Academia.eduAcademia.edu

A Comprehensive Approach to Operations in Complex Environments

The military instrument alone cannot deal with complex crises involving diverse communities. Existing strategies, organizations, and force structures are in many cases poorly suited to future contingencies. Accordingly, national and intergovernmental organizations have sought responses to increasingly complex challenges. Among them is the notion of a comprehensive approach. This paper examines the principles and mechanisms of a comprehensive approach as applied to multinational peacekeeping and maritime, cyber, and energy security.

C E N T E R F O R C I V I L - M I L I TA R Y R E L AT I O N S comprehensive approach timeline security structurally integrated corruption peacekeeping A COMPREHENSIVE infrastructure combat APPROACH TO training industry energy OPERATIONS IN peacekeeping reconstruction human rights experience COMPLEX structurally integrated planning strategic concept planning human rights ENVIRONMENTS demobilization timeline industry strategic concept challenging communication objectives challenging pre-crisis strategicelectrical concept gridsecurity comprehensive approach demobilization timeline corruption industry comprehensive approach soldiers civil-military objectives cooperation shared responsibility shipping de-conflicting rule of law threat assessment soldiers threat assessment efficiency soldiers currency flows shipping objectives shared responsibility social structure efficiency corruption de-conflicting cyber peacekeeping agencies policemen combatcombat currency flows Edited by social media internet complexities population agencies manage conflict infrastructure training humanitarian demobilization principles pre-crisis S C O T T M O R E L A N D experience policemen social media planning manage conflict shipping security and complexities structurally trust integrated efficiency communication energy food interaction S C O T Ttrust JASPER social structure crime reconstruction policemen risks food internet infrastructure reconstitution conflict civil-military organizations shared responsibility rule of lawconflict contested territory organizations cyber experience electrical grid risks manage conflict contested territory sabotage risks international partners electrical grid de-conflicting pre-crisis humanitarian principles conflict social structure complexities NAVALinteraction POSTGRADUATE SCHOOL crime cyber MONTEREY, CALIFORNIA organizations communication energy sabotage social media MARCH 2014 training population currency flows reconstruction humanitarian principles food internet international partners crime challenging international partners population threat assessment contested territory interaction cooperation cooperation human rights energy energy civil-military agencies trust sabotage rule of law comprehensive approach timeline security structurally integrated corruption A C O M P R E H E N Stimeline IVE strategic concept challenging A P P R O A C H infrastructure T O pre-crisis challenging combat comprehensive approach timeline O P E R AT I O N S I N comprehensive approach training industry energy C O M P L E X peacekeeping soldiers reconstruction experience human rights civil-military ENVIRONM E N T S integrated structurally peacekeeping industry communication objectives strategicelectrical concept gridsecurity demobilization corruption industry objectives cooperation shared responsibility shipping strategic concept currency flows human rights de-conflicting rule of law planning soldiers planning shipping objectives shared responsibility social structure threat assessment soldiers threat assessment efficiency efficiency corruption demobilization Edited by de-conflicting cyber peacekeeping agencies policemen combatcombat currency flows internet social media complexities SCOTT M O R EL AND population agencies manage conflict infrastructure training humanitarian demobilization principles pre-crisis and policemen shipping security social media experience planning manage conflict efficiency energy trust O T T JAS PER food complexitiesS C integrated structurally communication food interaction social structure trust crime reconstruction policemen risks internet infrastructure reconstitution conflict civil-military organizations shared responsibility rule of lawconflict contested territory organizations cyber experience electrical grid risks manage conflict contested territory sabotage risks international partners electrical grid de-conflicting pre-crisis humanitarian principles conflict social structure complexities interaction crime cyber organizations energy communication sabotage social media training population currency flows reconstruction humanitarian principles food internet international partners crime challenging international partners population threat assessment contested territory interaction cooperation cooperation human rights energy energy civil-military agencies trust sabotage rule of law Disclaimer The opinions expressed herein are those of the authors and do not necessarily represent the views of the Department of Defense, Department of the Navy, or Naval Postgraduate School. CENTER FOR CIVIL-MILITARY RELATIONS Richard J. Hoffman, Director Joseph E. Andrade, Exercise Program Manager A digital version of this publication is available to view, download, or reproduce at http://www.ccmr.org. The unlimited reproduction of this publication is authorized. Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 C h a p t er 1 . Principles and Mechanisms . . . . . . . . . . . . . . . . . . . . . 3 by George T. Hodermarsky C h a p t er 2 . Multidimensional Peacekeeping . . . . . . . . . . . . . . . . . . 11 . . . . . . . . . . . . . . . . . 20 . . . . . . . . . . . . . . . . . 27 . . . . . . . . . . . . . . . . . . . 36 . . . . . . . . . . . . . . . . . . . . . 41 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 by Scott Moreland C h a p t er 3 . International Maritime Security . by Jeffrey E. Kline and Lyla Englehorn C h a p t er 4 . Deterrence of Cyber Aggression . by Scott Jasper C h a p t er 5 . Challenges to Energy Security by Daniel A. Nussbaum Appendix: Sources of Guidance List of Acronyms . Contributors Introduction T he notion of a comprehensive approach is not new. Its antecedents can be found in the writings of Clausewitz, who examined conflict in more than exclusively military terms. However, conflict in his age was focused mainly on the clash of military forces among sovereign nations. Although classic state-on-state warfare is not extinct, most conflicts today are far more complex, requiring various approaches and solutions. At the same time, the international geopolitical environment is rapidly evolving. Emerging factors include both globalization and competition for resources and an unstable international security environment including nonstate actors. To prepare to deal with such matters, this manual examines emerging characterizations of the comprehensive approach and its application to peacekeeping, the maritime domain, cyberspace, and energy security. Many nations recognize that the military instrument alone cannot deal with complex crises involving diverse communities and that existing strategies, organizations, and force structures might not be suited to future contingencies. Accordingly, national and intergovernmental organizations have sought responses to increasingly complex challenges. Among them is the notion of a comprehensive approach, however loosely defined or accepted. Nonetheless, the principles of a comprehensive approach have been applied in some operations, Comprehensive Approach and it remains indispensable to the conduct of ongoing and future Although no universally accepted definition of operations including civil-military missions. the comprehensive approach exists, the concept is The principles of a comprehensive approach can be extendfundamentally grounded in a congruence of effort, ed to multidimensional security missions involving maritime, not in unity of command. A working definition of cyber, and energy security. They expand traditional peacekeeping the approach is the manifestation of the idea of and humanitarian operational models that are prime applicamobilizing the resources of an entire society to tions of comprehensive approaches. Increasingly complex security succeed in complex operations. issues demand intelligent, discreet application of comprehensive approach principles to international crises that are studied in this manual through a series of four cases: synchronizing peacekeeping operations, preserving access to oceans of the global commons, deterring acts of aggression in cyberspace, and protecting supplies of energy resources. Some cases such as peacekeeping and maritime security have developed relatively mature models for the practical application of a comprehensive approach. Cybersecurity enjoys a general consensus regarding the need for coordinated efforts across the various sectors and organizations involved in and dependent upon maintenance of a safe and reliable cyberspace. Energy security, though certainly recognized as a collective challenge, has thus far proven too complex and politically sensitive to tackle in a coordinated fashion. Since 2006, NATO has championed a coordinated international effort to reduce risk and promote energy infrastructure security. However, its member states are sharply divided over the need, and indeed 1 the appropriateness, of a collective approach to energy security. Established Alliance members in particular argue that energy infrastructure protection should be national responsibilities, while others are concerned that NATO involvement in energy security would unnecessarily heighten regional tensions and disrupt diplomatically or economically driven solutions. While functional models have been used to a certain extent, a generally accepted concept of the comprehensive approach simply does not exist. Even though definitions remain elusive, it is possible to describe the approach and its core principles. Similarly, no agreement exists on the objectives of a comprehensive approach. But any discussion requires taxonomy or an attempt at classification, which this manual identifies as the coherent multidimensional response, or the principal goal of this approach. In the absence of a clear definition, mobilizing the resources of an entire society captures the meaning of a comprehensive approach. This description builds on the idea of whole-of-government that includes intergovernmental bodies, nongovernmental agencies, academic institutions, and the private sector as well as national resources. The first chapter of this manual, “Principles and Mechanisms” by George T. Hodermarsky, utilizes a working definition of the comprehensive approach to clarify its universal tenets and tangible benefits, as well as the issues and risks associated with its application. It is followed by a chapter on “Multidimensional Peacekeeping” in which Scott Moreland examines comprehensive approaches to peacekeeping that enhance coordination. Next, Jeffrey E. Kline and Lyla Englehorn focus on coordination models to counter a range of threats to the maritime domain in a chapter entitled “International Maritime Security.” The fourth chapter on “Deterrence of Cyber Aggression” by Scott Jasper looks at a vital domain of the global commons beset by theft of data, denial of service, and other malicious actions. The fifth and final chapter, “Challenges to Energy Security” by Daniel A. Nussbaum considers the security of resources, which is defined in terms of availability, accessibility, affordability, and acceptability. Finally, a few disclaimers are required at the outset. It is not possible to cover every aspect of a comprehensive approach. This manual considers ideas while making no attempt to expound a concept of operations or propose doctrinal tenets. It presents a high-level examination to allow for the application of the comprehensive approach to a range of scenarios. Therefore it does not represent a detailed guide to executing operations. THE EDITORS March 2014 2 Introduction Chapter 1. Principles and Mechanisms by George T. Hodermarsky A lthough no universally accepted definition of a comprehensive approach exists, it is possible to explain the concept. Recognizing the lack of a commonly accepted definition, the chapter uses mobilizing the resources of an entire society as the basis of a working definition. It expands on the notion of a whole-of-government approach by including intergovernmental organizations, nongovernmental organizations, academe, and the private sector. Despite the fact that a comprehensive approach cannot be precisely defined, the principles and mechanisms it employs are widely accepted and applied. Additionally, the lessons learned in contemporary stability and peace operations demonstrate the benefits of a comprehensive approach as well as the challenges to its implementation. Based on experiences in operations in the Objective Western Balkans and Afghanistan, NATO issued a Comprehensive To introduce benefits, issues, considerations, risks, Approach Action Plan in March 2012. The tasks associated with costs, and resource requirements for coordinating this plan are implemented by a combined civil-military task force uniformed troops, civilian agencies, and private that includes all relevant NATO entities and commands. sector organizations that share operational space NATO is not alone in its efforts to employ a comprehenin a zone of conflict or crisis. sive approach to operations. Other informative examples include support for the Dayton peace accords on Bosnia and Herzegovina in 1995, the United Nations (UN)-mandated North Atlantic Treaty Organization (NATO) campaign in Kosovo beginning in 1999, the peacekeeping intervention in Sierra Leone from 1999 to 2000, and the multinational European Union (EU)-led counterpiracy efforts conducted off Somalia. Comprehensive Approach Action Plan NATO support within the international community to a comprehensive approach to crisis management and stabilization operations. This includes political, civilian and military involvement in the planning and conduct of operations. NATO will strengthen cooperation with partner countries, international organizations, nongovernmental organizations, and local authorities. NATO recognizes the European Union and United Nations as key institutional partners. There are multiple interpretations of a comprehensive approach. Its characterization by the Ministry of Foreign Affairs in the Netherlands captures its essence and clearly indicates civilian leadership. Moreover, Sweden has been at the forefront of thinking about a comprehensive approach. Indeed, the Viking Exercises have been centered on the idea of cooperation among governmental (civilian, military, 3 and police), intergovernmental, and nongovernmental organizations. Additionally, the doctrine emerging in the Netherlands—as civilian as possible, as military as United Kingdom contains a particularly helpful definition of necessary a comprehensive approach. Finally, the US National SecuSweden—integration of military and civilian activities rity Strategy recommends utilizing the approach while not including nongovernmental organizations defining or expanding the concept. United Kingdom—develop principles and collaborative The 2010 version of the NATO Strategic Concept processes to enhance likelihood of favorable and encourages the use of a comprehensive approach. Noticeenduring outcomes in particular situations ably, it describes the NATO contribution to a comprehensive United States—urge more comprehensive approach to approach while recognizing that the Alliance does not posregional security sess the necessary civilian capabilities to employ the concept alone. Allied joint doctrine endorses the commitment to this approach by developing it beyond the strategic level. By using the term international partners, NATO acknowledges the wide participation required for completion of a broad set of missions. In June 2013 a total of 114 nations were supplying more than 90,000 soldiers, policemen, and military observers to the United Nations in support of 15 National Perspectives • • • • Figure 1.1 UN and OSCE Contributions United Nations Multidimensional peacekeeping operations conducted by the United Nations establish an integrated strategic framework with a shared vision of strategic objectives and set of agreed upon results, timelines, and responsibilities Organization for Security and Cooperation Since its founding, the Organization for Security and Cooperation in Europe has pursued a comprehensive approach to security and remains the only international forum to place human, economic, environmental, and political-military dimensions of security on an equal footing. peacekeeping missions. Although the world body does not use the term comprehensive approach, the Secretary General stated that an integrated strategic framework is “the guiding principle for all conflict and postconflict situations where the UN has a country team and a multidimensional peacekeeping NATO Perspectives operation, whether or not these presences are structurally • Enhance the contribution of comprehensive approach integrated.” to crisis management as part of the international UN Civil-Military Coordination is the system of intercommunity and improve the capability to deliver action that involves the exchange of information, negotiastabilization and reconstruction effects. tion, deconfliction, mutual support, and planning undertaken • Ensure that force commanders at theatre level have the at every level among military elements and humanitarian power to conduct effective cooperation and coordination organizations, development organizations, and local civilian with local and international actors. populations to achieve their respective mission objectives. • Increase cooperation with partners to prevent crises, The Organization for Security and Cooperation in manage conflicts, and stabilize postconflict situations— Europe (OSCE) endeavors to prevent conflicts from arising the heart of the new strategic concept. and facilitate lasting comprehensive settlements in conflict 4 Principles and Mechanisms situations. It also enhances the likelihood of success in the postconflict task of rehabilitation. OSCE police operations are essential to both preventing conflicts and restoring stability following them. The OSCE role, however, is limited by insufficient resources to act globally, and its legitimacy has been questioned by a number of participating nations even in its own region. The United Nations has identified three broad levels of interaction between civilian and military organizations: cooperation, coordination, and coexistence. Cooperation is more readily achieved in peacetime. However, in conflict situations, the divide between civilian and military activities reduces coordination to the level of coexistence and deconfliction. United Nations Guidelines Civil-military coordination is a shared responsibility of the humanitarian and military actors, and it may take place in various levels of intensity and form. Where cooperation between the humanitarian and military actors is not appropriate, opportune, or possible, or if there are no common goals to pursue, then these actors merely operate side-by-side. . . . [The] UN CMCoord basic strategy ranges from coexistence to cooperation. In either side of the spectrum and in between, coordination—for example, the essential dialogue and interaction—is necessary in order to protect and promote humanitarian principles, avoid competition, and minimize inconsistency. Shared vision may be a bit far-reaching, so “mutual interests” might be a more realistic ambition. Unifying Principles While the term comprehensive approach is ill defined, it is essential to examine its principles. For this discussion the concept is identified as the employment of unified principles in planning and conducting integrated operations focused on cooperation and coordination with all relevant actors in an increasingly complex environment. The purposes of a comprehensive approach are developing cooperation among partners where feasible and integrating their various capabilities where possible. Its major tasks are Comprehensive Approach to Operations developing both a shared vision of strategic Purposes objectives and an endstate, requiring mutual • Increase cooperation with international partners to avoid crises, manage conflicts, awareness of threats, risks, and actions of and stabilize post-conflict situations. participants. • Effectively integrate multiple stakeholders with diverse perspectives, authorities, Employment of a comprehensive capabilities, and objectives. approach to operations will be challenging, • Extend comprehensive approach principles to multidimensional security missions. thus its costs, risks, and level of effort must Tasks be justified by its benefits. For example, the • Develop shared vision of the strategic objectives and a set of agreed upon results. theory of comparative advantage developed • Create public-private sector partnerships to enhance an awareness of threats and by the classic economist David Ricardo has vulnerabilities, assess risks, analyze collaboration, and manage incidents. relevance. In its simplest form, it argues that nations should concentrate on industries in which they are most competitive and trade with others to obtain those products they do not produce nationally. Extrapolating the theory to crisis management, organizations that are better at assisting refugees or providing humanitarian relief, such as the UN High Commissioner for Refugees and Medicens sans Frontiers, 5 Principles and Mechanisms should lead those tasks, while the armed forces should focus primarily on providing security and strategic lift capabilities. With a comprehensive approach to operations, participating organizations are tasked to do those things they do best. Obviously this theory has its limitations similar to models of a free market economy. However, applying its principles could yield efficiencies in allocating resources and reducing the duplication of effort. These principles are not a panacea for all of the problems that arise in a multidimensional operational environment, but even modest gains in providing a framework for interaction and opportunities for efficiencies in the employment of various capabilities justify the effort of this approach. Figure 1.2 The Scope of Civil-Military Relationships Cooperation Coexistence    Minimizing competition and deconflicting effectivenessand efficiency of the combined efforts Peacetime Combat Coordination The essential dialogue and interaciton necessary to protect and promote humanitarian principles, avoid competition, and minimize inconsistency While acknowledging its complexities and challenges, the development of a framework to enhance cooperation may lessen distrust and hesitancy among participants, boosting the number of organizations willing to accept responsibilities in cooperative missions. A Common Vision Before they can be applied, the principles of a comprehensive approach to operations have to be identified. First, the shared vision functions on a very high level. At times it is clearly stated and, for example, found in a United Nations mandate. Such manifestations by a respected worldwide organization greatly aid in reaching consensus on strategic objectives. Even with such direction, however, interpretations can vary widely. Second, congruence is defined as a state of agreeing or coinciding, of being compatible or conforming. This explanation is helpful because it is likely to be more acceptable and preferable to precise terms such as integration and interaction. Third, as mentioned earlier, some degree of cooperation and coordination enhances effectiveness. Fourth, and importantly, the successful application of a comprehensive approach to operations requires a deep level of understanding of the roles, missions, and capabilities of partners. 6 Principles and Mechanisms Principles A comprehensive approach to operations should be based on a common vision of strategic objectives, a congruence of effort, cooperation and coordination by relevant actors within an inclusive stakeholder network, and a shared awareness and due consideration of charters, interests, limitations, and perspectives. The former Supreme Allied Commander Europe, Admiral James Stavridis, observed in an article published in PRISM (March 2011) that while the potential of a comprehensive approach remains “limited only by the desire to assist, in actuality it is difficult to mobilize, organize, and coordinate the activities of all these disparate actors. Even agreeing to a common purpose can be difficult to achieve, much less agreeing on where and how to do things.” Issues and Considerations While an important element in effective comprehensive approaches to operations, working with nongovernmental organizations is challenging because of their large number and the variance in their contributions. An estimated 1,300 different organizations operated at times in Afghanistan. Not surprisingly, each organization has its specific mandate and objectives. Similarly, every military or civilian organization and private or governmental agency has its own culture and operating procedures, which may cause friction. Some organizations desire a maximum degree of cooperation and interaction while many also prefer or even insist on operating independently. Understandably, these factors often preclude establishment of common procedures. Globalization with its associated benefits and adverse effects, combined with technological advancements, have created an operational environment with further complexities and issues that have not been previously encountered. For diverse reasons organizations are reluctant to accede to long-term agreements. Hence cooperation tends to be ad hoc and situation dependent. While this approach may allow for more flexible and tailored coordination mechanisms once a mission is established, the lack of formal bonds discourages pre-crisis contact among unknown partners and forces inefficient in-stride coordination processes in the initial phases. Keeping One’s Distance Risks Although a comprehensive approach to • neutrality and independence dilemma for operations is dependent on interaction, many nongovernmental organizations players, especially nongovernmental organiza• perceptions of complicity with corrupt tions, make their contributions based on neutralregimes ity and independence. This need for impartiality, • tension between near-term military especially among humanitarians, may lead to imperatives and longer-term friction as these organizations must often interdevelopment objectives act with legitimate yet corrupt regimes as well as • legal restrictions on government support factional or insurgent groups to gain access to all of nongovernmental organizations populations in need. • compromise of organizational mandates In addition organizations whose objectives resulting from information sharing are long-term development (primarily civilian) are at times at odds with short-term security needs (normally military). To varying degrees most nations restrict the level of support they provide to nongovernmental organizations. Information sharing is a key 7 Principles and Mechanisms principle, but it may be challenging to execute. However, it may be possible to share the following types of information: • security information—data on civilians and situations in the area of operation • humanitarian locations—staff and facilities inside a military theater • humanitarian activities—routes and timing of convoys and airlifts to avoid endangering humanitarian operations or warn of conflicting activities • mine-action activities—information relevant to mining • population movements—major movements of civilians • relief activities—efforts undertaken by the military • post-strike information. Financial Oversight All operations have limited resources with transport and logistics assets particularly in demand. Any requirement to share these will result in complications and possible friction. Effective management of relief and Costs reconstruction funding requires mutual understanding and commitment by all involved parties as well • limited resources and logistics shared as the imposition of an infrastructure and resources among multiple organizations to maintain oversight. • challenge in maintaining oversight The benefits of pre-crisis interaction and and fiscal controls training are abundant and obvious. However, event • establishment of pre-crisis training sponsorship and funding, and the opportunity costs and exercises associated with participation continue to limit the • requirement for compatible number and scope of such exercises. Traditionally, communications equipment and military organizations support and rely heavily on procedures training and exercises. Conversely, nongovernmental organizations normally do not have the resources or desire to participate in such events even if their value is appreciated. Effective information sharing, even if limited by organizational mandates, requires compatible equipment and procedures, a situation that has its own inherent costs. Models for Employment If mechanisms, structures, and processes are lacking, it follows their development could benefit from the use of a model. However, there is an inherent danger in adopting a conceptual model because comCivil-Military Cooperation and Coordination plex problems are ill-suited for one-size-fits-all Civil-Military Cooperation (CIMIC): coordination and cooperation in support of solutions. Nevertheless, civil-military coopmission between NATO commander and civil actors including national populations eration, although primarily employed at the and local authorities as well as international, national, and nongovernmental tactical level, could provide some insights and organizations and agencies a possible foundation for a comprehensive Civil-Military Coordination (CMCO): effective coordination of actions by approach to operations. Both the NATO and all relevant European Union actors involved in both planning and subsequent EU definitions are similar and state the need implementation of European Union responses to crises for cooperation by all relevant actors. While —European Union Military Staff (2003) 8 Principles and Mechanisms models have value, a comprehensive approach must consider elements beyond those normally associated with the concept. A paradigm of Civil-Military Cooperation (CIMIC) is useful in presenting its principles, which often represent a synthesis of similar recommendations. Importantly, the CIMIC concept and a comprehensive approach to operations are not the same thing. However, as the relevant NATO doctrine publication states, applying CIMIC principles will contribute to a comprehensive approach. They help to govern the military direction of CIMIC as well as the civil-military relationship. Moreover, the principles guide internal military processes and underpin effective civil-military relationships. It should be remembered that comprehensive approaches must: • • • • • • share awareness of issues and complexities of a crisis identify unique actors and appraise their contributions examine and understand motivations and objectives be based on mutual respect and trust defer to civilian authority even when primarily military promote effective communication among participants. Historically, both governments and organizations have developed structures that facilitate communication, cooperation, and coordination, which are manifested in numerous forms. Their functions have varied from near-traditional command and control to limited information sharing. In terms of nomenclature, distinctions among these structures are frequently distorted. There are multiple candidates that can serve as models. Significantly, most of these structures are civilian in nature with militaries playing critical but nonetheless supporting roles. UN–CIMIC is the international military framework for civilCandidate Models military coordination for the complete range of operations to include conflict prevention, peacemaking, peace enforcement, peacekeeping, • Civil-Military Operations Center and peace building. The role of the United Nations Humanitarian Civil• European Union Naval Force Somalia Military Coordination (UN–CMCoord) is facilitating dialogue and inter• Humanitarian Operations Center action between the civilian and military participants, protecting and • Joint Coordination and Monitoring Board promoting humanitarian principles, avoiding competition, minimizing • Joint Support Force inconsistency, and pursuing common goals when appropriate. • Provincial Reconstruction Team Executive Even though the purpose of civil-military operations and Steering Committee humanitarian operations centers are similar, there are significant differ• Special Staff Offices ences. The former is established for a combined joint task force and the • United Nations Civil-Military latter by the government of the nation concerned, the United Nations, Coordination or possibly the Office of Foreign Disaster Assistance in unilateral US • United Nations Humanitarian Civiloperations. Humanitarian operations centers, especially when organized Military Coordination under UN auspices, are structured horizontally without any command or control authority, where participants are ultimately responsible to either their own organization or country. Lastly, the European Union Naval Force Somalia, which is conducting Operation Atalanta, is particularly relevant to an analysis of maritime security. Multidimensional Missions Geopolitical factors such as globalization, competition for resources, and international stability are evolving rapidly. Multidimensional missions perform 9 Principles and Mechanisms numerous tasks: military, police, rule of law, human rights, reconstitution, public information, et al. Like a comprehensive approach, no universally accepted definition of a multidimensional mission exists. What is clear, however, is that the missions examined herein go beyond military operations and need multiple components to be effective. The principles of a comprehensive approach can be extended to multidimensional security operations in support of maritime and cyber missions, which go well beyond military activities. Such operations include multiple players drawn from national civilian agencies, international and nongovernmental organizations, commercial and social media, and private industry. . . . Regardless of organizational structure, comprehensive approaches to operations must be guided by best practices developed through prior experience. Although this chapter has been focused on organizations, these structures are comprised of people, and interpersonal skills based on mutual respect are fundamental to effective interaction. Most operations will be at best unorganized, and at times chaotic, especially during their early days. The effects of this disorder can be mitigated through precision in terminology, which is critical to mutual understanding. The operational environment will be increasingly complex and will need to be adapted to changing conditions. Furthermore, when determining military courses of action, the effects on other players must be considered. Many of the risks associated with a comprehensive approach could be reduced through pre-crisis training and the establishment of a common lexicon. The United Nations, NATO, and other organizations offer relevant programs that could enhance the effectiveness of operations employing a comprehensive approach. Finally, undesired effects of military actions must be considered as well as perceptions of the independence and neutrality of the roles and mandates that distinguish individual cooperating organizations. 10 Principles and Mechanisms Chapter 2. Multidimensional Peacekeeping by Scott Moreland P eacekeeping operations are implemented not only to maintain security but also to restore public order, protect civilians, impose the rule of law, and integrate former warring parties into society. To carry out these missions, the United Nations (UN) Security Council issues mandates sanctioning peacekeeping operations in response to either crises or conflicts that threaten international stability. Peacekeepers may be deployed as blue helmets controlled by the United Nations or as part of a coalition or unilateral command authorized by a UN mandate such as the African Union forces in Somalia or the NATO International Security Assistance Force in Afghanistan. Multidimensional peacekeeping missions are opportunities for applying the principles and mechanisms of a comprehensive approach. In addition to deploying security forces, UN peacekeeping operations are legitimate international coordination mechanisms that enable a range of partners to make contributions. In practice multidimensional peacekeeping furthers political, economic, and humanitarian development efforts by securing operational space in both conflict zones and during crises. Security operations are generally coordinated among official bodies but also include ways to facilitate ad hoc arrangements among peacekeeping forces and nonaligned Objective humanitarian actors, security support to local authorities, and To provide an overview of multidimensional authorization to intervene in cases of acute humanitarian crisis at peacekeeping, explore practical examples of complex the tactical level. operations, and identify comprehensive approaches In considering the applicability of multidimensional to peacekeeping operations that unify diverse aims peacekeeping as an exemplar of a comprehensive approach, and enhance coordination. this chapter examines both existing and emerging coordination mechanisms among key actors. The examination is based on current operations and aimed at enhancing the appreciation of multidimensional peacekeeping, identifying best practices, and applying lessons learned. Additionally, this chapter utilizes the essential principles and mechanisms of the comprehensive approach discussed in the previous chapter. A Practical Model The United Nations has not sanctioned the comprehensive approach as doctrine, but that is largely a question of semantics. However, the multidimensional approach has been defined by a UN resolution as a coherent operational model for 11 synonymous concepts that links the comprehensive approach to peacekeeping operations. The emphasis placed on coordinated and sustainable solutions relates to the goal of a comprehensive approach. While the United Nations endorses and actively seeks to implement a comprehensive approach to multidimensional peacekeeping, it faces many of the operational problems that also weakened NATO efforts in Afghanistan. Shifting allegiances, fluid security condiUN Multidimensional Approach tions, and internal disunity constantly threatened mis. . . a comprehensive, coherent, and integrated approach sion effectiveness and credibility in complex crises in the to the maintenance of international peace and security by Darfur, Democratic Republic of the Congo, and Syria. preventing conflicts, preventing relapse, and building sustainable This chapter looks at the comprehensive approach peace through effective preventive diplomacy, peacemaking, in the context of multidimensional peacekeeping operapeacekeeping, and peacebuilding strategies. tions. The topical sections are sequenced to provide an —Resolution 2086 (July 21, 2013) appreciation of multidimensional peacekeeping as a practical model for implementing the approach. From this point of departure, key tasks associated with peacekeeping will be examined with both the actors and organizational structures required to accomplish them. The chapter presents a model for deriving key multidimensional tasks from the mandate and associated lines of effort. This systematic approach links missions to accompanying tasks and desired outputs and culminates with an evaluation that attributes benchmarks and quantifiable productivity to measure task completion. This examination demonstrates interdependency connected to coordinated lines of effort and validates the comprehensive approach. Despite the imperative to make use of a comprehensive approach to multidimensional peacekeeping operations, the fundamental complexity and fragile security conditions of the missions pose numerous challenges. Many UN operations are designed with the uniformed military and police forces running security missions in the same space as nongovernmental organizations and UN activities. It is common for such entities to coordinate with financial institutions, development agencies, and nongovernmental organizations that react to public and private interests. In addition to developing military capabilities, regional organizations such as the European Union have also been developing and are deploying civilian response capabilities. The management or at least effective coexistence with mission actors presents unique and daunting challenges for leadership, mission coordination, and unity of purpose. Some of the more common challenges will be examined with possible options based on the unique characteristics of missions and actors that facilitate application of a comprehensive approach. Finally this imperative will be reprised and the best practices and lessons learned from peacekeeping operations will be reviewed to inform mission planning. Vital Partnerships The United Nations is the leading guarantor of peace. The complexity of modern conflicts and crises demands a flexible and responsive peacekeeping capability. Peacekeepers must be able to operate effectively among warring factions, criminal gangs, and citizens in need of security and humanitarian aid. Moreover, 12 Multidimensional Peacekeeping peacekeeping relies on political commitment as well as national contributions of reliable and sustainable support. no standing peacekeeping force Peacekeeping operations must also be buttressed by proper, peacekeeping operations completely dependent legitimate, and effective authorities to attract both local and interon donor nations national backing. In sum, peacekeeping missions cannot achieve peacekeeping budget under one percent of their objectives without the prospect of reconciliation. global military expenditures UN peacekeeping needs adequate and efficient means to funding, personnel, and resource shortfalls gain competitive advantage. New force structures such as formed overcome by depending on partnership with police units and military intervention brigades provide tactihost nations and external support cal advantages, more agility, and deterrent effect for peacekeeping missions. Coupled with satellite mapping and collaborative information networks, the stakeholders can better understand actions that impact on success. But these specialized forces and capabilities are not available to many troop-contributing nations. Thus the United Nations must depend on partners more closely identified with warfighting than peacekeeping. The same is true in those cases when for various reasons the United Nations depends on security partnerships rather than so-called blue helmet forces to fulfill a mandate of the Security Council. Whether adjunct security support involves African Union peacekeepers in Somalia or French-led troops in Mali, it provides essential peace enforcement capabilities in volatile regions. As the United Nations increasingly turns to external forces, its mandates must clearly specify actions and restraints that will sustain legitimacy and direct transition to sovereign authority without unduly hampering mission effectiveness. UN Overview • • • • Modern Challenges The term peacekeeping has traditionally been identified with lightly armed personnel who maintain separation between two sides in a conflict that agree to stop fighting. In the past, conflicts requiring peacekeeping operations were usually between two nations (interstate). By contrast, some recent conflicts have involved two or more factions in the same country (intrastate). Civilians are often targeted alongside the military, and the groups involved do not customarily observe the law of war. Given the sophistication and risks associated with peace operations, efforts such as peacemaking and rebuilding are required. Peacekeeping creates time and breathing space for diplomatic efforts to address the underlying causes of conflict. It utilizes military power to create conditions conducive to pursuit of a diplomatic solution. Traditional peacekeeping operations are defined by the following features: • involved parties agree to external intervention • conflict between two or more nations contained within a defined battlespace • international laws of armed conflict accepted by the combatants • impartiality exercised on the part of peacekeeping force • minimum use of force. Modern conflicts are a complex mix of internal and international influences. Their roots may be mainly internal, but they are complicated by cross-border involvement either by states or by economic interests and other international 13 Multidimensional Peacekeeping players who have an interest in the conflict. As a result, the structure of peacekeeping missions has also changed. Multidimensional Options UN peacekeeping operations involve military, police, politics, civil affairs, rule of law, election monitoring, human rights, humanitarian affairs, reconstruction, public information et al., which are essential to multidimensional missions. However, traditional peacekeeping often delivers inadequate intervention. As a consequence, peacemaking or peacebuilding—even peace enforcement—are better means of achieving and sustaining peace. Peace enforcement refers to situations addressed under chapter 7 of the UN Charter, namely “Action with Respect to Threats to the Peace, Breaches of the Peace, and Acts of Aggression.” Accordingly, it is usually reserved for Peace Operations violent conflict and departs somewhat from traditional peace• peacemaking—employs diplomacy and negotiation keeping. Its mission characteristics may include: to intervene in conflicts • peacebuilding—refers to UN action to establish conditions for peace by the empowerment of legitimate governance and protecting vulnerable peoples • peacekeeping—includes reintegrating former combatants into civilian society, improving security forces, strengthening the rule of law, improving respect for human rights, providing developmental • deployment of peacekeepers without consent of all sides in a conflict • more interaction between uniformed troops and humanitarian agencies • complex and long-term mission objectives involving various applications of military forces including maintaining, consolidating, and imposing peace as well as reconstruction, intervention, and humanitarian support. Peacekeeping operations have taken on a new face over the past decade. The lack of donor funding, equipment, and reconciliation techniques professional and technically competent troop contributions has been a major limiting factor in many blue helmet operations. Because of the capability gap, many UN operations are delegated to either non-UN regional or multinational security forums such as the North Atlantic Treaty Organization, European Union, Organization for Security and Cooperation in Europe, and African Union. This is particularly true of peace enforcement operations, which involve regional security imperatives and assertive military responses that may not be attainable or appropriate under direct UN auspices. assistance, and promoting peaceful mediation and Command and Authorities The UN Integrated Mission Planning Process (June 13, 2006) stated “an integrated mission is one in which there is a shared vision among all UN actors as to the strategic objectives of their common presence at the country level.” In recent crises traditional military command and control leadership has been challenged. Senior officers understand that operations are only one component of a larger campaign with a range of participants including host nation governments, external government agencies, international and regional organizations, and nongovernmental and private sector actors. Since the military cannot impose leadership on these diverse but essential partners, leaders must internalize their need to include coordination and consensus, the essentiality of trust and information sharing, and the necessary constraints that bar full integration. 14 Multidimensional Peacekeeping Integrated missions provide means to operationalize the concept of a comprehensive approach. They are defined by common purpose and the mutual awareness among various participants united under a mandate. Such missions are personified by a cooperative spirit and coordinated lines of activity. Their structures are influenced by operational conditions and intricate amalgams of political, humanitarian, security, and development imperatives. Likewise every mission requires unique capabilities tailored to meet the characteristics of the operational space. Integrated missions usually distinguish between lines of command, coordination, and communication. What is more, leaders must adapt concepts of mission command to focus on the synchronization and harmonization of diverse participants who are entangled within the same complex and disordered operational space. Initial attempts to enshrine integrated missions into fixed organizational structures and operational models proved to be difficult and counterproductive. As the multifaceted nature and inherent complexity of integration missions became evident, research shifted from standardized mission templates to a more agile visualization that first analyzed the operational requirements, then designed a suitable mission structure. As the integrated mission concept moved to the field, immediate conflicts emerged that necessarily imposed barriers on the full integration of all mission actors. For example, the need to safeguard humanitarian impartiality and neutrality often superseded the perceived efficiencies and enhanced security that might be gained by openly cooperating with military peacekeepers. Full mission integration may be tempered and limited by the factors that enable the success of a peacekeeping mission, namely credibility, legitimacy, and national or local ownership. Mission leaders must place the peacekeeping principles at the forefront and remember that coordinated efforts only enhance operational effectiveness when they are carefully orchestrated to uphold the legitimacy of the mission and its actors. The accompanying model (Figure 2.1) offers one graphical representation of how these disparate mission elements might be amalgamated in a cohesive organizational structure. The lines in the model organizational structure connecting various components reflect a flexible organizational network rather than a command structure. Agents connect to the mission according to their functions, responsibilities, and contributions. This delicate balance demands strong and responsive leadership in each functional area. Humanitarian agents must determine how they might cooperate with peacebuilding and peace consolidation components, especially in the midst of active conflict. Humanitarian space is also operational space, and mission leaders must appreciate the nexus of the two in order to achieve operational coherence among other elements of the UN mission, as well as external actors. Effort, Responsibilities, and Tasks The transition from conflict to sustainable peace is both delicate and arduous. A range of simultaneous and mutually supporting activities must be harmonized or deconflicted for peace and accountable governance to take hold. Multidimensional peacekeeping missions require united and sustained political leadership as well as a mandate and donor backing to provide requisite authority, finances, 15 Multidimensional Peacekeeping Figure 2.1 Model Organizational Structure for Integrated Missions Special Representative of the Secretary-General Deputy Special Representative of the Secretary-General (Regional Coordinator/ Humanitarian Coordinator) Deputy Special Representative of the Secretary-General Joint Mission Analysis Center Joint Operations Center Joint Logistics Operations Center Chief of Staff/ Chef de Cabinet Director of Mission Support Disarmament, Demobilization, and Reintegration Political Affairs Rule of Law Elections Human Rights Public Information Police Commissioner Police Advisers Chief Integrated Support Services Force Commander Formed Police Units UN Authority UN Operational Control UN Tactical Control Coordination Sector Commanders Force Support Elements United Nations Development Program Office for the Coordination of Humanitarian Affairs United Nations Children's Fund United Nations High Commissioner for Refugees Office of the High Commissioner for Human Rights World Food Program World Health Organization National Organization Nongovernmental Organization expertise, and resources. Peacekeeping operations are fraught with scant resources and difficult conditions that necessitate focus on the most essential tasks. The UN Capstone Doctrine identifies core strategic peacekeeping tasks to: • create a secure and stable environment and strengthen the ability of the state to provide security with full respect for the rule of law and human rights • facilitate political processes by promoting dialogue and supporting legitimate and effective institutions of governance • provide a framework to ensure UN and other international actors pursue activities at the country level in a coherent and coordinated manner. Operationalizing these tasks requires aligning several lines of activity in a comprehensive plan. Key peacekeeping functions are stipulated within a broader 16 Multidimensional Peacekeeping campaign plan including added tasks that may require support, coordination, or at least mutual cognizance between uniformed facilitate political processes peacekeepers and other lead agencies and organizations. create secure and stable environment These tasks address crosscutting issues that have an strengthen rule of law with respect for human rights impact on the implementation of the peacekeeping mandate promote social and economic recovery and ultimately transition to legitimate and effective governance. Mission leaders need to be aware of how their actions and aims impact the range of tasks, and at the least not work at cross purposes. Further, military leaders in particular must be cognizant of needs for political primacy and their command and coordination relationships with political leaders. They must adopt a consultative and unified approach to develop the trust and teamwork necessary to accomplish complex postconflict tasks. Peacekeeping Functions • • • • Challenges and Considerations It is now commonplace for a peacekeeping operation to share the same operational space with humanitarian nongovernmental organizations and UN specialized agencies, funds, and programs as well as international financial institutions, development agencies, and direct donor programs sponsored by external governments. Mission command and coordination mechanisms may not always be explicit, and even when coordination frameworks exist, they cannot be imposed and are hostage to the goodwill and compliance of the contributing agencies and organizations. The cohabitation of military operational space and humanitarian space is a perennial challenge in multidimensional peacekeeping. Peace enforcement missions especially may place tactical security requirements at odds with impartial humanitarian assistance. Recent operations have evidenced that providing military assistance through quick impact projects or command-directed local development efforts can be important components of the toolkit of commanders. As a result, military units are increasingly involved in delivering relief aid while humanitarian organizations must rely on the military to ensure the safety and security of their staffs and operations and also enable access to target populations. Many humanitarian actors view an inherent dilemma between the need for a coherent approach by all UN entities and the need for humanitarian operations Figure 2.2 Core Tasks of Peacekeeping Operations Post-Conflict Tasks INFRASTRUCTURE EMPLOYMENT ECONOMIC GOVERNANCE CIVIL ADMINISTRATION ELECTIONS POLITICAL PROCESS SECURITY OPERATIONS DISARMAMENT, DEMOBILIZATION, AND REINTEGRATION RULE OF LAW CAPACITY BUILDING HUMANITARIAN ASSISTANCE 17 Stabilization Transition Long-term Development World Bank / International Monetary Fund United Nations Peacekeeping International Committee of the Red Cross / Nongovernmental Organizations Multidimensional Peacekeeping Case Study: Directive from an Insurgent Leader The following narrative is excerpted from a directive issued by an insurgent commander to his subordinates, which appeared in an article by Ramey L. Wilson entitled “Be Wise, Not Foolish: Medical NGO Deterrence Through an Insurgent Lens” in Small Wars Journal, July 17, 2013. [N.B. Consider the humanitarian and military implications of the directive.] “If you decide to let them operate in your area, you must insure that the people perceive the NGO presence as evidence of our authority, not the corrupt government’s. More importantly, you must make it very clear to the NGO that we determine their access to the population. Without access to the people, the NGO will be unable to perform their work and will be perceived by their donors as ineffective and a failure. “You must communicate to the NGO that their personal safety and access to the sick are dependent upon two things. First, the NGOs must give us credit for all of the care they are providing, not the corrupt government. Secondly, they must have no contact with the foreign invaders or intelligence agencies of the corrupt government. The NGO must know that if any information about you or your fighters is passed to our enemies, either by their workers or their patients, it will be on their heads.” This excerpt highlights the complexity related to notions of impartiality and humanitarian space. From a humanitarian perspective, making concessions to insurgent leaders to gain access to populations in need might be acceptable trade-offs. From a military perspective, however, these concessions might empower groups that threaten security and jeopardize mission effectiveness. Moreover, it is not only so-called threat groups that might want to shape humanitarian assistance to achieve political and military goals. Humanitarians will be cautious about efforts that intend or are perceived to advance military objectives and cast doubt on humanitarian impartiality, whether requested by a mission or host nation, or by donors. Political, military, and humanitarian community leaders must understand the mission conditions to grasp how coordination might be effective and mutually supporting as well as how natural and proper limitations might impede unified action based on divergent organizational aims. to maintain neutrality and impartiality. Where military assistance tends to have a tactical aim that shapes security conditions, humanitarians tend to go where the need is most acute, regardless of factional affiliations or political sympathies. Groups or communities that militaries may classify as threats may be seen in turn by nongovernmental organizations as legitimate interlocutors for provision of humanitarian access to communities in need within the regions they control. If humanitarians interact too closely or openly with the military, there is concern that legitimacy and impartiality may be compromised. Additionally, the militarization of foreign aid can result in unanticipated security consequences. Tactically expedient assistance may lead to the perception that affected populations are favored over others, inflaming tension and even causing serious breakdowns in security and stability. Discreet coordination between uniformed peacekeepers and humanitarian agents can alleviate mission overlap, facilitate situational awareness, and preclude unintended consequences of poorly coordinated military-led assistance efforts. The Way Forward Peacekeeping remains a work in progress, and the complexity of modern conflicts and crises demands a flexible and adaptive approach. Increased demand for peacekeeping continues to stretch peacekeeping capacity thin, and reliance on national and regional security consortiums to enable and then augment UN peacekeeping is likely to increase. These missions demand sophisticated environmental 18 Multidimensional Peacekeeping awareness, professional discipline, and tactical restraint. Technical proficiency in high-end capabiliAlthough the military remain the backbone of most peacekeeping ties such as engineering, medicine, logistics, and air, operations, the many faces of peacekeeping now include administrators land, and sea transport are likewise required. and economists, police officers and legal experts, de-miners and With a broader range of objectives, UN electoral observers, human rights monitors and specialists in civil affairs operations are increasingly multifunctional. Military and governance, humanitarian workers and experts in communications leaders must consider how security tasks relate to and public information. humanitarian, developmental, and political objec—UN Department of Peacekeeping Operations tives. A broader range of objectives demands a new multidimensional approach that includes military, civilian, and police involvement. This diversity requires unity of effort and purpose if the mission is to achieve coherence. It is also clear that peacekeepers must be capable of accomplishing a variety of tasks. In addition to a traditional security role, they are expected to uphold law and order, monitor human rights, and promote responsible and sustainable governance. Civil and Military Skill Sets . . . The comprehensive approach is one organizing concept for harmonizing the various efforts of a diverse assortment of contributors to multidimensional peacekeeping operations. Best practices for coordination and establishing unity of effort vary from one mission to another like the feasible level of cooperation among the participants. Leaders must understand their mission, the conditions, and operational contexts that introduce opportunities as well as the constraints that impact a coherent approach to common aims and objectives. The approach is not a prescription or a procedure; rather, it is a conceptual framework designed to assist leaders in the analysis and execution of cooperative mechanisms to reinforce multifaceted campaign aims, while appreciating that there will be deliberate and legitimate limits to full mission integration. As the lessons derived from multidimensional peacekeeping missions are internalized, the comprehensive approach concept should remain open to critical examination, evolution, and creative application. 19 Multidimensional Peacekeeping Chapter 3. International Maritime Security by Jeffrey E. Kline and Lyla Englehorn T he challenges of governance within the maritime domain exemplify the complex environment in which a comprehensive approach is essential. Even in the territorial waters of a single nation, maritime governance coordinates activities among many organizations that share information to establish awareness, agree on legal authorities, and deploy assets to patrol and counter threats in the commons. When disputes or conflicts occur on the open sea or within ungoverned territorial waters the situation can be aggravated by legal, historical, and cultural issues. The incentives to overcome maritime challenges arise from international recognition of the common benefit of the oceans as highways of trade, mediums of communication, and sources of food and natural resources. The concept of a maritime common is established by the freedom of the seas doctrine that initially appeared in Mare Liberum by Hugo Grotius in 1609. His thesis on the right of the Dutch East India Company to exploit colonies in Southeast Asia Objective drew on ancient free trade traditions and became the basis of To introduce stakeholders with varying interests in international law that identifies the oceans as global commons. the oceans to issues, examine models of maritime This settled admiralty law has been codified in the United Nations governance, and consider comprehensive efforts Convention on the Law of the Sea and the International Convenby the United Nations and the European Union to tion on the Safety of Life at Sea. combat piracy. The value of the oceans is measured in trade and resources. The United Nations has reported that 7.8 billion tons of international cargo, or more than 80 percent of trade, is transported by sea. Additionally, the UN Food and Agriculture Organization indicates that fisheries and aquaculture provided 148 million tons of fish in 2010 with more than 80 percent consumed as food products. Additionally, 550,000 miles of undersea cables transmit the bulk of cyberspace communications. The oceans also provide energy resources for many nations through oil drilling, wind power, and wave motion. Moreover, they constitute natural frontiers that connect 80 percent of the nations in the world and serve as conduits for humanitarian response and logistics. Maritime Domain International treaties protect the oceans of the world as a common good. These agreements are enforced by a comprehensive approach that provides legal frameworks, resource allocation, commercial regulation, mitigation, and myriad 20 provisions. They challenge states, organizations, and corporations to accede to standards of conduct, protect vital interests, and resolve conflicts, but they do not prevent competition. With the rival claims in economic exclusion zones (EEZs) from the Arctic to South China Sea, offshore resources, and fishing The Challenge of the Sea grounds, and threats posed by crime and terrorism, the maritime The oceans of the world represent both a common domain is not lacking in challenges. good and a source of conflict. Overlapping The complexity of maritime issues can be illustrated by a political, military, economic, cultural, and other fairly straightforward example of piracy. A large container ship may interests necessitate a comprehensive approach to belong to owners in one nation, fly a different nation’s flag, and be ensure multidimensional response to crises. manned by a multinational crew to transport its cargo to anywhere in the world. Once taken by pirates, the ship becomes of interest to the various nation-states whose citizens are involved in this process. Which of these nations should take the lead in representing or acting on behalf of the hostages and goods being ransomed? Although recent practice has recognized ship owners to be the primary negotiators with the pirates and to have the final say on use of force, the answer to this question still depends heavily on the circumstances. Users and Abusers Nation-states are responsible for continental shelf and EEZ claims, and they introduce flagged naval and merchant vessels for political and commercial reasons. However, nations do not use oceans in identical ways. National maritime police, coast guards, customs and border patrols, naval forces, commerce and tourism agencies, and fishery authorities can exercise overlapping jurisdictions and interests in offshore and international waters. International organizations such as the United Nations International Maritime Organization (IMO) and the International Maritime Bureau (IMB) of the International Chamber of Commerce provide frameworks and mechanisms for nation-states and business interests to act collectively to mitigate risks ranging from weather to pirate attacks. These organizations are enabled and limited in their actions and resources by their members, but they do present a worldview and provide a communications umbrella for the maritime domain. For example, IMO and IMB collaboration efforts that institute best practices for safe navigation and countering piracy are disseminated throughout the commercial sector. Other organizations are focused on mitigating the threat such as the Contact Group on Piracy off the Coast of Somalia, which was created in 2009 by a UN Security Council resolution. Nonstate actors are divided into legitimate users and threats, with the latter group further broken into those who exploit the maritime domain for nefarious purposes and those who disrupt users. The actors include merchants, telecommunication conglomerates, deep-sea mining and drilling firms, fishermen, tourists, and scientists. Additionally, competing interests occur among the legal users. For example, fishermen and tourists are concerned with the impact of offshore drilling and resorts. Moreover, misgivings arise in the telecommunication sector over dredging projects and fishing practices that may compromise undersea cables. Nonstate threats include smuggling, poaching, polluting, and illegal immigration, and both terrorism and piracy endanger state and nonstate users. Actors 21 International Maritime Security fall into different categories based on location, intentions, and profiles. One man’s fisherman might be another man’s poacher, and environmental activists are seen alternately as watchdogs or disruptive forces operating outside the law and threatening legitimate maritime enterprises. For instance, Russia charged members of Green Peace with piracy for boarding an oil rig in the Arctic Ocean but then reduced the offense to hooliganism. Despite diverse intentions on the legitimate use of the oceans, a comprehensive approach representing a dependable range of users is needed to respond to crises. Governance Widely accepted principles establish and preserve maritime governance in territorial waters and on the high seas. For purposes of this discussion, governance is defined as the ability to mitigate risks related to use of the oceans or respond to emergencies through such activities as search and rescue. Moreover, it requires institutional integrity on the part of organizations engaged in maritime governance. For example, smuggling becomes hard to deter when customs agents are bribed to ignore shipments crossing borders. As a consequence integrity cannot be presumed in all situations and must be addressed in planning comprehensive approaches. The first principle of maritime governance is gaining timely knowledge about areas in question. Known as maritime domain awareness, this knowledge is the product of information based on intelligence and sensors that is analyzed and shared in responding to emerging issues. The difficulties involved in establishing maritime domain awareness are a function of the area of Principles the ocean concerned, resources needed to collect and analyze the infor• knowledge—maintain awareness mation, and the number of organizations requiring the information. For (collect, analyze, and share information) example, an observer scanning the horizon from shore with binoculars • platforms—patrol and response may spot potential poachers and alert someone to intercept them and • law—authority to operate check their license to fish. In contrast, the task of mitigating the risks of hurricanes to mariners requires weather forecasting that depends on worldwide sensors, multiple collection centers, complex prediction models, and global communications. Platforms such as ships and aircraft are needed to provide hosts for sensors, visual patrols for deterrence, and the ability to intercept, board, and detain potential threats. The capability of platforms to search, cover, and intercept determine the enforcement capacity of governance. Returning to the counterpoaching example, one intercept boat capable of traveling at 25 knots is sufficient to cover a ten-mile radius from the shore tower. If attempting to effectively respond to piracy in the Indian Ocean, however, more platforms are required to collect information, monitor activity, provide a deterrent presence, and react as needed to counter pirates. Finally, gathering information and responding necessitate a legal foundation to operate and prosecute offenders. In the case of counterpoaching, legal authority is delegated by the nation in whose waters the activities are conducted. The individuals both on shore and aboard the intercept boat might be fisheries officers enforcing the law. When extending the reach to the high seas and to the ungoverned territorial waters of other nations, legal authorities are less straightforward and enforcement 22 International Maritime Security is challenging. UN resolutions, international and bilateral treaties, court settlements, and historical precedents offer models for legitimate maritime governance. With a foundation of institutional integrity, the knowledge, platforms, and laws to establish maritime governance appear straightforward. However, executing the principles may be opposed at national and international levels by overlapping jurisdictions, rival claims, resource shortages, ungoverned waters, mistrust between nations and organizations, competing interests, and threats that exploit these seams. At a minimum, establishing governance in territorial waters requires the collaboration of nations, organizations, and nonstate actors. These challenges are underlined by successful efforts to crush the piracy that flourishes off the Horn of Africa. Combating Piracy The traditional world of piracy involves ungoverned land space and insecure waters, proximity to shipping lanes, and resources (men, arms, and boats). Identifying these conditions and the means required to address them comprises a comprehensive approach by the international community. The United Nations, Atlantic Alliance, and European Union have applied the principles of the comprehensive approach to countering piracy in the Horn of Africa. Pirate attacks and hijackings have decreased since 2010 in the Indian Ocean and around the world. The IMB cites preemptive naval actions against pirate mother ships, private security teams on board merchant vessels, and the applications of best practices in order to deter and defeat pirate attacks. The extent of cooperation that has been developed among navies from the shared objective of establishing maritime governance is unprecedented. More than two dozen nations have made contributions to naval deployments including Combined Task Forces 151, Operations Atalana and Ocean Shield, and efforts by Chinese, Indian, and Russian forces. Even though deployments operate under national guidance with varying rules of engagement, their common purpose led to Shared Awareness and Deconfliction meetings for mutual awareness. Those meetings coordinate information exchange, address communication conduits, deconflict operations, and represent the military contributions, requirements, and recommendations to the more policy-oriented Contact Group on Piracy off the Coast of Somalia. With UN resolutions as the legal basis, many navies apply the principles of maritime governance in a comprehensive approach. These efforts address the desire of the international community to counter the ungoverned seas element in a piracy environment. The operations reflect a comprehensive approach to deal with a complex maritime environment and differing national policies, but the challenges do not end there. The international community must address other facets of piracy including proximity to shipping lanes, ungoverned land, and a source of men, arms, and boats. Although merchant transit rerouting has been used to avoid or minimize exposure to pirates from Somalia, the Indian Ocean remains a major highway for world trade. With transit planning and additional IMB best practices, however, ships can make themselves hard targets. These best practices include increasing transit speed through risky waters, weaving during pirate attacks, creating physical deterrents to boarding, increasing freeboard, and having post-boarding response plans. 23 International Maritime Security In addition, private security companies aboard merchant ships in pirate waters have been successful in deterring attacks. The IMB Piracy Report Centre in Malaysia shares awareness worldwide on near real-time attacks to help vessels avoid danger. The activities of nongovernmental organizations are loosely coordinated with international and national efforts to introduce maritime governance in the shipping lanes of the Indian Ocean. For example, the International Recommended Transit Corridor in the Gulf of Aden was instituted by the Sub-Committee on Safety of Navigation of the UN International Maritime Organization to protect ships passing through high-risk areas. Merchants voluntarily report on convoy schedules, the entrance into and exit from the sea lanes, and incidents en route. The Horn of Africa In January 2013 the European Parliament adopted a resolution on the EU Strategy for the Horn of Africa. It acknowledged traditional concerns attributable to poverty, food scarcity, and lack of governance. On the danger to merchant shipping, a history of poor governance has encouraged pirates to seek havens and recruit impoverished locals to man their boats in Somalia. Earlier the Council of the Figure 3.1 Somali Piracy Threat (2005–2010) 24 International Maritime Security European Union provided a strategic framework for the Horn of Africa based on five lines of effort that included the following regional objectives: • • • • • build democratic, sustainable, and accountable political structures work with local and international partners to resolve conflicts ensure security in the region does not threaten neighboring nations support measures to promote economic growth and reduce poverty develop political and economic initiatives to foster cooperation. In addition, it established the European Union Special Representative for the Horn of Africa to coordinate strategy, organizations, and partners in support of regional efforts. The success in addressing foundational issues related to the Horn of Africa originates in the lessons of the European Union in developing a more holistic approach toward countering piracy. Those lessons highlighted several important areas that demonstrated a need to: • designate an overall coordinator to mount a comprehensive approach in the region • increase information sharing to combat the financial and logistical support of piracy • facilitate intelligence collection and relief efforts by nongovernmental organizations • organize representation in international bodies to address the incarceration of pirates, collection of evidence, and management of interaction with private security companies • establish a desired endstate or a shared vision among member states. These recommendations included economic components to develop port and fishery operations, livestock exports, and telecommunications; security components to transform land governance; and judicial components to establish courts in Somaliland. These provide a template for efforts by the The Complexities of Piracy United Nations, European Union, and other organizations to establish effective governance in Somalia. New measures to enhance the effectiveness of counterProsecution of piracy-related financial transactions piracy efforts and successfully prosecute alleged is also under international consideration. The UN Security pirates will be crucial. The recommended solution is to Council passed Resolution 1950 in November 2010, which implement, on an extremely urgent basis, a comprehensive urges states to investigate transnational criminal networks that multidimensional plan targeting Puntland and Somaliland finance and receive funds from Somali piracy. In response, the and comprising three components—economic, security and Contact Group on Piracy off the coast of Somalia established jurisdictional/correctional—that would be brought to bear an expert group on illicit financial flows to monitor money simultaneously. going into and out of piracy activities. Further UN working —Report to the UN Security Council (2011) groups involving law enforcement organizations, private industry, and policy representatives have called for enhanced information sharing on financial transactions, increasing knowledge in channels of money laundering in the region, and better training to counter these activities. . . . The calls for a comprehensive approach to the complex issues of piracy have resulted in a decrease in Somali pirate attacks, which points to the success of 25 International Maritime Security the response. In fact, a comprehensive approach is being recommended to address piracy in other areas of the world. As governance and economic development languishes ashore in Somalia, piracy remains the easy business for many young Somali men, and the enterprise continues to expand and adapt. A report by the Center for Naval Analysis on illegal or unregulated fishing off East Africa found that pirates were moving beyond ransoming hostages and were now selling licenses to international fishermen and offering protection for their boats for a fee. This example demonstrates how threats adapt to changing conditions and the subsequent need to regularly assess and adjust actions taken in a complex and fluid environment. International responses to piracy illustrate the application of comprehensive approaches to the maritime domain. Although acknowledged as a common good, continued freedom to access the oceans implies that legal, political, and other implications must be comprehended before an approach is made to mitigate threats to sea lanes, resources, and infrastructures. Understanding the principles of maritime governance and addressing the threats to the global commons are the first steps to ensuring that the oceans remain available to all mankind. 26 International Maritime Security Chapter 4. Deterrence of Cyber Aggression by Scott Jasper A ll sectors of the economy rely on networks, systems, and services that form the integrated and interconnected domain known as cyberspace. Information and communication technologies are indispensable to national security, particularly in both the defense and intelligence communities. Cyber protection is challenging because the domain is boundless, constantly changing, and open to all comers. In addition, cyber aggression is relentless, pervasive, and dangerous, and includes the theft or exploitation of data, disruption or denial of access or service, and destructive actions such as corruption, manipulation, and damage. Cyberspace is probed and penetrated by hackers, criminals, terrorists, and foreign powers. As an interdependent network of information and communication technology infrastructures, it does not differentiate among commercial, civil, and military spheres. For example, industries own and operate 90 percent of Objective the critical infrastructure in the Nation. Cyberspace integration is vulnerTo secure cyberspace with its globally able to cascading disruptions of infrastructure or key resource sectors. connected structure of servers, switches, The severity and complexity of cyber aggression compels cooperaand routers with the cooperation of tion among stakeholders in the government, industry, and defense sectors individual stakeholders. to deter threat actors. The best way of attaining cooperation is examining and adapting extant models of the comprehensive approach as applied to mutual security concerns. The North Atlantic Treaty Organization declared in 2010 that the adoption of the comprehensive approach by member nations relates not only to operations but also to Alliance activities involving threats such as cyber attacks. The approach to cyberspace could be applied to cooperative efforts that deter aggression. Threat Actor Strategies Cyber warfare can be defined in military terms as armed conflict conducted entirely or in part by cyber means. Contemporary acts of cyber aggression such as criminal exploitation, military or industrial espionage, nationalist hacker protests, and infrastructure infiltration or sabotage might represent lower level means of cyber warfare. The buying or renting of viruses (malicious code), exploits (code vulnerabilities), bot (compromised machine) networks, and command and control servers provide an array of tools for hostile actors and states. An attacker may launch a military confrontation during a period of tension by attacking civilian 27 infrastructure, synchronizing cyber attacks with surprise military strikes, or waiting until the war starts to activate previously implanted cyber disruptions. In addition to military operations that deny opposing forces the effective use of cyberspace systems and weapons, some national cyber campaign doctrine includes disruption of governmental services, financial enterprises, and media outlets. The distributed denial of services (DDoS) assaults (that flood systems with useless traffic) on Georgian infrastructure in 2008 heralded the reality that cyber aggression will be a component of any future conflict. Blogs and forums spread instructions and script to pro-Russian hackers to disrupt Georgian public and private sector Web sites. During the ground invasion, command and control servers managed by a cybercrime group issued DDoS attack commands. Russian nationalists in the cyber riot in Estonia used similar means in 2007. Other nations might find comparable uses for nonmilitary actors and services against civilian targets. Chinese military doctrine calls for attacks on critical infrastructure in the enemy homeland in the event of war. In a conflict over Taiwan, computer network operations on the Mainland appear designed to target regional American logistics chains in host nations as well as logistics networks and companies in the continental United States. Failures of power grids, transportation networks, and banks could result in physical damage and economic disruption. The US military is dependent on this critical infrastrucAdvanced Persistent Threats ture at home and abroad. Chinese capabilities could Intrusions that penetrate networks and systems to covertly steal impede military readiness and the operation of US information, manipulate data, and cause damage are commonly critical infrastructure. characterized as Documented incidents of cyber aggression • targeted—approaching individuals with high-level access by indicate that phase zero (or the start) of cyber warfare spear-phishing with spoofed emails, workplace attachments, and may have arrived. The Pentagon has made routine social media allegations against China in its annual reports to Con• zero day—conducting reconnaissance to know target systems, gress, citing network exploitation to gather intelligence applications, and networks to exploit unpatched or unknown on governmental activities, economic interests, and computer vulnerabilities defense industries critical to US national security. One • stealthy—installing malware, back doors, and connections firm, for instance, was exposed as hacking information to servers to steal information, alter critical infrastructure, or on drone technology originating in Shanghai. manipulate operations The United States has performed acts of cyber aggression as demonstrated by the Stuxnet damage. President Barrack Obama ordered the attack against Iran under a program codenamed Olympic Games. This advanced persistent threat was discovered in June 2010 after it infected nuclear plants by exploiting formerly unidentified zero-day (previously unknown and unpatched) Microsoft vulnerabilities. Stuxnet interferes with the frequency of converter drives that control the speed of the system, and it causes damage. It likely put 25 percent of the centrifuges at Natanz out of action in 2009. Cutting-edge Stuxnet malware is connected in some fashion to the data mining Flame, Gauss, and Duqu viruses. The cyber activities of China and some other players differs from that of the United States because it provides state-owned enterprises with data to improve their competitive edge and also reduce the cost of gaining economic advantage. The statecriminal nexus is evident as intruders use similar tools such as Remote Access Trojan, 28 Deterrence of Cyber Aggression which include Poison Ivy, Ghost, and PlugX to capture and extract information. The impact of these intrusions on the United States amounts to billions of dollars in the loss of intellectual property and proprietary information. Competitive anti-access and area denial strategies evade direct attribution by condoning or outsourcing cyber power to proxy groups. The Cutting Sword of Justice activist group took responsibility for the Shamoon malware attack on the Saudi Aramco Oil Company in August 2012, but analysts suspect Tehran may have instigated it to gain influence after Riyadh pledged to increase oil production to compensate for sanctions against Iran. As Washington openly considered a military response to the use of chemical weapons by Damascus in 2013, the Syrian Electronic Army claimed responsibility for attacking the Web site of The New York Times, eliciting warnings of a cyber war if the United States launched military strikes. A Comprehensive Approach Cyber intrusions, disruptions, and attacks have escalated against defense systems, private industry, and critical public utilities. The US Army reported that more than 250,000 probes per hour target its systems and networks. An intrusion directed at a defense plant in 2011 filched more than 24,000 files, many related to sensitive technology. Hewlett Packard found in 2012 that the estimated cost of cybercrimes against 56 organizations averaged $8.9 million. The Department of Homeland Security emphasized that the cyber threat jeopardizes the security and availability of public services such as utilities, transport, health care, and banking. To highlight this point, the Industrial Control Systems Cyber Emergency Response Team reported 124 attacks in 2012 that targeted public services and nuclear industries. Recent incidents reveal cyber aggression being employed in an increasingly systematic and coordinated fashion. Criminal exploitation, military or industrial espionage, hacker protests, and infrastructure infiltration or sabotage are ingeniously blended in competitor operations and campaigns. The threats range from advanced persistent threat intrusion to distributed denial of services, sometimes combined, as appeared to happen in the Dark Seoul DDoS attacks of 2013 on South Korean banks and media that served as a long-term subterfuge to steal military secrets. The protection of vulnerable but indispensable systems in cyberspace requires cooperation by private, governmental, and international partners to identify problems and find solutions. A comprehensive approach aligns parties based on shared interests, complementary opportunities, and mutual procedures. Given that the self-interest of organizations is facilitated by cooperative interaction, the approach seeks congruence of purpose, not unity of command. NATO recognizes implementation will require using civilian and military instruments that take into account the respective strengths and mandates of the participants. The comprehensive approach must be seen as more than a traditional whole-of-government approach because it integrates additional capabilities of allies and partners, nongovernmental and private voluntary agencies, international organizations, and the private sector to face international security challenges. As described in British doctrine, a comprehensive approach is based on shared principles and collaborative processes that enhance the likelihood of favorable and enduring outcomes in particular situations. While the NATO model offers 29 Deterrence of Cyber Aggression a starting point to design an approach for a given domain, the methodology must be modified for different operational environments, structural characteristics, and prominent partners including commercial actors. An approach to cyberspace security could be described as employing unified principles and actions that integrate the capabilities of national governments, global industries, and international agencies to secure cyberspace. In its Comprehensive National Cybersecurity Initiative, the White House embodies this approach in suggesting public and private sector partnerships for cyber defense of critical infrastructure and key resources. Complementary Deterrence The head of US Cyber Command, General Keith B. Alexander, USA, told a Senate committee in March 2013 that he had some confidence in the capability to deter major state-on-state attacks in cyberspace, but not in the low-level harassment of private and public sites, property, and data. The solution may reside in applying the comprehensive approach to achieve deterrence of cyber aggression. Deterrence seeks to shape perceptions of costs and benefits that dissuade threatening behavior. The strategic debate during the Cold War over deterring attacks was normally divided into deterrence by punishment and deterrence by denial. With the strategic interdependence that resulted from globalization, one might add deterrence by entanglement. Because of the unique characteristics and complexity of cyberspace, the best course of action is to employ a multifaceted deterrence strategy that combines punishment (retaliation), denial (prevention), and entanglement (rules for behavior). The policy of the Department of Defense for maintaining effective cyberspace deterrence is partly founded on the ability to respond to hostile acts with proportional and justified measures. This form of deterrence by retribution is complicated by the difficulty of monitoring cyberspace, identifying intrusions, and locating the sources with a high degree of confidence in a timely way. For example, Advanced Persistent Threats mask the identities of attackers and sanction plausible deniability. If definitive attribution can be obtained, the military could act in self-defense within its prescribed authority to counter an equivalent armed attack in cyberspace. An alternative to the offensive use of malware is active defense. For industrial attacks it entails working with private sector partners to identify and interdict intruders, then deferring to appropriate government authorities for punitive actions. Deterrence by denial of benefit hedges against cyber aggression by increasing adversary risks while reducing incentives. Increased security and resilience of networks and systems can discourage attacks. Defensive measures emphasize continuous protection of multiple threat points including network, endpoint, Web, and email security. Critical security controls provide technical means to monitor networks and systems, detect attempted attacks, identify compromised machines, and interrupt infiltration. These measures are designed to identify commercial tools that can detect, track, control, prevent, and correct weaknesses or misuse at threat points. Pursuit of deterrence by entanglement has the potential to reduce the risk of miscalculation and conflict. Cyberspace governance is extremely difficult because of requirements to prosecute nefarious acts across multiple lines of jurisdiction. The gap between capabilities and enforceable guidelines is complicated by the speed at which the domain changes and by its global nature, which transcends issues of 30 Deterrence of Cyber Aggression sovereignty. Collaborative means such as international norms promote order in cyberspace by encouraging states to meet their responsibilities to prevent crime and enact appropriate and effective self-defense measures. Likewise, regional or bilateral dialogue builds trust and provides opportunities to share threat indicators, communicate incidents, and manage crises collectively. A comprehensive approach can achieve complementary strategies for deterrence of cyber aggression. The following questions are pertinent when considering cyber deterrence options. • What offensive concepts can achieve deterrence by punishment? Is there a current need for implementing the concept of active defense? • What defensive measures can attain deterrence by denial? Is there a need for public-private partnerships to improve information sharing and create risk-based standards? • What collaborative mechanisms are best suited to achieve deterrence by entanglement? Is there a need for new international treaties, norms of behavior, or cyber conidence-building measures for cyberspace? Deterrence by Punishment For offensive cyber operations in self-defense, a response whose scope, duration, and intensity will likely cause significant kinetic damage demands complete certainty of attribution. Intrusion traffic and exfiltration of information often routes through compromised servers in a third country, complicating proof of origin. Finding servers in nations or malware that contain national language characters does not necessarily provide sufficient evidence to confirm that any government endorsed or commissioned a given event. For example, China may have been responsible for attacks on South Korean banks and television networks in March 2013 based on Chinese words and other clues in the malware. However, such indicators are commonly used by cyber attack designers for disinformation and were even found in Stuxnet. The lack of timely attribution complicates decisions on offensive operations, driving requirements for cyber intelligence that go beyond issues of vulnerability and software identification. Although some argue that fundamental interconnectedness of networks means the effects of offensive cyber operations cannot be limited, others claim that contained operations are possible even in broadly connected systems. Nevertheless, deliberate, inadvertent, or accidental escalation could trigger a chain reaction that unintentionally intensifies conflicts. Only the President of the United States can approve a cyber operation capable of significant consequences, a hard decision because of the inability to predict collateral damage and political implications. Article 5 of the North Atlantic Treaty guarantees individual or collective self-defense in the event of an armed attack on any of its signatories. When applied to cyber threats, the Tallinn Manual (rule 13) stipulates that the scale and effects determine whether a cyber operation qualifies as an armed attack. Although Stuxnet caused physical damage, the International Group of Experts that developed the Tallinn Manual was divided on whether the damage constituted an armed attack. The NATO Policy on Cyber Defense reiterates that any collective defense response is subject to political decisions by the North Atlantic Council. This ambiguity might 31 Deterrence of Cyber Aggression give an adversary good reason to use cyber as a method of attack against critical infrastructure. The imposition of costs in deterrence by punishment can reduce the willingness or ability of an adversary to go on the offensive. The controversial concept of active defense entails returning fire at hackers to prevent further disruption. In active defense, networks and systems are monitored to intercept malicious traffic. Once the malware is detected, actions can be taken including diversion to a holding area or other actions aimed at the attacker. The issue is whether to regulate or standardize the actions. A public-private partnership could provide the uniformity of government coordinated responses and the advantage of private sector access to top technologies and experts. But legal constraints must be adapted to permit more aggressive defensive tactics. Deterrence by Denial Information technology security practitioners acknowledge increasing network vulnerabilities with particular concern over advanced persistent threats and mobile platforms such as smart phones and iPads. The unpredictable effect of active defense on third parties makes passive defense for denial of benefit a preferable option. A defense-in-depth strategy can theoretically protect the computers, networks, and control systems in critical infrastructure and key resource sectors from cyber aggression. Layering multiple security technologies combined with best practice endpoint management can decrease the risk of malware penetration because each layer can block a different aspect of multipronged cyber attacks. Given that the greatest barrier to achieving endpoint security is insufficient resources, the government should consider providing market incentives for private sector investments in cybersecurity. In February 2013, after Congress failed to enact legislation, President Barrack Obama signed an executive order entitled “Improving Critical Infrastructure Cybersecurity.” It sought to establish a partnership with private sector owners and operators of critical infrastructure to both improve information sharing and implement risk-based standards. The order also expanded the role of the Department of Three Case Studies Digital Espionage—Flame Virus (2012): Copied keyboard entries, sifted email and text messaging, captured screen shots, and recorded microphone sounds. It infected computers by scanning for and querying Bluetooth devices to create social profiles. It took up to 20 megabytes with command and control network of 50 to 80 registered domains for built-in and downloadable modules. Distributed Denial of Services—Estonia (2007): Assault from botnet identified with both cybercriminals in St. Petersburg and the Russian Business Network spread to 85,000 computers. It became first reported act of cyber aggression against a NATO member. Conditions under which attacks may trigger collective defense under article 5 of the North Atlantic Treaty remain vague. Destructive Attack—Stuxnet Worm (2010): Targeted Iranian nuclear plants by exploiting unidentified zero-day Microsoft vulnerabilities. It inhibited frequency converter drives to control speed and damage the system. Ultimately it was discovered in 170 power plants including some in North America. It could be considered an armed attack because it damaged or destroyed equipment. 32 Deterrence of Cyber Aggression Homeland Security in providing classified cyber threat and technical information to both public and private sector custodians of critical infrastructure. Moreover, the executive order tasked the Director of the National Institute of Standards and Technology to develop a cybersecurity framework that incorporates consensus standards and best practices. The framework will provide a prioritized, repeatable, and performance-based approach to assessing and managing cyber risks. An offense-informs-defense model that uses knowledge of actual attacks that compromise systems can shape the development of technical measures. The Council on CyberSecurity leads development of critical security controls to provide a prioritized, risk-based approach to security based on an understanding of current attacks. The controls encompass best practices that include vulnerability assessment, malware and boundary defenses, access control, account monitoring, and data loss prevention. The inaugural cybersecurity framework is assembled around the core functions of identify, protect, detect, respond, and recover. Critical security controls are part of informative references that illustrate methods to carry out the activities under the functions. The White House drafted an initial set of incentives for private industry to adopt these best practices, including cybersecurity insurance, liability limitation, and rate recovery. Figure 4.1 Functions of a Comprehensive CyberSecurity Framework IDENTIFY Develop understanding to manage cybersecurity risk asset management, business environmental awareness, governance, risk assessment and management PROTECT Implement safeguards to ensure essential services access control, awareness and training, data security, information protection processes and procedures, maintenance DETECT Rapidly identify when a cybersecurity event occurs anomaly and event identification, continuous security monitoring, detection processes RESPOND Take action to counter or contain a cybersecurity event response planning, coordination, analysis, mitigation, improvements RECOVER Restore capabilities or services impaired by a cybersecurity event recovery planning, systems restoration, communications and assurance, improvements and lessons learned Deterrence by Entanglement The Budapest Convention on Cybercrime, the first such international treaty, outlined the widest possible means of cooperation to investigate crimes involving computer systems and data and to gather evidence electronically on criminal 33 Deterrence of Cyber Aggression offences. Deterrence is explicitly cited to safeguard the confidentiality, integrity, and availability of these systems. This agreement also provided for deterring cross-border crimes while recognizing issues of national sovereignty. To date, only 35 nations including the United States have acceded to the treaty though others are in the process of ratifying it. Some believe nations should be held accountable for malicious actions or transiting information systems within their borders by introducing norms of responsible behavior. By respecting behavioral norms, US strategy can assure predictability that helps to prevent misunderstandings that may lead to conflict. China and Russia have urged the United Nations to adopt their International Code of Conduct for Information Security to enable greater control over content. Despite the limited interest in additional international agreements, plenary speakers at the Budapest Conference on Cyberspace stressed the need for norms. A follow-on conference resulted in the Seoul Framework for and Commitment to Open and Secure Cyberspace, which provided new guidelines for coping with threats from cybercrime and cyber war. Confidence building can prevent conflicts through measures that establish transparency, cooperation, and stability. The Organization for Security and Cooperation in Europe seeks to reduce misperception, escalation, and conflict resulting from information and communication technologies. The United States and Russia have formed a working group to assess emerging threats and move toward introducing confidence-building measures to reduce the possibility of misunderstanding cyber incidents that could develop into bilateral crises. . . . Cyber warfare has been described as a conflict between nations where attacks originating in the digital domain are directed against military and industrial targets for political, economic, or territorial gain. The term cybered-conflict might be better suited than cyber war in indicating the complexity and ambiguity of hostilities waged in cyberspace that include asymmetric conflicts, hybrid warfare, and counterterrorism. General Martin Dempsey, USA, Chairman of the Joint Chiefs of Staff, recently warned that “disruptive and destructive cyber attacks are becoming a part of conflict,” and that “civilian infrastructure and business are targeted first.” Former Secretary of Defense Leon Panetta affirmed that “an aggressor nation or extremist group could . . . contaminate the water supply in major cities or shut down the power grid across large parts of the country.” Still, the majority of reported cyber attacks have not been violent, purposeful, and political, and are thus more accurately described as hostile or disruptive cyber activities. Cyber activities are merely acts of aggression—at most a lower level component of cybered-conflict. General Dempsey claims national mission teams could defend against these hostile activities but recognizes the need to collaborate with other nations to establish norms of behavior in cyberspace and improve information sharing and standards. However, it is difficult to establish consensus regarding the legitimate and effective employment of deterrence strategies that encompass offensive concepts (punishment), defensive measures (denial), and collaborative mechanisms (entanglement). Within the United States, the Office of Cyber Policy in the Office of the Secretary of Defense attests to the need for the Federal Bureau of Investigations, the 34 Deterrence of Cyber Aggression Department of Homeland Security, and the Department of Defense to coordinate with public, private, and international partners in cybersecurity efforts. Although some workshops have been based on a comprehensive approach to cybersecurity and others on cyber deterrence, there is little empirical work on intersecting issues like attribution, legality, liability, privacy, verification. The questions raised in this chapter offer a point of departure for analyzing the viability of offensive concepts, defensive measures, and cooperative mechanisms. Further research is necessary to determine exactly how a comprehensive approach can achieve complementary strategies for deterrence of cyber aggression. 35 Deterrence of Cyber Aggression Chapter 5. Challenges to Energy Security by Daniel A. Nussbaum A ll sectors of a modern society and economy depend on energy. Thus any disruption to energy has serious consequences across a wide range of systems, organizations, and communities. The security of energy necessitates ensuring that supplies meet the demands imposed by consumers. Moreover, energy security is fundamental to national defense including military operations. Yet achieving security is difficult because of both its complexity and extent. Diverse situations such as burning Iraqi oil fields after the Gulf War, natural disasters such as the Fukushima earthquake and Hurricane Katrina, and attacks on power substations have widespread ramifications. These challenges to energy security Objective impact how various communities collectively plan and implement safeguards and resolutions. Define energy security, identify potential Because of the rapidly expanding consumption of energy disturbances, and determine measures to secure around the world, opportunities to threaten energy security are energy supplies through a comprehensive approach. increasing, and will continue to magnify in the future. Data compiled by the International Energy Office for 2013 and the estimated demands for energy over the next two decades validate claims that the growth in consumption will be great, and will be accompanied by a subsequent increase in energy security vulnerabilities. Some Deinitions A recent study defines energy security as reliable access to sufficient, affordable energy supplies to fuel economic growth. Alternatively, the “4-As” model represents energy security in terms of availability, accessibility, affordability, and acceptability. On examination, the concept of affordability, though intuitively meaningful, is complex and difficult to fully understand and explain. Recog4As: Available, Accessible, Affordable, Acceptable nizing this, the Military Opera• availability—involves the physical occurrence of energy that may tions Research Society organized make it either easy or hard to retrieve a workshop for experts and • accessibility—addresses the geopolitical environment with special analysts to research challenges to regard to energy that can be retrieved and made usable affordability, using affordability • affordability—speaks to the financial implications of energy analyses to improve decisionmaksecurity with respect to consuming energy according one’s means ing, and criteria for the provi• acceptability—concerns the environment in the sense that the sion of consistent and useful footprint of energy retrieval does not violate policy-based norms affordability analyses. It also 36 offered background on affordability analyses and created a framework for developing a practical manual for affordability analysts to review strategic goals, determine desired outcomes, and identify the capabilities and resources required to achieve affordable and acceptable levels of energy security. By comparison, Gawdat Bahgat of the National Defense University has proposed a more simplified definition of affordability: “The uninterrupted availability of energy sources at an affordable price with little environmental footprint.” Threats to Energy Security An important issue to address is planning for threats to energy security. Risks arise from many sources including natural disasters, acts of sabotage, national traumas, contested international space (from challenges to Kuwaiti sovereignty to navigational rights through the increasingly accessible Northwest passage), peacekeeping, peacemaking, high levels of volatility in energy commodity prices, and flash transnational currency flows. Another critical but often overlooked threat to energy security is aging or sabotage of infrastructure. Infrastructure refers to procedures and hardware occupying a position between generating energy (such as oil wells, power plants, and photovoltaic solar arrays) and consuming energy (government, commercial, and consumer end-use). Therefore infrastructure occupies the position between supply and demand within the energy enterprise. The aging or sabotage of infrastructure deserves attention not only because of its criticality to the enterprise, but because it is a known and noticeably weak link. Infrastructure vulnerabilities have consequences for energy security and, importantly, secondary and tertiary consequences with less apparent implications. A high-level systems engineering understanding of infrastructure encompasses the operation and linkages of three major components: • generation—oil, gas, coal, nuclear, hydro, solar, wind, and geothermal power plants • transmission—independent system operators that coordinate, control, and monitor the electrical power system within a given nation or region • consumption—use by commercial, consumer, public, and defense sectors as well as generation and transmission segments of the energy enterprise. Two grid outages merit mentioning. The Northeast blackout in 2003 was a widespread power outage that occurred throughout parts of the Northeastern and Midwestern United States and Ontario. It was the second most widespread blackout in history, affecting an estimated 10 million people in Ontario and 45 million people in eight US states. The primary cause was a software bug in the alarm system at the FirstEnergy Corporation in Ohio. Operators were unaware of the need to redistribute power after overloaded transmission lines hit unpruned foliage. What would have been a manageable local blackout cascaded into widespread distress on the electric grid. The other outage took place as the result of a sniper attack on transformers and infrastructure at the Medford substation of Pacific Gas and Electric in San Jose, California, in 2013. This recent incident underlines concerns over the vulnerability of the electric grid to sabotage and demonstrates the importance of understanding 37 Challenges to Energy Security Figure 5.1 Worldwide Energy Production • With world GDP rising by 3.6 percent per year, energy use will grow by 56 percent between 2010 and 2040. Half of the increase is attributed to China and India. • Renewable energy and nuclear power are the fastest-growing energy sources, each increasing by 2.5 percent per year; however, fossil fuels continue to supply almost 80 percent of world energy use through 2040. • Natural gas is the fastest growing fossil fuel in the outlook, supported by increasing supplies of shale gas, particularly in the United States. • Coal will grow faster than oil use until after 2030, mostly because of increases in Chinese demands, and slow growth in oil demands by OECD member countries. • Given current policies and regulations, worldwide energy-related carbon dioxide emissions are projected to increase 46 percent by 2040 reaching 45 billion metric tons in 2040. —US Energy Information Administration, International Energy Outlook 2013, the context of an attack including determining whether it is a precursor to broader attacks. Susceptibility to Breaches While all sectors of society and the economy rely on energy, it is necessary for the purpose of analysis to have a rough taxonomy of generalized sectors with interests in maintaining energy security, each with its own subcategories. For the purpose of understanding the comprehensive approach to energy security, the following agglomerations are proposed: civilian and military components of government, commercial entities, and private sector organizations. Each of these is required to address issues associated with energy security at one time or another. The modern world is dynamic and interconnected. Depending on external circumstances, some or all elements of the society will be affected by active threats or risks to energy security requirements. Moreover, the situation has the potential to escalate rapidly from no participants, to some participants, to many participants, to all participants simultaneously. Figure 5.2 Worldwide Energy Consumption 900 800 Quadrillion British Thermal Units 700 Rest of Organisation for Economic Co-operation and Development 600 500 400 Rest of non-Organisation for Economic Co-operation and Development 300 India United States 200 China 100 0 2010 2015 2020 2025 2030 S  US Energy Information Administration, International Energy Outlook 2013 38 Challenges to Energy Security 2035 2040 Figure 5.3 Average Number of Outages Per Year* Affecting >50,000 people and >100 Megawatts 160 140 Number of Incidents 120 100 80 60 40 20 >50,000 People 0 >100 Megawatts 2000–2004 2005–2009 2010–2012 * Heavy reliance on grid but decreased reliability Critical infrastructure protection exemplifies an arena that displays a tendency for risks to escalate and spread. The term critical infrastructure describes those assets that are essential for society and the economy to function. According to the Center for Infrastructure Defense at the Naval Postgraduate School, critical infrastructures are composed of systems of components that combine to achieve desired functions or that fail when the functions are disrupted. As critical infrastructure protection is situated at the nexus of cyber and energy structures the well-known public policy debate over protecting against cyber attacks clearly spills over to energy infrastructures. Cyber attacks interfere with electrical systems, pumps transporting liquid fuel, and the machinery relying on liquid fuel. Thus commercial, government, and private sector consumers who are impacted care a great deal about this situation. The same cyber attacks can undermine the ability of the US Navy to provide timely refueling of combat logistics fleet ships that replenish warships at sea, impacting on military operations. Accordingly, military forces also affect the situation. Finally, it is easy to imagine that first responders in the civilian sphere will be hindered in performing their missions by degraded communications systems, all of which are energy dependent. It becomes obvious that a small-scale attack can readily escalate to involve even more stakeholders who find their equities seriously compromised. Energy consuming nations are subject to the fragility of stability because policymakers and analysts must consider worst-case scenarios and develop risk mitigation strategies to defend against potential breakdowns. The accompanying table indicates the complexity and interactions among threats to energy security and the categories directly affected by these threats. An “x” in a cell indicates a threat to the sector in the first row by a threat in the first column. The table has been filled in 39 Challenges to Energy Security conservatively. That means that a nexus is not identified unless it is clear and unassailable. Thus if the table was completed less conservatively, it would be filled out more densely and indicate greater complexity in subsequent interactions. The complexity of energy security requires using the comprehensive approach. Preplanned exercises offer fruitful ways to analyze energy security considerations. On the civilian side, these might look like the sort of exercises conducted by the Federal Emergency Management Agency (FEMA) in the United States, or on the military side, the regular exercise programs sponsored by NATO, especially training including humanitarian assistance and disaster relief. . . . Although definitions of energy security can rapidly become complex and abstruse, the core of the definition provided by Gawdat Bahgat is the “uninterrupted availability of energy sources at an affordable price with little environmental footprint.” Depending on external circumstances, the challenges to the availability of energy supplies have the potential to escalate from affecting selected consumers to impacting global markets. A military approach to such circumstances might consider a continuum of military operations that has six stages: shaping the environment, deterring the threat, seizing the initiative, dominating the enemy, stabilizing the environment, and enabling civil authorities. In addition, preplanned exercises that incorporate energy security considerations are also useful tools. They may include FEMA-type exercises on the civilian side and NATO exercise programs on the military side. It is noteworthy that the latter regularly incorporate aspects of both humanitarian assistance and disaster relief operations. Given the complexities of the interaction among multiple parties, the requirement exists to accommodate such relationships and diverse or even contradictory interests lest the complexity of energy security leads to a reaction against cooperation. Finally, the realm of energy security presents unanswered questions based on the inherent complexity of the subject. There is no way to address this complexity other than as part of a comprehensive approach. 40 Challenges to Energy Security Appendix: Sources of Guidance Extensive guidance exists on developing comprehensive approaches to operations and applying them to specific challenges. The following list of selected US and international publications is related to the field of civil-military operations as discussed in chapter 2 on multidimensional peacekeeping. NATO Standardization Agency, Allied Joint Publication 3.4.9, Allied Doctrine for Civil-Military Cooperation (February 2013). UK Ministry of Defense, Joint Doctrine and Concepts Centre, Joint Discussion Note 4/05, “The Comprehensive Approach” (January 2006). UN Office for the Coordination of Humanitarian Affairs, Guidelines on the Use of Military and Civil Defense Assets in Disaster Relief (“Oslo Guidelines”) (November 2007) UN Office for the Coordination of Humanitarian Affairs, “Civil-Military Guidelines and Reference for Complex Emergencies” (March 1, 2008). UN Department of Peacekeeping Operations, United Nations Peacekeeping Operations: Principles and Guidelines (March 2008). US Department of Defense, Joint Publication 3-07, Peace Operations (August 1, 2012). ———— Joint Publication 3-08, Interorganizational Coordination During Joint Operations (June 24, 2011). ———— Joint Publication 3-29, Humanitarian Assistance (January 23, 2014). US Institute of Peace, “Guidelines for Relations Between US Armed Forces and NonGovernmental Humanitarian Organizations in Hostile or Potentially Hostile Environments” (July 24, 2007). 41 List of Acronyms CAO CBM CIMIC CIP CMCO DDoS EEZ EU FEMA IMB IMO NATO NGO OSCE UN 42 comprehensive approach to operations confidence-building measure civil-military cooperation critical infrastructure protection civil-military coordination distributed denial of services economic exclusion zone European Union Federal Emergency Management Agency International Maritime Bureau International Maritime Organization North Atlantic Treaty Organization nongovernmental organization Organization for Security and Cooperation in Europe United Nations About the Contributors LYLA ENGLEHORN is research associate and concept generation director of the Consortium for Robotics and Unmanned Systems Education and Research at the Naval Postgraduate School. Her research interests include multimodal information sharing, international maritime defense, and the implications of climate change for global security. GEORGE T. HODERMARSKY is chief analyst with Science Applications International Corporation. His research focuses on joint and multinational concept development, experimentation, and assessment. Dr. Hodermarsky previously worked at Headquarters, Supreme Allied Commander Transformation, and US Joint Forces Command. SCOTT JASPER is deputy director for operations in the Center for Civil-Military Relations and lecturer in the National Security Affairs Department at the Naval Postgraduate School. His edited volumes include Securing Freedom in the Global Commons and Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security. JEFFREY E. KLINE holds the Chair of Systems Engineering Analysis in the Operations Research Department at the Naval Postgraduate School. He teaches joint campaign analysis and executive risk assessment and is coordinator of maritime security education programs. Most recently he contributed to the book is Responding to Capability Surprise: A Strategy for US Naval Forces. SCOTT MORELAND is deputy program manager for peacekeeping and crisis response exercises in the Center for Civil-Military Relations at the Naval Postgraduate School. In addition, he lectures on defense transformation and international civilmilitary relations. His current areas of research include the global commons and comprehensive approach to crises. DANIEL A. NUSSBAUM chairs the Energy Academic Group and teaches in the Operations Research Department at the Naval Postgraduate School. Formerly, he was director of the Naval Center for Cost Analysis and served as chief advisor to the Secretary of the Navy for guiding, directing, and strengthening cost estimating and analysis. 43