Category Archives: Spectrum

Plan Red: Three Days to Paldiski

//This is my original text before editing//

European newspapers have shared a German assessment of what a Russian assault on NATO and the Baltics could look like. If you want to understand your adversary, put yourself in his shoes, and so I did. I decided I would start war planning for the assault immediately. The Kremlin loves a mighty name on a war plan, like the Americans who spend a lot of energy and time to come up with the most appealing name for an operation, even the later failed ones, so I spun on the old Soviet plan “Seven days to the Rhine.” My plan: “Plan Red – Three Days to Paldiski” – was a success as soon as the Leningrad MD heard about it.

When I started to write the plan, I needed to list the assumptions that laid the foundation for the plan.

My five grander general assumptions are straightforward.

First, most Western European Armed Forces are in a grave state of dismantled readiness and have limited abilities. Even significant forces such as Germany, France, and Great Britain might talk big and politically market their rearmament programs, but at the actual units, the readiness is still as it was ten years ago. The first significant NATO formation that arrived at the Lithuanian border would be Polish after three days, which was the cut-off for the plan, but the German and other European NATO forces would not be seen for at least ten to fifteen days. The Western European NATO members are in a state of denial of their readiness, living in an imaginary world where the recent years’ talk of rearmament is already in place. One example is Gotland, which is still only defended by two mechanized companies and some Home Guard. The difference between imagined readiness and actual readiness forms our opportunity.

Second, since the Cold War, the fear of nuclear arms in Western Europe has built up to the degree that the political debate does not even talk about these weapons anymore. At least in the 1970s and 1980s, there was a discussion. Added to the silence about nuclear arms is the almost eighty-year-old geopolitical equilibrium where nuclear arms are not used and are seen as theatrical instruments to portray strategic deterrence. If we, the Russians, use nuclear arms it would send shock waves not only through the political and military leadership and systems, but also create chaos on the financial market at a global scale. The attack on the World Trade Center at 9-11 was not only a deadly event, it created total mayhem on the global stock markets, and pushed the US into recession. It might not be nice, but it serves the Russian interest well.

Third, I assess that any NATO “trip wire” units in the Baltics will be passive. These units do not have artillery, logistics, medical support, or heavy weapons to engage a Russian spearhead. So if we, the Russian army, circumvent these NATO units, there will be no interference during our operational windows during the first three days. The “trip wire” units will not attack but hold the territory where they are stationed, and we will drive around it. Finland will not have time to mobilize or push units towards Russia, nor will Finland cross over the Russian border, fully aware of the risk of a nuclear response. Russia does not need to dedicate units beyond the regular staffing along the Finnish border.

Fourth, we are better off with a smaller force and no sign on the surface of what we are up to than large troop movements, hybrid warfare, loud propaganda, and psychological operations. These actions will only alert NATO. We can achieve the same goal with a regiment that needs a division if NATO starts to understand our intentions. We will not share our intentions with the government or foreign entities; even China will be unaware. In the assault on Ukraine, there was almost no surprise; we ran into massive resistance early.

Fifth, We, the Russians, will create a false illusion that there is a political solution, a settlement and that we are open to realizing that peace is better than conflict. The default belief in a political, diplomatic solution will slow the Western response, and create political division and indecisiveness in critical junctures. From the first armored column that passes the Estonian border, we will use all diplomatic channels to send this message of confusion and delay – that there is a political, diplomatic solution. The numerous governments that form NATO will lose valuable time discussing a diplomatic solution that never existed – but it serves our Russian objectives.

The actual plan is simple.

PLAN RED: THREE DAYS TO PALDISKI
Day one, a missile barrage on high-value targets opens up the engagement. One echelon of armor, attack helicopters, and rocket artillery supported by rocket artillery push through the Northern Estonia – Narva, Reval (Tallinn) to Paldiski. Batallion-size naval infantry land in Reval (Tallinn) harbor simultaneously.
In the South, another echelon pushes to Kaliningrad Oblast through Lithuania and immediately turns South to defend against NATO troops coming from Poland. Rear forces mop up the Lithuanian defenses and resistance in the days to come.
Latvia is ignored and sits in a Kurland Kessel, the Courland pocket, and the Latvian army does not have the means to attack in any direction.
A high-altitude nuclear EMP weapon detonated on international waters knock out installations on Gotland, including Visby airport, and a battalion-sized airborne unit captures Visby airfield. Day two, secure the targets for day one and reinforce the echelons.

When the Polish army arrives day three, direct communication with NATO declaring that any attempt to occupy the Baltic oblasts will have a nuclear response followed by a demonstration of a massive nuclear attack by the Strategic Rocket Forces on the Russian borderland in Novaya Zemlya, the large island North of Murmansk, and in the East Siberian Sea in the Far East.

Then a Kremlin phone call to NATO leadership – what are you gonna do about it?
The peace deal is that Russian forces leave Gotland. That’s it.

Jan Kallberg, Ph.D., LL.M., is a non-resident Senior Fellow with the Transatlantic Defense and Security program at the Center for European Policy Analysis (CEPA) and a George Washington University faculty member. Follow him at cyberdefense.com and @Cyberdefensecom.

(The text was published by the Center for European Policy Analysis in an edited form – accessible through this link)

Bottom line: Commanders that can’t delegate will not survive in the modern battlefield

From our article C4ISRNET (Defense News):
“Command by intent can ensure command post survivability”

Link to full text

“In a changing operational environment, where command posts are increasingly vulnerable, intent can serve as a stealth enabler.

A communicated commander’s intent can serve as a way to limit electronic signatures and radio traffic, seeking to obfuscate the existence of a command post. In a mission command-driven environment, communication between command post and units can be reduced. The limited radio and network traffic increases command post survivability.

The intent must explain how the commander seeks to fight the upcoming 12 – 24 hours, with limited interaction between subordinated units and the commander, providing freedom for the units to fulfill their missions. For a commander to deliver intent in a valuable and effective manner, the delivery has to be trained so the leader and the subordinates have a clear picture of what they set out to do.

 

Continue reading Bottom line: Commanders that can’t delegate will not survive in the modern battlefield

Offensive Cyber in Outer Space

The most cost-effective and simplistic cyber attack in outer space with the intent to bring down a targeted space asset is likely to use space junk that still has fuel and respond to communications – and use them to ram or force targeted space assets out of orbit.  The benefits for the attacker – hard to attribute, low costs, and if the attacker has no use of the space terrain then benefit from anti-access/area denial through space debris created by a collision.
Continue reading Offensive Cyber in Outer Space

When Everything Else Fails in an EW Saturated Environment – Old School Shortwave

( I wrote this opinion piece together with Lt. Col. Stephen Hamilton and Capt. Kyle Hager)

The U.S. Army’s ability to employ high-frequency radio systems has atrophied significantly since the Cold War as the United States transitioned to counterinsurgency operations. Alarmingly, as hostile near-peer adversaries reemerge, it is necessary to re-establish HF alternatives should very-high frequency, ultra-high frequency or SATCOM come under attack. The Army must increase training to enhance its ability to utilize HF data and voice communication.

The Department of Defense’s focus over the last several years has primarily been Russian hybrid warfare and special forces. If there is a future armed conflict with Russia, it is anticipated ground forces will encounter the Russian army’s mechanized infantry and armor.

A potential future conflict with a capable near-peer adversary, such as Russia, is notable in that they have heavily invested in electromagnetic spectrum warfare and are highly capable of employing electronic warfare throughout their force structure. Electronic warfare elements deployed within theaters of operation threaten to degrade, disrupt or deny VHF, UHF and SATCOM communication. In this scenario, HF radio is a viable backup mode of communication.

The Russian doctrine favors rapid employment of nonlethal effects, such as electronic warfare, in order to paralyze and disrupt the enemy in the early hours of conflict. The Russian army has an inherited legacy from the Soviet Union and its integrated use of electronic warfare as a component of a greater campaign plan, enabling freedom of maneuver for combat forces. The rear echelons are postured to attack either utilizing a single envelopment, attacking the defending enemy from the rear, or a double envelopment, seeking to destroy the main enemy forces by unleashing the reserves. Ideally, a Russian motorized rifle regiment’s advanced guard battalion makes contact with the enemy and quickly engage on a broader front, identifying weaknesses permitting the regiment’s rear echelons to conduct flanking operations. These maneuvers are generally followed by another motorized regiment flanking, producing a double envelopment and destroying the defending forces.

Currently, the competency with HF radio systems within the U.S. Army is limited; however, there is a strong case to train and ensure readiness for the utilization of HF communication. Even in EMS-denied environments, HF radios can provide stable, beyond-line-of-sight communication permitting the ability to initiate a prompt global strike. While HF radio equipment is also vulnerable to electronic attack, it can be difficult to target due to near vertical incident skywave signal propagation. This propagation method provides the ability to reflect signals off the ionosphere in an EMS-contested environment, establishing communications beyond the line of sight. Due to the signal path, the ability to target an HF transmitter is much more difficult than transmissions from VHF and UHF radios that transmit line of sight ground waves.

The expense to attain an improved HF-readiness level is low in comparison to other Army needs, yet with a high return on investment. The equipment has already been fielded to maneuver units; the next step is Army leadership prioritizing soldier training and employment of the equipment in tactical environments. This will posture the U.S. Army in a state of higher readiness for future conflicts.

Dr. Jan Kallberg, Lt. Col. Stephen Hamilton and Capt. Kyle Hager are research scientists at the Army Cyber Institute at West Point and assistant professors at the United States Military Academy.

Utilizing Cyber in Arctic Warfare

The change from a focus on counter-insurgency to near-peer and peer-conflicts has also introduced the likelihood, if there is a conflict, for a fight in colder and frigid conditions. The weather conditions in Korea and Eastern Europe are harsh during winter time, with increasing challenges the farther north the engagement is taking place. In traditional war theaters, the threats to your existence line up as follows: enemy, logistics, and climate. In a polar climate, it is reversed: climate, logistics, and the enemy.

An enemy will engage you and seek to take you on different occasions, but the climate will be ever-present. The battle for your own physical survival in staying warm, eating and seeking rest can create unit fatigue and lower the ability to fight within days, even for trained and able troops. The easiest way to envision how three feet of snow affects you is to think about your mobility walking in water up to your hip, so to compensate either you ski or use low ground pressure and wide-tracked vehicles, such as specialized small unit support vehicles.

The climate and the snow depth also affect equipment. Lethality in your regular weapons is lowered. Gunfire accuracy goes down as charges burn slower in an arctic subzero-degree environment. Mortar rounds are less effective than under normal conditions when the snow captures shrapnel. Any heat, either from weapons, vehicles or your body, will make the snow melt and then freeze to ice. If not cleaned, weapons will jam. In a near-peer or peer conflict, the time units are engaged is longer and the exposure to the climate can last months.

I say all this to set the stage. Arctic warfare takes place in an environment that often lacks roads, infrastructure, minimal logistics, and with snow and ice blocking mobility. The climate affects both you and the enemy; once you are comfortable in this environment, you can work on the enemy’s discomfort.

The unique opportunity for cyberattacks in an Arctic conflict is, in my opinion, the ability to destroy a small piece of a machine or waste electric energy.

First, the ability to replace and repair equipment is limited in an arctic environment — the logistic chain is weak and unreliable and there are no facilities that effectively can support needed repairs, so the whole machine is a loss. If a cyberattack destroys a fuel pump in a vehicle, the targeted vehicle could be out of service for a week or more before repaired. The vehicle might have to be abandoned as units continue to move over the landscape. Units that operate in the Arctic have a limited logistic trail and ability to carry spare parts and reserve equipment. A systematic attack on a set of equipment can paralyze the enemy.

Second, electric energy waste is extremely stressful for any unit targeted. The Arctic has no urban infrastructure and often no existing power line that can provide electric power to charge batteries and upkeep electronic equipment. If there are power lines, they are few and likely already targeted by long-range enemy patrols.

The winter does not have enough sun to provide enough energy for solar panels if the sun even gets above the horizon (if you get far enough north, the sun is for several months a theoretical concept). The batteries do not hold a charge when it gets colder (a battery that holds a 100-percent charge at 80 degrees Fahrenheit has its capacity halved to 50-percent at 0 degrees Fahrenheit). Generators demand fuel from a limited supply chain and not only generate a heat signature, but also noise. The Arctic night is clear, with no noise pollution, so a working generator can be pick up by a long-range skiing patrol from 500 yards, risking an ambush. The loss or intermittent ability to use electronics and signal equipment due to power issues reduces and degrades situation awareness, command and control, the ability to call for strikes, and blinds the targeted unit.

Arctic warfare is a fight with low margins for errors, where climate guarantees that small failures can turn nasty, and even limited success with arctic cyber operations can tip the scales in your favor.

Jan Kallberg, PhD

Jan Kallberg is a research fellow/research scientist at the Army Cyber Institute at West Point. As a former Swedish reserve officer and light infantry company commander, Kallberg has personal experience facing Arctic conditions. The views expressed herein are those of the author and do not reflect the official policy or position of the Army Cyber Institute at West Point, the United States Military Academy, or the Department of Defense.

Spectrum Warfare

 

Spectrum sounds to many ears like old fashioned, Cold War jamming, crude brute electromagnetic overkill. In reality though, the military needs access to spectrum, and more of it.

Smart defense systems need to communicate, navigate, identify, and target. It does not matter how cyber secure our platforms are if we are denied access to electromagnetic spectrum. Every modern high tech weapon system is a dud without access to spectrum. The loss of spectrum will evaporate the American military might.

Today, though, other voices are becoming stronger, desiring to commercialize military spectrum. Why does the military need an abundance of spectrum, these voices ask. It could be commercialized and create so much joy with annoying social media and stuff that does not matter beyond one of your life-time minutes.

It is a relevant question. We as an entrepreneurial and “take action” society see the opportunity to utilize parts of the military spectrum to launch wireless services and free up spectrum space for all these apps and the Internet of Things that is just around the corner of the digital development of our society and civilization. In the eyes of the entrepreneurs and their backers, the military sits on unutilized spectrum that could put be good use – and there could be a financial harvest of the military electromagnetic wasteland.

The military needs spectrum in the same way the football player needs green grass to plan and execute his run. If we limit the military access to necessary spectrum it will, to extend the football metaphor, be just a stack of players not moving or be able to win. Our military will not be able to operate effectively.

We invite people to talk about others to talk about justice, democracy, and freedom, to improve the world, but I think it is time for us to talk to our fellow man about electromagnetic spectrum because the bulwark against oppression and totalitarian regimes depends on access.

Jan Kallberg, PhD

The Fight for Spectrum

An EC-130H Compass Call aircraft is parked at Bagram Airfield, Afghanistan Sept. 12, 2014. The aircraft is configured to execute worldwide information warfare tactics. (U.S. Air Force photo by Staff Sgt. Evelyn Chavez/Released)

Spectrum sounds to many ears like old-fashioned, Cold War jamming, crude brute electromagnetic overkill. In reality though, the military needs access to spectrum and more of it.

Smart defense systems need to communicate, navigate, identify, and target. It does not matter how cyber secure our platforms are if we are denied access to electromagnetic spectrum. Every modern high tech weapon system is a dud without access to spectrum. The loss of spectrum will evaporate the American military might.

Today, though, other voices are becoming stronger, desiring to commercialize military spectrum. Why does the military need an abundance of spectrum, these voices ask. It could be commercialized and create so much joy with annoying social media and stuff that does not matter beyond one of your lifetime minutes.

It is a relevant question. We as an entrepreneurial and “take action” society see the opportunity to utilize parts of the military spectrum to launch wireless services and free up spectrum space for all these apps and the Internet of Things that is just around the corner of the digital development of our society and civilization. In the eyes of the entrepreneurs and their backers, the military sits on the unutilized spectrum that could put be good use – and there could be a financial harvest of the military electromagnetic wasteland.

The military needs spectrum in the same way the football player needs green grass to plan and execute his run. If we limit the military access to necessary spectrum it will, to extend the football metaphor, be just a stack of players not moving or be able to win. Our military will not be able to operate effectively.

The electromagnetic space is no wasteland, it is a space ready to be utilized, at computational speed, and it serves as a deterrent in the same way as the ICBM in the silo. It exists, it can be utilized, and our adversaries understand. The military needs its electromagnetic space to ensure that they can operate in a degraded environment when our adversaries seek to limit the American might through electronic warfare, we should be able to fully operate and execute our operations to the extent of our abilities.

We invite people to talk about others to talk about justice, democracy, and freedom, to improve the world, but I think it is time for us to talk to our fellow man about electromagnetic spectrum because the bulwark against oppression and totalitarian regimes depends on access.

Jan Kallberg, PhD

/I originally wrote this as an opinion text for c4isrnet.com in 2015. Its relevance has increased with the shifted focus on peer and near-peer adversaries.