Category Archives: U.S. Coast Guard

The Asymmetric Nature of Cyber Warfare

The Asymmetric Nature of Cyber Warfare

Proceedings, Oct. 2012
How likely is it that a conflict between two combatants involving both kinetic and cyber operations would be an asymmetric one? And does the answer to that question depend on who the combatants are? In a kinetic scenario, the creation and “massing” of forces is often possible to observe. Whether it is the number of troops, warheads, or aircraft, one can physically monitor the activity. The buildup can be measured in days or weeks. Such a scenario involving state-of-the-art kinetic weaponry also needs a high level of expertise that only comes from years of education and training. One needs a well-funded organization to support this kind of activity.You can trace the kinetic matériel fairly accurately to its source, and the effects of a kinetic attack unfold over an observable period of time. You can watch and react to it. Defense is possible as long as you are sufficiently diligent and prepared with a response.

U.S. Navy photo

U.S. Navy photo

The cyber battlefield is different. First, you don’t need a factory or a military base or physical materials. You don’t need the same sort of education, training, and expertise. All you need is a computer, Internet connection, and the time and patience to learn about software, hardware, and network vulnerabilities. Anyone can learn about and create effective cyber weapons. That’s why non-nation-state combatants are the most common potential adversaries. The development of offensive cyber weapons is very hard to actually “see.” It might be occurring in the room next to you, and you’ll be unlikely to know it.

Read More

Trends in Hybrid and Irregular Warfare

Trends in Hybrid and Irregular Warfare

Proceedings, September 2012
Savvy adversaries are more capable than ever of using high-tech gadgets and social media against the United States.

From Tunisia to Cairo, Sanaa, Bahrain, Benghazi, Damascus, London, Wall Street, Berkeley, and the University of California, Davis, 2011 was the year of the social-media revolution. Smartphones and social media have enabled groups of like-minded individuals to share information, spread their messages, and upend traditional relationships between the public and authorities. These developments are part of a continuing trend in the democratization of information: the empowerment of groups and individuals by information technology. Combined with the democratization of destruction, or the expansion of access to destructive technology and tactics, small groups and individuals will have greater ability to counter traditional security forces in hybrid and irregular conflicts, where force-on-force military engagements may be blended with other operations aimed at influencing key populations.1

ScharreF1Sept12

The future operating environment will be one of contested domains—air, land, sea, space, cyber, the electromagnetic spectrum, and increasingly, the influence domain, where individuals and groups compete to spread their messages. U.S. military forces must be prepared for future challenges within these domains from nation-states as well as non-state groups or individuals. While the Department of Defense (DOD) is generally good at estimating and preparing for challenges from organized military forces, threats from non-state groups tend to be more diffuse and decentralized, more organic, and less predictable in nature.2 The continued diffusion of power to non-state groups will increase the challenges associated with irregular and hybrid warfare, with significant implications for U.S. forces.3

The Democratization of Information

The widespread availability of social media and Internet-capable smartphones has transformed relationships between the public and traditional authority. In the past few years, these technologies have helped non-state groups record and broadcast abuses of power, organize to form ad hoc collectives, and counter messages from authorities. In many cases, authorities have been slow to realize the implications of these changes. Even U.S. domestic agencies have repeatedly been embarrassed by incidents in which officials have been recorded using heavy-handed tactics. Images and video of peaceful protesters being pepper-sprayed, abused, or intimidated by law-enforcement officials in New York, Berkeley, UC Davis, the University of Maryland, and Washington, D.C., have led to outrage, suspension of offending officials, and in at least one case felony criminal charges.4

Read More

At Sea in the Great War: A Coast Guardsman’s Letters Home

At Sea in the Great War: A Coast Guardsman’s Letters Home

You may send my new camera to me, without the tripod, as I am allowed to use it.” So wrote Frederick Richard Foulkes in a letter home on 17 April 1917, just four days after enlisting in the U.S. Coast Guard. Seaman Foulkes, the son of a Presbyterian minister, very quickly had acquired the nickname “Parson.”

When the United States declared war on Germany on 6 April 1917, the Coast Guard had been transferred from the Treasury Department to the Navy Department. Veteran crews were augmented with fresh recruits; Foulkes was assigned to the cutter Manning . A small warship by today’s standards, she was 205 feet long and displaced 1,155 tons. Commissioned on 8 January 1898, the Manning was a veteran of the Spanish-American War, one of the last class of U.S. revenue cutters rigged for sail, and the first to carry electric generators.

Powered by one steam engine, she could attain 17 knots and boasted two 3-inch gun mounts and two 6-pounder rapid-fire guns. Filled out to a full complement of 8 officers, 4 warrant officers, and 100 crew, the Manning was deployed to Gibraltar. She escorted her first convoy out through the danger zone, some 215 miles, on 19 September 1917.

Read More

Get Serious About the Arctic

Get Serious About the Arctic

Global interests—including those of the United States—are at stake in this changing region.

Commercial opportunities are expanding exponentially in the polar regions as the ice pack retreats, and the need for commensurate U.S. government engagement is also increasing. Shipping companies are eager to capitalize on the savings of time and fuel made available by an ice-free Northwest Passage and Northern Sea Route linking Europe and Asia. Oil and gas companies have already identified massive reservoirs suitable for development should the waters become reliably passable. A number of Arctic countries are already harvesting finfish and shellfish from polar waters, and other non-Arctic nations are demonstrating their intent by building ice-strengthened and ice-breaking-capable ships to facilitate their ventures. Ecotourism is burgeoning as luxury ships provide comfortable access to exotic and pristine wildlife venues.

This rapid uptick in human activity in the Arctic crosses numerous U.S. national interests, especially where the country has sovereign rights. Among the concerns are maritime safety, national security, economics, and natural resources (including fisheries, oil, and gas), national defense, and border control. National Security Presidential Directive 66 outlines the intended U.S. policy in the Arctic. However, to date the government’s presence in the polar regions has been more symbolic than effective, conducted almost exclusively by ice-breaking vessels—most recently the U.S. Coast Guard cutters Polar Sea(WAGB-11), Polar Star (WAGB-10), and Healy (WAGB-20). The Department of Defense operates an aircraft- and missile-detection system, and submarines are thought to also operate to an extent in the Arctic. But to achieve the goals of NSPD-66, a broad scope of additional action is urgently required.

As commercial maritime operations continue to ramp up in the near term, the Coast Guard’s existing resources cannot keep up with the needed levels of shipping oversight, marine casualty and incident response, maritime domain awareness (MDA), and national defense. Of the service’s three icebreakers—heavy breakers Polar Sea and Polar Star and medium breakerHealy —only the latter is functional. The other two, because of age and years of restricted budgets, are now inoperable and in need of significant overhaul. The Polar Star is scheduled to be ready for operations in late 2013, after significant reactivation work to allow her to potentially operate for another seven to ten years, barring further major mechanical breakdown. The Polar Sea would need mechanical work costing millions just to limp back under way for a few years, but even that is not budgeted, as the ship is slated for scrapping later this year.

Read More

Punch Them in the Nose...and Then Leave

Punch Them in the Nose…and Then Leave

KuehnF1July12Proceedings, July 2012
This year marks the 20th anniversary of the fall of the Soviet client government in Afghanistan. Mark Twain, and more recently Niall Ferguson, claimed that history does not repeat itself, rather, it rhymes. If this is the case, then the poem the United States has written in Afghanistan is a tragic one of the Greek variety and highlights hubris in ways we have not seen since that other tragic poem named Vietnam. There is an even more similar Soviet one, also in Afghanistan.

more