Electronic And Cyber Warfare: A Comparative Analysis Of The PLA And The .

1y ago
5 Views
3 Downloads
6.09 MB
58 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Asher Boatman
Transcription

JULY 2019Electronic and CyberWarfare: A ComparativeAnalysis of the PLA andthe Indian ArmyKARTIK BOMMAKANTI

Electronic and Cyber Warfare:A Comparative Analysis ofthe PLA and the Indian ArmyKARTIK BOMMAKANTI

ABOUT THE AUTHORKartik Bommakanti is an Associate Fellow with ORF’s StrategicStudies Programme. He specialises in space military issues, and morespecifically, the relationship between the space medium and terrestrialwarfare. Kartik also works on nuclear, conventional and subconventional coercion, particularly in the context of India and the role ofthe global powers in the subcontinent’s strategic dynamics. His researchhas been published in various peer-reviewed journals.ISBN: 978-93-89094-49-7 2019 Observer Research Foundation. All rights reserved. No part of this publication may bereproduced or transmitted in any form or by any means without permission in writing from ORF.

Electronic and Cyber Warfare:A Comparative Analysis of thePLA and the Indian ArmyABSTRACTCyber Warfare (CW) and Electronic Warfare (EW) are crucial to combat inmodern warfare. Both are products of Signals Intelligence and constituteone part of Information Warfare (IW) and what is known as NetworkCentric Warfare (NCW). This paper explores how the People’s LiberationArmy (PLA) of China and the Indian Army (IA) have approached CW andEW. Both the PLA and the IA acknowledge NCW as doctrinallyimportant. Organisationally and in Command and Control (C2), the PLAhas undergone significant reforms; the same is not true for the IA. Asopposed to the PLA, the IA is yet to fully acknowledge and recognise thecomplementarities between EW and CW.(This paper is part of ORF’s series, ‘National Security’. Find other research in theseries here: /)Attribution: Kartik Bommakanti, “Electronic and Cyber Warfare: A Comparative Analysisof the PLA and the Indian Army”, ORF Occasional Paper No. 203, July 2019, ObserverResearch Foundation.ORF OCCASIONAL PAPER # 203JULY 20191

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYINTRODUCTIONFew have addressed the question of how Cyber Warfare (CW) andElectronic Warfare (EW) capabilities intersect in the conduct of landoperations by the Indian Army (IA) and China’s People’s LiberationArmy (PLA). This paper explores the effects of cyber and electronicwarfare on land operations. It examines the complementarities,similarities and differences between cyber warfare and electronicwarfare, and how their relationship has long been recognised bystrategic studies experts.Cyberspace operations and EW occur across the electromagneticspectrum. This paper demonstrates their importance in ground combatmissions by undertaking a comparative analysis of the performance ofthe PLA and the IA in terms of capabilities, doctrine, and commandorganisation. The analysis is less concerned with PsychologicalOperations (PSYOPs) and Military Deception (MILDEC), which areintegral to IW operations; the focus is on establishing technical linksbetween CW and EW, Command and Control (C2), and doctrine. EW andCW are integral to Network Centric Warfare (NCW). NCW is geared togenerating combat power by effectively networking all the elements ofwarfighting. It involves connecting geographically dispersed forces toenhance battlespace awareness, which include troops, platforms,weapons, sensors and decision mechanisms for sustained dynamicallysynchronised operations. NCW is not exclusively about technology, butas much about synchronising command and operational or tacticaldoctrine for the effective execution of military operations and missions1according to the commander's intent.China recognises the linkages between CW and EW and has anestablished C2 structure that integrates the two components into asingle information warfare force. The PLA, however, has yet to release2ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYan official doctrine on offensive and defensive operations in the cyberdomain, and more generally, in the area of IW; this, despite PLA expertssince the 1990s having already articulated the importance of2Information Operations (IO) in Joint Warfare.A note on sources: Most of the extant work on China used in thispaper are either English translations of Chinese analyses, or Westernsources on PLA’s capabilities in the domains of CW and EW and thegrowing linkages between the two. Meanwhile, India’s views are gleanedfrom existing doctrines of the IA and the tri-service. India is yet toformulate a coherent view on the challenges and opportunities aboutCW and EW to the same extent as China.This analysis focuses on the military-operational domain of notsimply CW, but the complementarities between CW and EW on thebattlefield. What is the scope of integration between Indian and Chinesearmies? Relative to the PLA, how much more integrated are the IndianArmy’s EW and CW capabilities at different echelons? China is known toadopt an integrated approach to the cyber and electronic domains; Indiais not. Beyond purely capabilities and the functional fusion betweenCW and EW, India needs a command structure that can cope effectivelywith the combined activities and demands of CW and EW across theelectromagnetic spectrum.This paper makes the case that integration and not just coordinationis fundamental to the effective and synchronised use of cyber warfareand electronic warfare capabilities. China has moved carefully andmethodically to create an integrated CW and EW as part of itsInformation Warfare (IW) strategy. The cyber-electronic integration isvital, which are both a part of the Electromagnetic Spectrum (EMS) or atleast rely on the EMS for transmission.ORF OCCASIONAL PAPER # 203JULY 20193

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYThe succeeding analysis will first define what “cyber warfare” and“electronic warfare” mean. It then defines “cyber weapons” and“electronic weapons” and how the cyber and electronic domains arelinked. The third part evaluates the presence and integration of CW andEW capabilities by the People’s Liberation Army (PLA); the analysis isdone for the Indian Army in the subsequent section. The paper closeswith an evaluation of where the Indian Army stands relative to the PLAin the integrated use of CW and EW capabilities for military operations.I. CYBER WARFARE AND ELECTRONIC WARFARE:DEFINITIONS IN THE CONTEXT OF LAND WARFARE1.1 Cyber warfareIn May 2008 former United States (US) Deputy Secretary of DefenceGordon England defined cyberspace thus: “A global domain within theinformation environment consisting of the interdependent network ofinformation technology infrastructure, including the Internet,telecommunications networks, computer systems, and embedded3processors and controllers”. Cyber Operations (CO) may be defined,meanwhile, as “the employment of cyberspace capabilities where the4primary purpose is to achieve objectives in and through cyberspace.”There are various risks involved in utilising cyberspace for specificobjectives. This paper focuses on two specific types of risk: the first isoperational, and the second, technical. Operational risks centre on howthreats can compromise mission effectiveness; the effectiveness ofcyber-attacks (or lack of it) in turn generates operational consequences.5Intrusion in cyberspace can undermine data and systems, and technicalnetworks producing outcomes such as personnel deaths, damage or lossof equipment and property, capability degradation, mission6degradation or even the overall failure of the mission. The adversary4ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYcould potentially extract data from the Army’s networks, depriving thearmy of the element of surprise and the ability to undertake an ambush.Adversarial forces may execute attacks through cyberspace and EMSagainst friendly forces, capabilities and networks, consequentlycompromising future cyber-attacks and missions geared to exploit7cyberspace. In addition, cyber-attacks are directed at generating anadvantage within the cyber domain and supporting friendly forces.They contain specific actions that involve denial, disruption,degradation, destruction and manipulation.The technical risks, meanwhile, are associated with vulnerabilitiesthat are exploitable in the Army’s systems and networks. Technicalsystems are generally networked across armies, generating shared8vulnerabilities. Potential vulnerabilities of shared networks and partscould undermine the projection of military power and support for themission. Risks can be subject to mitigation through Defensive CyberOperations (DCO) and cyber security measures to defend against attacks9that exploit technical weaknesses. A range of measures are necessary,including strong systems engineering capabilities, security, intelligence,counterintelligence, software and hardware integrity, supply chain riskmanagement, and security engineering of information systems—these10will enable the army to manage risks and maintain integrity and trust.Before embarking on cyber-attacks, the army will have to examine thetechnical risks involved to avoid rendering its own networks vulnerable11to counter-attacks. In these circumstances, a defence-in-depthapproach will be necessary to fend of attacks through anti-virus and antimalware software programmes, strong sensors networks, prevention ofintrusion, and other physical barriers to reduce technical risks.12“Cyber warfare” is then defined as “attacks by a nation or quasinational organisation on the software and data (as opposed to thepeople) of an information system.”13ORF OCCASIONAL PAPER # 203JULY 20195

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMY1.2 Electronic warfareElectronic Warfare takes place within the Electromagnetic Spectrum(EMS). The EMS itself can be defined as the “ range of frequencies ofelectromagnetic radiation from zero to infinity”.14 The wavelengths andfrequencies range from radio frequencies to gamma rays (See Annex Figure1). EW is crucial in military operations. The integration and conduct of EWto support military missions occurs across all services; in this paper, theanalysis is confined to the respective armies of China and India.There are three elements in EW:15Electronic Support (ES). ES focuses on interception. ES providessurveillance and warning data extracted from intercepted EMenvironmental emissions.Electronic Protection (EP). EP focuses on encryption. EP provides selfprotection to the host platforms against an electronically controlledthreat.Electronic Attack (EA). EA focuses on jamming. EA covers both ES andEP to defend a battle force consisting of several platforms or combatunits.16 Just as is the case with cyberspace, EA covers both defensive andoffensive forms of warfare. Defensive EA protects friendly forces and hostplatforms, whereas offensive EA involves denial, disruption or17destruction of adversary capabilities and forces. Electronic warfareencompasses three core areas along the EMS: communications, navigationand radar functions, and the use by the adversary of these functions.181.3 CW and EW in land warfareIn the context of land warfare, CW and EW operations are undertaken tosupport Army operations and missions. Most immediately relevant toland operations are ground-based EW systems and aerial EW systems.6ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYGround-based EW capabilities. Ground-based EW equipment andoperations support commanders in manoeuvre. For example, adismounted soldier or platforms that are highly mobile can be used for19ground-based EW capabilities. Inherent in ground-based EW is theshort-range characteristics of tactical signals direction finding. EAcapabilities or equipment is normally deployed in forward areas with or20in close proximity to forward units.There are various advantages to ground-based EW systems. For one,they provide direct support to army units on the battlefield duringcombat manoeuvres through counter radio-controlled improviseddevices and communications or sensor jamming. EW groundcapabilities are geared for supporting sustained land operations andenabling a speedy response to the commander’s directives. Land-basedEW units are most effective when they grasp the EMS signature anddirect their effort to protect their respective EW equipment fromadversary ground and aerial threats. Survivability and mobility arecrucial for EW equipment for effective mission support. Only groundcommanders can establish their respective EW needs and manoeuvreunits have to logistically support EW assets.To be sure, ground-based EW assets have limitations. They arevulnerable to adversary geolocation, electromagnetic deception, EPmeasures, and physical attacks, and are susceptible to terrain masking.21They are also constrained by distance and propagation limitationsagainst adversary electronic warfare systems.Airborne electronic warfare systems. Airborne EW systems, bothmanned and unmanned, perform almost identical functions in supportof ground operations. However, aerial electronic warfare is more timecritical. AEW is normally undertaken at higher tempo and shorter induration. It places a high premium on detailed planning. SuccessfulORF OCCASIONAL PAPER # 203JULY 20197

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYairborne EW in support of ground operations must include a clearunderstanding of the commander’s objectives, detailed planning andintegration, ground support infrastructure, interaction betweenaircrew providing EW support for ground forces, and defence against22adversarial aircraft and air defence units.The advantages of AEW assets range from provision of tacticalsupport for action beyond ground forces such as electronic suppressionof enemy air defences, use of anti-radiation missiles, and destructionenemy air defences. Airborne EW capabilities provide greater mobilityand flexibility. Unlike ground-based EW, they provide support overextended ranges and provide better line of sight and direction finding23capacities. However, airborne EW too has weaknesses such as limitedtime on station and as with ground-based EW; airborne electronic assetsare vulnerable against EP. In addition, AEW assets are exposed toelectromagnetic deception and adversary geolocation, and may need the24support of supplementary assets.Any army will generally have a combination of ground-based andairborne electronic assets. The challenge lies in leveraging both subsetsin a synchronised manner. Beyond EW assets, the challenge is either toconduct operations independently or in concert with CW assets basedon the commander’s directives and the mission.II. CW AND EW: DIFFERENCES, COMMONALITIES AND THEIRROLES IN THE ELECTROMAGNETIC SPECTRUMA study by RAND Corporation found that cyber operations fuse with 6025percent of EW and roughly 80 percent of Signals Intelligence (SIGINT).However, the relationship between SIGINT and EW and CW is a complexone. Indeed, there is a view that EW and CW are more complementarythan combined.26 This paper shares this view.8ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYThe primary functions of EW are in two areas: directed energy and27brute force (barrage) jamming. Directed Energy encompasses a set oftechnologies that generate a beam of concentrated electromagneticenergy or atomic or sub-atomic particles.28In the case of SIGINT, it is eavesdropping. Electronic Intelligence(ELINT) is a component of SIGINT and technical and foreign geolocationintelligence extracted from non-communications electromagneticradiations. Non-communication radiations include radars, Surface to29Air Missile Systems (SAMs), and aircraft. Along with ELINT, SIGINTconsists of several other forms of intelligence such CommunicationsIntelligence (COMMINT) and Foreign Instrumentation Intelligence(FISINT). Finally, in the case of CW, a range of operational and attackoptions exist such as web and email spam, denial-of-service attacks,malware and viruses.The commonality between CW and EW is both a matter ofperspective and misunderstanding. As a rule, any network is vulnerableto penetration and corruption whether it is air-gapped (connected to theinternet) or not. In the case of air-gapped networks, penetration andcorruption or manipulation of networks could come through physicalintrusion in the form of virus or malware containing external devicessuch as flash drives. Even an electronic network is susceptible tocorruption because it might not be “cyber-secured”.30 To that extent,both cyber and electronic networks share this common vulnerability.Vulnerabilities could affect military platforms. Take for instance, UAVsystems, which are also cyber-physical systems in that they depend onan interaction between physical and computational features of the UAV31system. UAVs are particularly vulnerable because theircommunications are relayed via satellite, ground stations and other32UAVs within the network. Nevertheless, as electronic and cyberwarfare platforms they are critical assets in land warfare.ORF OCCASIONAL PAPER # 203JULY 20199

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYModern armies, including the PLA and the IA depend on UAVs.Cyber-attacks could be launched against UAVs sensor nodes bymanipulating their sensor input and functions and trigger existingmalware to disable them by generating denial of service attacks ormislead the processes on which the UAV network’s sensors aredependent and generate a failure in the fail-safe mechanisms of the UAV33network. Like in the case of satellite systems, spoofing and jammingwhich fall within the domain of electronic warfare would be the mostnatural and effective methods for crashing and capturing UAVs. Satellitesignals are highly vulnerable to spoofing attacks as are UAVs. Jamminginvolves deliberate transmission of radio frequency signals to disruptthe transmission of other radio signals. Spoofing, on the other hand,despatches intentionally misleading signals to a receiver of an antennaby making it accept false information.34Table 1 in Annex provides a concise explanation of the relationshipbetween the EW domain and the cyber domain. Their missions tend tobe similar, albeit conducted in separate domains. The similaritiesbetween the two relate to access and denial operations against specific35threats. Their differences lie in means, mechanisms and paths. AsGeneral John Hyten, currently commander of the US StrategicCommand (USAC), observed: “In cyberspace, we provide pathways forinformation, we deny adversaries information. It’s the same [EW]36mission that we do in different domains.”Beyond these shared features, information warfare actions coverboth cyber and EW operations in the arena of military deception. Thecommonly used form of EW by tactical aircraft is “synchronised false37jamming”. Technically, it creates deceptive targets that appear realisticand sows confusion by creating a match between the jamming to thetarget radars electronic signatures through an injection into the backand side lobes of the adversary’s air defence network.38 This form of10ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYjamming can transmit through automated electronic countermeasuresor filters and generates ‘realistic’-looking targets that are not authentic39information. In the case of CW, “software decoys” may be developed asa technique for generating false defensive tactics. These decoys comprisesoftware modules that act like normal software but can identifyattacking behaviour of the adversary and generate a deceptive response(See Table 2 in Annex). The greatest possibility lies in coordinatingactions between the cyberspace domain and electromagnetic spectrum.The data stream can be fed into the target antenna and consequently thenetwork itself can be penetrated and exploited for manipulation.III. CHINA’S VIEW OF CW AND EW CAPABILITIES:CONVERGENCE OF DOMAINS?3.1 Cyber Warfare and Electronic Warfare: PLA’s ViewUnder China’s conception of cyber warfare, an entire range ofcapabilities and technologies characterise computerised warfare. InChinese parlance, CW is described as Computer Network Operations(CNO) that involve digitisation and computer systems that arecompletely networked and provide clarity and data in real time to40military commanders on the field. CNO can assume the form ofhacking and cyber-attacks. Further, through simulated false commands,the adversary can be deceived.41From a Chinese standpoint, warfare across the electromagneticspectrum requires initiative and offensive action. The purpose,according to the PLA, is to dominate the electronic spectrum andeffectively deny the enemy the use of its electronic equipment.Offensive operations across the electronic medium would employelectronic jamming, electronic deception, directed energy weapons andelectromagnetic pulse radiation. The defence (as opposed to offence)would require hardened facilities, dispersion, countermeasures, andORF OCCASIONAL PAPER # 203JULY 201911

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYphysical retaliation. Consequently, microelectronics has been a key areaof investment for the PLA.3.2 The Overlap of CW and EWIn 1999, PLA Major General Dai Qingmin was the key advocate behindthe adoption of China’s integrated view of CW and EW operations aspart of the PLA’s Information Warfare (IW) strategy. Dai secured athpromotion to head the erstwhile 4 Department of the Chinese GeneralArmaments Department (GAD). He made the case for fusing EW withComputer Network Operations (CNO). He defined InformationOperations (IO) as a series of operations with information systems asthe direct operational target, and with electronic warfare and a42computer network war as the principal form.”According to the PLA, EW and CW are not mutually exclusive; it isnecessary to recognise their convergence and integration to dominateinformation operations during wartime. Dai Qingmin called it IntegratedNetwork Electronic Warfare (INEW) composed of the “ organiccombination of electronic warfare and computer network warfare.” Asthe American scholar James Mulvenon put it, this was “revolutionary”,because even experts and information warriors in the United States wereyet to be convinced about the connectedness between the two forms ofwarfare; they deemed electronic warfare to be completely outside therealm of computer attack networks.43 For Dai and others within theChinese strategic and military establishment, a blended view of CW andEW was the ‘essence’ of “integrated combat operations” to fight “enemy44information systems” with the aim of “seizing battlefield superiority”.Although China has not established a formal information warfaredoctrine, it has gone ahead of the curve in grasping the importance of theopportunities in combining cyber and electronic warfare, or at leastseeing the complementarities between them.12ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYThere is evidence to suggest that PLA intends to confront theadversary pre-emptively through cyberspace alone, which is notnecessarily linked to dominating the electromagnetic spectrum. Thiseffort would require computer network operations that infect theenemy’s weapons systems with malware while they are still inactive, butthe malicious code only activates at predetermined time with the aim ofdestroying the adversary’s Command and Control system, such as“ circuits that control railroads, military air traffic and divert trains to45wrong routes to cause traffic jams”. The PLA, therefore, also viewscyber operations as an independent means to subdue the adversary andsees computer network operations as having disruptive effects onthem.Is there an “organic” link in the form of INEW for the PLA betweenthe cyber and electronic domains for battlefield operations, which thePLA has tested? In 2011 and prior to the introduction of the 2015military reforms, the PLA conducted a series of exercises involving forinstance, in the Chengdu Military Region (MR) an unnamed artilleryregiment’s employment of INEW as a “soft kill” approach which includedelectromagnetic jamming and computer network attacks against theadversary’s command and reconnaissance systems.46 Consequently,instruments appear to be integrated into the artillery unit’s fire supportmission that are independent of Electronic Counter Measures (ECM),implying that other non-ECM combat elements also include “electronicwarfare and computer network attack as an organic capability” with thePLA divesting reliance “ solely on dedicated external INEW units forsupport”.47One other notable exercise conducted in 2009 as part of a large-scalemulti-MR exercise employing a “blue force jamming and informationoffense-defense units” were effective in suppressing red force armourORF OCCASIONAL PAPER # 203JULY 201913

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYand motorised infantry and its command and control through a48combination of network and jamming attacks. Thus, the Chineseapproach to CW and EW in the guise of INEW underlines thesignificance of a connection or complementarity, if not a completeoverlap, between the two areas of the cyberspace domain and theElectro-Magnetic Spectrum (EMS). These exercises also demonstratethe extent to which PLA has pursued the integration of CW and EWcapabilities as part of a networked fighting force and subjected them tointensive tests to measure their effectiveness as well as training combatpersonnel.To improve the effectiveness and speed of decision-making andsustain secure and reliable communications, the PLA as of today fieldsan automated command system known as the Integrated Command49Platform with mobile and static units. This enables the PLA to executejoint operations more effectively at close and far combat zones withadvanced weapons systems. Lower echelon units field the IntegratedCommand System facilitates communications across all the servicearms of the Chinese military.50 The Chinese military’s C2 structure issimilar to Western C2 systems to the extent that operationalcommanders determine the force structure drawn from units trainedand equipped by the each of the Chinese services. The joint C2 structureencompasses mostly People’s Liberation Army Air Force (PLAAF),People’s Liberation Army Navy (PLAN) and the Strategic Support Force51(SSF). This emphasis enables more jointmanship.While China does not have a formal doctrine enunciating the linkbetween CW and EW, the Chinese approach to CW and EW is compatiblewith this paper’s conception of cyber-electronic operations to the extentthat it recognises they are crucial nodes on the electromagneticspectrum.14ORF OCCASIONAL PAPER # 203JULY 2019

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMY3.3 The SSF Integration and Command and Control Advantage?China’s Computer Network Operations (CNO) and EWChina has undertaken a reorganisation of the command structure of itscapabilities in cyberspace, electronic warfare and space, placing themunder the authority of the Strategic Support Force (SSF).The “cyberspace force”, China calls it, is part of SSF’s NetworkSystems Department (NSD). The 3rd General Staff Department (GSD) ofthe PLA was the precursor to the NSD. The NSD is similar to thecommand structure of the People’s Liberation Army Navy (PLAN) to theextent that it has an operational commander as well as politicalcommissar. Two inferences can be drawn from this. The centralisation ofcommand under the Central Military Commission (CMC) of China’sinformation warfare arms is possibly due to Xi Jinping’s taking ongreater control over these critical domains (cyber, electronic and space52based). For instance, the first military commander of the NSD wasLieutenant General Zheng Jungie and the NSD political commissar wasLieutenant General Chai Shaoliang.53 It can also be inferred that theCMC intends to see the SSF do what it desires: execute the intent of theCMC in wartime. At the inception of the reforms in 2015 CMC guidancenoted that, “the CMC commands; the services equip; and theatrecommands fight”.54 This allows the CMC the PLASSF to directintelligence for all battlefield operations.The military reforms introduced in 2015 were far-reaching to theextent that they have expanded the CMC’s direct control over militaryoperations and operational forces and all the technical functions wereconsolidated under the PLASSF.55 The PLASFF’s establishment reflects ashift in priorities, and intelligence is more focused on supportingmilitary operations. The NSD is believed to be a reorganised, renamedORF OCCASIONAL PAPER # 203JULY 201915

ELECTRONIC AND CYBER WARFARE: A COMPARATIVE ANALYSIS OF THE PLA AND THE INDIAN ARMYand upgraded entity,56 and it is encompassing most of the institutional57functions performed by the erstwhile GSD undergird.Chinese cyber forces have been centralised under the NSD, which is asignificant move as it demonstrates a seriousness to overcome thecoordination problems that plagued the erstwhile 3rd GSD. This shift inthe structure of command will enable the NSD to coordinate andconduct operations with greater effectiveness. Integration bringsconsiderable benefits to the PLA:ŸIntegration enables better cyber reconnaissance, allowing the PLAto gather information about technical and operational matters forintelligence, which thereafter will be employed for operational58planning for

systems are generally networked across armies, generating shared . Electronic Warfare takes place within the Electromagnetic Spectrum (EMS). The EMS itself can be defined as the " range of frequencies of . and radar functions, and the use by the adversary of these functions.18 1.3 CW and EW in land warfare

Related Documents:

electronic warfare operations on friendly elec- tronic systems. (4) Electronic warfare considerations for de- ception planning. (5) Generalized data concerning friendly and enemy electronic warfare capabilities. (6) Command and staff responsibilities for control, planning, coordination, and execution of electronic warfare operations. 1-3.

warfare doctrine illustrates how we are integrating new electronic warfare technology. The '73 and '82 Mideast Wars are recent historical experiences analyzcd to show the impact of electronic warfare on operational maneuver. These experiences indicate electronic warfare significantly enhances the ability to execute operation al maneuver.

of a cyber-attack can potentially lead to cyber-warfare, namely the cyber-attack conducted by the Stuxnet-virus. This example has influenced the thinking in cyber-warfare, thus carries high importance for our research. We then continue with a comprehensive interpretati

Electronic warfare is an important pillar in any modern strategy of warfare. Electronic warfare and its extension in the form of (Information warfare) will continue to grow in prominence with the increased reliance on electronics both in the military and the private sector. In order to fully see the 'broad pic' in the vast

Cyber Vigilance Cyber Security Cyber Strategy Foreword Next Three fundamental drivers that drive growth and create cyber risks: Managing cyber risk to grow and protect business value The Deloitte CSF is a business-driven, threat-based approach to conducting cyber assessments based on an organization's specific business, threats, and capabilities.

Russian Electronic Warfare September 2018 FOI-R--4625--SE ISSN 1650-1942 . electronic warfare weapon systems, has largely neglected other Russian priorities in the field of electronic warfare (EW) that are of equal or even greater . RWR Radar Warning Receiver . SIGINT Signals Intelligence .

Abovewater Warfare Tactical (AWT), Abovewater Warfare Weapons (AWW), Electronic Warfare (EW) and Underwater Warfare (UW). With each role you will either operate state-of-the-art Radar, Sonar, Weapon or Computer Systems to maintain safe and secure waters as well as conducting peace keeping and maritime security operations around the world. 2

risks for cyber incidents and cyber attacks.” Substantial: “a level which aims to minimise known cyber risks, cyber incidents and cyber attacks carried out by actors with limited skills and resources.” High: “level which aims to minimise the risk of state-of-the-art cyber attacks carried out by actors with significant skills and .