Operation Skipjack – Part 2: Shaping Activities- Operation White Heron

Operation Skipjack – Part 2: Shaping Activities- Operation White Heron


Chapter One

INDOPACOM Command Joint Staff Operations

Camp H. M. Smith Aiea, Hawaii

It’s the day after our most recent incident with the Weiqon Navy I am the INDOPACOM J3 Admiral Nikki Fury, and I’m standing at my secure multi-domain access console and take a beat to enjoy Kona’s finest coffee. The standing desk is a relief from using a chair and lets me shake out my tired legs.

Especially after the seven-mile run down to Pearl Harbor and back, the Chief and I completed earlier this morning. It’s 0630 and I’m scrolling through the operations update the overnight team and watch officer prepared.

As the joint staff operations officer, I lead the planning of American and coalition missions in the largest and most culturally diverse combatant command in the U.S. military.

The three shop as we are called, has a swagger about it. It can get a little out of control when the younger men and women of the command let everyone else know they are supporting elements, and we fight the fight.

They’re not totally wrong, but the multi-domain spaces we operate in requires a team effort of immense proportions. Our primary mission is strategy development and ensuring the warfighters, like Admiral Hausner at Carrier Strike Group CSG #5 have every advantage we can provide. That effort demands that my team and I excel at our assigned duties. To do so, we need a never-ending amount of data and information.

The speed and amount of incoming data, from which we need to make decisions and inform our combat commanders has us prototyping AI tools. We believe this necessary to stay ahead of our near peer the Weiqon. With hypersonic weapons development surging forward, we must shorten the time from sensor to shooter in both the offensive and defensive realms of warfare.

But we are being cautious in our roll out. The J6 has staff monitoring the behavior of the AI and has created a cross-domain and diode-based containment field around the prototype. This provides us a high level of assurance that it is operating with clean data and without interference from outside bad actors.

To operate within the Combined Joint All-Domain Command and Control (CJADC2) systems, as envisioned by the Air Force program lead, requires connectivity, bandwidth, and resiliency. I have a dog in the hunt, as the saying goes.

I am a computer and general technology nerd as my Naval Academy and post graduate school degrees indicate. But in my generally unorthodox way of doing things, I have applied it to decision making in the operational sphere where I work.

Two of my favorite subjects are networking and the cross-domain systems that deliver the information sharing we need. I’m interested in the wiring and interconnects we need to share data and information. They are the foundation for the thousands of tactical and strategic decisions we make every day at this command.

Our J6, also known as our Chief Information Officer, operates our command and control, communications, and cyber systems. He jokes that I secretly want his job. I don’t, but I push hard for the applications, networks, and information my people need to excel.

The content in my morning report to the INDOPACOM commander is a fusion of multi-classification inputs. We harvest data and situation reports from assets executing high level classified missions to unclassified but sensitive. We also ingest data from open-source and social media.

I’ve watched over the shoulder of Army Staff Sergeant Turner. She used the command’s cross domain transfer solutions to downgrade Top Secret/SCI inputs then securely move them to a repository for my team to include in the morning report.

Our ability to access multiple classifications of information from a single console and transfer the same to where it is needed in the CJADC2 fabric is a game changer. It generates an enhanced level of security and speed to our decision making.

With these systems and my people, we can execute our assignments in real time, and within the OODA loop of would-be adversaries.

#

At the commander’s briefing, a J2 watch officer who is new to the command makes a bold statement. “We get a few days off while the Weiqon reposition and replenish before the new year.”

He has a lot to learn. The Weiqon do not take days off.

The Weiqon Navy and Air Force had all but encircled Pacifica in a show of force. In response, we had sortied the Reagan carrier battle group into international waters using the Freedom of Navigation flag.

While it was repositioning, I had worked with the J2 shop to deploy every available intelligence asset we could spare to watch and analyze the Weiqon gamesmanship.

I planned to make the cornerstone of my report this morning our fight in the digital spaces of social media. The loss of an F-18 in a reckless move by a Weiqon pilot resulted lost aircraft for both countries and added a significant prologue to the report. The issues affecting ongoing and future operations were minor by comparison.

The J39 Information Operations lead described the disinformation campaign the Weiqon had started during the exercise. It was now full production, and we were pushing back.

My legs are tight and achy, so I’m not sitting at the morning brief. I push off the wall to lean over my chair. “This campaign has a different feel to it,” I say. “Ardent and fiery are good descriptors.”

The boss wants more details. He requests a separate briefing for him with the J39, the J2, and State Department liaison.

As the briefing ends, the J2 lets me know he will coordinate the meeting and make sure the State Department liaison brings his analyst. I request that our Defense Intelligence Agency, DIA analysts hunt for indications of weapons supply chain stuffing or repositioning.

I’ve got a hunch that there is something more in play. While that effort is underway, it’s time to make use of our internet connection and mine some open-source data.

Chapter Two

INDOPACOM Command Joint Staff Operations

Camp H. M. Smith Aiea, Hawaii

The raw Internet and social media connection at the command is relatively new. Previously, it had been a separate solution air gapped from even the unclassified NIPRnet. I saw the value of information on the Internet and dark web during our Afghanistan and Iraqi wars. And the value of the Internet and crowdsourcing are on display daily in Ukraine.

Now my staff and the intel shop can mine those domains and ingest that data into our decision support systems. But collecting data and information from the Internet and especially the dark web is a dangerous activity.

Prior to making the link operational, the J6 briefed the joint staff. It’s good to know that any malicious payload hidden in a picture, video or audio file will be stopped from calling home and exfiltrating information by our data diodes.

He also described the process to keep the link and connected systems secure. It includes the standard cyber security measures and a high level of deep and continuous monitoring. Our diodes are used to ship relevant data to the Defensive Cyber Operations enclave, DCO. They also help ensure the integrity of our firmware and software patching process.

Once collected and analyzed for value, the resulting data will be processed through our transfer guards. It will be shipped up to the high side system we use to feed the Common Operational Picture, aka COP.

I’ve also worked with the J6 to extend our sensor fabric into the Internet Of Things space where we collect from our devices and partner systems. This permits us to make use of almost any sensor. Some that I can mention include units that monitor tidal flow, earthquake, and water quality.

From individual sensors sending bits to terabytes downloaded from our space-based assets, we are flooded with data. We must fuse it, analyze it, and turn it into information that becomes actionable.

My staff and the J2 are very efficient. To reduce the time from sensor to action, I have authorized them to make decisions at the point of information. It’s a non-kinetic war we are fighting every day at the speed of the Internet.

I join Captain King at the Joint Intelligence and Operations Center, JIOC to observe the data fusion in real time. Our analysts work in teams that are organized by country and in this case by project. Warrant Officer 5 Anderson leads the team assigned to the Weiqon disinformation campaign.

Their cross domain enabled consoles are connected to the Internet. They use our managed attribution solution combined with using the Tor browser and data diodes to protect themselves and the command while they hunt and collect.

One of our primary uses of our Internet connection is a program where our regional partner Pacifica permits us to mine their environmental sensors. During the process of connecting and mining their data, the Pacifica government added sensor units with military and security application. We search for random events that, when placed in a security context indicate anomalous activity.

We get so much data from our IOT sensors that our programmers have put virtual guardrails in place to only alert us when the data is out of the norm pattern for the sensor. The fusion of all this data is possible due to our Commander’s insight and the J6’s ability to provide us AI that is being rolled out in secure and contained missions sets. The J6 assures me we are using our cross-domain systems and diodes to quarantine the AI from the rest of the command infrastructure.

We used a Pacifica SEAL like unit to test the sensors they installed at the mouth of every river that runs to the sea. When tidal flow slows or changes direction momentarily, we know someone, or something has moved through the area. When combined with acoustic and metal detection sensors, we caught the team 10 out of 10 times.

Another primary use is with social media. The J39 team is monitoring the disinformation the Peoples Republic of Weiqon is pushing. It has permitted us to work with the Pacifica military to expose an ongoing campaign of deep fake videos of Pacifica authorities begging the prime minister to reunite with the PRC for the good of the people.

Two days ago, Weiqon faked the leak of a document that purported to be the CIAs plan to take over Pacifica as the fifty-first state. The Pacifica president’s communications team called out the absurdity of the AI created document and pointed out its logic flaws within minutes of its dropping in social media.

Weiqon’s multi-pronged civil measures attacks include actions from its economic coercion tool kit. They are pressuring the Pacifica government by re-instituting tariffs on imports. And they have threatened more if the ruling party does not acknowledge reunification, is a priority. They have also placed 12 more major corporations on their Unreliable Entities List (UEL) and 15 more to its export control list.

It’s a not-so-subtle way of forcing Pacifica businesses to do the Weiqon’s bidding and complain to the government. It also reduces the total market value of the economy, which reduces tax revenue and the services the government can offer without increasing its borrowing to maintain services.

The economic pressure is real. It is a tool that the Weiqon use to punish their adversaries and reward their so-called friends.

Open-source data and social media are not the only sources we are fusing to present the INDOPACOM Commander timely and accurate information. The intel shop shares the INTs, as we call them include human, geospatial, measurement, imagery, and signals intelligence.

The outgoing President of the United States has signed an Executive Order, which permits us to share information with Pacifica at the Secret-releasable classification. We continue to coordinate intelligence sharing with our FVEYs partners, Australia and New Zealand, at the Top Secret level.

For me, the positive outcome of all our information sharing is our ability to correlate what we see in the different domains. It paints a picture of Weiqon’s actual intent.

Chapter Three

Weiqon Fujian Aircraft Carrier
South Weiqon Sea

Admiral Su Jun’s stare out the bridge window was interrupted as he took the handwritten note offered to him. Short of stature with a ruddy complexion, Admiral Jun’s chair on the bridge was on a hydraulic pedestal he could raise to watch air operations, or as this morning, the sun rise out of the east.

He had been ruminating on how well Admiral Ka had played his role, now it was his turn in the arena. If he successfully implemented his plan, he would be promoted and written into the history books as the architect of reunification.

In America, he would have been called old school. Different from the younger group of Weiqon naval commanders, he preferred the intimacy and anonymity of handwritten notes.

Especially from his intelligence officer when it concerned operations that could turn an exercise into war with America. And there was no doubt that an invasion of Pacifica would bring America into the fight.

The Gray Swan plan, which leaned heavily on gray zone deception, the space between peace and direct conflict, was producing its expected results. The American navy were keeping their distance as his battle group continued its slow but steady retreat to home port.

The note also mentioned relief within the INDOPACOM command as the Americans approached what he knew was a primary weakness. Operating with minimum staff during the holidays.

No doubt, they are intercepting the communications pattern we used the previous times we have “gone home” to resupply and refit after an extended exercise.

What he had been pondering prior to the note was the cost of taking Pacifica. He was responsible for the Naval and Marine Corps portion of the battle plan. The simulations varied in their assessment of losses. The pivot point being how quickly and forcefully the United States and her allies would respond.

The ongoing information campaign sowed a wide swath of fear, uncertainty, and doubt. His psychological operations team had assured him the campaign would destabilize support for the government. It would cause more Pacifica citizens to question the lack of progress on unification.

Jun left the bridge and entered the cave as the crew called it. It was a black hole within the intelligence space that would appear as an empty void if scanned electronically.

A sailor barked. “Admiral on deck.” Marine Corps Major General Xuefeng stood from his command station and snapped a salute. He was broad shouldered and a foot taller than his commander Admiral Jun.

“Are they in position?” Jun asked, referring to the naval and marine corps special forces units moving to their pre-war staging areas.

“The first of the sabotage teams is ashore and the rest will be set in eight hours.”

“Can we go early if authorized?”

“Yes, sir. In four hours, the deployment of the teams will not be complete, but the primary targets will be prosecuted.”

“Good. I leave it up to the president and his inner circle to judge when the time is right.”

Jun could see in his friend’s eye he thought now was time. The Americans were distracted with the incoming president and his seemingly strange picks for cabinet positions.

Pacifica wasn’t the only place that an information, misinformation, and disinformation campaign was in play. The state security teams at the Ministry of State Security, MSS had perfected hybrid warfare and were flooding Washington D.C. with messages targeting fear, uncertainty, and doubt.

Jun turned to the MSS liaison who had been listening from behind his right shoulder. He took a silent breath and removed the disdain from his voice that he held for the inept party climber.

“Colonel Ma, has your cyber team infiltrated the American command?” Jun asked, knowing they were months behind schedule.

“Sir. Our reconnaissance and probing continue. We are exploiting the private phones and computers of soldiers at the command and its visitors to find a path in.”

“When Gray Swan was approved, you briefed the Minister of National Defense that the new INDOPACOM internet connection would be the path of least resistance. He briefed the president. Did you lie to them, Colonel Ma?”

Ma was a slight man that seemingly never saw sunlight. His MSS training had left him void of emotion. It was Ma’s wiping at the perspiration on his forehead that indicated his fear.

“No, sir… we can deliver probes into the American network, but they have not yet responded to our inputs. I believe it to be a fake implemented by the Americans to get us to waste time and money on a useless hunt.”

“Interesting. Then why do I read reports of their dismantling of your fake videos and documents? Clearly, they have access you cannot subvert.”

“Th-th-that, is not my area of expertise,” Ma said, stumbling.

“Disrupting American networks and their command and control is key to the success of Gray Swan. If you can’t gain access, I will find someone that can,” Jun said and exited the cave.

Jun had taken considerable time placing his plan in the right social, economic, and political framework. The American holidays and the transition between administrations was the perfect time to strike.

Made even more so by the monumental shift in recent voting that had propelled the incoming president to a landslide win.

The American’s incoming political party does not like the idea of intervening in another country’s business. Does our supreme leader see this unique opportunity, Jun wondered.

The next phase of the plan focused on sea-based replenishment of his battle group. The ships that required fuel were sailing filled with seawater to maintain their waterline profile.

Tonight, the seawater would be replaced with fuel so they could operate at battle stations condition for the first five days of the invasion. The first three being the most critical.

His battle group excelled at giving America and its allies an appearance that supports their biases.

All war is deception.

Chapter Four

INDOPACOM Command Joint Staff Operations, Admin Corral
Camp H. M. Smith Aiea, Hawaii

It is two days since Admiral Jun’s battle group has headed back to port. The Special Operations Command, SOCPAC Commander Major General Michael Bennett briefs me on the high priority missions his special operators are engaged in.

In Army special forces terminology, they are engaged in Security Force Assistance, SFA missions. The training and operating alongside of partner country military and security forces. The PhD’s call them operations other than war. It is a fancy moniker for the work we do every day to win the hearts and minds of the people and governments in the Pacific Command area of operations.

Fighting the Weiqon narrative is an around the clock endeavor at the command. We execute our responses and attempt to stay ahead of the Weiqon to maintain our position and influence in Pacifica and the region.

He is an Army Special Forces officer with a distinguished record including assignments as Commander Special Operations Korea and multiple 3rd SFGA command positions in Afghanistan. He was a signal officer prior to switching to Special Forces and is a tech nerd like me.

“We have embedded 1st SF trainers at the National Military Academy. They are full-time members of the staff on two-year assignments. Additional 1st SF teams are training with Pacifica special forces. 2nd Bat Rangers are working an exchange program with their Airborne Special Service Company. And JSOC Joint Special Operations Command is working with the National Security Bureau to build out a counter assault team element within their protective detail function.”

The intercom rings and I punch the speaker button. “Yes, June.”

“My apologies for interrupting your meeting, Admiral. But Public Affairs dropped off a package for General Bennett. They were insistent he read it ASAP. Should I bring it in?”

“Yes please.”

June enters, hands the packet to Bennett and leaves. He reads the single page inside.

“It’s a press release that will go out tomorrow from the government saying that US Navy SEALs are training Pacifica navy forces in special operations tactics and techniques.”

He spins it around and slides it across my desk.

“That is a first, as far back as I can remember,” I say.

“Agreed. We are using Taskforce Sea Dogs assets. They are four months into their training of a new naval unit formed to prosecute strategic mainland targets if Weiqon invades.”

“I hear coordination and intelligence sharing is at an all-time high now that Pacifica and our other non-five eyes partners in the region are installing the Guardian data transfer guard.”

“It looks that way,” Bennett said. “The Owl transfer guard we use permits real time information sharing with Mission Partner Environment, MPE network partners, and it’s making a difference. Nothing like intelligence sharing to deepen a partnership.”

I nodded. I’ve seen the look in a coalition partner’s eyes when I’ve shared information that made a difference in an operation and their people’s lives.

Bennett continued his report. “We are tracking additional hearts and minds missions. They include the USS Comfort. It has sailed to Guam, where the Air Force continues their medical civic action program in response to typhoon Gaemi. Air Force engineers, with the help of a Marine Corps heavy lift squadron have assisted in the rebuilding of the destroyed hospital and several clinics. We passed their success to your information operations team.”

“Good. I want every success touted in by the public affairs office in coordination with the Pacifica Ministries of Defense, the Interior, and Indigenous peoples.”

“Roger that. I’ll notify State too,” Mike said.

Now is not the time to hold back or tiptoe around our partnership. We need to project power and commitment. Not knowing what Admiral Jun is thinking, it is important to work these shaping activities. It’s how we ensure the Weiqon president, and the communist party understand that we are committed to the security of Pacifica and that war is not a viable option.

#

Secret Training Site #3 Mulan Forest

“Ten-minute break and we go again,” Major Dalton Carter said.

The go again referred to the combined Pacifica and American team assault on the house where the role player acting as the president was held by role players acting as Weiqon special forces.

Two more run throughs and I’ll have them execute on their own.

His men from a classified SMU, Special Mission Unit out of Fort Bragg N.C. had bonded with the NSB’s National Security Bureau nascent counter-assault team. Based on the profile for the US Secret Service CAT, their mission was to protect the president of Pacifica against the forever present threat of kidnapping and assassination.

Hidden in the Mulan forest on the eastern side of the island, the training site resembled Harvey Point, North Carolina. It had housing, a chow hall, an administrative building, and the latest in live action firing ranges. It also held a multi-story mockup of the presidential offices and living quarters.

MSG Chris Manchin had fired up the NSB team earlier in the morning with a classified briefing on the PRC’s plans to capture the Pacifica president and kill the cabinet. Taken from a five-year-old document secreted out of Weiqon, it was part blunt force assault and part mission impossible in design.

Manchin had received the report through the troop tactical C4I, command and control, communications, computers and intelligence system. The backbone of the deployable system was a lightweight OWL PACSTAR TACTICAL CDS solution with integrated cross domain capability that reduced the SWAP, size, weight, and power requirements of the package.

It also permitted the troop to operate at the Top Secret, Secret, and Unclass levels without resorting to three separate networks, computers, and applications for each level. A huge win for the SMU S6 and the individual troop and squadron communicators.

Manchin focused on the blunt force aspects, noting the physical barriers and technical security measures that would make the movie like components unachievable.

“Make no mistake, they will use all available resources to decapitate the seat of power. They will force a new president into signing an emergency unification order,” he said in English and followed up Pacifica mandarin.

Major Carter had seen that the team was weapons heavy. They had been equipped with anti-tank Javelin systems and Stinger anti-aircraft missiles. The concept being they would hold off attacking forces. If they could not defeat them, they would provide time for the president to move to the presidential emergency operations center, aka bunker, and await relief.

The next two run throughs were successful. Not perfect, but mission accomplished. The President was saved with real time problem solving. He removed the last of his soldiers from the assault team and had them go full speed on their own.

Carter had the engineers open the second deck to make the next run a multi-story problem, and he added a president with a tension pneumothorax, gunshot wound to the upper chest. His soldiers launched a counterattack, which the Pacifica stopped while treating the president and carrying him out.

After a debrief and lunch break, they completed several more evolutions. Carter and his Sergeant Major would call out that Alpha two, four or six was down in the middle of a run. They also had the carpenters bar the last door to the president, all in attempt to make them think and adjust in real time.

At the end of the training day, after releasing the NSB members, Carter asked for feedback from his team. The consensus was good, but how would they react when the shooting started.

“Tomorrow, we go loud and ramp up the stress,” Carter said. “Another week of solid training and we can head home for Christmas and New Year.”

Manchin stepped forward and indicated they should head to the portable SCIF. Inside, Manchin got right to the point. “I’m not liking what I’m seeing.”

“The rest of us are not cleared for ridiculous, what’s your concern?” Carter asked.

Chris was a bit of a unicorn in the SMU world. He had been the first SOCOM, Special Operations Command enlisted soldier to receive a coveted intelligence community fellowship. It was based on his work uncovering multiple ISIS bomb makers and their method of shipping IEDs in hollowed out logs.

“Imagery showing the Weiqon fleet doing what appears to be replenishment at sea at night. Very dangerous and a war time tactic.”

“And?”

“And they are acting and communicating in a pattern indicating they will head back to home port to replenish and refit,” Manchin said. “But they’re leaving their exercise area slower than usual, not by much, but it’s noticeable. I have a feeling something else is coming our way.”

Chapter Five

INDOPACOM Command Joint Staff Operations, Admin Corral

Camp H. M. Smith Aiea, Hawaii

The intercom rings, it’s June my executive assistant. “CWO 5 Anderson is here to see you. She says it’s urgent.”

“Okay, have her join me, please.”

A beat later there is a knock on my door.

“Come on in C-WO,” I say, using my nickname for Chief Warrant Officer Anderson. The scowl she enters with makes me pause. She’s taller than I am, with broad shoulders from her years of CrossFit workouts.

“Admiral, I need you to log into your JWICS account. I’ve sent you a video clip you need to see.”

I spin my chair to my left and access my secure multi-domain console. I log in, provide my password and soft token, then select JWICS and my high side email.

Anderson came around the desk to my side, and I select her email. I click on the attachment with the video extension and the clip blooms on the screen.

I take a beat to orient myself. I watch the clip, play it again and face her. “Night ops to replenish at sea. Why would they do that when they are headed home?”

“There is no record of this battle group training for night replenishment across all its capital ships. Click on the other attachment, please.”

I did and a slide appeared depicting twenty-four hours of data from the Virginia class boat, USS Montana. They had tracked a Weiqon submerged target, which had begun to transit home but changed course for the south-eastern coast of the island. I glance over my shoulder.

“I confirmed our five eye partners are seeing the same activity,” Anderson said. The Montana’s target was the Weiqon 636M class submarine number 371. They recorded the deployment of a mini sub off the city of Tainan,” Anderson said, pausing for a beat before continuing.

“It’s a good thing that you pushed to get the data from the Pacifica environmental sensor program. It took the Weiqon mini sub a couple of hours of very slow going before they reached the tidal and geothermal sensors at Taijiang National Park. Two options, it is pre-war reconnaissance or the staging of assets for invasion.”

We have the cross-domain tools to ensure a secure transfer of the data into our big data analytics, which are a decade in advance of what the Pacifica have. We haven’t told them, but we are their tripwire and find more needles in their haystack than they ever could.

The un-coalesced thoughts and feelings I had about something being off exploded in my mind’s eye. “The Weiqon like to dance in the seam between exercise and all-out war. Have we alerted the Pacifica military to the threat?”

“Yes. With a copy to the White Heron cell and the Sea Dogs commander. They’ve got technical assets they can deploy to find and track the Weiqon incursion.”

Our copy of an older but authenticated Weiqon invasion plan plays in my mind for a beat before I stop framing my reaction based on incomplete information.

“Great work here, C-WO. Let’s see what the intel ops center analysts are thinking,” I say as I rise and lead her out my door.

“I’ll be in the J2 if I’m needed,” I say to June.

It’s good to stretch my legs and straighten my spine.

Inside the SCIF, we head to the cell bullpen. My presence interrupts a stout conversation.

“Who is creeping closer to their jump off?” I ask.

Air Force Technical Sergeant Robert Neuman jumps to his feet, he is new, and my rank makes him nervous.

“Admiral Jun and his battle group, ma’am.”

I turn to Master Sergeant Danny Hubler, the enlisted leader of this analyst cell.

Hubler is frowning. He is what we call an old hand out here in the Pacific. He has been rotating through the Army commands here on Oahu for more than a decade. He married a local and has a deep understanding of the Weiqon and its military. I recently signed his packet for promotion to Warrant Officer Three.

“Danny, what has you concerned?” I ask.

“I’ve watched the video of the at sea replenishment and you could put it down to war time tactics training. But… when combined with DIA’s report that there has been slow eight-month long increase in weapons and supplies at the Weiqon ports and an unusual buildup of commercial ships in the area, it makes me nervous.”

Weapons and supplies buildup. Commercial ships. Our intel suggests the Weiqon do not have enough Naval landing ships to handle all their fighting force requirements during an invasion. Fury thought.

“I agree with Master Sergeant Hubler,” Anderson said.

“Okay. I am convinced. I will update the commander. Chief Anderson, I want to know when the Sea Dogs have engaged the Weiqon threat.”

Chapter Six

124th Fleet Headquarters Combat Readiness and Training
Kaohsiung City, Pacifica

US Navy Commander Kirk Baker stood in the Sea Dogs Alpha site makeshift intel/ops cell. The cell operated inside a tent that provided SCIF protections. Baker stood near the wall of the tent his eyes focused on the display labeled as a real time feed.

Baker, a Navy SEAL commanded Taskforce Sea Dogs, the name an old descriptor for sharks. Because of his clearances and past solo work with the Agency, he’d been read on to their version of the Tengu armed stealth drone program. His combined team of the Navy’s best sailors didn’t know where the feed came from, just that it was an authenticated US source.

The Tengu’s onboard AI had identified and tagged the Weiqon swimmers as they’d come ashore 36 miles up the coast at the city of Tainan. The Tengu was a new high endurance, solar/fuel hybrid UAV that was nearing the end of its fuel profile. Baker’s support staff had briefed him that the follow-on drone was an updated MQ-9B. Its sensor payload was a copy of the sensor and tracking system on the Tengu, so it could take over the mission.

Taskforce Sea Dogs was operating three different locations on Pacifica. Each of platoons had been upgraded and trained on the new OWL PACSTAR TACTICAL CDS system. This permitted them to operate at required classifications, share information with each other and their Pacifica partners, and communicate with the Joint Intelligence Operations Center in Hawaii.

The Agency intelligence analyst on loan to the platoon broke from her focus for a beat and noticed the Commander who had stayed in the background.

“Bravo on your new C4I package, commander,” Kimmie Bosch said.

“So far, so good,” Baker said, holding back to get the analyst’s feedback.

“With the old system you guys had we’d be doing everything system high. We’d be looking at individual feeds on different screens. The transfer guards permit the data overlay on the video feed and if I want, I can access the metadata, too. As the risk of conflict increases, so does the value of the integrated package.”

“Excuse me sir, priority message,” a sailor said interrupting the conversation and handing him a single printed page.

“Thank you.” Baker read the message.

“We’ve received a priority mission,” he said, stepping forward and pointing at the screen. “I need this stripped of anything above Secret so you can send it to Jared’s platoon. I’ll have them coordinate with you ASAP.”

Baker strode out of tent to make a call and spin up a squad of SEALs. They would coordinate with their Pacifica counterparts to intercept the Weiqon swimmers. On the way, he got a secure SATCOM call from a friend who had provided the intel for the last Taskforce he had led in Afghanistan.

“Chief Anderson. you’ve got ten seconds.”

“It was our real time analytics of a Pacifica environmental sensors program that caught the threat we sent your cell. The J3 wants—”

“We’ve got them, or I should say the asset is tracking them as we speak. I’m spinning up Jared’s platoon to intercept with our partners.”

“Solid news, I’ll tell the boss.”

“Admiral Fury has a nose for trouble. Is it twitching?”

“Roger that. I’d suggest keeping your kit close at hand. I’ve had you and Major Carter put at the top of our enterprise flash alert list.”

“That bad.”

“Yes, sir. Got to update the boss. Out here.”

Baker scanned the portable SCIF. “Sea Dogs, listen up. I want everyone weapons hot until I order otherwise, copy?”

Baker looked each of the seven sailors and the Agency analyst in the eyes for their confirmation. “Pass the message to the other Sea Dogs locations,” he said. Outside of the tent, he let the security team know.

The platoon from SEAL Team 1 was a short walk away. As he headed there, he used his secure SAT phone to spin up the 160th Night Stalkers assigned to the taskforce. The helicopter were the quickest and most agile means of intercept at his disposal.

The metal building wasn’t insulated, so the platoon had the doors and windows open to help some of the humid air move through. It backed up to the dock area where two Combatant Craft Medium patrol boats sat ready for their use.

“Jared,” Baker called out to the platoon commander.

The Lieutenant, who was at a table, reassembled his pistol and joined his commander. “Yes, sir.”

“We have a mission. I have the 160th on the way. Get the boats fired up. Meet me in the SCIF.”

Jared passed the message to his master chief who ordered the platoon and boat operators into action. “We deploy in 15 minutes.”

Inside the tent, which had been erected in a former office space, he briefed the platoon leader on the mission. “Your platoon leads, the partner decides how to remove the threat. I’ve got the Agency preparing a classified feed to your ATAKs.”

“Got it. 160th is our primary infil/exfil with the boats for backup and containment. Standard rules of engagement, ROE. We have to be shot at before we can fire?”

“Yes, but if you partner opens fire first, end it for them.”

“Check. Both of my communicators have the SATCOM radio appliance that does the ATAK nerd stuff and can share with our partners. Cross domain, diodes, Type 1 encryption… all the lightweight and ruggedized goodness we can carry.”

“Excellent. I want you and your SWCC crews to operate at weapons hot until I order stand down. This threat is real and our friend in the big house told me to keep my kit close.”

“Double A?” Jared asked.

Baker nodded. Jared whistled.

Weapons hot had everyone, including Commander Baker, carrying their weapons loaded and ready to fight.

The SEALs would prosecute the counter threat mission and be ready for more. As Commander Kirk Baker was fond of saying, “Anytime, anywhere.”

Chapter Seven

INDOPACOM Command Joint Staff Operations, Admin Corral

Camp H. M. Smith Aiea, Hawaii

It has been three days since Admiral Jun surprised me with his quick agreement to withdraw. The list of actions we can take short of war is long, although much of it will not matter if the Weiqon are determined to reunify the island. But there are a couple of moves I’m willing to make to see if they change the Weiqon calculus.

The capture and exposure of their swimmers is one. Another is my idea for a dual threaded incursion comprising cyber and physical components that will deny the Weiqon leadership use of their lead aircraft carrier.

The SEALs are engaging the swimmer threat. And the USS Jimmy Carter is tailing the Fujian. The boss has approved my plan in concept, now it’s time to talk with our Cyber Command liaison to see if it’s possible.

I have June notify CWO 5 Anderson to find me in cyber operations section of the SCIF. Anderson is already there when I arrive and badge through to one of the most sensitive areas within the command. She breaks off her conversation with Colonel Lytle, the watch commander.

“Admiral, what can we help you with today?” Lytle asked.

“I need the Fujian electro-magnetic launch system offline.”

“Let’s talk in my office,” he said, and pointed to a door label Watch Commander.

Once we were inside, he closed the door and asked. “How long?”

I’m surprised and pleased by his no hesitation response.

“Are you indicating you have a range of options?”

“Yes, ma’am,” Lytle said. “The electro-magnetic catapult, EMC design and code they stole from the Navy’s prime contractor was a honey pot version with poisoned software and a back door. I’d be surprised if they haven’t found the code problem and fix it, but we’ll see if it’s available to exploit. The backdoor is hidden in the master controller chip firmware.”

“How do you open the door?”

“Let’s just say that we were more involved in building the aircraft carrier than the Weiqon would have preferred. We can open it from below with capabilities onboard the Multi-Mission Platform on the Jimmy Carter.”

“Can you disable the catapult for 6 to 10 days.”

“Put the Carter into position and our team onboard will do the rest. It will take 4 to 6 hours to see results. The communications path is low and slow by design.”

“That works. Thank you, Colonel,” Fury said, taking Anderson with her. Back at the J3 Admin Corral, Chief Martin joined Admiral Fury and CW5 Anderson in her office.

“The joint SEAL and Pacifica interdiction team is moving into position,” Martin said.

“Good. I’ll get the operations order to the skipper of the Jimmy Carter. Once they are in position, Colonel Lytle’s team will disable the Fujian. That should derail whatever Admiral Jun has planned before the Weiqon President makes a bad decision.”

# 

Sign up to be the first to hear when Part 3 of Operation Skipjack drops!

Want to know how Owl’s cross-domain & diode solutions, are shaping the future of secure collaboration and data sharing? Talk to our team today.

Insights to your Inbox

Stay informed with the latest cybersecurity news and resources.

  • This field is for validation purposes and should be left unchanged.
Kristina Dettwiler

Enhancing Coalition Collaboration with Scalable Cross Domain Solutions

Secure, seamless collaboration across varying classification levels and domains remains critical for modern warfare, especially as adversaries increasingly exploit cyber vulnerabilities t...
April 20, 2025

Top 7 Cybersecurity and Resilience Takeaways from DISTRIBUTECH 2025 for Critical Infrastructure Leaders

The Shift Toward Operational Resilience in Critical Infrastructure Whether you're responsible for maintaining uptime in the field or ensuring secure data flow across your network archite...
April 3, 2025

Cross-Domain Solutions in Action: Real-World Lessons in Secure AI Data Exchange

Cross-Domain Solutions in Action: Real-World Lessons in Secure AI Data Exchange As artificial intelligence (AI) becomes more embedded in mission-critical operations, the need for secure,...
April 1, 2025