4 August 2001. Thanks to Anonymous.
See also two related papers:
Military Applications of Information Warfare by PRC, by Lt. General Abe C. Lin.http://www.dsis.org.tw/pubs/seminars/2000-02-19/s_ciw00-0219-003e.pdf (13 pp., 38KB)
The PRC's Research on Information Warfare, Its Influence over the ROC and the ROC's Counter-measures, by Tseng, Jang-ruey
http://www.dsis.org.tw/pubs/seminars/2000-02-19/s_ciw00-0219-004e.pdf (26 pp., 81KB)
3 August 2001. Thanks to Anonymous.
Source:
http://www.dsis.org.tw/pubs/seminars/s_tp00-01-003.pdf
(25KB)
[9 pages; undated, original file is dated 27 December
2000.]
Gen. Abe C. Lin
Director
Communication Electronics & Information Bureau
ABSTRACT
There is a close correlation between the combat activities and social
development. From agriculture, to industry, then to an information society,
countries are studying innovative ways to try to gain an advantage by changing
how wars are fought. The information society brings new revolutionary
technologies, which demand change in the way wars are fought. This poses
serious concerns for advanced countries that heavily rely on the information
in their war fighting processes. The Republic of China (ROC) is viewed as
an information country and is getting more dependent on information.
The terrifying experience of The July 29 Power Outage and The
September 21 Earthquake are still vivid in the minds of the ROC society.
It raises a concern as to whether the ROC could defend itself from various
types of information warfare attack from the PRC. This is a priority and
the focus of ROC military combat readiness.
I. PREFACE
In January 1998, Lt. General Patrick Hughes, Director of the U.S. DOD Defense
Intelligence Agency, stated the following in a Senate Intelligence Committee
hearing: Military strategists with technology and creativity are leading
the development and application of new ways of war fighting. New and innovative
ways are changing the traditional ways of war fighting. The superior position
of the U.S. military and its determination in keeping its leadership role
of the world cause our enemies to seek alternate ways to attack the U.S.
General John Shalikashvili, Former Chairman of JCS, in an article titled
Military Strategy of the Nation, described information
warfare as the largest asymmetric warfare concern of the
U.S.1. A hacker or a country could attack the U.S. using information
warfare techniques and do considerable damage. As the development of the
information society continues, all countries of the world have to take the
soundless war very seriously.
II. ORIGIN OF INFORMATION WARFARE
Because information warfare is a new type of war fighting, there is no authoritative definition of the terminology information warfare. Dr. Thomas P. Rona first used the term of information war in a report delivered to Boeing Company, titled Weapon Systems and Information War in 1976. Dr. Rona pointed out that the information infrastructure was becoming a key component of the U.S. economy. At the same time, it is becoming a vulnerable target in both war and peacetime.2 As for the U.S. military, the USAF started to actively discuss this subject in the 1980s. By then, a consensus was reached that information could be a target and also used as a weapon.
After years of study, in February 1996, the U.S. DOD published Joint Pub 3-13.1 Doctrine for Command and Control Warfare. It described command and control warfare as an application of information warfare in military operations. It defines command and control warfare as:3
The integrated use of operations security, military deception, psychological operations, electronic warfare, and physical destruction, mutually supported by intelligence, to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions.
In this Joint Publication, it specified the organization, planning, training, exercise, and joint operations of command and control. Most important, this publication specified the doctrine of command and control warfare. This was the first time the U.S. DOD specified the scope and doctrine of information warfare.
In October 1998, U.S. DOD published Joint Pub 3-13 Joint Doctrine for Information Operations. In the beginning, this Joint Pub was called Joint Doctrine for Information Warfare. Later, it was changed to Joint Doctrine for Information Operations. The reason of the change was to clarify the relationship of the information operations and information warfare. They were defined, as follows:4
Information Operations:Actions taken to affect adversary information and information systems while defending ones own information and information systems.
Information Warfare:
Information operations conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.
Based on the definition above, the U.S. DOD has a broad definition for
information warfare. However, since the Gulf War, the definition
of the frontline of war is no longer clear any more. In the future,
information warfare could be engaged in any place. Due to the well-defined
function and responsibilities of the U.S. DOD, currently its policy is not
to interfere with other organizations operations. This could open a
door for the PRC to gain an advantage over the U.S. military power.
III. CURRENT INFORMATION WARFARE CAPBILITIES OF ROC AND PRC
1. Information Warfare Strategy
In the middle of 1980s, the PRC started to develop its next generation combat power. They paid special attention to the development of information warfare. After the Gulf War, the PRC noticed that its traditional military power was far behind that of the U.S. If PRC confronted the U.S. directly, it basically would lose the war. Therefore, the PRC started to look for solutions in the asymmetric warfare. Mr. Shen, Wei-Kuang, PRC military strategist, stated in a dissertation: The transitional military power only destroys an enemys military assets and economic potential. But offensive information warfare could impact the enemys military, political, economic, and social, even psychological foundations. It could destroy the enemys information infrastructure and operations. It could paralyze the enemys military, banking, communications, electronics, and electrical systems/networks. The use of military deception and psychological operations can destroy an enemys faith in its own government. This would deter the enemys intent to attack or could neutralize its ability to fight.5
This viewpoint matches that of the book War on Exceeding the Limits by Chiao, Lang, and Wang, Chian-Hwei.6 Exceeding the Limits means a paradigm shift in thinking first, then the behaviors. The important subject is to select the best method to exceed the limits. Whether it is a hacker, terrorist, or financial instruments, it is not the key. The key is to have the future national or military leader to jump out of the existing framework of thinking. The future national and military leader should look at the damages might cause by the non-military actions taken by the adversary to support its military operations.
2. Information Warfare Tactics
The PRC has made some progress in the development of information warfare tactics and profiles. The offensive information warfare tactic of the PRC is to jam, destroy, damage, and deceive enemy information systems. The tactics include, as directly translated from the Chinese meaning, Take the Eye Out (destroy the information source), Cut the Path off (cut-off the information pathway), Take the Heart Out (destroy the information processing center), and Disturb the Sleep (Jam the information receiver station). The information warfare profiles include Protect the Eye and Open the Source (protect and enlarge the information source), Protect the Path and Facilitate the Flow (protect information and keep information flow smoothly), Protect the Machine and Guard the Heart (protect the computer security), and Use Multiple Methods and Anti-jamming (use multiple paths to transmit information and enhance anti-jamming capabilities). The PRCs tactics are focused on how to destroy the other partys man, machine, and information in order to paralyze their combat abilities.7
The strategic approach of the ROC military is Effective Deterrence and Defense. The operational concept for the information warfare is to prevent the enemys use of any method to launch an information warfare attack on the ROC. This is to ensure the national security. In the peacetime, an integrated surveillance and intelligence collection system will be used to monitor the enemys political party, military, government, and economic activities. Information security will be obtained through protection procedures and firewalls of the communications and information systems. In wartime, based on mission requirements for combined operations, soft-kill and hard-kill methods will be applied to suppress an enemys attack in order to maintain the ROC information superiority and combat effectiveness.
3. Information Warfare Combat Readiness
From the lessons learned of the Gulf War, the PRC realizes that only highly agile and effective deployment of command control would win the war. Therefore, PRC has been actively building a global positioning system and fiber optics communications networks in order to obtain combat information superiority. It is said that the PRC has completed over one million kilometers of fiber optics lines and a communications infrastructure, called Eight Horizontal Grids and Eight Vertical Grids.8 Additionally, the PRC will complement its existing communications infrastructure with satellites, ground mobile receiver stations, and ground-to-air data links. With the technologies obtained from the Western Countries, the PRC can complete the development of satellite, tactical ballistic missiles, and cruise missiles. Currently, the PRC is indigenously developing computer viruses, logic bombs, and EMP weapons. The PRC calls this: win the war under high technology conditions. Based on intelligence reports, since 1997, PRC has included techniques of computer hacker attacks, virus attacks, and information jamming in its military exercises to enhance its readiness for information warfare.
The ROC has also recognized the importance of information in military operations. It has continued information training and office automation. It has built an information infrastructure (such as, around the island fiber optics communications network). A good foundation for the development of information warfare was established. But, most of the ROC defense budget went into the procurement of the advanced fighters and frigates. Also, the export control of key technologies by the U.S. Government made the development of information warfare techniques difficult for the ROC military. Fortunately, the technology bases of the private sectors are quite good. They could be put in place to support the development of information warfare techniques for the ROC military.
4. Defense Budget Support
The PRC has a continued ambition of military take-over of Taiwan. Therefore, it has steadily increased its military readiness with two-digit defense spending increases annually. In 1999, its defense spending is estimated at 12.6 billion U.S. dollars, about 9% of GNP. This allows the PRC devotes large amount of funding to the development of information warfare. Due to the ROC government spending cut and social welfare budget increase, the ROC defense spending is decreasing. There is only a small amount of defense budget allocated for the development of information warfare because the funding is needed to maintain the advanced fighters and the development of tactical ballistic missile system.
5. Private Sector Support
Although the PRC has good progress in the development of information warfare tactics and profiles, but, its development of information technology and techniques are in its initial stage. This is because the information industry of the PRC is primarily OEM. There is no capability in R&D. Contrarily, the information capabilities of the ROC private sector are quite impressive. In an U.S. DOD report on Taiwan Strait Posture Status, it stated that the ROC is leading the world in the area of development of anti-virus techniques. The ROC military is utilizing all possible remedies to integrate the synergism of government, industry, academic, and research organization to develop key technologies to facilitate the ROC military in establish the offensive and defensive information warfare capabilities.
6. National Information Warfare
In the development of information warfare, the PRC is promoting the development from the central government. There are different levels of information warfare development, such as, strategy, tactic, combat, and skill. Their determination and effort in implementing and integrating the strategy, combat readiness, and technology are strong. This further exemplifies the intent that the PRC plans to use unconventional and asymmetric methods to fight the future war. The economy of the ROC is prosperous and more relies on information and computers. People do not worry about the national security much. Therefore, the development of information warfare is only limited in the military areas. The information systems of banking, communications, electrical power, and transportation that are vital to the society are vulnerable to enemy attack. This raises a concern of nation security.
In summary, the PRC had an early start in the development of information
warfare. Because the PRC is a communist autocratic country, it could use
the strength of the whole country to develop information warfare. At this
point in time, the PRC leads the ROC in the areas of technology, budget,
human resources, policy, and execution of information warfare. However, the
scope of information warfare is very large. The information technology is
changing very rapidly. Many things may happen. How to promote the development
of information warfare is one of the key tasks for the ROC Ministry of National
Defense (MND).
IV. FUTURE INFORMATION WARFARE DEVELOPMENT OF ROC AND PRC
The critical time of the competition between the ROC and the PRC in the development of information warfare techniques is in the next five years. According to the information, the PRC has established a Fourth Armed Forces, called the network troop, which is in charge of offensive and defensive information warfare activities.9 The PRC also built an information warfare simulation center. The center used high technology simulation skills and equipment to simulate the information warfare and its environment. In the research and development of the information warfare techniques, the PRC plans to develop data link, network virus program and related transmission equipment, and no pollution EMP weapon in order to paralyze the command and control system. The PRC actively imports information technologies and equipment, including early warning radar, electronic warfare soft-kill (for example, active airborne jamming equipment), hard-kill (for example, anti-radiation missile) weapon, and communications equipment to improve its information warfare capabilities. It is expected that the PRC may have the following information warfare capabilities by the year of 2005:
1. Use mainframe computer to setup the neural network for joint warfare simulation2. Develop automated forward area command control system for troop maneuvering in the battlefield
3. Develop tactical date link transmission system for standardization of data transmission
4. Digitize the command and control system for the integration to automatic command control system
5. Mobilize the command control center with satellite receiving /transmission capabilities
6. Use Satellite and AEW aircraft to have joint war fighting command and control capabilities
7. Improve satellite communications techniques to build the satellite navigation capabilities (For example, cruise missile).
8. Build fiber optics communications network to complete the 23 information freeway and enhance anti-electromagnetic interference capabilities of the automated command and control system
In order to counter the PRC information warfare threats, in the past years, the ROC military actively promoted an integrated approach of the information warfare planning. There was good progress in the areas of information equipment procurement and the consensus building for national defense. The ROC military is working in the following areas of the information warfare:
1.Build the information security networka. Improve the ROC military information security function through system monitoring and network node management.b. Integrate information warfare equipment, electronic warfare equipment, and Command & Control equipment to achieve the effectiveness of an integrated joint operation.
c. Build the electronic warfare capabilities. The key is to have information from active and passive sensors, to manage battlefield frequency spectrum, to integrate the information, to protect electromagnetic emission, and to avoid the enemy acquire the electronic signals.
2. Build the offensive information warfare capability
Utilize the civil technology bases, establish an information warfare laboratory, collect/analyze all kinds of viruses, and implement key techniques to build an effective offensive information warfare weapon. (For example, computer virus, EMP bomb, anti-virus software, network management software)
3. Integrate the C4ISR architecture
Integrate the individual management information systems, combat operation automation systems, and intelligence automation systems into a cohesive Armed Forces combined operations center systems. The C4ISR system shall enhance the Naval operations, Air Force air defense, and combined operations system function. An overall island-wide defense system shall be planned. This shall provide precision, agility, and all aspects command control capabilities. With the acquisition of new radar and data link and the training of doctrine, the ROC military will obtain the information superiority.
4. Implement defense information management system:
Use the C4ISR system as the nucleus to change the defense information management system to support the national policy and strategy planning in peacetime and to support joint operations in wartime. Through organization re-engineering and process improvement, a homogenous integrated service environment for all the ROC Armed Services will be provided.
5. Establish all aspect high quality communications and information environment
An environment of voice, video, data, image, and other information shall be established through network digitization, wire and wireless communications, network management, and simulated network. Platforms with inter- and intra-network shall be developed to support the combat operations and C4ISR command control.
6. Integrate government, industry, academic, and research organization and promote outsourcing
Information technology has its dual use for military and civilian. The technology base of private industry and academic organization is strong. Due to the streamlining of the ROC MND organization and personnel, the ROC military shall follow the directive of the Executive Yuan to outsource its information operations. Through hiring advisors and outsourcing, as well as, integrating the private sector and research organization, the defense information infrastructure and capability will be developed.
7. Promote national level information warfare command
The scope of information warfare is large. It covers political, psychological, economic, technical, and military areas. There are all potential targets of enemys information warfare. The Executive Yuan shall be the National Information Warfare Command that integrates the civil affairs, foreign affairs, national defense, financial, education, legal, economic, transportation, and national security agencies. A security safeguard shall be developed to protect the national infrastructure of electrical power, communications, banking, and transportation. Contingent plans also need to be developed. The Ministry of National Defense shall be responsible national defense and promote the development of information warfare in order to safeguard the national security.
V. CONCLUSIONS
The development of information warfare of the ROC and the PRC are all in
their initial stage. Each of the two has its own strength. At this point
in time, it is still too early to say which one of the two is ahead of the
other. One thing for sure is that both the ROC and the PRC will be vigorously
promoting the development of information warfare to maintain information
superiority. The Control of the Information will soon replace
the Control of the Sky as the top priority of the war fighting
between the PRC and the ROC. As paraphrased in the policy report by the Minister
Tang of ROC MND, information warfare capability is the key for military
readiness, if the ROC military does not enhance its information warfare
capability, the PRC will pass that of the ROC. This would threaten the ROC
national security. Therefore, the development of offensive and defensive
capabilities of information warfare techniques becomes the key mission for
the ROC military development. As the Internet, communications, and battlefield
digitization become more and more important, it is essential to incorporate
information warfare into the national level of security policy. Therefore,
in concert with the establishment of national information warfare command
organization, the ROC military should build the consensus of People
Nation Defense and step-by-step integrate the resources of the government
and private sector to defend the ROC national security jointly.
REFERENCES:
1. Robert H. Allen, Asymmetric Warfare: Is The Army Ready? http://www.amsc.belvoir.army.mil/asymmetric_warfare.htm
2. Thomas P. Rona, Weapon Systems and Information War, Boeing Aerospace Co., Seattle, WA, 1976
3. Joint Pub 3-13.1 Command and Control Warfare, DOD US, February 1996.
4. Joint Pub 3-13 Information Operations, DOD US, December 1998.
5. Shen, Wei-Kuang , The Type of War and View of Security of the 21st Century, Mainland China Peking Commentary Monthly Report, February 1998.
6. Chiao, Lang, and Wang, Chian-Hwei, War on Exceeding the Limits PLA publication, Peking, February 1999.
7. Tzeng, Chang-Ray, Digital National Defense, New Thinking In National Defense Strategy Beyond The Century, National Security and Military Strategy Seminar Dissertations, December 1999.
8. ROC Ministry of National Defense, Analysis of the Mainland China Information Industry Development, Mainland China Brief Analysis Summarization, Pub 1206-043, October 1999.
9. Liberty Daily, Network War, U.S. versus PRC, November 18, 1999.
HTML by Cryptome.