#2009 | ![]() | 161 | ![]() |
May 09, 2019 | ![]() | By Kanchana Ramanujam | ||
Introduction Technological and sociological changes have brought about a paradigm-shift in the understanding of war, battle-field, and indeed, victory and defeat. Warfare has metamorphosed from the classic military aggression only, to include a number of other domains such as political, legal, diplomatic, etc. This has led to a corresponding change in the weapons used - currency, water, markets, narratives, malware, etc. are the new weapons. The objective of warfare is changing from imposing a military defeat to rendering the military might of the adversary meaningless, exemplified by the use of lawfare, cabbage tactics, Little Green Men, Little Blue Men, unmanned systems, creation of artificial islands, etc. Former United States Secretary of Defense, James N Mattis, called such actions ‘competition’ (distinguishing it from armed ‘conflict’) in US’ National Defense Strategy released in January 2018.1 The word ‘competition’ initially figured in the 2017 Multi-Domain Battle paper of the US Army.2
There is less emphasis on bloodshed and increasingly more emphasis on incapacitating the adversary, the key to which is capabilities in the domains of cyber, space, and the electromagnetic spectrum. The 7th generation warfare is indeed about paralysing a country by targeting their network-based critical assets - banking, electricity, nuclear facilities, etc.
Domain-Specific Vulnerabilities - The Assassin’s Mace
Targeting the adversary’s domain-specific weakness gives the weaker side the change to dominate in a conflict, and the stronger side to prevail without inviting international intervention.
Hezbollah Hezbollah, a non-state actor, which used the tactics of suicide bombing and frontal attacks against Israel in the 1990s, could challenge the might of the Israeli Defence Forces in the 2006 Lebanon War when it prosecuted electronic warfare, exploiting the complex communication network it built stretching across Beirut to the Israel-Lebanon border. It simultaneously prosecuted psychological warfare, systematically using al-Manar Television channel. These were in addition to dexterously utilising guerrilla as well as conventional capabilities.
Russia Russia has mastered the art of what it calls non-linear warfare. Be it shaping the environment by bringing up the issue of Russian identity (psychological operations), leveraging Gazprom as a tool for coercion, economic carrot and stick approach, use of irregular forces, cyber aggression, etc.
China China’s unrestricted warfare is based on exploitation of economy, law, networks, etc. rather than a direct military confrontation. The same is evident in China’s impressive space and cyber capabilities, exploitation of audio and visual means of mass communication for narrative building, debt diplomacy, use of deceptive, irregular forces (maritime militia), etc.
Integrated, Multi-Dimensional Response for Multi-Dimensional Threats
In response to the Russian and Chinese anti-access/area denial (A2/AD) capabilities, the US established the I2CEWS (Intelligence, Information Operations, Cyber and Electronic Warfare, and Space and Signal) unit.3 Led by an officer of the rank of Lieutenant Colonel, the I2CEWS is a battalion-sized force. It has, as the name suggests, the following four companies :
A second battalion of the I2CEWS will come up in the US European Command.
The Indian Scenario
India has already taken the initial steps towards tackling threats in the unconventional domain. During the Combined Commanders’ Conference held in Jodhpur last year, the Prime Minister approved cyber, special forces, and space divisions for the Armed Forces.4 Recently, the Indian Armed Forces conducted Cyberex, a two-day, joint cyber exercise, along with other stakeholders such as the the Indian Computer Emergency Response Team, the National Technical Research Organisation, etc.5 As the battlefield evolves in terms of actors, dimensions, space, and time, India needs to be prepared to act simultaneously and synergistically in every dimension of conflict - be it land, air, sea, space, cyber, as well as electromagnetic spectrum. She also needs to arm herself to seize the first mover’s advantage in these domains. For a dedicated and integrated, multi-domain structure, the following points require consideration:
Conclusion The proliferation of different tools of warfare and resultant expansion of the battle-field means that no particular service can guarantee victory. The modern battlefield needs not just military but political, psychological, electronic, technological warriors too. To win today’s ‘wars’, one needs a whole-of-government (WOG) approach with elements of Comprehensive National Power as part of the action/response system. The Armed Forces should be prepared to take threats in all domains, as also take offensive actions in those domains. A synergistic, multi-domain, WOG approach may prove to be the decisive factor in battle-field dominance. | ||||||||
References
1Summary of the 2018 National Defense Strategy of The United States of America Sharpening the American Military’s Competitive Edge. (n.d.). [ebook] US Department of Defense. Available at: https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf [Accessed 1 May 2019]. 2Perkins, D. (2017). Multi-Domain Battle Driving Change to Win in the Future. [online] https://www.armyupress.army.mil/. Available at: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/July-August-2017/Perkins-Multi-Domain-Battle/ [Accessed 1 May 2019]. 3Clark, C. (2019). Hack, Jam, Sense & Shoot: Army Creates 1st Multi-Domain Unit. [online] Breaking Defense. Available at: https://breakingdefense.com/2019/01/hack-jam-sense-shoot-army-creates-1st-multi-domain-unit/ [Accessed 2 May 2019]. 4Anon, (2019). [ebook] DRDO. Available at: https://www.drdo.gov.in/drdo/pub/npc/2019/May/din-01may2019.pdf [Accessed 4 May 2019]. 5Pandit, R. (2019). Forces prepare to deal with cyber attacks on key infrastructure | India News - Times of India. [online] The Times of India. Available at: https://timesofindia.indiatimes.com/india/forces-prepare-to-deal-with-cyber-attacks-on-key-infrastructure/articleshow/69088311.cms [Accessed 5 May 2019]. Views expressed are of the author and do not necessarily reflect the views of CLAWS or of the Government of India | ||||||||
| ||||||||