Home The Expanding Domains of War

The Expanding Domains of War

Introduction

Technological and sociological changes have brought about a paradigm-shift in the understanding of war, battle-field, and indeed, victory and defeat. Warfare has metamorphosed from the classic military aggression only, to include a number of other domains such as political, legal, diplomatic, etc. This has led to a corresponding change in the weapons used - currency, water, markets, narratives, malware, etc. are the new weapons.

The objective of warfare is changing from imposing a military defeat to rendering the military might of the adversary meaningless, exemplified by the use of lawfare, cabbage tactics, Little Green Men, Little Blue Men, unmanned systems, creation of artificial islands, etc. Former United States Secretary of Defense, James N Mattis, called such actions ‘competition’ (distinguishing it from armed ‘conflict’) in US’ National Defense Strategy released in January 2018.1 The word ‘competition’ initially figured in the 2017 Multi-Domain Battle paper of the US Army.2

 

There is less emphasis on bloodshed and increasingly more emphasis on incapacitating the adversary, the key to which is capabilities in the domains of cyber, space, and the electromagnetic spectrum. The 7th generation warfare is indeed about paralysing a country by targeting their network-based critical assets - banking, electricity, nuclear facilities, etc.

 

Domain-Specific Vulnerabilities - The Assassin’s Mace

 

Targeting the adversary’s domain-specific weakness gives the weaker side the change to dominate in a conflict, and the stronger side to prevail without inviting international intervention.

 

Hezbollah

Hezbollah, a non-state actor, which used the tactics of suicide bombing and frontal attacks against Israel in the 1990s, could challenge the might of the Israeli Defence Forces in the 2006 Lebanon War when it prosecuted electronic warfare, exploiting the complex communication network it built stretching across Beirut to the Israel-Lebanon border. It simultaneously prosecuted psychological warfare, systematically using al-Manar Television channel. These were in addition to dexterously utilising guerrilla as well as conventional capabilities.

 

Russia

Russia has mastered the art of what it calls non-linear warfare. Be it shaping the environment by bringing up the issue of Russian identity (psychological operations), leveraging Gazprom as a tool for coercion, economic carrot and stick approach, use of irregular forces, cyber aggression, etc.

 

China

China’s unrestricted warfare is based on exploitation of economy, law, networks, etc. rather than a direct military confrontation. The same is evident in China’s impressive space and cyber capabilities, exploitation of audio and visual means of mass communication for narrative building, debt diplomacy, use of deceptive, irregular forces (maritime militia), etc.

 

Integrated, Multi-Dimensional Response for Multi-Dimensional Threats

 

In response to the Russian and Chinese anti-access/area denial (A2/AD) capabilities, the US established the I2CEWS (Intelligence, Information Operations, Cyber and Electronic Warfare, and Space and Signal) unit.3

Led by an officer of the rank of Lieutenant Colonel, the I2CEWS is a battalion-sized force. It has, as the name suggests, the following four companies :

 

  1. Intelligence
    This company would provide a picture of the operating environment for kinetic and non-kinetic actions.
  1. Information Operations
    This company would provide information support to combat troops. Information operations, including propaganda, would now be a part of combat.
     
  2. Cyber and Electronic Warfare
    This company is dedicated to attacking the wireless, tactical networks by hacking/jamming.
     
  3. Space and Signal
    This company would collect intelligence data from signals intelligence and/or reconnaissance satellites.

 

A second battalion of the I2CEWS will come up in the US European Command.

 

The Indian Scenario

 

India has already taken the initial steps towards tackling threats in the unconventional domain. During the Combined Commanders’ Conference held in Jodhpur last year, the Prime Minister approved cyber, special forces, and space divisions for the Armed Forces.4 Recently, the Indian Armed Forces conducted Cyberex, a two-day, joint cyber exercise, along with other stakeholders such as the the Indian Computer Emergency Response Team, the National Technical Research Organisation, etc.5

As the battlefield evolves in terms of actors, dimensions, space, and time, India needs to be prepared to act simultaneously and synergistically in every dimension of conflict - be it land, air, sea, space, cyber, as well as electromagnetic spectrum. She also needs to arm herself to seize the first mover’s advantage in these domains.

For a dedicated and integrated, multi-domain structure, the following points require consideration:

 

  1. Agnosticism/Compatibility
    For seamless functioning across various platforms, hardware/software agnosticism (compatibility) would be essential.     
               
  2. C4 system      
    A robust, secure, and rapid communication network is another essential requirement. Command, Control, Communications, Computers.
               
  3. Jointness
    Multi-domain units/operations would require true jointness. This may also include weapon-systems and capabilities for cross-domain use.
    Such a structure should be able to function independently as also seamlessly with the tri-services.
               
  4. Personnel Base
    Would the personnel for such a structure comprise of specialists from within the tri-services or will separate recruitment for the same be done.
               
  5. Budgetary allocation
    Such a structure would require specific allocation of budget. There cannot be any uncertainty over the amount earmarked.
               
  6. Increasing Awareness at all Levels
    Such a structure would be completely new. Proper orientation of the leadership as well as rank and file could be looked at.
     
  7. Nodal agency
    Such a structure would require a nodal agency for complete control and functioning. The Integrated Defence Staff may be that agency.    

     

Conclusion

The proliferation of different tools of warfare and resultant expansion of the battle-field means that no particular service can guarantee victory. The modern battlefield needs not just military but political, psychological, electronic, technological warriors too. To win today’s ‘wars’, one needs a whole-of-government (WOG) approach with elements of Comprehensive National Power as part of the action/response system.

The Armed Forces should be prepared to take threats in all domains, as also take offensive actions in those domains. A synergistic, multi-domain, WOG approach may prove to be the decisive factor in battle-field dominance.

References

1Summary of the 2018 National Defense Strategy of The United States of America Sharpening the American Military’s Competitive Edge. (n.d.). [ebook] US Department of Defense. Available at: https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf  [Accessed 1 May 2019].

2Perkins, D. (2017). Multi-Domain Battle Driving Change to Win in the Future. [online] https://www.armyupress.army.mil/. Available at: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/July-August-2017/Perkins-Multi-Domain-Battle/  [Accessed 1 May 2019].

3Clark, C. (2019). Hack, Jam, Sense & Shoot: Army Creates 1st Multi-Domain Unit. [online] Breaking Defense. Available at: https://breakingdefense.com/2019/01/hack-jam-sense-shoot-army-creates-1st-multi-domain-unit/  [Accessed 2 May 2019].

4Anon, (2019). [ebook] DRDO. Available at: https://www.drdo.gov.in/drdo/pub/npc/2019/May/din-01may2019.pdf  [Accessed 4 May 2019].

5Pandit, R. (2019). Forces prepare to deal with cyber attacks on key infrastructure | India News - Times of India. [online] The Times of India. Available at: https://timesofindia.indiatimes.com/india/forces-prepare-to-deal-with-cyber-attacks-on-key-infrastructure/articleshow/69088311.cms  [Accessed 5 May 2019].

Views expressed are of the author and do not necessarily reflect the views of CLAWS or of the Government of India

Previous ArticleNext Article
Kanchana Ramanujam
Research Assistant
Contact at: [email protected]mail.com

Read more
Share
More Articles by Kanchana...
The ‘Final Offensive’ by US-Backed F
# 1978 February 12, 2019
Al-Hodeidah: The Potential Game-Changer
# 1950 December 03, 2018
Saudi & Qatar: A Split Wide Open
# 1919 July 10, 2018
more-btn
Books
  • Space Security : Emerging Technologies and Trends
    By Puneet Bhalla
    Price Rs.980
    View Detail
  • Securing India's Borders: Challenge and Policy Options
    By Gautam Das
    Price Rs.
    View Detail
  • China, Japan, and Senkaku Islands: Conflict in the East China Sea Amid an American Shadow
    By Dr Monika Chansoria
    Price Rs.980
    View Detail
  • Increasing Efficiency in Defence Acquisitions in the Army: Training, Staffing and Organisational Initiatives
    By Ganapathy Vanchinathan
    Price Rs.340
    View Detail
  • In Quest of Freedom : The War of 1971
    By Maj Gen Ian Cardozo
    Price Rs.399
    View Detail
  • Changing Demographics in India's Northeast and Its Impact on Security
    By Ashwani Gupta
    Price Rs.Rs.340
    View Detail
  • Creating Best Value Options in Defence Procurement
    By Sanjay Sethi
    Price Rs.Rs.480
    View Detail
  • Brave Men of War: Tales of Valour 1965
    By Lt Col Rohit Agarwal (Retd)
    Price Rs.320
    View Detail
  • 1965 Turning The Tide; How India Won The War
    By Nitin A Gokhale
    Price Rs.320
    View Detail
  • Indian Military and Network-Centric Warfare
    By Prakash Katoch
    Price Rs.895
    View Detail
more-btn