Cid Standifer is a freelance reporter, web designer and translator based in Arlington, Va. She has written for Military Times, Inside Washington Publishers and the Roswell Daily Record.
Thomas E. Ricks, The Generals: American Military Command from World War II to Today. New York: Penguin, 2012. 558 pp. $32.95.
When Tom Ricks published Fiasco: The American Military Adventure in Iraq in the summer of 2006, the impact was immediate and extraordinary. The book shredded any pretense that the Bush administration knew what it was doing in Iraq and also brought to light myriad failures of the American military establishment in the war. A Naval Academy graduate and a senior U.S. senator told me that he could only read a few pages before having to take a walk around the block to cool down so that he could see straight enough to continue reading. He was not the only reader to react strongly to Fiasco; the book became a number one New York Times bestseller and was a finalist for the Pulitzer Prize.
Fiasco contributed to a reassessment of military strategy in Iraq and focused attention on the failures of American military leadership in that war. One of the most pointed indictments came from inside the Army when my friend Lt. Col. Paul Yingling published an essay titled “A Failure of Generalship.” Yingling noted the Army’s failures to prepare for the Iraq war and to adapt to its requirements during the course of the conflict; his most damning line noted that “As matters stand now, a private who loses a rifle suffers far greater consequences than a general who loses a war.”
Proceedings, November 2012
An unconventional spin on the Marine tradition of forcible amphibious entry could counter modern A2/AD threats—at little expense and with minimal training.
The year is 2020. A country has attacked a U.S. ally and seized multiple islands. Simultaneously, it has flooded the area with guided rockets, artillery, mortars and missiles (G-RAMMs). Intelligence has identified three separate anti-ship cruise missile (ASCM) and anti-air (AA) locations on one island that must be destroyed before a U.S. aircraft carrier battle group or amphibious ready group (ARG) can aid our ally. Intelligence also suggests the enemy has hidden mobile ASCM and AA capabilities. All assets are protected by a dispersed, company-size enemy force. Through commercial and proprietary satellite coverage, the aggressor can locate and target U.S. Navy ships. That country does not know, however, where U.S. submarines are.
The President convenes the Joint Chiefs of Staff (JCS) and asks what can be done.
“We can execute precision-guided munition (PGM) strikes,” the chairman responds, “but that cannot guarantee the destruction of all sites, nor can the destruction of sites we hit be confirmed. Nor can we guarantee destruction of the enemy’s mobile weapons using PGMs alone.”The Chief of Naval Operations observes: “Until the ASCM and AA threat are destroyed, we can’t move our $14 billion aircraft carrier (USS Gerald R. Ford) or $4 billion amphibious assault ship (USS America) within 300 miles of that island.”
“Mr. President,” notes the commander, Special Operations Command, “we have some ability to confirm the destruction of the sites, but limited manpower prevents us from securing terrain or destroying enemy garrisons.”
On Oct. 29, 1814 The U.S. Navy launched its first steam powered warship, designed by Robert Fulton.
Naval History Magazine, August 2011
After inventing weapons for foreign powers, Robert Fulton built the world’s first steam warship for America, a vessel that might have transformed naval warfare if fate had allowed.
The outpouring of public mourning when Robert Fulton died, on 23 February 1815 at age 49, was unprecedented for an American private citizen. The passing of a mind that was considered a major national asset caused The New York Evening Post to lament, “His is the only loss for which the public has no indemnity.”
Fulton’s best-known achievement, the development of steamboat travel, largely centered in his last decade after he had spent nearly 20 years in Europe. Leading a sometime unconventional life overseas, Fulton developed and employed naval armaments for France and Britain at a time both countries posed threats to the new nation. Fortunately for his reputation and ambitions, it was an age when private lives of the famous mostly stayed private and citizens could negotiate deals with foreign nations that now might be considered treasonous. Redeeming himself during the War of 1812, Fulton built the world’s first steam warship to defend New York City. However, events prevented a demonstration of the vessel’s unique qualities in battle and an opportunity for Fulton to revolutionize naval warfare as he did transportation.
Influenced by his father’s bankruptcy and family hardship after the father’s early death, Fulton avidly pursued material success all his life. An early ambition was to win fame and fortune as an artist. To obtain training and exposure at the center of the art world, Fulton journeyed to London in 1787 armed with a letter of introduction to noted American artist Benjamin West. Generous in his support of young American artists, West was just one in a succession of influential people who, charmed by the handsome, diligent, and self-assured Fulton, helped to advance his career. Commissioned to paint the portrait of Viscount William Courtenay, a flamboyant young homosexual, Fulton stayed with him a year and a half, winning further commissions from Courtenay’s companions. Although little else is known about that time, Fulton probably participated in his host’s activities to some extent, which might help to explain his unconventional lifestyle later.
The following was excerpted from the U.S. Naval Institute’s 2012 annual history conference “The History and Future Challenges of Cyber Power” at Alumni Hall on the grounds of the U.S. Naval Academy on Oct. 16.
The panel discussion focused on the cooperation between the public sector (the intelligence and military for the sake of this discussion) and a private sector that is often vulnerable to cyber warfare.
The segment was moderated by University of Maryland School of Public Policy Research Professor Dr. William Nolte, who reminded the audience just how much people are touched by computers and by extension potentially cyber warfare on a daily basis.
“I used to ask audiences like this, ‘How many of you have used a computer today?’” Nolte said. “And people caught on. The easier question is, ‘How many have not used a computer today,’ meaning how many of you have not driven a car, or in some cases turning on your stove? You use your iPhone certainly. And this event I think has really taken us all by storm.”
Participating in Nolte’s panel was Dr. Michael Warner, the command historian for U.S. Cyber Command of the U.S. Department of Defense. Warner’s claimed that he is the only practicing “trained historian” in this field and explained his role a historian.
“Federal historians are those people who have to say to the boss, ‘Sir, ma’am — the problem is actually much harder than you realize and it’s much more complicated, too,’” Warner said. “So on that cheery note, that may be why there are so few federal historians because that is our job to bring this unwelcomed news to people.”
The following was excerpted from the U.S. Naval Institute conference report.
Opening the U.S. Naval Institute’s 2012 annual history conference “The History and Future Challenges of Cyber Power” at Alumni Hall on the grounds of the U.S. Naval Academy with the morning keynote segment was former Vice Chairman of the Joint Chiefs of Staff retired Gen. James Cartwright.
Cartwright was regarded as the Pentagon’s top thinker on cyber warfare during his stint as the vice chairman. In his remarks, Cartwright emphasized why the cyber landscape is important – it is a medium that lies between sanctions and military power.
“The tools available to a president or nation in between diplomacy and military power were not terribly effective,” Cartwright explained. “And so from my perspective at that time what I was looking for was a set of tools that had broad range capability, had no regard really for strategic depth and could be used in a way that would make a more logical transition, may even avoid the use of kinetic force to reset diplomacy, reestablish the ability to negotiate with whoever you’re working with. So we were looking for a way to fill the gap.”
Some of the methods Cartwright had said he looked at were electromagnetic pulse, directed energy, electronic warfare and cyber – all speed-of-light means used to extend the life of the diplomatic activities.
“We need to be able to work at no strategic depth and very large strategic depth,” Cartwright said. “Speed-of-light weapons were well suited for those kinds of problems. That was really at the heart of what we were trying to get accomplished.”
Former federal inmate now turned ethical hacker Kevin Mitnick spoke to the U.S. Naval Institute about network vulnerabilities, exploiting cultures of authority and his favorite hacker movie.
Mitnick spoke following the Oct. 16, 2012 History Conference: The History and Future of Cyber Power hosted by the U.S. Naval Institute and the U.S. Naval Academy.
In September a major diplomatic crisis erupted between China and Japan over a group of five uninhabited islets and three barren rocks located 120 nautical miles northeast of Taiwan, 200 nautical miles southeast of Okinawa and 200 nautical miles east of China. Collectively these islets and rocks are known as the Senkaku islands in Japanese and the Diaoyutai in Chinese. Japan, China and Taiwan each claim sovereignty over the Senkakus/Diaoyutai.
Japan acquired the Senkaku Islands in 1895 after defeating China in the First Sino-Japanese War. Under the terms of the Treaty of Shimonoseki, China transferred sovereignty over both Taiwan and the Senkakus to Japan. The Senkakus came under U.S. control when it occupied Japan and Okinawa in 1945 at the end of World War II. In 1972 the U.S. returned Okinawa and the Senkakus to Japan. The Senkakus are presently administered as part of Okinawa prefecture.
View Senkaku Islands in a larger map
In 1969 a survey conducted under the auspices of the United Nations determined that there were potentially large oil and gas deposits in the seabed surrounding the Senkakus. According to Japanese sources, the discovery of hydrocarbons was the catalyst that reignited Chinese claims to the Diaoyutai. Both Taiwan and China claim sovereignty based on Ming Dynasty documents listing the Diaoyutai as prized possessions of the Chinese emperor.
In September 1972 China and Japan normalized diplomatic relations. Six years later both sides signed a bilateral fishing agreement and reached an understanding to set aside their dispute over the Senkakus/Diaoyutai as a matter for future generations to decide. In 2008 China and Japan agreed to jointly explore for oil in waters off the Senkakus; but that undertaking was never implemented.
Proceedings, Oct. 2012
How likely is it that a conflict between two combatants involving both kinetic and cyber operations would be an asymmetric one? And does the answer to that question depend on who the combatants are? In a kinetic scenario, the creation and “massing” of forces is often possible to observe. Whether it is the number of troops, warheads, or aircraft, one can physically monitor the activity. The buildup can be measured in days or weeks. Such a scenario involving state-of-the-art kinetic weaponry also needs a high level of expertise that only comes from years of education and training. One needs a well-funded organization to support this kind of activity.You can trace the kinetic matériel fairly accurately to its source, and the effects of a kinetic attack unfold over an observable period of time. You can watch and react to it. Defense is possible as long as you are sufficiently diligent and prepared with a response.
The cyber battlefield is different. First, you don’t need a factory or a military base or physical materials. You don’t need the same sort of education, training, and expertise. All you need is a computer, Internet connection, and the time and patience to learn about software, hardware, and network vulnerabilities. Anyone can learn about and create effective cyber weapons. That’s why non-nation-state combatants are the most common potential adversaries. The development of offensive cyber weapons is very hard to actually “see.” It might be occurring in the room next to you, and you’ll be unlikely to know it.
This week in a speech in Virginia, Republican presidential nominee Mitt Romney talked about his plan to build a 350-ship Navy, boosting spending on current programs and creating two new ship designs. But affordability is a key detail in any procurement discussion, and it’s one piece of the puzzle that the Romney camp is still fleshing out. Romney also did not identify any new requirements for a 350-ship fleet.
There is no doubt shipbuilding is a priority for whomever occupies the White House for the next four years. The Navy’s current roster of ships is near its smallest since 1916, when then-President Woodrow Wilson signed the Naval Act authorizing a massive build-up. At Wilson’s behest and with congressional approval, the Navy built 10 battleships, six battlecruisers, 30 submarines, 50 destroyers and other support vessels over three years, tripling the size of the sea service by 1919. Wilson’s 752-ship Navy was the high-water mark for decades, and his push leading up to World War I is credited with establishing U.S. naval dominance in the 20th century. But the expansion came at a cost — some $500 million at the time or a mere $10.2 billion in current-year dollars. But today’s ships are different by nearly all metrics — mission, capability, sophistication, size and cost among other factors.
Nearly a century later, Congress finds itself in much the same quandary as Wilson — an aging fleet of warships in need of modernization and, some say, expansion. The U.S. fleet as a whole has been on a slow decline since the late 1980s, bottoming out at 278 ships in 2007. The Navy says it needs between 310 and 316 ships to meet all its obligations around the world, a number that has remained roughly unchanged since the 1994 Quadrennial Defense Review.