long ago, and America has a wealth of talented veterans in the military, civilian and academic worlds who know what it takes to engage in a long-term competition with a rival while trying to avoid a shooting war.
 Jacqueline N. Deal, “Chinese Concepts of Deterrence and Their Practical Implications for the United States,” (Washington, DC: Long Term Strategy Group, 2014).
 Timothy L. Thomas, “China’s Concept of Military Strategy,” Parameters 44, no. 4 (2014-15).
 Francois Jullien, The Propensity of Things: Toward a History of Efficacy in China (New York: Zone Books, 1999). p. 34-38.
 Barry D. Watts, “Countering Enemy Informationized Operations in Peace and War,” (Washington, DC: Center for Strategic and Budgetary Assessments, 2014).
 Timothy L. Thomas, Three Faces of the Cyber Dragon: Cyber Peace Activist, Spook, Attacker (Ft. Leavenworth: Foreign Military Studies Office, 2012).
 Joe McReynolds et al., “Termite Electron: Chinese Military Computer Network Warfare Theory and Practice,” (Vienna, VA: Center for Intelligence Research and Analysis, 2015).
 Timothy L. Thomas. China’s Cyber Incursions. Fort Leavenworth: Foreign Military Studies Office, 2013.
 Watts, “Countering Enemy Informationized Operations in Peace and War.”
 (Rajagopalan 2016)
 Christopher A. Ford, China Looks at the West: Identity, Global Ambitions, and the Future of Sino-American Relations (Lexington: University of Kentucky Press, 2015). p. 13-14
 Rebecca MacKinnon,. “Flatter World and Thicker Walls? Blogs, Censorship and Civic Discourse in China.” Public Choice 134 (2008): 31-46.
 Ford, p. 19-21.
 Michael Wines, Sharon LaFraniere, and Jonathan Ansfield. “China’s Censors Tackle and Trip Over the Internet.” The New York Times. April 7, 2010.
 Thomas Lum, , Patricia Moloney Figliona, and Matthew C. Weed. China, Internet Freedom, and U.S. Policy. Report for Congress, Washington, D.C.: Congressional Research Service, 2013.
 Ford, p. 32.
 Ibid. P. 38
 Amy Chang. Warring State: China’s Cybersecurity Strategy. Washington, D.C.: Center for a New American Security, 2014.
 P.W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (New York: Oxford University Press, 2014). p. 170-171
 Ibid., p. 202-205.
 Alison Lawlor Russell, Cyber Blockades (Washington DC: Georgetown University Press, 2014). p. 144-145.
 Ibid., p. 146-147.
Please join us at 5pm EDT on 10 July 2016 for Midrats Episode 340: China’s Maritime Militia with Andrew Erickson
As China continues to slowly use a variety of tools to claim portions of her maritime near-abroad in the South China Sea and elsewhere, part of their effort includes what can almost be considered naval irregular forces – a Maritime Militia.
What is China doing with these assets, why are they being used, and what could we expect going forward as she taps in to a variety of assets to attempt to establish her authority?
Our guest for the full hour to discuss this and more will be Dr. Andrew S. Erickson.
Dr. Erickson is Professor of Strategy at the U.S. Naval War College (NWC)’s China Maritime Studies Institute (CMSI). Since 2008 he has been an Associate in Research at Harvard University’s John King Fairbank Center for Chinese Studies, and is an expert contributor to the Wall Street Journal’s China Real Time Report, for which he has authored or coauthored thirty-seven articles.
He received his Ph.D. and M.A. in international relations and comparative politics from Princeton University and graduated magna cum laude from Amherst College with a B.A. in history and political science. He has studied Mandarin in the Princeton in Beijing program at Beijing Normal University’s College of Chinese Language and Culture; and Japanese language, politics, and economics in the year-long Associated Kyoto Program at Doshisha University. Erickson previously worked for Science Applications International Corporation (SAIC) as a Chinese translator and technical analyst. He gained early experience working briefly at the U.S. Embassy in Beijing, the U.S. Consulate in Hong Kong, the U.S. Senate, and the White House. Proficient in Mandarin Chinese and conversant in Japanese, he has traveled extensively in Asia and has lived in China, Japan, and Korea.
President Obama has proclaimed 17-23 June the National Week of Making. The White House is championing the Maker Movement, a cause that respects creativity, inventiveness, and ingenuity. Makers have a passion for creating machines, tinkering with them, and making improvements. New technologies such as 3D-printers, easy-to-use design software, laser cutters, and open-source software are making it easier than ever for everyday Americans to design and prototype their ideas, as well as to solve problems.
The Navy celebrated “Maker Week” on 21 June by sending a part to space. That day, members of Congress, senior military personnel, and members of the zero-gravity 3D-printer company Made In Space, gathered in Washington, D.C. to send the Technical Data Package (TDP) to the International Space Station (ISS). No expensive rocket launch was needed, the TDP simply provided data to produce the part onboard.
The TDP contained plans to create a part called “TruClip,” designed by three Sailors of the USS Harry S. Truman (CVN-75) while underway. The device is designed to protect the clasps used on handheld radios by flight deck crew in rough conditions. A TruClip costs only $0.06 to produce onboard the ship’s 3D-printer, far less than a replacement radio clasp which costs $615. 3D-printers are proving to be a worthwhile investment, for in the 2½ years prior to TruClip the Truman needed $146,000 worth in replacement clasps; since TruClip was introduced only two clasps have been needed. The Navy intends to capitalize on these savings by introducing 3D-printers to its other nine aircraft carriers.
The Department of the Navy’s greatest resource is its Sailors, Marines, and civilian workforce and their ingenuity. Secretary of the Navy Ray Maybus created Task Force Innovation to foster creative problem solving throughout the ranks. With his support, it has funded the introduction of Fabrication Laboratories (Fab Labs) for use by sailors to make their ideas real in the same spirit as the maker movement. The potential of this concept is ground breaking; new designs can be tested and instantly distributed to the entire fleet for construction.
Great progress currently is taking place in the field of 3D-printing, also known as additive manufacturing. The technology has its origins in the 1980s, though it has only recently started to mature as a practical means of producing items. The public’s familiarity with additive manufacturing is often limited to using inexpensive 3D-printers, like Makerbot, to create plastic trinkets. While 3D-printers may not yet be able to print smartphones, they are capable of much more than making plastic models. After years of being relegated to constructing models for designing and prototyping, the private sector now uses additive manufacturing to produce finished parts made of various materials including ceramics, glass, and metal alloys.
It is vital for the military to recognize the potential of new civil technologies. Additive manufacturing is projected to lead to the democratization of manufacturing, allowing the dissemination of production directly to the consumer. It will cut supply chains and eliminate the need to maintain large inventories of spare parts. This change will perhaps be as revolutionary as Johannes Gutenberg’s printing press, which democratized knowledge and enabled the Renaissance.
Private innovators are leading the charge for additive manufacturing development, notably Made In Space. This small American startup was founded in 2010 with the intent of making additive manufacturing practical in space. The team started out flying their 3D-printers in NASA’s zero-gravity “Vomit Comet” aircraft, taking it on over 400 parabolic flights as a proof of concept. They created the first 3D-printer to be used in space, which was sent to the ISS on 21 September 2014.
Civilian-developed technologies have often been dismissed in military minds, before proving their worth later on. One notable example is the Higgins boat. The United States Marine Corps developed a strategy for amphibious warfare in the interwar period, but like other naval forces of the time, lacked an adequate landing craft to implement it. After trying numerous unsatisfactory Navy-designed craft, the Department of the Navy (DoN) finally selected a design from a struggling civilian boat maker from New Orleans, Andrew Higgins.
In 1926, Higgins designed “Eureka,” a 20 knot shallow draft boat for use by loggers and fur trappers on the bayou. A metal arm, called a skeg, extended along the bottom of the keel to protect its rudder and propeller in shallow water, and its spoon-bill bow allowed it to easily run up on the shore. The Navy invited Higgins in 1937 to design a landing craft based on Eureka. Higgins’s design was adopted by the Navy, and its definitive form, the LCVP (Landing Craft, Vehicle, Personnel), was produced in the tens of thousands.
Higgins’s design received minor modifications to make it more effective in combat, with important impact on the war. Originally it lacked a bow ramp, meaning troops had to jump over the sides to disembark. The Japanese pioneered this feature, which was discovered in 1937 by future Marine Lieutenant General Victor H. “Brute” Krulak, then a First Lieutenant, while serving as a military attaché to Japan. He witnessed the Japanese land in China, and was immediately impressed. Then-1stLt Krulak reported his findings to the DoN, but it had no interest in imitating the Japanese. It was not until 1941, when he went around the DoN and directly to Higgins, that this important feature was added.
The landing craft Higgins designed made an enormous contribution to Allied victory. It made amphibious operations like the Pacific island hopping campaign and Operation Overlord in Normandy possible. General Eisenhower gave the boat immense praise, saying “If Higgins had not designed and built those LCVPs, we never could have landed over an open beach. The whole strategy of the war would have been different.”
The Higgins boat is an example of civil technology being adopted by the military to great effect, just as additive manufacturing has the potential to do now. In all times, the Department of Defense needs to remain at the cutting edge and recognize the potential of emerging technologies. Additive manufacturing is a current example which the military must explore. Fortunately the DoD is wasting no effort in this regard; the Office of the Secretary of Defense, Departments of the Army, Navy, and Air Force, Defense Logistics Agency, and Defense Advanced Research Projects Agency are all working to take advantage of additive manufacturing.
Senior sponsorship helps, in addition to support from Secretary Maybus, the need for innovation is also recognized by the President. In 2012 the White House announced the National Additive Manufacturing Innovation Institute — America Makes — as a partnership between the departments of Defense, Energy, and Commerce, the National Science Foundation, NASA, and manufacturing firms, universities, and nonprofit organizations to collaborate on research, development, and demonstration of additive manufacturing. In 2014, President Obama hosted a Maker Faire at the White House. The White House recognizes the need for innovators to collaborate, a major theme of the maker movement at large, with its preference for open source-software and crowdsourcing ideas.
The military benefits most when its best minds collaborate with and learn from private industry and academia. This was shown in the past when future-LtGen Krulak conveyed his thoughts to Higgins. On 21 June, it was demonstrated by having Sailor-designed blueprints sent to a tech startup’s 3D-Printer in space. The goal of Task Force Innovation is to lower barriers and cultivate change. Everyone, from junior enlisted to flag officers and startup companies to multinational corporations, have an equal opportunity to voice their ideas. The delivery of TruClip to the ISS shows what is possible when the military and private sector work together. The Navy has come a long way since the Higgins boat-era and now fully embraces all creative concepts to problem solving.
It was history in the making on Sunday, 26 June, as an international contingent celebrated the opening of the expanded Panama Canal. I was proud to be there with the U.S. Presidential party, led by Dr. Jill Biden. For Panama, the expansion represents a potential for growth in the country’s maritime sectors and serves as a symbol of national prestige. In recognition of its strategic maritime significance, and the value U.S. Southern Command places on forward engagement with the region, the USS Oak Hill (LPD-51) sailed through the canal a few days earlier (using the older and narrower set of locks). The Oak Hill was pierside at the canal’s Pacific entrance during the ceremony to recognize this Panamanian accomplishment, to celebrate this second engineering marvel that dramatically expanded the path between the seas, and to signal our continued commitment to working with our partners to ensure its defense.
From the very beginning the Canal—both the original and this expanded addition—offered both great promises and significant challenges. It required an investment of time, talent, and treasure—in blood and dollars—as well as great commitment and patience to turn opportunity into reality. At U.S. Southern Command we see transregional opportunities and challenges and the need for multinational solutions everywhere we look—especially standing beside this new Panama Canal.
It was great to visit the Oak Hill the day before the ceremony and talk to the officers, chief’s messes, and assembled crew. Embarked was a U.S. Marine detachment with equipment to help illustrate our humanitarian-assistance/disaster-relief (HA/DR) capabilities and our commitment to rapidly respond to any neighbor in need, such as our support after the recent earthquake in Ecuador. U.S. Ambassador to Panama John Feeley eloquently captured what the Oak Hill represents: “a warship, coming in peace, symbolizing a legacy of partnership, commitment, and ready assistance in times of need.”
On board the Oak Hill, we talked with one officer who said that his earlier UNITAS deployment (an annual multinational naval exercise we host) as a lieutenant (junior grade) kept him in the Navy. We talked about how the Navy runs out of ships long before it addresses all the global requirements we face. We talked about the prioritization of requirements to other important regions and how that inevitably results in minimal allocation of Navy ships to help safeguard our interests in this vital region. I told him that once the littoral combat ship comes on line in greater numbers, U.S. Southern Command will seek to increase its presence in collaboration with maritime forces of the region to better protect our southern approaches and counter threat networks.
For now, we will make the most of the short deployments like that of the USS Lassen (DDG-82), which over a period of weeks wreaked havoc on drug traffickers in the tropical eastern Pacific; and with other Navy ships changing home ports from one coast to the other, such as the USS George Washington (CVN-73) and crew who excelled in partnering engagements and conducted multiple exercises during their South American transit. We are eager for the transit of the USS Zumwalt (DDG-1000) and the USS Wasp (LHD-1). I commented to the young officer that transiting ships should not make quick dashes to their new ports; their time in the Americas should be maximized because our presence is so limited and their ability to create goodwill is something on which you can’t put a price tag.
The Oak Hill was the only warship from any nation to attend the Canal Expansion opening ceremony. When it comes to defending the Canal, however, the duty is shared by many. Following on the ceremony’s heels, civilian and military organizations from 21 regional partner nations, with forces led by Panama, Colombia, Peru, Chile, and the United States, will conduct PANAMAX 2016, an exercise to demonstrate our shared commitment to the defense of the Panama Canal.
Standing beside this great achievement, I see the Canal as a metaphor for the region. It is the embodiment of transregional connections. Its defense depends on a partnership of nations—no one can do it alone.
Transregional Opportunities and Challenges
This region has never held such opportunity. The last remnants of the Cold War may finally be fading as a new chapter in U.S.-Cuban relations unfolds. Political change in Argentina also shows the promise of improved relations. In Colombia, a peace accord is progressing toward closing more than 50 years of political violence. Yet the obstacles to turning these and other opportunities into reality are large and growing. Astounding violence and related murder rates; transregional criminal networks trafficking not just in drugs, but also humans, illicit natural resources, weapons, and more; endemic corruption; small but concerning numbers of radicalized fighters joining the Islamic State in Syria—all these elements pose challenges to the region. Those challenges flow up to the southern approaches of the United States; what affects our neighbors soon enough is felt on our streets and cities.
Just as the Canal has global reach and impact, so do many of the challenges and concerns that touch Latin America and the Caribbean. More and more, geographic combatant commanders, focused on regional areas of responsibility, are seeing and responding to transregional challenges. In our interconnected world, we need to pay attention to those nations and non-state organizations that may be pursuing strategies across multiple borders and regions. If we are concerned about Russia’s conduct in Eastern Europe, we should pay attention to what they are doing in Latin America as well. If we are concerned about China’s performance as a responsible actor in a transparent rules-based system in the South and East China Seas, we may want to better understand their activities in the Western Hemisphere. If we are concerned about Iran’s use of surrogates and proxies in the Middle East, we should keep an eye on their clandestine activities across Central and South America.
The Panama Canal stands as a testament to vision, tenacity, and an enduring symbol of partnership—opportunity turned to reality through patience and perseverance. In Latin America we can achieve great and necessary things with the same patience and perseverance. In the face of these challenges, the United States is fortunate to have stalwart friends, allies, and partners throughout Central America, South America, and the Caribbean, who are committed to working with us and one another to ensure our hemisphere remains a beacon of stability, security, and prosperity.
On a closing note – you never know when you will bump into a fellow Academy Alum. Sitting next to me at the canal inauguration ceremony was Maximo Mejia, the Government of the Philippines Administrator for Transpiration and Communications and USNA class of ’88.