You are on page 1of 4

Modelling and Simulation of Electronic Combat

Wayne R. Philp
Electronic Warfare Division
Defence Science and Technology Organisation (DSTO)
PO Box 1500
SALISBURY SA 5108

Keywords:
Information Operations, Electronic Warfare, Command and Control

ABSTRACT: Electronic and Information Attack capability is increasingly able to undermine situational awareness,
communications, command and control within modern high-technology combat systems, as reliance on COTS
information systems, data pre- processing and knowledge management becomes deeply embedded in warfighting
practice. Offensive electronic warfare using portable electronic devices and computers may soon provide powerful
means to those who may wish to penetrate enemy's lines, deny lines of communication and engage in decisive battle,
without the risk of ever being shot. This paper describes initial DSTO efforts to model, simulate and visualise
electronic/information attack in tandem with physical combat. Simulation technology that provides battlefield capability
through applications such as command decision support, real-time operational analysis, mission
visualisation/awareness, and logistic/materiel support, needs to be mindful of new threats in the next decade.

1. Introduction accuracy. If one can force an enemy commander to


make too-hasty or misinformed decisions, then an
The terrorist and the policeman upper-hand can generally be achieved, which when
both came from the same basket. maintained, leads inevitably to the adversary’s demise.
Joseph Conrad, The Secret Agent (1907) Furthermore, if an enemy commander cannot
communicate decisions
The aim of Electronic Warfare (EW) is to control the
electromagnetic (EM) spectrum for one’s own use
while denying such to an adversary. Electronic Attack Desired effect is to induce the greatest
the time difference between our
(EA), as one element of EW, involves the use of EM, n adversary.
i oan
decision cycle and thattof
directed energy, or anti-radiation technology to attack rm a
O b ser ve In f o
personnel, facilities, or equipment with the intent of ns
deceiving, degrading, denying or destroying enemy r a ti o
O pe
combat capability. The EM weapon is the tool of both
law-enforcer and law-breaker, friend or foe; the O b ser ve
Time

policeman and terrorist must therefore master the same


D ecid e
capabilities, or be defeated.
O wn Adv ersary
O r ie n t
Decision D ecide Decision
The Australian Army has sponsored research within Cycle Cycle
the Electronic Warfare Division of DSTO to investigate
the impact of cyberwarfare, 2015-2030. Cyberwar is
here defined as military operations, within virtual A ct

information, knowledge and psychological domains,


Time
which adversely effect command and control.
Cyberwarfare is subtly different from Information Figure 1: OODA loop [Future Land Warfare
Warfare (IW) in that it includes manipulation of the 2000, Army draft publication, 1999].
adversary’s perception of events and circumstances
(cognition), rather than more simply the manipulation of
to the physical domain of the battle assets, defeat is
the quality and timeliness of the knowledge available to
certain. Therefore, the purpose of this paper is to
the adversary. For example, cyberwar would seek to
address the emerging role of EA within Command and
exercise control over an enemy commander’s reflexive
Control, Communications, Computing, Intelligence,
decisions in response to perceived crises that were
Surveillance and Reconnaissance (C4ISR) [1].
created by virtual means – akin to orchestrating the
adversary’s every move.
1.1 Technology for Electronic Attack
The exercise of virtual control over an adversary may
EM (white) noise makers, decoy emitters, tuned
be considered in terms of an OODA loop, as illustrated
jammers, High Power Microwaves (HPM) and Non-
in Figure 1. The Orient, Observe, Decide, Act loop in
Nuclear Electromagnetic Pulse (NNEMP) generators
the decision making cycle is subject to varied tempo and
are a few relatively new weapons of war which may be
found on some military shelves. It is also quite 1.2 Synthetic Environment
possible that in some countries, libraries of software
viruses may already be coded into innocent guise, for The work addressed by this paper concerns the
transmission via e-mail, innocuous netware downloads construction development and implementation of a
or floppy disk. The aim in either case, hardware-kill or synthetic environment (SE) through which to model
software-kill, is to adversely effect (deceive, degrade, and simulate IW, EA and electronic protection (EP).
deny or destroy) command decision making processes The research and development challenge lies in the
(Command & Control, Communications and fusion of Situational Awareness (ISREW) and C4, as
Computing and Intelligence – C4I). C4I, in “flow and process” networks, with the spatial and
conjunction with Surveillance, Reconnaissance and temporal domains of the Computer Generated
Electronic Support (ES) capabilities, is given the Battlespace (CGB). The Information flow has a
acronym of C4ISREW (commonly used in Australia). different topology to the physical object interaction of
Modern knowledge-based warfighting is critically the computer wargame. Moreover, a human-in-the-loop
dependent on accurate and resilient C4ISREW. is critical to implement the cognitive affect of
cyberwarfare on the officer in tactical command; so the
Over the next decade, it is certain that EM jammers OODA loop must also be included within the SE.
will be able to deceive or block aerial or spaceborne
surveillance systems such as Synthetic Aperture Radar. To achieve this end, a framework provided by
Ground-based radars will be equally susceptible to merging three software systems is proposed: a CGB is
manipulation. Other EM jammers or noise makers will to be synchronised in real-time with an open-
be able to: deny access to analogue or digital cellular architecture process re-engineering package, having an
communications networks; block satellite navigation external spreadsheet to facilitate data exchange. The
and communication systems; degrade data transmission CGB in this work is STAGE (Virtual Prototypes Inc.,
LANs/WANs, and cause unshielded/unhardened Montreal, Quebec, Canada H4P 1T7), the process re-
computer systems to fail. In the worst case, customised engineering package is PLANIMATE
emitters may be able to generate bogus signals that (InterDynamics Pty. Ltd., Adelaide, South Australia,
deceive or confuse operational and tactical command Australia 5001), and the spreadsheet/ODBC-datasource
and control by providing false or misleading intermediary is EXCEL/ACCESS (Microsoft
information and intelligence. The tools necessary to Corporation, USA). It is also intended to integrate this
wage these actions are already, or very nearly, in the system with the US military software ModSAF (via
hands of many military powers. DIS) in the Synthetic Environment Research Facility
(SERF) provided by Land Operations Division, DSTO.
As military acquisition authorities around the globe
migrate from costly C4ISREW Military Specified The system of three software packages is represented
(MILSPEC) hardened systems toward cheaper, in Figure 2. As a base requirement, the CGB and the
unprotected Commercial-Off-The-Self (COTS) systems process re-engineering software packages must be
(personal computers and OEM CPU/microchip locked synchronously to real-time and capable of
circuitry, mobile and satellite telephones, cameras and information review and exchange during run-time.
videos, modems and satellite networks), the
vulnerability to EA increases. It is technically
practicable to design and construct robust systems for 1
military use but these are usually an order of magnitude
in cost over COTS products. As economic rationalist
INFORMATION WARGAME
policy continues to insist on low cost options for DATABASE
SITUATIONAL COMPUTER
peacetime Defence acquisition, it is feared that present GENERATED
AWARENESS
and planned future C4ISREW systems may be flawed (ISREW) BATTLEFIELD
and vulnerable to compromise or failure in time of
earnest need.
PROCESS RE-ENGINEERING
COMMUNICATE, COMPUTE
A simple example is provided in the case of
COMMAND AND CONTROL
Situational Awareness derived from automated ES data
2 (C4)
pre-processing. Unlike the radar warning receivers of 3
old, modern systems collect and process data about
detected possible threats and display these to the user as
geographically referenced icons. The user (a pilot in
this example) can then, in principle, steer a safe course. Figure 2: Three domains of a synthetic environment
However, if a plethora of bogus signals simply intended to study cyberwarfare. Annotations are
overload the pre-processing algorithms, causing the provided in the text
threat warning system to fail, the pilot is placed in The notations to Figure 2 are:
jeopardy. The outcome is the same for a military { Intelligent agents within the wargame attach to each
commander making decisions derived from corrupted platform in BLUE/RED/NEUTRAL force to
information or absent vital facts. interrogate sensors and systems. Detections are then
tagged and written to a database for reference and for evaluation and subsequent operational analysis,
retrieval. with no risk to the public domain. However, in
| The database is constantly searched to collect and mentioning public sensitivity, it should be added that
package requested information for display. A ignorance of these matters need not be “bliss”. The
commander-in-the-loop acts within a process re- ADF must be prepared and ready to counter any
engineering package (to mimic C4I) to make decisions. emergent or perceived threat to the security of Australia
} Command decisions are translated into new object and its national interests.
parameters and duly modified within the CGB.
Cyberwar also has implications for modellers and
programmers seeking to provide battlefield capability
An alternative schematic of the above is Figure 3.
through applications such as command decision aids,
real-time operational analysis and simulation, mission
KNOWLEDGE SPATIAL & TEMPORAL visualisation/awareness, and logistic/materiel support.
Heavy reliance on networked COTS operating systems
(such as Microsoft Windows or NT), especially where
Detect such applications are reliant on e-mail or web-browsers,
Classify
Intelligent Adversary are perfect targets for cyberwarfare. For example, one
Identify
Agents Neutrals interesting concept is that of “flaming” an e-mail
Data fuse
Recognise
Own Forces recipient: the use of commercial bulk e-mail generators
Appreciate to transmit 100’s of communications a minute to a
single targeted addressee. By sequential renaming of
Orient
Observe
the sender’s address with each transmitted
Decide communication, filtering of “junk e-mails” can be quite
Act
Control difficult. If the addressee was reliant on open e-mail
Inform Communicate access in the process of his/her command and control,
this simple act of “flaming’ could have serious
FLOW & PROCESS consequence on the tempo of operations. The emphasis
here is not on technique or method but that reliance on
any electronic/information service, that is accessible via
Figure 3: Framework for SE.
cyberspace, may be subject to attack or misuse. The
ADF needs to be informed and aware of its
vulnerability to cyberwarfare.
In mimicking command and control interaction
within a computer wargame, having information and 1.4 Redundancy
knowledge flows exposed, it will be possible to explore
the affect of Information Operations on a Commander’s The issue of redundancy is also most relevant.
decision making. Where there is timely and reliable Reliance on high-technology computer controlled
Situational Awareness, denial of that awareness (or C4ISREW systems is the product of the current
false awareness) may be keenly felt. Where there exists Revolution in Military Affairs (RMA) or Information
clear means of communication, denial or “spoofing” Revolution. The advantage to military command
(the insertion of false communications at event through maintaining the “knowledge-edge” has been
junctures) may prove critical. Where there is timely evident in recent operations in both the Persian Gulf
and effective command decision-making to operational and Bosnia. The advantage of enhanced situational
and tactical advantage over an adversary, the combined awareness through sensor and systems networking
affect of planned and coordinated cyberwar (within the cannot be denied. However, in the movement toward
SE) may be sufficient to prove the relative merit of network-centric warfare, precision targeting, total-
such tactics. If the use of Information Operations visibility of logistic support and command support
within a SE demonstrates loss of tempo and agility in systems, it is important that older redundant systems
battlefield command and control, then strong arguments remain extant and personnel are trained in their use. At
may then be levied to better prepare the Australian least then, when cyberwar is a legitimate mode of
Defence Force (ADF) against such threats to our own combat, there may be graceful degradation of capability
C4ISREW systems. with backup provision from older, more robust,
redundant systems. Existing military copper land-line
1.3 Advice to the Australian Defence Force communication grids should not be hastily discarded or
allowed to fall into disrepair in favour of satellite-based
The purpose of presenting this paper is to note the telephones. Likewise, manual systems for logistic
commencement of this study and to outline initial plans demand and supply should not be forgotten in favour of
to model, simulate and visualise electronic/information automatic accounting and replenishment software based
attack in tandem with physical combat. The outcome, on computer connectivity and networking.
in due course, will be the means for timely and quality
advice to the ADF on matters relating to IW and EA.
In consideration of the possible public sensitivity to
R&D activities into cyberwarfare, a SE is an ideal tool
1.5 The future battlefield command and control, proprietary information
technology and commercial telecommunication,
As the ADF seeks, in collaboration with DSTO and satellite and navigation systems, may prove to be a fatal
Australian industry, to better shape the Australian weakness when those COTS products are subject to
Defence Organisation to meet emergent threats over the open scrutiny and testing by potentially adversaries. It
next few decades, it is important to appreciate is the intention of this author and the Australian Army
vulnerability that may be inherent through legacy to create a SE to investigate the affect and effect of
systems. Capability solutions have, and will continue cyberwar on command decision-making. This SE will
in the current economic climate, to be weighted toward initially stand-alone, but in time will integrate into the
cost effectiveness under the current strategic guidance larger SE provided by the SERF. The R&D interest in
and perceived threat, rather than serviceability in some this SE is mainly the information exchange been the
alternative or possible future battlefield. Pragmatic and CGB, interactive database and the commander-in-loop
objective analyses of vulnerabilities within future OODA process. It is hoped that the SE and the concept
scenarios and capabilities, using SEs, is a most cost demonstration facility it so provides, will greatly
effective, versatile and necessary means of developing advance our study of Information Operations and EA
logical argument in support of various alternative force tactics within the combat arena of a virtual battlespace.
and capability mix.
Developers and planners of C4ISREW systems that
Simulation of a future battlespace by SE can help will be operating twenty years from now, should be
elucidate “low-tech” counters to “high-tech” mindful of the potential dynamics and effectiveness of
capabilities. It is likely that simple counters will, as cyberwarfare. Today’s acquisitions will surely become
demonstrated in recent history, effectively undermine a legacy for tomorrow’s Defence Force. As the quote
too-vulnerable and overly-complex systems. As greater at the head of this paper reminds us; in order to counter
reliance is placed on COTS systems, ready access to the designs of the terrorist, the policeman must know,
those systems by foreign powers or non-state parties, understand, and be able to defend against, the tools of
through the normal commercial market, means that destruction.
some guarded military systems may invite close
inspection and possible re-engineering. Open, intimate 2. References
knowledge of COTS products permits the development
of elegant and very effective countermeasures. The 1. Commonwealth of Australia (Australian Army).
“flaming” example is such a countermeasure, as is any Land Warfare Doctrine 1: The Fundamentals of
reliable method by which an operating system may be Land Warfare.
caused to experience a “fatal error”. Undoubtedly, high
technology warfighting will evolve with the trends and 3. Author Biography
advancements of the day, measure meeting
countermeasure. Dr Wayne Philp is a Senior Research Scientist in the
Electronic Warfare Division of the Defence Science
It is important to note that there are two types of and Technology Organisation (DSTO) Australia,
warfare - "Conflict of Arms" and, "Conflict of Men at specialising in the planning, modelling and simulation
Arms". Most of the conflicts we have witnessed on of strategic-level electronic warfare and information
CNN over the past 30 years have been Conflicts of operations. He has particular military technical
Arms. The Falklands and The Gulf Wars, for example, expertise within electro-optic technology and an
have been mostly exercises in technology and weapons operational focus on "joint" littoral warfare. Dr Philp
platforms. Air, maritime and land assets have been presently leads the Land Systems Studies of the
deployed to win the day with minimal observable Strategic EW Group where his work is sponsored by
casualties. Many have admired the surgery performed the Director General, Future Land Warfare, Army
by precision guided weapons, aerial bombing, ever- Headquarters.
enhanced C4ISR data-fusion and commando teams
exercising stealth and high-tech wizardry. However,
we are possibly fooling ourselves if we expect warfare
over the next 20+ years to be much of the same with
network-centric, on-line intelligence, surveillance and
reconnaissance technology stealing the show. Should
cyberwarfare become practicable to deploy and engage,
it may be a far baser form of warfare that Australia and
her allies find themselves facing, when by neglect,
simpler and robust C3ISR systems have been allowed
to degrade beyond repair.

1.6 Conclusion

IW and EA as instruments of war, are becoming


increasingly real. Heavy reliance on “high-tech”

You might also like