4 August 2001. Thanks to Anonymous.
See also two related papers:
Military Applications of Information Warfare by PRC, by Lt. General
Abe C. Lin.
http://www.dsis.org.tw/pubs/seminars/2000-02-19/s_ciw00-0219-003e.pdf
(13 pp., 38KB)
The PRC's Research on Information Warfare, Its Influence over the ROC
and the ROC's Counter-measures, by Tseng, Jang-ruey
http://www.dsis.org.tw/pubs/seminars/2000-02-19/s_ciw00-0219-004e.pdf
(26 pp., 81KB)
3 August 2001. Thanks to Anonymous.
Source:
http://www.dsis.org.tw/pubs/seminars/s_tp00-01-003.pdf
(25KB)
[9 pages; undated, original file is dated 27 December 2000.]
COMPARISON OF THE INFORMATION WARFARE
CAPABILITIES OF THE ROC AND PRC
Gen. Abe C. Lin
Director
Communication Electronics & Information Bureau
ABSTRACT
There is a close correlation between the combat activities and social
development. From agriculture, to industry, then to an information society,
countries are studying innovative ways to try to gain an advantage by changing
how wars are fought. The information society brings new revolutionary
technologies, which demand change in the way wars are fought. This poses
serious concerns for advanced countries that heavily rely on the information
in their war fighting processes. The Republic of China (ROC) is viewed as
an “information country” and is getting more dependent on information.
The terrifying experience of “The July 29 Power Outage” and “The
September 21 Earthquake” are still vivid in the minds of the ROC society.
It raises a concern as to whether the ROC could defend itself from various
types of information warfare attack from the PRC. This is a priority and
the focus of ROC military combat readiness.
I. PREFACE
In January 1998, Lt. General Patrick Hughes, Director of the U.S. DOD Defense
Intelligence Agency, stated the following in a Senate Intelligence Committee
hearing: “Military strategists with technology and creativity are leading
the development and application of new ways of war fighting. New and innovative
ways are changing the traditional ways of war fighting. The superior position
of the U.S. military and its determination in keeping its leadership role
of the world cause our enemies to seek alternate ways to attack the U.S.”
General John Shalikashvili, Former Chairman of JCS, in an article titled
“Military Strategy of the Nation”, described “information
warfare” as the largest “asymmetric warfare” concern of the
U.S.1. A hacker or a country could attack the U.S. using information
warfare techniques and do considerable damage. As the development of the
information society continues, all countries of the world have to take the
“soundless war” very seriously.
II. ORIGIN OF INFORMATION WARFARE
Because information warfare is a new type of war fighting, there is no
authoritative definition of the terminology “information warfare”.
Dr. Thomas P. Rona first used the term of “information war” in
a report delivered to Boeing Company, titled “Weapon Systems and Information
War” in 1976. Dr. Rona pointed out that the information infrastructure
was becoming a key component of the U.S. economy. At the same time, it is
becoming a vulnerable target in both war and peacetime.2 As for
the U.S. military, the USAF started to actively discuss this subject in the
1980s. By then, a consensus was reached that “information” could
be a target and also used as a weapon.
After years’ of study, in February 1996, the U.S. DOD published “Joint
Pub 3-13.1 Doctrine for Command and Control Warfare”. It described command
and control warfare as an application of information warfare in military
operations. It defines command and control warfare as:3
“The integrated use of operations security, military deception,
psychological operations, electronic warfare, and physical destruction, mutually
supported by intelligence, to deny information to, influence, degrade, or
destroy adversary command and control capabilities, while protecting friendly
command and control capabilities against such actions.”
In this Joint Publication, it specified the organization, planning, training,
exercise, and joint operations of command and control. Most important, this
publication specified the doctrine of command and control warfare. This was
the first time the U.S. DOD specified the scope and doctrine of information
warfare.
In October 1998, U.S. DOD published “Joint Pub 3-13 Joint Doctrine for
Information Operations”. In the beginning, this Joint Pub was called
“Joint Doctrine for Information Warfare”. Later, it was changed
to “Joint Doctrine for Information Operations”. The reason of the
change was to clarify the relationship of the information operations and
information warfare. They were defined, as follows:4
Information Operations:
Actions taken to affect adversary information and information systems while
defending one’s own information and information systems.
Information Warfare:
Information operations conducted during time of crisis or conflict to achieve
or promote specific objectives over a specific adversary or adversaries.
Based on the definition above, the U.S. DOD has a broad definition for
information warfare. However, since the “Gulf War”, the definition
of the “frontline” of war is no longer clear any more. In the future,
information warfare could be engaged in any place. Due to the well-defined
function and responsibilities of the U.S. DOD, currently its policy is not
to interfere with other organization’s operations. This could open a
door for the PRC to gain an advantage over the U.S. military power.
III. CURRENT INFORMATION WARFARE CAPBILITIES OF ROC AND PRC
1. Information Warfare Strategy
In the middle of 1980s, the PRC started to develop its next generation combat
power. They paid special attention to the development of information warfare.
After the “Gulf War”, the PRC noticed that its traditional military
power was far behind that of the U.S. If PRC confronted the U.S. directly,
it basically would lose the war. Therefore, the PRC started to look for solutions
in the asymmetric warfare. Mr. Shen, Wei-Kuang, PRC military strategist,
stated in a dissertation: ”The transitional military power only destroys
an enemy’s military assets and economic potential. But offensive information
warfare could impact the enemy’s military, political, economic, and
social, even psychological foundations. It could destroy the enemy’s
information infrastructure and operations. It could paralyze the enemy’s
military, banking, communications, electronics, and electrical systems/networks.
The use of military deception and psychological operations can destroy an
enemy’s faith in its own government. This would deter the enemy’s
intent to attack or could neutralize its ability to fight.”5
This viewpoint matches that of the book “War on Exceeding the Limits”
by Chiao, Lang, and Wang, Chian-Hwei.6 Exceeding the Limits means
a paradigm shift in thinking first, then the behaviors. The important subject
is to select the best method to exceed the limits. Whether it is a hacker,
terrorist, or financial instruments, it is not the key. The key is to have
the future national or military leader to jump out of the existing framework
of thinking. The future national and military leader should look at the damages
might cause by the non-military actions taken by the adversary to support
its military operations.
2. Information Warfare Tactics
The PRC has made some progress in the development of information warfare
tactics and profiles. The offensive information warfare tactic of the PRC
is to jam, destroy, damage, and deceive enemy information systems. The tactics
include, as directly translated from the Chinese meaning, “Take the
Eye Out (destroy the information source)”, “Cut the Path off (cut-off
the information pathway)”, “Take the Heart Out (destroy the information
processing center)”, and “Disturb the Sleep (Jam the information
receiver station)”. The information warfare profiles include “Protect
the Eye and Open the Source (protect and enlarge the information source)”,
“Protect the Path and Facilitate the Flow (protect information and keep
information flow smoothly)”, “Protect the Machine and Guard the
Heart (protect the computer security)”, and “Use Multiple Methods
and Anti-jamming (use multiple paths to transmit information and enhance
anti-jamming capabilities)”. The PRC’s tactics are focused on how
to destroy the other party’s man, machine, and information in order
to paralyze their combat abilities.7
The strategic approach of the ROC military is “Effective Deterrence
and Defense”. The operational concept for the information warfare is
to prevent the enemy’s use of any method to launch an information warfare
attack on the ROC. This is to ensure the national security. In the peacetime,
an integrated surveillance and intelligence collection system will be used
to monitor the enemy’s political party, military, government, and economic
activities. Information security will be obtained through protection procedures
and firewalls of the communications and information systems. In wartime,
based on mission requirements for combined operations, soft-kill and hard-kill
methods will be applied to suppress an enemy’s attack in order to maintain
the ROC information superiority and combat effectiveness.
3. Information Warfare Combat Readiness
From the lessons learned of the “Gulf War”, the PRC realizes that
only highly agile and effective deployment of command control would win the
war. Therefore, PRC has been actively building a global positioning system
and fiber optics communications networks in order to obtain combat information
superiority. It is said that the PRC has completed over one million kilometers
of fiber optics lines and a communications infrastructure, called “Eight
Horizontal Grids and Eight Vertical Grids”.8 Additionally,
the PRC will complement its existing communications infrastructure with
satellites, ground mobile receiver stations, and ground-to-air data links.
With the technologies obtained from the Western Countries, the PRC can complete
the development of satellite, tactical ballistic missiles, and cruise missiles.
Currently, the PRC is indigenously developing “computer viruses”,
“logic bombs”, and “EMP weapons”. The PRC calls this:
“win the war under high technology conditions”. Based on intelligence
reports, since 1997, PRC has included techniques of computer hacker attacks,
virus attacks, and information jamming in its military exercises to enhance
its readiness for information warfare.
The ROC has also recognized the importance of information in military operations.
It has continued information training and office automation. It has built
an information infrastructure (such as, around the island fiber optics
communications network). A good foundation for the development of information
warfare was established. But, most of the ROC defense budget went into the
procurement of the advanced fighters and frigates. Also, the export control
of key technologies by the U.S. Government made the development of information
warfare techniques difficult for the ROC military. Fortunately, the technology
bases of the private sectors are quite good. They could be put in place to
support the development of information warfare techniques for the ROC military.
4. Defense Budget Support
The PRC has a continued ambition of military take-over of Taiwan. Therefore,
it has steadily increased its military readiness with two-digit defense spending
increases annually. In 1999, its defense spending is estimated at 12.6 billion
U.S. dollars, about 9% of GNP. This allows the PRC devotes large amount of
funding to the development of information warfare. Due to the ROC government
spending cut and social welfare budget increase, the ROC defense spending
is decreasing. There is only a small amount of defense budget allocated for
the development of information warfare because the funding is needed to maintain
the advanced fighters and the development of tactical ballistic missile system.
5. Private Sector Support
Although the PRC has good progress in the development of information warfare
tactics and profiles, but, its development of information technology and
techniques are in its initial stage. This is because the information industry
of the PRC is primarily OEM. There is no capability in R&D. Contrarily,
the information capabilities of the ROC private sector are quite impressive.
In an U.S. DOD report on “Taiwan Strait Posture Status”, it stated
that the ROC is leading the world in the area of development of anti-virus
techniques. The ROC military is utilizing all possible remedies to integrate
the synergism of government, industry, academic, and research organization
to develop key technologies to facilitate the ROC military in establish the
offensive and defensive information warfare capabilities.
6. National Information Warfare
In the development of information warfare, the PRC is promoting the development
from the central government. There are different levels of information warfare
development, such as, strategy, tactic, combat, and skill. Their determination
and effort in implementing and integrating the strategy, combat readiness,
and technology are strong. This further exemplifies the intent that the PRC
plans to use unconventional and asymmetric methods to fight the future war.
The economy of the ROC is prosperous and more relies on information and
computers. People do not worry about the national security much. Therefore,
the development of information warfare is only limited in the military areas.
The information systems of banking, communications, electrical power, and
transportation that are vital to the society are vulnerable to enemy attack.
This raises a concern of nation security.
In summary, the PRC had an early start in the development of information
warfare. Because the PRC is a communist autocratic country, it could use
the strength of the whole country to develop information warfare. At this
point in time, the PRC leads the ROC in the areas of technology, budget,
human resources, policy, and execution of information warfare. However, the
scope of information warfare is very large. The information technology is
changing very rapidly. Many things may happen. How to promote the development
of information warfare is one of the key tasks for the ROC Ministry of National
Defense (MND).
IV. FUTURE INFORMATION WARFARE DEVELOPMENT OF ROC AND PRC
The critical time of the competition between the ROC and the PRC in the
development of information warfare techniques is in the next five years.
According to the information, the PRC has established a Fourth Armed Forces,
called the network troop, which is in charge of offensive and defensive
information warfare activities.9 The PRC also built “an
information warfare simulation center”. The center used high technology
simulation skills and equipment to simulate the information warfare and its
environment. In the research and development of the information warfare
techniques, the PRC plans to develop data link, network virus program and
related transmission equipment, and no pollution EMP weapon in order to paralyze
the command and control system. The PRC actively imports information technologies
and equipment, including early warning radar, electronic warfare soft-kill
(for example, active airborne jamming equipment), hard-kill (for example,
anti-radiation missile) weapon, and communications equipment to improve its
information warfare capabilities. It is expected that the PRC may have the
following information warfare capabilities by the year of 2005:
1. Use mainframe computer to setup the neural network for joint warfare
simulation
2. Develop automated forward area command control system for troop maneuvering
in the battlefield
3. Develop tactical date link transmission system for standardization of
data transmission
4. Digitize the command and control system for the integration to automatic
command control system
5. Mobilize the command control center with satellite receiving /transmission
capabilities
6. Use Satellite and AEW aircraft to have joint war fighting command and
control capabilities
7. Improve satellite communications techniques to build the satellite navigation
capabilities (For example, cruise missile).
8. Build fiber optics communications network to complete the 23
“information freeway” and enhance anti-electromagnetic interference
capabilities of the automated command and control system
In order to counter the PRC information warfare threats, in the past years,
the ROC military actively promoted an integrated approach of the information
warfare planning. There was good progress in the areas of information equipment
procurement and the consensus building for national defense. The ROC military
is working in the following areas of the information warfare:
1.Build the information security network
a. Improve the ROC military information security function through system
monitoring and network node management.
b. Integrate information warfare equipment, electronic warfare equipment,
and Command & Control equipment to achieve the effectiveness of an integrated
joint operation.
c. Build the electronic warfare capabilities. The key is to have information
from active and passive sensors, to manage battlefield frequency spectrum,
to integrate the information, to protect electromagnetic emission, and to
avoid the enemy acquire the electronic signals.
2. Build the offensive information warfare capability
Utilize the civil technology bases, establish an “information warfare
laboratory”, collect/analyze all kinds of viruses, and implement key
techniques to build an effective offensive information warfare weapon. (For
example, computer virus, EMP bomb, anti-virus software, network management
software)
3. Integrate the C4ISR architecture
Integrate the individual management information systems, combat operation
automation systems, and intelligence automation systems into a cohesive Armed
Forces combined operations center systems. The C4ISR system shall enhance
the Naval operations, Air Force air defense, and combined operations system
function. An overall island-wide defense system shall be planned. This shall
provide precision, agility, and all aspects command control capabilities.
With the acquisition of new radar and data link and the training of doctrine,
the ROC military will obtain the information superiority.
4. Implement defense information management system:
Use the C4ISR system as the nucleus to change the defense information management
system to support the national policy and strategy planning in peacetime
and to support joint operations in wartime. Through organization re-engineering
and process improvement, a homogenous integrated service environment for
all the ROC Armed Services will be provided.
5. Establish all aspect high quality communications and information environment
An environment of voice, video, data, image, and other information shall
be established through network digitization, wire and wireless communications,
network management, and simulated network. Platforms with inter- and
intra-network shall be developed to support the combat operations and C4ISR
command control.
6. Integrate government, industry, academic, and research organization and
promote outsourcing
Information technology has its dual use for military and civilian. The technology
base of private industry and academic organization is strong. Due to the
streamlining of the ROC MND organization and personnel, the ROC military
shall follow the directive of the Executive Yuan to outsource its information
operations. Through hiring advisors and outsourcing, as well as, integrating
the private sector and research organization, the defense information
infrastructure and capability will be developed.
7. Promote national level information warfare command
The scope of information warfare is large. It covers political, psychological,
economic, technical, and military areas. There are all potential targets
of enemy’s information warfare. The Executive Yuan shall be the National
Information Warfare Command that integrates the civil affairs, foreign affairs,
national defense, financial, education, legal, economic, transportation,
and national security agencies. A security safeguard shall be developed to
protect the national infrastructure of electrical power, communications,
banking, and transportation. Contingent plans also need to be developed.
The Ministry of National Defense shall be responsible national defense and
promote the development of information warfare in order to safeguard the
national security.
V. CONCLUSIONS
The development of information warfare of the ROC and the PRC are all in
their initial stage. Each of the two has its own strength. At this point
in time, it is still too early to say which one of the two is ahead of the
other. One thing for sure is that both the ROC and the PRC will be vigorously
promoting the development of information warfare to maintain information
superiority. The “Control of the Information” will soon replace
the “Control of the Sky” as the top priority of the war fighting
between the PRC and the ROC. As paraphrased in the policy report by the Minister
Tang of ROC MND, “information warfare capability is the key for military
readiness”, if the ROC military does not enhance its information warfare
capability, the PRC will pass that of the ROC. This would threaten the ROC
national security. Therefore, the development of offensive and defensive
capabilities of information warfare techniques becomes the key mission for
the ROC military development. As the Internet, communications, and battlefield
digitization become more and more important, it is essential to incorporate
information warfare into the national level of security policy. Therefore,
in concert with the establishment of national information warfare command
organization, the ROC military should build the consensus of “People
Nation Defense” and step-by-step integrate the resources of the government
and private sector to defend the ROC national security jointly.
REFERENCES:
1. Robert H. Allen, “Asymmetric Warfare: Is The Army Ready?
http://www.amsc.belvoir.army.mil/asymmetric_warfare.htm
2. Thomas P. Rona, “Weapon Systems and Information War”, Boeing
Aerospace Co., Seattle, WA, 1976
3. Joint Pub 3-13.1 “Command and Control Warfare”, DOD US, February
1996.
4. Joint Pub 3-13 “Information Operations”, DOD US, December 1998.
5. Shen, Wei-Kuang , “ The Type of War and View of Security of the 21st
Century”, Mainland China Peking Commentary Monthly Report, February
1998.
6. Chiao, Lang, and Wang, Chian-Hwei, “War on Exceeding the Limits”
PLA publication, Peking, February 1999.
7. Tzeng, Chang-Ray, “Digital National Defense, New Thinking In National
Defense Strategy Beyond The Century”, National Security and Military
Strategy Seminar Dissertations, December 1999.
8. ROC Ministry of National Defense, “Analysis of the Mainland China
Information Industry Development”, Mainland China Brief Analysis
Summarization, Pub 1206-043, October 1999.
9. Liberty Daily, “Network War, U.S. versus PRC”, November 18,
1999.
HTML by Cryptome.
|