You are on page 1of 13

The Military Balance

ISSN: 0459-7222 (Print) 1479-9022 (Online) Journal homepage: https://www.tandfonline.com/loi/tmib20

Chapter One: Defence and military analysis

To cite this article: (2020) Chapter One: Defence and military analysis, The Military Balance,
120:1, 9-20, DOI: 10.1080/04597222.2020.1707961

To link to this article: https://doi.org/10.1080/04597222.2020.1707961

Published online: 13 Feb 2020.

Submit your article to this journal

Article views: 139

View related articles

View Crossmark data

Full Terms & Conditions of access and use can be found at


https://www.tandfonline.com/action/journalInformation?journalCode=tmib20
Chapter One
China’s armed forces: ‘informatisation’
and ‘intelligentisation’
China’s military modernisation has accelerated under by the PLA, indicating it would look to ‘win local
President Xi Jinping. It is a central component of the wars under modern high-technology conditions’.
‘China Dream’, articulated by Xi in 2013. As part of The Kosovo intervention led to a study by China’s
this ambition, Xi has driven far-reaching reforms National Defence University (NDU). This study,
to the People’s Liberation Army (PLA) that have analysts noted, highlighted the centrality of ‘infor-
changed defence structures and led to the integration mation superiority’ and paid close attention to how
of improved military equipment, and which Beijing NATO forces used technology to suppress Serbia’s
says will generate ‘world-class’ military forces by 2049. command centre and telecommunications. China’s
Three terms appear often in recent Chinese military 2004 defence white paper reflected the lessons drawn
documentation: mechanisation (机械化), informati- from Kosovo, and perhaps also Iraq in 2003. China’s
sation (信息化) and, more recently, intelligentisation armed forces aspired, it said, to win ‘local wars under
(智能化). Although the PLA has not clearly defined informatised conditions’, giving priority to ‘building
these concepts in public, they have been developed joint operational capabilities’. The assessment of the
over time in successive defence white papers and are white paper was that information connects military
useful in understanding not only China’s motivations, domains and acts as a force multiplier but could also
progress and aspirations as it modernises its military lead to more integrated force development.
forces, but also the PLA’s views of contemporary and China’s 2015 defence white paper assessed that
future conflict. Some of Beijing’s efforts likely hinge on China’s external environment was going through
its capacity to introduce and exploit networked plat- ‘profound changes’ and that threats were more
forms, sensors and weapons that can support not only diverse – and not necessarily local or indeed short
better and more integrated command-and-control term. China would, it said, take advantage of a period
(C2) systems but potentially also over-the-horizon of strategic opportunity to build strong military
targeting at extended ranges. forces. This white paper highlighted the increasing
sophistication of long-range, precise, stealthy and
Developing thinking uninhabited weapons and equipment, also noting that
China’s military-modernisation process was moti- outer space and cyberspace were ‘new commanding
vated in part by its observation of the changes in heights’ in strategic competition. Ultimately, it noted,
modern warfare since its forces were last involved in ‘the form of war is accelerating its evolution to infor-
major combat; this was in 1979, during the short war matisation’.
with Vietnam that principally involved ground forces. In October 2017, Xi delivered a speech at the 19th
In particular, the 1991 First Gulf War against Iraq and, Chinese Communist Party Congress in which he set
later, the 1999 NATO intervention in Kosovo provided out a timeline for the PLA to achieve its modernisation
the PLA with a clear example of how far it had fallen goals. By 2020, mechanisation should be ‘basically
behind modern military forces. The PLA has also achieved’, ‘information technology (IT) application’
studied Soviet and Russian military modernisation. should also have progressed and strategic capabilities
The PLA had hitherto operated according to the should have seen significant improvement. By 2035,
strategy of ‘People’s War’ and ‘war under modern he said, ‘basic modernisation of our national defense
conditions’. However, the First Gulf War highlighted and our forces’ should be ‘basically’ complete, and at
that modern technologies could be a force multiplier the same time the PLA should have modernised their
on the battlefield and that the PLA needed to boost ‘theory, organisational structures, service personnel
the integration of its military systems and improve and weaponry’. By the middle of the next century
joint operations. Chinese thinking reflected this lesson (perhaps 2049, the 100th anniversary of the People’s
shortly afterwards. Assessments were conducted and Republic), he said the PLA should have fully trans-
in early 1993 a new ‘strategic guideline’ was adopted formed into ‘world-class’ forces.
10 THE MILITARY BALANCE 2020

Modern warfare opponents in multiple domains, including in space


Successive PLA studies and defence white papers and cyberspace. Its targets included key elements of
indicate that China characterises modern warfare these operational systems, such as C2, reconnaissance
as a confrontation between opposing operational and intelligence, as well as conventional equipment
systems (作战体系). In a successful system-to-system capabilities and their associated networks. The PLA’s
confrontation (体系对抗), an adversary’s opera- focus on integrated operations and potential targets,
tional system would either be destroyed or degraded including enemy information and command systems,
such that it reduced military effectiveness. The 2015 and acknowledgement of the growing importance
defence white paper said that ‘integrated combat of space and cyberspace, indicates not just that PLA
forces’ would be employed in order to ‘prevail in thinking is still evolving, but that achieving informa-
system-vs-system operations featuring information tion dominance remains a key objective.
dominance, precision strikes and joint operations’. This is core to the PLA’s conception of future
The PLA, it asserted, must be prepared to confront combat operations. Effective integrated operations

Terminology
Mechanisation: Analysts assess that the term ‘mechanisa- command, control and communications. Informatisation
tion’ refers broadly to ambitions to modernise and replace is also important to the PLA’s efforts to improve its mili-
the PLA’s legacy equipment across all services and branch- tary education and training.
es, though with significant focus on the ground forces. It is Intelligentisation: ‘Intelligentisation’ (智能化) is a newer
also understood to be closely linked to the reorganisation concept. China’s 2019 defence white paper said that ‘in-
of the PLA Army from 18 to 13 group armies, which was telligent warfare is on the horizon’. It is understood to be
intended to improve quality and military efficiency. based on the premise that military systems will be en-
Informatisation: The 2000 defence white paper stated hanced by the integration of advanced automation, big
that the PLA should transform from using ‘semi-mech- data and artificial intelligence (AI). The use of big data has
anised and mechanised weapon systems to automated increasingly been highlighted in PLA debates as central
and informatised systems’. By the time of the 2004 defence to the development of more powerful platforms and sys-
white paper, informatisation had ‘become the key factor in tems enabled by AI. Some Chinese sources have also indi-
enhancing the warfighting capability’ of the PLA. Accord- cated that harnessing these technologies might provide
ing to the US Department of Defense (DoD), in its 2019 a means by which to ‘leapfrog’ the capabilities of other
report on China’s Military Power, the term ‘informatisation’ military forces.
is ‘roughly analogous to the U.S. military’s concept of net- During a late 2019 forum on military big data, research-
centric capability: a force’s ability to use advanced IT and ers from the Academy of Military Sciences (AMS) discussed
communications systems to gain operational advantage aspects of the collection and processing of data, whether
over an adversary’. China’s view of informatised local wars derived from reconnaissance, surveillance or intelligence,
was, the DoD said, ‘defined by real-time, data-networked but also using data from geographic information systems
command and control (C2) and precision strike’. and ‘human social and cultural data and social media data’.
According to PLA Strategic Support Force (SSF) person- As military forces try to integrate big data into their struc-
nel and the Science of Military Strategy publication, infor- tures, they said, operations would increasingly be char-
matisation provides the PLA with military capabilities that acterised by human–machine interaction, combinations
allow it to ‘leapfrog’ the capabilities of currently techno- of human–machine intelligence, data-centric analytical
logically superior adversaries. Space-, cyber- and electro- processing and, ultimately, independent decision-making
magnetic-warfare capacities have the potential to paralyse and autonomous-attack capabilities. In short, ‘the key to
a high-tech enemy’s ‘operational system of systems’ and winning quickly is how to shorten the “OODA [observe,
undermine their command-level ‘system of systems’. orient, decide, act] loop” and revolutionising C2’. However,
However, the PLA also intends to harness these tech- while debates in China recognise that big data-driven
nologies to help it better collect, analyse, share and train research and development and AI-enabled technologies
with data and information. It aims to make ‘basic prog- will result in the PLA’s acquisition of ‘smarter’ and more
ress’ by 2020 by introducing additional information and autonomous platforms and systems, the AMS researchers
communications technologies, including cyber capaci- emphasised that ‘big data and AI technology cannot com-
ties, across its theatre commands and forces, in order to pletely replace people and cannot change their decisive
improve information-enabled capabilities and to boost position in war’.
China’s armed forces: ‘informatisation’ and ‘intelligentisation’ 11

across the services will require accurate information Department, that were also tasked with C2 functions
on adversaries, while the PLA’s own systems and were slimmed down after the 2015 organisational
forces have to improve their ability to not only gather reforms and, with some tasks shifted to the SSF, their
more information but also process and disseminate precise responsibilities are currently unclear.
it across all domains. The 2015 defence white paper During Xi’s presidency, military–civil fusion (军民
said that the PLA would look to more efficiently 融合) has been elevated to a national-level strategy,
use information resources, improve reconnaissance, with a focus on leveraging public and private research
early-warning and C2 systems, develop precision- and emerging technologies for future war fighting in
strike capabilities and improve support systems: the information and networked domains. The PLA
information systems will integrate operational forces has also restructured 67 universities and colleges
and other elements and, the thinking goes, seamlessly into 37, in order to continue streamlining develop-
link these with equipment platforms. Indeed, China ments in strategic and disruptive technologies, as
could look to integrate its satellite reconnaissance and well as in military doctrine, strategy, joint operations
navigation data to enable over-the-horizon targeting. and informatisation. In 2017, the PLA did not recruit
It might even consider developing what could be any new students for its National Defence Student
termed a ‘reconnaissance-strike complex’, integrating Programme. This began, in 1999, in over 115 civilian
systems such as high-speed cruise missiles and high- engineering, science and technology universities. The
speed reconnaissance UAVs (as shown in the 70th programme will cease to exist once the remaining
anniversary parade in 2019). Integrating capabilities students graduate in 2020.
in his way would help not only to deliver military
strikes but also – if they were to target C2 nodes – to Potential problems
help achieve information superiority over an adver- Xi has on numerous occasions highlighted that the
sary. PLA has not yet reached its 2020 goals. Indeed, the
2019 defence white paper said that the PLA ‘has
Appropriate enabling structures yet to complete the task of mechanisation and is in
Successfully introducing these concepts will require urgent need of improving its informatisation’. That
persistent attention by senior decision-makers, said, while mechanisation and informatisation are
including the PLA’s Central Military Commission linked, they have different objectives, each with
(CMC). This body was slimmed down in 2017 specific obstacles. For instance, though the navy and
following the 19th Party Congress. Its four general air force have benefited from significant investment
departments were disbanded and reformed into in defence research and development and manufac-
15 ‘functional sections’. This gave the PLA’s top turing in introducing newer-generation equipment,
leadership direct control over the five new theatre some information systems reportedly remain incom-
commands and four military services, as well as the patible. Discussions in Chinese literature indicate that
decision-making, executive and supervising authori- the level of standardisation of combat-management
ties, in order to drive forward reforms and ensure systems across the PLA remains low, as does the
Party loyalty. In addition, the commanders of the ability to share information across theatre commands
Navy, Air Force and Rocket Force were removed as and services. These sources say that informatisation is
CMC members and the Secretary of the Discipline expected to improve C2 structures and ease the collec-
Inspection Commission was added. The creation in tion and sharing of data. It is perhaps also seen as
2015 of the Strategic Support Force, which reports important in improving decision-making within the
directly to the CMC, has largely consolidated the PLA, potentially addressing what have been termed
PLA’s space-, cyber-, electronic- and psychological- the ‘five incapables’ (五个不会): the inability of ‘some’
warfare capabilities. It is intended to improve readi- officers to judge situations, understand higher author-
ness and create a more unified capability to prosecute ities’ intentions, make operational decisions, deploy
complex multidimensional operations of the sort that troops or deal with unexpected situations. While
might be seen in future conflicts. Moreover, the SSF military experience in integrating networked capa-
also plays a support function across services and bilities has in some Western states enabled greater
branches in theatre commands and looks to improve flexibility at lower levels of command, this has not
integration in relation to strategic-information opera- been mirrored in the PLA. Communication between
tions. Other bodies, including within the Joint Staff PLA decision-makers and subordinates is supposed
12 THE MILITARY BALANCE 2020

to have been improved by the integration of new spectrum, in cyber and in space systems. In a way, the
technologies, but there is little to suggest that infor- thoroughgoing ambition outlined for China’s infor-
matisation has given the CMC the confidence to allow matisation process reflects the PLA’s understanding
more independent decision-making at lower levels of its position relative to advanced Western militaries.
of command. Indeed, if anything, the CMC reforms Discussions have been observed in China, in
in 2015 strengthened top-down decision-making, places such as the Academy of Military Sciences and
which is structured through Party Committees and the NDU, concerning the possible decentralisation
Party Standing Committees at every level in the PLA of command structures and the potential degree of
and which are under increasing scrutiny from the automation in future weapon systems. But while the
Discipline Inspection Commissions. Meanwhile, it is drive for informatisation might have led the PLA to
not assured that the PLA will fully realise the benefits consider the need for greater flexibility in its deci-
of organisational changes like the creation of the SSF. sion-making and military-training requirements,
As analysts point out, integrating units such that their Xi’s tightened grip over the PLA has led to greater
personnel, systems and military culture are wholly centralisation in the CMC. While the process of
compatible can take time. ‘informatisation’ may be improving PLA capabilities,
The PLA also faces challenges in recruiting and in tandem with the development and introduction of
training highly qualified personnel capable of oper- more advanced military systems, this does not mean
ating advanced equipment, while there is also compe- that the PLA is combat ready or that the benefits of
tition from China’s private technology sector. Better informatisation are being felt rapidly. These concerns
salaries have been offered, as have better benefits are borne out by what can be observed of the PLA’s
following military service, but these differ between self-reflection as it goes through this process.
officers and enlisted personnel. Reflecting growing At the same time, the degree to which the inte-
concern in this area, a Ministry for Veterans Affairs gration of more intelligent capabilities, such as big
was set up in 2018. Also, problems persist in improving data and AI, will influence and improve Chinese
military training, notwithstanding the introduction of weapons developments remains unclear. Although
online training and simulation tools, and continued concerns have arisen about the degree of automation
trans-regional exercises designed to drive integration. in Chinese weapons systems, because of centralised
Moreover, bringing recent graduates with high-tech decision-making, Chinese discussions seem to still
expertise into the PLA has not proven an unalloyed anticipate having a human in the loop. It is possible
success. As one source states, ‘it is not easy for these that the initial benefits of intelligent capabilities may
professional technicians to adapt to the troops, and it be felt more in areas such as logistics support and
is equally difficult for the force commanders to adapt C2. It is not yet clear whether ‘informatisation’ and
to the new IT’. As well as acquiring new and infor- ‘intelligentisation’ will give the PLA a comparative
mation-enabled military equipment, training needs advantage over potential adversaries, some of which
to improve so that China’s troops can best exploit the are modernising in similar ways. As such, the PLA
capabilities of these systems. will be careful about the risk of introducing into its
own systems the vulnerabilities it looks to exploit or
Looking ahead target in others. This may explain reports of China’s
China’s approach to future warfare and military forces conducting exercises in a degraded electro-
modernisation seems to have heavily leveraged the magnetic environment. At the same time, while the
lessons it observed when studying other modern PLA has looked to US performance in recent conflicts
militaries. Informatisation is similar to that of the to inform its military-modernisation plans and objec-
US conception of network-centric warfare, utilising tives, it will in future likely also look towards the mili-
the employment of ICT-enabled modern weaponry tary-modernisation programmes of other Asian states
and equipment, as well as improving C2. The PLA that are looking to integrate emerging-technology
has focused on improving the capability and quantity developments into their military thinking, equip-
of its precision-strike systems and its missiles, with ment and forces. For China, however, realising the
emphasis on increased range and improved accuracy. full potential of these developments will likely take
It has pursued developments in the electromagnetic longer than was first envisaged.
Military use of the electromagnetic
spectrum
: the renewed focus on
electronic warfare
Modern military forces and equipment capabilities become of reduced importance, while associated expe-
are increasingly reliant on the electromagnetic spec- rience and skills faded. A German electronic-warfare
trum (EMS) for strategic, operational and tactical situ- officer, speaking about electronic warfare (EW) in the
ational awareness, as well as for communications and NATO context, observed that ‘EW training in forces
navigation. Radars on land, at sea, in the air and in throughout NATO lost focus and EW skills atrophied’.
space use radio-frequency (RF) emissions to detect
and track targets. Armed forces, in turn, use RF trans- Challenging Western dominance
missions to carry voice, data and imagery traffic to The growing reliance of US and allied militaries on
enhance their situational awareness and provide the EMS was apparent to China, Russia and other
command-and-control (C2) functions. Meanwhile, states, including Iran and North Korea. Western mili-
satellite-RF transmissions provide the satellite-navi- tary operations were studied, as were modern mili-
gation (Global Navigation Satellite System, or GNSS) tary means of harnessing the EMS to improve C2,
signals that are used by armed forces, and societies, situational awareness, intelligence, surveillance and
for navigation and timing. reconnaissance (ISR), and targeting. As a result, these
By the end of the Cold War, the United States and states embarked on programmes to improve their
its allies had become accustomed to pre-eminence capacity to disrupt EMS use through electronic attack,
in the sophistication of their radar, communications as well as to themselves benefit from the EMS. They
and navigation systems. This was evident during also started examining how to exploit the EMS to
US and NATO military interventions from the 1990s deliver cyber attacks, with potential targets including
onwards. This pre-eminence was, if anything, the military-communications networks, radars and navi-
legacy of US military and civilian scientific and tech- gation systems, and civilian critical infrastructure.
nological developments during the Second World However, these states are also deepening their
War and the Cold War, and the post-war development reliance on the EMS. For example, Russian military
by US allies of their own advanced military technolo- modernisation over the past decade has seen the
gies. In contrast, reduced access to such technology country invest in digital battle-management systems
hampered the development of similarly advanced and advanced telecommunications and radars. The
materiel certainly in Russia but also elsewhere. same holds true of China, which is engaged in a drive
Although Russia invested heavily in domestic mili- to improve its military ‘informatisation’, by devel-
tary technology during the Cold War, reduced access oping network-centric capabilities, C2 and ISR, and
to foreign innovation slowed its technical progress. more closely integrating into these structures the
After the Cold War, Western military forces were capabilities offered by increasingly modern military
in many cases focused on out-of-area operations, and equipment. This exploitation of the EMS may present
were making ever-greater use of a generally uncon- targeting opportunities for potential adversaries, who
tested EMS. Western armed forces increased their reli- might exploit it to launch attacks, including by elec-
ance on the EMS for situational awareness, including tronic means.
blue-force tracking, as well as for communications,
reconnaissance, navigation and timing, and guidance Russia’s progress
and targeting data. At the same time, Western societies In the decades prior to Russia’s deployments to
also deepened their dependence on the EMS. With Ukraine (2014–) and Syria (2015–), its armed forces
only a limited number of threats to Western use of the used EW to varying degrees during conflict in
EMS, few military capabilities were retained to tackle Chechnya in the 1990s and 2000s, as well as during
them. Moreover, tactics and procedures that would its short war with Georgia in 2008. In Chechnya, it is
have been carefully adhered to during the Cold War, thought that the gathering of communications intel-
such as voice discipline and emission control, had ligence (COMINT) on opposing forces, particularly
14 THE MILITARY BALANCE 2020

in geo-locating sources of communications transmis- vehicle (UAV)-equipped system, which was used to
sions, was vital in finding and fixing enemy positions jam cellular networks, and the RP-377LA Lorandit
for targeting by artillery or airstrikes. In contrast, in COMINT system, which targeted high-frequency
Georgia Russian efforts to gather electronic intel- and very-/ultra-high-frequency communications.
ligence (ELINT) on and direct jamming against Jamming also affected the RF links used to control
ground-based air-surveillance and fire-control radars S-100 Camcopter UAVs assisting the Organisation
was said to have been poor, though this may have for Security and Cooperation in Europe observation
also been due to Georgian countermeasures. mission in Ukraine. Russia looked to integrate these
Russia has since made efforts to regenerate its EW capabilities to improve its ‘reconnaissance-strike
capabilities, and the deployments to Ukraine and Syria complex’. The Asymmetric Strategy Group stated
have provided an operational laboratory for the armed that, in Ukraine, Russia used ‘a sophisticated blend
forces to refine and develop their EW doctrines. At the of Unmanned Aircraft Systems, electronic warfare
same time, they have to some extent offered a window jamming equipment, and long-range rocket artillery’.
to observe Russian capabilities. The US armed forces’ In Syria, Russia’s EW posture generally focused
Asymmetric Strategy Group, writing in the publicly on force protection. The loss of a Russian Air Force
available study of Russia’s ‘new generation warfare’ Su-24M Fencer D combat aircraft to two Turkish Air
(published 2015), said that Russia had observed, and Force F-16C fighters in November 2015 prompted
looked to exploit, Western strategies. For instance, Moscow to deploy additional EW systems. One
‘because of maneuver warfare’s reliance on commu- month earlier, Russia had deployed the 1RL257
nication, Russia has invested heavily in Electronic Krasukha-C4 jammer, which targets the X-band and
Warfare systems which are capable of shutting down Ku-band airborne radars typically used by combat
communications and signals across a broad spectrum’. aircraft and missiles, to protect Khmeimim air base in
Russian EW in Ukraine was overtly offensive. northern Syria. The Krasukha-C4 was supplemented
Jamming helped sever Ukrainian military radio by L-175V/VE Container/Khibiny and Leer-3 systems.
communications in Crimea, as Russia occupied The L-175V/VE jammer can be carried by Russian Air
and annexed that territory in early 2014. This was Force Su-30SM Flanker-H, Su-34 Fullback and Su-35
supported by the RB 314V Leer-3 uninhabited aerial Flanker M combat aircraft.

Electronic warfare evolves


According to the US Department of Defense, in its Elec- sea and in the air or in space; it will involve knowledge
tronic Warfare Policy, updated in August 2018, electronic of one’s own C2 capability, communications and related
warfare includes the use of ‘electromagnetic and directed data links, sensors and weapons – such as radars and la-
energy to control the EMS or to attack the enemy’. NATO sers – and operating methods, such as jamming (includ-
has a more elaborate explanation: it is ‘a military action ing spoofing) and signals-intelligence collection. In turn,
that exploits electromagnetic energy, both actively and an awareness of adversary developments may drive de-
passively, to provide situational awareness and create of- velopment of offensive capability as much as it will spur
fensive and defensive effects’. It is warfare within the elec- better protection; it may also lead to better equipment
tromagnetic spectrum (EMS) and involves the military design in terms of platforms (such as signature manage-
use of electromagnetic energy to prevent or reduce an ment, including through the integration of passive and
enemy’s effective use of the EMS, while protecting its use perhaps even active stealth). Moreover, cyber and EW
for friendly forces. tools are more closely linked by digitisation. When EA first
There are generally held to be three key components: began to be used at significant scale, during the Second
protection (electronic countermeasures and counter- World War, it initially focused on the application of so-
countermeasures), electronic attack (EA) and electronic called ‘noise jamming’, with interference directed against
support measures. The definition given by the DoD for EA an opponent’s communications systems and radars. Re-
is that it uses ‘electromagnetic energy, directed energy, or cent years have seen jamming techniques increase in so-
anti-radiation weapons to attack personnel, facilities, or phistication, such as the ability to manipulate transmis-
equipment with the intent of degrading, neutralizing, or sions to discretely jam radars. However, cyber effects can
destroying enemy combat equipment’. now be teamed with EW, such that EA acts as the conduit
Conducting effective EW missions may require task- through which malign code can be introduced into an
ing and/or the coordination of relevant assets on land, at adversary’s C2 or battle-management systems.
Military use of the electromagnetic spectrum 15

Leer-3 may have been deployed to support Syrian China’s Military Power report said that the People’s
Army operations by jamming insurgent mobile Liberation Army (PLA) considered EW a key aspect
phones. It may also have been used to deliver morale- of modern war and that ‘its EW doctrine emphasizes
sapping text messages to opposing forces. Reports have using electromagnetic spectrum weapons to suppress
circulated of the Russian armed forces also deploying or to deceive enemy electronic equipment. Potential
equipment such as the RB-301B Borisoglebsk-2 EW victims include adversary systems operating
COMINT system, which has also been used in the in radio, radar, microwave, infrared, and optical
Ukraine theatre, and the Repellent-1 counter-UAV frequency ranges, as well as adversarial computer
system, which is designed to interrupt the RF links and information systems.’ Cyber actions, meanwhile,
between a UAV and its ground station. In June 2019, could attack an enemy’s C2 system, with the poten-
reports emerged that Israeli airspace had experienced tial to ‘completely disrupt’ these systems, thereby
GNSS jamming, possibly caused by Russian Army ‘gaining battlefield superiority’. They would also
R-330Zh Zhitel systems being used to protect the be useful for other purposes including espionage.
Russian deployments at Khmeimim air base. Whether EW features in recent Chinese military exercises
this jamming was deliberate, or an unintended conse- designed not only to improve the PLA’s ability to
quence of operations, remains unclear. use EW but also to enhance its capacity to operate
Russian EW effects have also been observed in in a contested electromagnetic environment. Its EW
Europe. Moscow has been accused of using jamming units routinely train, according to the DoD, in order
against Norway and its Baltic neighbours. In March to ‘conduct jamming and anti-jamming operations
2019, Oslo claimed that the Russian military had against multiple communication and radar systems
jammed GNSS signals in the country’s north during or GPS satellite systems in force-on-force exercises’.
NATO exercises in October–November 2018. Russia’s In 2019, meanwhile, reports that the accuracy of satel-
earlier Zapad 2017 exercises saw EW used to prepare lite-navigation systems was being degraded offshore
Russian forces for fighting in an electromagnetically Shanghai indicate growing Chinese capabilities,
contested environment. These EW efforts have not possibly in the civil sector as well as the armed forces.
been performed in a vacuum. Operations in Ukraine
and Syria showed that these form part of a wider NATO and the EW threat
strategy involving cyber attacks. Moscow has been GNSS jamming is of increasing concern to NATO
accused of performing cyber attacks against Ukrainian member states, and they have been seeking to regen-
critical infrastructure, and of targeting non-govern- erate their EW capability and resilience. In its 2018
mental organisations and opposition groups with cyber Electronic Warfare Policy, the Pentagon advised
activity during its involvement in the Syrian conflict. prioritising training ‘in a congested and contested
electromagnetic operational environment … both on
China live ranges and in training’.
China is also overhauling its EW capabilities – perhaps The US is pursuing more jam-resistant Global
even more so than Russia – as it modernises its armed Positioning System (GPS) satellite signals, while the
forces. The US Department of Defense’s (DoD’s) 2018 US Army is looking at new navigational systems for

Table 1 Selected Russian EW systems reported deployed to the Ukraine and Syrian theatres
System User Estimated frequencies Purpose
1RL257 Krasukha-C4 Army 8.5 gigahertz/GHz to 18GHz Intended to jam airborne X-band and Ku-band radars
R-330Zh Zhitel Army 1.1GHz to 1.6GHz Designed to jam GNSS transmissions
RB-314V Leer-3 Army 800 megahertz/MHz to Used for the hacking/jamming of cell-phone transmissions and
2GHz networks
L-175V/VE Container/ Aerospace 2GHz to 18GHz/40GHz Airborne ELINT/electronic-attack system for ground-based air
Khibiny Forces surveillance and fire-control radars, and airborne fire-control
radars
RB-301B Borisoglebsk-2 Army 30MHz to 3GHz COMINT collection targeting very-/ultra-high-frequency land and
air communications
Repellent-1 Army 300MHz to 6GHz Possibly designed to disrupt air-to-ground/ground-to-air UAV
communications, or to disrupt UAV GNSS
RP-377LA Lorandit Army 3MHz to 3GHz COMINT system designed to geolocate high-frequency and
very-/ultra-high-frequency radio communications
16 THE MILITARY BALANCE 2020

its vehicles, incorporating Inertial Navigation Systems Activities Joint Doctrine Note, aimed at aligning the
(INS) to reduce the reliance on GPS. Its M-1126 Stryker postures of the UK armed services, as well as with
armoured infantry fighting vehicles are receiving the civilian agencies such as the GCHQ SIGINT organ-
Mounted Assured Precision Navigation and Timing isation.
System (MAPS), which uses a GPS system teamed Platforms and weapons are also being designed
with an atomic clock to provide timing, an INS and an to be resistant against EW and cyber threats. Low
anti-spoofing GNSS antenna. The army is expected to Probability of Interception/Detection waveforms
roll out MAPS to other armoured vehicles, and also to transmitted by radar and communications systems
develop a variant of the system to equip dismounted can make it more difficult for SIGINT systems to
soldiers. The US Army has also overhauled its EW detect and locate the source of transmissions, helping
posture and was reportedly due to begin fielding new to prevent jamming and perhaps to protect against
EW platoons in manoeuvre brigades in the second cyber attacks.
quarter of 2020. In the communications realm, analysts judge that
The US Air Force is examining its posture to take lessons from Ukraine show that NATO commu-
account of the modern EW environment, as it looks nications are generally resilient against Russian
to maintain what it calls the United States’ strategic jamming attempts. A small number of tactical radios
advantage. The air force is introducing systems equipped with NATO’s Single Channel Ground and
such as the AGM-160C variant of the Miniature Airborne Radio System (SINCGARS) waveform were
Air-Launched Decoy, which adds a radar jammer, supplied to Ukraine. SINCGARS provides clear and
and is upgrading its anti-radar AGM-88 air-to-surface protected communications between land forces,
missiles. However, some analysts have said that plat- and SINCGARS radios were understood to have
form-protection priorities are still seen by the air force performed well despite Russian jamming activity.
as key to mitigating the renewed EW threat, with this Over the longer term, the uptake of extremely high-
evident in the signature-management considerations frequency communications for tactical communica-
observed in platform designs. The air force, it has tions, which use bandwidths of 30–300 GHz, could
been said, may have tactical jamming capability, but result in systems that are difficult to jam due to their
it also requires theatre-level capability – a capability it very narrow beamwidth; this makes them difficult to
has not had since the EF-11A Raven electronic-warfare detect, locate and attack.
aircraft retired in 1998.
The US and NATO are also enhancing their cyber What next?
capabilities. After the shooting down by Iran of a US A number of potential adversary countries have
Navy BAMS-D reconnaissance UAV on 20 June 2019, closely studied recent Western military operations.
US Cyber Command reportedly performed a cyber After noting the reliance placed on the EMS by the US
attack aimed at networked C2 systems controlling and its allies, they have taken steps to ensure that this
Iranian surface-to-air missile batteries. can be challenged. At the same time, there has been
Elsewhere in NATO, efforts are ongoing to enhance growing recognition that cyber warfare can disrupt
the abilities of allied forces and platforms to operate an adversary’s military capabilities at the tactical and
in electromagnetically contested areas. At the stra- operational levels, and its socio-economic and polit-
tegic and operational levels, the Alliance’s Joint EW ical life at the strategic level. Indeed, electronic- and
Core Staff (JEWCS) is drafting a new EW doctrine. cyber-warfare disciplines are increasingly merging in
It has also made important investments in NATO the military context. NATO and partner nations have
EW training and is overhauling its SIGINT capabili- responded and refocused strategies in order to address
ties via the NATO EW Database–Next Generation their electromagnetic vulnerabilities, including
(NEDB-NG) initiative. This should improve the way improving their ability to operate in a degraded or
member states analyse, store and share information, denied EMS environment, at the same time as investing
including on new EMS systems and associated plat- in electronic- and cyber-warfare capabilities. For major
forms. Exercises practising and defending against EA players – including China and Russia – an essential
are once more a frequent occurrence. element of success will be not only how they improve
Steps are also being taken to fuse EW and cyber their electromagnetic defences and resilience but also
warfare. In 2018, for instance, the UK Ministry of how they develop and exploit greater offensive capa-
Defence published its Cyber and Electromagnetic bility as part of their military-modernisation plans.
The space domain: towards a regular
realm of conflict?
In 2019, a series of announcements highlighted the tions or mistakes that could risk confrontation or even
growing importance of space for national security conflict in space or on Earth.
and defence. At its November 2019 foreign-ministers’
meeting in Belgium, NATO declared space an ‘oper- Cold War heritage
ational domain’ for the Alliance, three months after The Russian (then-Soviet) and US space programmes
the United States activated US Space Command as have their roots in producing delivery vehicles
a new, eleventh, combatant command. According to for nuclear weapons, but this shifted, more or less
the US Department of Defense, the US ‘faces serious contemporaneously, to include launching satellites.
and growing challenges to its freedom to operate in Increased Soviet air-defence capabilities drove the
space’. China and Russia, it said, ‘view counterspace Eisenhower administration to develop satellites to
capabilities as a means to reduce US and allied mili- bolster intelligence-collection activities. Although
tary effectiveness’. the Soviet Union achieved early public firsts with
Space is a critical aspect of everyday civilian, the Sputnik satellite (which reached orbit in October
as well as military, activity. The technical and cost 1957 atop a modified ballistic missile) and the first
barriers to entry have reduced, enabling more coun- human spaceflight (when Yuri Gagarin orbited on
tries to possess space assets. Many of these are 12 April 1961 in Vostok 1), the classified US Corona
dual use. More countries are relying on space to reconnaissance-satellite programme first proved the
support and enhance their military operations, in national-security benefits to be had in exploiting
turn providing an incentive for the development of space.
counter-space and anti-satellite (ASAT) capabili- Moscow and Washington engaged in military
ties. Many of these resemble those developed by the competition in space throughout the Cold War. The
Soviet Union and the US during the Cold War. One 1967 Outer Space Treaty, the foundation of interna-
risk, some analysts argue, is that today there may be tional space law, limited military space competition
fewer deterrent effects to hold back the use of such by outlawing the placement of nuclear weapons and
capabilities, particularly if states look to employ these other weapons of mass destruction in orbit and the
systems as part of sub-threshold activity. establishment of military bases on the Moon, but
This emergent acknowledgement that space is also allowed for a wide range of other military space
another domain of military competition and poten- activities under the euphemism ‘peaceful uses’. Initial
tial conflict raises numerous questions. These include ideas for crewed military space stations and orbital
how best to organise military space forces and how bombers soon gave way to more practical satellites
to protect or harden satellites against attack, while that provided critical intelligence, surveillance and
also developing the means to interfere with adver- reconnaissance (ISR); communications; and posi-
sary assets. There are also questions relating to the tioning, navigation and timing (PNT) services from
rapid growth of private-sector space systems and space. The military utility of these services drove
how these may drive competition or be leveraged by both the Soviet Union and the US to also develop and
armed forces. Another challenge is how to better inte- deploy ground- and space-based ASAT capabilities.
grate military space operations with operations in the These weapons were never used in a military conflict,
air, on land, at sea and in cyberspace. Additionally, largely because the use of satellites to verify arms-
the prospect of offensive military action in space, or control treaties and provide warning of nuclear attack
activity that targets uplinks, downlinks or ground deterred space attacks, for fear they would trigger a
stations, raises concerns about collateral damage wider, possibly nuclear, confrontation.
to the global space services that underpin modern Towards the end of the Cold War, the Reagan
commercial and social life; how arms-control or confi- administration’s public drive for its Strategic Defense
dence-building regimes could be used to limit the use Initiative (SDI) spurred a new round of international
of certain capabilities; and how to avoid mispercep- concern over military competition in space. There
18 THE MILITARY BALANCE 2020

was increased concern that the militarisation of space Union had themselves carried out ASAT tests during
might turn into the weaponisation of space, poten- the Cold War.)
tially including space-based systems that could be During the 2010s, the US became increasingly
used to target installations on Earth. However, capa- concerned about the threats to its space capabili-
bilities envisioned for SDI were not deployed before ties. In 2013, the Obama administration compiled
the Cold War came to an end. a National Intelligence Estimate of Russian and
Chinese counter-space capabilities and reviewed the
Developing competition United States’ space posture. This sparked several
The US was the dominant space power after the fall initiatives intended to reorganise national-security
of the Soviet Union. Many Soviet-era Russian military space capabilities and increase the resilience of US
space programmes faced budget cuts and, analysts space assets to attack, and saw the first public discus-
understand, ASAT programmes were mothballed. sions by senior military leaders about the possibility
For Washington, the value of space for supporting of space becoming a future domain of conflict. The
and enhancing military operations was proven in Trump administration has continued this focus, with
the 1990–91 First Gulf War and the 1999 bombing public statements about the inevitability of space as
campaign in the former Yugoslavia. These drove a war-fighting domain and impetus for a major reor-
increased military investment in space-based services ganisation of US military space bureaucracy.
and spurred their integration into air, land and mari-
time forces. In the late 1990s, the US armed forces Diffusing space competition
drew up plans for broader efforts to achieve full-spec- With space becoming integral to future military
trum ‘dominance’ in space, but these lost momentum competition and conflict, and as more countries invest
after 9/11 and the subsequent wars in Afghanistan in space-based capabilities to enhance their national-
and Iraq, in favour of using space capabilities to security interests, the tendency to seek counter-
support and enhance those operations. space and ASAT capabilities is now evident. Current
While the US was engaged in Afghanistan and conflicts in Syria and eastern Ukraine already feature
Iraq, China and Russia began to increase their the significant use of ground-based jamming and
investment in national-security space capabili- spoofing of satellite-navigation and satellite-commu-
ties. Both countries were embarked on military- nications systems as part of military operations.
modernisation programmes, learning lessons from This has taken place elsewhere, as demonstrated by
US and Western operations as far back as the First the 2016 jamming of satellite-navigation signals in
Gulf War, and in Russia’s case also rejuvenating South Korea, attributed to North Korea by the South,
some hitherto dormant military space projects with and reports in 2019 that satellite-navigation signals
renewed funding streams. Some analysts under- offshore Shanghai were being spoofed. Meanwhile,
stand this included moving some counter-space and China and Russia have continued their ASAT testing
ASAT programmes out of storage or developing and development programmes. Meanwhile, India
new versions. It has been reported that the then- tested its own direct-ascent ASAT weapon in March
commander of Russia’s space forces had said in 2010 2019 and some in the US have argued that it should
that Russia was ‘again developing inspection’ and also develop an offensive capability.
‘strike’ satellites. Russia also embarked on a project The types of counter-space capabilities being
to restore its GLONASS satellite-navigation constella- explored today are fundamentally the same as those
tion. For its part, China embarked on a wide-ranging developed during the Cold War. Russia’s 51T6
programme to develop its own space-based capabili- Gorgon missile (part of the A-135 anti-ballistic-missile
ties for ISR, PNT and communications to support its (ABM) system) was reported to have a latent direct-
national-security needs (launches began in 2000 for ascent ASAT capability, while it remains unclear if
China’s Beidou satellite-navigation system), as well Russia’s 14Ts033 Nudol (which might be associated
as a suite of counter-space and ASAT capabilities of with the A-235 ABM system) has a similar capability.
its own. China conducted multiple tests of ground- As well as ground-, sea- or air-launched missiles used
based ASAT weapons, including one in January 2007, as direct-ascent weapons to destroy satellites in low-
using a direct-ascent missile, that destroyed one of its Earth orbit, interceptors placed in orbit could be used
own weather satellites and resulted in several thou- as co-orbital weapons, manoeuvring and rendez-
sand pieces of orbital debris. (The US and Soviet vousing with a target satellite to try and damage or
The space domain: towards a regular realm of conflict? 19

destroy it. These interceptors could include manoeu- from their space-based systems. More exercises have
vrable satellites. High-powered lasers and other been observed in which GPS signals have been delib-
types of directed-energy weapons could also be erately degraded, while it was reported in 2016 that
employed to temporarily blind or otherwise interfere the US Navy was reinstating celestial-navigation
with satellites, although physical destruction using a training amid fears of GPS degradation or spoofing.
laser (particularly from a ground-based location) is, This is also significant for guided weapons, where
specialists assert, still some way off. More immediate there is renewed attention on hardening systems
threats, however, are the jamming of satellite radio- against electronic attack, as well as forms of redun-
frequency transmissions and cyber attacks against dancy, for instance in guidance systems that may be
ground-control stations, which could disrupt the otherwise dependent on signals from space-based
military use of satellites during a conflict. systems.
One critical contemporary feature that was not
Protection and resilience present during the Cold War is the involvement of
There is a continuing debate over how best to protect the private sector. The Apollo programme and other
satellites from attack. Russia and the US were effec- major Cold War space programmes were government
tively deterred from targeting early-warning satellites directed and funded (although they used contracted
during the Cold War by the risk of starting a nuclear industry support), whereas today commercial compa-
war. The lack of hostile threats for most of the period nies are often engaged in their own space activities
since has meant that functionality became a prime independent of governments. States are turning to
design determinant for national-security satellites. commercial companies as a source of technological
This led to a focus on large, capable and expensive innovation that could be utilised for military applica-
national-security satellites, with long development tions and to provide core services, with the hoped-for
and replacement timelines. Some analysts have benefit of releasing military budgets to fund military-
argued that developing offensive capabilities to specific capabilities.
threaten adversary satellites might itself deter poten- Debates are also under way about how best to
tial attacks. That said, if a nation with such offensive organise military space functions. While a range of
capabilities is itself heavily reliant on space-enabled countries have a military space function, these are
systems, it may be disinclined to take action that often limited in scale, concerned with resilience or
might in turn imperil these. Instead, a key strategy the management of space-enabled assets, and are
has been to increase the resilience of space capabilities attached or subordinate to larger organisations or
by moving to new constellations of numerous smaller services.
satellites, potentially spread across multiple orbits; However, in recent years several states have
using commercial or allied satellites; and generating moved to strengthen the integration of space and
operationally responsive space capabilities, so as to other military capabilities. In December 2015, China
quickly reconstitute those constellations. For satellite established its Strategic Support Force, combining
applications where this is not feasible, the focus has electronic-warfare, space and cyber units, though
been on enabling satellites to defend against attacks, analysts remain uncertain if this includes counter-
perhaps with additional manoeuvring capabilities space forces. Also in 2015, Russia established its
or on-board systems to confuse or interfere with Aerospace Forces, combining its previous air, air-
targeting systems, or improved protection against defence and space units under the same command.
threats including dazzling or jamming. Analysts France announced in August 2019 that it would
understand that as part of the expansion of its military elevate its existing Joint Space Command to a Space
space functions, and stemming from concerns about Command, under the renamed French Air and Space
potential on-orbit vulnerability, France is consid- Forces. Meanwhile, the United Kingdom unveiled
ering passive and active protection for its future satel- its Defence Space Strategy in mid-2019, announcing
lites, as well as systems that could provide warning investments in space systems, including small-satel-
of an impending threat, thereby allowing defensive lite development.
manouevres. In the US, however, both Congress and the Trump
At the same time, some states are preparing to administration have called for space to be separated
operate in environments where they no longer have out from the air force and put into a new military
assured access to space or assured data reliability service. President Trump has insisted this be a separate
20 THE MILITARY BALANCE 2020

‘Department of the Space Force’, while the Pentagon In late 2018, the United Nations’ First Committee
and Congress seem to favour a semi-separate Space continued its long-standing discussions regarding the
Force within the Department of the Air Force, similar potential for a rules-based order ‘to securely govern’
to the relationship between the US Marine Corps and space. Russia and China highlighted their draft
the US Navy. In 2018, Congress directed the re-estab- treaty (presented in 2008 and 2014), which is aimed
lishment of US Space Command (USSPACECOM) to at preventing the placement of weapons in space.
reassume the space-war-fighting function that had The US position on China and Russia’s proposals, as
been carried out by US Strategic Command since the elaborated in the 2019 Worldwide Threat Assessment
demise of the original USSPACECOM in 2002. In its of the US Intelligence Community, is that they ‘do
new role, USSPACECOM will serve as a geographic not cover multiple issues connected to the ASAT
combatant command, responsible for all military weapons they are developing and deploying’. These
operations above 100 kilometres altitude and inte- shortcomings, according to the US, have allowed
grating military space capabilities into the planning China and Russia to ‘pursue space warfare capabili-
and operations of other combatant commands. In ties while maintaining the position that space must
December 2019, it was reported that (as part of the remain weapons free’.
negotiations over the 2020 defence budget) US legis- Space has become a critical part of the global
lators agreed to establish a US Space Force as a sepa- economy and everyday life. It is essential to weather
rate military branch. forecasting, climate monitoring, and maintaining
global communications and transportation infra-
Unresolved issues structure. The widespread use of destructive space
The increasing focus on space as a potential domain weapons that create persistent orbital debris or the
of military confrontation is also driving an awareness indiscriminate jamming of civilian PNT signals could
of the need to limit the effect that this could have on have consequences beyond their military purpose.
non-military space activities, as is the case with mili- As such, there are questions as to what potentially
tary activities in other domains. Analysts studying destructive space capabilities should be off limits,
this challenge have posited a number of steps that similar to discussions relating to cluster bombs, land-
could be considered, including the development of mines, cyber warfare and similar capabilities in other
transparency and confidence-building measures that domains.
could help reduce the chances of accidents, mistakes A key difficulty is that many of these space capa-
or misperceptions that could trigger a confrontation, bilities are now generated not solely by and for
or worse, in space. Such measures could also be useful governments but also by the private sector, with
in helping to identify unusual actions or activities that the same holding true of space-related research and
could be, or could be a precursor to, a hostile attack development. Developing and maintaining a compet-
against a satellite. Whether or not such an attack itive advantage in space will in future likely involve
would amount to a use of force, possibly leading a greater cooperation between the public and private
state to invoke the right of self-defence, is a question sectors. It will also mean generating more competi-
being debated by military lawyers and academics, tion within the private sector to spur innovation and
as are questions relating to the application of inter- cost-effectiveness. Dependencies have also developed
national humanitarian law and the law of armed since the end of the Cold War – the US, for instance,
conflict to military space operations. These debates is currently reliant on Russian engines and space-
become more complex if states look to employ mili- launch facilities for some of its major space require-
tary space capabilities that are below the threshold of ments. If anything, the use of space-based assets has
conventional military activity. become so routine that reawakening their national-
There is also renewed interest in arms-control security relevance, or indeed informing populations
measures to mitigate the disastrous effect conflict in of the extent of their dependence on space, is now a
space could have on the civilian use of space services. growing challenge for governments.

You might also like