Sunteți pe pagina 1din 8

FOCUS

PLA in Electromagnetic Domain


P K Mallick*

Introduction (CNOs), electronic warfare (EW) and kinetic

T
he PLA expects to fight intense short wars strikes designed to paralyse an enemy’s networked
that will be very decisive. The ability of information systems, by creating “blind spots”
military forces to communicate and against an adversary’s C4ISR systems. The PLA’s
coordinate rapidly through Command, control, C4ISR programmes support the ground forces,
communications, computers, intelligence, navy, air force, missile forces, nuclear doctrine,
surveillance and reconnaissance (C4ISR) and space warfare. Its operational concepts for
networks means that military forces in Local Wars employing traditional signals intelligence and
at the operational level will be agile, capable of electronic warfare have expanded to include cyber
high-tempo deep operations, resource-intensive, warfare; kinetic and cyber attacks on satellites;
critically dependent on information and present in and information confrontation operations across
all warfare domains. China’s military modernisation the electromagnetic spectrum. The PLA, under
is underway, with the new PLA organisations the “Integrated Network Electronic Warfare”
aiming to establish a national and a theatre-level doctrine, has been paying significant attention to
HQ for ground forces, turning the Second Artillery information warfare in the past 10-15 years, not
department into a full-fledged service, and creating only looking at Cyber Warfare, but also battlefield
a Strategic Support Force to manage the information Electronic Warfare (EW).
domain including space, cyber and electronic Chinese EW doctrine emphasises using
warfare activities. This process started in 2015 electromagnetic spectrum weapons to suppress or
and will end only in 2020 or later. The Central deceive enemy electronic equipment. PLA EW
Military Commission (CMC) has been restructured strategy focuses on radio, radar, optical, infrared
in 15 departments and commission, the seven and microwave frequencies, in addition to
military regions have been reorganised into five adversarial computer and information systems. The
geographical-operational theatre commands and Chinese see EW as an important force multiplier
each branch of the Army has been reorganised as and would likely employ it in support of all combat
a service HQ for the forces, to separate the arms and services during a conflict. PLA EW units
administrative services from the operational have conducted jamming and anti-jamming
dynamics. The reforms also aim to reduce operations, testing the military’s understanding of
manpower in the Chinese military. EW weapons, equipment, and performance, which
helped improve their confidence in conducting
PLA Theory on Modern Warfare force on force, real equipment confrontation
The PLA envisions future conflicts under the operations in simulated EW environments.
conceptual umbrella of Integrated Network PLA strategists regard the ability to utilise
Electronic Warfare or INEW. It combines space and deny adversaries access to space as
coordinated use of computer network operations central to enabling modern, information warfare.
*(Maj Gen PK Mallick, VSM (Retd.) has been a Senior Directing Staff (SDS) at National Defence College,
New Delhi. He is an expert in Cyber Warfare, SIGINT and Electronic Warfare.)

India Foundation Journal, September-October 2017 {35}


Although PLA doctrine does not appear to address z Psychological Warfare seeks to undermine
space operations as a unique operational an enemy’s ability to conduct combat
“campaign,” space operations form an integral operations through operations aimed at
component of other PLA campaigns and would deterring, shocking, and demoralising enemy
serve a key role in enabling A2/AD (anti access / military personnel and supporting civilian
area denial) operations. populations.
PLA has increasingly moved toward an z Media Warfare is aimed at influencing

operational construct that blends cyberspace domestic and international public opinion to
operations with kinetic operations, creating a form build support for China’s military actions and
of “cyber-kinetic strategic interaction.” The goal dissuade an adversary from pursuing actions
would be to blind, disrupt or deceive adversary contrary to China’s interests.
C4ISR systems while almost simultaneously z Legal Warfare uses international and

deploying its formidable conventional strike, ballistic domestic law to claim the legal high ground
missile, and maritime power projection forces. The or assert Chinese interests. It can be
PLA envisions this operational concept as employed to hamstring an adversary’s
“integrated network electronic warfare,” described operational freedom and shape the
by Michael Raska as the “coordinated use of cyber operational space. Legal warfare is also
operations, electronic warfare, space control, and intended to build international support and
kinetic strikes designed to create ‘blind spots’ in manage possible political repercussions of
an adversary’s C4ISR systems.” China’s military actions.
The PLA has recently described this as a form The PLA’s operational hierarchy of combat
of “network swarming attacks” and “multi- consists of three major levels: war, campaigns and
directional manoeuvring attacks” conducted in all battles, each of which is informed, respectively,
domains – space, cyberspace, ground, air, and sea. by a distinct level of operational guidance – namely
The Strategic Support Force has been designed to strategy, campaign methods, and tactics. Three
provide these integrated operations, employing Warfares can be identified primarily as a campaign
electronic warfare, cyberspace operations, space method with secondary, mostly strategic but also
and counter-space operations, military deception tactical applications. The PLA’s combination of
and psychological operations working jointly with psychological warfare; the manipulation of public
long-range precision strike, ballistic missile forces opinion, or media warfare and the manipulation of
and traditional conventional forces. legal arguments to strengthen China’s diplomatic
and security position, or what China calls
Three Warfare and information Warfare “legal warfare,” join together in a comprehensive
To set the strategic stage of the conflict, the information operations doctrine.
“Chinese People’s Liberation Army Political Work
Regulations” which were promulgated in 2003, sets C4ISR
forth among the tasks of political work, the task of As per the US DoD 2016 report, China
the “three warfares” — psychological warfare, continues to prioritise C4I modernisation as a
public opinion warfare, and legal warfare. response to trends in modern warfare that

{36} India Foundation Journal, September-October 2017


emphasise the importance of rapid information Strategic Support Force (SSF)
sharing, processing and decision-making. The PLA The PLA Strategic Support Force (PLASSF)
seeks to modernise itself both technologically and was created on 31 December 2015 as a newest
organisationally to command complex, joint branch of the People’s Liberation Army (PLA).
operations in near and distant battlefields with Introduced as part of China’s military organisational
increasingly sophisticated weapons. reform, the PLASSF is not a full service branch,
The PLA views technological improvements but an independent service arm under the direct
to C4I systems as essential to improve the speed leadership of the Central Military Commission
and effectiveness of decision-making while (CMC). SSF is responsible for the PLA’s space,
providing secure and reliable communications to cyber, and electronic warfare missions.
fixed and mobile command posts. The PLA is Functionally and structurally, the SSF operates like
fielding advanced automated command systems the former Second Artillery Force and is an
like the Integrated Command Platform (ICP) to umbrella entity for electronic, information, and
units at lower echelons across the force. The cyber warfare. This reform postures the PLA to
adoption of the ICP enables multi service conduct “local wars under informationised
communications necessary for joint operations. conditions” in support of its historic mission to
These C4I advancements are expected to shorten “secure dominance” in outer space and the
the command process. The new technologies electromagnetic domain. Network (or cyberspace)
introduced into the PLA enable information sharing forces are now alongside electromagnetic, space,
— intelligence, battlefield information, logistical and psychological operations forces and better
information, and weather reports on robust and organised to conduct integrated operations jointly
redundant communications networks, to improve with air, land, and sea forces. The establishment
commanders’ situational awareness. In particular, of the SSF disrupts traditional roles, relationships,
the transmission of ISR data in near real-time to and processes. It also disrupts power relationships
commanders in the field could facilitate the within the PLA and between the PLA and the CCP.
commanders’ decision-making processes and It challenges long-held organisational concepts, and
make operations more efficient. is occurring in the midst of other landmark reforms,
These technical improvements have greatly to include the establishment of new joint theatre
enhanced the PLA’s flexibility and responsiveness. commands. However, if successful, it would
“Informationised” operations no longer require in improve information flows in support of joint
person meetings for command decision making or operations and create a command and control
labor intensive processes for execution. organisation that can develop standard operating
Commanders can issue orders to multiple units at procedures, tactics, techniques, procedures,
the same time while on the move and units can advanced doctrine, associated training, along with
rapidly adjust their actions through the use of digital driving research and development toward
databases and command automation tools. The advanced capabilities. The force appears to have
PLA also seeks to improve its C4I capabilities by a staff department, equipment department, political
reforming its joint command institutions at the department, and, presumably, a logistics
national and regional levels. department. More operationally, the force appears

India Foundation Journal, September-October 2017 {37}


to have headquarters components for its space and exchanges, would enable a powerful understanding
cyber forces, embodied in the Space Systems of plans, capabilities and activities of an
Department (SSF-SSD) and Network Systems organisation or individual in near real time. Key
Department (SSF-NSD) respectively. The SSF word and voice recognition technology and large
may create or may already have an Electronic/ data bases permit greater efficiency in collection
Electromagnetic Systems Department (ESD) for directed against specific targets. Advanced
its electronic warfare force. computing facilitates breaking of all but the most
SSF will be composed of three separate forces sophisticated encryption and passwords. The
or force-types: space troops, cyber troops and linkage between CNO and PLA psychological
electronic warfare forces. The cyber force would warfare training units appears reasonable.
be composed of “hackers focusing on attack and Monitoring of communications, email accounts,
defence,” the space forces would “focus on websites, and internal networks could support
reconnaissance and navigation satellites,” and the sophisticated perception management operations.
electronic warfare force would focus on “jamming SIGINT, or technical reconnaissance in PLA
and disrupting enemy radar and communications.” lexicon, advances the interests of the Chinese
This would allow the PLA to “meet the challenges Communist Party (CCP) and the People’s Republic
of not only traditional warfare but also of new of China (PRC).
warfare centred on new technology” (Global The PLA’s SIGINT community consists of at
Times, January 16, 2017). least 28 technical reconnaissance bureaus (TRBs).
The SSF will draw from forces previously The GSD Third Department has direct authority
under the General Staff Department’s (GSD) over 12 operational bureaus, three research
subordinate organs, to include portions of the First institutes, and a computing centre. Eight of the 12
Department (1PLA, operations department), operational bureau headquarters are clustered in
Second Department (2PLA, intelligence Beijing. Two others are based in Shanghai, one in
department), Third Department (3PLA, technical Qingdao, and one in Wuhan. Ten additional TRBs
reconnaissance department), Fourth Department provide direct support to the PLA’s seven military
(4PLA, electronic countermeasure and radar regions (MRs), while another six support the PLA
department), and Informatisation Department Navy (PLAN), Air Force (PLAAF), and Second
(communications). Artillery Force (PLASAF).
If information is power, then the GSD Third
Department represents one of the most powerful Organizations Associated With Com-
bureaucracies in China today. Among its sources puter Network Defense
of strength is the country‘s largest pool of well z PLA’s Information Engineering University
trained linguists specialised in niche areas, such as is the Third Department’s training vehicle.
banking and financial transactions, military z PLA Communications Security Bureau
activities, energy and diplomatic exchanges. The China.
combination of Signals Intelligence (SIGINT) and z North Computation Center Third
Computer Network Exploitation, fusing transcripts Department Computing Center .
of phone conversations with intercepted email z National Research Center for Information

{38} India Foundation Journal, September-October 2017


Security Technology (Network Risk Central Asia or Russia, telemetry missile
Assessment). tracking, nuclear testing.
z PLA Information Security Evaluation and z 11th Bureau (61672 or 2020 Unit) —
Certification Center. Russia.
z Information Security Research Institute z 12th Bureau (61486 Unit) — satellites,
National Information Center (affiliated with space-based signals intelligence (SIGINT)
science and technology equipment) collection.
z National Information Security Engineering
Technology Center. Western Theatre Command (WTC)
After the modernisation the WTC has emerged
Organization of the Operational as the largest theatre and has complex terrain
Bureaus of the Third Department. including desert and high mountains, long borders
z 1st Bureau (61786 Unit) — decryption, and challenging social conditions. Theatre missions
encryption, information security. include supporting the People’s Armed Police
z 2nd Bureau (61398 Unit) — US and Canada Force maintaining internal stability in the restive
focus. Tibet and Xinjiang regions. Disaster relief requiring
z 3rd Bureau (61785 Unit) — line of sight liaison with civilian organisations is also an
radio communications, direction finding, important theatre mission. External responsibilities
emission control. include responding to possible unrest in Central
z 4th Bureau (61419 Unit) — Japan and Asia under the auspices of the Shanghai
Korea focus. Cooperation Organisation (SCO). However, the
z 5th Bureau (61565 Unit) — Russia focus. WTC’s primary strategic direction is India and the
z 6th Bureau (61726 Unit) — no mission contested border regions (Xinhua, August 18, 2014;
given; Wuhan U. network attack and China Military Online, March 3, 2016).
defense center is located in this area of Tibet Military Command/Military District in the
operation. WTC has been elevated by one level compared to
z 7th Bureau (61580 Unit) — some computer other provincial level military districts and placed
network attack and computer network under the PLA Army (PLAA). An article in The
defense, some work on the US network- Global Times reported that the Tibet Military
centric concept, psychological and technical Command will be responsible for operations
aspects of reading and interpreting foreign against India, at least in the Arunachal Pradesh
languages. area, training forces for specialised high-altitude
z 8th Bureau (61046 Unit) — Western and mountain warfare and long-range mobility for such
Eastern Europe, Middle East, Africa, Latin a contingency (Global Times, May 13, 2016).
America. However, Army command would appear to usurp
z 9th Bureau (unknown Unit) — strategic the theatre’s command responsibility. The Xinjiang
intelligence analysis/data base management, Military District is also under PLAA command.
the most opaque bureau. The current reforms and reorganisation make the
z 10th Bureau (61886 or 7911 Unit) — services responsible for force development and

India Foundation Journal, September-October 2017 {39}


training their respective forces, which would appear was under surveillance while setting up meetings
to include the Army commands in the Tibet and between His Holiness and foreign dignitaries. They
Xinjiang Military Districts. Since the WTC has a sent an email invitation on behalf of His Holiness
difficult internal mission, the Army might to a foreign diplomat, but before they could follow
additionally be responsible for internal missions in it up with a courtesy telephone call, the diplomat's
Tibet and Xinjiang, acting as an intermediate office was contacted by the Chinese government
command level for the theatre, which would have a and warned not to go ahead with the meeting."
daunting span of control if widespread unrest occurred Between June 2008 and March 2009, the
in both areas, compounded by an external crisis. Information Warfare Monitor conducted an
The WTC headquarters includes a joint extensive and exhaustive two phase investigation
operations command centre also located in focused on allegations of Chinese cyber espionage
Chengdu. The theatre Army Headquarters is in against the Tibetan community. GhostNet, had
Lanzhou. The new Strategic Logistics Support penetrated 103 countries and infected at least a
Force has subordinate Joint Logistics Support dozen new computers every week. This global web
Centres in each theatre, with one in Xining for the of espionage has been constructed in two years.
WTC. The WTC can deploy subordinate PLAA The research team found a wide-ranging network
and PLAAF units, and request additional forces of compromised computers. This extensive
from the CMC if required. network consisted of at least 1,295 infected
The WTC would have to coordinate operations computers in 103 countries. Significantly, close to
with the responsible command for naval operations 30% of the infected computers could be considered
against India. The WTC focuses on relevant high value and include the ministries of foreign
campaign scenarios to train troops for potential affairs of Iran, Bangladesh, Latvia, Indonesia,
combat operations. PLA publications detail several Philippines, Brunei, Barbados and Bhutan;
campaigns that the WTC could conduct including embassies of India, South Korea, Indonesia,
antiterrorism, stability maintenance operations to Romania, Cyprus, Malta, Thailand, Taiwan,
combat internal unrest; joint border counterattack Portugal, Germany and Pakistan; the ASEAN
campaigns to defend against an attack and regain (Association of Southeast Asian Nations)
lost territory; mountain offensive campaigns; and Secretariat, SAARC (South Asian Association for
joint fire strike campaigns usually supporting Regional Cooperation), and the Asian Development
another campaign, but also an independent Bank; news organisations; and an unclassified
campaign (Global Times, September 5, 2012). computer located at NATO headquarters.
The GhostNet system directed infected
GhostNet computers to download a Trojan known as ghost
China has been conducting cyber operations RAT that allowed attackers to gain complete real
against India for a long time. One of the earlier time control. These instances of ghost RAT were
examples was the GhostNet episode. consistently controlled from commercial Internet
Ross Anderson, at Cambridge University, and access accounts located on the island of Hainan,
Shishir Nagaraja at the University of Illinois, wrote: People’s Republic of China. GhostNet was capable
"The office of the Dalai Lama started to suspect it of taking full control of infected computers,

{40} India Foundation Journal, September-October 2017


including searching and downloading specific files capable of taking full control of affected
and covertly operating attached devices, including systems.
microphones and web cameras. Conclusion
The Key Findings of the investigation China has developed its electro magnetic
were : warfare capabilities keeping in mind USA as its
z GhostNet infected at least 1,295 computers main adversary. It has very judiciously
in 103 countries, of which close to 30% can concentrated on those specific aspects which it
be considered as high value diplomatic, thought would give it asymmetric advantage. China
political, economic and military targets. is still well behind USA in electro magnetic
z GhostNet penetrated computer systems battlefield, but it is catching up. However, against
containing sensitive and secret information India it has massive advantage. China has already
at the private offices of the Dalai Lama and undergone drastic changes in its doctrine and
other Tibetan targets. concept of warfare, organisation, training, human
z Documentation and reverse engineering of resource management and financial allocation in
the modus operandi of the GhostNet system niche technology areas. Government of India and
including vectors, targeting, delivery Indian armed forces must move fast to confront
mechanisms, data retrieval and control China in electromagnetic battlefield in any eventual
systems revealed a covert, difficult to detect conflict scenario. At this present juncture India has
and elaborate cyber-espionage system much to do to catch up.
‹‹‹

India Foundation Journal, September-October 2017 {41}

S-ar putea să vă placă și